005_mobileinnovativecomputing

Upload: bhariprasadmsc

Post on 02-Jun-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    1/92

    SELF APPRAISAL REPORT

    SUBGROUP : MOBILE & INNOVATIVE COMPUTING

    5.1 Project Name: Performance based Resource Management and Load

    balancing in Cloud.

    5.1.1 Contributing Faculty Members

    Name:Dr. Sarbani Roy

    Department/School : Computer Science and EngineeringJournal Publications Number : 11 Journals +1 Book Chapter

    Conference Publications Number : 48

    Patents Number :Nil

    Policy Documents Number :Nil

    H Index Number : 7( http://scholar.google.com/citations?hl=en&user=vembv2sAAAAJ)

    Cumulative Impact Factor Number :

    Total Citations Number : 150( http://scholar.google.com/citations?hl=en&user=vembv2sAAAAJ)

    Awarded and ongoing doctoral thesis guidance Number: 3 ongoing

    Awarded and ongoing Masters thesis guidance Number : 23 awarded

    5.1.2 Special Achievements

    Name:Sarbani Roy

    Name of the award:1. Awarded and availed Fulbright-Nehru Senior Research Fellowship 2012-2013.

    2. Awarded UGC RAMAN Postdoctoral Fellowship 2012-2013 (not availed).

    3. Awarded cLink (with the support of Erasmus Mundus Programme of the European Union)Postdoctoral Fellowship 2012-2013 (not availed).

    5.1.3 Relevant Projects in Last 10 years including the Ongoing Projects

    1.

    Working as a Principal Investigator of Project Title: Performance based Resource Managementand Load balancing in Cloud Environment, Sponsor: under the project Mobile Computing andInnovative Applications under UPE - Phase II, 2012-2015.

    2. Worked as a co-investigator of NRDMS project entitled Development of an Integrated WebPortal for Healthcare Management based on Sensor-grid Technologies, under School of Mobilecomputing & Communication, Jadavpur University, India, 2011-2014.

    3.

    Worked as a co-investigator of UGC project entitled Monitoring Air Pollution Using GIS andSensor Technology , under department of Computer Science and Engineering, JadavpurUniversity, India, 2011-2013.

    4.

    Worked as a co-coordinator of JU-FOSS resource center collaboration of Jadavpur University andIOTA, 2008-2011.

    5. Worked as a co-investigator of DST-SERC project entitled Developing Multi-Agent System forPerformance Based Resource Brokering and Management in Computational Grid Environment,

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    2/92

    under department of Computer Science and Engineering, Jadavpur University, India, June 2007-May 2010.

    6.

    Worked as a member of DST-DAAD project entitled "Performance Monitoring and Analysis ofLarge Distributed Systems using Mobile Agents", an academic exchange program betweenTechnical University of Munich, Germany and Jadavpur University, India, June 2004-May 2006.

    5.1.4 Relevant Publications in Last 5 years

    5.1.4.1 Book Chapter: Sarbani Roy, Ajanta De Sarkar, Nandini Mukherjee, An Agent based E-learning Framework

    for Grid, accepted for publication in the Book: e-Learning Paradigms and Applications,Springer, pp. 121-144, 2014.

    5.1.4.2 Journal:

    1.

    Madhulina Sarkar, Triparna Mondal, Sarbani Roy, Nandini Mukherjee, Resource requirementprediction using clone detection technique, Future Generation Comp. Syst., Elsevier, vol. 29,

    no. 4, pp. 936-952, 2013.2.

    Sarbani Roy and Nandini Mukherjee, Dynamic topology construction of wireless sensornetwork using computational geometric approach, Intl. Journal of Sensor Network,InderScience, vol.12 no. 4, pp. 210-222, 2012.

    3. Sarbani Roy, Nandini Mukherjee, "Topology Construction of 3D Wireless Sensor Network,

    Advances in Computing and Information Technology, Springer, Volume 176, pp. 533-542, 2012.

    4.

    Sarbani Roy, Nandini Mukherjee, Efficient resource management for running multipleconcurrent jobs in a computational grid environment, Future Generation Computer Systems,Elsevier, Volume 27 Issue 8, pp 1070-1082, October 2011.

    5.

    Madhulina Sarkar, Sarbani Roy, Nandini Mukherjee, Prediction of Resource Requirement usingFeedback on Job Execution Performance, published in ScienceDirect Procedia Computer

    Science Journal, Elsevier, Volume 3, pages 1271-1276, 2011.6.

    Subrata Dutta, Nandini Mukherjee, Sarmistha Neogy and Sarbani Roy, A Comparison of theEfficiencies of Different Wireless Sensor Network Algorithms with respect to Energy, thejournal of International Journal of Information Processing,5(1), pages 1-9, 2011.

    7. Madhulina Sarkar, Rupam Mukhopadhyay, Dibyajyoti Ghosh, Sarbani Roy, NandiniMukherjee, Job Modeling using History based Prediction in Large Distributed Environment,the journal of International Journal of Information Processing Volume 4 ( issue 4), Pages 8-18,2010.

    8.

    Kaushik Ghosh, Sarbani Roy, Pradip K. Das, "I-Min: An Intelligent Fermat Point Based EnergyEfficient Geographic Packet Forwarding Technique for wireless Sensor and Ad Hoc Networks",International journal on applications of graph theory in wireless ad hoc networks and sensornetworks (GRAPH-HOC), volume 2, no. 2, June 2010.

    9.

    Sarbani Roy, Nandini Mukherjee, Multi-agent Framework for Performance-based ResourceManagement in Computational Grid Environment, International Journal of Multiagent and GridSystems, IOS Press, volume 6 no.1, pp.25-53, March 2010.

    10.

    Sarbani Roy, Nandini Mukherjee: Adaptive Execution of Jobs in Computational GridEnvironment. Journal of Computer Science and Technology, Springer, 24(5), pp. 925-938,September 2009.

    11.Ajanta De Sarkar, Sarbani Roy, Dibyajyoti Ghosh, Rupam Mukhopadhyay and NandiniMukherjee, An Adaptive Execution Scheme for Achieving Guaranteed Performance in

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    3/92

    Computational Grids, Journal of Grid Computing, Springer, volume 8, no.1 pp.109-131, May2009.

    5.1.4.3 Conference:

    C1.

    Sourav Kumar Dhar, Suman Sankar Bhunia, Sarbani Roy & Nandini Mukherjee., EnablingSmartphone as Gateway to Wireless Sensor Network, accepted for publication in theproceedings ofIEEE RAIT, Indian School of Mines - Dhanbad, 2014.

    C2.

    Sarbani Roy, Nandini Mukherjee, Integer linear programming formulation of optimal beaconplacement problem in WSN, in International Conference on Applications and Innovations onMobile Computing (AIMoC), 2014.

    C3.

    Binay Ray, Sunirmal Khatua, Sarbani Roy,Negotiation Based Service Brokering Using GameTheory, in International Conference on Applications and Innovations on Mobile Computing(AIMoC), 2014.

    C4. Zeenat Rehena, Rajesh Mukherjee, Sarbani Roy, Nandini Mukherjee, Detection of NodeFailure in Wireless Sensor Networks, in International Conference on Applications andInnovations on Mobile Computing (AIMoC), 2014.

    C5. Tathagata Das, and Sarbani Roy, Coordination Based Motion Control in Mobile WirelessSensor Network, in the proceedings of International Conference onElectronic Systems, SignalProcessing and Computing Technologies (ICESC), pp. 231-236, 2014. (D.O.I:10.1109/ICESC.2014.45).Received best paper award

    C6.

    Tathagata Das, and Sarbani Roy, Game Theory Inspired Mobile Object Trapping System inMobile Wireless Sensor Network, in the proceedings of International Conference onElectronicSystems, Signal Processing and Computing Technologies (ICESC), pp. 245-250, 2014. (D.O.I:10.1109/ICESC.2014.47)

    C7.

    Sovan Bisoi, Suman Sankar Bhunia, Sarbani Roy and Nandini Mukherjee, iSENSE :Intelligent Sensor Monitoring Services with Integrated WSN Testbed, in the proceedings ofProcedia Technology, Elsevier, CIMTA, September 27-28, Kalyani University, Kolkata, India,2013.

    C8.

    Susmita Singh, Madhulina Sarkar, Sarbani Roy and Nandini Mukherjee, Genetic algorithm

    based resource broker for computational Grid, in the proceedings of Procedia Technology,Elsevier, CIMTA, September 27-28, Kalyani University, Kolkata, India, 2013.

    C9.

    Atrayee Gupta and Sarbani Roy, Design and Implementation of Visualizers for TinyOS, inthe proceedings of Procedia Technology, Elsevier, CIMTA, September 27-28, KalyaniUniversity, Kolkata, India, 2013.

    C10.

    Pubali Datta, Madhulina Sarkar, Sarbani Roy and Nandini Mukherjee, Resource RequirementPrediction Techniques For Near Miss Clone Jobs, in the proceedings of 3rd InternationalConference on Computational Intelligence and Information Technology- CIIT , October 18-192013, Mumbai, India, 2013.

    C11.

    Madhulina Sarkar, S. Chaudamani, Sarbani Roy, Nandini Mukherjee, A Hybrid CloneDetection Technique for Estimation of Resource Requirements of a Job, in the proceedings of

    Third International Conference on Advanced Computing and Communication Technologies(ACCT), pp. 174-181, 6-7 April 2013.

    C12. Debasree Das, Zeenat Rehena, Sarbani Roy, Nandini Mukherjee, Multiple-sink placementstrategies in wireless sensor networks, in the proceedings of COMSNETS 2013, pages 1-7, 7-10 January 2013.

    C13. Susmita Singh, Madhulina Sarkar, Sarbani Roy, Nandini Mukherjee, A survey on Applicationof Machine Learning to Resource Management in Grid Environment. Lecture Notes onSoftware Engineering, vol. 1, no.2, pages: 173-177, 2013.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    4/92

    C14.

    Suman Sankar Bhunia, Soumen Das, Sarbani Roy, Nandini Mukherjee, 'Mobility managementin IP based Wireless Sensor Network using TinyOS', in the proceedings of IEEE 6thInternational Conference on Sensing Technology (ICST), 18-21 December 2012, Kolkata,India.

    C15.

    Suman Sankar Bhunia, Sarbani Roy, Nandini Mukherjee 'On efficient health-care deliveryusing Sensor-Grid', in the proceedings of CSI/IEEEInternational Conference on Emerging

    Applications of Information Technology (EAIT), 30 November -1 December 2012 Kolkata,India

    C16. Suman Sankar Bhunia, Soumen Das, Sarbani Roy, Nandini Mukherjee, An approach tomanage mobility of sensor nodes in Sensor-Grid infrastructure, in the proceedings of ElsevierProcedia International Conference on Communication Computing Security (ICCCS) , 6-8October 2012 Rourkela, India.

    C17. Suman Sankar Bhunia, Dilip Sikder, Sarbani Roy, Nandini Mukherjee, A Comparative Studyon Routing schemes of IP based Wireless Sensor Network, in the proceedings of IEEE 9thInternational Conference on Wireless and Optical Communications Networks (WOCN), 20-22September2012,Indore, India.

    C18.

    Avishek Mukherjee, Sarbani Roy, Nandini Mukherjee, An approach of Beacon Placement andBeacon based Routing towards Mobile Sink in WSN, in the proceedings of CUBE 2012, Pune,India, 3-5 September 2012.

    C19. Siba Mitra, Ajanta De Sarkar, Sarbani Roy, A Review of Fault Management System inWireless Sensor Network, in the proceedings of CUBE 2012, Pune, India, 3-5 September2012.

