LalBihari Barik | King AbdulAziz University (KAU) Jeddah, Saudi Arabia (original) (raw)
Papers by LalBihari Barik
2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Jul 8, 2022
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), Mar 25, 2022
International Journal of Advanced Computer Science and Applications, 2017
The objective of this research study is to validate Indian Weighted Diabetes Risk Score (IWDRS). ... more The objective of this research study is to validate Indian Weighted Diabetes Risk Score (IWDRS). The IWDRS is derived by applying the novel concept of semantic discretization based on Data Mining techniques. 311 adult participants (age > 18 years), who have been tested for diabetes using the biochemical test in pathology laboratory according to World Health Organization (WHO) guidelines, were selected for this study. These subjects were not included for deriving IWDRS tool. IWDRS is calculated for all 311 subjects. Prediction parameters, such as sensitivity and specificity are evaluated along with other performance parameters for an optimal cutoff score for IWDRS. The IWDRS tool is validated and found to be highly sensitive in diagnosing diabetes positive cases at the same time it is almost equally specific for identifying diabetes negative cases as well. The result of IWDRS is compared with the results of another two similar studies conducted for the Indian population and found it better. At optimal cutoff score IWDRS>=294, the prediction accuracy is 82.32%, while sensitivity and specificity is 82.22% and 82.44%, respectively.
Smart innovation, systems and technologies, 2022
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC)
Smart innovation, systems and technologies, 2022
2022 3rd International Conference for Emerging Technology (INCET)
There is a great boom in e-learning in the area of technology-enhanced Intelligent Tutoring Educa... more There is a great boom in e-learning in the area of technology-enhanced Intelligent Tutoring Educational Systems where excellent virtual instructors/teachers guide their learners/students. Progress has been made, addressing a variety of educational needs, ranging from supplements to existing “traditional” courses, to complete on-line courses, to complete on-line programs. Despite all this effort, hype, and even product development, most of the courseware material available for use at the educational level is still not judged to be as effective as a teacher lecturing and leading discussions with students. It is often necessary for a teacher to prepare a test over information for which students have been previously quizzed or to administer multiple versions of same test. When this situation occurs, teachers are required to spend extra time creating equivalent questions. The major difficulty with this problem lies in efficiently creating sets of equivalent questions. To solve this probl...
2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T)
International Journal of Current Engineering and Scientific Research, 2018
Objectives of this research are to see the significant difference if any between executives and S... more Objectives of this research are to see the significant difference if any between executives and Supervisors belonging to a public & private organization to the need for fulfillment. It is also to see the significant difference if any between executives supervisors belonging to a public & private organization concerning the leadership styles & their effectiveness. There is also to see the significant difference in leadership styles & their effectiveness if any between a satisfied & dissatisfied group of respondents (executives & supervisors) with lower order needs in public & private organizations. The study was conducted independently in two large organizations of India. One is a public organization (Oil and Natural Gas Corporation, Surat) and the other one is a private organization (Essar Oil, Surat). The samples were collected on executives and supervisors of these organizations. The executives hold a distinct designation of managers/executives. ONGC, Surat was selected as a public organization and Essar Oil, Surat was selected as a private organization. A sample of 980 (public 430 and private 550) executives and the supervisor was given the porter need satisfaction questionnaire to measure the need fulfillment/dissatisfaction. The conclusion of the study is the executives of the public, and private organizations are not significantly different in case of the lower order needs and the result on higher order needs manifests that executives of the organizations are significantly different with each other. The supervisors of the public and privet organization are significantly different from each other. In need Hierarchy Level, i.e., lower and higher order needs. The respondents (executives and supervisors) of the public organization have preferred high relationship-low task leadership behavior as their dominant behavior. On the other hand, the respondents (executives and supervisors) of privet organization have preferred high task-high relationship behavior as their dominant behavior. The effectiveness variables imply that executives of public organist ions are more effective in comparison to executives of privet organizations, while supervisors of both organizations are equally effective. Because it is noted that the supervisor of both organizations are not significantly different from each other. This type of analysis of leader's (executives and supervisors) needs may be important for placing and promoting them. The need factor influences the productivity of any organist ion because it is supposed that the success of an organization depends upon the need and activities of the employees. This study is very important not only from the academic angle but also in practice terms and would be helpful to identify the difference between the two distinct managerial levels in an organization and the distinction between the two organizations.
