- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- Interconnection Networks and Systems
- Mobile Ad Hoc Networks
- Distributed and Parallel Computing Systems
- Software-Defined Networks and 5G
- Indoor and Outdoor Localization Technologies
- Energy Harvesting in Wireless Networks
- Opportunistic and Delay-Tolerant Networks
- Optimization and Search Problems
- Robotic Path Planning Algorithms
- graph theory and CDMA systems
- Advanced Optical Network Technologies
- Natural Language Processing Techniques
- Stochastic Gradient Optimization Techniques
- Algorithms and Data Compression
- Crop Yield and Soil Fertility
- Distributed systems and fault tolerance
- Caching and Content Delivery
- Scientific Computing and Data Management
- Security in Wireless Sensor Networks
- Child Nutrition and Water Access
- Mobile Crowdsensing and Crowdsourcing
- Agricultural Science and Fertilization
University of Chester
2025
Krishi Vigyan Kendra, Ghatkhed Amravati
2019-2024
University of Calcutta
2015-2024
Bangladesh University of Professionals
2024
Integrated Test Range
2023-2024
Central Institute of Technology Kokrajhar
2024
Tata Consultancy Services (India)
2023
South Asian University
2022
Kolkata Municipal Corporation
2021
Raiganj University
2015-2019
The objective of this work is to develop a mathematical model for the integration electric vehicle (EVs) grid. Integrating EV with grid would help in simultaneous charging numerous EVs and provide peak hour energy (from EV). This bi-directional exchange between results complex financial calculations. So simple has been proposed. provided by depends on battery capacity. Battery capacity affected losses (CL). includes possible cases CL, such as CL due usage (discharge during transportation)...
Background: Food security and dietary diversity are essential determinants of maternal health, particularly among pregnant women in refugee populations who face heightened vulnerabilities due to displacement inadequate living conditions. This study examines the impact food on nutritional intake Rohingya residing makeshift camps Ukhiya, Cox's Bazar. Methods: A descriptive cross-sectional was conducted 96 from June September 2022. Data were collected using structured questionnaires assessing...
The rapid advancement of technology in education has opened new avenues for integrating indigenous knowledge systems into modern pedagogical frameworks. In India, the Indian Knowledge System (IKS)—comprising ancient texts, oral traditions, and philosophical treatises—offers a vast repository wisdom that can enrich teacher education. Libraries, as traditional custodians knowledge, are pivotal digitizing these resources to align them with technology-enhanced teaching practices. This paper...
A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such manner the interconnections between capable changing on continual basis. Due to security vulnerabilities routing protocols, wireless ad-hoc networks unprotected attacks malicious nodes. One these Black Hole Attack. In this paper, we give an algorithmic approach focus analyzing improving AODV, which one popular protocols for MANET. Our aim ensuring against hole attack. The proposed...
In today's world, Internet of Things (IoT) is a different development. With the help IoT, all physical objects can connect to internet. And with this we consider two layers system viz: sensor device which gathers data and links cloud next service hosts information from th e en vironmen t. storage rooms industries need good environment for products be healthy use. Here develop monitoring IoT. The entrance used as part system. strategy use several access methods such Wi-Fi, GPRS, Ethernet etc....
Cloud service providers (CSPs) adapt different pricing models for their offered services. Some of the are suitable short term requirement while others may be cloud user's (CSU) long requirement. For example, reservation-based model is appropriate a CSU's demand resources. Finding optimal amount resources to reserved in advance, minimize total cost, needs sufficient research effort. Various algorithms were discussed last couple years solve resource reservation problem but most them based on...
This article describes an approach to unsupervised learning of morphology from unannotated corpus for a highly inflectional Indo-European language called Assamese spoken by about 30 million people. Although is one Indias national languages, it utterly lacks computational linguistic resources. There exists no prior work on this widely in northeast India. The presented pioneering respect. In article, we discuss salient issues where the presence large number suffixal determiners, sandhi, samas,...
A mobile ad-hoc network (or simply a MANET) is type of infrastructure-less as well wireless network. MANET depends mainly on nodes for its functionality. Since are and distributive in nature also communicating devices or resource-restricted equipped with micro bio sensors to acknowledge the signals where only traditional security systems based cryptography encryption not sufficient promising level assurance. Hence this paper we explore trust challenges improve assurance MANET. In winding up,...
Words play a crucial role in aspects of natural language understanding such as syntactic and semantic processing. Usually, system either already knows the words that appear text, or is able to automatically learn relevant information about word upon encountering it. capable system---human machine, subset entire vocabulary morphological rules determine attributes not seen before. Developing knowledge base legal an important task computational linguistics. In this paper, we describe initial...
In this paper, we consider the problem of covering all regions interests (targets) by relocating a set mobile sensors such that total movement made them is minimized. This itself challenging one and addressed recently some researchers under free mobility model. We more restricted version where can move only in two mutually perpendicular directions. first show optimal point to which sensor must cover specific target different model from freely, characterize point. On basis observation, have...