    C20. Pallavi Sanyal, Somasri Das, Suman Sankar Bhunia, Sarbani Roy, Nandini Mukherjee AnExperience of Implementing IPv6 based Data Retrieval System for Wireless Sensor Networks,in the proceedings of IEEE International Conference on Recent Advances in Computing andSoftware Systems(RACSS), April 25-27, 2012 Chennai, India.

    C21.

    Pallavi Sanyal, Somasri Das, Sarbani Roy and Nandini Mukherjee A Study on Multiple SinkRouting, in the proceedings of IEEE 4th International Conference on Electronics ComputerTechnology (ICECT), Kanyakumari, India.

    C22.

    Zeenat Rehena, Debasree Das, Sarbani Roy, Nandini Mukherjee, A Comparative Study ofPartitioning Algorithms for Wireless Sensor Networks, in the proceedings of 3rdInternationalConference on Wireless and Mobile Networks (WiMoNe -3.0) by Springer in LNICST,Bangalore, India, January 2- 4, 2012.

    C23.

    Zeenat Rehena, Sarbani Roy, Nandini Mukherjee, A Modified SPIN for Wireless SensorNetworks, Poster publication in the 3rdInternational Conference on Communication Systemsand Networks(COMSNETS 2011), IEEE, Bangalore, India, January 4-8, 2011.

    C24.

    Suman Sankar Bhunia, Sarbani Roy, Nandini Mukherjee, IEMS: Indoor EnvironmentMonitoring System using ZigBee Wireless Sensor Network, in the proceedings ofInternational Conference on Communication, Computing & Security (Proceedings by ACMwith ISBN-978-1-4503-0464-1), ICCCS 2011, Rourkela, India, February 12-14, 2011

    C25.

    Tathagata Das, Sarbani Roy, Nandini Mukherjee, Capability Aware AODV Algorithm in ns-2Environment, in the proceedings of International Conference on Network and ComputerScience, ICNCS 2011, Kanyakumari, India, April 8-10, 2011

    C26.

    Madhulina Sarkar, Sarbani Roy, Nandini Mukherjee, Prediction of Resource Requirementusing Feedback on Job Execution Performance, published in ScienceDirect Procedia ComputerScience Journal, Elsevier, Volume 3, pages 1271-1276, 2011.

    C27.

    Zeenat Rehena, Sarbani Roy, Nandini Mukherjee, Topology Partitioning in Wireless SensorNetworks using Multiple Sinks, in the proceedings of 14th International Conference on

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    5/92

    Computer and Information Technology (ICCIT 2011), IEEE, Dhaka, Bangladesh, December22-24, 2011

    C28.

    Madhulina Sarkar, Rupam Mukhopadhyay, Dibyajyoti Ghosh, Sarbani Roy, NandiniMukherjee, Feedback Guided Job Modeling in PRAGMA Environment, in the proceedings ofInternational Conference on Grid Computing and Applications (GCA'10) with The WorldCongress in Computer Science, Computer Engineering, and Applied Computing. Las Vegas,

    Nevada, USA July 12-15 2010.C29.

    Subrata Dutta, Nandini Mukherjee, Sarmistha Neogy, Sarbani Roy, A Comparison of theEfficiencies of Different Wireless Sensor Network Algorithms with respect to Time, TheSecond International conference on Networks & Communications (NeCoM-2010), Chennai,July 23-25, 2010, pp.602-618, published in Recent Trends in Networks and Communications,Communications in Computer and Information Science, 2010, Volume 90, Part 4, 602-618, bySpringer.

    C30.

    Madhulina Sarkar, Sarbani Roy, Nandini Mukherjee, Utilizing PAPI features for ResourceRequirement Prediction in Grid Environment, in the proceedings of 22

    nd International

    Conference on Parallel and Distributed Computing and Systems (PDCS 2010) organised byIASTED, Marina Del Rey, USA, November 8-10, 2010.

    C31. Monideepa Roy, Tathagata Das, Sarbani Roy, Nandini Mukherjee, Extending CAODV toAccommodate Mobility Management of Participating Devices, in the proceedings of 22 ndInternational Conference on Parallel and Distributed Computing and Systems (PDCS 2010)organised by IASTED, Marina Del Rey, USA, November 8-10, 2010.

    C32.

    Madhulina Sarkar, Rupam Mukhopadhyay, Dibyajyoti Ghosh, Sarbani Roy, NandiniMukherjee, Job Modeling using History based Prediction in Large Distributed Environment,in the proceedings of Fourth International Conference on Information Processing 2010 (ICIP-2010), Bangalore, August 06 - 08, 2010.

    C33.

    Zeenat Rehena, Krishanu Kumar, Sarbani Roy, Nandini Mukherjee, SPIN Implementation inTinyOS Environment using nesC, in the proceedings of 2nd International Conference onComputing, Communication and Networking Technologies, Karur, Tamilnadu, India, July 29th-31st, 2010.

    C34.

    Madhulina Sarkar, Sarbani Roy and Nandini Mukherjee, Feedback-guided Analysis forResource Requirements in Large Distributed System, in the proceedings of 10th IEEE/ACMInternational Conference on Cluster, Cloud and Grid Computing (CCGrid 2010), Melbourne,Victoria, Australia, May 17-20 2010.

    C35. Kaushik Ghosh, Sarbani Roy, Pradip K. Das, "An Alternative Approach to Find the FermatPoint of a Polygonal Geographic Region for Energy Efficient Geocast Routing Protocols:Global Minima Scheme," in the proceedings of NETCOM, First International Conference onNetworks & Communications, Chennai, India, pp.332-337, December 27-29, 2009.

    C36.

    Zeenat Rehena, Krishanu Kumar, Sarbani Roy, Nandini Mukherjee, Application of WirelessSensor Network in Forest Fire Detection, in the proceedings of 2ndIndia Disaster ManagementCongress, New-Delhi, November4-6th, 2009.

    5.1.4.4 Poster: Atrayee Gupta, Sarbani Roy, "Visualizers for TinyOS", Poster in 14th ACM International

    Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Bangalore, 2013.

    Atrayee Gupta, Sarbani Roy, "Game theory based Scheme for Area Coverage and Data Collectionin MWSN ", Poster in 14th ACM International Symposium on Mobile Ad Hoc Networking andComputing (MobiHoc), Bangalore, 2013.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    6/92

    5.1.5 Ongoing Work under UPE II 2012-14

    Title : Negotiation Based Service Brokering Using Game TheoryAuthors: Sarbani Roy, Benay Kumar Ray, Sunirmal Khatua

    Abstract:

    Enterprise cloud computing has emerged as a promising technology, where on-demand provisioningof services like storage, infrastructure, software and platform are provided. Growing market of cloudcomputing, resulted in a variety of heterogeneous cloud services. This leads to a difficult problem forCloud Service Consumer when selecting their best fitting Cloud Service Providers (SP), who canprovide best quality resource at negotiated price. Thus we propose a middleware based Cloud ServiceBroker (SB) architecture for enterprise cloud computing.

    The objective of SB is to find the most suitable SP for a SC based on negotiation with Service LevelAgreement (SLA) parameters like price and quality. Second we propose game theory model forautomatic SLA negotiation between SC and SP where CSB provides optimal value of price andquality to both the parties.

    Fig. 1. A cloud service broker architecture

    Some significant remarks:

    Heterogeneity in cloud infrastructure due to growing market of cloud computing justify theneed for a cloud resource broker. The resource broker assists service consumers to find theappropriate service provider, on proper negotiation on SLA parameters like price and quality.

    We propose a middleware based resource brokering architecture for cloud eco-system in orderto help service consumer to reduce overhead of selecting right SP for their application. Theobjective of SB is to find a most suitable SP, who can provide best quality instance atnegotiated price to SC. SB may save SC time and extra money and determine task completiontime, optimal negotiated price and quality of instance and best SP.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    7/92

    Second we provide suitable model for SLA negotiation based on game theory. In our model SBnegotiates SLA on behalf of both SC and SP and provides optimal value for price and quality toboth the parties.

    5.1.6 Work plan during 2014-17

    Issues and Motivation: Cloud federation has been proposed as a new paradigm that allows providers to avoid the

    limitation of owning only a restricted amount of resources, which forces them to reject newcustomers when they have not enough local resources to fulfil their customers requirements.

    Federation allows a provider to dynamically outsource resources to other providers in response todemand variations. It also allows a provider that has underused resources to rent part of them toother providers. Both things could make the provider to get more profit when used adequately.One of the key motivations for IaaS providers is the possibility of making profit by leveragingtheir available data center resource to serve potential thousands of users.

    Challenges:1. How to provide incentive for self-interested agents to contribute their resource to a coalition is a

    highly non-trivial problem.2.

    How to decide the amount of resource each agent should contribute to the coalition and how therevenues can be shared in the coalition are both extremely complicated issues.

    3.

    In addition, unknown internal demand of data center has to be considered when offering service topublic cloud users and type of service level agreement necessary to form between different cloudservice providers.

    Objective:

    Our main objective is to propose a middleware based Cloud Service Provider Broker (SPB)architecture for enterprise cloud computing. Our SPB may provide solution based on someoptimization technique to allow different cloud service providers (SP) to avoid the limitation ofowning only a restricted amount of resources and to provide solution for existing challenge in thecooperation cloud computing environment. Our main target is to provide such solution for SP

    where they can cooperate together accomplishing trust contexts and providing new businessopportunities such as cost-effective assets optimization, and on-demand resources provisioning onproper SLA agreement.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    8/92

    5.2 Project Name: Design of a Secure and Trusted Wireless Sensor

    Network for border and perimeter tracking

    5.2.1 Contributing Faculty Members:

    Sarmistha Neogy, Department of Computer Science and Engineering, Age 48 years, Journal

    Publications 13, Conference Publications 59, Awarded and ongoing doctoral thesis guidance 5,Awarded and ongoing Masters thesis guidance 25 (approx)

    5.2.2 Relevant Projects in Last 10years including the Ongoing ProjectsProject Title Sponsoring

    Agency

    Members Grant

    Value (Rs)

    Duration

    JU FOSS Resource Centre DIT, Govt.of WestBengal

    Sarmistha Neogy,CoordinatorSarbani Roy, Jt.CordinatorChandreyeeChowdhury, Jt.Cordinator

    35 lakh 2008

    2011

    Study and Design of DependableMobile Computing Systems

    UGC MRP Sarmistha Neogy(PI) 10 lakh 2011-2013

    Checkpointing and RecoveryProtocol for Minimal Set ofNodes in Mobile ComputingSystems

    UGC UPE-I Sarmistha Neogy(PI) 5.12 lakh 2004-2007

    5.2.3 Relevant Publications in Last 5 years

    5.2.3.1 JOURNAL PUBLICATTIONS

    1.

    Chandreyee Chowdhury, Sarmistha Neogy, Checkpointing using Mobile Agents for Mobile

    Computing System, International Journal of Recent Trends in Engineering, ISSN 1797-9617,Vol. 1, No.2, May 2009, Academy Publishers, pp. 26 29

    2.

    Sourav Saha, Mainak Mukherjee, Sarmistha Neogy, Locating mobile nodes using heuristicswith fuzzy logic handoff, International Journal of Artificial Intelligence and Soft Computing(IJAISC), ISSN (Online): 1755-4969 - ISSN (Print): 1755-4950, Vol. 1, Nos. 2/3/4, 2009,Inderscience Publishers, 2009, pp. 290 315

    3.