International Journal of Innovative Technology and Exploring Engineering, 2020
Paper The objective of this research paper is to determine the understanding of students’ course ... more Paper The objective of this research paper is to determine the understanding of students’ course contents and evaluate student performance according to expectations. There are predefined navigation models available to answer Multiple Choice Questions (MCQs). The individual student responds to these questions in their navigation pattern that results in various Student Performance Outcomes. The research presents the process mining techniques to evaluate students’ answers in the MCQs predefined navigation model in the exaMAIZE Assessment System. This research shows that students navigate all the twenty-five questions according to their way of answering the exam, where seven questions are under high frequency and later analyze to revise the answer on suspicion or difficult. The experiment compared Student Exam Outcomes with the Student Performance Outcomes of each outcome, and the frequency of navigating a question to find out individual student Strengths and Weaknesses. This work can b...
International Journal of Current Engineering and Scientific Research, Jul 8, 2017
Society and cultural background of a person plays a vital role in the life of entrepreneurs. Entr... more Society and cultural background of a person plays a vital role in the life of entrepreneurs. Entrepreneurs start ventures, and when they grow, society and economy of a country also grow accordingly. Entrepreneurial education is also important for the entrepreneurs and his/her behavior. Friends, family, and peers also give moral and financial support to the entrepreneur which help him to take a risk and implement new ideas. The main thing to study is how social-cultural factors affect the behavior of entrepreneur or want to be an entrepreneur. This paper focuses on the social and cultural factors like religion, family, financial status, education, and ethics which affect the person who is an entrepreneur or want to be an entrepreneur. In this paper researchers have also analyzed the role of family, peer persons, education to develop the entrepreneur behavior.
International Journal of Current Engineering and Scientific Research, 2018
Mobile Ad-hoc Network (MANET) is a self-directed decentralized wireless network where mobile node... more Mobile Ad-hoc Network (MANET) is a self-directed decentralized wireless network where mobile nodes are move freely in the network with dynamic topology. Therefore, the main issue in MANET is security. The route search process in MANET performed by one of the responsive, active or hybrid route protocols. MANETs are vulnerable to any security attack, where one of these attacks is the black hole attack. In a black hole attack, where the malicious node advertises itself that it has the shortest route to the destination and tries to fool the source node. After the response received from the malicious node, the source node leaves all other paths and transferring data to the malicious node. Instead of forwarding to the next node, a malicious node leaves all data packets after data packet received from the source node. Common two classification of black hole attacks listed as: (i) Single Black Hole (SBH), and (ii) Cooperative Black Hole (CBH). In SBH attack, only one malicious node is present and whereas in CBH attack, there is two or more malicious node attack in cooperation with each other. Many techniques in literature available for the identification and prevention of black hole attack. In this research, the researcher discussed some techniques for detecting cooperative black hole attack in MANET using the Ad-hoc On-demand Distance Vector (AODV).
Control Theory and Informatics, 2014
The existing NIDSs involve various mechanisms in order to identify the patterns related to the ne... more The existing NIDSs involve various mechanisms in order to identify the patterns related to the network problems. In this paper we described the implementation of genetic algorithm using steady-state selection mechanism. We have performed various test cases in order to analyze the effect of varying iterations and varying initial chrome length along with different fitness functions. The analyzed result would be helpful to have quicker generation of reliable rule sets for Network Intrusion Detection System using less/more number of iterations, depending on the varying initial chrome length.
Lately Machine to Machine (M2M) Communication has gathered huge research interest because of its ... more Lately Machine to Machine (M2M) Communication has gathered huge research interest because of its peculiar nature of communication without any or less human intervention. With the increase in wide variety of devices and application, there is huge change in traffic patterns of Machine Type Communication (MTC) system. Existing traditional Long-Term Evolution (LTE) network will not be able to handle these growing demands of the bandwidth and network availability. There are some challenges in the existing network like latency, scalability, reliability, interference and delay, which degrade the Quality of Service (QoS). Hence to address these issues would require some advanced network resource management capabilities such as Network Functions Virtualization (NFV), Software Defined Networking (SDN). These technologies would help the operators to provide efficient services to consumer. In this literature we present survey of auto-scaling the resources required for LTE communication using SD...
