Somen Nayak

ORCID: 0000-0002-7291-0965
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT-based Smart Home Systems
  • Medical Image Segmentation Techniques
  • Radiomics and Machine Learning in Medical Imaging
  • Advanced Malware Detection Techniques
  • Engineering and Technology Innovations
  • Energy Efficient Wireless Sensor Networks
  • Brain Tumor Detection and Classification
  • Mobile Ad Hoc Networks
  • Image Enhancement Techniques
  • Smart Grid Energy Management
  • Security in Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • Simulation Techniques and Applications
  • COVID-19 diagnosis using AI
  • Smart Parking Systems Research
  • Advanced Multi-Objective Optimization Algorithms
  • Fault Detection and Control Systems
  • IoT and Edge/Fog Computing
  • Renal cell carcinoma treatment
  • Embedded Systems Design Techniques
  • Video Analysis and Summarization
  • Energy Harvesting in Wireless Networks
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • UAV Applications and Optimization

University of Engineering & Management
2016-2024

This device includes a pair of glasses and an obstacle detection module fitted in it the center, processing unit, output i.e. beeping component, power supply. The Obstacle is connected to unit. supply used central basically consists ultrasonic sensor, unit consist control buzzer. controls sensors get information present front man processes sends through buzzer accordingly. These Ultrasonic Smart Glasses for Blind people portable device, easy use, light weight, user friendly cheap price....

10.1109/iemcon.2017.8117194 article EN 2017-10-01

Meta-heuristics are commonly applied to solve various global optimization problems. In order make the meta-heuristics performing a search, balancing their exploration and ability is still an open avenue. This manuscript proposes novel Opposition-based learning scheme, called "PCOBL" (Partial Centroid Learning), inspired by partial centroid. PCOBL aims improve performance through maintaining effective balance between exploitation. was incorporated in three different meta-heuristics,...

10.1109/access.2023.3273298 article EN cc-by-nc-nd IEEE Access 2023-01-01

Nowadays the easiest way to connect with people is chatting by using Mobile Chatting Applications which offers us a lot of helpful facilities. Though different Chat security users but leads increase in vulnerabilities & risks attack on data. Not only for business conversations also normal our data must be secured because, someone's very sensitive most important prevent unwanted hacking or losses. To overcome this kind attacks we need encrypted messaging protocol conversation. This proposed...

10.1109/iemcon.2017.8117222 article EN 2017-10-01

Now a days Unmanned Aerial Vehicles (UAVs) is being used for wide range of application. For example, UAVs are utilized to surveillance disaster affected and resource constrained network area create the communication network. In this paper we proposed an Ad-hoc networked Sensor Network management application remote sensing. We Wireless Mesh connect multiple set with each other increase coverage observable area. present approach that works on basis process-patterns, describing...

10.1109/iemcon.2017.8117231 article EN 2017-10-01

IOT is one of the most controversial topic in current digitalized era. The scope developing gradually with new technologies like smart grids, homes, cities etc. permits internet connectivity for all kind physical objects and devices. Virtualization different types system becoming trend today's world that allows to perform without direct interaction. combination intelligent devices high speed makes easier multi-tasking smoothly constraint distances.

10.1109/iemcon.2017.8117232 article EN 2017-10-01

Sentiment analysis (or opinion mining) is defined as the task of finding opinions authors about specific entities. The decision-making process people affected by formed thought leaders and ordinary people. When a person wants to buy product online he or she will typically start searching for reviews written other on various offerings. one hottest research areas in computer science. Over 7,000 articles have been topic. Hundreds start-ups are developing sentiment solutions major statistical...

10.1109/iemecon.2017.8079574 article EN 2017-08-01

In today's world the Internet of Things (IOT) pairing up with our daily life. The helps to peek into virtual digitization where every smart device, sensor is connected internet and therefore can be accessed power management system all over world. This paper propose a secured IoT framework multiple nodes that sends data web cloud server allows users access those via mobile application through unique user id password. proposed end-to-end encryption. Among numerous computer protocols present,...

10.1109/iemcon.2017.8117195 article EN 2017-10-01

Ten percent of the women in whole world are suffering from breast cancer their lives. Breast MRI registration is an important task to align MR images pre-and post-contrast for diagnosis and classification type into benign malignant using pharmacokinetic analysis. It also very much essential that be taken various time intervals isolate lesion small intervals. This technique useful monitor types therapies. The main enlightenment algorithms used image has transferred a control point...

10.1109/iemecon53809.2021.9689097 article EN 2021-12-01

Wireless Sensor Networks (WSN) have gained worldwide attention in recent years, particularly with which has facilitated the development of smart sensors. WSN consists small nodes sensing, computation and wireless communication capabilities. In WSN, clustering is used as an effective technique to achieve scalability, self-organization, power saving, channel access, routing etc. Lifetime sensor determines lifetime network crucial for sensing capability. Clustering key extend a network. this...

10.1109/iemecon.2017.8079576 article EN 2017-08-01

Data Security is very much important in every aspect of data collection as well storage. Hardware device like USB useful worldwide order to store real time confidential data. So it necessary provide hardware level security small storage pen drive, external hard disk etc. In this context cryptography one the most promising technique encrypt actual other form. paper, we propose a robust encryption which will keep safe from theft. Our proposed algorithm associated with drive and disk.

10.1109/ccwc.2018.8301636 article EN 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) 2018-01-01

Mobile ad-hoc network is networks that are collection of mobile device can communicate and share information between each other, without any predefine infrastructure or centralized system. Another challenge in MANET energy constraints because the nodes operated by limited battery. This paper presents a new on-demand power saving routing algorithm for networks. The protocol based on node identification using k-means & Convex Hull gives less hopping, demand protocol. K-means identify cluster...

10.1109/uemcon.2016.7777852 article EN 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) 2016-10-01

Both the incidence and mortality rates of kidney cancer are increasing worldwide. Imaging examinations followed by effective systemic therapies can reduce rate. In this article, a new method to segment MRI for lesion detection is developed using hard-clustering technique with Slime Mould Algorithm (SMA). First, partitional or hard clustering SMA which searches optimal cluster centers segmentation. preprocessing steps proposed method, noise intensity inhomogeneities removed from MR images as...

10.1109/iemecon53809.2021.9689104 article EN 2021-12-01

The modern society is now fully dependent upon technology and the technological approach has brought a revolutionary change in each every field. This paper proposes multipurpose robot to be used battle contains Raspberry Pi which acts as client, packs video camera for live streaming, mapping gripper disposal of explosives, Wi-Fi module controlling remotely from any part world by concept Wireless Connectivity. Apart this control application developed Android based smart phone all functions...

10.1109/iemcon.2017.8117221 article EN 2017-10-01
Coming Soon ...