    Giribabu G, Sarmistha Neogy and Mita Nasipuri, Optimal Cost-Effective Design of StandbySystems Subject to Imperfect Fault-Coverage, International Journal of Recent Trends inEngineering, ISSN 1797-9617, Vol. 2, No. 1-6, November 2009, Academy Publishers, pp. 34 38

    4. Suparna Biswas, Sarmistha Neogy, A Mobility-based Checkpointing Protocol for Mobile

    Computing Systems, International Journal of Computer Science and Information Technology(IJCSIT), ISSN:0975-3826(online); 0975-4660 (Print),Vol. 2, No. 1, February 2010, pp. 135 151

    5.

    Sarmistha Neogy, Anupam Sinha, P. K. Das, Checkpointing with Synchronized Clocks inDistributed Systems, International Journal of UbiComp (IJU), ISSN:0975-8992(online);0976-2213(Print), Vol. 1, No.2, April 2010, pp. 65 91

    6. Subrata Dutta, Nandini Mukherjee, Sarmistha Neogy and Sarbani Roy, A ComparativeStudy on Different Wireless Sensor Network Routing Algorithms, International Journal ofInformation Processing, Volume 5, Issue 1, 2011, pp. 1 9

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    9/92

    7.

    Chandreyee Chowdhury, Sarmistha Neogy, Reliability Estimation of Mobile Agent System inMANET with Dynamic Topological and Environmental Conditions, International Journal onAdvances in Networks and Services, ISSN: 1942-2644 , vol 4 no 1 & 2, pp. 55 65, 2011

    8. Chandreyee Chowdhury, Sarmistha Neogy, Securing Mobile Agents in MANET againstAttacks using Trust, International Journal of Network Security & its Applications (IJNSA),ISSN : 0974 - 9330[Online]; 0975- 2307 [Print], Vol.3, Issue 6, pp. 259 274, 2011

    9.

    Roshni Neogy, Chandreyee Chowdhury, Sarmistha Neogy, Reliability of Mobile Agents forReliable Service Discovery Protocol in MANET, International Journal of Wireless andMobile Networks (IJWMN), ISSN: 0975-3834[Online]; 0975- 4679 [Print], Vol.3, No.5, pp.229 243, 2011

    10. S. Biswas, S. Neogy, P. Dey, Mobility Based Checkpointing and Trust Based Recovery inMANET , International Journal of Wireless and Mobile Networks (IJWMN), ISSN: 0975-3834[Online]; 0975- 4679 [Print], DOI : 10.5121/ijwmn.2012.4404, Vol. 4, No.4., August2012, pp. 53 - 69

    11.

    Anandita Sarkar, Chandreyee Chowdhury, Sarmistha Neogy, Reliability Modeling ofEmbedded Nodes in Real time Wireless Systems, International Journal of Embedded andReal-Time Communication Systems (IJERTCS), Vol. 4, Issue 3, 2013, Special issue onNetworked Embedded Systems, DOI: 10.4018/IJERTCS, ISSN: 1947-3176, EISSN: 1947-3184, pp. 1 18

    12. S. Biswas , P. Dey, S. Neogy, "Improved Recovery Probability of Mobile Hosts using Energyand Mobility based Secure Checkpointing Recovery", International Journal of TrustManagement in Computing and Communications (IJTMCC), ISSN online: 2048-8386, ISSNprint: 2048-8378, Inderscience publisher, Switzerland (Accepted), 2014.

    13.

    Subrata Dutta, Nandini Mukherjee, Monideepa Roy, Sarmistha Neogy, A Study on EfficientPath Selection Algorithms for Propagating Data Messages with a Goal of Optimizing EnergyDissipation in WSN, International Journal of Sensor Network, accepted for thepublication(Accepted).

    5.2.3.2 CONFERENCE PUBLICATTIONS

    14.

    C. Chowdhury, S. Neogy, Reliability estimation of Fault-tolerant Wireless and MobileNetworks, Proceedings of The Third International Conference on Communication Theory,Reliability, and Quality of Service CTRQ 2010,Athens, Greece, June 13-19, 2010, pp. 67 - 72

    15. C. Chowdhury, S. Neogy, Estimating Reliability of Mobile Agent System for Mobile AdhocNetworks. IEEE Proceedings of The Third International Conference on DependabilityDEPEND 2010, Venice, Italy, July 18-25, 2010, pp. 45 - 50

    16. Kowsar Ali, S. Neogy, P. K. Das, Clustering using optimal energy and GPS-enabled sensornodes, IEEE Proceedings of The Fourth International Conference on Sensor Technologiesand Applications SENSORCOMM 2010,Venice, Italy, July 18-25, 2010, pp. 13 - 18

    17.

    Subrata Dutta, Nandini Mukherjee, Sarmistha Neogy and Sarbani Roy, A Comparison of theEfficiencies of Different Wireless Sensor Network Algorithms with respect to Energy,

    Proceedings of Fourth International Conference on Information Processing (ICIP-2010),Bangalore, India, August 06 - 08, 2010, pp. 271-280, published by: I.K. InternationalPublishing House Pvt. Ltd., ISBN: 978-93-80578-46-0. Winner of the best paper award.

    18.

    Chandreyee Chowdhury, Sarmistha Neogy, Reliability Estimate of Mobile Agent System forQoS MANET Applications, IEEE Proceedings of The Annual Reliability and MaintainabilitySymposium (RAMS) 2011, USA, January 24 27, 2011, pp.

    19. Suparna Biswas, Sarmistha Neogy, A Handoff Based Checkpointing and Recovery Scheme inMobile Computing System, IEEE Proceedings of International Conference on InformationNetworking (ICOIN) 2011, Malayasia, January 26 28, 2011, pp.441 446

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    10/92

    20.

    C. Chowdhury and S. Neogy, Reliability Estimation of Learning based Mobile AgentSystem in MANET, in the World Congress on Information and CommunicationTechnologies (WICT 2011), India, pp. 990 995, 2011.

    21. S. Biswas, S. Neogy, Secure Checkpointing Using Public Key Cryptography MobileComputing, Proceedings of the 5th IEEE International Conference on Advanced Networksand Communication Systems, ANTS (2011), India, 174-176, ISBN: 978-1-4673-0093-3.

    22.

    C. Chowdhury and S. Neogy, Reliability of mobile agent system in QoS mobile network, inthe Fourth International Conference on Communication Systems and Networks (COMSNETS2012), India, pp.1-2, 2012.

    23. S. Neogy and C. Chowdhury, Reliability Modeling of MANET using Mobile AgentSystem, in the Proceedings of theAnnual Reliability and Maintainability Symposium (RAMS2012), USA, Jan 23-26, 2012.

    24.

    R. Neogy, C. Chowdhury and S. Neogy, A Reliable Service Discovery protocol usingMobile Agents in MANET, in the Proceedings of the Annual Reliability and MaintainabilitySymposium (RAMS 2012), USA, Jan 23-26, 2012.

    25.

    S. Biswas, P. Dey, S. Neogy, Trusted Checkpointing Based on Ant Colony Optimization inMANET, in the Proceedings of 3rd IEEE International Conference on Emerging

    Applications of Information Technology (EAIT 2012),India, pp. 433-439, ISBN: 978-1-4673-1825-9.

    26. Arijita Banerjee, Sarmistha Neogy, Chandreyee Chowdhury, Reputation based TrustManagement System for MANET, in the Proceedings of Third International Conference onEmerging Applications of Information Technology (EAIT 2012), India, pp. 376-381.

    27. Munshi Navid Anjum, Chandreyee Chowdhury, Sarmistha Neogy, Securing Network usingMobile Agents, in the Proceedings of International Conference on Communications,Devices and Intelligent Systems (CODIS) 2012, India, pp. 274-277.

    28. Chandreyee Chowdhury, Sarmistha Neogy, Reputation Model of k-terminal ReliableMANET using Reliable Mobile Agents, in the Proceedings of Second InternationalWorkshop on Computing and Networking for Internet of Things (ComNet-lot 2013), ICDCN

    2013, India, pp. 21-26.

    29. Atreyee Chaudhuri, Sarmistha Neogy, Bijan Bihari Bhaumik, Multi-hop Unequal ClusteringRouting for Wireless Sensor Networks, in the Proceedings of International Conference onEmerging Research in Computing, Information, Communication and Applications, ERCICA

    2013,Elsevier Proceedings, India, pp. 159 162, ISBN: 9789351071020

    30. Sayantani Saha, Mousumi Saha, Sarmistha Neogy, Coordinator Node-based Collection TreeProtocol for Wireless Sensor Networks, in the proceedings of International Conference onEmerging Research in Computing, Information, Communication and Applications, ERCICA

    2013,Elsevier Proceedings, India, pp. 163 169, ISBN: 9789351071020

    31. Suparna Biswas, Sarmistha Neogy, Improving Recovery Probability of Mobile Hosts UsingSecure Checkpointing, in the Proceedings of 2nd International Conference on Advances inComputing, Communication and Informatics (ICACCI 2013),India, pp. 984 - 989

    32.

    S. Biswas, T.Nag, S. Neogy, Trust Based Energy Efficient Detection and Avoidance ofBlack Hole Attack to Ensure Secure Routing in MANET, Accepted for oral presentation inthe IEEE International Conference on Applications and Innovations in Mobile Computing(AIMoC 2014), India, 2014

    33.

    Gaurav Mitra, Chandreyee Chowdhury, S. Neogy, Application of Mobile Agent in VANETfor measuring environmental data, Accepted for oral presentation in the IEEE InternationalConf. on Applications and Innovations in Mobile Computing (AIMoC 2014), India, 2014.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    11/92

    34.

    Sayantani Saha, S. Neogy, Case study on a smart Surveillance system using WSN and IPwebcam, Accepted for oral presentation in the IEEE International Conference onApplications and Innovations in Mobile Computing (AIMoC 2014), India, 2014.

    35. Subrata Dutta, Nandini Mukherjee, Sarmistha Neogy, Sarbani Roy, A Comparison of theEfficiencies of Different Wireless Sensor Network Algorithms with respect to Time,Communications in Computer and Information Science, 1, Volume 90, Recent Trends in

    Networks and Communications, Part 4, Pages 602-61836.

    Chandreyee Chowdhury, Sarmistha Neogy, Mobile Agent Security based on Trust Model inMANET, Advances in Computing and Communications (ACC 2011), Communications inComputer and Information Science, 2011, Volume 190, Part 1, pp. 129-140, DOI:10.1007/978-3-642-22709-7_14

    37.

    Suparna Biswas, Sarmistha Neogy, Secured Fault tolerant Mobile Computing, Advances inComputing and Communications (ACC 2011), Communications in Computer andInformation Science, 2011, Volume 190, Part I1, pp. 417-429, DOI: 10.1007/978-3-642-22709-7_14

    38. Roshni Neogy, Chandreyee Chowdhury, Sarmistha Neogy, Reliability Estimation of MobileAgents for Service Discovery in MANET, First International Conference on Parallel,Distributed Computing Technologies and Applications, PDCTA 2011, Communications inComputer and Information Science, Volume 203, pp. 148-157, 2011, DOI: 10.1007/978-3-642-24037-9

    39. Chandreyee Chowdhury, Sarmistha Neogy, Mobile Agent Security in MANET usingReputation, First International Conference on Parallel, Distributed Computing Technologiesand Applications, PDCTA 2011, Communications in Computer and Information Science,Volume 203, pp. 158-178, 2011, DOI: 10.1007/978-3-642-24037-9

    40. C. Chowdhury and S. Neogy, Reliability Estimation of Delay tolerant QoS Mobile AgentSystem in MANET, in the 10th International Conference on Computer Information Systemsand Industrial Management Applications (CISIM 2011), Communications in Computer andInformation Science, pp. 38-47, 2011.

