scispace - formally typeset
Search or ask a question
Author

Gautam Mahapatra

Bio: Gautam Mahapatra is an academic researcher from Birla Institute of Technology, Mesra. The author has contributed to research in topics: Optimization problem & Disjoint-set. The author has an hindex of 3, co-authored 9 publications receiving 26 citations. Previous affiliations of Gautam Mahapatra include University of Calcutta & Asutosh College.

Papers
More filters
Journal ArticleDOI
TL;DR: This work is showing how the bio-inspired Bacteria Foraging Optimization Algorithm (BFOA), which is mimicry of the life-cycle of common type of bacteria like E.Coli, can be used to solve such system of equation with rank less than or equal to n.
Abstract: the solution of a set equation (linear or non-linear) with n number (n > 1) of variables we need at least n number of different relations (called as rank). Our present work is showing how the bio-inspired Bacteria Foraging Optimization Algorithm (BFOA), which is mimicry of the life-cycle of common type of bacteria like E.Coli, can be used to solve such system of equation with rank less than or equal to n. The BFOA simulates efficient nutrient foraging technique called as Chemotaxis to maximize the intake energy per unit time spend, the reproduction for evolution and the elimination- dispersal for environmental changes like any kind of natural calamities that are observed in the Bacterial system. As a sample tests we have used a numbers of system of linear equations with rank equal to the number of variables and a system of non-linear equations used in the derivation process of 4 th order Runge-Kutta method for the ordinary differential equation solution, and experimental results are showing the applicability of the BFOA and in case of Runge-Kutta method we present an alternative form of the recursive equation.

11 citations

Proceedings ArticleDOI
31 Dec 2012
TL;DR: A Distributed Algorithmic approach to address the problem of integrity of the remotely stored data with publicly probabilistic verifiable scheme by distributing the verification task among various SUBTPAs.
Abstract: Recently, storage of huge volume of data into Cloud has become an effective trend in modern day Computing due to its dynamic nature. After storing, users delete their original copy of the data files. Therefore, users cannot directly control over that data. This lack of control introduce security issues in Cloud data storage, one of the most important security issue is integrity of the remotely stored data. Here, we propose a Distributed Algorithmic approach to address this problem with publicly probabilistic verifiable scheme. Due to heavy workload at the Third Party Auditor side, we distribute the verification task among various SUBTPAs. We use Sobol Random Sequence to generate the random block numbers that maintain the uniformity property. In addition, our method provide uniformity for each subtasks also. To make each subtask uniform, we use some analytical approach. For this uniformity, our protocols verify the integrity of the data very efficiently and quickly. Also, we provide special care about critical data by using Overlap Task Distribution Keys.

4 citations

Proceedings ArticleDOI
03 Dec 2015
TL;DR: This paper describes an object-oriented implementation of the Bacteria Foraging System (BFS) for the solution of data clustering problem and tests the effectiveness of proposed implementation, and compares the results with popular clustering methods.
Abstract: In resent time social Foraging behavior of common bacteria like E.Coli is simulated for the solution of complex global optimization problems and this is known as Bacteria Foraging Optimization Algorithm (BFOA). BFOA has already drawn the attention of researchers because of its efficiency in solving real-world optimization problems arising in several application domains. This paper describes an object-oriented implementation of the Bacteria Foraging System (BFS) for the solution of data clustering problem. In data clustering it divides data into meaningful groups called clusters without any prior knowledge, and it is the key technique in data mining and has become an important issue in a number of fields. We have tested our implementation for number artificial dataset and some common benchmarks, also we have compared the results with other popular clustering methods named K-means algorithm, GA based technique, BCO and PSO-based algorithms, and experimental results show the effectiveness of proposed implementation.

4 citations

Book ChapterDOI
TL;DR: The adaptation of the HSA tries to provide a fast key generation mechanism with a feasible implementation to provide privacy requirement for viability of modern information sharing through cyberspace.
Abstract: Privacy is a very important requirement for viability of modern information sharing through cyberspace and the modern cryptology is ensuring success. Harmony Search Algorithm (HSA) is a new meta-heuristic computation technique inspired from musical improvisation techniques, where searching for a perfect harmony is the objective of this technique. Public Key Cryptography heavily relies on key pairs which are large prime numbers. Our adaptation of the HSA tries to provide a fast key generation mechanism with a feasible implementation. The keys are ranked based on their harmony and the best harmony is selected as the result of the search which in turn is used to generate the key pair of RSA, a Public Key Cryptography technique as a test of effectiveness and success.

3 citations

Book ChapterDOI
01 Jan 2019
TL;DR: The current work proposes a monitoring ambience for people who meet with an accident or for some situation, and after surgery, some positions of patients are strictly prohibited as it might cause some serious damage to their health.
Abstract: Remote patient monitoring (RPM) refers to a wide variety of technologies designed to manage and monitor a range of health conditions. It gives chance to doctor’s to monitor patient’s behavior even when they are not within conventional medical attention and take necessary actions accordingly. Such system requires a seamless integration of hardware and software with information stored in Internet such that everyone including the doctor and the patient party can access and analyze data according to their need. An alarm service is generally integrated to make people aware of any unwanted situation. The current work proposes a monitoring ambience for people who meet with an accident or for some situation, and after surgery, some positions of patients are strictly prohibited as it might cause some serious damage to their health.

