Binod Pattanayak - Academia.edu (original) (raw)

Papers by Binod Pattanayak

Research paper thumbnail of Smart livestock management: integrating IoT for cattle health diagnosis and disease prediction through machine learning

Indonesian journal of electrical engineering and computer science, May 1, 2024

Cattle diseases can significantly impact on livestock health and agricultural productivity is sub... more Cattle diseases can significantly impact on livestock health and agricultural productivity is substantial. Timely detection and prognosis of these diseases are essential for prompt interventions and preventing their spread within the herd. This study delved into employing machine learning models to anticipate cattle diseases based on relevant parameters. These parameters encompass milk fever, milk clots, milk watery, milk flake, blisters, lameness, stomach pain, gaseous stomach, dehydration, diarrhea, vomiting, abdominal issues, and alkalosis. A dataset of 2,000 samples from diverse cattle populations was amassed, each tagged with the presence or absence of specific diseases. The primary goal was to compare the efficacy of five wellknown machine learning models: Naïve Bayes multinomial (NBM), lazy-IBk, partial tree (PART), random forest (RF), and support vector machine (SVM). The findings underscored the consistent superiority of RF in comparison to the other models, boasting the highest accuracy in predicting cattle diseases. The RF model exhibited an accuracy rate of 88% on the test dataset. This achievement can be ascribed to its capacity to handle intricate interactions among input features and mitigate over fitting through ensemble learning. These insights can furnish valuable information about early indicators and risk factors associated with diverse cattle diseases.

Research paper thumbnail of Relevance of Soft Computing Techniques in the Significant Management of Wireless Sensor Networks

Research paper thumbnail of Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network

International Journal of Computer Networks & Communications, Jan 30, 2023

The quality of service (QoS) component in a mobile ad-hoc network has an active role in the curre... more The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and authentic data transfer. During real-time data transfer, to make communication effective, we make use of bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance networks. In our proposed model we are concentrating on the maximum utilization of resources, and using the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources. Our simulation result also shows that our model improves the network performance.

Research paper thumbnail of Performance Analysis of Shortest Time Regional Head Path Protocol (STRHP) in WSN

Far East Journal of Electronics and Communications, Dec 26, 2017

Research paper thumbnail of Markovian model analysis for energy harvesting nodes in a modified opportunistic routing protocol

International Journal of Electronics, May 18, 2020

Opportunistic routing protocol with cross-layer design mainly focuses on energy-harvesting princi... more Opportunistic routing protocol with cross-layer design mainly focuses on energy-harvesting principles and is named as modified energy-harvesting opportunistic routing protocol (MEHOR). In the cross-layer design, we follow the Markovian model where the parameters are exchanged between the different layers in order to optimise the usage of energy. MEHOR focuses on energy constraints at a sensor node because it requires recharge, once its energy level gets depleted. Basically, we put emphasis on regioning in order to overcome the multi-path routing problems, especially the energy availability. We minimise retransmission rate (12%), cost optimisation and reduce collision (8%) considering data packets received in a linear multi-hop energy-harvesting wireless sensor network (EH-WSN). Finally, we compare MEHOR with other advanced routing protocols like opportunistic routing (OR) and energy-harvesting opportunistic routing (EHOR).

Research paper thumbnail of A multi-agent-based framework for cloud service discovery and selection using ontology

Service-oriented computing and applications, Dec 27, 2017

As cloud computing is getting matured day by day, there has been overwhelming interest among the ... more As cloud computing is getting matured day by day, there has been overwhelming interest among the users to avail a plethora of cloud services. Often, these services appear identical in terms of their functionality though they differ in pricing models, computational power, storage policies and Quality-of-Service parameters making the process of service discovery and selection an intricate task. In the absence of any standard specifications, cloud service providers continue to use their own vocabulary and this further complicates the selection process. Even popular search engines like Google and MSN are not efficient enough to properly identify the most appropriate cloud service that can meet customer requirements. Thus, in the presence of multiple selection parameters and constraints, selecting a required cloud service is a daunting task. In order to address this issue, we work toward developing a reasoning mechanism to optimally resolve the similarities across cloud services by using cloud ontology. A multi-agent-based framework has been proposed for effective cloud service discovery and selection with the help of a standardized service registry and by employing semantically guided searching process.

