scispace - formally typeset
Search or ask a question
Institution

Heritage Institute of Technology

About: Heritage Institute of Technology is a based out in . It is known for research contribution in the topics: Support vector machine & Transconductance. The organization has 581 authors who have published 1045 publications receiving 8345 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Results of extensive simulation substantiate the effectiveness of the proposed iDetect scheme over state-of-the-art competing schemes, in terms of detection ratio, availability ratio, etc. while not compromising on standard network performance in a post disaster communication scenario.
Abstract: Delay tolerant network (DTN) has been successfully proposed for setting up emergency post disaster communication networks when normal communication infrastructure is typically incapacitated. DTN being a network where participating nodes transmit messages to the final destination in multiple hops, its success depends on the cooperation of these participating nodes. Performance of such cooperation based networks get severely affected by misbehaving nodes that do not participate in message forwarding either due to reasons that are beyond its control (non-availability of appropriate forwarders, decreasing battery life, etc.) or out of certain malicious intentions. The misbehavior detection schemes, proposed so far, rarely investigate the actual intention behind misbehavior of participating nodes and do not attempt to restore the reputation of falsely alleged nodes. In this paper, we propose iDetect, a reputation based intention aware misbehavior detection scheme that uses contextual evidences to analyze the intention behind a node’s misbehavior. The scheme boosts the low reputation of incorrectly ostracized nodes and includes them in future communication. Re-inclusion of these nodes increases the number of genuine forwarders in the network which, in turn, assists in efficient delivery of crucial post disaster situational messages. Results of extensive simulation, using ONE simulator, substantiate the effectiveness of the proposed iDetect scheme over state-of-the-art competing schemes, in terms of detection ratio, availability ratio, etc. while not compromising on standard network performance in a post disaster communication scenario.

11 citations

Proceedings ArticleDOI
16 Oct 2014
TL;DR: The relative merits of IR and microwave sensor technology and their combination with wireless camera for the development of a wall mounted wireless intrusion detection system are presented and the phases by which the intrusion information is collected and sent to the central control station using wireless mesh network for analysis and processing the collected data.
Abstract: This paper presents the relative merits of IR and microwave sensor technology and their combination with wireless camera for the development of a wall mounted wireless intrusion detection system and explain the phases by which the intrusion information are collected and sent to the central control station using wireless mesh network for analysis and processing the collected data. These days every protected zone is facing numerous security threats like trespassing or damaging of important equipments and a lot more. Unwanted intrusion has turned out to be a growing problem which has paved the way for a newer technology which detects intrusion accurately. Almost all organizations have their own conventional arrangement of protecting their zones by constructing high wall, wire fencing, power fencing or employing guard for manual observation. In case of large areas, manually observing the perimeter is not a viable option. To solve this type of problem we have developed a wall-mounted wireless fencing system. In this project I took the responsibility of studying how the different units could be collaborated and how the data collected from them could be further processed with the help of software, which was developed by me. The Intrusion detection system constitutes an important field of application for IR and microwave based wireless sensor network. A state of the art wall-mounted wireless intrusion detection system will detect intrusion automatically, through multi-level detection mechanism (IR, microwave, active RFID & camera) and will generate multi-level alert (buzzer, images, segment illumination, SMS, E-Mail) to notify security officers, owners and also illuminate the particular segment where the intrusion has happened. This system will enable the authority to quickly handle the emergency through identification of the area of incident at once and to take action quickly. IR based perimeter protection is a proven technology. However IR-based intrusion detection system is not a full-proof solution since (1) IR may fail in foggy or dusty weather condition & hence it may generate false alarm. Therefore we amalgamate this technology with Microwave based intrusion detection which can work satisfactorily in foggy weather. Also another significant arena of our proposed system is the Camera-based intrusion detection. Some industries require this feature to capture the snap-shots of the affected location instantly as the intrusion happens. The Intrusion information data are transmitted wirelessly to the control station via multi hop routing (using active RFID or IEEE 802.15.4 protocol). The Control station will receive intrusion information at real time and analyze the data with the help of the Intrusion software. It then sends SMS to the predefined numbers of the respective authority through GSM modem attached with the control station engine.

11 citations

Proceedings ArticleDOI
04 Jan 2016
TL;DR: This paper proposes a knowledge sharing based approach for dynamic assessment of post disaster resource needs using a smart-phone based delay tolerant network (DTN) to bridging the gap in perception about actual resource needs.
Abstract: In a post disaster scenario, assessment of resource needs is indeed challenging because needs are constantly changing and supplies trickle in at an uncertain rate. Moreover, information about resource needs of far-flung areas get rarely permeated owing to the disruption of cellular and other communication infrastructure, leading to a huge gap in perception about the actual needs in those areas. Therefore, a dynamic need assessment mechanism is essential to stay abreast of the actual situation. Movements of volunteers and relief workers are governed by two dominant characteristics of human mobility - spatial locality and spatial regularity. In this paper, we make use of such mobility characteristics to propose a knowledge sharing based approach for dynamic assessment of post disaster resource needs using a smart-phone based delay tolerant network (DTN). The proposed technique caters to the objective of bridging the gap in perception about actual resource needs.

11 citations

Book ChapterDOI
15 Dec 2009
TL;DR: F fuzzy mean-entropy-skewness models are proposed for optimal portfolio selection and credibility theory is applied to evaluate fuzzy mean, skewness and entropy.
Abstract: In this paper fuzzy mean-entropy-skewness models are proposed for optimal portfolio selection Entropy is favored as a measure of risk as it is free from dependence on symmetric probability distribution Credibility theory is applied to evaluate fuzzy mean, skewness and entropy Hybrid intelligence algorithm is used for simulation Numerical examples are given in favor of each of the models

11 citations

Journal ArticleDOI
TL;DR: In this paper, the linear nonhomogeneous integral equation of H -functions is considered to find a new form of H-function as its solution and a set of useful formulae are derived both for conservative and non-conservative cases.

11 citations


Authors

Showing all 581 results

NameH-indexPapersCitations
Debnath Bhattacharyya395786867
Samiran Mitra381985108
Dipankar Chakravorty353695288
S. Saha Ray342173888
Tai-hoon Kim335264974
Anindya Sen291093472
Ujjal Debnath293353828
Anirban Mukhopadhyay291693200
Avijit Ghosh281212639
Mrinal K. Ghosh26642243
Biswanath Bhunia23751466
Jayati Datta23551520
Nabarun Bhattacharyya231361960
Pinaki Bhattacharya191141193
Dwaipayan Sen18711086
Network Information
Related Institutions (5)
National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

87% related

Jadavpur University
27.6K papers, 422K citations

86% related

Indian Institute of Technology Guwahati
17.1K papers, 257.3K citations

86% related

Indian Institutes of Technology
40.1K papers, 652.9K citations

85% related

Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

85% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20227
2021110
202087
201992
201883
2017103