Skip to main content

and
  1. No Access

    Chapter

    An Ensemble of J48 Decision Tree with AdaBoost and Bagging for Flood Susceptibility Map** in the Sundarbans of West Bengal, India

    Flood is a widespread geomorphic hazard that causes an immense destruction not only in physical terms but also mentally, socially, and economically. To limit its destructive effects, proper planning, cope up i...

    Sujata Pal, Anik Saha, Priyanka Gogoi in Geomorphic Risk Reduction Using Geospatial… (2024)

  2. No Access

    Book and Conference Proceedings

  3. No Access

    Article

    Energy-and-delay-aware scheduling and load balancing in vehicular fog networks

    Roadside units (RSUs) play an important role in the request fulfillment of vehicles. In rural areas, RSUs are powered by renewable energy sources like solar energy. Hence, the request fulfillment of vehicles m...

    Vivek Sethi, Sujata Pal, Avani Vyas, Shweta Jain in Telecommunication Systems (2022)

  4. No Access

    Chapter

    Integration of Field Investigation and Geoinformatics for Urban Environmental Quality Appraisal of Bankura Town, West Bengal, India

    The urbanization process has been inflicting detrimental environmental conditions across urban centres irrespective of their size and shape globally. Bankura municipality, a town of West Bengal, India, with a ...

    Abira Dutta Roy, Jaya Gorai, Rinku Dey, Sujata Pal in Environmental Degradation in Asia (2022)

  5. No Access

    Chapter

    Software-Defined Networking in Data Centers

    Cloud computing and software-defined networking (SDN) have gained a lot of interest from industry and academia. With the increase in data from applications, data centers require high-speed access networks to f...

    Priyanka Kamboj, Sujata Pal in Software Defined Internet of Everything (2022)

  6. No Access

    Article

    A policy based framework for quality of service management in software defined networks

    Growth in multimedia traffic over the Internet increases congestion in the network architecture. Software-Defined Networking (SDN) is a novel paradigm that solves the congestion problem and allows the network ...

    Priyanka Kamboj, Sujata Pal in Telecommunication Systems (2021)

  7. No Access

    Article

    User authentication using Blockchain based smart contract in role-based access control

    Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solutio...

    Priyanka Kamboj, Shivang Khare, Sujata Pal in Peer-to-Peer Networking and Applications (2021)

  8. No Access

    Chapter

    Preventing Security and Privacy Attacks in WBANs

    Sensors and radio channels have made remote health monitoring easier with the use of wireless body area networks (WBANs). WBANs use bio-sensors, implanted on/inside the human body, to collect real-time health ...

    Avani Vyas, Sujata Pal in Handbook of Computer Networks and Cyber Security (2020)

  9. No Access

    Book

  10. No Access

    Chapter

    Opportunistic Mobile Networks: Toward Reality

    Having explored different dimensions of OMNs, in this chapter, we pause for a moment, and look at the reality. Where do DTNs/OMNs stand today? How well it has been adopted? What are its promises? We begin by t...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  11. No Access

    Chapter

    The Big Picture

    This book presented a short tour of OMNs. It looked back at its origins in DTNs, its characteristics, advances made over the last two decades, and various applications. In this book, we looked at the aspects o...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  12. No Access

    Chapter

    Origins and Characteristics

    The “traditional” model of networks that we are familiar with fails to work when certain fundamental assumptions, such as availability of end-to-end communications paths and short round-trip times, do not hold...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  13. No Access

    Chapter

    A Developer’s Guide to the ONE Simulator

    In this chapter, we look at how to work with the Opportunistic Network Environment (ONE) simulator using the NetBeans integrated development environment (IDE). Use of such an IDE often makes workflow easier. N...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  14. No Access

    Chapter

    Aspects of Human Emotions and Networks

    One of the fundamental aspects that characterizes human beings is emotion, which has bidirectional interaction with its surrounding environment. Research on emotions have crossed the domain of psychology and h...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  15. No Access

    Chapter

    Enforcing Cooperation in OMNs

    Nodes in OMNs usually suffer from lack of end-to-end communication paths, which makes them to depend upon other intermediate nodes for forwarding their messages. Therefore, the intermediate nodes play the cruc...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  16. No Access

    Chapter

    Delay Tolerant Routing and Applications

    The fundamental goal of any communication network is to have the messages delivered to their corresponding destinations. In conventional networks, such as MANETs, determining a routing path with optimum cost i...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  17. No Access

    Chapter

    Emerging Sensing Paradigms and Intelligence in Networks

    Apart from DTNs and OMNs, in the recent past, the field of Wireless Sensor Networks (WSNs) has also made interesting progress giving rise to different paradigms, such as human-centric sensing. Whether we talk ...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  18. No Access

    Chapter

    Evolutionary Game in Wireless Networks

    Game theory has been widely used in wireless networks for solving problems of conflict and cooperation among rational agents. A particularly interesting branch of game theory is evolutionary game theory (EGT),...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  19. No Access

    Chapter

    Heterogeneity in OMNs

    Heterogeneity in real-life networks is perhaps inevitable. In this chapter, we look at different aspects of heterogeneity in conventional networks such as, MANETs, as well as, in OMNs. We begin by looking at t...

    Sudip Misra, Barun Kumar Saha, Sujata Pal in Opportunistic Mobile Networks (2016)

  20. No Access

    Chapter

    Cooperation in Delay Tolerant Networks

    The delay tolerant networking architecture was proposed for the networks where the typical assumptions made for the Internet fails. One of the primary characteristics of such networks is the intermittent conne...

    Sudip Misra, Sujata Pal, Barun Kumar Saha in Next-Generation Wireless Technologies (2013)