Research paper thumbnail of An End-to-End AES Based Cryptographic Authentication Mechanism for Communication on Internet of Things (IoT) Using MQTT

NVEO - NATURAL VOLATILES & ESSENTIAL OILS Journal | NVEO, Nov 7, 2021

Research paper thumbnail of Study of challenges and survey on protocols based on multiple issues in mobile adhoc network

Research paper thumbnail of Multi-Hop Bandwidth Management Protocol for Mobile Ad Hoc Networks

Zenodo (CERN European Organization for Nuclear Research), Sep 14, 2018

An admission control scheme should play the role of a coordinator for flows in a data communicati... more An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.

Research paper thumbnail of IoT-Based Voice-Controlled Energy-Efficient Intelligent Traffic and Street Light Monitoring System

Lecture notes in networks and systems, Dec 1, 2020

Research paper thumbnail of Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET

International Journal of Information Security and Privacy, 2019

Nanotechnologiesguaranteenewpotentialoutcomesformaintainingaccessibilityissuesinversatile robotsi... more Nanotechnologiesguaranteenewpotentialoutcomesformaintainingaccessibilityissuesinversatile robotsinanautomatedbasedMobileAdhocNetworks(MANETs).Inmulti-robotframeworks,with adevastationsituation,militaryapplications,huntandsaveoperationsandnormalhardships,this issueismuchmorebasic.AuspiciouscorrespondenceandsendingcontrolmessagesinaMANET whichisreasonablefortheseintensecircumstancesstartswithonerobotthenontothenextisacritical factorineveryoneoftheseoperations.ThismakesitisasecurityissueinMANETsbecauseofthe auto-reconfigurationnatureofthesystemwhichdoesnotdependonanysettledinfrastructure-based foundation.Thereisdynamicchangeinitstopologybecauseofrapidlymovingversatilenodes.This articlefeaturesfewsecurityissuesemergingbecauseofnetworkmatteramongrobotsandproposesa livelyMANET-basedautomatedconventioncalledPD-ROBOwithacommittedIntrusionDetection System(IDS)structurethatutilizationsportableoperatormethodtostayawayfromreplayassault inmechanicalbasedMANET.

Research paper thumbnail of An effective mechanism for ontology-based cloud service discovery and selection using Aneka cloud application platform

International journal of cloud computing, 2023

Research paper thumbnail of Big Medical Image Analysis: Alzheimer’s Disease Classification Using Convolutional Autoencoder

Computación Y Sistemas, Dec 25, 2022

Research paper thumbnail of Software Quality Prediction Using Fuzzy Logic Technique

International Journal of Information Systems in The Service Sector, Apr 1, 2019

Research paper thumbnail of Adaptive Dimensional Search Based Orthogonal Experimentation SSA (ADOX-SSA) for training RBF Neural Network and optimal Feature Selection

Salp Swarm Algorithm (SSA) is a new stochastic approach for solving optimization issues based on ... more Salp Swarm Algorithm (SSA) is a new stochastic approach for solving optimization issues based on the ideas of swarm intelligence. The ease of implementation and lower number of parameters to fine-tune are responsible for SSA's success and universal acceptance among researchers. The typical SSA method suffers from local optima entrapment and a poor convergence rate while dealing with more complex situations because of a lack of population density and inadequate local exploitation. To overcome such challenges, this study suggests a hybrid kind of SSA called Adaptive-Dimensional-Search based Orthogonal Experimentation SSA (ADOX-SSA). Furthermore, the inclusion of an ADOX operator increases population diversity, intensifies local exploitation, and strengthens the SSA standards. Consequently, the balance between the processes of exploration and exploitation is attuned, resulting in a faster rate of convergence than the normal SSA. To validate the ADOX-SSA technique's competency, ...

Research paper thumbnail of An Improved Pathfinder Algorithm (ASDR-PFA) based on Adaptation of Search Dimensional Ratio for solving constrained optimization problems and optimal Feature Selection

The pathfinder algorithm (PFA) is a recently introduced meta-heuristic approach that is mathemati... more The pathfinder algorithm (PFA) is a recently introduced meta-heuristic approach that is mathematically modelled by the cooperative behaviour of animal groups during a search for the best food zone. The PFA procedure comprises two phases: the pathfinder phase and the follower phase. In the former phase, the pathfinder explores new regions in the search space with its versatile explorative power. And during the later phase, followers change position following the leader and their perception, as a result, it makes it easy for the algorithm to fall in local optima leading to slow convergence. To alleviate such issues, this article introduces an improved approach to PFA named ASDR-PFA with the incorporation of a parameter termed search dimensional ratio (SDR) to generate new candidate solutions using the previous best one. The power of ASDR-PFA lies in its technique of updating the SDR parameter dynamically that attunes the balance between exploration and mining ability leading to a fast...

