Misra S.,Indian Institute of Technology Kharagpur |
Oommen B.J.,Carleton University |
Oommen B.J.,University of Agder |
Yanamandra S.,Indian Institute of Technology Kharagpur |
And 2 more authors.
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics | Year: 2010
In this paper, we present a learning-automata-like1 (LAL) mechanism for congestion avoidance in wired networks. Our algorithm, named as LAL Random Early Detection (LALRED), is founded on the principles of the operations of existing RED congestion-avoidance mechanisms, augmented with a LAL philosophy. The primary objective of LALRED is to optimize the value of the average size of the queue used for congestion avoidance and to consequently reduce the total loss of packets at the queue. We attempt to achieve this by stationing a LAL algorithm at the gateways and by discretizing the probabilities of the corresponding actions of the congestion-avoidance algorithm. At every time instant, the LAL scheme, in turn, chooses the action that possesses the maximal ratio between the number of times the chosen action is rewarded and the number of times that it has been chosen. In LALRED, we simultaneously increase the likelihood of the scheme converging to the action, which minimizes the number of packet drops at the gateway. Our approach helps to improve the performance of congestion avoidance by adaptively minimizing the queue-loss rate and the average queue size. Simulation results obtained using NS2 establish the improved performance of LALRED over the traditional RED methods which were chosen as the benchmarks for performance comparison purposes. © 2009 IEEE.
Panda B.N.,University of Lisbon |
Garg A.,Shantou University |
Shankhwar K.,Kalinga Institute of Industrial Technology
Measurement: Journal of the International Measurement Confederation | Year: 2016
The significant amount of research has been done in improving the mechanical properties (compressive strength), dimensional accuracy (length, height and width), and build time of the components manufactured from the additive manufacturing process. In contrast to this, the research in the optimization of environmental characteristic i.e. energy consumption for the additive manufacturing processes such as selective laser sintering (SLS), and selective laser melting (SLM) needs significant attention. These processes intakes the significant portion of input laser energy for driving the laser system, heating system and other machine components. With world moving towards globalization of additive manufacturing processes, the optimization of laser energy consumption thus become a necessity from productivity and as well as an environmental perspective. Therefore, the present work performs the empirical investigation by proposing the optimization framework in modelling of laser energy consumption of the SLS process. The experimental procedure involves the computation of energy consumption by measuring the total area of sintering. The optimization framework when applied on the experimental data generates the functional expression for laser energy consumption which suggests that the slice thickness is a vital parameter in optimizing it. The implications arising from the study is discussed. © 2016 Elsevier Ltd. All rights reserved.
Sinha A.,Tata Consultancy Services Ltd. |
Mishra R.K.,Kalinga Institute of Industrial Technology
ICIIECS 2015 - 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems | Year: 2015
This paper focuses on simple heave dynamics of helicopter UAV for autonomous operations to achieve efficient control scheme based on sliding mode methodology for accurate altitude tracking under both matched and unmatched disturbances. Under fast changing dynamics of the UAV, a control law is developed that provides robustness against uncertainties, parameter variations and perturbations for accurate hovering conditions. The controller guarantees the asymptotic stability of the origin in finite time and the stability of the law has been proved mathematically. Further, efforts are made to smoothen the control signal by making continuous approximation of the discontinuous function in the control law using hyperbolic tangent function. © 2015 IEEE.
Behera S.B.,Kalinga Institute of Industrial Technology |
Das D.P.,CSIR - Institute of Minerals And Materials Technology |
Rout N.K.,Kalinga Institute of Industrial Technology
Applied Soft Computing Journal | Year: 2014
Feedback active noise control has been used for tonal noise only and it is impractical for broadband noise. In this paper, it has been proposed that the feedback ANC algorithm can be applied to a broadband noise if the noise characteristic is chaotic in nature. Chaotic noise is neither tonal nor random; it is broadband and nonlinearly predictable. It is generated from dynamic sources such as fans, airfoils, etc. Therefore, a nonlinear controller using a functional link artificial neural network is proposed in a feedback configuration to control chaotic noise. A series of synthetic chaotic noise is generated for performance evaluation of the algorithm. It is shown that the proposed nonlinear controller is capable to control the broadband chaotic noise using feedback ANC which uses only one microphone whereas the conventional filtered-X least mean square (FXLMS) algorithm is incapable for controlling this type of noise. © 2013 Elsevier B.V. All rights reserved.
