Mrinal Debbarma - Academia.edu (original) (raw)
Papers by Mrinal Debbarma
International Journal of Networking and Virtual Organisations, 2019
A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size... more A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size sensor nodes, organise them in a cooperative network and perform three basic operations - sensing data from environment, computation, and data routing. Routing in WSN mainly focuses on data dissemination, data aggregation, life time of the network and limited bandwidth constraints in order to facilitate the efficient working of the network. Due to the limited battery power, the energy conservation is a critical aspect to design an efficient routing protocol in WSN. This paper proposes the energy efficient dynamic and self-optimised routing to prolong the life time of the network, QoS and solve the stagnation problem in the network.
Computación Y Sistemas, Mar 30, 2020
Wireless sensor nodes are extremely useful in different security and surveillance related applica... more Wireless sensor nodes are extremely useful in different security and surveillance related applications which may be compromised with the existence of coverage-holes. Coverage-hole is the area in a wireless sensor network (WSN) where sensing or transmitting of data is not achievable and therefore, detecting such region is a prominent research topic in WSN. Subsequent to hole-detection, another significant task is to detect the boundary nodes outlining the coverage-holes. In this paper, we have gone through different research articles describing the various boundary-detection techniques those have been recommended to facilitate hole-detection inside the sensor network. On the basis of the literature review, we have done categorization of the boundary-detection methods, their characteristics, pros & cons and their effect on sensor network's performance for better understanding and future reference.
Studies in big data, 2022
IET Communications
Accurate network traffic classification is an essential and challenging issue for wireless networ... more Accurate network traffic classification is an essential and challenging issue for wireless network management and survivability. Existing network traffic classification algorithms, on the other hand, cannot meet the required specifications of real networks' in terms of user privacy control overhead, latency, and above all, classification speed. For wireless network traffic classification, machine learning‐based and hybrid optimization techniques have been deployed. This paper takes a software‐defined wireless network (SDWN) architecture for network traffic classification into account. Because the proposed scheme is perfectly contained within the network controller,the SDWN controller's higher processing capability, global visibility, and programmability can be used to achieve real‐time, adaptive, and precise traffic classification. In this paper, a neuro‐evolutionary approach is proposed in which the feed forward neural network (FFNN) is the base classifier and particle swar...
IETE Technical Review, 2021
The Wireless Sensor Networks (WSNs) are mostly used for applications which hardly have human inte... more The Wireless Sensor Networks (WSNs) are mostly used for applications which hardly have human interaction and WSN is always known for its limited-energy issue. The wireless sensor nodes are equipped...
The Journal of Supercomputing, 2020
A routing protocol called 'Centroid-Based Routing (CBR)' is proposed to optimize the total system... more A routing protocol called 'Centroid-Based Routing (CBR)' is proposed to optimize the total system energy for a given wireless sensor network. We have designed the CBR protocol to optimize the battery life of the sensor nodes, by using a mobile Sink Node (SN). In CBR, several clusters are formed for the sensor nodes and each cluster is assigned a 'Cluster Head (CH)' node, and these CHs act as a local Base Station. The SN moves to a coordinate point (X c , Y c) which we call a 'Centroid Point (CP)' to collect data from the CH nodes. This 'CP' is dependent on the coordinates of all the CHs and also on their residual or remaining energy left over at any given round. This way the CH nodes have to pump a balanced amount of energy to send and receive data from SN, which makes the nodes last for a longer period. The simulation results imply that the CBR model is much efficient compared to other existing models in terms of energy utilization and network lifetime for the non-uniformly distributed sensor nodes in a given network area.
Journal of Ambient Intelligence and Humanized Computing, 2020
The occurrence of coverage-hole (CH) in a wireless sensor network degrades the performance of the... more The occurrence of coverage-hole (CH) in a wireless sensor network degrades the performance of the network in terms of data transmission. Therefore, after the detection of CH, hole-patching is the next important task in order to reduce the energy consumption and to improve the network lifetime. In this paper, we propose an improved coverage-hole patching technique (CHPT) based on the concept of center of tree. The prerequisite to hole-patching is the hole-detection, which is done based on Delaunay Triangle and empty circle property. Subsequently, using the Inner empty circle property, the hole-area is estimated. And finally, CHPT is used to determine the hole-boundary and formulate the sub-trees for identifying the patch-positions to be covered by deploying additional sensor nodes. Experimental results show that the average percentage of coverage in CHPT increases up to 98.6% in terms of additional sensors and with a given sensing radius.