    41.

    S. Biswas, S. Neogy, Checkpointing and recovery using node mobility among clusters in

    mobile ad hoc network, Proceedings of the Fourth International conference on Networksand Communicatins, NECOM, (2012), AISC 176, 2012,pp. 447-456, 2012.

    42.

    Subrata Dutta, Nandini Mukherjee, Monideepa Roy and Sarmistha Neogy, Efficient PathSelection to Propagate Data Message for Optimizing the Energy Dissipation in WSN in theProceedings of WiMone-2012, AISC 176, pp. 671 683, 2012

    5.2.4 Facilities Available

    a) Four nos. of laptops and 4 nos. of handheld devices and a desktop with printer, scanner.

    5.2.5 Ongoing Work under UPE II 2012-14

    1. Title:Coordinator Node-based Collection Tree Protocol for Wireless Sensor Networks,

    Authors: Sayantani Saha, Mousumi Saha, Sarmistha Neogy

    Name of the Proceedings: in the proceedings of International Conference on Emerging Research inComputing, Information, Communication and Applications, ERCICA 2013, Elsevier Proceedings,India, pp. 163 169, ISBN: 9789351071020

    Abstract: Routing protocol in Wireless Sensor Network (WSN) poses lots of challenges in todaysresearch world. In most of the applications we need to maintain reliability, efficiency, scalability. Inthis context we have evaluated the performance of Collection Tree Protocol (CTP) for WSNapplications and examined that CTP performs poorly in case of data delivery most of the times due to

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    12/92

    path inconsistency factors like routing loop generation, dynamic links, etc. Hence the problem ofroute discovery in CTP leads to retransmission, packet dropping etc. This finally results in poor datadelivery rate of that application. Therefore a coordinator based approach along with the basic CTPmechanism is proposed and analyzed here.

    In mobile scenario the CTP protocol faces challenges in route discovery and maintenance of the routetowards the particular sink. Therefore the coordinator based approach allows a node to reliably send

    data to its particular sink and maintain the route history for the rest of the sessionStatus: Published

    Most significant conclusion(s):

    The proposed CN-based CTP approach tries to provide a virtual backbone structure for routing fromsource to destination. It is however challenging to provide a wireless backbone structure in mobilewireless scenario since any node may move or fail due to power outage. The proposed work providesa backup network support of CTP itself. The proposed algorithm follows the traditional CTPmechanism if the CN-based approach does not work. So data delivery will not be disrupted but carriedout, albeit, with some delay2.

    2. Title:Case study on a smart Surveillance system using WSN and IP webcam

    Authors: Sayantani Saha, Sarmistha NeogyAbstract: Surveillance is becoming a need in any public or private area to cope up with increasingnumber of threats starting from burglary, robbery to terrorist activities. The traditional methods formonitoring are commonly confined in the use of CCTV cameras or wireless sensor network (WSN).These two techniques serve the purpose in different ways. CCTV cameras help in visual monitoringof target area whereas WSN helps in acquiring physical information from the environment, likechange in thermal, chemical, magnetic conditions. In this paper we incorporate advantages of bothtechnologies to build up a smart surveillance system. We have proposed a centralized computer basedapplication that identifies movement of human beings in target area and keep the visual evidence ofthe movement with the help of the camera. This is an event based system, thus, substitutes the needfor continuous monitoring of the area. A prototype application is deployed in university laboratoryroom to evaluate some preliminary functionalities of the application.

    Status: Presented in IEEE International Conference on Applications and Innovations in MobileComputing (AIMoC 2014)and to be included IEEEXplore digital Library

    Most significant conclusion(s):

    Our approach is a real time implementation of various network components. The deployment of the IPweb cam along with PIR sensors not only enhances the overall system, it also opens up newdimensions for improving the system.

    The track record of any movement with the video evidence will obviously help in unauthorisedmovement in the lab. Even an untimely movement in the lab could be traced. This case study willwork as a strong back bone of a secure dependable advance surveillance system.

    5.2.6 Work plan during 2014-17

    Developing a routing protocol for the surveillance system for a large monitoring area.

    Integrate further security measures with the proposed protocol.

    Security measures to include integrity and confidentiality.

    Develop technique to inform through SMS / tone / mail in case of breach of security.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    13/92

    5.3 Project Name: Studies on Intrusion Detection in Wireless Network

    5.3.1 Contributing Faculty Members

    1. Dr Matangini Chattopadhyay, School of Education Technology, 48, Journal Publications 3,Conference Publications 21, Patents NIL, Policy Documents NIL, H Index NIL, Cumulative

    Impact Factor NIL, Total Citations , Awarded and ongoing doctoral thesis guidance 3, Awardedand ongoing Masters thesis guidance 72.

    2. Saswati Mukherjee, School of Education Technology, 37, Journal Publications 1, ConferencePublications 7, Patents NIL, Policy Documents NIL, H Index NIL, Cumulative Impact Factor NIL, Total Citations 1, Awarded and ongoing doctoral thesis guidance NIL, Awarded and ongoingMasters thesis guidance 38.

    5.3.2 Relevant Projects in Last 10 years including the Ongoing Projects

    Project Title Sponsoring

    Agency

    Members Grant

    Value

    Duration

    Studies in Wireless andMobile Networks: Aspects ofMulticasting, Optimizationand Security

    Interra Systems(I)Pvt. Ltd.

    Prof. SamiranChattopadhyay (PI)Dr MatanginiChattopadhyay (Jt. PI)Saswati Mukherjee (Co-PI)

    Rs 7.00Lakhs

    April 2009 March 2010

    Capability Enhancement andInter-operability of MobileMiddleware Systems

    UGC Prof. SamiranChattopadhyay (PI)Dr MatanginiChattopadhyay (Co-PI)

    Rs 5.98Lakh

    February2004 October2007

    Studies to ImproveCapabilities for Generation,Delivery and Viewing ofMultimedia Content in

    Mobile CommunicationNetwork

    UGC Dr MatanginiChattopadhyay (PI)Prof. SamiranChattopadhyay (Co-PI)

    Rs 7.28Lakh

    February2004 October2007

    5.3.3 Relevant Publications in Last 5years

    1.

    Diptangshu Pandit, Samiran Chattopadhyay, Matangini Chattopadhyay, Nabendu Chaki,Resource Allocation in Cloud Using Simulated Annealing, Proceedings of the InternationalConference on 2014 Applications and Innovations in Mobile Computing (AIMoC), [ISBN:978-1-4799-3880-3], Kolkata, IEEE Xplore, pp 21-27, Feb 28- March 01, 2014.

    2. Chiranjib Patra, Matangini Chattopadhyay, Parama Bhaumik, Moonmoon Bhattacharya,Saswati Mukherjee, A Reliable Two- Tier Energy-Efficient Topology Building Algorithmfor Wireless Sensor Networks, Proceedings of the International Conference on 2014Applications and Innovations in Mobile Computing (AIMoC), [ISBN: 978-1-4799-3880-3],

    Kolkata, IEEE Xplore, pp 146-150, Feb 28- March 01, 2014.

    3.

    Sauradyuti Coondu, Anasua Mitra, Samiran Chattopadhyay, Matangini Chattopadhyay,Moonmoon Bhattacharya, Network-Coded Broadcast Incremental Power Algorithm forEnergy-Efficient Broadcasting in Wireless Ad-Hoc Network, Proceedings of the InternationalConference on 2014 Applications and Innovations in Mobile Computing (AIMoC), [ISBN:978-1-4799-3880-3], Kolkata, IEEE Xplore, pp 42-47, Feb 28- March 01, 2014.

    4. Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Debarshi Sanyal,Roshni Neogy and Samanwita Pal, A Novel Incentive Based Scheme to Contain Selective

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    14/92

    Forwarding in Wireless Sensor Network, 12th International Conference on ComputerInformation Systems and Industrial Management Applications, (CISIM 2013), Sept 25- 27,2013.

    5.

    Debarshi Kumar Sanyal, Matangini Chattopadhyay, Samiran Chattopadhyay, Recovering aGame Model from an Optimal Channel Access Scheme for WLANs, Tele CommunicationSystems Journal, Springer [Indexed Journal], Volume 52, Issue 2: 475-483, 2013.

    6.

    Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Prince Bose,Agniswar Bakshi, Detection of Selective Forwarding Attack in Wireless Ad hoc Networksusing Binary Search, Proceedings of the Third International Conference on EmergingApplications of Information Technology, EAIT 2012, Kolkata, IEEE Xplore, pp 382 386,November 29 December 01, 2012.

    7.

    Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay, AnEfficient Binary Playfair Algorithm using a 44 Playfair Key Matrix, Proceedings of 11th Int.Conf. on Information Systems and Industrial Management, Venice, Italy, Lecture Notes inComputer Science, Volume 7564, A. Cortesi et al. (Eds.), Springer, pp. 314325, September26-28, 2012.

    8.

    Saswati Mukherjee, Sreya Dey, Rajdeep Mukherjee, Matangini Chattopadhyay, Debarshi

    Kumar Sanyal, Samiran Chattopadhyay, Addressing Forwarders Dilemma: A Game-Theoretic Approach to Induce Cooperation in a Multi-Hop Wireless Network, Proceedings ofthe 3rd International Conference on Advances in Communication, Network, and Computing(CNC 2012), Bangalore, India, Lecture Notes of the Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering, Das, Vinu V; Stephen, Janahanlal (Eds.),Springer, Volume 108, 93 98, Feb 24-25, 2012.

    9. Chiranjib Patra, Arindam Mondol, Parama Bhaumik, Matangini Chattopadhyay, AnEnergy Efficient Event Based Hierarchical clustering Algorithm for Wireless SensorNetwork., Proceedings of Global Trends in Computing and Communication Systems,Vellore, Communications in Computer and Information Science, Volume 269, P. VenkataKrishna, M. Rajasekhara Babu, Ezendu Ariwa (Eds), Springer, pp 380-385, December 9 11, 2011.

    10.

    Chiranjib Patra, Arindam Mondal, Parama Bhaumik, Matangini Chattopadhyay, TopologyManagements in Wireless Sensor Networks, in Wireless Sensor Networks and EnergyEfficiency: Protocols, Routing and Management, IGI Global, [ISBN No. 9781466601024]2012, pp. 14 24.

    11.

    Soumadeep Chakraborty, Diptendu Dutta, Matangini Chattopadhyay, E-Learning ContentTemplate Design with Subjective Metadata, Proceedings of 10thWorld Conference on Mobileand Contextual learning, Beijing, China, pp. 206 211, October 18 - 21, 2011.

    12.Ishita Bhakta, Sandip Chakraborty, Barsha Mitra and Debarshi Kumar Sanyal, MatanginiChattopadhyay, Samiran Chattopadhyay, Designing an Efficient Delay Sensitive RoutingMetric for IEEE 802.16 Mesh Networks, Proceedings of The 2011 International Conferenceon Wireless and Optical Communications, Zhengzhou, China, May 21 - 22, 2011.

    13.

    Chiranjib Patra, Parama Bhaumik, Matangini Chattopadhyayand Anjan Guha Roy, UsingSelf Organizing Map in Wireless Sensor Network for Designing Energy Efficient Topologies,Proceedings of 2nd International Conference on Wireless Communications VehicularTechnology, Information Theory and Aerospace & Electronics Systems Technology, ChennaiIndia, IEEE Press, [ISBN: 978-1-4577-0786-5], 1-6, February 28, 2011 March 03, 2011.

