Prof. Debnath  Bhattacharyya
My Social Links

Prof. Debnath Bhattacharyya

Professor
Department of Computer Science and Engineering, K L Deemed to be University, KLEF, Guntur


Highest Degree
Ph.D. in Computer Science and Engineering from University of Calcutta, India

Share this Profile



Advertisement
Event

Biography

Prof. Debnath Bhattacharyya is currently working as Professor and Head at Computer Science and Engineering Department, VIIT, Vishakhapatnam (Vizag), AP, India, and Adjunct Professor at Computer Science and Engineering Department, VFSTR University, Guntur, AP, India. He has completed his Ph.D. in Computer Science and Engineering from University of Calcutta, India. His area of research interest related to Biometric Authentication, Pattern Recognition, and Security Engineering. He has published 77 research articles in international journals as well as 79 international conference proceeding and 2 national conference proceedings contributed as author/co-author. He is also serving as Visiting Professor at Lincoln University College, KL, Malaysia, and Mewar University, and Invited International Professor at Hannam University, Korea. He is also serving as Chief Editor and Editor for several journals. He is life member of Computer Society of India, India, and member of IEEE, International Association of Computer Science and Information Technology, International Association of Engineers (IEANG), Hong Kong, Science and Engineering Research Division, Computer Research Unit, Athens Institute for Education and Research, and member of International Biometric Group. He also visited Thailand, Malaysia, USA, Maldives, Nepal, Singapore, Korea, Japan, UK, etc., for presenting Research Papers in various IEEE Conferences and for Academic purposes. He is also member of many conference organizing committees. He successfully guided 8 M.Tech, 7 M.C.A students and 1 PhD student.

Area of Interest:

Computer Sciences
100%
Biometric Authentication
62%
Pattern Recognition
90%
Security Engineering
75%
Intelligent Engineering Systems
55%

