Padmalaya Nayak - Academia.edu (original) (raw)

Papers by Padmalaya Nayak

Research paper thumbnail of A Survey on Leukemia Detection using Image Processing Techniques

E3S Web of Conferences

Leukemia detection and diagnosis by inspecting the blood cell images is an intriguing and dynamic... more Leukemia detection and diagnosis by inspecting the blood cell images is an intriguing and dynamic exploration region in both the Artificial Intelligence and Medical research fields. There are numerous procedures created to look at blood tests to identify leukemia illness, these strategies are the customary methods and the deep learning (DL) strategy. This survey paper presents a review on the distinctive conventional strategies and Deep Learning and Machine Learning methods towards that have been utilized in leukemia illness diagnosis dependent on platelets images and to analyze between the two methodologies in nature of appraisal, exactness, cost and speed. This article covers 11 research papers, 9 of these examinations were in customary strategies which utilized image handling and AI (ML) calculations, such as, K-closest neighbor (KNN), K-means, SVM, Naïve Bayes, and 2 investigations in cutting edge procedures which utilized Deep Learning, especially Convolutional Neural Networks ...

Research paper thumbnail of Cluster Head Selection in Wireless Sensor Network Using Bio-Inspired Algorithm

TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)

Routing and Clustering are the two major issues in Wireless Sensor Networks (WSNs) as these measu... more Routing and Clustering are the two major issues in Wireless Sensor Networks (WSNs) as these measures play a vital role during data transmission. Small battery-powered sensor nodes have an unadorned impact on communication protocols due to severe energy constraints. In clustering, cluster heads are often overloaded with heavy traffic than other members of the cluster. This creates a hotspot problem on a cluster head near to the base station. This is the primary reason to select a proper cluster head in a clustered based routing protocol. In this paper, we have applied the bio-inspired algorithm such as Genetic Algorithm to handle the energy-specific issues in Wireless Sensor Networks. By doing so, we have selected an energy-efficient cluster head that creates an energy-optimized environment leading to a longer Network lifetime. The Proposed Protocol is experimented through a Java-based Custom Simulator, which shows its superiority over traditional computing model in LEACH and K-Means Clustering.

Research paper thumbnail of Routing in wireless sensor networks using machine learning techniques: Challenges and opportunities

Research paper thumbnail of Performance Enhancement of AODV Routing Protocol for MANET Using Genetic Algorithm

2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC)

Routing in Mobile Ad-hoc Networks (MANETs) has gained gigantic attention due to the mobility of n... more Routing in Mobile Ad-hoc Networks (MANETs) has gained gigantic attention due to the mobility of nodes, standalone infrastructure, and lack of a centralized arbitrator. These moving nodes make the routing technique highly complex and unstable within a limited radio range. When the network size increases, the length of the complete path increases, and the header size of data packets also increase which brings the network slowdown in operation. To address these issues, many researchers have explored many Artificial Intelligence (AI) techniques to route the data packets from the source to the destination. This paper aims to develop a new routing protocol that exploits the principle of genetic algorithm to find the shortest path from source to the destination. The proposed protocol is experimented through the ns-2 simulator and proves its maximum efficiency over traditional AODV protocol in terms of throughput, average residual energy, and extends the network lifetime at crossover probability 0.5.

Research paper thumbnail of IoT-Enabled Agricultural System Applications, Challenges and Security Issues

Studies in Big Data

The growing demand of Internet of Things (IoT) brings many more paradigms in several areas of app... more The growing demand of Internet of Things (IoT) brings many more paradigms in several areas of applications such as smart city, smart village, smart energy management, smart agriculture, smart health care, etc. It aims at integrating the virtual world along with the physical world by using the Internet as communication medium. The IoT could be practically feasible with several existing technologies such as wireless sensor network (WSN), radio frequency identification (RFID), middleware technologies, cloud computing and end-user applications. The technologies associated with the IoTs have great impact on precision agriculture or smart farming as well as global economy. This chapter aims at agricultural applications where it utilises modern technologies that benefit the farmers with decision tools and reduces manual labouring cost. The seamless integration of products, knowledge and services through IoT maximises the volume of productivity, product quality and profit of business. Even though current surveys on the IoT in agriculture focuses on the challenges, constraints, benefits and pitfalls for large scale in the agricultural food sector, all are presented in isolation to each other. So, keeping all in these in mind, a brief discussion on challenges, benefits, constraints, future trends and security issues are presented in this book chapter.

