Binod Pattanayak - Academia.edu (original) (raw)
Papers by Binod Pattanayak
Indonesian journal of electrical engineering and computer science, May 1, 2024
Cattle diseases can significantly impact on livestock health and agricultural productivity is sub... more Cattle diseases can significantly impact on livestock health and agricultural productivity is substantial. Timely detection and prognosis of these diseases are essential for prompt interventions and preventing their spread within the herd. This study delved into employing machine learning models to anticipate cattle diseases based on relevant parameters. These parameters encompass milk fever, milk clots, milk watery, milk flake, blisters, lameness, stomach pain, gaseous stomach, dehydration, diarrhea, vomiting, abdominal issues, and alkalosis. A dataset of 2,000 samples from diverse cattle populations was amassed, each tagged with the presence or absence of specific diseases. The primary goal was to compare the efficacy of five wellknown machine learning models: Naïve Bayes multinomial (NBM), lazy-IBk, partial tree (PART), random forest (RF), and support vector machine (SVM). The findings underscored the consistent superiority of RF in comparison to the other models, boasting the highest accuracy in predicting cattle diseases. The RF model exhibited an accuracy rate of 88% on the test dataset. This achievement can be ascribed to its capacity to handle intricate interactions among input features and mitigate over fitting through ensemble learning. These insights can furnish valuable information about early indicators and risk factors associated with diverse cattle diseases.
International Journal of Computer Networks & Communications, Jan 30, 2023
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the curre... more The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and authentic data transfer. During real-time data transfer, to make communication effective, we make use of bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance networks. In our proposed model we are concentrating on the maximum utilization of resources, and using the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources. Our simulation result also shows that our model improves the network performance.
Far East Journal of Electronics and Communications, Dec 26, 2017
International Journal of Electronics, May 18, 2020
Opportunistic routing protocol with cross-layer design mainly focuses on energy-harvesting princi... more Opportunistic routing protocol with cross-layer design mainly focuses on energy-harvesting principles and is named as modified energy-harvesting opportunistic routing protocol (MEHOR). In the cross-layer design, we follow the Markovian model where the parameters are exchanged between the different layers in order to optimise the usage of energy. MEHOR focuses on energy constraints at a sensor node because it requires recharge, once its energy level gets depleted. Basically, we put emphasis on regioning in order to overcome the multi-path routing problems, especially the energy availability. We minimise retransmission rate (12%), cost optimisation and reduce collision (8%) considering data packets received in a linear multi-hop energy-harvesting wireless sensor network (EH-WSN). Finally, we compare MEHOR with other advanced routing protocols like opportunistic routing (OR) and energy-harvesting opportunistic routing (EHOR).
Service-oriented computing and applications, Dec 27, 2017
As cloud computing is getting matured day by day, there has been overwhelming interest among the ... more As cloud computing is getting matured day by day, there has been overwhelming interest among the users to avail a plethora of cloud services. Often, these services appear identical in terms of their functionality though they differ in pricing models, computational power, storage policies and Quality-of-Service parameters making the process of service discovery and selection an intricate task. In the absence of any standard specifications, cloud service providers continue to use their own vocabulary and this further complicates the selection process. Even popular search engines like Google and MSN are not efficient enough to properly identify the most appropriate cloud service that can meet customer requirements. Thus, in the presence of multiple selection parameters and constraints, selecting a required cloud service is a daunting task. In order to address this issue, we work toward developing a reasoning mechanism to optimally resolve the similarities across cloud services by using cloud ontology. A multi-agent-based framework has been proposed for effective cloud service discovery and selection with the help of a standardized service registry and by employing semantically guided searching process.
NVEO - NATURAL VOLATILES & ESSENTIAL OILS Journal | NVEO, Nov 7, 2021
Zenodo (CERN European Organization for Nuclear Research), Sep 14, 2018
An admission control scheme should play the role of a coordinator for flows in a data communicati... more An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.