Research Publications in Numbers

Books
5
Chapters
0
Articles
239
Abstracts
0

Selected Publications

  1. Doppala, B.P., D. Bhattacharyya, M. Chakkravarthy and T.H. Kim, 2023. A hybrid machine learning approach to identify coronary diseases using feature selection mechanism on heart disease dataset. Distrib. Parallel Databases, Vol. 41. 10.1007/s10619-021-07329-y.
    CrossRef  |  Direct Link  |  
  2. Bhattacharyya, D., E.S.N. Joshua, N.T. Rao and T.H. Kim, 2023. Hybrid CNN-SVM classifier approaches to process semi-structured data in sugarcane yield forecasting production. Agronomy, Vol. 13. 10.3390/agronomy13041169.
    CrossRef  |  Direct Link  |  
  3. Babu, J.S., S.C. Ch, D. Bhattacharyya and Y. Byun, 2023. Estimating the crop acreage of menthol mint crop from remote sensing satellite imagery using ANN. Agronomy, Vol. 13. 10.3390/agronomy13040951.
    CrossRef  |  Direct Link  |  
  4. Thirugnanasambandam, K., M. Rajeswari, D. Bhattacharyya and J.Y. Kim, 2022. Directed artificial bee colony algorithm with revamped search strategy to solve global numerical optimization problems. Autom. Software Eng., Vol. 29. 10.1007/s10515-021-00306-w.
    CrossRef  |  Direct Link  |  
  5. Satyanarayana, K.V., N.T. Rao, D. Bhattacharyya and Y.C. Hu, 2022. Identifying the presence of bacteria on digital images by using asymmetric distribution with k-means clustering algorithm. Multidimension. Syst. Signal Process., 33: 301-326.
    CrossRef  |  Direct Link  |  
  6. Doppala, B.P., D. Bhattacharyya, M. Janarthanan and N. Baik, 2022. A reliable machine intelligence model for accurate identification of cardiovascular diseases using ensemble techniques. J. Healthcare Eng., Vol. 2022. 10.1155/2022/2585235.
    CrossRef  |  Direct Link  |  
  7. Vamsi, B., D. Bhattacharyya, D. Midhunchakkravarthy and J.Y. Kim, 2021. Early detection of hemorrhagic stroke using a lightweight deep learning neural network model. Traitement du Signal, 38: 1727-1736.
    CrossRef  |  Direct Link  |  
  8. Thirugnansambandam, K., D. Bhattacharyya, J. Frnda, D.K. Anguraj and J. Nedoma, 2021. Augmented node placement model in-WSN through multiobjective approach. Comput. Mater. Continua, 69: 3629-3644.
    CrossRef  |  Direct Link  |  
  9. Raj, S.N.M., D. Bhattacharyya, D. Midhunchakkaravarthy and T.H. Kim, 2021. Multi-hop in clustering with mobility protocol to save the energy utilization in wireless sensor networks. Wireless Pers. Commun., 117: 3381-3395.
    CrossRef  |  Direct Link  |  
  10. Meeravali, S., D. Bhattacharyya, N.T. Rao and Y.C. Hu, 2021. Performance analysis of an improved forked communication network model. Connect. Sci., 33: 645-673.
    CrossRef  |  Direct Link  |  
  11. Joshua, E.S.N., D. Bhattacharyya, M. Chakkravarthy and Y.C. Byun, 2021. 3D CNN with visual insights for early detection of lung cancer using gradient-weighted class activation. J. Healthcare Eng., Vol. 2021. 10.1155/2021/6695518.
    CrossRef  |  Direct Link  |  
  12. Joshua, E.S.N., D. Bhattacharyya, M. Chakkravarthy and H.J. Kim, 2021. Lung cancer classification using squeeze and excitation convolutional neural networks with grad cam++ class activation function. Traitement du Signal, 38: 1103-1112.
    CrossRef  |  Direct Link  |  
  13. Roy, S., D. Bhattacharyya, S.K. Bandyopadhyay and T.H. Kim, 2019. Heterogeneity of human brain tumor with lesion identification, localization, and analysis from MRI. Inf. Med. Unlocked, Vol. 16. 10.1016/j.imu.2019.100243.
    CrossRef  |  Direct Link  |  
  14. Das, P., S.K. Naskar and S.N. Patra, 2018. Hardware efficient FIR filter design using global best steered quantum inspired cuckoo search algorithm. Appl. Soft Comput., 71: 1-19.