Research paper thumbnail of A Robust Cyber Security

Artificial Intelligence, Machine Learning, and Data Science Technologies

Research paper thumbnail of CNN-Based Mobile Device Detection Using Still Images

IoT and Analytics for Sensor Networks

Research paper thumbnail of Cluster Formation Algorithm in WSNs to Optimize the Energy Consumption Using Self-Organizing Map

IoT and Analytics for Sensor Networks

Research paper thumbnail of Impact of Random Mobility Models for Reactive Routing Protocols over MANET

International Journal of Simulation: Systems, Science & Technology

Mobile Ad hoc Networks (MANETs) belong to Wireless Networks where the nodes communicate with each... more Mobile Ad hoc Networks (MANETs) belong to Wireless Networks where the nodes communicate with each other in a multi-hop fashion without any centralized control. In these networks, the topology does not remain constant due to the mobility of nodes, interference, path loss and multipath propagation. So, it does not require an infrastructure to resume the network connectivity. This infrastructure less, resource constrained, with limited memory and computing capacity along with the dynamic topology of MANET, demands different network strategies to be implemented to accomplish the communication. Considering all these issues, routing performs a crucial role while computing the path from source to the destination. Further, Mobility modeling and control makes the topology of MANET more challenging which requires considerable human focus. To handle this scenario, different solutions have been presented by many potential researchers. This paper attempts to focus on the performance of two reactive routing protocols such as DSR and AODV routing protocols by considering different random mobility models by using NetSim Simulator viewing that applicability of the protocol can be enhanced. So, this paper measures some performances such as Throughput, End to End delay, Packet Delivery Ratio (PDR) and Routing Overhead of communication protocols to check the impact on the variable topology of MANET.

Research paper thumbnail of Optimal, Secure Cluster Head Placement through Source Coding Techniques in Wireless Sensor Networks

IEEE Communications Letters

Research paper thumbnail of A Fuzzy Logic based Dynamic Channel allocation Scheme for wireless Cellular networks to optimize the frequency reuse

2016 IEEE Region 10 Conference (TENCON), 2016

Due to the technological advancements in high quality voice and high speed data communication, th... more Due to the technological advancements in high quality voice and high speed data communication, the popularity of Cellular communication is increasing exponentially. With this increasing popularity, the number of mobile users under cellular communication is growing rapidly. But, in reality the radio frequency spectrum is very much limited. It is a hard job to allocate the limited spectrum among the multiple users. So, efficient channel allocation of radio spectrum has become a hottest research topic among the researchers. There are many channel allocation schemes based on FDMA, TDMA and CDMA technology proposed in the literature proving their efficiency. In this paper, a Fuzzy-Logic based Dynamic Channel Assignment Scheme (F-DCAS) is proposed to maximize the number of served calls in a distributed wireless cellular environment. The F-DCAS provides better fault-tolerant capability for variable traffic load thus yielding better performance compared to traditional FCA and DCA scheme. Simulation result proofs that call blocking probability, call dropping probability, handoff strategies, throughput and average channel utilization in proposed algorithm is better than the traditional FCA and DCA scheme.

Research paper thumbnail of A Clustering Algorithm for WSN to Optimize the Network Lifetime Using Type-2 Fuzzy Logic Model

2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), 2015

In past few years the use of Wireless Sensor Networks (WSNs) are increasing tremendously in diffe... more In past few years the use of Wireless Sensor Networks (WSNs) are increasing tremendously in different applications such as disaster management, security surveillance, border protection, combat field reconnaissance etc. Sensors are expected to deploy remotely in huge numbers and coordinate with each other where human attendant is not practically feasible. These tiny sensor nodes are operated by battery power and the battery operated sensor node cannot be recharged or replaced very easily. So, minimization of energy consumption to prolong the network life is an important issue. To resolve this issue, sensor nodes are sometimes combined to form a group and each group is known as a cluster. In each cluster, a leader node is elected which is called as the cluster head (CH). When any event is detected, each node senses the environment and sends to the respective cluster heads. Then cluster heads send the information to the base station (BS). So, appropriate cluster head election can reduce considerable amount of energy consumption. In this paper, we propose a cluster head election algorithm using Type-2 Fuzzy Logic, by considering some fuzzy descriptors such as remaining battery power, distance to base station, and concentration, which is expected to minimize energy consumption and extends the network lifetime.