Chatterjee P.S.,Kalinga Institute of Industrial Technology |
Roy M.,Kalinga Institute of Industrial Technology
Proceedings - 2015 14th International Conference on Information Technology, ICIT 2015 | Year: 2015
CWSNs provide better bandwidth utilization as compared to a normal wireless sensor network because they use opportunistic spectrum access to transfer data. Opportunistic spectrum access is a very promising and spectrum efficient communication process when there is bur sty traffic in the network. IEEE 802.22 is the first standard based on the concept of cognitive radio. It also helps the network to eliminate collisions and delays in data delivery. While doing so, however, CWSNs are subject to several security threats, attacks on secrecy and authentication, attacks on network availability, stealthy attacks on service integrity etc. The attacks on network availability are known as the Denial of Service (DOS) attacks. The Spectrum Sensing Data Falsification (SSDF) attack is a type of DOS attack. Here the attackers modify the spectrum sensing report in order to compel the cognitive sensor node to take a wrong decision regarding the vacant spectrum band in other's networks. In this paper we have proposed a new algorithm for dynamic spectrum sensing and spectrum allocation in Cognitive wireless sensor networks (CWSNs), the Maximum-Match Filtering algorithm (MMF). This algorithm is executed at the base station to counter the above attack. © 2015 IEEE.
Sahu S.S.,Kalinga Institute of Industrial Technology |
Pandey M.,Kalinga Institute of Industrial Technology
Advances in Intelligent Systems and Computing | Year: 2015
Wireless sensor networks (WSNs) are widely used networks that have lured attention of varied research fields due to their numerous ranges of applications. They have limited energy and power consumption, memory, communication, and computation capabilities. They are also distributed and randomly deployed. Due to the above-listed features, they are prone to various security threats and attacks. Distributed denial of service (DDoS) attack is one among them. These attacks aim at flooding the victim with abundant packets so as to exhaust its resources and cripple its capacity to receive desired packets and give its response accordingly. The network becomes congested and the victim becomes either unresponsive leading to denial of service or its response gets delayed. In this paper, we propose a mitigation mechanism that will curb the attempts of the attackers aiming to flood the WSN so as to cause denial of service with multitude of packets within a time span. © Springer India 2015.
Nanda A.K.,Birla Institute of Technology |
Panigrahi C.K.,Kalinga Institute of Industrial Technology
Frontiers in Energy | Year: 2016
The major portion of energy in a building is consumed by heating, ventilating, and air-conditioning (HVAC). The traditional heating and cooling systems contribute greatly to the emission of greenhouse gases, especially carbon dioxide. Four different ways, i.e., Trombe wall, solar chimney, unglazed transpired solar façade, and solar roof, are adopted for solar heating. Similarly, two major ways, i.e., evaporative cooling and building integrated evaporative cooling are adopted for cooling of the building. Therefore, an attempt has been made in this paper to compile the developments of solar heating and cooling technologies in a building. © 2016 Higher Education Press and Springer-Verlag Berlin Heidelberg
Mishra S.P.,Kalinga Institute of Industrial Technology |
Kumar A.,Kalinga Institute of Industrial Technology
2015 International Conference on Renewable Energy Research and Applications, ICRERA 2015 | Year: 2015
Renewable power like Wind power is an critical infrastructure for economic development and improving the quality of life. To improve the efficiency of Wind power generation, a model of synchronous generator with brushless excitation system is proposed for a specific location and its various parameters like wind speed analysis, power and energy calculation, Probability function, Rate of return etc. are analyzed. © 2015 IEEE.
Chatterjee P.S.,Kalinga Institute of Industrial Technology |
Roy M.,Kalinga Institute of Industrial Technology
Smart Innovation, Systems and Technologies | Year: 2015
Primary User Emulation (PUE) attack is a type of Denial-of-Service (DoS) attack which is commonly faced by Cognitive Wireless Sensor Networks (CWSNs). In CWSNs, malicious secondary users try to emulate primary users to maximize their own spectrum usage or to obstruct secondary users from accessing the spectrum. In this paper we have proposed a base station controlled spectrum allocation protocol for the secondary users to deal with PUE attacks in CWSNs. We have used the well-known lightweight hash function SHA-1 for the authentication process of a secondary user to the base station. We demonstrate that our authentication protocol can be implemented efficiently on CWSN nodes. Our experimental results show that the Base Station controlled Primary User Emulation Attack performs well in CWSN scenario. © Springer India 2015.
Panigrahi S.,CSIR - Institute of Minerals And Materials Technology |
Bhattacharjee S.,CSIR - Institute of Minerals And Materials Technology |
Besra L.,CSIR - Institute of Minerals And Materials Technology |
Singh B.P.,CSIR - Institute of Minerals And Materials Technology |
Sinha S.P.,Kalinga Institute of Industrial Technology
Journal of the European Ceramic Society | Year: 2010
Electrophoretic deposition of doped ceria has been carried out in non-aqueous solvent to prepare coatings on different substrates and free standing films. It has been found that uneven deposition occurred in ethanol, while in butanol deposition yield is low having very little variation with deposition time. On the other hand, good deposit obtained in acetyl acetone medium, but had a porous structure. The best result however was obtained in mixed solvent. Effect of adding charge modifying additives in the ceria suspension on the deposit microstructure has been studied. Mechanism of charging in the non-aqueous medium to modify the surface properties of the suspended particles has been discussed. © 2009 Elsevier Ltd. All rights reserved.