    14.

    Ishita Bhakta, Sandip Chakraborty, Barsha Mitra, Debarshi Kumar Sanyal, SamiranChattopadhyay and Matangini Chattopadhyay, A DiffServ Architecture for QoS AwareRouting for Delay Sensitive and Best Effort Services in IEEE 802.16 Mesh Networks,Journal of Computer Networks and Communications, 2011.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    15/92

    15.Barsha Mitra, Debarshi Kumar Sanyal, Matangini Chattopadhyay and SamiranChattopadhyay, A Novel QoS Differentiation Framework for IEEE 802.11 WLANs: a Game-Theoretic Approach Using an Optimal Channel Access Scheme, Computational Intelligenceand Information Technology, Communications in Computer and Information Science, Vinu VDas, Nessy Thankachan (Eds), Volume 250, Springer, pp 500 502, 2011.

    16.

    Lovely Chatterjee, Saswati Mukherjee and Matangini Chattopadhyay, A Personalized

    Mobile Application Using Location Based Service, Advances in Computer Science andEducation Applications, Communications in Computer and Information Science, Mark Zhou,Honghua Tan (Eds), Volume 202, Springer, pp 413 419, 2011.

    17.

    Debarshi Kumar Sanyal, Matangini Chattopadhyay, Samiran Chattopadhyay, NashEquilibrium in Collision Channels, Book Chapter in the Book Game Theory andApplications, Edited By Leon Petrosjan and Vladimir V. Mazalov, NOVA Publishers. vol. 3,pp. 113-135, Nova Science Publishers [ISBN No. 978-1-61122-074-2], 2011.

    18.

    Debarshi Kumar Sanyal, Matangini Chattopadhyay, Samiran Chattopadhyay, SandipChakraborty, Congestion Games in Wireless Channels with Multi-packet ReceptionCapability, Proceedings of the International Conference on Advances in Information andCommunication Technologies (ICT 2010), India, published in Communications in Computerand Information Science, Vol. 101, Springer, pp 201-205, Sep 07-09, 2010.

    19.

    Sudipto Ghosal,Saswati Mukherjee, An Enhanced Secure and Comprehensive Data HidingApproach Using 24 Bit Color Images, International Conference on Advanced Computing &Communication (ICACC 2010), Kerala, India, pp 61-65, May 2010.

    20.Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Amrita Saha, AKey Re-Distribution and Authentication Based Technique for Secured Communication inClustered Wireless Sensor Networks with Node Mobility, International Journal of ComputerNetworks & Communications (IJCNC), 2(6), pp 104 115, 2010.

    21.

    Ishita Bhakta, Debarshi Kumar Sanyal, Matangini Chattopadhyay, Samiran Chattopadhyay,Incorporating QoS Awareness in Routing Metrics for Wireless Mesh Networks, Proceedingsof the 2010 International Conference of Wireless Networks, London, UK, IEANG Press,[ISBN: 978-988-17012-9-9], pp. 780 784, June 30 July 02, 2010.

    22.

    Debarshi Kumar Sanyal, Matangini Chattopadhyay, Samiran Chattopadhyay, PerformanceImprovement of Wireless MAC Using Non-Cooperative Games, Advances in ElectricalEngineering and Computational Science, Lecture Notes in Electrical Engineering 39 pp. 207218, Springer Verlag [ISSN No. 1876 1100], 2009.

    23.

    Debarshi Kumar Sanyal, Matangini Chattopadhyay, Samiran Chattopadhyay, TuningHoldoff Exponents for Performance Optimization in IEEE 802.16 Mesh Distributed Co-ordinated Scheduler, Proceedings of ICCAE 2010, Singapore, IEEE Computer Society Press[ISBN: 978-1-4244-5585-0], pp. 261 265, February 26 28, 2010.

    24.

    Saswati Mukherjee, Sudipto Ghosal, Matangini Chattopadhyay, A Novel Approach: DataHiding and Security of Multimedia Content using Steganography, Proceedings of theNational Conference on Emerging Trends in Computer Science & Information Technology,

    Nashik, Maharashtra, pp 133-137, Jan 2010.

    5.3.4 Facilities Available

    a)

    HP ELITE 8300 Desktop Computer, 18.04.2013, Department of Information Technology,Studies on Intrusion Detection in Wireless Network, Information Technology, School ofMobile Computing and Communication, School of Education Technology.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    16/92

    b)

    HP 4540s LAPTOP, 18.04.2013, Department of Information Technology, Studies on IntrusionDetection in Wireless Network, Information Technology, School of Mobile Computing andCommunication, School of Education Technology.

    c) HP LASERJET M1136 MFP Printer, February 2013, Department of Information Technology,Studies on Intrusion Detection in Wireless Network, Information Technology, School ofMobile Computing and Communication, School of Education Technology.

    5.3.5 Ongoing Work under UPE II 2012-14

    Name of Scholar: Kathakali Datta

    1. Title: An Efficient Binary Playfair Algorithm using a 44 Playfair Key Matrix

    Authors: Samiran Chattopadhyay, Matangini Chattopadhyay, Saswati Mukherjee

    Name of the Journal/Conference: Proceedings of 11th Int. Conf. on Information Systems andIndustrial Management, 2012

    Abstract: Playfair cipher is a digraph cipher which is not preferred now-a-days for two main reasons.Firstly, it can be easily cracked if there is enough text and secondly, frequency analysis of digraph isanyway possible. This paper proposes a new solution, which encrypts / decrypts each byte by

    applying the Playfair on its nibbles with the help of a reduced 44 Key matrix. This byte by byteencryption supports any character (even multilingual character), number (of any base), symbol andany type of media file and thereby ensures flexibility. Randomness of the algorithm is achieved byrotating the key matrix randomly after encryption / decryption of each byte. Several operations areperformed to support the mechanism of lightweight cryptography. The proposed method isimplemented and compared with other popular ciphers on the basis of certain parameters, likeAvalanche Effect, Time Complexity, and Space Requirement. The result obtained demonstratesefficiency of the proposed algorithm.

    Status: Published

    Most significant conclusion(s):

    The proposed algorithm acts as a stream cipher rather than conventional poly alphabetic block

    cipher. The algorithm uses a 44 key matrix hence space efficiency is achieved.

    The algorithm supports any type of plain text alphabet of any language, symbol, numbersystem, any type of media file or anything else.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    17/92

    2. Title: Detection of Selective Forwarding Attack in Wireless Ad hoc Networks using Binary Search

    Authors: Samiran Chattopadhyay, Matangini Chattopadhyay, Saswati Mukherjee

    Name of the Journal/Conference: Third International Conference on Emerging Applications ofInformation Technology, EAIT 2012.

    Abstract: Selective forwarding attack is one of the most harmful attacks in wireless networks. Thispaper proposes an algorithm to defend against selective forwarding attacks based on binary searchtechnique in clustered wireless ad hoc network. In the first phase, the cluster head raises an alarmwhen number of packets dropped along a path is more than a threshold value. In the second phase,control packets and hello packets are exchanged along a misbehaving routing path between thewireless node and a cluster head to detect compromised node. Experimental results demonstrate thatthe detection efficiency of the proposed algorithm is more than 90%. The algorithm can detectmultiple compromised nodes if they exist. We have also experimented to estimate the threshold valueof packet drops and computed the required rate of drops of compromised nodes so that they can bedetected.

    Status: Published

    Most significant conclusion(s):

    Detection efficiency of compromised nodes has increased by increasing the number of clusterheads.

    In hierarchical heterogeneous network, selective forwarding attack is detected by employingbinary search technique.

    Average detection efficiency is almost 100% when number of nodes increases linearly.

    3. Title: A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless SensorNetwork

    Authors: Samiran Chattopadhyay, Matangini Chattopadhyay, Saswati Mukherjee

    Name of the Journal/Conference: 12th International Conference on Computer Information Systemsand Industrial Management Applications, (CISIM 2013).

    Abstract- Selective forwarding or dropping of packets is a serious threat to multi hop communicationin a Wireless Sensor Network (WSN). There are various schemes to induce cooperation in a WSN toovercome this problem. In this paper, we have introduced a novel adversary model and have proposedan incentive based scheme to inspire cooperation among nodes in a WSN. The scheme has beenformally analyzed. The efficacy of the scheme is also established through various simulationexperiments.

    Status: Published

    Most significant conclusion(s):

    Maliciousnodedetection

    Percentage of node attacked

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    18/92

    Incentive based mechanism is proposed to induce node to cooperate in packet forwarding inwireless sensor network.

    Idea of rational adversary nodes is introduced in addition to trusted and malicious nodes.

    Throughput gets increased even though the number of malicious nodes increases.

    5.3.6 Work plan during 2014-17

    Providing solutions to Intrusion Detection and Prevention System using artificial computationalintelligence with a multi agent support.

    Application of multi-trust model for intrusion detection in cyber physical system.

    Searching for optimal solution in Wireless Sensor Network like node capabilities, possible insidethreats, integrity, end-to-end data security, and key distribution using some bio-inspiredalgorithms like Swarm Intelligence.

    Using security games in self organizing networks which are modeled by 2-player sum game andfuzzy game.

    Refining the threshold monitoring technique coupled with behavior specification based detectionfor security in cyber physical system.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    19/92

    5.4 Area of Work: WIRELESS COMMUNICATION AND NETWORK

    5.4.1 Contributing Faculty Members

    1. Prof. (Dr.) Iti Saha Misra,Department of ETCE, Jadavpur University, Age 49 yrs, Journal Publications 59 ( 3 under revision), Conference Publications 110, H

    Index 11 , Cumulative Impact Factor 35, Total Citations 564, Awarded andongoing doctoral thesis guidance 6+8, Awarded and ongoing Masters thesis guidance40+2

    5.4.2 Special Achievements

    Book: Iti Saha Misra, Wireless Communication and Networks: 3G and Beyond,McGraw Hill, New Delhi, Second Edition, June 2013 (additional 4 chapters)First edition on 2009

    2004 2007: Young Teacher Career Award, All India Council for TechnicalEducation (AICTE), India, (AICTE CAYT)

    2007: IETE Gowri Memorial Award for bestpaper on the topic of 4G review 2009: Best Paper Award for PhD student on Improving Delay Performance in

    UMTS/WLAN Integrated Networks with Global Gateway Router , IEEE Int Conf.

    On ADCOM-2008

    Prasun Chowdhury, Senior Research Fellow, Department of ETCE, JadavpurUniversity, under the supervision of Prof. Iti Saha Misra,Young Scientist Award(YSA) by International Union of Radio Society (URSI)achieved in the conferenceRadio and Antenna Days of the Indian Ocean (RADIO-2014)held in Mauritiusduring 7-10thApril, 2014.

    Tamal Chakroborty, Senior Research Fellow, Department of ETCE, JadavpurUniversity, under the supervision of Prof. Iti Saha Misra,Best Paper Award

    (Student Category) achieved in the conference ACM International InformationTechnology Conference (CUBE-2012)held in Pune, India during 3- 5thSeptember2012.

    2008: Received the award for first place of 2007 IEEE Women in EngineeringAffinity Group of the year 2007, Kolkata Section- under the leadership of the WIEGroup as the Chairperson culminated in a worldwide competition.