Research paper thumbnail of Analysis of Random Way Point and Random Walk Mobility Model for Reactive Routing Protocols for MANET Using NetSim Simulator

2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), 2015

With the rising popularity of Wireless Communication, Mobile Ad hoc Network (MANET) has obtained ... more With the rising popularity of Wireless Communication, Mobile Ad hoc Network (MANET) has obtained its own place to be analyzed. The potential applications of MANET are growing tremendously due to its rapid changing technology. Wireless network can be established in two modes. One is "Ad hoc mode" where the nodes are self-organized and another is "Infrastructured mode" where the nodes are managed by a central coordinator such as Base Station or Access Point. However, routing plays a major role in MANET as all the nodes are mobile. Mobility Modeling and Control makes the topology of MANET more complicated which requires considerable amount of attention. To handle this scenario, different solutions are proposed in the literature. This paper attempts to evaluate the performance of the DSR and AODV routing protocol with different mobility model using NetSim Simulator to extend the applicability of the protocol. As of now, much result has not been reported in the literature with NetSim Simulator and Mobility Modeling has a great impact on future Internet of Things (IoT). So, performance metrics such as Throughput, End to End delay, Packet Delivery Ratio (PDR), Routing Overhead, and Network Lifetime has been measured and comparative results are presented in this paper.

Research paper thumbnail of Wireless Sensor Network Security Issues: A Brief Review

International Journal of Research in Engineering and Technology, 2016

Wireless Sensor Network (WSN) applications are growing tremendously in many areas that ranges fro... more Wireless Sensor Network (WSN) applications are growing tremendously in many areas that ranges from environmental and habitant monitoring to health care, agriculture, military, defense, control and tracking applications. Despite of huge growth in applications, these networks are prone to security attacks. Again, deployment of these networks in a hostile and unattended environment along with the limited resources make the design/deployment issue more critical than any other networks. Recently, many research publications discuss on the security issues and challenge involved in WSN why because the limited source of nodes can't provide a desired level of security by itself. Even though many studies discuss many potential issues of WSN security, most of these are discussed in isolation of each other. Keeping this in mind, trying to provide a clear picture of this vast area, attempt has been made to present the major security issues that consider the probable attacks and how it can be detected prior to the attack and various detection mechanisms are discussed in this paper. A brief taxonomy of WSN constraints and different types of attacks and detection mechanisms are presented this paper.

Research paper thumbnail of A Fuzzy Logic based Clustering Algorithm for WSN to extend the Network Lifetime

IEEE Sensors Journal, 2015

Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with limited co... more Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with limited computation, communication, memory, and energy resources that are being used for huge range of applications where the traditional infrastructure-based network is mostly infeasible. The sensor nodes are densely deployed in a hostile environment to monitor, detect, and analyze the physical phenomenon and consume considerable amount of energy while transmitting the information. It is impractical and sometimes impossible to replace the battery and to maintain longer network life time. So, there is a limitation on the lifetime of the battery power and energy conservation is a challenging issue. Appropriate cluster head (CH) election is one such issue, which can reduce the energy consumption dramatically. Low energy adaptive clustering hierarchy (LEACH) is the most famous hierarchical routing protocol, where the CH is elected in rotation basis based on a probabilistic threshold value and only CHs are allowed to send the information to the base station (BS). But in this approach, a super-CH (SCH) is elected among the CHs who can only send the information to the mobile BS by choosing suitable fuzzy descriptors, such as remaining battery power, mobility of BS, and centrality of the clusters. Fuzzy inference engine (Mamdani's rule) is used to elect the chance to be the SCH. The results have been derived from NS-2 simulator and show that the proposed protocol performs better than the LEACH protocol in terms of the first node dies, half node alive, better stability, and better lifetime.

