- Vehicular Ad Hoc Networks (VANETs)
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- IoT and Edge/Fog Computing
- Smart Agriculture and AI
- Cloud Computing and Resource Management
- Water Quality Monitoring Technologies
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Autonomous Vehicle Technology and Safety
- Artificial Intelligence in Healthcare
- UAV Applications and Optimization
- Security in Wireless Sensor Networks
- COVID-19 diagnosis using AI
- Anomaly Detection Techniques and Applications
- Blockchain Technology Applications and Security
- Parallel Computing and Optimization Techniques
- IoT-based Smart Home Systems
- Distributed and Parallel Computing Systems
- Advanced Malware Detection Techniques
- Context-Aware Activity Recognition Systems
- COVID-19 epidemiological studies
- Indoor and Outdoor Localization Technologies
- Internet of Things and AI
- Advanced Neural Network Applications
Maharaja Engineering College
2016-2025
Berhampur University
2017-2025
Biju Patnaik University of Technology
2020-2025
Mangalore University
2022
Indian Institute of Information Technology Allahabad
2021
Institute of Engineering
2021
Bridge University
2018
National Institute of Technology Rourkela
2011-2017
Vehicular communication is an important and emerging area of research in the field vehicular technology. The development software hardware systems leads to generation new networks. Many researches projects have been conducted this upcoming area. government implemented USA, Japan European Union. main objective using technology create accident free environment. New architectures, protocols implementations ad‐hoc network (VANET) made recent years provide Intelligent Transportation Services. In...
e-Learning is a sought-after option for learners during pandemic situations. In platforms, there are many courses available, and the user needs to select best them. Thus, recommender systems play an important role provide better automation services users in making course choices. It makes recommendations selecting desired based on their preferences. This system can use machine intelligence (MI)-based techniques carry out recommendation mechanism. Based preferences history, this able know...
In the traditional irrigation process, a huge amount of water consumption is required which leads to wastage. To reduce wasting for this tedious task, an intelligent system urgently needed. The era machine learning (ML) and Internet Things (IoT) brings it great advantage building that performs task automatically with minimal human effort. study, IoT enabled ML-trained recommendation proposed efficient usage nominal intervention farmers. devices are deployed in crop field precisely collect...
Cardiovascular Diseases (CVDs), or heart diseases, are one of the top-ranking causes death worldwide. About 1 in every 4 deaths is related to which broadly classified as various types abnormal conditions. However, diagnosis CVDs a time-consuming process data obtained from clinical tests manually analyzed. Therefore, new approaches for automating detection such irregularities human conditions should be developed provide medical practitioners with faster analysis by reducing time obtaining and...
In the cloud computing environment, scheduling algorithms show vital role of finding a possible schedule tasks. Extant literatures have shown that task problem is NP-Complete as objective to obtain minimum overall execution time. this paper, we address set l tasks with |G| groups m clouds, such layover time minimized. Note sum timing gaps between paired Here, present pair-based algorithm for which based on well-known optimization algorithm, called Hungarian algorithm. The proposed considers...
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of nodes. The attacker disrupts parameters by launching attacks at different layers WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed secure WSN detecting attackers layers. trust value node calculated using deviation metrics each with respect attacks. Mainly, we consider trustworthiness in three such as physical trust,...
Localization is one of the most challenging issues in wireless sensor networks. It broadly classified into range-based and range-free. The schemes are generally expensive, require additional range determining hardware. Besides, free simple, inexpensive, energy efficient, where localization performed using proximity information. In this paper, we have proposed an analytical geometry-based range-free scheme, a mobile beacon used as reference node. scheme uses three non-collinear points to...
Fire is the most widespread cause of death by accident. affects thousand residents each year, resulting in injury and loss life. In this paper, an Internet Things (IoT) based Detection System (FireDS-IoT) designed to prevent people from fire providing alert message emergency. The system using MQ-135 (CO_2), MQ-2 (smog), MQ-7 (CO) DHT-11 (temperature) sensors embedded with Arduino get event information surrounding more accurately. This research distinguishes conditions a as fire, no may be...
Fog computing has been prioritized over cloud in terms of latency-sensitive Internet Things (IoT) based services. We consider a limited resource-based fog system where real-time tasks with heterogeneous resource configurations are required to allocate within the execution deadline. Two modules designed handle continuous streaming tasks. The first module is task classification and buffering (TCB), which classifies heterogeneity using dynamic fuzzy c-means clustering buffers into parallel...
In today's world, maintaining good health has become increasingly paramount. The global prevalence of diabetes surged due to the stress modern life and unhealthy dietary habits. Detecting at an early stage imperative. Leveraging advancements in Cloud Fog computing, we can create Internet-enabled Medical framework that incorporates Machine Learning (ML) techniques predict diagnose its inception. This prediction diagnosis would enable remote medical assistance for individuals living far from...
Round Robin (RR) scheduling algorithm is a preemptive algorithm. It designed especially for time sharing Operating System (OS). In RR the CPU switches between processes when static Time Quantum (TQ) expires. considered as most widely used in research because TQ equally shared among processes. this paper newly proposed variant of called Min-Max (MMRR) presented. The idea MMRR to make repeatedly adjusted using dispersion measure accordance with remaining burst time. Our experimental analysis...
Security in routing is an important issue vehicular ad hoc network (VANET) to protect the valuable information. However, this intelligent transportation system (ITS) services provided by VANET are affected malicious vehicles. In study, a secure and (SIR) protocol proposed transmit data quickest path through authenticated Sending most connected with less link connection problem enhances performance selecting vehicles protects from attacks. protocol, weight W calculated for every neighbouring...
Environment monitoring is an important area apart from environmental safety and pollution control. Such performed by the physical models of atmosphere unstable inaccurate. Machine Learning (ML) techniques on other hand are more robust in capturing dynamics environment. In this paper, a novel approach proposed to build cost-effective standardized environment system (IoT-EMS) volunteer computing computing, volunteers (people) share their resources for distributed perform task (environment...
Abstract Effective lubrication is one of the most vital aspects for desirable productivity in mechanical systems. This can be achieved through reduced friction and wear between mating components by proper lubrication. But hazardous impact these chemical lubricants such as petroleum-based oils on our environment cannot disregarded. So, consistent quest a better alternative to emissions-causing has opened great avenue practice applying biodiesel like jatropha oil lubricant. The application...
Nowadays, diabetes is a common disease that affects millions of people over the world, and women are mostly affected by this disease. Recent healthcare studies have applied various innovative advanced technologies to diagnose predict their based on clinical data. One such machine learning (ML) in which diagnosis prediction can be made more accurately. In paper, designed model predicts females Pima Indians heritage taking dataset. Here, problem considered as binary classification problem....
Nowadays, fog computing plays a very vital role in providing many services to end-based IoT (Internet of Things) systems. The end devices communicate with the middle layer nodes and above cloud process user tasks. However, this large data communication experiences security challenges as are being compromised thus at more prone critical attack known Distributed Denial Service (DDoS) attack. attackers or need be detected well network. Deep Learning (DL) prominent predicting end-user behavior...