Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Smart Contract Based Decentralized Parking Management in ITS

    Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi in Innovations for Community Services (2019)

  2. No Access

    Chapter and Conference Paper

    Managing Smart Home Appliances with Proof of Authority and Blockchain

    With the advance in technology and growth in standard of living, smart homes have become a reality. Smart homes consist of home appliances and devices that communicate with each other to address the needs of t...

    Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi in Innovations for Community Services (2019)

  3. No Access

    Article

    Exploiting reciprocity toward link prediction

    This paper addresses link prediction problem in directed networks by exploiting reciprocative nature of human relationships. It first proposes a null model to present evidence that reciprocal links influence t...

    Niladri Sett, Devesh, Sanasam Ranbir Singh in Knowledge and Information Systems (2018)

  4. No Access

    Chapter and Conference Paper

    Incremental Approach for Detecting Arbitrary and Embedded Cluster Structures

    In this paper, we present a new incremental clustering approach (InDEC) capable of detecting arbitrary cluster structures. Cluster may contain embedded structures. Available methods do not address this importa...

    Keshab Nath, Swarup Roy, Sukumar Nandi in Model and Data Engineering (2016)

  5. No Access

    Article

    Effective data summarization for hierarchical clustering in large datasets

    Cluster analysis in a large dataset is an interesting challenge in many fields of Science and Engineering. One important clustering approach is hierarchical clustering, which outputs hierarchical (nested) stru...

    Bidyut Kr. Patra, Sukumar Nandi in Knowledge and Information Systems (2015)

  6. No Access

    Chapter and Conference Paper

    Exploiting Bhattacharyya Similarity Measure to Diminish User Cold-Start Problem in Sparse Data

    Collaborative Filtering (CF) is one of the most successful approaches for personalized product recommendations. Neighborhood based collaborative filtering is an important class of CF, which is simple and effic...

    Bidyut Kr. Patra, Raimo Launonen, Ville Ollikainen, Sukumar Nandi in Discovery Science (2014)

  7. No Access

    Chapter and Conference Paper

    Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications

    Tuple Space based Mobile Middleware (TSMM), with tuple space as its coordination medium, provides multiple decoupled behaviors for coordinating interactions between different agents of supported applications. ...

    Suddhasil De, Diganta Goswami, Sukumar Nandi in Distributed Computing and Internet Technol… (2013)

  8. No Access

    Chapter and Conference Paper

    Multi-density Clustering Algorithm for Anomaly Detection Using KDD’99 Dataset

    Anomaly detection is currently an important and active research problem in many fields and involved in numerous application. Handle huge amount of data or traffic over the network is most challenge full task i...

    Santosh Kumar, Sumit Kumar, Sukumar Nandi in Advances in Computing and Communications (2011)

  9. No Access

    Chapter and Conference Paper

    Adaptation of MAC Layer for QoS in WSN

    In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types of traffic one is event driven traffic which requires immediate attention and another is periodic ...

    Sukumar Nandi, Aditya Yadav in Trends in Network and Communications (2011)

  10. Chapter and Conference Paper

    NDoT: Nearest Neighbor Distance Based Outlier Detection Technique

    In this paper, we propose a nearest neighbor based outlier detection algorithm, NDoT. We introduce a parameter termed as $ Nearest \mb...

    Neminath Hubballi, Bidyut Kr. Patra in Pattern Recognition and Machine Intelligen… (2011)

  11. No Access

    Chapter and Conference Paper

    Copyright Protection in Digital Multimedia

    Copyright protection has become a need in today’s world. We have analyzed various spatial domain watermarking techniques and after having a good understanding of the same we have proposed a novel algorithm nam...

    Santosh Kumar, Sumit Kumar, Sukumar Nandi in Advances in Networks and Communications (2011)

  12. No Access

    Chapter and Conference Paper

    A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network

    IEEE 802.16e is the next generation wireless metropolitan area network (WMAN) that provides wide coverage and higher bandwidth than conventional wireless networks. Multicast or group communication is an effici...

    Sandip Chakraborty, Soumyadip Majumder in Advances in Networks and Communications (2011)

  13. No Access

    Chapter and Conference Paper

    Context Aware Mobile Initiated Handoff for Performance Improvement in IEEE 802.11 Networks

    IEEE 802.11 is a widely used wireless LAN standard which offers a good bandwidth at low cost In an ESS, multiple APs can co-exist with overlap** coverage area. A mobile node connects to the AP from which it ...

    Abhijit Sarma, Shantanu Joshi, Sukumar Nandi in Advances in Networks and Communications (2011)

  14. No Access

    Chapter and Conference Paper

    An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks

    Wireless Sensor Networks consist of several autonomous sensors deployed in a distributed fashion for different purposes like that of wildlife tracing, detection of intruders, environment monitoring etc. Effici...

    Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya in Information Systems Security (2011)

  15. No Access

    Chapter and Conference Paper

    Distance Based Fast Hierarchical Clustering Method for Large Datasets

    Average-link (AL) is a distance based hierarchical clustering method, which is not sensitive to the noisy patterns. However, like all hierarchical clustering methods AL also needs to scan the dataset many time...

    Bidyut Kr. Patra, Neminath Hubballi in Rough Sets and Current Trends in Computing (2010)

  16. No Access

    Chapter and Conference Paper

    Seamless Handoff between IEEE 802.11 and GPRS Networks

    In this paper we propose a scheme which provides seamless mobility between GPRS and IEEE 802.11 (WiFi) networks. In the proposed scheme, we envision a single Service Provider, who provides Cellular (GPRS), WLA...

    Dhananjay Kotwal, Maushumi Barooah in Distributed Computing and Internet Technol… (2010)

  17. No Access

    Chapter and Conference Paper

    An Active Intrusion Detection System for LAN Specific Attacks

    Local Area Network (LAN) based attacks are due to compromised hosts in the network and mainly involve spoofing with falsified IP-MAC pairs. Since Address Resolution Protocol (ARP) is a stateless protocol such ...

    Neminath Hubballi, S Roopa, Ritesh Ratti in Advances in Computer Science and Informati… (2010)

  18. No Access

    Chapter and Conference Paper

    Fast Single-Link Clustering Method Based on Tolerance Rough Set Model

    The single-link (SL) clustering method is not scalable with the size of the dataset and needs many database scans. This is potentially a severe problem for large datasets. One way to speed up the SL method is ...

    Bidyut Kr. Patra, Sukumar Nandi in Rough Sets, Fuzzy Sets, Data Mining and Gr… (2009)

  19. No Access

    Chapter and Conference Paper

    Detecting ARP Spoofing: An Active Technique

    The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofi...

    Vivek Ramachandran, Sukumar Nandi in Information Systems Security (2005)