Research paper thumbnail of Cross layer based QoS platform for multimedia transmission in MANET

2017 11th International Conference on Intelligent Systems and Control (ISCO), 2017

Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are... more Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are self-governing with self-configurable potential due to high occurrence of topology alteration and changeable rescheduling of the network mechanism during data communication. Due to simplicity of set up, the energetic networking system in MANET is very victorious in conditions where it is complicated to create communications system and infrastructure based network. Numerous routing protocols for MANETs accompanying real time applications have been developed, basic intention being optimal consumption of resource in resource limited situation, least power utilization using limited battery power of the highly short-lived mobile nodes and victorious real time data broadcast within their deadline. This paper presents an efficient Quality of Service architecture using inter layer communication with a highly efficient real time scheduler design at the network layer with improved RMA (Rate Monotonic Algorithm) and EDF(Earliest Deadline First) scheduling that efficiently schedules multiple real time applications without missing any of their deadline. Simulation results in NetSim ver 8 ensures healthier network performance in terms of better jitter, packet delivery ratio and network lifetime when compared with other similar Cross layer based approaches for video file transmission.

Research paper thumbnail of System identification using neuro fuzzy approach for IoT application

Research paper thumbnail of Use of multilayer recursive model for non-linear dynamic system identification

Journal of Statistics and Management Systems

Research paper thumbnail of Network Lifetime Enhancement by Elimination of Spatially and Temporally Correlated RFID Surveillance Data in WSNs

Wireless Communications and Mobile Computing

In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role... more In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data. It increases system overhead and decreases overall network lifetime. Existing solutions like Time-Distance Bloom Filter (TDBF) algorithm are inapplicable to the large-scale environment. Received Signal Strength (RSS) used in this algorithm is highly dependent on quality of tag and application environment. In this paper, we propose an approach for data redundancy minimization for RFID surveillance data which is a modified version of TDBF. The proposed algorithm is formulated by using the observed time and calculated distance of RFID tags. To overcome these problems, we design our approach to relevantly reduce the spatiotemporal data redundancy in the source level by adding the Receiv...

Research paper thumbnail of Smart livestock management: integrating IoT for cattle health diagnosis and disease prediction through machine learning

Indonesian journal of electrical engineering and computer science, May 1, 2024

Cattle diseases can significantly impact on livestock health and agricultural productivity is sub... more Cattle diseases can significantly impact on livestock health and agricultural productivity is substantial. Timely detection and prognosis of these diseases are essential for prompt interventions and preventing their spread within the herd. This study delved into employing machine learning models to anticipate cattle diseases based on relevant parameters. These parameters encompass milk fever, milk clots, milk watery, milk flake, blisters, lameness, stomach pain, gaseous stomach, dehydration, diarrhea, vomiting, abdominal issues, and alkalosis. A dataset of 2,000 samples from diverse cattle populations was amassed, each tagged with the presence or absence of specific diseases. The primary goal was to compare the efficacy of five wellknown machine learning models: Naïve Bayes multinomial (NBM), lazy-IBk, partial tree (PART), random forest (RF), and support vector machine (SVM). The findings underscored the consistent superiority of RF in comparison to the other models, boasting the highest accuracy in predicting cattle diseases. The RF model exhibited an accuracy rate of 88% on the test dataset. This achievement can be ascribed to its capacity to handle intricate interactions among input features and mitigate over fitting through ensemble learning. These insights can furnish valuable information about early indicators and risk factors associated with diverse cattle diseases.

Research paper thumbnail of Relevance of Soft Computing Techniques in the Significant Management of Wireless Sensor Networks

Research paper thumbnail of Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network

International Journal of Computer Networks & Communications, Jan 30, 2023

The quality of service (QoS) component in a mobile ad-hoc network has an active role in the curre... more The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and authentic data transfer. During real-time data transfer, to make communication effective, we make use of bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance networks. In our proposed model we are concentrating on the maximum utilization of resources, and using the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources. Our simulation result also shows that our model improves the network performance.