    CrossRef  |  Direct Link  |  
  15. Sujatha, V., D. Bhattacharyya, P.S. Chaitanya and T.H. Kim, 2015. Data outsourcing based on secure association rule mining processes. Int. J. Secur. Its Appl., 9: 41-48.
    Direct Link  |  
  16. Shariff, V., S.B. Satukumati, D. Bhattacharyya and T.H. Kim, 2015. Recovery and replacement algorithm for a wireless sensor network. Int. J. Control Autom., 8: 383-392.
    Direct Link  |  
  17. Vadlamudi, G., 2014. Hybrid face recognition using image feature extractions: a review. Int. J. Bio. Sci. Bio. Technol., 6: 223-234.
    CrossRef  |  Direct Link  |  
  18. Seth, S., D. Bhattacharyya and T.H. Kim, 2014. CBACCN: constraint based community discovery in complex networks. Int. J. Appl. Eng. Res., 9: 18115-18127.
  19. Rupa, C., R.P. Kumar, V.N. Mandhala and D. Bhattacharyya, 2014. Performance evaluation of e2aodv over aodv for mobile adhoc networks. Int. J. Software Eng. Its Appl., 8: 119-130.
    CrossRef  |  Direct Link  |  
  20. Reddy, V.R.C., K.K. Kishore, D. Bhattacharyya and T.H. Kim, 2014. Multi-feature fusion based facial expression classification using dlbp and dct. Int. J. Software Eng. Its Appl., 8: 55-68.
    CrossRef  |  Direct Link  |  
  21. Rao, K.S., V.N. Mandhala, D. Bhattacharyya and T.H. Kim, 2014. An association rule hiding algorithm for privacy preserving data mining. Int. J. Control Autom., 7: 393-404.
    CrossRef  |  Direct Link  |  
  22. Mandhala, V.N., D. Bhattacharyya and T.H. Kim, 2014. Eliminating unwanted messages in SNS using decision tree. Int. J. Database Theory Appl., 7: 121-130.
    CrossRef  |  Direct Link  |  
  23. Mandal, B.K., D. Bhattacharyya and T.H. Kim, 2014. A design approach for wireless communication security in bluetooth network. Int. J. Secur. Its Appl., 8: 341-352.
    Direct Link  |  
  24. Mandal, B.K., D. Bhattacharyya and S. Kang, 2014. Attenuation of signal at a tropical location with radiosonde data due to cloud. Int.. J. Smart Home, 8: 15-22.
    Direct Link  |  
  25. Mandal, B.K., D. Bhattacharyya and K.H. Shin, 2014. A security architecture for wireless sensor networks environmental. Contemp. Eng. Sci., 7: 737-742.
    CrossRef  |  Direct Link  |  
  26. Hazra, D., D. Bhattacharyya and K.H. Shin, 2014. Heuristic and intermediate features based image retrieval. Contemp. Eng. Sci., 7: 1731-1738.
    CrossRef  |  Direct Link  |  
  27. Ghosh, T., D. Bhattacharyya, S.K. Bandyopadhyay and T.H. Kim, 2014. A review on different techniques to de-noise a signal. Int. J. Control Autom., 7: 349-358.
    CrossRef  |  Direct Link  |  
  28. Bhattacharyya, D., S. Seth and T.H. Kim, 2014. Social network analysis to detect inherent communities based on constraints. Appl. Math, 8: 385-396.
    CrossRef  |  Direct Link  |  
  29. Bhattacharyya, D., A. Haveliya and T.H. Kim, 2014. Secure data hiding in binary text document for authentication. Appl. Math, 8: 371-378.
    CrossRef  |  Direct Link  |  
  30. Bhowal, K., D. Bhattacharyya, A.J. Pal and T.H. Kim, 2013. A GA based audio steganography with enhanced security. Telecommunication Sys., 52: 2197-2204.
    CrossRef  |  Direct Link  |  
  31. Bhattacharyya, D., K.B. Samir, K. Tai-hoon, 2013. Diagnosis of breast cancer by tissue analysis. Chin. J. Cancer Res., 25: 39-45.
    Direct Link  |  
  32. Bhattacharyya, D., A.J. Pal and T.H. Kim, 2013. Cell-graph coloring for cancerous tissue modelling and classification. Multimedia tools Appl., 66: 229-245.
    CrossRef  |  Direct Link  |  
  33. Bhattacharyya, D and S.K. Bandyopadhyay, 2013. Hiding secret data in dna sequence. Int. J. Sci. Eng. Res., .
