Rajib K. Das

ORCID: 0000-0002-4962-6448
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Energy Efficient Wireless Sensor Networks
  • Interconnection Networks and Systems
  • Mobile Ad Hoc Networks
  • Distributed and Parallel Computing Systems
  • Software-Defined Networks and 5G
  • Indoor and Outdoor Localization Technologies
  • Energy Harvesting in Wireless Networks
  • Opportunistic and Delay-Tolerant Networks
  • Optimization and Search Problems
  • Robotic Path Planning Algorithms
  • graph theory and CDMA systems
  • Advanced Optical Network Technologies
  • Natural Language Processing Techniques
  • Stochastic Gradient Optimization Techniques
  • Algorithms and Data Compression
  • Crop Yield and Soil Fertility
  • Distributed systems and fault tolerance
  • Caching and Content Delivery
  • Scientific Computing and Data Management
  • Security in Wireless Sensor Networks
  • Child Nutrition and Water Access
  • Mobile Crowdsensing and Crowdsourcing
  • Agricultural Science and Fertilization

University of Chester
2025

Krishi Vigyan Kendra, Ghatkhed Amravati
2019-2024

University of Calcutta
2015-2024

Bangladesh University of Professionals
2024

Integrated Test Range
2023-2024

Central Institute of Technology Kokrajhar
2024

Tata Consultancy Services (India)
2023

South Asian University
2022

Kolkata Municipal Corporation
2021

Raiganj University
2015-2019

The objective of this work is to develop a mathematical model for the integration electric vehicle (EVs) grid. Integrating EV with grid would help in simultaneous charging numerous EVs and provide peak hour energy (from EV). This bi-directional exchange between results complex financial calculations. So simple has been proposed. provided by depends on battery capacity. Battery capacity affected losses (CL). includes possible cases CL, such as CL due usage (discharge during transportation)...

10.1109/tsg.2013.2275979 article EN IEEE Transactions on Smart Grid 2013-09-17

Background: Food security and dietary diversity are essential determinants of maternal health, particularly among pregnant women in refugee populations who face heightened vulnerabilities due to displacement inadequate living conditions. This study examines the impact food on nutritional intake Rohingya residing makeshift camps Ukhiya, Cox's Bazar. Methods: A descriptive cross-sectional was conducted 96 from June September 2022. Data were collected using structured questionnaires assessing...

10.31586/ujfs.2022.6038 article EN cc-by 2025-03-06

The rapid advancement of technology in education has opened new avenues for integrating indigenous knowledge systems into modern pedagogical frameworks. In India, the Indian Knowledge System (IKS)—comprising ancient texts, oral traditions, and philosophical treatises—offers a vast repository wisdom that can enrich teacher education. Libraries, as traditional custodians knowledge, are pivotal digitizing these resources to align them with technology-enhanced teaching practices. This paper...

10.36713/epra20532 article EN EPRA International Journal of Multidisciplinary Research (IJMR) 2025-03-11

A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such manner the interconnections between capable changing on continual basis. Due to security vulnerabilities routing protocols, wireless ad-hoc networks unprotected attacks malicious nodes. One these Black Hole Attack. In this paper, we give an algorithmic approach focus analyzing improving AODV, which one popular protocols for MANET. Our aim ensuring against hole attack. The proposed...

10.48550/arxiv.1206.3764 preprint EN other-oa arXiv (Cornell University) 2012-01-01

In today's world, Internet of Things (IoT) is a different development. With the help IoT, all physical objects can connect to internet. And with this we consider two layers system viz: sensor device which gathers data and links cloud next service hosts information from th e en vironmen t. storage rooms industries need good environment for products be healthy use. Here develop monitoring IoT. The entrance used as part system. strategy use several access methods such Wi-Fi, GPRS, Ethernet etc....

10.1109/ic3tsn.2017.8284459 article EN 2017-10-01

Cloud service providers (CSPs) adapt different pricing models for their offered services. Some of the are suitable short term requirement while others may be cloud user's (CSU) long requirement. For example, reservation-based model is appropriate a CSU's demand resources. Finding optimal amount resources to reserved in advance, minimize total cost, needs sufficient research effort. Various algorithms were discussed last couple years solve resource reservation problem but most them based on...

10.1109/tcc.2014.2369434 article EN IEEE Transactions on Cloud Computing 2014-11-11

This article describes an approach to unsupervised learning of morphology from unannotated corpus for a highly inflectional Indo-European language called Assamese spoken by about 30 million people. Although is one Indias national languages, it utterly lacks computational linguistic resources. There exists no prior work on this widely in northeast India. The presented pioneering respect. In article, we discuss salient issues where the presence large number suffixal determiners, sandhi, samas,...

10.1145/1386869.1386871 article EN ACM Transactions on Asian Language Information Processing 2008-06-01

10.1007/s12298-011-0061-y article EN Physiology and Molecular Biology of Plants 2011-04-01

A mobile ad-hoc network (or simply a MANET) is type of infrastructure-less as well wireless network. MANET depends mainly on nodes for its functionality. Since are and distributive in nature also communicating devices or resource-restricted equipped with micro bio sensors to acknowledge the signals where only traditional security systems based cryptography encryption not sufficient promising level assurance. Hence this paper we explore trust challenges improve assurance MANET. In winding up,...

10.1109/isacc.2015.7377359 article EN 2015-09-01

Words play a crucial role in aspects of natural language understanding such as syntactic and semantic processing. Usually, system either already knows the words that appear text, or is able to automatically learn relevant information about word upon encountering it. capable system---human machine, subset entire vocabulary morphological rules determine attributes not seen before. Developing knowledge base legal an important task computational linguistics. In this paper, we describe initial...

10.3115/1118647.1118648 article EN 2002-01-01

In this paper, we consider the problem of covering all regions interests (targets) by relocating a set mobile sensors such that total movement made them is minimized. This itself challenging one and addressed recently some researchers under free mobility model. We more restricted version where can move only in two mutually perpendicular directions. first show optimal point to which sensor must cover specific target different model from freely, characterize point. On basis observation, have...

10.1109/access.2018.2801941 article EN cc-by IEEE Access 2018-01-01
Coming Soon ...