Lecture notes in networks and systems, Dec 1, 2020
International Journal of Information Security and Privacy, 2019
Nanotechnologiesguaranteenewpotentialoutcomesformaintainingaccessibilityissuesinversatile robotsi... more Nanotechnologiesguaranteenewpotentialoutcomesformaintainingaccessibilityissuesinversatile robotsinanautomatedbasedMobileAdhocNetworks(MANETs).Inmulti-robotframeworks,with adevastationsituation,militaryapplications,huntandsaveoperationsandnormalhardships,this issueismuchmorebasic.AuspiciouscorrespondenceandsendingcontrolmessagesinaMANET whichisreasonablefortheseintensecircumstancesstartswithonerobotthenontothenextisacritical factorineveryoneoftheseoperations.ThismakesitisasecurityissueinMANETsbecauseofthe auto-reconfigurationnatureofthesystemwhichdoesnotdependonanysettledinfrastructure-based foundation.Thereisdynamicchangeinitstopologybecauseofrapidlymovingversatilenodes.This articlefeaturesfewsecurityissuesemergingbecauseofnetworkmatteramongrobotsandproposesa livelyMANET-basedautomatedconventioncalledPD-ROBOwithacommittedIntrusionDetection System(IDS)structurethatutilizationsportableoperatormethodtostayawayfromreplayassault inmechanicalbasedMANET.
International journal of cloud computing, 2023
Computación Y Sistemas, Dec 25, 2022
International Journal of Information Systems in The Service Sector, Apr 1, 2019
Salp Swarm Algorithm (SSA) is a new stochastic approach for solving optimization issues based on ... more Salp Swarm Algorithm (SSA) is a new stochastic approach for solving optimization issues based on the ideas of swarm intelligence. The ease of implementation and lower number of parameters to fine-tune are responsible for SSA's success and universal acceptance among researchers. The typical SSA method suffers from local optima entrapment and a poor convergence rate while dealing with more complex situations because of a lack of population density and inadequate local exploitation. To overcome such challenges, this study suggests a hybrid kind of SSA called Adaptive-Dimensional-Search based Orthogonal Experimentation SSA (ADOX-SSA). Furthermore, the inclusion of an ADOX operator increases population diversity, intensifies local exploitation, and strengthens the SSA standards. Consequently, the balance between the processes of exploration and exploitation is attuned, resulting in a faster rate of convergence than the normal SSA. To validate the ADOX-SSA technique's competency, ...
The pathfinder algorithm (PFA) is a recently introduced meta-heuristic approach that is mathemati... more The pathfinder algorithm (PFA) is a recently introduced meta-heuristic approach that is mathematically modelled by the cooperative behaviour of animal groups during a search for the best food zone. The PFA procedure comprises two phases: the pathfinder phase and the follower phase. In the former phase, the pathfinder explores new regions in the search space with its versatile explorative power. And during the later phase, followers change position following the leader and their perception, as a result, it makes it easy for the algorithm to fall in local optima leading to slow convergence. To alleviate such issues, this article introduces an improved approach to PFA named ASDR-PFA with the incorporation of a parameter termed search dimensional ratio (SDR) to generate new candidate solutions using the previous best one. The power of ASDR-PFA lies in its technique of updating the SDR parameter dynamically that attunes the balance between exploration and mining ability leading to a fast...
2017 11th International Conference on Intelligent Systems and Control (ISCO), 2017
Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are... more Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are self-governing with self-configurable potential due to high occurrence of topology alteration and changeable rescheduling of the network mechanism during data communication. Due to simplicity of set up, the energetic networking system in MANET is very victorious in conditions where it is complicated to create communications system and infrastructure based network. Numerous routing protocols for MANETs accompanying real time applications have been developed, basic intention being optimal consumption of resource in resource limited situation, least power utilization using limited battery power of the highly short-lived mobile nodes and victorious real time data broadcast within their deadline. This paper presents an efficient Quality of Service architecture using inter layer communication with a highly efficient real time scheduler design at the network layer with improved RMA (Rate Monotonic Algorithm) and EDF(Earliest Deadline First) scheduling that efficiently schedules multiple real time applications without missing any of their deadline. Simulation results in NetSim ver 8 ensures healthier network performance in terms of better jitter, packet delivery ratio and network lifetime when compared with other similar Cross layer based approaches for video file transmission.
Journal of Statistics and Management Systems
Wireless Communications and Mobile Computing
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role... more In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data. It increases system overhead and decreases overall network lifetime. Existing solutions like Time-Distance Bloom Filter (TDBF) algorithm are inapplicable to the large-scale environment. Received Signal Strength (RSS) used in this algorithm is highly dependent on quality of tag and application environment. In this paper, we propose an approach for data redundancy minimization for RFID surveillance data which is a modified version of TDBF. The proposed algorithm is formulated by using the observed time and calculated distance of RFID tags. To overcome these problems, we design our approach to relevantly reduce the spatiotemporal data redundancy in the source level by adding the Receiv...