Research paper thumbnail of Bio-inspired routing protocol for wireless sensor network to minimise the energy consumption

IET Wireless Sensor Systems

Research paper thumbnail of Comparison of Routing Protocols in WSN using NetSim Simulator: LEACH Vs LEACH-C

International Journal of Computer Applications, Nov 18, 2014

The tremendous growth of Wireless Sensor Network (WSN) in various applications such as military, ... more The tremendous growth of Wireless Sensor Network (WSN) in various applications such as military, defence, civil, health care, agriculture etc. has created a lot of interest among the research community for past few years. WSNs have several characteristics and constraints. Routing, Fusion, Localization is the key factors and very crucial issues that need to be considered due to the severe energy constraints. So, efficient energy management is the biggest challenge for the enhancement of the network lifetime. Many studies have been proven to extend the lifetime of the WSN. Among these, clustering based routing protocols have achieved a significant position to utilize the energy efficiently and effectively. LEACH is the most fundamental clustering based energy efficient distributed routing protocol that provides a long platform to the researchers to compare, extend, modify, analyse with other clustering routing protocols. LEACH-C is another centralized cluster-based routing protocol which is closely related to LEACH protocol. Even though few articles present the comparison result of these two protocols briefly using NS-2 Simulator, as of our knowledge, it has not been analysed more with NetSim Simulator. So, in this paper, we have made an attempt to verify the inherent properties of two existing clustering routing protocols such as LEACH and LEACH-C in depth by using NetSim Simulator.

Research paper thumbnail of Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

International Journal of Computer Applications, 2015

With the drastic growth of Internet and VLSI design, applications of WSNs are increasing tremendo... more With the drastic growth of Internet and VLSI design, applications of WSNs are increasing tremendously that ranges from environmental monitoring, habitat monitoring, traffic surveillance to battle fields. In WSN a number of tiny sensor nodes managed by small batteries are deployed in a hostile environment to monitor the physical parameters. During transmission, the sensor nodes consume considerable amount of energy. There are many constraints on these sensor nodes such as limited memory, limited battery power, and limited processing capability. Moreover, these factors impose a restricted lifetime for the entire network. When sensor nodes send the information to the base station (BS), routing protocol plays the key role to deliver the information at the destination. Low Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-C is the well-known distributed and centralized clustering routing protocol respectively. In LEACH, the cluster head (CH) is elected on a probabilistic threshold value on a rotation basis and only CHs are allowed to send the information to the BS. LEACH-C is the modified version of LEACH and works on the centralized principle. Further, WSNs are vulnerable to many types of attacks, as WSNs are normally deployed in a harsh environment. So, security is one of the major challenging issues that need to be focused. Many researchers have addressed these issues on LEACH protocol as LEACH is the first ever cluster based routing protocol. As far as our knowledge is concerned, there is a lack of research in the current literature by considering both LEACH and LEACH-C protocol under some attacks. So, we have made an attempt to analyze the performance of both the protocols under some well-known attacks like black hole and sink hole attacks. Again, we plan to propose a detection mechanism which is in progress.

Research paper thumbnail of Comparative study of DSR, AODV Routing Protocol for WPAN Using NetSim Simulator

Research paper thumbnail of Impact of Cloud Gaming in Health Care, Education, and Entertainment Services

Emerging Technologies and Applications for Cloud-Based Gaming, 2000

With the rapid growth of Cloud Computing, various diverse applications are growing exponentially ... more With the rapid growth of Cloud Computing, various diverse applications are growing exponentially through large data centers with the use of Internet. Cloud gaming is one of the most novel service applications that helps to store the video games in cloud and client can access the games as audio/video streams. Cloud gaming in practice substantially reduces the computational cost at the client side and enables the use of thin clients. Further, Quality of Service (QoS) may be affected through cloud gaming by introducing access latency. The objective of this chapter is to bring the impact and effectiveness of cloud gaming application on users, Health care, Entertainment, and Education.

