Sourav Kumar Bhoi

ORCID: 0000-0002-5173-3453
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • IoT and Edge/Fog Computing
  • Smart Agriculture and AI
  • Cloud Computing and Resource Management
  • Water Quality Monitoring Technologies
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Autonomous Vehicle Technology and Safety
  • Artificial Intelligence in Healthcare
  • UAV Applications and Optimization
  • Security in Wireless Sensor Networks
  • COVID-19 diagnosis using AI
  • Anomaly Detection Techniques and Applications
  • Blockchain Technology Applications and Security
  • Parallel Computing and Optimization Techniques
  • IoT-based Smart Home Systems
  • Distributed and Parallel Computing Systems
  • Advanced Malware Detection Techniques
  • Context-Aware Activity Recognition Systems
  • COVID-19 epidemiological studies
  • Indoor and Outdoor Localization Technologies
  • Internet of Things and AI
  • Advanced Neural Network Applications

Maharaja Engineering College
2016-2025

Berhampur University
2017-2025

Biju Patnaik University of Technology
2020-2025

Mangalore University
2022

Indian Institute of Information Technology Allahabad
2021

Institute of Engineering
2021

Bridge University
2018

National Institute of Technology Rourkela
2011-2017

Vehicular communication is an important and emerging area of research in the field vehicular technology. The development software hardware systems leads to generation new networks. Many researches projects have been conducted this upcoming area. government implemented USA, Japan European Union. main objective using technology create accident free environment. New architectures, protocols implementations ad‐hoc network (VANET) made recent years provide Intelligent Transportation Services. In...

10.1049/iet-net.2013.0065 article EN IET Networks 2014-07-24

e-Learning is a sought-after option for learners during pandemic situations. In platforms, there are many courses available, and the user needs to select best them. Thus, recommender systems play an important role provide better automation services users in making course choices. It makes recommendations selecting desired based on their preferences. This system can use machine intelligence (MI)-based techniques carry out recommendation mechanism. Based preferences history, this able know...

10.3390/electronics12010157 article EN Electronics 2022-12-29

In the traditional irrigation process, a huge amount of water consumption is required which leads to wastage. To reduce wasting for this tedious task, an intelligent system urgently needed. The era machine learning (ML) and Internet Things (IoT) brings it great advantage building that performs task automatically with minimal human effort. study, IoT enabled ML-trained recommendation proposed efficient usage nominal intervention farmers. devices are deployed in crop field precisely collect...

10.7717/peerj-cs.578 article EN cc-by PeerJ Computer Science 2021-06-21

Cardiovascular Diseases (CVDs), or heart diseases, are one of the top-ranking causes death worldwide. About 1 in every 4 deaths is related to which broadly classified as various types abnormal conditions. However, diagnosis CVDs a time-consuming process data obtained from clinical tests manually analyzed. Therefore, new approaches for automating detection such irregularities human conditions should be developed provide medical practitioners with faster analysis by reducing time obtaining and...

10.1016/j.health.2022.100133 article EN cc-by Healthcare Analytics 2022-12-29

In the cloud computing environment, scheduling algorithms show vital role of finding a possible schedule tasks. Extant literatures have shown that task problem is NP-Complete as objective to obtain minimum overall execution time. this paper, we address set l tasks with |G| groups m clouds, such layover time minimized. Note sum timing gaps between paired Here, present pair-based algorithm for which based on well-known optimization algorithm, called Hungarian algorithm. The proposed considers...

10.1016/j.jksuci.2018.10.001 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2018-10-03

Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of nodes. The attacker disrupts parameters by launching attacks at different layers WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed secure WSN detecting attackers layers. trust value node calculated using deviation metrics each with respect attacks. Mainly, we consider trustworthiness in three such as physical trust,...

10.1155/2019/2054298 article EN cc-by Journal of Computer Networks and Communications 2019-01-06

10.1007/s12652-020-01711-x article EN Journal of Ambient Intelligence and Humanized Computing 2020-01-20

Localization is one of the most challenging issues in wireless sensor networks. It broadly classified into range-based and range-free. The schemes are generally expensive, require additional range determining hardware. Besides, free simple, inexpensive, energy efficient, where localization performed using proximity information. In this paper, we have proposed an analytical geometry-based range-free scheme, a mobile beacon used as reference node. scheme uses three non-collinear points to...

