Entity

Time filter

Source Type


Dholey M.K.,Hooghly Engineering and Technology College | Biswas G.P.,Indian School of Mines
Procedia Computer Science | Year: 2015

Mobile Ad-hoc network (MANET) is infrastructure less, self-organizing bandwidth constraint on demand wireless network. MANET is a multi-hop wireless network therefore, needs an efficient routing protocol to transmit data packet from source to destination. MANET routing protocol can be divided as proactive, reactive and hybrid. In an ad-hoc network a node cannot identify the nodes that are beyond its radio range. The nodes in MANET are movable so, a fixed path cannot be defined in between source to a destination. In MANET's reactive routing protocol, like Dynamic Source Routing (DSR), a source node locate the destination before data transmission take place by broadcasting/flooding route request (RREQ) control message and establishes the path after receiving route reply (RREP) control message. During route discovery using DSR routing protocol a malicious node may enter in between source-destination path as an intermediate node or eavesdrop to the source by sending RREP control message before original RREPs (multiple path exists between source to destination) reach to the source with unexpected path information. As a result, without knowing anything source may deliver data packet to a different destination. In this paper, we identified the issues and proposed a solution to prevent to enter the malicious node in between source-destination path. In our proposal, initially we formed a group byconsidering neighbour nodes of an individual node from the original network and presented the way of communication by the group member using Diffie-Hellman group key (GDH) management scheme in the network through our proposed algorithm. Our proposed algorithm will prevent a malicious node to enter in between source-destination path during route discovery using DSR routing protocol. Further our technique prevents to gainaccess to any node in the network exceptthe group member hence malicious node cannot identify the source to sent RREP control message with wrong path information. © 2015 The Authors. Published by Elsevier B.V. Source


Dholey M.K.,Hooghly Engineering and Technology College | Khatun A.,Birbhum Institute of Engineering and Technology
Proceedings of 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, PDGC 2012 | Year: 2012

Avoidance of collision in wireless ad-hoc network is important and CSMA/CA MAC protocol is playing a major role to avoid collision. CSMA/CA MAC protocol handle it using sort RTS/CTS control message. Though reliability of data transmission increase, it blocks some nodes unnecessarily due to RTS and CTS control message and also makes existence of hidden-terminal (HT) problem which reduces the network performance. In wireless Ad-hoc network the nodes are mobile, infrastructure less and communicate through their radio range. If we can reduce the number of blockage nodes the network performance will increase by utilizing those nodes as other communication's source, destination or relay. In this paper, we propose two methods by which wireless ad-hoc network performance will increase. First we propose a method for enhancement of CSMA/CA MAC protocol by unblocking the nodes using directional antenna and setting up NAV values of RTS/CTS control message considering directional antenna and modified the CSMA/CA timing diagram accordingly. The second method shows how the hidden-terminal problem is reduced by the proposed method. The analytical model explains the performance of CSMA/CA protocol with reduction of HT problem. © 2012 IEEE. Source


Bhunia A.K.,University of Burdwan | Pal P.,Hooghly Engineering and Technology College | Chattopadhyay S.,Jadavpur University | Medya B.K.,N.I.T.
International Journal of Industrial Engineering Computations | Year: 2011

In this paper, a single item deterministic inventory model with two separate warehouses called owned warehouse/show-room (OW) and rented warehouse (RW) is developed. The proposed model of this paper also considers a realistic assumption regarding the storage capacity of the rented warehouse. Demand is a function of selling price, advertisement of an item and displayed inventory level in OW. The stocks of RW are shipped to OW under bulk release pattern where shortages are not allowed. We discuss different scenarios of the proposed model to address relative size of stock dependency parameters and the capacity of owned warehouse. For each scenario, the corresponding problem is formulated as a constrained mixed integer nonlinear programming problem with three integer and two non-integer variables and a real coded genetic algorithm (RCGA) is developed to solve the resulted problem. The proposed model of the paper is also examined using some numerical examples and sensitivity analysis is performed. © 2011Growing Science Ltd. All rights reserved. Source


Biswas M.,Jadavpur University | Dam M.,Hooghly Engineering and Technology College
Microwave and Optical Technology Letters | Year: 2013

In this article, we present a simple, fast, and accurate CAD oriented cavity model to predict accurately the resonant frequency, input impedance, bandwidth, efficiency, and gain of an equilateral triangular patch antenna with and without air gap in between substrate and ground plane. The present model shows very close agreement with the previously reported experiments for a wide range of antenna parameters and feed locations compared to the other models. The experimental values of input impedance, bandwidth, efficiency, and gain with air gap are not available in open literature. So, we have performed a set of experiments to validate the present model with air gap. The present model without air gap for different substrate parameters are also validated with our own experiments. The accuracy of the present model is calculated with respect to the HFSS computation and experimental results. This model will be very useful for designing the MIC on semiconductor materials with εr > 10 and directly applied in portable wireless equipments. Copyright © 2013 Wiley Periodicals, Inc. Source


Bandyopadhyay A.,Quantum Optics and Quantum Information Group | Bandyopadhyay A.,Hooghly Engineering and Technology College | Singh R.P.,Quantum Optics and Quantum Information Group
Optics Communications | Year: 2011

We calculate the Wigner quasiprobability distribution function of the quantum elliptical vortex in elliptical beam (EEV), produced by coupling squeezed coherent states of two modes. The coupling between the two modes is performed by using beam splitter (BS) or a dual channel directional coupler (DCDC). The quantum interference due to the coupling between the two modes promises the generation of controlled entanglement for quantum computation and quantum tomography. © 2010 Elsevier B.V. All rights reserved. Source

Discover hidden collaborations