Research paper thumbnail of A Survey on Leukemia Detection using Image Processing Techniques

E3S Web of Conferences

Leukemia detection and diagnosis by inspecting the blood cell images is an intriguing and dynamic... more Leukemia detection and diagnosis by inspecting the blood cell images is an intriguing and dynamic exploration region in both the Artificial Intelligence and Medical research fields. There are numerous procedures created to look at blood tests to identify leukemia illness, these strategies are the customary methods and the deep learning (DL) strategy. This survey paper presents a review on the distinctive conventional strategies and Deep Learning and Machine Learning methods towards that have been utilized in leukemia illness diagnosis dependent on platelets images and to analyze between the two methodologies in nature of appraisal, exactness, cost and speed. This article covers 11 research papers, 9 of these examinations were in customary strategies which utilized image handling and AI (ML) calculations, such as, K-closest neighbor (KNN), K-means, SVM, Naïve Bayes, and 2 investigations in cutting edge procedures which utilized Deep Learning, especially Convolutional Neural Networks ...

Research paper thumbnail of Cluster Head Selection in Wireless Sensor Network Using Bio-Inspired Algorithm

TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)

Routing and Clustering are the two major issues in Wireless Sensor Networks (WSNs) as these measu... more Routing and Clustering are the two major issues in Wireless Sensor Networks (WSNs) as these measures play a vital role during data transmission. Small battery-powered sensor nodes have an unadorned impact on communication protocols due to severe energy constraints. In clustering, cluster heads are often overloaded with heavy traffic than other members of the cluster. This creates a hotspot problem on a cluster head near to the base station. This is the primary reason to select a proper cluster head in a clustered based routing protocol. In this paper, we have applied the bio-inspired algorithm such as Genetic Algorithm to handle the energy-specific issues in Wireless Sensor Networks. By doing so, we have selected an energy-efficient cluster head that creates an energy-optimized environment leading to a longer Network lifetime. The Proposed Protocol is experimented through a Java-based Custom Simulator, which shows its superiority over traditional computing model in LEACH and K-Means Clustering.

Research paper thumbnail of Routing in wireless sensor networks using machine learning techniques: Challenges and opportunities

Research paper thumbnail of Performance Enhancement of AODV Routing Protocol for MANET Using Genetic Algorithm

2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC)

Routing in Mobile Ad-hoc Networks (MANETs) has gained gigantic attention due to the mobility of n... more Routing in Mobile Ad-hoc Networks (MANETs) has gained gigantic attention due to the mobility of nodes, standalone infrastructure, and lack of a centralized arbitrator. These moving nodes make the routing technique highly complex and unstable within a limited radio range. When the network size increases, the length of the complete path increases, and the header size of data packets also increase which brings the network slowdown in operation. To address these issues, many researchers have explored many Artificial Intelligence (AI) techniques to route the data packets from the source to the destination. This paper aims to develop a new routing protocol that exploits the principle of genetic algorithm to find the shortest path from source to the destination. The proposed protocol is experimented through the ns-2 simulator and proves its maximum efficiency over traditional AODV protocol in terms of throughput, average residual energy, and extends the network lifetime at crossover probability 0.5.

Research paper thumbnail of IoT-Enabled Agricultural System Applications, Challenges and Security Issues

Studies in Big Data

The growing demand of Internet of Things (IoT) brings many more paradigms in several areas of app... more The growing demand of Internet of Things (IoT) brings many more paradigms in several areas of applications such as smart city, smart village, smart energy management, smart agriculture, smart health care, etc. It aims at integrating the virtual world along with the physical world by using the Internet as communication medium. The IoT could be practically feasible with several existing technologies such as wireless sensor network (WSN), radio frequency identification (RFID), middleware technologies, cloud computing and end-user applications. The technologies associated with the IoTs have great impact on precision agriculture or smart farming as well as global economy. This chapter aims at agricultural applications where it utilises modern technologies that benefit the farmers with decision tools and reduces manual labouring cost. The seamless integration of products, knowledge and services through IoT maximises the volume of productivity, product quality and profit of business. Even though current surveys on the IoT in agriculture focuses on the challenges, constraints, benefits and pitfalls for large scale in the agricultural food sector, all are presented in isolation to each other. So, keeping all in these in mind, a brief discussion on challenges, benefits, constraints, future trends and security issues are presented in this book chapter.

