Institution
Narula Institute of Technology
About: Narula Institute of Technology is a based out in . It is known for research contribution in the topics: Quantum dot cellular automaton & Cognitive radio. The organization has 288 authors who have published 490 publications receiving 2258 citations. The organization is also known as: NiT.
Topics: Quantum dot cellular automaton, Cognitive radio, Genetic algorithm, Wireless sensor network, Key distribution in wireless sensor networks
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The degree of planarity of the VCG loop can differentiate healthy individuals from patients with STEMI and is compatible with the basic understanding of the electrophysiology of the human heart.
10 citations
••
01 Nov 2015TL;DR: A dynamic two hops reputation technique for detection and avoidance of selfish nodes where neighbor nodes will monitor the behavior of a particular node as forwarder and receiver is proposed.
Abstract: In recent years Delay/Disruption Tolerant Network (DTN) has been identified as the most promising and challenging areas of wireless communication where sparseness and delay are particularly high. It is emerging as a promising network in the areas of disaster response, inter-planetary, vehicular, military/tactical, underwater, satellite networks. DTN is characterized by the large communication latency and lack of end to end path from source to destination. Due to intermittent connectivity in DTN, data forwarding is possible using multiple hops in "store-carry-forward" manner. So, the entire data communication is solely dependent on the cooperation of the intermediate nodes or hops. However, these intermediate nodes sometimes may become selfish due to preserve its limited resources or due to some malicious intention [1][2]. In order to increase data delivery, the detection and avoidance of such selfish nodes are foremost required. Here we are using reputation based strategy where reputation can be used as a measure to detect the cooperation pattern of a node with other nodes in the network during data communication. In this paper, we propose a dynamic two hops reputation technique for detection and avoidance of selfish nodes where neighbor nodes will monitor the behavior of a particular node as forwarder and receiver. These one hop and two hops neighbor nodes will give their feedback after data communication takes place at certain interval. However, the universal reputation matrix will be published time to time based on the cooperation pattern of nodes by the Trusted Authority (TA). The performance of the proposed scheme was evaluated on ONE simulator [3].
10 citations
••
01 Mar 2017TL;DR: A novel Mobility Handling Routing Protocol (MHRP) for WBAN has been proposed that is faster, reliable, takes care of human mobility through posture detection and ensures seamless connectivity.
Abstract: For the last few years a lot of research work has been carried out on the applications and other aspects of Wireless Body Area Networks (WBAN). Majority of this work are found on healthcare domain. In WBAN, sensor nodes are used either as wearable or as implant devices. These devices collect information from the human body and transmit them wirelessly to remote server which is viewed and analyzed by the concerned persons sitting in their chambers. But, the link between the WBAN and the remote server changes frequently due to the movement of human body. As such maintaining seamless connectivity in such environment is a challenge of current research work. In this paper, a novel Mobility Handling Routing Protocol (MHRP) for WBAN has been proposed. The proposed protocol is faster, reliable, takes care of human mobility through posture detection and ensures seamless connectivity. In support of better performance of the proposed algorithm, analytical comparison with related existing works is given.
10 citations
••
01 Jan 2020TL;DR: In this chapter, the concept of cylindrical single-valued neutrosophic number whenever two of the membership functions, which serve a crucial role for uncertainty conventional problem, are dependent to each other is developed.
Abstract: In this chapter, the concept of cylindrical single-valued neutrosophic number whenever two of the membership functions, which serve a crucial role for uncertainty conventional problem, are dependent to each other is developed. It also introduces a new score and accuracy function for this special cylindrical single valued neutrosophic number, which are useful for crispification. Further, a minimal spanning tree execution technique is proposed when the numbers are in cylindrical single-valued neutrosophic nature. This noble idea will help researchers to solve daily problems in the vagueness arena.
10 citations
••
14 Dec 2009
TL;DR: A call admission control (CAC) scheme for heterogeneous wireless overlay networks (WONs) that combine the benefits of the three commonly used techniques- guard channel, buffer management and priority scheduling with fuzzy logic application is proposed.
Abstract: This paper proposes a call admission control (CAC) scheme for heterogeneous wireless overlay networks (WONs) that combine the benefits of the three commonly used techniques- guard channel, buffer management and priority scheduling with fuzzy logic application. The simulation results show that the scheme is extremely efficient offering a high degree of quality of service (QoS).
10 citations
Authors
Showing all 288 results
Name | H-index | Papers | Citations |
---|---|---|---|
Kaushik Roy | 23 | 180 | 1579 |
Kunal Das | 18 | 78 | 1213 |
Tapan K. Mukherjee | 14 | 60 | 654 |
Jayanta K. Saha | 13 | 82 | 592 |
Avishek Chakraborty | 12 | 29 | 408 |
Abhijit Chakrabarti | 12 | 66 | 530 |
Mukul K. Das | 10 | 76 | 295 |
Zeenat Rehena | 9 | 26 | 235 |
Arijit Das | 9 | 73 | 329 |
Biswajit Halder | 8 | 20 | 156 |
Abhijit Ghosh | 8 | 22 | 335 |
Sumit Chabri | 8 | 23 | 284 |
Saradindu Panda | 7 | 51 | 142 |
Bikash Panja | 7 | 12 | 90 |
Sangita Roy | 7 | 26 | 170 |