    Direct Link  |  
  34. Bhattacharyya, D., T.H. Kim and P. Dutta, 2012. A method of data hiding in audio signal. J. Chin. Inst. Eng., 35: 523-528.
    CrossRef  |  Direct Link  |  
  35. Bhattacharyya, D., K.B. Samir, 2012. Diagnosis of breast cancer by image analysis. Int. J. Emerging Trends Eng. Dev., 6: 216-224.
  36. Kim, T.H., D. Bhattacharyya and S.K. Bandyopadhyay, 2011. Supervised chromosome clustering and image classification. Future Generation Comput. Syst., 27: 372-376.
    CrossRef  |  Direct Link  |  
  37. Bhattacharyya, D., K. Tai-hoon, M. Kheyali and K.B. Samir, 2011. Information Management in Wireless Mobile Sensor Network. Int. Interdiscip. J., 14: 167-178.
  38. Bhattacharyya, D and K. Tai-hoon, 2011. Vehicle track control. Int. J. Comput., 5: 123-131.
  39. Sinha, R., S. Samaddar, D. Bhattacharyya and T.H. Kim, 2010. A tutorial on spatial data handling. Int. J. Database Theory Appl., 3: 1-12.
    Direct Link  |  
  40. Sarkar, I., F. Alisherov, T.H. Kim and D. Bhattacharyya, 2010. Palm vein authentication system: a review. Int. J. Control Autom., 3: 27-34.
    Direct Link  |  
  41. Saha, S., D. Bhattacharyya, T.H. Kim and S.K. Bandyopadhyay, 2010. Model based threat and vulnerability analysis of e-governance systems. Int. J. U. E. Serv. Sci. Technol., 3: 7-21.
    Direct Link  |  
  42. Saha, S., D. Bhattacharyya and S.K. Bandyopadhyay, 2010. Security on fragile and semi-fragile watermarks authentication. Int. J. Comput. Applicat., 3: 23-27.
    Direct Link  |  
  43. Ray, B., A.J. Pal, D. Bhattacharyya and T.H. Kim, 2010. An efficient ga with multipoint guided mutation for graph coloring problems. Int. J. Signal Process. Image Process. Pattern Recognit., 3: 51-58.
    Direct Link  |  
  44. Mitra, K., D. Bhattacharyya and T.H. Kim, 2010. Urban computing and information management system using mobile phones in wireless sensor network. Int. J. Control Autom., 3: 17-26.
    Direct Link  |  
  45. Maitra, T., A.J. Pal, T.H. Kim and D. Bhattacharyya, 2010. Hybridization of genetic algorithm with bitstream neurons for graph coloring. Int. J. U. E. Serv. Sci. Technol., 3: 37-53.
    Direct Link  |  
  46. Maitra, T., A.J. Pal, D. Bhattacharyya and T.H. Kim, 2010. Noise Reduction in vlsi circuits using modified ga based graph coloring. Int. J. Control Autom., 3: 37-44.
    Direct Link  |  
  47. Ghosh, T.K., D. Bhattacharyya and T.H. Kim, 2010. To study yeast growth kinetics in a specially designed external loop airlift bioreactor. Int. J. Bio. Sci. Bio. Tech., 2: 47-58.
    Direct Link  |  
  48. Ghosh, T.K., D. Bhattacharyya and T.H. Kim, 2010. Gas hold-up characteristics of an external loop airlift contactor. Int. J. Hybrid Inf. Technol., 3: 25-32.
    Direct Link  |  
  49. Ghosh, T.K., D. Bhattacharyya and T.H. Kim, 2010. Effect of fractional gas hold-up (εg) on volumetric mass transfer co-efficient (kla) in modified airlift contactor. Int. J. Adv. Sci. Tech., 16: 21-30.
    Direct Link  |  
  50. Dash, U.K., D. Bhattacharyya and T.H. Kim, 2010. Advisory for securing different assets of an organization. Int. J. Smart Home, 4: 37-56.
    Direct Link  |  
  51. Biswas, S., T.H. Kim and D. Bhattacharyya, 2010. Features extraction and verification of signature image using clustering technique. Int. J. Smart Home, 4: 43-55.
  52. Bhattacharyya, D., T.H. Kim and S. Pal, 2010. A comparative study of wireless sensor networks and their routing protocols. Sensors, 10: 10506-10523.
    CrossRef  |  Direct Link  |  
