Papers by Satyasundara Mahapatra

International journal of innovative technology and exploring engineering, Aug 30, 2019
Intrusion Detection Systems (IDSs) have been crucial in defending intrusive attacks (both active ... more Intrusion Detection Systems (IDSs) have been crucial in defending intrusive attacks (both active and passive) in various application scenarios in recent trends. Over the years, many research activities have been carried out on intrusion detection systems. The IDSs have been evolved over times with various detection methodologies, approaches, and technology types. The IDSs after several evaluations and different approaches still face a major challenge-performance improvement. This improvement can be quantified in two broad ways-the detection rate and the rate of false positives. The improved performance involves the efficiency and accuracy of detection. The efficiency can be attributed to performance in case of a very high amount of attacks and the accuracy can be attributed to a significantly low amount of false positives. In the same context, we have found that the IoT networks which are in high demand in recent trends also suffer from such types of attacks in operational environments due to limited storage and processing capabilities. In order to protect the IoT application, the scenario necessitates the need of IDS that is lightweight in implementation and provides a significantly higher amount of accuracy which is at par with the IDSs implemented in conventional networks. In this work, we have proposed an improved technique for performance improvement of IDSs in IoT domain.
PCSVM: A Hybrid Approach using Particle Swarm Optimization and Cuckoo Search for Effective Cancer Diagnosis
2023 2nd Edition of IEEE Delhi Section Flagship Conference (DELCON)

Data fusion & visualization application for network forensic investigation - a case study
2017 2nd International Conference on Anti-Cyber Crimes (ICACC)
Information Security field has seen a paradigm shift from a traditional silo approach to an integ... more Information Security field has seen a paradigm shift from a traditional silo approach to an integrated approach in collection, dissemination and analysis of structured and unstructured information for overall information protection and digital crime investigation goals. Digital crimes have become a big problem due to large number of data access, insufficient threat analysis techniques and growing size of storage capacity for investigating agencies. Since threat detection projects involve processing of large volume of uncertain information and to reduce uncertainties in the detection process, the analyst has to evaluate a large volume of data collected from different sources and network threat related databases. Being a data intensive analysis and detection, for improved analysis and detection, there is a need for these data to be harmonized and integrated along with the visualization technique for displaying large amount of data at once by incorporating information from various sources and variety of threat detection criteria's (e.g., threat types, attacker behavior and motive, effects of the threat on resources). Data Fusion and Integrated visualization of data distribution bars and rules, visualization of behavior and comprehensive analysis, maps allow investigating agencies to analyze different rules and data at different level, with any kind of anomaly. The primary aim of this study deals with have a front end or upstream approach towards an effective dynamic data fusion (DF)-based analysis and detection procedures along with visualization technique for network forensic investigation and threat analysis. Thus such procedures would be able to detect different network trends and patterns and integrate various intrusion datasets from different sources. As a practical approach, the model has been implemented in identification, analysis and detection for IP Spoofing as an illustrative example. The application in this study shows that this approach can increase the efficiency of forensic digital investigation by dynamic data integration and incorporation of existing intrusion detection system based information in the network threat investigation and analysis.

International Journal on Recent and Innovation Trends in Computing and Communication
Machine learning now is used across many sectors and provides consistently precise predictions. T... more Machine learning now is used across many sectors and provides consistently precise predictions. The machine learning system is able to learn effectively because the training dataset contains examples of previously completed tasks. After learning how to process the necessary data, researchers have proven that machine learning algorithms can carry out the whole work autonomously. In recent years, cancer has become a major cause of the worldwide increase in mortality. Therefore, early detection of cancer improves the chance of a complete recovery, and Machine Learning (ML) plays a significant role in this perspective. Cancer diagnostic and prognosis microarray dataset is available with the biopsy dataset. Because of its importance in making diagnoses and classifying cancer diseases, the microarray data represents a massive amount. It may be challenging to do an analysis on a large number of datasets, though. As a result, feature selection is crucial, and machine learning provides class...
Blockchain in Healthcare: A Review
Springer eBooks, 2023
Introduction to Supervised Learning
Data Analytics in Bioinformatics, 2021
Internet of Things and Smart Homes: A Review
Wireless Sensor Networks and the Internet of Things, 2021
International Journal of Innovative Technology and Exploring Engineering, 2019
An ad hoc cloud computing environment on the infrastructure point of view is formed by consuming ... more An ad hoc cloud computing environment on the infrastructure point of view is formed by consuming resources from existing occasionally available computing setups that are primarily used for some other purposes, for example, personal computers, mobile phones and such similar devices connected to the internet. In this paper, we propose a mechanism to secure the network layer communications particularity routing and data packet forwarding in ad hoc cloud environment. The paper details the proposed scheme and analyses its robustness on the security perspective.

