Skip to main content

and
  1. No Access

    Book and Conference Proceedings

  2. No Access

    Chapter and Conference Paper

    Bitcoin Price Prediction by Applying Machine Learning Approaches

    In the present-day market, the use of various cryptocurrencies is getting popular, and out of them, Bitcoin is very much accepted by the user. It is an application of blockchain that is based on decentralized ...

    Debachudamani Prusti, Asis Kumar Tripathy in Advances in Distributed Computing and Mach… (2023)

  3. No Access

    Book and Conference Proceedings

  4. No Access

    Chapter and Conference Paper

    Smart Autonomous Collision Avoidance and Obstacle Detection Using Internet of Things (IoT) and Controller Area Network (CAN) Protocol

    Now a days, traffic congestion and collisions are the vital issues in road traffic safety control. Autonomous vehicles provide a way of solution to avoid this problem without any user interruption efficiently ...

    Anil Kumar Biswal, Debabrata Singh in Advances in Distributed Computing and Mach… (2022)

  5. No Access

    Chapter and Conference Paper

    A Novel Smart Data Collection Approach in UAV-Enabled Smart Transportation System

    In this paper, the high-altitude UAVs (HA-UAVs) act as a data collector that receives critical data from low-altitude UAV (LA-UAVs) in regular intervals, whereas the LA-UAVs are used as base stations that prov...

    Satyabrata Swain, Asis Kumar Tripathy in Advances in Distributed Computing and Mach… (2022)

  6. No Access

    Chapter and Conference Paper

    Identifying Cyberbullying Post on Social Networking Platform Using Machine Learning Technique

    Online social networking platforms have become a common choice for people to communicate with friends, relatives, or business partners. This allows sharing life achievement, success, and many more. In parallel...

    Pradeep Kumar Roy, Ashish Singh in Advances in Distributed Computing and Mach… (2022)

  7. No Access

    Chapter and Conference Paper

    Automated Resume Classification Using Machine Learning

    One of the current job recruiter’s biggest challenges is to filter the right candidate’s resume over the pool of resumes. For a single job post, many times more than thousands of applicants send their resumes....

    Pradeep Kumar Roy, Sunil Kumar Singh in Advances in Distributed Computing and Mach… (2022)

  8. No Access

    Chapter and Conference Paper

    Power Allocation-Based QoS Guarantees in Millimeter-Wave-Enabled Vehicular Communications

    The next-generation  network will see an unprecedented amount of data exchanged which is beyond the capacity of existing communication technologies for vehicular network.  The much talked millimeter-wave (mmW...

    Satyabrata Swain, Jyoti Prakash Sahoo in Advances in Distributed Computing and Mach… (2021)

  9. No Access

    Chapter and Conference Paper

    Customized Score-Based Security Threat Analysis in VANET

    With the  of IoT, automated driving vehicles using VANET are the new trends of attraction. VANET is inherited from MANET and specifically used for communications between vehicles and between a vehicle and roa...

    Alekha Kumar Mishra, Asis Kumar Tripathy in Advances in Distributed Computing and Mach… (2021)

  10. No Access

    Chapter and Conference Paper

    Efficiency Comparison and Analysis of Pseudo-random Generators in Network Security

    Random data encryption algorithm (RDEA) is an advanced security model as compared to the Data Encryption Standard. It makes use of a random key generator to get the key from the cipher key database. The RDEA s...

    Asis Kumar Tripathy, Satyabrata Swain in Artificial Intelligence and Evolutionary C… (2020)

  11. No Access

    Chapter and Conference Paper

    Monitoring Quality of Tap Water in Cities Using IoT

    During the past decade, water requirement has increased many folds in India. However, it has turned out to be a major challenge for the world in matching the increasing demand for water supply. In other hands,...

    Asis Kumar Tripathy, Tapan Kumar Das in Emerging Technologies for Agriculture and … (2020)

  12. No Access

    Chapter

    Prevention of Phishing Attack in Internet-of-Things based Cyber-Physical Human System

    In Internet-of-Things enabled Cyber-Physical Human System (CPHS), the controller control the destination systems. The challenger or hacker can perform a number of attacks on this network to threaten the identi...

    Alekha Kumar Mishra, Asis Kumar Tripathy in High Performance Vision Intelligence (2020)

  13. No Access

    Chapter and Conference Paper

    A Two-Tailed Chain Topology in Wireless Sensor Networks for Efficient Monitoring of Food Grain Storage

    With 17.5% of world population, food safety and security is of primary concern in India. Despite increase in food grain production in last decade, there is heavy loss of food grains during transit and storage....

    Alekha Kumar Mishra, Arun Kumar in Recent Findings in Intelligent Computing T… (2018)

  14. No Access

    Chapter and Conference Paper

    Yield Prediction Using Artificial Neural Networks

    Artificial Neural Network (ANN’s) technology with PSO as optimization technique was used for the approximation and prediction of paddy yield at 3 different districts in different climatic zones based on 10 yea...

    Seshadri Baral, Asis Kumar Tripathy in Computer Networks and Information Technolo… (2011)