Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future Directions

    Provisioning security to the communications, data, and partaking things in resource-constrained IoT is a huge challenge. Due to the scalability and interoperability among low power-consuming networks, 6LoWPAN is ...

    Leki Chom Thungon, Nurzaman Ahmed, Debashis De in Wireless Personal Communications (2024)

  2. No Access

    Article

    6GIoDT: 6G-assisted intelligent resource utilization framework for the Internet of Drone Things

    Beyond 5th generation (B5G) mobile communication framework is a paramount research domain in modern networking and message transfer. In 6G communication, the prime objective is ultralow latency communication, ...

    Amartya Mukherjee, Snehan Biswas, Nilanjan Dey, Debashis De in Wireless Networks (2024)

  3. No Access

    Article

    Jurisprudence: blockchain enabled privacy preserving framework complying digital ethics

    Sustainable professional integrity is the pivoting factor for maintaining the expected ethical standard of a profession. Whereas privacy of a user becomes vulnerable due to the digital transactions performed o...

    Amiya Karmakar, Pritam Ghosh, Partha Sarathi Banerjee in Multimedia Tools and Applications (2024)

  4. No Access

    Article

    MediChain: Medical data fusion using blockchain integrated elastic storage

    The Internet of Medical Things (IoMT) consists of interconnected bio-sensor-based health devices. Large numbers of medical devices are supposed to generate a high amount of real-time health data. Therefore, se...

    Amiya Karmakar, Pritam Ghosh, Partha Sarathi Banerjee in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    Sustainable Spectrum Allocation Strategy for 5G Mobile Network

    These days, 5G wireless communication are being created for different modern IoT (Internet of Things) applications around the world, arising with the IoT. All things considered, it is feasible to send energy e...

    Priti Deb, Debashis De in Wireless Personal Communications (2022)

  6. No Access

    Article

    SigSense: Mobile Crowdsensing Based Incentive Aware Geospatial Signal Monitoring for Base Station Installation Recommendation Using Mixed Reality Game

    SigSense, a mobile crowdsensing-based geospatial video game, has been proposed to survey live signal strength using smartphones.It provides attractive incentives to the contributers. Live data collected as a s...

    Aakashjit Bhattacharya, Debashis De in Wireless Personal Communications (2022)

  7. No Access

    Article

    Femtolet Based Low Power Hetnet Using Soft Fractional Frequency Reuse

    This paper addresses three prime issues of fifth generation mobile network: frequency allocation, power efficiency and communication while computing. This paper proposes a power-efficient micro-femtolet/macro-...

    Anwesha Mukherjee, Priti Deb, Debashis De in Wireless Personal Communications (2021)

  8. No Access

    Article

    SQCA: symmetric key-based crypto-codec for secure nano-communication using QCA

    Security in quantum dot cellular automata (SQCA) is an emerging trend in the arena of nanotechnology. Its features are high computing speed, smaller size and low power depletion in comparison to transistor ori...

    Bikash Debnath, Jadav Chandra Das, Debashis De in Photonic Network Communications (2021)

  9. No Access

    Article

    Design of thermometer code-to-gray code converter circuit in quantum-dot cellular automata for nano-computing network

    This article proposes the thermometer code converter, which eliminates the requirement of binary code converter to generate gray codes in different digital modulation techniques like pulse code modulation. The...

    Jadav Chandra Das, Debashis De in Photonic Network Communications (2021)

  10. No Access

    Article

    mTrust: Call Behavioral Trust Predictive Analytics Using Unsupervised Learning in Mobile Cloud Computing

    Filtering spam voice calls are a still major challenge in today’s technology contrary to SMS or email-based spamming. A numerical measure of the trust between users can help us filter calls based on relevance....

    Arka Bhowmik, Debashis De in Wireless Personal Communications (2021)

  11. No Access

    Chapter

    Study of Power Efficient 5G Mobile Edge Computing

    Recently, there has been a lot of innovative work on cloud-based mobile networks. While distributed computing gives immense chances, it likewise forces a few difficulties. One of the difficulties that current ...