Journal of High Speed Networks, 2018
Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance re... more Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance related applications where coverage plays an important role. While arranging the sensor nodes in a large scale WSN, covering the region of interest (ROI) is a complicated job and this quality of coverage is compromised in the presence of coverage holes. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, we first construct a Delaunay Triangle on the basis of node location information. Then we propose an algorithm based on the property of empty circle to recognize whether coverage hole is present or not in the given ROI of a large scale WSN. Also, we have estimated the area of the coverage-hole based on computational geometry. We have shown the correctness of the algorithm based on the theoretical proofs. Simulations are also conducted to show the effectiveness of the algorithm for coverage-hole detection and area estimation (CHDAE).
AEU - International Journal of Electronics and Communications, 2019
In this paper, we have minimized the problems for Vehicle to Vehicle communication, caused by the... more In this paper, we have minimized the problems for Vehicle to Vehicle communication, caused by the speed of the cars, the obstruction caused by high rise buildings and routing loop problem at the road junction. This causes less throughput and data packet drops for a given network. In order to avoid these problems, we have defined a set of fixed junction points (FJP), any particular vehicles around FJP, is assigned as a transceiver for the data communication. That vehicle, called Virtual junction point (VJP) which has assigned weight to every road, depends on number of cars on that road and the distance between two junctions points along that road. Apart from the concept of VJP, a newly developed method, we call it Center of Mass (CM) method, is used by source vehicle for selecting the next forwarding vehicle. In this method, one minimizes the sum of all the distances of all neighboring vehicles from a given imaginary point, which is the CM point. In this point, physically there may not be any vehicle, but the vehicle close to that point is used for the next forwarding vehicle in our method. Simulation result shows our method performs better than other protocols.
Advances in Data and Information Sciences, 2018
These days, Wireless Sensor Networks (WSNs) have enormous application in both research and commer... more These days, Wireless Sensor Networks (WSNs) have enormous application in both research and commercial fields such as environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, and medical science to military applications. For attaining network coverage in a WSN, normally a few to thousands of small, limited-power sensor nodes are required to be deployed in an interconnected fashion. While arranging the sensor nodes in a WSN, covering the region to be monitored is a difficult task and became a hot field of research for last few years. Coverage verifies the quality of monitoring some event in a meticulous environment by the sensor nodes. The idea behind this paper is to study thoroughly about the most recent literature of WSN coverage based on monitored region of the network. While doing so, we have mainly studied three different types: coverage area, point, and barrier coverage.
International Journal of Computer Applications, 2012
International Journal of Computer Applications, Mar 15, 2013
2015 International Conference on Signal Processing and Communication Engineering Systems, 2015
In this paper, we developed an application that can be used to monitor network packets, bandwidth... more In this paper, we developed an application that can be used to monitor network packets, bandwidth, Protocol Packets from the network and easily can monitor the system networking performance. The system uses automated software engineering approach, especially unit test in Java. The system can be used for monitoring the TCP, UDP, ARP, packets, when the system is connected with the internet. Domain IP address can be detected and packet that is lost can also be measured. The packet is captured with JPcap and WinPcap tool, integrated in JVM. Testing of this software involves developing set of test cases that are similar to the real data that the NMT is intended to manipulate. This project is a prototype of software engineering methodology and software is successfully tested.
The stream of qualified data in telecommunication networks requires the interaction of the differ... more The stream of qualified data in telecommunication networks requires the interaction of the different network layers. These network layers collaborate with one another in a nontrivial way to uphold qualified information exchange between the sender junction and appropriating junction. In a mobile ad hoc system, where there are fast topology up-dates due to mobility of junctions and channel fading there is a need to catch the layer interactions of the system layers. In this paper we introduce a conceptual model that recognizes the huge portions of the mobile ad hoc networks through state subordinate system control approaches. The energy-efficient control scheduling with optimal and suboptimal execution are broke down and put forth. A comprehensive perspective of the system that catches the layer interactions around obstruction administration strategies are brought at different layers. The coming about complex multi-objective improvement issue is then explained by multi-objective pursuit methods.