Indonesian journal of electrical engineering and computer science, May 1, 2024
Cattle diseases can significantly impact on livestock health and agricultural productivity is sub... more Cattle diseases can significantly impact on livestock health and agricultural productivity is substantial. Timely detection and prognosis of these diseases are essential for prompt interventions and preventing their spread within the herd. This study delved into employing machine learning models to anticipate cattle diseases based on relevant parameters. These parameters encompass milk fever, milk clots, milk watery, milk flake, blisters, lameness, stomach pain, gaseous stomach, dehydration, diarrhea, vomiting, abdominal issues, and alkalosis. A dataset of 2,000 samples from diverse cattle populations was amassed, each tagged with the presence or absence of specific diseases. The primary goal was to compare the efficacy of five wellknown machine learning models: Naïve Bayes multinomial (NBM), lazy-IBk, partial tree (PART), random forest (RF), and support vector machine (SVM). The findings underscored the consistent superiority of RF in comparison to the other models, boasting the highest accuracy in predicting cattle diseases. The RF model exhibited an accuracy rate of 88% on the test dataset. This achievement can be ascribed to its capacity to handle intricate interactions among input features and mitigate over fitting through ensemble learning. These insights can furnish valuable information about early indicators and risk factors associated with diverse cattle diseases.
International Journal of Computer Networks & Communications, Jan 30, 2023
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the curre... more The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and authentic data transfer. During real-time data transfer, to make communication effective, we make use of bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance networks. In our proposed model we are concentrating on the maximum utilization of resources, and using the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources. Our simulation result also shows that our model improves the network performance.
Far East Journal of Electronics and Communications, Dec 26, 2017
International Journal of Electronics, May 18, 2020
Opportunistic routing protocol with cross-layer design mainly focuses on energy-harvesting princi... more Opportunistic routing protocol with cross-layer design mainly focuses on energy-harvesting principles and is named as modified energy-harvesting opportunistic routing protocol (MEHOR). In the cross-layer design, we follow the Markovian model where the parameters are exchanged between the different layers in order to optimise the usage of energy. MEHOR focuses on energy constraints at a sensor node because it requires recharge, once its energy level gets depleted. Basically, we put emphasis on regioning in order to overcome the multi-path routing problems, especially the energy availability. We minimise retransmission rate (12%), cost optimisation and reduce collision (8%) considering data packets received in a linear multi-hop energy-harvesting wireless sensor network (EH-WSN). Finally, we compare MEHOR with other advanced routing protocols like opportunistic routing (OR) and energy-harvesting opportunistic routing (EHOR).
Service-oriented computing and applications, Dec 27, 2017
As cloud computing is getting matured day by day, there has been overwhelming interest among the ... more As cloud computing is getting matured day by day, there has been overwhelming interest among the users to avail a plethora of cloud services. Often, these services appear identical in terms of their functionality though they differ in pricing models, computational power, storage policies and Quality-of-Service parameters making the process of service discovery and selection an intricate task. In the absence of any standard specifications, cloud service providers continue to use their own vocabulary and this further complicates the selection process. Even popular search engines like Google and MSN are not efficient enough to properly identify the most appropriate cloud service that can meet customer requirements. Thus, in the presence of multiple selection parameters and constraints, selecting a required cloud service is a daunting task. In order to address this issue, we work toward developing a reasoning mechanism to optimally resolve the similarities across cloud services by using cloud ontology. A multi-agent-based framework has been proposed for effective cloud service discovery and selection with the help of a standardized service registry and by employing semantically guided searching process.
NVEO - NATURAL VOLATILES & ESSENTIAL OILS Journal | NVEO, Nov 7, 2021
Zenodo (CERN European Organization for Nuclear Research), Sep 14, 2018
An admission control scheme should play the role of a coordinator for flows in a data communicati... more An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.
