R. B. Patel

Chandigarh Engineering College, Mohali, Punjab, India

Are you R. B. Patel?

Claim your profile

Publications (74)9.72 Total impact

  • Vikrant Sharma · R.B. Patel · H.S. Bhadauria · D. Prasad ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless Sensor Network (WSN) has attracted researchers in recent years due to its wide scope of utility in a future era of automation and remote monitoring. Effective deployment of Sensor Nodes (SNs) is a major point of concern as performance and lifetime of any WSN primarily depends on it. Various models have been proposed by researchers to deploy SNs in large-scale open regions. This article aims at classification, working and comparative analysis of these models.
    Egyptian Informatics Journal 09/2015; DOI:10.1016/j.eij.2015.08.003
  • Amit KumarBindal · Anuj Jain · Devendra Prasad · R. B. Patel ·

    International Journal of Computer Applications 05/2015; 117(16):9-13. DOI:10.5120/20637-3313
  • R. Goyal · R.B. Patel · H.S. Bhadauria · D. Prasad ·
    [Show abstract] [Hide abstract]
    ABSTRACT: The fundamental function of Wireless Body Area Network (WBAN) is to convey information over short distances. Because of their tremendous potential in medical and home applications, WBANs have raised tremendous research interests in recent years. Optimal and efficient slot allocation is one of the most active research areas in low-latency applications. The proposed dynamic slot allocation scheme address the bandwidth underutilization problem of the Guaranteed Time Slot (GTS) allocation scheme by IEEE 802.15.4 standard. The scheme is applicable to varieties of applications such as home automation, remote sensing, patient monitoring etc., where data rate are low and require dedicated bandwidth for contention free transmissions. The coordinator allocates GTS of size as requested by the device instead of allocating GTSs in the multiple of superframe slots size as in IEEE 802.5.4 standard and avoids the wastage of bandwidth. The scheme is analysed for performance view point and it has been observed that the proposed scheme is better than IEEE 802.15.4 standard, in terms of bandwidth utilization and number of devices supported.
  • N.S. Bhadauria · R.B. Patel · M.S. Bist · H.S. Bhadauria ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Brain hemorrhage which happens as a result of bleeding due to rupturing of blood vessels within the brain matter is the main causes of human death. This discharge of blood may disturb the normal circulation of the brain. Computed Tomography (CT) has been the primary modality for the detection of brain hemorrhages because it is widely available, less expensive, quick to perform, and depicts rapidly. However intensity inhomogeneity, worst tissue contrast and weak boundaries in CT images may cause significant difficulties in hemorrhage detection. Thus in this paper the performance of various segmentation methods for hemorrhage detection from brain CT images have been evaluated.
  • Source
    G.S Bhamra · A.K Verma · R.B. Patel ·

