- Wireless Networks and Protocols
- Mobile Ad Hoc Networks
- Advanced Wireless Network Optimization
- Caching and Content Delivery
- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- Context-Aware Activity Recognition Systems
- Human Mobility and Location-Based Analysis
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- Cloud Computing and Resource Management
- Traffic Prediction and Management Techniques
- Software-Defined Networks and 5G
- Energy Efficient Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
- Blockchain Technology Applications and Security
- Network Traffic and Congestion Control
- Image and Video Quality Assessment
- Autonomous Vehicle Technology and Safety
- Anomaly Detection Techniques and Applications
- Gaze Tracking and Assistive Technology
- Green IT and Sustainability
- Transportation Planning and Optimization
- Speech and Audio Processing
- Peer-to-Peer Network Technologies
Indian Institute of Technology Kharagpur
2016-2025
National Institute of Technology Durgapur
2022-2024
NIIT University
2024
Animal Resources Development Department
2023
Universitatea Națională de Știință și Tehnologie Politehnica București
2022
Angel Kanchev University of Ruse
2022
University of Kentucky
2022
Birla Institute of Technology and Science, Pilani
2022
Birla Institute of Technology and Science, Pilani - Goa Campus
2022
Surya Hospitals
2022
Since the inception of IEEE 802.11 wireless local area networks (WLANs) in 1997, networking technologies have tremendously grown last few decades. The fundamental physical (PHY) and medium access control (MAC) protocols continuously been enriched with new to provide mile broadband connectivity end users. Consequently, several amendments basic gradually came up forms 802.11a, 802.11b, 802.11g. More recently, 802.11n, 802.11ac, 802.11ad are introduced enhanced PHY MAC layers that boost data...
Intelligent transportation systems (ITSs) have become increasingly popular because they support effective coordination in connected vehicles. ITSs present an integrated approach for exchanging relevant information order to improve the safety, efficiency, and reliability of road systems. A variant mobile ad-hoc networks (MANETs) called vehicular (VANETs) are integral component ITSs. VANETs consist interconnected vehicles with sensing abilities that exchange related traffic, positioning,...
With the increasing adoption of private blockchain platforms, consortia operating in various sectors such as trade, finance, logistics, etc., are becoming common. Despite having benefits a completely decentralized architecture which supports transparency and distributed control, existing blockchains limit data, assets, processes within its closed boundary, restricts secure verifiable service provisioning to end-consumers. Thus, platforms e-commerce with multiple sellers or cloud federation...
With increasing advancements in technologies for capturing 360{\deg} videos, advances streaming such videos have become a popular research topic. However, require high bandwidth, thus escalating the need developing optimized algorithms. Researchers proposed various methods to tackle problem, considering network bandwidth or attempt predict future viewports advance. most of existing works either (1) do not consider video contents user viewport, (2) adapt preferences dynamically, (3) lot...
A large fraction of video content providers have adopted adaptive bitrate streaming over HTTP. The client player typically runs an (ABR) algorithm to decide upon the most optimal quality for next few seconds playback. State-of-the-art ABR algorithms attempt achieve trade-off among competing objectives high bitrate, less rebuffering, and smoothness, in face unpredictable bandwidth variability. However, utilization does not necessarily ensure experience (QoE). Different users different...
The heterogeneous network (HetNet) is an important concept for next-generation wireless Internet architecture and of Things, where several technologies can coexist, the users should have flexibility to select connectivity based on environmental condition application demands. IEEE 802.11 (or WiFi) 802.16 WiMAX) are two primary building block HetNets because their sustainability, cost effectiveness, well-deployed architectures, ability support high-data-rate communications. existing literature...
In this survey, we discuss the evolution of distributed computing from utility to fog computing, various research challenges for development environments, current status on along with a taxonomy existing works in direction. Then, focus architectures systems, technologies enabling fog, features, security and privacy QoS parameters, applications give critical insights done domain. Lastly, briefly about different associations that closely work based platforms services, summary types overheads...
Traditional human-in-the-loop-based annotation for time-series data like inertial often requires access to alternate modalities video or audio from the environment. These sources provide necessary information human annotator, as raw numeric is too obfuscated even an expert. However, this traditional approach has many concerns surrounding overall cost, efficiency, storage of additional modalities, time, scalability, and privacy. Interestingly, recent large language models (LLMs) are also...
Network traffic classification is an important tool for network administrators in enabling monitoring and service provisioning. Traditional techniques employed classifying do not work well mobile app due to lack of unique signatures. Encryption renders this task even more difficult since packet content no longer available parse. More recent based on statistical analysis parameters such as packet-size arrival time packets have shown promise; been classify from a small number applications with...
This paper proposes an opportunistic approach to mitigating the hidden and exposed node problem in a high-throughput mesh network, by exploiting frame aggregation block acknowledgment (BACK) capabilities of IEEE 802.11n/ac wireless networking standard. Hidden nodes significantly drop down throughput network increasing data loss due collision, whereas cause under-utilization achievable capacity. The becomes worse supported networks, large physical layer size prolonged channel reservation from...