    Chairperson, IEEE Communication Society Chapter, Kolkata Section, 2014

    Chairperson, IEEE SIGHT, Special Interest Group for Humaniretian

    Technology

    Secretary, IEEE Kolkata Section, 2011-2013

    Treasurer, IEEE Kolkata Section, 2009-2011

    5.4.3 Relevant Projects in Last 10years including the Ongoing Projects

    Project Title Sponsoring

    Agency

    Members Grant Value

    (Rs in Lakh)

    Duration

    LA Planning for 3GCellular Networks

    UGC MajorResearch Project

    PI: Iti SahaMIsra, Co PI-Prof. DebashisSaha, IIMC

    2.73 L 2001-2004

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    20/92

    MobilityManagement

    Networks for IPbased 4GNetworks

    IntegratedGPRS/UMTS/WLAN NetworkArchitecture

    BroadbandWirelessCommunication

    Cognitive RadioNetwork

    Call Admission

    Control for theOptimization ofResourceUtilization forMobile WiMAXand IntegratedWiMAX/WiFinetworks

    Designing a SDRbased CognitiveRadio Networking

    test-bed involvingmultiple WARP

    boards

    AICTE CareerAward for YoungTeacher

    UGC sponsoredunder the

    programme ofUniversity withPotential forExcellence

    DST-FIST Project

    DST PURSE

    Mobile andInnovativeApplicationsProgramme" underthe UGC funded"University withPotential forExcellence - PhaseII" scheme ofJadavpurUniversityUGC-UPE PhaseII, School ofMobile ComputingandCommunications

    Iti Saha Misra

    Iti Saha Misra

    PI: Prof. Salil

    Kumar Sanyal,

    Co-PI: Iti Saha

    Misra

    Investigator: Iti

    Saha Misra

    PI: Prof. Iti Saha

    MisraCo-PI: Prof. SalilKumar Sanyal

    PI: Iti SahaMisra

    10.5 L

    Approx 8L

    Aprrox. 89 L

    3 ResearchScholars

    Aprrox: 8 L

    Approx: 10 L

    FEB 2004

    -FEB

    2007

    2004-

    2007

    2007- --

    2009-2012

    2012-tilldate

    2012-tilldate

    5.4.4 Relevant Publications in Last 5years

    Journal Publications:[1] Anindita Kundu, Prasun Chowdhury, Iti Saha Misra, Salil K. Sanyal , QoS Aware Integrated Call

    Admission and Cognitive Channel Allocation Scheme for a Macro-Femto BWA Network, published

    in the AICIT Journal of Research Notes in Information Science, vol. 11, pp. 47-59, Jan 2013.

    [2] Prasun Chowdhury,Anindita Kundu, Iti Saha Misra, Salil K Sanyal, Load Balancing with Reduced

    Unnecessary Handoff in Energy Efficient Macro/Femto-cell based BWA Networks International

    Journal of Wireless & Mobile Networks (IJWMN), Springer, Vol. 4, No. 3, pp. 105-118, June 2012.

    [3] Prasun Chowdhury, Iti Saha Misra, Salil K Sanyal, Cross Layer QoS Support Architecture withIntegrated CAC and Scheduling Algorithms for WiMAX BWA Networks International Journal ofAdvanced Computer Science and Applications(IJACSA), The Science and Information organization(SAI), New York, USA, Vol. 3, No. 1, pp. 76-92, January 2012.

    [4] Prasun Chowdhury, Iti Saha Misra, "Compatibility of Various Queue Scheduling Algorithms with

    Varied Network Service Load in IEEE 802.16 BWA Networks" International Journal of Computer

    Information systems (IJCIS), Vol.1, No.5, pp. 61-69, Dec 2010.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    21/92

    [5] Prasun Chowdhury and Iti Saha Misra, A Fair and Efficient Packet Scheduling Scheme for IEEE

    802.16 Broadband Wireless Access systems International Journal of Ad hoc, Sensor & Ubiquitous

    Computing (IJASUC), Springer, Vol.1, No.3, pp. 93-104, September 2010.

    [6] Prasun Chowdhury, Iti Saha Misraand Salil K. Sanyal, An Integrated Call Admission Control and

    Uplink Packet Scheduling Mechanism for QoS Evaluation of IEEE 802.16 BWA Networks, Canadian

    Journal on Multimedia and Wireless Networks Vol. 1, No. 3, April 2010.

    [7]

    Tanumay Manna and Iti Saha Misra, Implementation of Relay Based Collaborative SpectrumSensing Using Coalitional Games In Wireless Cognitive Radio Networks communicated to

    Computers and Electrical Engineering Journal, Elsevier, 2013. (I.F.:0.97) (Revise and Re-submit).

    [8] Budhaditya Bhattacharyya, Iti Saha Misra and Salil Kumar Sanyal, Reduction of Phase Offset in

    OFDMA based Wireless System using Adaptive Roll-off Factor Strategy communicated to Computers

    and Electrical Engineering Journal, Elsevier, 2013. (I.F.:0.97) (Under Review).

    International Conference Publications:[1]

    Tanumay Manna and Iti Saha Misra, Joint Optimization of Detection Thresholds

    and Power Allocation in OFDM Based Cognitive Femtocell Networks in Proc. of

    IEEE COMNETSAT, Indonesia, 2013.

    [2]

    Prasun Chowdhury and Iti Saha Misra, An Improved Call Admission Control Mechanism withPrioritized Handoff Queuing Scheme for BWA Networks Proc. of 2nd Radio and Antenna Days of the

    Indian Ocean (RADIO-2014), Mauritius, 7-10th April, 2014. (Achieved Young Scientist Award

    (YSA) by URSI)

    [3] Prasun Chowdhuryand Iti Saha Misra, Queue Size Analysis of QoS-aware Weighted Hybrid Packet

    Scheduling Scheme for BWA Networks Proc. of IEEE ICON 2013, Singapore, pp. 1-6, 11-13 Dec,

    2013.

    [4] Anindita Kundu, Prasun Chowdhury, Iti Saha Misra, Salil K. Sanyal, Buffered Non-Random

    Channel Access Method for better QoS of Cognitive Users Proc.of International Conference on

    Communication, Devices and Intelligent Systems (CODIS 2012) hosted by Dept. of ETCE, IEEE,

    Jadavpur University, December, 2012.

    [5] Anindita Kundu, Prasun Chowdhury,Iti Saha Misra, Salil K. Sanyal , Design and Implementation of

    a Cognitive Channel Allocation Algorithm for BWA System Proc. of International Conference on

    Communication, Devices and Intelligent Systems (CODIS 2012) hosted by Dept. of ETCE, IEEE,

    Jadavpur University, December, 2012.

    [6] Prasun Chowdhury,Anindita Kundu, Iti Saha Misra, Salil K Sanyal, Development of an Analytical

    Model for WiMAX Femto Cellular Networks Using Continuous Time Markov Chain Accepted in

    2012 Wireless Symposium and Summer School, Virginia Tech, USA, Feb, 2012.

    [7] Prasun Chowdhury,Anindita Kundu, Iti Saha Misra, Salil K Sanyal, Analytical Model for Channel

    Allocation Scheme in Macro/femto-cell Based BWA Networks Proc. of the IEEE International

    Conference on Recent Advances in Computing and Software Systems(RACSS 2012), pp. 164-169,

    Chennai, April, 2012.

    [8] Prasun Chowdhury,Anindita Kundu, Iti Saha Misra, Salil K Sanyal, Load Balancing with Reduced

    Unnecessary Handoff in Hierarchical Macro/Femto-cell WiMAX Networks Proc. of The fourth

    international conference on wireless, mobile networks and application (WiMOA-2012), Advances in

    Intelligent and Soft Computing, Springer, Volume 167, pp. 457-467, Delhi, May, 2012.[9] Prasun Chowdhury,Anindita Kundu, Iti Saha Misra, Salil K Sanyal, A Tradeoff Pricing Strategy

    Using AHP for Revenue Maximization in WiMAX Networks Proc. of Annual IEEEIndia Conference

    (INDICON), pp. 1-4, Hyderabad, Dec, 2011.

    [10] Prasun Chowdhury, Iti Saha Misra, An Efficient Quality of Service Scheduling Strategy for IEEE

    802.16 Broadband Wireless Access Systems, Proc. of Int. conf. NeCoM-2010, Recent Trends in

    Netwoks and communication, Springer, vol 90, pp. 306-315, Chennai, July, 2010.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    22/92

    [11] Prasun Chowdhury, Iti Saha Misra, A Comparative Study of Different Packet Scheduling

    Algorithms with Varied Network Service Load in IEEE 802.16 Broadband Wireless Access Systems

    Proc. of IEEEInt. Conf. Advanced Computing & Communications, Bangalore, Dec, 2009.

    5.4.5 Facilities Available

    a) Name of the Equipment- QualNet-6.1-LTE-ModelLibrary, Year of Installation 2012,Place of installation- Qualnet Laboratory, Dept. of ETCE, Jadavpur University, Purchasedunder the program name- Mobile Computing and Innovative Application, UPE-II(2) 2 Desktop Computers with UPS, one printer, one LCD projecter(3) FPGA Sparton -6 boards , 2 Nos, MSP430 Microcontroller boards -2, DSP kit -1

    (4) Name of the Equipment- WARP v3 Kit with Xilinx Vertex 6 FPGA, Year ofInstallation 2013, Place of installation- Wireless Broadband Communication Laboratory,ETCE Department, Jadavpur University, Purchased under the program name- MobileComputing and Innovative Application.

    Equipment procured from other sources

    (1) The main Qualnet 5.1 simulator with WLAN, WiMax and other basic modules procured from

    DST FIST project -2007 from ETCE Department.

    (2) Name of the Equipment- Radio Daughter Card for WARP v2 Kit, Year of Installation 2013, Place of installation- Wireless Broadband Communication Laboratory, ETCEDepartment, Jadavpur University, Purchased under the program name- DST-FIST Project,ETCE Deptt.

    5.4.6 Ongoing Work under UPE II 2012-141. Mobile and Innovative Applications Programme", UPE-II

    Sub-Group: Innovative Applications

    Working Area: Wireless Communication

    Principal Investigator: Prof. Iti Saha Misra, ETCE Dept., JU

    Co-Investigators: Prof. Salil Kumar Sanyal, ETCE, JU

    Title of the project:

    a.

    Call Admission Control for theOptimization of Resource Utilization for Mobile

    WiMAX and Integrated WiMAX/WiFi networks: Some Related Research

    2. Working Group:"Mobile and Innovative Applications Programme", UPE-II

    Sub-Group: Mobile Computing

    Working Area: Cognitive Radio Networks

    Title of the project: Designing a SDR based Cognitive Radio Networking test-bed

    involving multiple WARP boards

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    23/92

    Principal Investigator: Prof. Iti Saha Misra, ETCE Dept., JU

    Co-Investigators: Prof. Salil Kumar Sanyal, ETCE, JU

    Ongoing work on Project 1:

    i. Title:Performance Analysis of Queue Scheduling Schemes and Buffer Size optimizationfor Heterogeneous Traffic Classes

    Authors: Prasun Chowdhury, Iti Saha Misra

    Name of the Journal/Conference: Communicated to IEEE Transaction on VehicularTechnology

    Abstract: As the most important aspect of Broadband Wireless Access (BWA) networks is to provide

    heterogeneous traffic flows with QoS guarantee, we have surveyed some major existing scheduling algorithms

    mostly used for WiMAX networks to support differentiated QoS. Then we conduct a comprehensive

    performance analysis of various Queue Scheduling Schemes (QSS) namely, Priority Queue Scheduling Scheme

    (PQSS), Hybrid Queue Scheduling Scheme (HQSS) and Weighted Hybrid Queue Scheduling Scheme

    (WHQSS) which support differential QoS requirements for heterogeneous traffic classes in BWA networks.

