Biswaranjan Senapati

ORCID: 0000-0002-0717-5888
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Artificial Intelligence in Healthcare
  • Artificial Intelligence in Education
  • Cloud Data Security Solutions
  • Technology and Human Factors in Education and Health
  • Quantum Computing Algorithms and Architecture
  • Software Reliability and Analysis Research
  • Network Security and Intrusion Detection
  • Digital Transformation in Industry
  • Privacy, Security, and Data Protection
  • Reliability and Maintenance Optimization
  • Innovative Teaching Methods
  • Radiation Shielding Materials Analysis
  • Advanced Scientific Research Methods
  • Quantum Mechanics and Applications
  • Technology and Data Analysis
  • Advanced Steganography and Watermarking Techniques
  • Corporate Social Responsibility Reporting
  • Online Learning and Analytics
  • Cloud Computing and Resource Management
  • Opportunistic and Delay-Tolerant Networks
  • Education and Professional Development
  • Autonomous Vehicle Technology and Safety
  • Innovation in Digital Healthcare Systems
  • Advanced Manufacturing and Logistics Optimization
  • Advanced Research in Systems and Signal Processing

University of Arkansas at Little Rock
2024-2025

Siksha O Anusandhan University
2025

Parker Hannifin (United States)
2023-2024

Infotech Soft (United States)
2024

Suez University
2024

National College of Business Administration and Economics
2024

Capitol Technology University
2023

This research proposes a successful technique for identifying individuals using feature extraction methods and signal processing approaches. The novelty of this study is in the use conjunction with other signal-processing While working sensors, an artificial neural network (ANN) employed to identify scent patterns that are present persons. numerous gases released by human body measured ten different kinds all which metal oxide semiconductors. Before ANN generate from sensor data, it...

10.1109/access.2024.3373646 article EN cc-by-nc-nd IEEE Access 2024-01-01

In distributed computing, data trading mechanisms are essential for ensuring the sharing of across multiple computing nodes. Nevertheless, they currently encounter considerable obstacles, including low accuracy in matching parties, fairness transactions, and safeguarding privacy throughout process. To address these issues, we put forward a security scheme based on zero-knowledge proofs smart contracts. phase preparing parameters, objective is to reduce complexity generating non-interactive...

10.37256/ccds.6220256292 article EN Cloud Computing and Data Science 2025-03-10

A fundamental and computationally challenging task in the development of dynamic software is organizing optimization resource consumption to complete work within a given time limit. Certain robust approaches are essential meet users' requirements for preventing or repairing defects, particularly when object communications expected inherit variety environments. In this study, technique anticipating run-time issues creation demonstrated large number objects must communicate with each other,...

10.1109/icest56843.2023.10138846 article EN 2023-01-09

A disaster is an event that obstructs the regular course of events. Communication between nodes severely hindered during disasters. As a result, ad-hoc network method was necessary to manage global emergency circumstances. During management, role information technology in terms communication critical. mobile one self-organizes and controls itself without aid centralized management unpredictably changing Mobile ad hoc (MANET) can be highly helpful emergencies. In crisis, route discovery MANET...

10.1109/icest56843.2023.10138831 article EN 2023-01-09

This paper presents the best outcome of Quantum communication use case industrial manufacturing, using quantum theory to achieve secure data transfer between production facilities and units, especially in most restricted manufacturing (i.e., Air Defense units). computing has several features support units within defense products. Users must validate their user credentials other essential information access critical from source target system. We introduce Rawal Liang Peter's (RLP) sequence...

10.1016/j.csa.2023.100019 article EN cc-by Cyber Security and Applications 2023-05-25

Currently, autonomous vehicles, non-autonomous and VIP (emergency) cars are using intelligent road management techniques to interact with one another enhance the effectiveness of traffic system. All sorts vehicles managed under control intersection unit approach. This study focuses on transportation networks where a major disruption, accounting for 40% accidents 80% delays. Intelligent Mobility (IM) is strategy promoted in this that proposes setting up channels all vehicle communication. As...

10.3390/wevj14090238 article EN cc-by World Electric Vehicle Journal 2023-09-01

The increased usage of digital technologies across businesses has led to an increase in cybercrime. It is difficult for existing intrusion detection systems detect highly skilled hacking attempts; however, machine learning been suggested as a way around these drawbacks. purpose this study evaluate how well various algorithms identify and stop cyberattacks diverse network, system, application environments. goal the provide designers with thorough grasp benefits drawbacks using cyber...

10.3844/jcssp.2025.111.123 article EN cc-by Journal of Computer Science 2025-01-01

Being overweight may be caused by eating too many calories. It is a curable medical condition defined abnormal fat accumulation in the body. Diabetes, excessive cholesterol, and heart attacks are most common, although high blood pressure, colon cancer, prostate cancer also common. Computer techniques often utilized to address such difficulties. In this work, we develop system that detects identifies food allergies using photographs. To summaries, powerful computer algorithms as transfer...

10.1109/eit57321.2023.10187288 article EN 2023-05-18

<title>Abstract</title> Cloud computing is a cutting-edge technology that rapidly gaining traction in the information (IT) sector. Although it has many benefits, there are also disadvantages, most notably difficulties and vulnerability security. This study describes multiple architectures for secure communication over private cloud. We developed unique custom approach incorporates steganography to provide an additional degree of security cloud data transport. Our suggested technique...

10.21203/rs.3.rs-3174407/v1 preprint EN cc-by Research Square (Research Square) 2023-07-20

<title>Abstract</title> The full text of this preprint has been withdrawn by the authors due to author disagreement with posting preprint. Therefore, do not wish work be cited as a reference. Questions should directed corresponding author.

10.21203/rs.3.rs-3174407/v2 preprint EN cc-by Research Square (Research Square) 2024-05-07

10.1109/isec61299.2024.10664823 article EN 2022 IEEE Integrated STEM Education Conference (ISEC) 2024-03-09
Coming Soon ...