Research paper thumbnail of Performance Analysis of Shortest Time Regional Head Path Protocol (STRHP) in WSN

Far East Journal of Electronics and Communications, Dec 26, 2017

Research paper thumbnail of Markovian model analysis for energy harvesting nodes in a modified opportunistic routing protocol

International Journal of Electronics, May 18, 2020

Opportunistic routing protocol with cross-layer design mainly focuses on energy-harvesting princi... more Opportunistic routing protocol with cross-layer design mainly focuses on energy-harvesting principles and is named as modified energy-harvesting opportunistic routing protocol (MEHOR). In the cross-layer design, we follow the Markovian model where the parameters are exchanged between the different layers in order to optimise the usage of energy. MEHOR focuses on energy constraints at a sensor node because it requires recharge, once its energy level gets depleted. Basically, we put emphasis on regioning in order to overcome the multi-path routing problems, especially the energy availability. We minimise retransmission rate (12%), cost optimisation and reduce collision (8%) considering data packets received in a linear multi-hop energy-harvesting wireless sensor network (EH-WSN). Finally, we compare MEHOR with other advanced routing protocols like opportunistic routing (OR) and energy-harvesting opportunistic routing (EHOR).

Research paper thumbnail of A multi-agent-based framework for cloud service discovery and selection using ontology

Service-oriented computing and applications, Dec 27, 2017

As cloud computing is getting matured day by day, there has been overwhelming interest among the ... more As cloud computing is getting matured day by day, there has been overwhelming interest among the users to avail a plethora of cloud services. Often, these services appear identical in terms of their functionality though they differ in pricing models, computational power, storage policies and Quality-of-Service parameters making the process of service discovery and selection an intricate task. In the absence of any standard specifications, cloud service providers continue to use their own vocabulary and this further complicates the selection process. Even popular search engines like Google and MSN are not efficient enough to properly identify the most appropriate cloud service that can meet customer requirements. Thus, in the presence of multiple selection parameters and constraints, selecting a required cloud service is a daunting task. In order to address this issue, we work toward developing a reasoning mechanism to optimally resolve the similarities across cloud services by using cloud ontology. A multi-agent-based framework has been proposed for effective cloud service discovery and selection with the help of a standardized service registry and by employing semantically guided searching process.

Research paper thumbnail of An End-to-End AES Based Cryptographic Authentication Mechanism for Communication on Internet of Things (IoT) Using MQTT

NVEO - NATURAL VOLATILES & ESSENTIAL OILS Journal | NVEO, Nov 7, 2021

Research paper thumbnail of Study of challenges and survey on protocols based on multiple issues in mobile adhoc network

Research paper thumbnail of Multi-Hop Bandwidth Management Protocol for Mobile Ad Hoc Networks

Zenodo (CERN European Organization for Nuclear Research), Sep 14, 2018

An admission control scheme should play the role of a coordinator for flows in a data communicati... more An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.

Research paper thumbnail of IoT-Based Voice-Controlled Energy-Efficient Intelligent Traffic and Street Light Monitoring System

Lecture notes in networks and systems, Dec 1, 2020

Research paper thumbnail of Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET

International Journal of Information Security and Privacy, 2019

Nanotechnologiesguaranteenewpotentialoutcomesformaintainingaccessibilityissuesinversatile robotsi... more Nanotechnologiesguaranteenewpotentialoutcomesformaintainingaccessibilityissuesinversatile robotsinanautomatedbasedMobileAdhocNetworks(MANETs).Inmulti-robotframeworks,with adevastationsituation,militaryapplications,huntandsaveoperationsandnormalhardships,this issueismuchmorebasic.AuspiciouscorrespondenceandsendingcontrolmessagesinaMANET whichisreasonablefortheseintensecircumstancesstartswithonerobotthenontothenextisacritical factorineveryoneoftheseoperations.ThismakesitisasecurityissueinMANETsbecauseofthe auto-reconfigurationnatureofthesystemwhichdoesnotdependonanysettledinfrastructure-based foundation.Thereisdynamicchangeinitstopologybecauseofrapidlymovingversatilenodes.This articlefeaturesfewsecurityissuesemergingbecauseofnetworkmatteramongrobotsandproposesa livelyMANET-basedautomatedconventioncalledPD-ROBOwithacommittedIntrusionDetection System(IDS)structurethatutilizationsportableoperatormethodtostayawayfromreplayassault inmechanicalbasedMANET.