  53. Bhattacharyya, D., S. Biswas and T.H. Kim, 2010. Emerging Approach of Natural Language Processing in Opinion Mining: A Review. Int. J. Multimedia Ubiquitous Eng., 5: 39-46.
    Direct Link  |  
  54. Bhattacharyya, D., P. Chakraborty, F. Alisherov and T.H. Kim, 2010. Quantum watermarking: a review. Int. J. Secur. Its Appl., 4: 46-54.
    Direct Link  |  
  55. Bhattacharyya, D and T.H.Kim, 2010. Design of artificial neural network for handwritten signature recognition. Int. J. Comput. Commun., 4: 59-66.
    Direct Link  |  
  56. Basu, J.K., D. Bhattacharyya and T.H. Kim, 2010. Use of artificial neural network in pattern recognition. Int. J. Software Eng. Applic., 4: 23-34.
    Direct Link  |  
  57. Barman, S., A.K. Samant, T.H. Kim and D. Bhattacharyya, 2010. Design of a view based approach for bengali character recognition. Int. J. Comput. Inf. Technol., 15: 49-62.
    Direct Link  |  
  58. Shrotri, A., S.C. Rethrekar, M.H. Patil, D. Bhattacharyya and T.H. Kim, 2009. Infrared imaging of hand vein patterns for biometric purposes. J. Secur. Eng., 6: 57-66.
    Direct Link  |  
  59. Mukhopadhyay, D.M., M.O. Balitanas, A.A. Farkhod, S.H. Jeon and D. Bhattacharyya, 2009. Genetic algorithm: A tutorial review. Int. J. Grid Distrib. Comput., 2: 25-32.
    Direct Link  |  
  60. Mitra, K., D. Bhattacharyya, F.Y. Sattarova and T.H. Kim, 2009. A heuristic approach for mobile phone bases information management system in wireless sensor network. Int. J. Grid Dist. Comp., 2: 1-12.
    Direct Link  |  
  61. Hazra, R., D. Bhattacharyya, S. Dey, F.Y. Sattarova, and T. Furkhat, 2009. Network issues in clock synchronization on distributed database. Int. J. Database Theory Appl., 2: 35-54.
    Direct Link  |  
  62. Feruza, Y.S. F.A. Tadjibayev and B. Debnath, 2009. Network productivity and quality indicators of broadband connection channels: a review. Int. J. Hybrid Inf. Technol., 2: 39-52.
    Direct Link  |  
  63. Dutta, P., D. Bhattacharyya and T.H. Kim, 2009. Data hiding in audio signal: A review. Int. J. Database Theory Appl., 2: 1-8.
    Direct Link  |  
  64. Dermoudy, J., B.H. Kang, D. Bhattacharyya, S.H. Jeon and A. Farkhod, 2009. Process of extracting uncover patterns from data: A review. Int. J. Database Theory Appl., 2: 17-34.
  65. Das, P., D. Bhattacharyya, S.K. Bandyopadhyay and T.H. Kim, 2009. Person identification through IRIS recognition. Int. J. Secur. Its App., 3: 129-148.
    Direct Link  |  
  66. Das, P., B. Debnath, K.B. Samir, K. Tai-hoon, 2009. Analysis and diagnosis of breast cancer. Int. J. U. E. Serv. Sci. Tech., 2: 1-10.
    Direct Link  |  
  67. Chakraborty, P., D. Bhattacharrya, S. Nargiza and S. Bedajna, 2009. Green computing: Practice of efficient and eco-friendly computing resources. Int. J. Grid Distrib. Comput., 2: 33-38.
    Direct Link  |  
  68. Chakraborty, A., D. Bhattacharyya and T.H. Kim, 2009. A secured and optimized lane design. J. Secur. Eng., 6: 205-212.
    Direct Link  |  
  69. Bhattacharyya, D., U.K. Dash and T.H. Kim, 2009. Infrastructure advisory for information security. J. Secur. Eng., 6: 67-92.
    Direct Link  |  
  70. Bhattacharyya, D., S.K. Bandyopadhyay, P. Shanta and D. Poulami, 2009. Information Hiding Using Enzyme Substrate Watermarking Technique. Int. J. Comput. Inf. Technol., 1: 11-22.
  71. Bhattacharyya, D., S. Singh, N. Satnalika, A. Khandelwal and S.H. Jeon, 2009. Nanotechnology, big things from a tiny world: a review. Int. J. u- and e- Serv. Sci. Tech., 2: 29-38.
    Direct Link  |  
  72. Bhattacharyya, D., R. Ranjan, F. Alisherov and M. Choi, 2009. Biometric authentication: A review. Int. J. U E Serv. Sci. Technol., 2: 13-28.
    Direct Link  |  