Research paper thumbnail of A Robust Cyber Security

Artificial Intelligence, Machine Learning, and Data Science Technologies

Research paper thumbnail of CNN-Based Mobile Device Detection Using Still Images

IoT and Analytics for Sensor Networks

Research paper thumbnail of Cluster Formation Algorithm in WSNs to Optimize the Energy Consumption Using Self-Organizing Map

IoT and Analytics for Sensor Networks

Research paper thumbnail of Impact of Random Mobility Models for Reactive Routing Protocols over MANET

International Journal of Simulation: Systems, Science & Technology

Mobile Ad hoc Networks (MANETs) belong to Wireless Networks where the nodes communicate with each... more Mobile Ad hoc Networks (MANETs) belong to Wireless Networks where the nodes communicate with each other in a multi-hop fashion without any centralized control. In these networks, the topology does not remain constant due to the mobility of nodes, interference, path loss and multipath propagation. So, it does not require an infrastructure to resume the network connectivity. This infrastructure less, resource constrained, with limited memory and computing capacity along with the dynamic topology of MANET, demands different network strategies to be implemented to accomplish the communication. Considering all these issues, routing performs a crucial role while computing the path from source to the destination. Further, Mobility modeling and control makes the topology of MANET more challenging which requires considerable human focus. To handle this scenario, different solutions have been presented by many potential researchers. This paper attempts to focus on the performance of two reactive routing protocols such as DSR and AODV routing protocols by considering different random mobility models by using NetSim Simulator viewing that applicability of the protocol can be enhanced. So, this paper measures some performances such as Throughput, End to End delay, Packet Delivery Ratio (PDR) and Routing Overhead of communication protocols to check the impact on the variable topology of MANET.

Research paper thumbnail of Optimal, Secure Cluster Head Placement through Source Coding Techniques in Wireless Sensor Networks

IEEE Communications Letters

Research paper thumbnail of A Fuzzy Logic based Dynamic Channel allocation Scheme for wireless Cellular networks to optimize the frequency reuse

2016 IEEE Region 10 Conference (TENCON), 2016

Due to the technological advancements in high quality voice and high speed data communication, th... more Due to the technological advancements in high quality voice and high speed data communication, the popularity of Cellular communication is increasing exponentially. With this increasing popularity, the number of mobile users under cellular communication is growing rapidly. But, in reality the radio frequency spectrum is very much limited. It is a hard job to allocate the limited spectrum among the multiple users. So, efficient channel allocation of radio spectrum has become a hottest research topic among the researchers. There are many channel allocation schemes based on FDMA, TDMA and CDMA technology proposed in the literature proving their efficiency. In this paper, a Fuzzy-Logic based Dynamic Channel Assignment Scheme (F-DCAS) is proposed to maximize the number of served calls in a distributed wireless cellular environment. The F-DCAS provides better fault-tolerant capability for variable traffic load thus yielding better performance compared to traditional FCA and DCA scheme. Simulation result proofs that call blocking probability, call dropping probability, handoff strategies, throughput and average channel utilization in proposed algorithm is better than the traditional FCA and DCA scheme.

Research paper thumbnail of A Clustering Algorithm for WSN to Optimize the Network Lifetime Using Type-2 Fuzzy Logic Model

2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), 2015

In past few years the use of Wireless Sensor Networks (WSNs) are increasing tremendously in diffe... more In past few years the use of Wireless Sensor Networks (WSNs) are increasing tremendously in different applications such as disaster management, security surveillance, border protection, combat field reconnaissance etc. Sensors are expected to deploy remotely in huge numbers and coordinate with each other where human attendant is not practically feasible. These tiny sensor nodes are operated by battery power and the battery operated sensor node cannot be recharged or replaced very easily. So, minimization of energy consumption to prolong the network life is an important issue. To resolve this issue, sensor nodes are sometimes combined to form a group and each group is known as a cluster. In each cluster, a leader node is elected which is called as the cluster head (CH). When any event is detected, each node senses the environment and sends to the respective cluster heads. Then cluster heads send the information to the base station (BS). So, appropriate cluster head election can reduce considerable amount of energy consumption. In this paper, we propose a cluster head election algorithm using Type-2 Fuzzy Logic, by considering some fuzzy descriptors such as remaining battery power, distance to base station, and concentration, which is expected to minimize energy consumption and extends the network lifetime.