International Journal of Research in Engineering and Technology, 2013
DVR-hybrid routing protocol proposal derives from the conventional distance vector routing algori... more DVR-hybrid routing protocol proposal derives from the conventional distance vector routing algorithm which, in turn, is based on Distributed Asynchronous Bellman Ford's shortest path algorithm, however, with some minor to significant variations as needed for the ad hoc and mobile nature of the MANET A major thrust of the protocol designers towards the development and deployment of DVR-based routing protocols, irrespectively in wired, wireless or even in ad hoc and sensor networks is primarily because of the conceptual and implementation simplicity and elegance coupled with the minimum information requirement by each node of the DVR. A good amount of research has been done in the past towards the improvement of routing algorithms in MANET, but the area has not become stable till date. This paper, focused on several applications, challenges and solutions, in the perspective of routing in MANET.
International Journal of Computer Applications, 2012
Page 1. Proc. of Int. Conf. on Advances in Computer Engineering 2011 © 2011 ACEEE DOI: 02.ACE.201... more Page 1. Proc. of Int. Conf. on Advances in Computer Engineering 2011 © 2011 ACEEE DOI: 02.ACE.2011.02. Short Paper 158 Analysis of Software Complexity Measures for Regression Testing Mrinal Kanti Debbarma1, Nagendra Pratap Singh2, Amit Kr. ...
Advances in Intelligent Systems and Computing, 2018
Nowadays wireless sensor networks (WSNs) have massive relevance from environmental observation to... more Nowadays wireless sensor networks (WSNs) have massive relevance from environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, medical science to military applications. While organizing the sensor nodes in a WSN, covering the area-to-be-monitored is a tricky job and this quality is compromised in the presence of holes. Hole may be defined as an area in WSN around which a sensor is incapable of sensing or transmitting data. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, a detail literature review is done on hole detection, categorization, characteristics, and their effect on sensor network’s performance on the basis of the most recent literature.
International Journal of Computer and Communication Engineering, 2012
2013 IEEE International Conference on Electronics, Computing and Communication Technologies, 2013
International Journal of Networking and Virtual Organisations, 2019
A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size... more A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size sensor nodes, organise them in a cooperative network and perform three basic operations - sensing data from environment, computation, and data routing. Routing in WSN mainly focuses on data dissemination, data aggregation, life time of the network and limited bandwidth constraints in order to facilitate the efficient working of the network. Due to the limited battery power, the energy conservation is a critical aspect to design an efficient routing protocol in WSN. This paper proposes the energy efficient dynamic and self-optimised routing to prolong the life time of the network, QoS and solve the stagnation problem in the network.
Computación Y Sistemas, Mar 30, 2020
Wireless sensor nodes are extremely useful in different security and surveillance related applica... more Wireless sensor nodes are extremely useful in different security and surveillance related applications which may be compromised with the existence of coverage-holes. Coverage-hole is the area in a wireless sensor network (WSN) where sensing or transmitting of data is not achievable and therefore, detecting such region is a prominent research topic in WSN. Subsequent to hole-detection, another significant task is to detect the boundary nodes outlining the coverage-holes. In this paper, we have gone through different research articles describing the various boundary-detection techniques those have been recommended to facilitate hole-detection inside the sensor network. On the basis of the literature review, we have done categorization of the boundary-detection methods, their characteristics, pros & cons and their effect on sensor network's performance for better understanding and future reference.
Studies in big data, 2022
IET Communications
Accurate network traffic classification is an essential and challenging issue for wireless networ... more Accurate network traffic classification is an essential and challenging issue for wireless network management and survivability. Existing network traffic classification algorithms, on the other hand, cannot meet the required specifications of real networks' in terms of user privacy control overhead, latency, and above all, classification speed. For wireless network traffic classification, machine learning‐based and hybrid optimization techniques have been deployed. This paper takes a software‐defined wireless network (SDWN) architecture for network traffic classification into account. Because the proposed scheme is perfectly contained within the network controller,the SDWN controller's higher processing capability, global visibility, and programmability can be used to achieve real‐time, adaptive, and precise traffic classification. In this paper, a neuro‐evolutionary approach is proposed in which the feed forward neural network (FFNN) is the base classifier and particle swar...