    Performance evaluation is carried out based on analytical results obtained from several evaluation parameters

    like mean number of packets waiting in the queue, throughput, mean queuing delay, packet loss probability and

    fairness index. It is clearly shown that WHQSS not only provides tight QoS guarantee but also maintains highest

    fairness to all traffic classes and performs better in all respect when compared to other QSSs. Furthermore, the

    Queue Weight Ratio (QWR) of WHQSS is tuned for stringent delay requirement and buffer size is optimized

    with a proposed algorithm to maximize the throughput of the network under the specified constraint of queuing

    delay and packet loss rate, thus making the scheme adaptive.

    Status: Under Review

    Most Significant Conclusion:

    The analysis reveals that WHQSS performs better in all aspects when compared to

    other QSSs.

    QWR is made adaptive and buffer size is optimized based on some QoS parameters.

    The buffer optimization as well as the adaptive QWR enhance the throughput up to

    76% of RT traffic and maintain the guaranteed throughput of NRT traffic under heavytraffic flow.

    ii. Title: Cross-layer Architecture for Joint Call Admission Control and Routing

    Protocols for Maximum Resource Utilization in BWA Mesh Networks.

    Authors:Arijeet Ghosh, Iti Saha Misra

    Name of the Journal/Conference:N/A

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    24/92

    Abstract: Call admission control (CAC) and routing are the two important mechanisms forQoS provisioning in BWA mesh networks for seamless transmission of heterogeneoushandoff calls [1]. That is why, a cross-layer architecture based on MAC layer and Networklayer has been developed to analyze the performance of joint CAC and routing protocols. The

    Non Reservation based prioritized CAC mechanism [2] along with various routing protocols[3] such as Link Quality Source Routing (LQSR), Multi-Radio Routing (MR), and Multipath

    Routing for load balancing and fault tolerance have been considered for the performanceevaluation with the objective to maximize the resource utilization of the mesh network.

    Reference:[1] S. Zhang, F. R. Yu, and V. C. M. Leung, Joint Connection Admission Control and Routing in IEEE

    802.16-Based Mesh Networks, IEEE Transaction on Wireless Communications, vol. 9, no. 4, April

    2010.

    [2] P. Chowdhury, I. S. Misra and Salil K. Sanyal, An Integrated Call Admission Control and Uplink

    Packet Scheduling Mechanism for QoS Evaluation of IEEE 802.16 BWA Networks, Canadian Journal

    on Multimedia and Wireless Networks Vol. 1, No. 3, April 2010.

    [3] I. Akyidiz and X. Wang, A survey on wireless mesh networks, IEEE Radio Communication, vol. 43,

    pp. S23S30, Sep. 2005.

    Status:Under Preparation

    iii. Title: Implementation of Vertical Handoff framework in Hybrid BWA Networks

    under Qualnet 6.1 .

    Authors:Arijeet Ghosh, Iti Saha Misra

    Name of the Journal/Conference:N/AAbstract:Due to long distance cell coverage in BWA networks, it has been seen that thesignal strength around the cell edges decreases which leads to low Signal to Interference plus

    Noise Ratio (SINR) and degraded QoS [1]. Although the placement of few low ranges femto

    cells or WiFi hotspots in the cell edge can solve the aforementioned problem up to someextent. But the problem related to Vertical Handoff (VHO) with strict QoS guarantee stillpersists for BWA network [2]. Hence, VHO is a major challenge for such type of systemimplementation. Due to the absence of VHO framework in Qualnet 6.1, a novel framework is

    being developed in Qualnet 6.1 to ensure the VHO in hybrid network design. Thisimplementation of VHO in Qualnet 6.1 helps for the further analysis of the various otherhybrid networks like 2G, 3G and LTE.

    Reference:[1] K. Son, S. Chong, and G. Veciana, Dynamic Association for Load Balancing and Interference

    Avoidance in Multi-Cell Networks, IEEE Transactions on Wireless Communications, Vol. 8, No. 7,

    pp. 3566- 3576, July 2009.

    [2] E. P. Edward, V.Sumathy, A Survey of Seamless Vertical Handoff Schemes For Wi-Fi/WiMAX

    Heterogeneous Networks, Proc. International Conference on Signal Processing and Communication

    (SPCOM), pp. 1-5, July 2010.

    [3] Qualnet 6.1, http://web.scalable-networks.com/content/qualnet.

    Status:Under Preparation

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    25/92

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    26/92

    detection probability but at the cost of increased false alarm probability. The overall sensing performance is thesum-utility of the system that also has improved performance because of the collaboration. The test-bedimplementation of NCSS under WARP shows that under poor reporting channel condition, it loses theadvantage of collaboration as sum-utility reduces to very high negative value. To alleviate this problem, thesecond part of this paper proposes a Relay based Collaborative Spectrum Sensing (RCSS). RCSS also uses thecoalitional game to share sensing results between affected SUs and the CH of the coalition unit. RCSS has beentested for all possible collection of coalitions under different reporting channel conditions. Test-bed

    implementation using WARP reveals that using neighboring SU having low error prone relay path, the sum-utility improves by 20%, as compared to NCSS at the cost of minimal loss in energy efficiency of the SUs.Findings: Practical implementation of collaborating spectrum sensing is successfully completed using WARPv3 board. Both the NCSS and RCSS are implemented and it is observed that for low received SNR conditionsthere is significant improve in sum-utility of the system using collaborative sensing.

    5.4.8 Work plan during 2014-17

    Establishing a complete test bed of Cognitive radio network for spectrum sensing, multipleaccesses for the transmission of real time VoIP and Video communication.

    It will help the researcher to do their own research in a cognitive test bed.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    27/92

    5.5 Project Name: Design of a Multimodal Biometric System for Various

    Security and Forensic applications

    5.5.1 Contributing Faculty Members

    1. Subhadip Basu, Department of Computer Science and Engineering, Age- 37, Journal Publications

    33, Conference Publications 74, Patents 1, Policy Documents number, H Index 12, TotalCitations 504, Awarded and ongoing doctoral thesis guidance 7, Awarded and ongoingMasters thesis guidance 15.

    2.

    Mita Nasipuri, Department of Computer Science and Engineering, Age- 57, Journal Publications 64, Conference Publications 146, Patents 1, Policy Documents number, H Index 17,Total Citations 1137, Awarded and ongoing doctoral thesis guidance 17, Awarded andongoing Masters thesis guidance 50.

    3.

    Debotosh Bhattacharjee, Department of Computer Science and Engineering, Age- 43, JournalPublications 36, Conference Publications 51, Patents 2, Policy Documents number, HIndex 12, Total Citations 504, Awarded and ongoing doctoral thesis guidance 8, Awardedand ongoing Masters thesis guidance 26.

    4.

    Ram Sarkar, Department of Computer Science and Engineering, Age- 37, Journal Publications 33, Conference Publications 74, Patents 1, Policy Documents number, H Index 10, Total

    Citations 230, Awarded and ongoing doctoral thesis guidance 1, Awarded and ongoingMasters thesis guidance 10.

    5. Nibaran Das, Department of Computer Science and Engineering, Age- 37, Journal Publications 33, Conference Publications 74, Patents 1, Policy Documents number, H Index 10, TotalCitations 224, Awarded and ongoing doctoral thesis guidance 0, Awarded and ongoingMasters thesis guidance 10.

    5.5.2 Special Achievements

    1.

    Subhadip Basu, FAST-TRACK Young Scientist Grant in 2012 from Department of Science andTechnology, Govt. of India, for a period of three years.

    2.

    Subhadip Basu, European Union EMMA-West Post-Doctoral fellowship in 2012 for visitingUniversity of Warsaw, Poland, for a period of six months.

    3.

    Subhadip Basu, DST-ITS grant from Govt. of India to visit HUST, China, during IEEE-ICBMI2011.

    4. Subhadip Basu, BOYSCAST fellowship in 2010 from Department of Science and Technology,Govt. of India, to visit University of Iowa, US, for a period of one year.

    5. Subhadip Basu, European Union EMMA staff-mobility fellowship in 2009 for visiting Universityof Warsaw, Poland.

    6. Subhadip Basu, Received Hitachi Visiting Researcher (HIVIP) fellowship in 2007 for visitingHitachi Central Research Laboratory, Tokyo, Japan

    7. Debotosh Bhattacharjee, Petamedia Grant to attend Summer School at Universitat Koblenz-Landau, Germany, 2009

    8. Debotosh Bhattacharjee, Erasmus Mundus Mobility with Asia(EMMA) Fellowship fromEuropean Commission for pursuing postdoc at University of Twente, The Netherlands.

    9.

    Debotosh Bhattacharjee, Elias grant to attend Winter school at Zinal, Switzerland, 2012.

    5.5.3 Relevant Projects in Last 10years including the Ongoing Projects

    Project Title Sponsoring

    Agency

    Members Grant Value

    (Rs in Lakh)

    Duration

    Segmentation of thecarotid vasculature inhuman CT angiography

    DST, Govt. ofIndia

    Subhadip Basu(PI) 8.58 2013

    2016

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    28/92

    Design of a MultimodalBiometric System forVarious Security andForensic applications

    UPE Program,Govt. of India

    Subhadip Basu(PI) 13.632 2012-2015

    Sanketantar : A font

    converter for Samit fontencoded Bangladocument to Unicodeencoded Bangladocument and vice versa

    Society for

    Natural LanguageTechnologyResearch

    Nibaran Das(PI) 1.2 2010-

    2010

    A vision based system forreal-time tracking ofhuman activities against acomplex background

    JadavpurUniversity

    Subhadip Basu(PI) 0.5 2006-2007

    Erasmus MundusMobility with Asia,Coordinator:Universidade de Evora,Portugal

    EuropeanCommission,Brussels

    DebotoshBhattacharjee(PI)

    4000 Euro 2012-2013

    Erasmus MundusMobility with Asia Lot12, Coordinator:Universite De NiceSophia Antipolis, France

    EuropeanCommission,Brussels

    DebotoshBhattacharjee (PI)

    2.70391 2011-2014

    Design and Developmentof Facial Thermogramtechnology for BiometricSecurity System

    UGC, Govt. ofIndia

    DebotoshBhattacharjee (PI)

    10.76834 2010-2013

    Development of 3D FaceRecognition TechniquesBased on Range Images

    DIT, MCIT,Govt. of India

    DebotoshBhattacharjee (PI)

    66.21250 2013-2016

    5.5.4 Relevant Publications in Last 5years

    5.5.4.1 JOURNAL PUBLICATTIONS

    1. Ram Sarkar, Nibaran Das, Subhadip Basu, Mahantapas Kundu, and Mita Nasipuri, 2013,"Extraction of Text Lines from Handwritten Documents Using Piecewise Water FlowTechnique." Journal of Intelligent Systems, 22(1): 25-47 (2013).

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    29/92

    2.

    Brijesh Kumar Sriwastava, S Basu, U Maulik, D Plewczynski, 2013, PPIcons: identification ofprotein-protein interaction sites in selected organisms,Journal of molecular modeling, volume19, issue 9, pp 4059-4070.

    3. Ayatullah Faruk Mollah, S. Basu, Mita Nasipuri, Dipak Kumar Basu, 2013, Handheld MobileDevice Based Text Region Extraction and Binarization of Image Embedded Text Documents, J.Intelligent Systems 22(1): 25-47.

    4.

    Ankush Acharyya, Sandip Rakshit, Ram Sarkar, S. Basu, and M. Nasipuri, 2013, "HandwrittenWord Recognition Using MLP based Classifier: A Holistic Approach.", IJCSI InternationalJournal of Computer Science Issues, Vol. 10, Issue 2, No 2, pp. 422-427, (2013).