    01/2015; 5(1):11-22. DOI:10.5121/ijfcst.2015.5102
  • Source
    Amit Kumar Bindal · Anuj Jain · Devendra Prasad · R. B. Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Static sensors have been a prominent area of research for last many years. They have a wide area of applications. Mobility in WSN broadens the application area of WSNs, but it imposes challenge of increased energy requirements and mechanism to find the location of moving sensor nodes. In this article a 2-Way Energy Efficient Localization (TWEEL) scheme is proposed, which is energy efficient and provides better localization as well without employing GPS at all mobile sensor nodes hence reducing the cost. Accuracy is achieved by using twin mobile anchor nodes and energy efficiency is achieved using combined and coordinated movements of nodes towards a single common objective. The location of a sensor node is computed by measuring the distance to the virtual anchor point using TDOA (time difference of arrival) method. The proposed scheme is compared with Zhang and Yu scheme and results shows that TWEEL outperform Zhang and Yu scheme on various parameters.
    International Journal of Applied Engineering Research 01/2015; 10(3):7659-7672.
  • R. Goyal · H.S. Bhadauria · R.B. Patel · D. Prasad ·
    [Show abstract] [Hide abstract]
    ABSTRACT: The fundamental function of Wireless Body Area Network (WBAN) is to convey information over short distances. Because of their tremendous potential in medical and home applications, WBANs have raised tremendous research interests in recent years. This paper presents an energy-efficient and delay sensitive medium access control (MAC) protocol suitable for communication in a WBAN for remote monitoring of physiological signals such as EEG and ECG. In the proposed scheme, sensors are allowed to interrupt the PDA in case of emergency so that immediate action may be taken to avoid any causality, hence provides support to deal with emergency data along with the normal data. For performance analysis proposed scheme is simulated and compared with IEEE 802. 15. 4 standard. The simulation result shows that the proposed scheme is better in QoS for emergency (higher priority) data and gives better performance in terms of the average transmission time and energy efficiency.
    International Journal of Applied Engineering Research 01/2015; 10(5):11995-12008.
  • Source
    Kamal Kumar · A. K. Verma · R. B. Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by nodes in deployment area to their securely located Sink, route security has to be guaranteed. Under dynamic load and selective attacks, availability of multiple secure paths is a boon and increases the attacker efforts by many folds. We propose to build a subset of neighbors as our front towards destination node. We also identified forwarders for query by base station. The front is optimally calculated to maintain the security credential and avail multiple paths. According to our knowledge ours is first secure multipath routing protocol for WSN. We established effectiveness of our proposal with mathematical analysis
    08/2014; 4(4). DOI:10.5121/ijfcst.2014.4404
  • Anil Kumar Verma · Kamal Kumar · R B Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Secure Communication is important parameter in unattended and hostile environment. Wireless Sensor Networks(WSNs) are deployed and operate in vulnerabilities and are candidate networks which should be commissioned for security provisioning in end to end communications. Because of their specialized applications many solutions in terms of cryptographic, Intrusion Detection and Key Management have been proposed. Most solutions lack and seem of ignoring the fact that route is as strong as weakest link in the route with respect to other links in the route. Variance of number of keys and high average number of keys on routes is an issue that we tried to resolve in our proposal using non-uniform key pre-distribution in Heterogeneous Wireless Sensor Networks (HWSNs). Analytical and Simulation based study supports our concern and reports an improvement in Average number of keys in almost60 percent routes and decreasing variance in almost 50 percent routes in random and probabilistic neighbourhood.
    Malaysian Journal of Computer Science 01/2013; 26(2). · 0.41 Impact Factor
  • Source
    Shashi Bhushan · Mayank Dave · R B Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Peer-to-Peer (P2P) systems are widely used for data sharing applications in an autonomous and decentralized mode. P2P systems are suitable for large-scale distributed environments in which nodes can share resources other than data such as computing power, memory and network bandwidth. Some of important parameters that affect the performance of P2P systems are peer availability, data availability, network overhead, overlay structure, churn rate, and data access time. In this paper a self organized replica overlay scheme "Improved Hierarchical Quorum Consensus" (IHQC) for P2P systems is proposed. This scheme organizes replicas in a Self Organized Hierarchical Logical Structure (SOHLS) that has special properties. The scheme improves performance of the system by reducing search time to form read/write quorums, reducing probability of accessing stale data, improving degree of intersection among consecutive quorums and reducing network overhead. This scheme is highly fault tolerant (tolerate up to 1 n  faults) due to replication of data and inherits the best property of Read-One-Write-All (ROWA) protocol in a dynamic environment of P2P network. The architecture for IHQC is also proposed for implementing the scheme that supports improved performance of P2P systems. This scheme also maximizes the degree of intersection set of read and write quorums; hence, having higher probability to get updated data as compared to all other schemes. The mathematical correctness of the scheme is also presented in the paper. The results of simulation study of the proposed scheme also support and verify its better performance than Random and Hierarchical Quorum Scheme.