IETE Technical Review, 2021
The Wireless Sensor Networks (WSNs) are mostly used for applications which hardly have human inte... more The Wireless Sensor Networks (WSNs) are mostly used for applications which hardly have human interaction and WSN is always known for its limited-energy issue. The wireless sensor nodes are equipped...
The Journal of Supercomputing, 2020
A routing protocol called 'Centroid-Based Routing (CBR)' is proposed to optimize the total system... more A routing protocol called 'Centroid-Based Routing (CBR)' is proposed to optimize the total system energy for a given wireless sensor network. We have designed the CBR protocol to optimize the battery life of the sensor nodes, by using a mobile Sink Node (SN). In CBR, several clusters are formed for the sensor nodes and each cluster is assigned a 'Cluster Head (CH)' node, and these CHs act as a local Base Station. The SN moves to a coordinate point (X c , Y c) which we call a 'Centroid Point (CP)' to collect data from the CH nodes. This 'CP' is dependent on the coordinates of all the CHs and also on their residual or remaining energy left over at any given round. This way the CH nodes have to pump a balanced amount of energy to send and receive data from SN, which makes the nodes last for a longer period. The simulation results imply that the CBR model is much efficient compared to other existing models in terms of energy utilization and network lifetime for the non-uniformly distributed sensor nodes in a given network area.
Journal of Ambient Intelligence and Humanized Computing, 2020
The occurrence of coverage-hole (CH) in a wireless sensor network degrades the performance of the... more The occurrence of coverage-hole (CH) in a wireless sensor network degrades the performance of the network in terms of data transmission. Therefore, after the detection of CH, hole-patching is the next important task in order to reduce the energy consumption and to improve the network lifetime. In this paper, we propose an improved coverage-hole patching technique (CHPT) based on the concept of center of tree. The prerequisite to hole-patching is the hole-detection, which is done based on Delaunay Triangle and empty circle property. Subsequently, using the Inner empty circle property, the hole-area is estimated. And finally, CHPT is used to determine the hole-boundary and formulate the sub-trees for identifying the patch-positions to be covered by deploying additional sensor nodes. Experimental results show that the average percentage of coverage in CHPT increases up to 98.6% in terms of additional sensors and with a given sensing radius.
Journal of High Speed Networks, 2018
Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance re... more Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance related applications where coverage plays an important role. While arranging the sensor nodes in a large scale WSN, covering the region of interest (ROI) is a complicated job and this quality of coverage is compromised in the presence of coverage holes. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, we first construct a Delaunay Triangle on the basis of node location information. Then we propose an algorithm based on the property of empty circle to recognize whether coverage hole is present or not in the given ROI of a large scale WSN. Also, we have estimated the area of the coverage-hole based on computational geometry. We have shown the correctness of the algorithm based on the theoretical proofs. Simulations are also conducted to show the effectiveness of the algorithm for coverage-hole detection and area estimation (CHDAE).
AEU - International Journal of Electronics and Communications, 2019
In this paper, we have minimized the problems for Vehicle to Vehicle communication, caused by the... more In this paper, we have minimized the problems for Vehicle to Vehicle communication, caused by the speed of the cars, the obstruction caused by high rise buildings and routing loop problem at the road junction. This causes less throughput and data packet drops for a given network. In order to avoid these problems, we have defined a set of fixed junction points (FJP), any particular vehicles around FJP, is assigned as a transceiver for the data communication. That vehicle, called Virtual junction point (VJP) which has assigned weight to every road, depends on number of cars on that road and the distance between two junctions points along that road. Apart from the concept of VJP, a newly developed method, we call it Center of Mass (CM) method, is used by source vehicle for selecting the next forwarding vehicle. In this method, one minimizes the sum of all the distances of all neighboring vehicles from a given imaginary point, which is the CM point. In this point, physically there may not be any vehicle, but the vehicle close to that point is used for the next forwarding vehicle in our method. Simulation result shows our method performs better than other protocols.