VFAST Transactions on Education and Social Sciences, 2016
Entrepreneurial Self-Efficacy is the degree to which individuals identify themselves as having th... more Entrepreneurial Self-Efficacy is the degree to which individuals identify themselves as having the ability to accomplish the numerous roles and responsibilities of entrepreneurship effectively. This paper aims to develop and validate the scale to measure commerce and management graduates student's Entrepreneurial Self-Efficacy. We have used various validation techniques like face validity, logical validity, construct validity, criterion and discriminate validity to make our questioner standard. The factor analysis is used to handle the factors in the constructed scale. With the use of reliability of scale and factors analysis, the six factors present in the scale are finalized. The six factors are developed here are as a Product (13 Questions), Build innovative environment (5 Questions), Investor relationship (13 Questions), Define core purpose (07 Questions), Handle unexpected challenges (21 Questions), and Develop HR (15 Questions). We have made the Questionnaire of 74 questions and then validate it to test the Student's Entrepreneur Self-Efficacy among commerce and management graduates.
2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011), 2011
ABSTRACT Software Design Patterns (DPs) have been recognized as very important and useful in real... more ABSTRACT Software Design Patterns (DPs) have been recognized as very important and useful in real software development since they provide an elegant way of getting around problems that often occur. Researcher has built an ITS known as Human Knowledge Discovery Agent System-HKDA, which provides adaptive learning environment for the students by providing personalized instructions. The HKDA System makes inferences about student knowledge and interacts intelligently with students based upon individual representations of their knowledge. The design pattern system architecture of HKDA consists of eight main components. In this research, researchers are going to discuss about Student Modeller and Pedagogical Module. However, to provide a clear idea about design patterns, a small description about other components such as Domain Knowledge/Domain Model, Knowledge Management, Student Knowledge-base, Presentation Planner, Pedagogical Experts and Communication Knowledge are also given.
2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Jul 8, 2022
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), Mar 25, 2022
International Journal of Advanced Computer Science and Applications, 2017
The objective of this research study is to validate Indian Weighted Diabetes Risk Score (IWDRS). ... more The objective of this research study is to validate Indian Weighted Diabetes Risk Score (IWDRS). The IWDRS is derived by applying the novel concept of semantic discretization based on Data Mining techniques. 311 adult participants (age > 18 years), who have been tested for diabetes using the biochemical test in pathology laboratory according to World Health Organization (WHO) guidelines, were selected for this study. These subjects were not included for deriving IWDRS tool. IWDRS is calculated for all 311 subjects. Prediction parameters, such as sensitivity and specificity are evaluated along with other performance parameters for an optimal cutoff score for IWDRS. The IWDRS tool is validated and found to be highly sensitive in diagnosing diabetes positive cases at the same time it is almost equally specific for identifying diabetes negative cases as well. The result of IWDRS is compared with the results of another two similar studies conducted for the Indian population and found it better. At optimal cutoff score IWDRS>=294, the prediction accuracy is 82.32%, while sensitivity and specificity is 82.22% and 82.44%, respectively.
Smart innovation, systems and technologies, 2022
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC)
Smart innovation, systems and technologies, 2022
2022 3rd International Conference for Emerging Technology (INCET)
There is a great boom in e-learning in the area of technology-enhanced Intelligent Tutoring Educa... more There is a great boom in e-learning in the area of technology-enhanced Intelligent Tutoring Educational Systems where excellent virtual instructors/teachers guide their learners/students. Progress has been made, addressing a variety of educational needs, ranging from supplements to existing “traditional” courses, to complete on-line courses, to complete on-line programs. Despite all this effort, hype, and even product development, most of the courseware material available for use at the educational level is still not judged to be as effective as a teacher lecturing and leading discussions with students. It is often necessary for a teacher to prepare a test over information for which students have been previously quizzed or to administer multiple versions of same test. When this situation occurs, teachers are required to spend extra time creating equivalent questions. The major difficulty with this problem lies in efficiently creating sets of equivalent questions. To solve this probl...