    09/2012; 4(10). DOI:10.5815/ijcnis.2012.10.02
  • Source
    A.K. Bindal · A. Mangla · D. Prasad · R.B. Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: The forwarding node placement problem in a wireless sensor network is concerned with deploying a minimum number of forwarding nodes (FNs) in a set of candidate locations in the network to satisfy a specific requirement(s), such as connectivity or survivability. The placement of FNs should be energy harvesting aware, because the more energy the placed nodes can harvest the more effective the network will be. In this paper we have presented a Possible Location Deployment Protocol (PLDP) for WSNs. PDLP, which provides survivability and connectivity throughout the network life. In PLDP, the amount of energy calculated and the decision is taken in the real time by FNs.
    Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on; 01/2012
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A WSN is a distributed system of smart sensor nodes interconnected by a wireless communication network. The self-organizing ability of Wireless Sensor Networks (WSNs) permits one to access data from dangerous and hostile environments which otherwise would not be possible. With all the opportunities and promises, WSNs possess their own set of resource constraints like limited accommodation of new nodes, on-board sensor battery power, network communication bandwidth, processing power, memory capacity etc. To overcome some of these shortcomings we are devoted to design HiFAS(Scalable, Fault Tolerant Routing protocol) for wireless sensor networks, which is energy efficient and provides scalability as well. With the concept of gateways and cluster heads it provides prolonged network lifetime, fault tolerance, achieves better network support and prolonged uninterrupted operations.
  • R. B. Patel · Vishal Garg ·
    [Show abstract] [Hide abstract]
    ABSTRACT: This article presents a common solution to Peer-to-Peer (P2P) network problems and distributed computing with the help of ``Neighbor Assisted Distributed and Scalable Environment'' (NADSE). NADSE supports both device and code mobility. In this article mainly we focus on the NADSE based resource management technique. How information dissemination and searching is speedup when using the NADSE service provider node in large network. Results show that performance of the NADSE network is better in comparison to Gnutella, and Freenet.
    12/2011; 1414:159-164. DOI:10.1063/1.3669949
  • Shashi Bhushan · M. Dave · R. B. Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In structured and unstructured Peer-to-Peer P2P systems, frequent joining and leaving of peer nodes causes topology mismatch between the P2P logical overlay network and the physical underlay network. This topology mismatch problem generates high volumes of redundant traffic in the network. This paper presents Common Junction Methodology CJM to reduce network overhead by optimize the overlay traffic at underlay level. CJM finds common junction between available paths, and traffic is only routed through the common junction and not through the conventional identified paths. CJM does not alter overlay topology and performs without affecting the search scope of the network. Simulation results show that CJM resolves the mismatch problem and significantly reduces redundant P2P traffic up to 87% in the best case for the simulated network. CJM can be implemented over structured or unstructured P2P networks, and also reduces the response time by 53% approximately for the network.
    International Journal of Mobile Computing and Multimedia Communications 07/2011; 3(3):51-61. DOI:10.4018/jmcmc.2011070104
  • Source
    Vijay Kumar · R B Patel · Manpreet Singh ·
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a model for reliable packet delivery in Wireless Sensor Networks based on Discrete Parameter Markov Chain with absorbing state. We have demonstrated the comparison between cooperative and non cooperative automatic repeat request (ARQ) techniques with the suitable examples in terms of reliability and delay in packet transmission.
  • Source
    Vijay Kumar · R B Patel · Manpreet Singh · Rohit Vaid ·
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a Markov model for reliability using different types of Sensors and spares that replace sensors in case failure occurs. The primary idea in this paper is to address and analyze the reliability issues to device a reliable and fault tolerance model for a sensor network system. We analyzed the model in terms of reliability and MTTF (Mean-Time-To-Failure). Our research work focus on the mechanism for providing an alternative of a redundant network by replacing the faulty sensor with the available spares.
  • Source
    R B Patel · Dilip Kumar · Trilok C Aseri ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In recent years, energy efficiency and data gathering is a major concern in many applications of Wireless Sensor Networks (WSNs). One of the important issues in WSNs is how to save the energy consumption for prolonging the network lifetime. For this purpose, many novel innovative techniques are required to improve the energy efficiency and lifetime of the network. In this paper, we propose a novel Energy Efficient Clustering and Data Aggregation (EECDA) protocol for the heterogeneous WSNs which combines the ideas of energy efficient cluster based routing and data aggregation to achieve a better performance in terms of lifetime and stability. EECDA protocol includes a novel cluster head election technique and a path would be selected with max-imum sum of energy residues for data transmission instead of the path with minimum energy consumption. Simulation results show that EECDA balances the energy consumption and prolongs the network lifetime by a factor of 51%, 35% and 10% when compared with Low-Energy Adaptive Clustering Hierarchy (LEACH), Energy Efficient Hierarchical Clustering Algorithm (EEHCA) and Effective Data Gathering Algorithm (EDGA), respectively.