  73. Bhattacharyya, D., P. Dutta and T.H. Kim, 2009. Secure data transfer through audio signal. J. Secur. Eng., 6: 187-194.
    Direct Link  |  
  74. Bhattacharyya, D., P. Das, T.H. Kim and S.K. Bandyopadhyay, 2009. Vascular pattern analysis towards pervasive palm vein authentication. J. Uni. Compu. Sci., 15: 1081-1089.
    Direct Link  |  
  75. Bhattacharyya, D., P. Das, S.K. Bandyopadhyay and T.H. Kim, 2009. Text steganography: a novel approach. Int. J. Comput. Inf. Technol., 3: 79-86.
    Direct Link  |  
  76. Bhattacharyya, D., K. Mitra, M. Choi, R.J. Robles and D. Ganguly, 2009. An approach of XML-ifying the crude corpus in the field of opinion mining. Int. J. Grid Distributed Comput., 2: 13-24.
  77. Bhattacharyya, D., D. Chakraborty, P. Das, S. Kumar and T.H. Kim, 2009. Mobile queries in gis. Int. J. U. E. Serv. Sci. Tech., 2: 1-10.
    Direct Link  |  
  78. Bhattacharyya, D., A. Roy, P. Roy and T.H. Kim, 2009. Receiver compatible data hiding in color image. Int. J. Adv. Sci. Tech., 6: 15-24.
    Direct Link  |  
  79. Bhattacharyya, D. D. Jhuma, D. Poulami, K.B. Samir, K. Tai-hoon, 2009. Authentication and secret essage transmission technique using discrete fourier transformation. In. J. Commun. Network Syst. Sci., 2: 363-370.
    CrossRef  |  Direct Link  |  
  80. Bhattacharyya, D and F.A. Alisherov, 2009. Penetration testing for hire. Int. J. Adv. Sci. Tech., 8: 1-8.
    Direct Link  |  
  81. Bhattacharyya, D., S.K. Bandyopadhyay, P. Das, D. Ganguly and S. Mukherjee, 2008. Statistical approach for offline handwritten signature verification. J. Comput. Sci., 4: 181-185.
    CrossRef  |  Direct Link  |  
  82. Bhattacharyya, D., P. Das, S.K. Bandyopadhyay and T.H. Kim, 2008. IRIS texture analysis and feature extraction for biometric pattern recognition. Int. J.Database Theory Appl., 1: 53-60.
    Direct Link  |  
  83. Bhattacharyya, D., P. Das, D. Ganguly, S. Mukherjee, S.K. Bandyopadhyay and T.H. Kim, 2008. A secured delivery scheme for images. Int. J. Control Autom., 1: 35-42.
  84. Bhattacharyya, D., P. Das, D. Ganguly, K. Mitra, P. Das, S.K. Bandyopadhyay and T.H. Kim, 2008. Unstructured documents categorization: A study. Int. J. Signal Process. Image Process. Pattern Recognition, 1: 55-62.
    Direct Link  |  
  85. Bhattacharyya, D., P. Das, D. Ganguly, K. Mitra, P. Das, S.K. Bandyopadhyay and T.H. Kim, 2008. Unstructured document categorization: a study. Int. J. Signal Processing, Image Processing Pattern Recognit., 1: 51-56.
    Direct Link  |  
  86. Bhattacharyya, D., 2008. The taxonomy of advanced SCADA communication protocols. J. Secur. Eng., 5: 517-526.
    Direct Link  |  
  87. Bhattacharyya, D., 2008. Advanced defensive measures to security vulnerabilities of vpn using ipsec. J. Secur. Eng., 5: 187-194.
    Direct Link  |  
  88. Bandyopadhyay, S.K., P. Das and D. Bhattacharyya, 2008. Statistical analysis towards image recognition. Int. J. Multimedia and Ubiquitous Eng., 3: 43-54.
    Direct Link  |  
  89. Bhattacharyya, D., S.K. Bandyopadhyay and P. Das, 2007. Handwritten signature watermarking and extraction technique inspired by principle of segregation. Handwritten signature watermarking and extraction technique inspired by principle of segregation. 1: 35-44.
    Direct Link  |  
  90. Bandyopadhyay, S.K., D. Bhattacharyya and P. Das, 2006. Mosquito attack optimization. Ubiquity, 10.1145/1162511.1162512.
    CrossRef  |  Direct Link  |  
  91. Bandyopadhyay, S.K., D. Bhattacharyya and A.J. Pal, 2006. Secure delivery of handwritten signature. Ubiquity, 10.1145/1183086.1183087.
    CrossRef  |  Direct Link  |