2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T)
International Journal of Current Engineering and Scientific Research, 2018
Objectives of this research are to see the significant difference if any between executives and S... more Objectives of this research are to see the significant difference if any between executives and Supervisors belonging to a public & private organization to the need for fulfillment. It is also to see the significant difference if any between executives supervisors belonging to a public & private organization concerning the leadership styles & their effectiveness. There is also to see the significant difference in leadership styles & their effectiveness if any between a satisfied & dissatisfied group of respondents (executives & supervisors) with lower order needs in public & private organizations. The study was conducted independently in two large organizations of India. One is a public organization (Oil and Natural Gas Corporation, Surat) and the other one is a private organization (Essar Oil, Surat). The samples were collected on executives and supervisors of these organizations. The executives hold a distinct designation of managers/executives. ONGC, Surat was selected as a public organization and Essar Oil, Surat was selected as a private organization. A sample of 980 (public 430 and private 550) executives and the supervisor was given the porter need satisfaction questionnaire to measure the need fulfillment/dissatisfaction. The conclusion of the study is the executives of the public, and private organizations are not significantly different in case of the lower order needs and the result on higher order needs manifests that executives of the organizations are significantly different with each other. The supervisors of the public and privet organization are significantly different from each other. In need Hierarchy Level, i.e., lower and higher order needs. The respondents (executives and supervisors) of the public organization have preferred high relationship-low task leadership behavior as their dominant behavior. On the other hand, the respondents (executives and supervisors) of privet organization have preferred high task-high relationship behavior as their dominant behavior. The effectiveness variables imply that executives of public organist ions are more effective in comparison to executives of privet organizations, while supervisors of both organizations are equally effective. Because it is noted that the supervisor of both organizations are not significantly different from each other. This type of analysis of leader's (executives and supervisors) needs may be important for placing and promoting them. The need factor influences the productivity of any organist ion because it is supposed that the success of an organization depends upon the need and activities of the employees. This study is very important not only from the academic angle but also in practice terms and would be helpful to identify the difference between the two distinct managerial levels in an organization and the distinction between the two organizations.
International Journal of Innovative Technology and Exploring Engineering, 2020
Paper The objective of this research paper is to determine the understanding of students’ course ... more Paper The objective of this research paper is to determine the understanding of students’ course contents and evaluate student performance according to expectations. There are predefined navigation models available to answer Multiple Choice Questions (MCQs). The individual student responds to these questions in their navigation pattern that results in various Student Performance Outcomes. The research presents the process mining techniques to evaluate students’ answers in the MCQs predefined navigation model in the exaMAIZE Assessment System. This research shows that students navigate all the twenty-five questions according to their way of answering the exam, where seven questions are under high frequency and later analyze to revise the answer on suspicion or difficult. The experiment compared Student Exam Outcomes with the Student Performance Outcomes of each outcome, and the frequency of navigating a question to find out individual student Strengths and Weaknesses. This work can b...
International Journal of Current Engineering and Scientific Research, Jul 8, 2017
Society and cultural background of a person plays a vital role in the life of entrepreneurs. Entr... more Society and cultural background of a person plays a vital role in the life of entrepreneurs. Entrepreneurs start ventures, and when they grow, society and economy of a country also grow accordingly. Entrepreneurial education is also important for the entrepreneurs and his/her behavior. Friends, family, and peers also give moral and financial support to the entrepreneur which help him to take a risk and implement new ideas. The main thing to study is how social-cultural factors affect the behavior of entrepreneur or want to be an entrepreneur. This paper focuses on the social and cultural factors like religion, family, financial status, education, and ethics which affect the person who is an entrepreneur or want to be an entrepreneur. In this paper researchers have also analyzed the role of family, peer persons, education to develop the entrepreneur behavior.