Bitcoin: A Digital Cryptocurrency
Intelligent Systems Reference Library, 2021
Bitcoin is the largest cryptocurrency ever created and traded using a decentralized ledger known ... more Bitcoin is the largest cryptocurrency ever created and traded using a decentralized ledger known as the blockchain. Altogether, Bitcoin is a network in which every computing node is responsible to service the others and allows shared access to the data, known peer to peer (P2P) network, and provides an adaption of electronic-cash that supports e-payments. Such payments are transferred directly from transacting parties to the receiver without the requirement of any intermediary monetary body. Satoshi Nakamoto introduced bitcoin in 2009 and since then it has emerged as the most thriving cryptocurrency. Bitcoin is a globally accepted and immutable e-payment system of digital currency. All the electronic transactions performed using bitcoin are verified by the intermediate nodes called miners and then added as a block in the distributed ledger. Bitcoin blockchains are maintained by the miners running Bitcoin software. Bitcoin depends on Proof-of-Work (PoW) to confront double-spending by a distributed timestamping service. To ensure the operations and security of Bitcoin, all the transactions and their execution order must be available to all Bitcoin users. In addition to its security robustness, anonymity is the key attribute for its success. There are several factors like market-cap, the marketplace, miners-revenue, etc. which causes the rise and fall of the price of Bitcoin. This chapter focus on the factors that are responsible for the rise and fall of Bitcoin Price with a comparison with other Cryptocurrencies.

International Journal of Innovative Technology and Exploring Engineering, 2019
The efficiency of parallel processors is achieved for the purpose of quick computing is mainly de... more The efficiency of parallel processors is achieved for the purpose of quick computing is mainly depending on the scheduling of activity. The most important factor for scheduling of activities are depend on the waiting time which is directly influence the computation time of overall activity. Minimizing the Variance of Waiting Time otherwise known as Waiting Time Variance (WTV) is one of the metrics of Quality of Services (QoS) which enhance the efficiency of activity scheduling. Allocate the activity from a set of activity pool and schedule them for each identical parallel processor for execution in a large scale by minimizing WTV is the main focusing area of this paper. In case of large scale computing activities are complex in nature. A prior knowledge of each activity must be known before the preparation of activity scheduling for efficient and rapid computing. A snake walks style of activity distribution among the parallel processor is presented in this paper for minimization pro...

International Journal of Recent Technology and Engineering (IJRTE), 2019
The segmentation and detection of brain pathologies in medical images is an indispensible step. T... more The segmentation and detection of brain pathologies in medical images is an indispensible step. This helps the radiologist to diagnose a variety of brain deformity and helps in the set up for a suitable treatment. Magnetic Resonance Imaging (MRI) plays a significant character in the research area of neuroscience. The proposed work is a study and probing of different classification techniques used for automated detection and segmentation of brain tumor from MRI in the field of machine learning. This paper try to present the feature extraction from raw MRI and fed the same to four classifier named as, Support Vector Machine (SVM), Decision Tree (DT), k-Nearest Neighbors (KNN), and Artificial Neural Network (ANN). This mechanism was done in various stages for Computer Aided Detection System. In the preliminary stage the pre-processing and post-processing of MR image enhancement is done. This was done as the processed image is more likely suitable for the analysis. Then the k-means clus...
Improved Prediction Analysis with Hybrid Models for Thunderstorm Classification over the Ranchi Region
New Generation Computing

Heuristics and Hyper-Heuristics - Principles and Applications, 2017
In real computational world, scheduling is a decision making process. This is nothing but a syste... more In real computational world, scheduling is a decision making process. This is nothing but a systematic schedule through which a large numbers of tasks are assigned to the processors. Due to the resource limitation, creation of such schedule is a real challenge. This creates the interest of developing a qualitative scheduler for the processors. These processors are either single or parallel. One of the criteria for improving the efficiency of scheduler is waiting time variance (WTV). Minimizing the WTV of a task is a NP-hard problem. Achieving the quality of service (QoS) in a single or parallel processor by minimizing the WTV is a problem of task scheduling. To enhance the performance of a single or parallel processor, it is required to develop a stable and none overlap scheduler by minimizing WTV. An automated scheduler's performance is always measured by the attributes of QoS. One of the attributes of QoS is 'Timeliness'. First, this chapter presents the importance of heuristics with five heuristic-based solutions. Then applies these heuristics on 1kWTV minimization problem and three heuristics with a unique task distribution mechanism on Q m |prec|WTV minimization problem. The experimental result shows the performance of heuristic in the form of graph for consonant problems.

