Other affiliations: Techno India, University of Western Ontario, University of Stirling ...read more
Bio: Debashis De is an academic researcher from Islamic Azad University. The author has contributed to research in topics: Quantum dot cellular automaton & Cloud computing. The author has an hindex of 27, co-authored 405 publications receiving 3589 citations. Previous affiliations of Debashis De include Techno India & University of Western Ontario.
Papers published on a yearly basis
TL;DR: A cross-layer-based channel access and routing solution for sensing and actuating is proposed for monitoring and controlling agriculture and farms in rural areas and reduces network latency up to a certain extent.
Abstract: Internet of Things (IoT) gives a new dimension in the area of smart farming and agriculture domain. With the use of fog computing and WiFi-based long distance network in IoT, it is possible to connect the agriculture and farming bases situated in rural areas efficiently. To focus on the specific requirements, we propose a scalable network architecture for monitoring and controlling agriculture and farms in rural areas. Compared to the existing IoT-based agriculture and farming solutions, the proposed solution reduces network latency up to a certain extent. In this, a cross-layer-based channel access and routing solution for sensing and actuating is proposed. We analyze the network structure based on coverage range, throughput, and latency.
TL;DR: This paper advocates the crucial role of industrial standards and elements of the edge computing for the dissemination of overwhelming augmented user experience with conjunction with the IoT and proposes a novel edge-IoT based architecture for e-healthcare.
TL;DR: A power and latency aware optimum cloudlet selection strategy for multi-cloudlet environment with the introduction of a proxy server is proposed and results demonstrate that the proposed approach reduces the power consumption and the system response time.
Abstract: Fast interactive response in mobile cloud computing is an emerging area of interest. Execution of applications inside the remote cloud increases the delay and affects the service quality. To avoid this difficulty cloudlet is introduced. Cloudlet provides the same service to the device as cloud at low latency but at high bandwidth. But selection of a cloudlet for offloading computation at low power is a major challenge if more than one cloudlet is available nearby. In this paper we have proposed a power and latency aware optimum cloudlet selection strategy for multi-cloudlet environment with the introduction of a proxy server. Theoretical analysis show that using the proposed approach the power and the latency consumption are reduced by approximately 29-32 and 33-36 percent respectively than offloading to the remote cloud. An experimental analysis of the proposed cloudlet selection scheme is performed using cloudlets and cloud servers located at our university laboratory. Theoretical and experimental results demonstrate that using the proposed strategy power and latency aware cloudlet selection can be performed. The proposed approach is compared with the existing methods on multi-cloudlet scenario to demonstrate that the proposed approach reduces the power consumption and the system response time.
01 Dec 2016
TL;DR: An energy efficient clustering protocol based on K-mean algorithm named EECPK-means has been proposed for WSN where midpoint algorithm is used to improve initial centroid selection procedure and produces balanced clusters to ultimately balance the load of cluster heads (CHs) and prolong the network lifetime.
Abstract: Wireless sensor networks (WSNs) consist of an enormous number of tiny sensor nodes deployed in huge numbers which are able to sense, process and transmit environmental information to the base station (BS) for a variety of applications. Energy efficiency is one of the primary concerns for maintaining WSN in operation. In this study, an energy efficient clustering protocol based on K-means algorithm named EECPK-means has been proposed for WSN where midpoint algorithm is used to improve initial centroid selection procedure. The proposed approach produces balanced clusters to ultimately balance the load of cluster heads (CHs) and prolong the network lifetime. It considers residual energy as the parameter in addition to Euclidean distance used in basic K-means algorithm for appropriate CH selection. Multi-hop communication from CH nodes to BS takes place depending on their distances from BS. Simulation result shows that the proposed approach outperforms LEACH-B, balanced parallel K-means (BPK-means), Park's approach and Mk-means with respect to network lifetime and energy efficiency. Simulation result also demonstrates that the proposed approach can reduce the energy consumption at most 50% compared to LEACH-B, 14% compared to BPK-means protocol, 10% compared to Park's approach and 6% compared to Mk-means.
TL;DR: An application-aware cloudlet selection strategy for multi-cloudlet scenario that can balance the load of the system by distributing the processes to be offloaded in various cloudlets, and the mathematical models of total power consumption and delay for the proposed strategy are developed.
Abstract: Latency- and power-aware offloading is a promising issue in the field of mobile cloud computing today. To provide latency-aware offloading, the concept of cloudlet has evolved. However, offloading an application to the most appropriate cloudlet is still a major challenge. This paper has proposed an application-aware cloudlet selection strategy for multi-cloudlet scenario. Different cloudlets are able to process different types of applications. When a request comes from a mobile device for offloading a task, the application type is verified first. According to the application type, the most suitable cloudlet is selected among multiple cloudlets present near the mobile device. By offloading computation using the proposed strategy, the energy consumption of mobile terminals can be reduced as well as latency in application execution can be decreased. Moreover, the proposed strategy can balance the load of the system by distributing the processes to be offloaded in various cloudlets. Consequently, the probability of putting all loads on a single cloudlet can be dealt for load balancing. The proposed algorithm is implemented in the mobile cloud computing laboratory of our university. In the experimental analyses, the sorting and searching processes, numerical operations, game and web service are considered as the tasks to be offloaded to the cloudlets based on the application type. The delays involved in offloading various applications to the cloudlets located at the university laboratory, using proposed algorithm are presented. The mathematical models of total power consumption and delay for the proposed strategy are also developed in this paper.
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …
01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.
20 Sep 2004
TL;DR: Progress in the research and development of carbon nanomaterials during the past twenty years or so for advanced energy conversion and storage is reviewed, along with some discussions on challenges and perspectives in this exciting field.
Abstract: It is estimated that the world will need to double its energy supply by 2050. Nanotechnology has opened up new frontiers in materials science and engineering to meet this challenge by creating new materials, particularly carbon nanomaterials, for efficient energy conversion and storage. Comparing to conventional energy materials, carbon nanomaterials possess unique size-/surface-dependent (e.g., morphological, electrical, optical, and mechanical) properties useful for enhancing the energy-conversion and storage performances. During the past 25 years or so, therefore, considerable efforts have been made to utilize the unique properties of carbon nanomaterials, including fullerenes, carbon nanotubes, and graphene, as energy materials, and tremendous progress has been achieved in developing high-performance energy conversion (e.g., solar cells and fuel cells) and storage (e.g., supercapacitors and batteries) devices. This article reviews progress in the research and development of carbon nanomaterials during the past twenty years or so for advanced energy conversion and storage, along with some discussions on challenges and perspectives in this exciting field.