    5. Dariusz Plewczynski, S. Basu, I. Saha, 2012, AMS 4.0: consensus prediction of post-translational modifications in protein sequences,Amino Acids, Springer,Volume 43, Issue 2, pp573-582, 2012.

    6.

    Nibaran Das, J.M. Reddy, R. Sarkar, S. Basu, M. Kundu, M. Nasipuri, D.K. Basu, 2012, "AStatistical-Topological Feature Combination for Recognition of Handwritten Numerals," AppliedSoft Computing,Elsevier, vol. 12, no. 8, pp. 2486-2495, 2012.

    7.

    Nibaran Das, R. Sarkar, S. Basu, M. Kundu, M. Nasipuri, and D. K. Basu, 2012, "A geneticalgorithm based region sampling for selection of local features in handwritten digit recognition

    application,"Applied Soft Computing,Elsevier, vol. 12, no. 5, pp. 1592-1606, 2012.8.

    Ram Sarkar, Nibaran Das, Subhadip Basu, Mahantapas Kundu, Mita Nasipuri and Dipak KumarBasu, 2012, CMATERdb1: a database of unconstrained handwritten Bangla and BanglaEnglishmixed script document image, International Journal on Document Analysis and Recognition,Springer, vol. 15, no. 1, pp. 71-83, 2012.

    9.

    Ram Sarkar, S.Malakar, N.Das, S.Basu, M.Kundu, M.Nasipuri, 2011, Word Extraction andCharacter Segmentation from Text Lines of Unconstrained Handwritten Bangla DocumentImages,Journal of Intelligent Systems,De Gruyter, vol. 20, Issue 3, pp. 227260, 2011.

    10.

    Ayatullah Faruk Mollah, N. Majumder, S. Basu, M. Nasipuri, 2011, "Design of an OpticalCharacter Recognition System for Camera-based Handheld Devices", Int. J. of Computer ScienceIssues, Vol. 8, No. 4, pp. 283-289, July, 2011.

    11.

    Sandip Rakshit, K.S. Sengupta, S. Basu, 2011, "Handwritten Document Management System:Key challenges and probable Solutions for Indian Railway and Healthcare Industries, 2011, "International Journal of Advanced Research in Computer Science, vol.2, no.5, pp. 430-434, 2011.

    12.Piyali Chatterjee, S.Basu, M.Kundu, M.Nasipuri and D.Plewczynski, 2011, PSP_MCSVM:brainstorming consensus prediction of protein secondary structures using two-stage multiclasssupport vector machines, Journal of Molecular Modeling, Volume 17, Issue 9, pp 2191-2201,2011.

    13.

    Satadal Saha, S. Basu and Mita Nasipuri, 2011, Automatic Localization and Recognition ofLicense Plate Characters for Indian Vehicles, International Journal of Computer Science &Emerging Technologies, Vol. 2, No. 4, pp. 520-533, August 2011.

    14.Piyali Chatterjee, S.Basu, M.Kundu, M.Nasipuri and D.Plewczynski, 2011, PPI_SVM:Prediction of protein-protein interactions using machine learning, domain-domain affinities andfrequency tables, Cellular & Molecular Biology Letters, Volume 16, Number 2, 264-278.

    15.Satadal Saha, S.Basu and M.Nasipuri, 2011, Localization of License Plates from Indian VehicleImages Using Iterative Edge Map Generation Technique, Journal of Computing, ISSN: 2151-9617, Vol. 3, Issue 6, pp. 48-57, June 2011.

    16.

    Satadal Saha, S.Basu and M.Nasipuri, 2011, Hierarchical Segmentation of Falsely TouchingCharacters from Camera Captured Degraded Document Images, International Journal ofComputer Science Issues, ISSN: 1694-0814, Vol. 8, Issue 4, No. 2, pp. 90-98, July 2011.

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    30/92

    17.

    Subhadip Basu, N. Das, R. Sarkar M. Kundu, M. Nasipuri, D. K. Basu, 2010, A novelframework for automatic sorting of postal documents with multi-script address blocks PatternRecognition, Elsevier43(10): pp. 3507-3521 (2010).

    18.Sandip Rakshit, S.S.Das, K.S. Sengupta, S. Basu, 2010, "Automatic Processing of StructuredHandwritten Documents: An Application for Indian Railway Reservation System," InternationalJournal of Computer Applications, vol.6, no. 11, pp. 26-30, 2010.

    19.

    Subhadip Basu and D. Plewczynski, 2010, AMS 3.0: Prediction of Post-TranslationalModifications, BMC Bioinformatics2010, 11:210.

    20.

    Ram Sarkar, S. Malakar, N. Das, S. Basu, M. Nasipuri, 2010, A Script Independent Techniquefor Extraction of Characters from Handwritten Word Images, International Journal of ComputerApplications, vol.1, no. 23, pp. 85-90, 2010. ISSN: 0975 8887.

    21.

    Satadal Saha, S. Basu, M. Nasipuri, D. K. Basu, 2010, "Localization of License Plates fromSurveillance Camera Images: A Color Feature Based ANN Approach", International Journal ofComputer Applications, vol.1, no. 23, pp. 27-31, 2010. ISSN: 0975 8887.

    22.D. K. Sil, S. Basu, M. Nasipuri, 2010, "An adaptive fuzzy technique for real-time detection ofmultiple faces against a complex background," International Journal of Computer Applications,vol.1, no. 23, pp. 21-26, 2010. ISSN: 0975 8887.

    23.

    Nibaran Das, S. Pramanik, R. Sarkar, S. Basu, P.K.Saha, 2010, "Recognition of Isolated Multi-Oriented Handwritten/Printed Characters using a Novel Convex-Hull Based AlignmentTechnique," International Journal of Computer Applications, vol.1, no. 23, pp. 40-45, 2010.ISSN: 0975 8887.

    24.Ayatullah Faruk Mollah, S. Basu, M. Nasipuri, 2010, Segmentation of Camera CapturedBusiness Card Images for Mobile Devices, International Journal of Computer Science andApplications, 1(1), pp. 33-37, June 2010.

    25.Nibaran Das, Bindaban Das, Ram Sarkar, S. Basu, Mahantapas Kundu and Mita Nasipuri, 2010,Handwritten Bangla Basic and Compound character recognition using MLP and SVMclassifier, Journal of Computing, Volume 2, Issue 2, pp.109-115, February 2010, ISSN: 2151-9617.

    26.

    Satadal Saha, S. Basu, Mita Nasipuri and Dipak Kr. Basu, 2010, A Hough Transform basedTechnique for Text Segmentation, Journal of Computing, Volume 2, Issue 2, pp.134-141,February 2010, ISSN: 2151-9617.

    27.Ayatullah Faruk Mollah, S. Basu and Mita Nasipuri, 2010, Text/Graphics Separation and SkewCorrection of Text Regions of Business Card Images for Mobile Devices, Journal of Computing,Volume 2, Issue 2, pp.96-102, February 2010, ISSN: 2151-9617.

    28.Ram Sarkar, Nibaran Das, S. Basu, Mahantapas Kundu, Mita Nasipuri and Dipak Kumar Basu,2010, Word level Script Identification from Bangla and Devanagri Handwritten Texts mixedwith Roman Script, Journal of Computing, Volume 2, Issue 2, pp.103-108, February 2010,ISSN: 2151-9617.

    29.Piyali Chatterjee, S. Basu, M. Kundu, M. Nasipuri, D. K. Basu, 2009, Improved prediction ofMulti-domains in protein chains using a Support Vector Machine, International Journal onRecent Trends in Engineering,Academy Publisher, Finland, Vol. 2, No. 3, pp.78-81, November2009.ISSN: 1797-9617.

    30.

    Subahdip Basu, N.Das, R.Sarkar M.Kundu, M.Nasipuri, D.K.Basu, 2009, A HierarchicalApproach to Recognition of Handwritten Bangla Characters, Pattern Recognition, Elsevier, vol.42, no. 7, pp. 1467 1484, 2009.

    31.

    Satadal Saha, S. Basu, M. Nasipuri and D. K. Basu, 2009, License Plate localization fromvehicle images: An edge based multi-stage approach,International Journal on Recent Trends in

  • 8/11/2019 005_MOBILEINNOVATIVECOMPUTING

    31/92

    Computer Engineering,Academy Publisher, Finland, vol. 1, no. 1, pp. 284-288, May 2009.ISSN:1797-9617.

    32.

    Nibaran Das, A. Murmu, S. Roy, R. Sarkar, S. Basu, 2009, "A Novel Scheme for Editing andInter Conversion between ASCII / ISCII / Unicode Encoded Multilingual Documents",LanguageForum, vol. 35, no. 2, July-Dec 2009.

    33.

    J. K. Sing, S. Chowdhury, D. K. Basu, M. Nasipuri, An Improved Hybrid Approach to Face

    Recognition by Fusing Local and Global Discriminant Features, Intl Journal of Biometrics,Inderscience Publisher, vol. 4, no. 2, pp. 144-164, 2012.

    34.

    P. Banerjee, D. K. Basu, M. Nasipuri, EE_SP_Mitigation of RFI in AdHoc Wireless ReceiverNodes, International Journal of Recent Trends in Engineering [ISSN: 1797-9617], AcademyPublishers, Finland, Vol 2, No. 6, Letters: pp. 115-120, November 2009.

    35.

    J. K. Sing, S. Thakur, D. K. Basu, M. Nasipuri, M. Kundu, High-speed face recognition usingself-adaptive radial basis function neural networks, Neural Computing and Applications,Springer-Verlag London, vol. 18, no. 8, 2009, pp. 979-990.

    36.S. Thakur, J. K. Sing, D. K. Basu, M. Nasipuri, M. Kundu, Face Recognition Using PrincipalComponent Analysis and RBF Neural Networks, Accepted in International Journal ofSimulation: Systems, Science and Technology,vol.10, no.3.

    37.

    M. Tarafder, I. Chattoraj, M. Nasipuri, A. Mitra, Magnetic Characterization of HSLA Steel byPower-law Decay Exponent of Barkhausen Emission Signal, Journal of Magnetism andMagnetic Materials, 321(8), Apr 2009, pp1034-1038.

    38.

    M. Tarafder, I. Chattoraj, S. Tarafder, M. Nasipuri, Self-similar and Self-affine Characteristics ofMicrostructural Images of HSLA Steel, Material Science and Technology, vol. 25, no 4, 2009,pp 542-548.

    39.

    M. Tarafder, I. Chattoraj, S. Tarafder, M. Nasipuri, Fractal Analysis to Determine self-similarCharacteristics in Microstructures of HSLA Steel, International Journal of Materials andManufacturing Processes, vol. 24, issue 2, Feb.2009, pp 145-149.

    40.

    M.Tarafder, S.K.Das, I. Chattoraj, M. Nasipuri, S. Tarafder, Fractal-based quantification ofcrack paths fo determination of effective microstructural length scales and fracture toughness,

    Scripta Materialia 62 (2010), pp. 109-112.

    41.Arindam Kar, Debotosh Bhattacharjee, Mita Nasipuri, Dipak K. Basu and Mahantapas Kundu, AFace Recognition Approach Based on Entropy Estimate of the Nonlinear DCT Features in theLogarithm Domain together with Kernel Entropy Component Analysis, International Journal ofInformation Technology and Computer Science, 2013, 09, 31-42, Published Online August 2013in MECS (http://www.mecs-press.org/)DOI:10.5815/ijitcs.2013.09.03.

    42.Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kr. Basu,Automated Thermal Face recognition based on Minutiae Extraction, International Journal ofComputation