Sauvik Bal

ORCID: 0000-0001-5569-1855
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Energy Efficient Wireless Sensor Networks
  • Topic Modeling
  • User Authentication and Security Systems
  • Natural Language Processing Techniques
  • Spam and Phishing Detection
  • AI in Service Interactions
  • Sentiment Analysis and Opinion Mining
  • Advanced Malware Detection Techniques
  • Mobile Ad Hoc Networks
  • Cryptography and Data Security
  • Advanced Wireless Network Optimization
  • Security in Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • Aquatic Invertebrate Ecology and Behavior
  • Digital Media Forensic Detection
  • Consumer Retail Behavior Studies
  • Cryptography and Residue Arithmetic
  • Video Coding and Compression Technologies
  • Cryptographic Implementations and Security
  • Network Traffic and Congestion Control
  • Advanced Text Analysis Techniques
  • EEG and Brain-Computer Interfaces
  • Artificial Intelligence in Healthcare
  • Multimodal Machine Learning Applications

Techno India University
2024

Haldia Institute of Technology
2022

University of Engineering & Management
2015-2021

Li Fi (Light Fidelity) is a wireless communication system by which we can access the internet.Li uses light for communication.So it very easy to use in practical life.Here I propose technique using monitoring any li-fi enable component.Also this create clear view of road map.We also method security purpose. .Suppose person/car walking through road.By identify where person is.The side lamp posts are used as source light.Every should have photo detector device.That receiver.So easily...

10.15623/ijret.2015.0401001 article EN International Journal of Research in Engineering and Technology 2015-01-25

Sometimes malnourished children fall into some serious health issues. And doctors are unable to find out the root causes of their illness, but they used apply practices which were not appropriate for every child. Children often die because this reason. So, it is very dangerous children. Along these lines, fundamental point our review anticipate hunger status a 1 5 years more established kid in Asia by utilizing AI. Looked ongoing examination papers (2010 - 2020) identified and combined...

10.1109/iemecon53809.2021.9689083 article EN 2021-12-01

In this paper we have proposed an smart health service for victims in emergency scenario to allow the interconnect without conventional infrastructure. This is provided using DTN architecture. By system architecture, identification of injured people will be easy as it provide information about seriousness condition affected person, so that rescue team can prioritize more critically person at time.

10.1109/uemcon.2016.7777878 article EN 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) 2016-10-01

The overall support and trustworthiness among nodes in wireless environment to relay each other's packets expose them a wide range of security attacks. Wireless sensor networks (WSNs) introduce new standard ambient supervision with many potential applications. Mobile Ad-hoc make very attractive the challengers they become vulnerable some types intruders since are arranged open unsecured atmosphere comprised low-priced small devices. This paper introduces an algorithm design network (MANET)...

10.1109/uemcon.2016.7777831 article EN 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) 2016-10-01

Data Security is very much important in every aspect of data collection as well storage. Hardware device like USB useful worldwide order to store real time confidential data. So it necessary provide hardware level security small storage pen drive, external hard disk etc. In this context cryptography one the most promising technique encrypt actual other form. paper, we propose a robust encryption which will keep safe from theft. Our proposed algorithm associated with drive and disk.

10.1109/ccwc.2018.8301636 article EN 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) 2018-01-01

Today, there are many ways to obtain data from computer systems by making the system vulnerable. Different security protocols available which offer different levels of secure SMTP. E-mail suffers various message integrity problems like spamming, phishing, sender spoofing, date spoofing etc. The technique based on encryption and decryption methods can be used provide more in information technologies. This paper describes a new algorithm that was developed secret key or shared introduces an...

10.1109/iemcon.2015.7344481 article EN 2015-10-01

A portable memory stick or USB data storage devices/microsd card readers have been widely popular these days and so is the urge in prevention of exposure confidentiality those information stored peripheral devices. Due to easy portability accessibility, oriented devices quite a days; not only it very much flexible feasible commercial purposes but also for personalized uses. Here this paper, an unique idea proposed securing microSD readers/USB with help symmetric cryptographic encryption...

10.1109/iemeconx.2019.8877012 article EN 2019-03-01

In this paper, we develop an approach to optimize power consumption using solar energy and also for storing as backup resource.The following aspects of paper are 1) location management based on update (LU) paging method by considering the area (LA) architecture in personal communication service (PCS) networks.2) Try reduce cost utilizing global natural resource harvester 3) create a storage during day-off situation.

10.5120/20604-3209 article EN International Journal of Computer Applications 2015-05-20

In recent trends Ultra wide-band Wireless Body Area Networks have rapidly progressed in biotelemetry system which is most dominant field today's research work. hyperthermia and needs the concept of implemented antenna human body. To construct practical use antennas inside a body, resonance characteristics implanted their radiation pattern at receiver end located outside body must be evaluate through numerical analysis measurement set up. The design parameter has to consider on surrounding...

10.1109/ccwc.2018.8301637 article EN 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) 2018-01-01

The study revealed that amongst all parameters, longitude, latitude, elevation and habitat maximum correlation with distribution of earthworms.The methodology used is the first report application heatmap in ecological earthworms.

10.55362/ije/2022/3624 article EN Indian Journal of Ecology 2022-06-15

The increase of internet usage in recent times has been a noticeable change this generation. Users from all over the world use social sites to interact across world. Countless websites are present today. With countless networks and sites, some people or companies tend create new ways lure out random users using web, such as phishing. In phishing, normal swindled fraudulent websites. aim is identify phishing with great accuracy compare different methods by which can be tracked an easier more...

10.4018/ijisp.310069 article EN International Journal of Information Security and Privacy 2022-11-11
Coming Soon ...