3 citations


Cited by
More filters
01 Jan 2001
TL;DR: In this paper, the problem of reconciling two similar sets held by different hosts while minimizing the communication complexity is considered, based on the encoding of sets as polynomials.
Abstract: We consider the problem of eff- ciently reconciling two similar sets held by different hosts while minimizing the communication complex- ity. This type of problem arises naturally from gossip protocols used for the distribution of information, but has other applications as well. We describe an ap- proach to such reconciliation based on the encoding of sets as polynomials. The resulting protocols ex- hibit tractable computational complexity and nearly optimal communication complexity. Moreover, these protocols can be adapted to work over a broadcast channel, allowing many clients to reconcile with one host based on a single broadcast.

163 citations

01 Jan 2006
TL;DR: Ant Colony Optimization for Clustering (ACOCO) as mentioned in this paper uses both accumulated pheromone and the heuristic information, the distances between data objects and cluster centers of ants, to guide artificial ants to group data objects into proper clusters.
Abstract: Data clustering is one of important research topics of data mining. In this paper, we propose a new clustering algorithm based on ant colony optimization, called Ant Colony Optimization for Clustering (ACOC). At the core of the algorithm we use both the accumulated pheromone and the heuristic information, the distances between data objects and cluster centers of ants, to guide artificial ants to group data objects into proper clusters. This allows the algorithm to perform the clustering process more effectively and efficiently. Due to the nature of stochastic and population-based search, the ACOC can overcome the drawbacks of traditional clustering methods that easily converge to local optima. Experimental results show that the ACOC can find relatively good solutions.

87 citations

Journal ArticleDOI
TL;DR: A trust-based communication scheme to ensure the reliability and privacy of WBAN is proposed and a cooperative communication approach is used, while for privacy preservation, a cryptography mechanism is used to ensure reliability.
Abstract: Wireless Body Area Network is an emerging technology that is used primarily in the area of healthcare applications. It is a low-cost network having the capability of transportability and adaptability. It can be used in location independent and long-term remote monitoring of people without disturbing their daily activities. In a typical WBAN system, sensing devices are either implanted or etched into the human body that continuously monitors his physiological parameters or vital signs. In such a network, trusts among the stakeholders (healthcare providers, users, and medical staff, etc.) are found of high importance and regarded as the critical success factor for the reliability of information exchange among them. In remote patient monitoring, the implementation of trust and privacy preservation is crucial, as vital parameters are being communicated to remote locations. Nonetheless, its widespread use, WBAN, has severe trust and privacy risks, limiting its adaptation in healthcare applications. To address trust and privacy-related issues, reliable communication solutions are widely used in WBANs. Given the motivation, in this paper, we have proposed a trust-based communication scheme to ensure the reliability and privacy of WBAN. To ensure reliability, a cooperative communication approach is used, while for privacy preservation, a cryptography mechanism is used. The performance of the proposed scheme is evaluated using MATLAB simulator. The output results demonstrated that the proposed scheme increases service delivery ratio, reliability, and trust with reduced average delay. Furthermore, a fuzzy-logic method used for ranking benchmark schemes, that has been concluded that the proposed scheme has on top using comparative performance ranking.

82 citations

Journal ArticleDOI
01 Jan 2020
TL;DR: The main contribution of this article is the proposed use of the theory of interval type-2 fuzzy logic to the dynamic adjustment of parameters for the harmony search algorithm and then its application to the optimal design of interval types of fuzzy logic controller.
Abstract: At the present time there are several types of metaheuristics which have been used to solve various types of problems in the real world. These metaheuristics contain parameters that are usually fixed throughout the iterations. However, various techniques exist to adjust the parameters of an algorithm such as probabilistic, fuzzy logic, among others. This work describes the methodology and equations for building Triangular and Gaussian interval type-2 membership functions, and this methodology was applied to the optimization of a benchmark control problem with an interval type-2 fuzzy logic controller. To validate in the best way the effect of uncertainty we perform experiments using noise (Pulse generator) and without noise. Also, a statistical z-test is presented to verify the effectiveness of the proposed method. The main contribution of this article is the proposed use of the theory of interval type-2 fuzzy logic to the dynamic adjustment of parameters for the harmony search algorithm and then its application to the optimal design of interval type-2 fuzzy logic controller.

13 citations

Proceedings ArticleDOI
09 Mar 2017
TL;DR: In this paper, first order proportional-integral-derivative (PID) controllers are used to reduce the deviation of frequency in the proposed load frequency control of a thermal, wind and solar based hybrid power generation system.
Abstract: Deviation of frequency is a major concern in case of hybrid power generating system. Load frequency control of a thermal, wind and solar based hybrid power generation system is presented in this paper. First order proportional-integral-derivative (PID) controllers are used to reduce the deviation of frequency in the proposed LFC. Bacterial Foraging Optimization (BFO) technique is used to optimize the gains of PID controllers. MATLAB/SIMULINK based simulation study shows that the proposed BFO tuned PID controllers are capable to maintain frequency within tolerance range of the hybrid generating plant under various instabilities and system uncertainties.

10 citations