Research paper thumbnail of Analysis of Random Way Point and Random Walk Mobility Model for Reactive Routing Protocols for MANET Using NetSim Simulator

2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), 2015

With the rising popularity of Wireless Communication, Mobile Ad hoc Network (MANET) has obtained ... more With the rising popularity of Wireless Communication, Mobile Ad hoc Network (MANET) has obtained its own place to be analyzed. The potential applications of MANET are growing tremendously due to its rapid changing technology. Wireless network can be established in two modes. One is "Ad hoc mode" where the nodes are self-organized and another is "Infrastructured mode" where the nodes are managed by a central coordinator such as Base Station or Access Point. However, routing plays a major role in MANET as all the nodes are mobile. Mobility Modeling and Control makes the topology of MANET more complicated which requires considerable amount of attention. To handle this scenario, different solutions are proposed in the literature. This paper attempts to evaluate the performance of the DSR and AODV routing protocol with different mobility model using NetSim Simulator to extend the applicability of the protocol. As of now, much result has not been reported in the literature with NetSim Simulator and Mobility Modeling has a great impact on future Internet of Things (IoT). So, performance metrics such as Throughput, End to End delay, Packet Delivery Ratio (PDR), Routing Overhead, and Network Lifetime has been measured and comparative results are presented in this paper.

Research paper thumbnail of Wireless Sensor Network Security Issues: A Brief Review

International Journal of Research in Engineering and Technology, 2016

Wireless Sensor Network (WSN) applications are growing tremendously in many areas that ranges fro... more Wireless Sensor Network (WSN) applications are growing tremendously in many areas that ranges from environmental and habitant monitoring to health care, agriculture, military, defense, control and tracking applications. Despite of huge growth in applications, these networks are prone to security attacks. Again, deployment of these networks in a hostile and unattended environment along with the limited resources make the design/deployment issue more critical than any other networks. Recently, many research publications discuss on the security issues and challenge involved in WSN why because the limited source of nodes can't provide a desired level of security by itself. Even though many studies discuss many potential issues of WSN security, most of these are discussed in isolation of each other. Keeping this in mind, trying to provide a clear picture of this vast area, attempt has been made to present the major security issues that consider the probable attacks and how it can be detected prior to the attack and various detection mechanisms are discussed in this paper. A brief taxonomy of WSN constraints and different types of attacks and detection mechanisms are presented this paper.

Research paper thumbnail of A Fuzzy Logic based Clustering Algorithm for WSN to extend the Network Lifetime

IEEE Sensors Journal, 2015

Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with limited co... more Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with limited computation, communication, memory, and energy resources that are being used for huge range of applications where the traditional infrastructure-based network is mostly infeasible. The sensor nodes are densely deployed in a hostile environment to monitor, detect, and analyze the physical phenomenon and consume considerable amount of energy while transmitting the information. It is impractical and sometimes impossible to replace the battery and to maintain longer network life time. So, there is a limitation on the lifetime of the battery power and energy conservation is a challenging issue. Appropriate cluster head (CH) election is one such issue, which can reduce the energy consumption dramatically. Low energy adaptive clustering hierarchy (LEACH) is the most famous hierarchical routing protocol, where the CH is elected in rotation basis based on a probabilistic threshold value and only CHs are allowed to send the information to the base station (BS). But in this approach, a super-CH (SCH) is elected among the CHs who can only send the information to the mobile BS by choosing suitable fuzzy descriptors, such as remaining battery power, mobility of BS, and centrality of the clusters. Fuzzy inference engine (Mamdani's rule) is used to elect the chance to be the SCH. The results have been derived from NS-2 simulator and show that the proposed protocol performs better than the LEACH protocol in terms of the first node dies, half node alive, better stability, and better lifetime.