10.1109/jsen.2017.2725343 article EN IEEE Sensors Journal 2017-07-11

Fire is the most widespread cause of death by accident. affects thousand residents each year, resulting in injury and loss life. In this paper, an Internet Things (IoT) based Detection System (FireDS-IoT) designed to prevent people from fire providing alert message emergency. The system using MQ-135 (CO_2), MQ-2 (smog), MQ-7 (CO) DHT-11 (temperature) sensors embedded with Arduino get event information surrounding more accurately. This research distinguishes conditions a as fire, no may be...

10.1109/icit.2018.00042 article EN 2018-12-01

Fog computing has been prioritized over cloud in terms of latency-sensitive Internet Things (IoT) based services. We consider a limited resource-based fog system where real-time tasks with heterogeneous resource configurations are required to allocate within the execution deadline. Two modules designed handle continuous streaming tasks. The first module is task classification and buffering (TCB), which classifies heterogeneity using dynamic fuzzy c-means clustering buffers into parallel...

10.3390/electronics11193207 article EN Electronics 2022-10-06

In today's world, maintaining good health has become increasingly paramount. The global prevalence of diabetes surged due to the stress modern life and unhealthy dietary habits. Detecting at an early stage imperative. Leveraging advancements in Cloud Fog computing, we can create Internet-enabled Medical framework that incorporates Machine Learning (ML) techniques predict diagnose its inception. This prediction diagnosis would enable remote medical assistance for individuals living far from...

10.1145/3711859 article EN ACM Transactions on Internet Technology 2025-02-17

Round Robin (RR) scheduling algorithm is a preemptive algorithm. It designed especially for time sharing Operating System (OS). In RR the CPU switches between processes when static Time Quantum (TQ) expires. considered as most widely used in research because TQ equally shared among processes. this paper newly proposed variant of called Min-Max (MMRR) presented. The idea MMRR to make repeatedly adjusted using dispersion measure accordance with remaining burst time. Our experimental analysis...

10.48550/arxiv.1404.5869 preprint EN other-oa arXiv (Cornell University) 2014-01-01

Security in routing is an important issue vehicular ad hoc network (VANET) to protect the valuable information. However, this intelligent transportation system (ITS) services provided by VANET are affected malicious vehicles. In study, a secure and (SIR) protocol proposed transmit data quickest path through authenticated Sending most connected with less link connection problem enhances performance selecting vehicles protects from attacks. protocol, weight W calculated for every neighbouring...

10.1049/iet-net.2014.0053 article EN IET Networks 2014-09-25

Environment monitoring is an important area apart from environmental safety and pollution control. Such performed by the physical models of atmosphere unstable inaccurate. Machine Learning (ML) techniques on other hand are more robust in capturing dynamics environment. In this paper, a novel approach proposed to build cost-effective standardized environment system (IoT-EMS) volunteer computing computing, volunteers (people) share their resources for distributed perform task (environment...

10.32604/iasc.2022.022833 article EN cc-by Intelligent Automation & Soft Computing 2021-12-09

Abstract Effective lubrication is one of the most vital aspects for desirable productivity in mechanical systems. This can be achieved through reduced friction and wear between mating components by proper lubrication. But hazardous impact these chemical lubricants such as petroleum-based oils on our environment cannot disregarded. So, consistent quest a better alternative to emissions-causing has opened great avenue practice applying biodiesel like jatropha oil lubricant. The application...

10.1115/1.4067835 article EN Journal of Tribology 2025-02-06

Nowadays, diabetes is a common disease that affects millions of people over the world, and women are mostly affected by this disease. Recent healthcare studies have applied various innovative advanced technologies to diagnose predict their based on clinical data. One such machine learning (ML) in which diagnosis prediction can be made more accurately. In paper, designed model predicts females Pima Indians heritage taking dataset. Here, problem considered as binary classification problem....

10.17762/turcomat.v12i10.4958 article EN Turkish Journal of Computer and Mathematics Education (TURCOMAT) 2021-04-28

Nowadays, fog computing plays a very vital role in providing many services to end-based IoT (Internet of Things) systems. The end devices communicate with the middle layer nodes and above cloud process user tasks. However, this large data communication experiences security challenges as are being compromised thus at more prone critical attack known Distributed Denial Service (DDoS) attack. attackers or need be detected well network. Deep Learning (DL) prominent predicting end-user behavior...

10.1155/2022/3747302 article EN Mathematical Problems in Engineering 2022-08-08
Coming Soon ...