Lecture notes in networks and systems, Dec 1, 2020
International Journal of Information Security and Privacy, 2019
Nanotechnologiesguaranteenewpotentialoutcomesformaintainingaccessibilityissuesinversatile robotsi... more Nanotechnologiesguaranteenewpotentialoutcomesformaintainingaccessibilityissuesinversatile robotsinanautomatedbasedMobileAdhocNetworks(MANETs).Inmulti-robotframeworks,with adevastationsituation,militaryapplications,huntandsaveoperationsandnormalhardships,this issueismuchmorebasic.AuspiciouscorrespondenceandsendingcontrolmessagesinaMANET whichisreasonablefortheseintensecircumstancesstartswithonerobotthenontothenextisacritical factorineveryoneoftheseoperations.ThismakesitisasecurityissueinMANETsbecauseofthe auto-reconfigurationnatureofthesystemwhichdoesnotdependonanysettledinfrastructure-based foundation.Thereisdynamicchangeinitstopologybecauseofrapidlymovingversatilenodes.This articlefeaturesfewsecurityissuesemergingbecauseofnetworkmatteramongrobotsandproposesa livelyMANET-basedautomatedconventioncalledPD-ROBOwithacommittedIntrusionDetection System(IDS)structurethatutilizationsportableoperatormethodtostayawayfromreplayassault inmechanicalbasedMANET.
International journal of cloud computing, 2023
Computación Y Sistemas, Dec 25, 2022
International Journal of Information Systems in The Service Sector, Apr 1, 2019
Salp Swarm Algorithm (SSA) is a new stochastic approach for solving optimization issues based on ... more Salp Swarm Algorithm (SSA) is a new stochastic approach for solving optimization issues based on the ideas of swarm intelligence. The ease of implementation and lower number of parameters to fine-tune are responsible for SSA's success and universal acceptance among researchers. The typical SSA method suffers from local optima entrapment and a poor convergence rate while dealing with more complex situations because of a lack of population density and inadequate local exploitation. To overcome such challenges, this study suggests a hybrid kind of SSA called Adaptive-Dimensional-Search based Orthogonal Experimentation SSA (ADOX-SSA). Furthermore, the inclusion of an ADOX operator increases population diversity, intensifies local exploitation, and strengthens the SSA standards. Consequently, the balance between the processes of exploration and exploitation is attuned, resulting in a faster rate of convergence than the normal SSA. To validate the ADOX-SSA technique's competency, ...
The pathfinder algorithm (PFA) is a recently introduced meta-heuristic approach that is mathemati... more The pathfinder algorithm (PFA) is a recently introduced meta-heuristic approach that is mathematically modelled by the cooperative behaviour of animal groups during a search for the best food zone. The PFA procedure comprises two phases: the pathfinder phase and the follower phase. In the former phase, the pathfinder explores new regions in the search space with its versatile explorative power. And during the later phase, followers change position following the leader and their perception, as a result, it makes it easy for the algorithm to fall in local optima leading to slow convergence. To alleviate such issues, this article introduces an improved approach to PFA named ASDR-PFA with the incorporation of a parameter termed search dimensional ratio (SDR) to generate new candidate solutions using the previous best one. The power of ASDR-PFA lies in its technique of updating the SDR parameter dynamically that attunes the balance between exploration and mining ability leading to a fast...
2017 11th International Conference on Intelligent Systems and Control (ISCO), 2017
Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are... more Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are self-governing with self-configurable potential due to high occurrence of topology alteration and changeable rescheduling of the network mechanism during data communication. Due to simplicity of set up, the energetic networking system in MANET is very victorious in conditions where it is complicated to create communications system and infrastructure based network. Numerous routing protocols for MANETs accompanying real time applications have been developed, basic intention being optimal consumption of resource in resource limited situation, least power utilization using limited battery power of the highly short-lived mobile nodes and victorious real time data broadcast within their deadline. This paper presents an efficient Quality of Service architecture using inter layer communication with a highly efficient real time scheduler design at the network layer with improved RMA (Rate Monotonic Algorithm) and EDF(Earliest Deadline First) scheduling that efficiently schedules multiple real time applications without missing any of their deadline. Simulation results in NetSim ver 8 ensures healthier network performance in terms of better jitter, packet delivery ratio and network lifetime when compared with other similar Cross layer based approaches for video file transmission.
Journal of Statistics and Management Systems
Wireless Communications and Mobile Computing
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role... more In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data. It increases system overhead and decreases overall network lifetime. Existing solutions like Time-Distance Bloom Filter (TDBF) algorithm are inapplicable to the large-scale environment. Received Signal Strength (RSS) used in this algorithm is highly dependent on quality of tag and application environment. In this paper, we propose an approach for data redundancy minimization for RFID surveillance data which is a modified version of TDBF. The proposed algorithm is formulated by using the observed time and calculated distance of RFID tags. To overcome these problems, we design our approach to relevantly reduce the spatiotemporal data redundancy in the source level by adding the Receiv...