Research paper thumbnail of Bio-inspired routing protocol for wireless sensor network to minimise the energy consumption

IET Wireless Sensor Systems

Research paper thumbnail of Comparison of Routing Protocols in WSN using NetSim Simulator: LEACH Vs LEACH-C

International Journal of Computer Applications, Nov 18, 2014

The tremendous growth of Wireless Sensor Network (WSN) in various applications such as military, ... more The tremendous growth of Wireless Sensor Network (WSN) in various applications such as military, defence, civil, health care, agriculture etc. has created a lot of interest among the research community for past few years. WSNs have several characteristics and constraints. Routing, Fusion, Localization is the key factors and very crucial issues that need to be considered due to the severe energy constraints. So, efficient energy management is the biggest challenge for the enhancement of the network lifetime. Many studies have been proven to extend the lifetime of the WSN. Among these, clustering based routing protocols have achieved a significant position to utilize the energy efficiently and effectively. LEACH is the most fundamental clustering based energy efficient distributed routing protocol that provides a long platform to the researchers to compare, extend, modify, analyse with other clustering routing protocols. LEACH-C is another centralized cluster-based routing protocol which is closely related to LEACH protocol. Even though few articles present the comparison result of these two protocols briefly using NS-2 Simulator, as of our knowledge, it has not been analysed more with NetSim Simulator. So, in this paper, we have made an attempt to verify the inherent properties of two existing clustering routing protocols such as LEACH and LEACH-C in depth by using NetSim Simulator.

Research paper thumbnail of Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

International Journal of Computer Applications, 2015

With the drastic growth of Internet and VLSI design, applications of WSNs are increasing tremendo... more With the drastic growth of Internet and VLSI design, applications of WSNs are increasing tremendously that ranges from environmental monitoring, habitat monitoring, traffic surveillance to battle fields. In WSN a number of tiny sensor nodes managed by small batteries are deployed in a hostile environment to monitor the physical parameters. During transmission, the sensor nodes consume considerable amount of energy. There are many constraints on these sensor nodes such as limited memory, limited battery power, and limited processing capability. Moreover, these factors impose a restricted lifetime for the entire network. When sensor nodes send the information to the base station (BS), routing protocol plays the key role to deliver the information at the destination. Low Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-C is the well-known distributed and centralized clustering routing protocol respectively. In LEACH, the cluster head (CH) is elected on a probabilistic threshold value on a rotation basis and only CHs are allowed to send the information to the BS. LEACH-C is the modified version of LEACH and works on the centralized principle. Further, WSNs are vulnerable to many types of attacks, as WSNs are normally deployed in a harsh environment. So, security is one of the major challenging issues that need to be focused. Many researchers have addressed these issues on LEACH protocol as LEACH is the first ever cluster based routing protocol. As far as our knowledge is concerned, there is a lack of research in the current literature by considering both LEACH and LEACH-C protocol under some attacks. So, we have made an attempt to analyze the performance of both the protocols under some well-known attacks like black hole and sink hole attacks. Again, we plan to propose a detection mechanism which is in progress.

Research paper thumbnail of Comparative study of DSR, AODV Routing Protocol for WPAN Using NetSim Simulator

Research paper thumbnail of Impact of Cloud Gaming in Health Care, Education, and Entertainment Services

Emerging Technologies and Applications for Cloud-Based Gaming, 2000

With the rapid growth of Cloud Computing, various diverse applications are growing exponentially ... more With the rapid growth of Cloud Computing, various diverse applications are growing exponentially through large data centers with the use of Internet. Cloud gaming is one of the most novel service applications that helps to store the video games in cloud and client can access the games as audio/video streams. Cloud gaming in practice substantially reduces the computational cost at the client side and enables the use of thin clients. Further, Quality of Service (QoS) may be affected through cloud gaming by introducing access latency. The objective of this chapter is to bring the impact and effectiveness of cloud gaming application on users, Health care, Entertainment, and Education.