Application of Virtual Reality, Augmented Reality, and Mixed Reality in Endourology and Urolithiasis: An Update by YAU Endourology and Urolithiasis Working Group
Frontiers in Surgery, 2022
The integration of virtual reality (VR), augmented reality (AR), and mixed reality (MR) in urolog... more The integration of virtual reality (VR), augmented reality (AR), and mixed reality (MR) in urological practices and medical education has led to modern training systems that are cost-effective and with an increased expectation toward surgical performance and outcomes. VR aids the user in interacting with the virtual environment realistically by providing a three-dimensional (3D) view of the structures inside the body with high-level precision. AR enhances the real environment around users by integrating experience with virtual information over physical models and objects, which in turn has improved understanding of physiological mechanisms and anatomical structures. MR is an immersive technology that provides virtual content to interact with real elements. The field of urolithiasis has adapted the technological advancements, newer instruments, and methods to perform endourologic treatment procedures. This mini-review discusses the applications of Virtual Reality, Augmented Reality, ...
2nd International Conference on Machine Learning and Information Processing, 28-29 November, 2020, Hyderabad, India

Single Machine Job Scheduling (SMJS) problem is a scheduling problem where a batch of n jobs sche... more Single Machine Job Scheduling (SMJS) problem is a scheduling problem where a batch of n jobs scheduled to be processed through a single machine. The significant of these types of problems are their own inherent value, as well as their role as building schedules by the scheduler for more generalized and complex problems. To enhance the scheduler efficiency of a router in computer networks an efficient and optimized scheduling algorithm is required. This seems to have improved the Quality of Service (QoS) of routers in computer networks. Minimizing the Waiting Time Variance (WTV) is one of the vital criteria for developing a heuristic algorithm. As minimizing the WTV is a NP-Hard problem, a heuristic based novel solution approach is intended in this paper. This approach illustrated with small size problems along with randomly new generated problems. The experimental results are compared with existing approaches. The experimental result shows the proposed approach gives best performanc...

Network-Based Applications of Multimedia Big Data Computing in IoT Environment
Intelligent Systems Reference Library, 2019
In the modern business world, business management techniques are continuously increased and gover... more In the modern business world, business management techniques are continuously increased and governed by smart devices and innovative technologies. These devices are associated with internet can be called as a device of Internet of Things (IoT). Wi-Fi, Bluetooth, Infrared and Hotspot technologies are the connecting medium for these devices. Somehow, these devices are connected to the servers for processing the user request. These sensing devices are producing enormous amount of data in structured or semi-structured or unstructured form otherwise known as big data. The data are stored, manipulated and analyzed with the help of big data techniques for taking well-defined decisions. Thus, the top management people of the business world are able to drive their business in real time. The uses of smart devices are rapidly increased in different application categories of IoT known as Personal, Group, Community and Industrial. Due to easy access to internet, independent power source and sens...

Bitcoin: A Digital Cryptocurrency
Intelligent Systems Reference Library, 2021
Bitcoin is the largest cryptocurrency ever created and traded using a decentralized ledger known ... more Bitcoin is the largest cryptocurrency ever created and traded using a decentralized ledger known as the blockchain. Altogether, Bitcoin is a network in which every computing node is responsible to service the others and allows shared access to the data, known peer to peer (P2P) network, and provides an adaption of electronic-cash that supports e-payments. Such payments are transferred directly from transacting parties to the receiver without the requirement of any intermediary monetary body. Satoshi Nakamoto introduced bitcoin in 2009 and since then it has emerged as the most thriving cryptocurrency. Bitcoin is a globally accepted and immutable e-payment system of digital currency. All the electronic transactions performed using bitcoin are verified by the intermediate nodes called miners and then added as a block in the distributed ledger. Bitcoin blockchains are maintained by the miners running Bitcoin software. Bitcoin depends on Proof-of-Work (PoW) to confront double-spending by...

The technology is advancing day to day in every field, we believe that schools and colleges can a... more The technology is advancing day to day in every field, we believe that schools and colleges can also implement some of the new technology in their day-to-day activities. As taking attendance is important yet repetitive task, this can be tackled using some of the technologies, facial recognition being one of the technology. The aim of this paper is to examine face detection using open CV to mark the presence of recognized faces in any camera image. The image of the classroom with all students will be captured ,the image captured will be served as input for the facial recognition algorithm to recognize the faces of the students in the picture captured and mark their respective attendance. Open CV extracts countenance of the given images and retains a number of the variations within the image data. Currently, many techniques are available for the detection of faces,we will specifically focus on facial recognition using OpenCV.

Single Machine Job Scheduling (SMJS) problem is a scheduling problem where a batch of n jobs sche... more Single Machine Job Scheduling (SMJS) problem is a scheduling problem where a batch of n jobs scheduled to be processed through a single machine. The significant of these types of problems are their own inherent value, as well as their role as building schedules by the scheduler for more generalized and complex problems. To enhance the scheduler efficiency of a router in computer networks an efficient and optimized scheduling algorithm is required. This seems to have improved the Quality of Service (QoS) of routers in computer networks. Minimizing the Waiting Time Variance (WTV) is one of the vital criteria for developing a heuristic algorithm. As minimizing the WTV is a NP-Hard problem, a heuristic based novel solution approach is intended in this paper. This approach illustrated with small size problems along with randomly new generated problems. The experimental results are compared with existing approaches. The experimental result shows the proposed approach gives best performanc...
Uploads
Papers by Satyasundara Mahapatra