    International Journal of Computers, Communications & Control (IJCCC) 04/2011; VI(1):113-124. · 0.75 Impact Factor
  • Neeraj Kumar · Manoj Kumar · R. B. Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless mesh networks (WMNs) are receiving lot of attention in recent years due to the unique features such as low cost and easy deployment. The optimal routing in these networks depends on the link capacities determined by link scheduling. To increase the throughput and network capacity, use of multiple channels and interfaces has been introduced in these networks. But the presence of interference limits the use of link and channel assignment in these types of networks. In this paper, we present a novel approach for link scheduling and channel assignment (CA) to improve the overall capacity and throughput of WMNs. The problem of link scheduling and CA is formulated as a Linear Programming (LP) problem with associated constraints. Links are sorted and placed in a particular group based upon link cost metric (LCM). The LCM value is used to group the links together and placed in appropriate group for CA. As the links are sorted and placed in appropriate groups the corresponding entries are made in Link Assignment Matrix (LAM). Once the links are grouped using LCM, then CA for these links is done and corresponding entries are made in Channel Assignment Matrix (CAM). Two algorithms, one for link scheduling and other for CA, are proposed. Simulation results show that proposed scheme outperforms the earlier approaches with respect to packet delivery fraction, end-to-end delay, aggregate throughput, fairness index and packet loss rate.
    Journal of Network and Computer Applications 01/2011; 34(1-34):30-38. DOI:10.1016/j.jnca.2010.10.001 · 2.23 Impact Factor
  • G. S. Bhamra · A. K. Verma · R. B. Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Distributed Data Mining (DDM) is concerned with application of the classical Data Mining (DM) approach in a Distributed Computing (DC) environments so that the available resource including communication networks, computing units and distributed data repositories, human factors etc. can be utilized in a better way and on-line, real-time decision support based distributed applications can be designed. A Mobile Agent (MA) is an autonomous transportable program that can migrate under its own or host control from one node to another in a heterogeneous network. This paper highlights the agent based approach for mining the association rules from the distributed data sources and proposed an another framework called Agent enriched Mining of Strong Association Rules (AeMSAR) from Distributed Data Sources. As agent technology paradigm of the DC has gained lots of research in the recent years, therefore, making an alliance of agent and Association Rules Mining(ARM) will help mining the Association rules in a Distributed environment in a better way.
    Agents and Data Mining Interaction - 7th International Workshop on Agents and Data Mining Interation, ADMI 2011, Taipei, Taiwan, May 2-6, 2011, Revised Selected Papers; 01/2011
  • Source
    Dilip Kumar · Trilok C. Aseri · R.B. Patel ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Effective energy management in heterogeneous wireless sensor networks (WSNs) is a more challenging issue compared to homogeneous WSNs. Much of the existing research has often assumed homogeneous sensor nodes in the networks. The energy preservation schemes for the homogeneous WSNs do not perform efficiently when applied to heterogeneous WSNs. In this paper, we have presented an energy-efficient multi-hop communication routing (MCR) protocol in order to address the traditional problem of load balancing, lifetime, stability and energy efficiency in the WSNs. MCR protocol is based on dividing the network into dynamic clusters. The cluster-heads election is based on weighted probability. The cluster's nodes communicate with an elected cluster head node by using single hop communication approach, and then the cluster heads communicate the information to the base station via multi-hop communication approach. Performance studies indicate that MCR effectively solves the problem of load balancing across the network, extends the network lifetime, stability and is more energy efficient in comparison to multi-hop low-energy adaptive clustering hierarchy (M-LEACH) and multilayer energy efficient cluster head communication protocol (MEECHCP).
    01/2011; 1(2):130 - 145. DOI:10.1504/IJITCC.2011.039281

Publication Stats

414 Citations
9.72 Total Impact Points


  • 2012
    • Chandigarh Engineering College
      Mohali, Punjab, India
  • 2010-2011
    • Maharishi Markandeshwar University, Mullana
      Ambata, Haryana, India
    • Mody University of Science and Technology
      Sīkar, Rajasthan, India
  • 2009-2011
    • Alabama A & M University
      Huntsville, Alabama, United States
    • Deenbandhu Chhotu Ram University of Science and Technology, Murthal
      • Department of Computer Science and Engineering
      Sonapur, Orissa, India
  • 2005-2010
    • Haryana Engineering College
      Ambata, Haryana, India
  • 2008
    • Shri Mata Vaishno Devi University
      Katra, Uttar Pradesh, India
  • 1999
    • Veer Narmad South Gujarat University
      • Department of Statistics
      Surat, Gujarāt, India