International Journal of Current Engineering and Scientific Research, 2018
Mobile Ad-hoc Network (MANET) is a self-directed decentralized wireless network where mobile node... more Mobile Ad-hoc Network (MANET) is a self-directed decentralized wireless network where mobile nodes are move freely in the network with dynamic topology. Therefore, the main issue in MANET is security. The route search process in MANET performed by one of the responsive, active or hybrid route protocols. MANETs are vulnerable to any security attack, where one of these attacks is the black hole attack. In a black hole attack, where the malicious node advertises itself that it has the shortest route to the destination and tries to fool the source node. After the response received from the malicious node, the source node leaves all other paths and transferring data to the malicious node. Instead of forwarding to the next node, a malicious node leaves all data packets after data packet received from the source node. Common two classification of black hole attacks listed as: (i) Single Black Hole (SBH), and (ii) Cooperative Black Hole (CBH). In SBH attack, only one malicious node is present and whereas in CBH attack, there is two or more malicious node attack in cooperation with each other. Many techniques in literature available for the identification and prevention of black hole attack. In this research, the researcher discussed some techniques for detecting cooperative black hole attack in MANET using the Ad-hoc On-demand Distance Vector (AODV).
Control Theory and Informatics, 2014
The existing NIDSs involve various mechanisms in order to identify the patterns related to the ne... more The existing NIDSs involve various mechanisms in order to identify the patterns related to the network problems. In this paper we described the implementation of genetic algorithm using steady-state selection mechanism. We have performed various test cases in order to analyze the effect of varying iterations and varying initial chrome length along with different fitness functions. The analyzed result would be helpful to have quicker generation of reliable rule sets for Network Intrusion Detection System using less/more number of iterations, depending on the varying initial chrome length.
Lately Machine to Machine (M2M) Communication has gathered huge research interest because of its ... more Lately Machine to Machine (M2M) Communication has gathered huge research interest because of its peculiar nature of communication without any or less human intervention. With the increase in wide variety of devices and application, there is huge change in traffic patterns of Machine Type Communication (MTC) system. Existing traditional Long-Term Evolution (LTE) network will not be able to handle these growing demands of the bandwidth and network availability. There are some challenges in the existing network like latency, scalability, reliability, interference and delay, which degrade the Quality of Service (QoS). Hence to address these issues would require some advanced network resource management capabilities such as Network Functions Virtualization (NFV), Software Defined Networking (SDN). These technologies would help the operators to provide efficient services to consumer. In this literature we present survey of auto-scaling the resources required for LTE communication using SD...
VFAST Transactions on Education and Social Sciences, 2016
Entrepreneurial Self-Efficacy is the degree to which individuals identify themselves as having th... more Entrepreneurial Self-Efficacy is the degree to which individuals identify themselves as having the ability to accomplish the numerous roles and responsibilities of entrepreneurship effectively. This paper aims to develop and validate the scale to measure commerce and management graduates student's Entrepreneurial Self-Efficacy. We have used various validation techniques like face validity, logical validity, construct validity, criterion and discriminate validity to make our questioner standard. The factor analysis is used to handle the factors in the constructed scale. With the use of reliability of scale and factors analysis, the six factors present in the scale are finalized. The six factors are developed here are as a Product (13 Questions), Build innovative environment (5 Questions), Investor relationship (13 Questions), Define core purpose (07 Questions), Handle unexpected challenges (21 Questions), and Develop HR (15 Questions). We have made the Questionnaire of 74 questions and then validate it to test the Student's Entrepreneur Self-Efficacy among commerce and management graduates.
2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011), 2011
ABSTRACT Software Design Patterns (DPs) have been recognized as very important and useful in real... more ABSTRACT Software Design Patterns (DPs) have been recognized as very important and useful in real software development since they provide an elegant way of getting around problems that often occur. Researcher has built an ITS known as Human Knowledge Discovery Agent System-HKDA, which provides adaptive learning environment for the students by providing personalized instructions. The HKDA System makes inferences about student knowledge and interacts intelligently with students based upon individual representations of their knowledge. The design pattern system architecture of HKDA consists of eight main components. In this research, researchers are going to discuss about Student Modeller and Pedagogical Module. However, to provide a clear idea about design patterns, a small description about other components such as Domain Knowledge/Domain Model, Knowledge Management, Student Knowledge-base, Presentation Planner, Pedagogical Experts and Communication Knowledge are also given.