Research paper thumbnail of An effective mechanism for ontology-based cloud service discovery and selection using Aneka cloud application platform

International journal of cloud computing, 2023

Research paper thumbnail of Big Medical Image Analysis: Alzheimer’s Disease Classification Using Convolutional Autoencoder

Computación Y Sistemas, Dec 25, 2022

Research paper thumbnail of Software Quality Prediction Using Fuzzy Logic Technique

International Journal of Information Systems in The Service Sector, Apr 1, 2019

Research paper thumbnail of Adaptive Dimensional Search Based Orthogonal Experimentation SSA (ADOX-SSA) for training RBF Neural Network and optimal Feature Selection

Salp Swarm Algorithm (SSA) is a new stochastic approach for solving optimization issues based on ... more Salp Swarm Algorithm (SSA) is a new stochastic approach for solving optimization issues based on the ideas of swarm intelligence. The ease of implementation and lower number of parameters to fine-tune are responsible for SSA's success and universal acceptance among researchers. The typical SSA method suffers from local optima entrapment and a poor convergence rate while dealing with more complex situations because of a lack of population density and inadequate local exploitation. To overcome such challenges, this study suggests a hybrid kind of SSA called Adaptive-Dimensional-Search based Orthogonal Experimentation SSA (ADOX-SSA). Furthermore, the inclusion of an ADOX operator increases population diversity, intensifies local exploitation, and strengthens the SSA standards. Consequently, the balance between the processes of exploration and exploitation is attuned, resulting in a faster rate of convergence than the normal SSA. To validate the ADOX-SSA technique's competency, ...

Research paper thumbnail of An Improved Pathfinder Algorithm (ASDR-PFA) based on Adaptation of Search Dimensional Ratio for solving constrained optimization problems and optimal Feature Selection

The pathfinder algorithm (PFA) is a recently introduced meta-heuristic approach that is mathemati... more The pathfinder algorithm (PFA) is a recently introduced meta-heuristic approach that is mathematically modelled by the cooperative behaviour of animal groups during a search for the best food zone. The PFA procedure comprises two phases: the pathfinder phase and the follower phase. In the former phase, the pathfinder explores new regions in the search space with its versatile explorative power. And during the later phase, followers change position following the leader and their perception, as a result, it makes it easy for the algorithm to fall in local optima leading to slow convergence. To alleviate such issues, this article introduces an improved approach to PFA named ASDR-PFA with the incorporation of a parameter termed search dimensional ratio (SDR) to generate new candidate solutions using the previous best one. The power of ASDR-PFA lies in its technique of updating the SDR parameter dynamically that attunes the balance between exploration and mining ability leading to a fast...

Research paper thumbnail of Cross layer based QoS platform for multimedia transmission in MANET

2017 11th International Conference on Intelligent Systems and Control (ISCO), 2017

Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are... more Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are self-governing with self-configurable potential due to high occurrence of topology alteration and changeable rescheduling of the network mechanism during data communication. Due to simplicity of set up, the energetic networking system in MANET is very victorious in conditions where it is complicated to create communications system and infrastructure based network. Numerous routing protocols for MANETs accompanying real time applications have been developed, basic intention being optimal consumption of resource in resource limited situation, least power utilization using limited battery power of the highly short-lived mobile nodes and victorious real time data broadcast within their deadline. This paper presents an efficient Quality of Service architecture using inter layer communication with a highly efficient real time scheduler design at the network layer with improved RMA (Rate Monotonic Algorithm) and EDF(Earliest Deadline First) scheduling that efficiently schedules multiple real time applications without missing any of their deadline. Simulation results in NetSim ver 8 ensures healthier network performance in terms of better jitter, packet delivery ratio and network lifetime when compared with other similar Cross layer based approaches for video file transmission.

Research paper thumbnail of System identification using neuro fuzzy approach for IoT application

Research paper thumbnail of Use of multilayer recursive model for non-linear dynamic system identification

Journal of Statistics and Management Systems

Research paper thumbnail of Network Lifetime Enhancement by Elimination of Spatially and Temporally Correlated RFID Surveillance Data in WSNs

Wireless Communications and Mobile Computing

In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role... more In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data. It increases system overhead and decreases overall network lifetime. Existing solutions like Time-Distance Bloom Filter (TDBF) algorithm are inapplicable to the large-scale environment. Received Signal Strength (RSS) used in this algorithm is highly dependent on quality of tag and application environment. In this paper, we propose an approach for data redundancy minimization for RFID surveillance data which is a modified version of TDBF. The proposed algorithm is formulated by using the observed time and calculated distance of RFID tags. To overcome these problems, we design our approach to relevantly reduce the spatiotemporal data redundancy in the source level by adding the Receiv...