Advances in Data and Information Sciences, 2018
These days, Wireless Sensor Networks (WSNs) have enormous application in both research and commer... more These days, Wireless Sensor Networks (WSNs) have enormous application in both research and commercial fields such as environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, and medical science to military applications. For attaining network coverage in a WSN, normally a few to thousands of small, limited-power sensor nodes are required to be deployed in an interconnected fashion. While arranging the sensor nodes in a WSN, covering the region to be monitored is a difficult task and became a hot field of research for last few years. Coverage verifies the quality of monitoring some event in a meticulous environment by the sensor nodes. The idea behind this paper is to study thoroughly about the most recent literature of WSN coverage based on monitored region of the network. While doing so, we have mainly studied three different types: coverage area, point, and barrier coverage.
International Journal of Computer Applications, 2012
International Journal of Computer Applications, Mar 15, 2013
2015 International Conference on Signal Processing and Communication Engineering Systems, 2015
In this paper, we developed an application that can be used to monitor network packets, bandwidth... more In this paper, we developed an application that can be used to monitor network packets, bandwidth, Protocol Packets from the network and easily can monitor the system networking performance. The system uses automated software engineering approach, especially unit test in Java. The system can be used for monitoring the TCP, UDP, ARP, packets, when the system is connected with the internet. Domain IP address can be detected and packet that is lost can also be measured. The packet is captured with JPcap and WinPcap tool, integrated in JVM. Testing of this software involves developing set of test cases that are similar to the real data that the NMT is intended to manipulate. This project is a prototype of software engineering methodology and software is successfully tested.
The stream of qualified data in telecommunication networks requires the interaction of the differ... more The stream of qualified data in telecommunication networks requires the interaction of the different network layers. These network layers collaborate with one another in a nontrivial way to uphold qualified information exchange between the sender junction and appropriating junction. In a mobile ad hoc system, where there are fast topology up-dates due to mobility of junctions and channel fading there is a need to catch the layer interactions of the system layers. In this paper we introduce a conceptual model that recognizes the huge portions of the mobile ad hoc networks through state subordinate system control approaches. The energy-efficient control scheduling with optimal and suboptimal execution are broke down and put forth. A comprehensive perspective of the system that catches the layer interactions around obstruction administration strategies are brought at different layers. The coming about complex multi-objective improvement issue is then explained by multi-objective pursuit methods.
International Journal of Research in Engineering and Technology, 2013
DVR-hybrid routing protocol proposal derives from the conventional distance vector routing algori... more DVR-hybrid routing protocol proposal derives from the conventional distance vector routing algorithm which, in turn, is based on Distributed Asynchronous Bellman Ford's shortest path algorithm, however, with some minor to significant variations as needed for the ad hoc and mobile nature of the MANET A major thrust of the protocol designers towards the development and deployment of DVR-based routing protocols, irrespectively in wired, wireless or even in ad hoc and sensor networks is primarily because of the conceptual and implementation simplicity and elegance coupled with the minimum information requirement by each node of the DVR. A good amount of research has been done in the past towards the improvement of routing algorithms in MANET, but the area has not become stable till date. This paper, focused on several applications, challenges and solutions, in the perspective of routing in MANET.
International Journal of Computer Applications, 2012
Page 1. Proc. of Int. Conf. on Advances in Computer Engineering 2011 © 2011 ACEEE DOI: 02.ACE.201... more Page 1. Proc. of Int. Conf. on Advances in Computer Engineering 2011 © 2011 ACEEE DOI: 02.ACE.2011.02. Short Paper 158 Analysis of Software Complexity Measures for Regression Testing Mrinal Kanti Debbarma1, Nagendra Pratap Singh2, Amit Kr. ...
Advances in Intelligent Systems and Computing, 2018
Nowadays wireless sensor networks (WSNs) have massive relevance from environmental observation to... more Nowadays wireless sensor networks (WSNs) have massive relevance from environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, medical science to military applications. While organizing the sensor nodes in a WSN, covering the area-to-be-monitored is a tricky job and this quality is compromised in the presence of holes. Hole may be defined as an area in WSN around which a sensor is incapable of sensing or transmitting data. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, a detail literature review is done on hole detection, categorization, characteristics, and their effect on sensor network’s performance on the basis of the most recent literature.
International Journal of Computer and Communication Engineering, 2012
2013 IEEE International Conference on Electronics, Computing and Communication Technologies, 2013