    Priti Deb, Mohammad S. Obaidat, Debashis De in Mobile Edge Computing (2021)

  12. No Access

    Chapter

    Mobile Edge Computing Based Internet of Agricultural Things: A Systematic Review and Future Directions

    In the modern era of Information Technology, a combined solution framework integrating Wireless Sensor Network (WSN), Internet of Things (IoT), cloud and edge computing, data analytics, and other related techn...

    Anirbit Sengupta, Sukhpal Singh Gill, Abhijit Das, Debashis De in Mobile Edge Computing (2021)

  13. No Access

    Article

    Tea leaf disease detection using multi-objective image segmentation

    Tea leaves’ diseases caused by constant exposure to pathogens lead to significant crop yield loss globally. Diagnosing the tea leave disease at an early stage minimizes the tea yield loss. In this study, a nov...

    Somnath Mukhopadhyay, Munti Paul, Ramen Pal in Multimedia Tools and Applications (2021)

  14. No Access

    Article

    Distributed bandwidth selection approach for cooperative peer to peer multi-cloud platform

    Network function virtualization (NFV) is a well-accepted software-defined network (SDN) architecture concept. NFV is severally used in cloud platform to enhance the utilization of available network resources. ...

    Bipasha Mahato, Deepsubhra Guha Roy in Peer-to-Peer Networking and Applications (2021)

  15. No Access

    Chapter

    Deep Learning in Computer Vision Through Mobile Edge Computing for IoT

    The success of Artificial Intelligence (AI) through Deep Learning (DL) and Computer Vision has inspired many researchers to work on many real-life and human-centered tasks. These current AI systems are in use ...

    Abu Sufian, Ekram Alam, Anirudha Ghosh, Farhana Sultana in Mobile Edge Computing (2021)

  16. No Access

    Chapter

    Introduction to Mobile Edge Computing

    Fifth generation mobile networks aim to use multi-tier heterogeneous cellular networks integrated with cloud computing to provide users with low latency and energy-aware service. However, for high bandwidth an...

    Anwesha Mukherjee, Debashis De, Soumya K. Ghosh, Rajkumar Buyya in Mobile Edge Computing (2021)

  17. No Access

    Chapter

    SMEC: Sensor Mobile Edge Computing

    The development of mobile user equipment progresses cooperatively with the advancement of the latest mobile applications. Still, the limited battery capacity prevents users from running computationally intensi...

    Anindita Raychaudhuri, Anwesha Mukherjee, Debashis De in Mobile Edge Computing (2021)

  18. No Access

    Article

    EEFFL: energy efficient data forwarding for forest fire detection using localization technique in wireless sensor network

    Early prediction of a forest fire is one of the critical research challenges of the wireless sensor network (WSN) to save our ecosystem. In WSN based forest fire detection system, sensor nodes are deployed in ...

    Raj Vikram, Ditipriya Sinha, Debashis De, Ayan Kumar Das in Wireless Networks (2020)

  19. No Access

    Article

    iMusic: a session-sensitive clustered classical music recommender system using contextual representation learning

    Music has emerged to be of paramount importance to humanity and is not only considered as a source of entertainment but also an agent that causes social and psychological influences. A large number of existing...

    Samarjit Roy, Mousumi Biswas, Debashis De in Multimedia Tools and Applications (2020)

  20. No Access

    Article

    Power and Delay Efficient Multilevel Offloading Strategies for Mobile Cloud Computing

    Mobile cloud computing has introduced offloading to save the battery life of mobile devices. In mobile cloud computing optimization of power and delay for offloading has become a vital research scope. However,...

    Debashis De, Anwesha Mukherjee, Deepsubhra Guha Roy in Wireless Personal Communications (2020)

previous disabled Page of 3