• Home
  • Mithun Mukherjee
Mithun Mukherjee

Mithun Mukherjee

About

186
Publications
60,499
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,562
Citations
Additional affiliations
March 2014 - June 2015
National Institute of Technology, Hamirpur
Position
  • Faculty Member
January 2010 - March 2015
Indian Institute of Technology Patna
Position
  • PhD Student

Publications

Publications (186)
Preprint
Full-text available
Within the field of human-computer interaction, data gloves play an essential role in establishing a connection between virtual and physical environments for the realization of digital human. To enhance the credibility of human-virtual hand interactions, we aim to develop a system incorporating a data glove-embedded technology. Our proposed system...
Article
Within the field of human–computer interaction, data gloves play an essential role in establishing a connection between virtual and physical environments for the realization of digital human. To enhance the credibility of human‐virtual hand interactions, we aim to develop a system incorporating a data glove‐embedded technology. Our proposed system...
Article
Full-text available
Internet of Things (IoT) with edge computing capability enhances efficiency, availability and improves latency of an industrial automation system. However, to provide dynamic services at the resource-constrained edge device, reconfiguration of services is necessary. This paper proposes a programmable edge network to (re)configure different services...
Article
Full-text available
In the Industrial Internet of Things (IIoT), a significant amount of perceived data is generated from massive IoT devices, which requires timely computing for value maximization. Multi-access edge computing (MEC), which deploys computing nodes close to the data source, is a promising computing paradigm for IIoT applications. However, due to the lim...
Article
Industrial Internet of Things (IIoT) generates a massive of mixed traffic, which shares the same bottlenecked network resource. The burst of flows having heavy-tailed property imposes a challenge in provisioning stringent quality of services (QoS) to light-tailed flows and fair QoS among flows. Furthermore, the flows following the same tail distrib...
Article
The growing development of the Internet of Things (IoT) is accelerating the emergence and growth of new IoT services and applications, which will result in massive amounts of data being generated, transmitted and processed in wireless communication networks. Mobile Edge Computing (MEC) is a desired paradigm to timely process the data from IoT for v...
Data
paper title "A Joint Filter and Spectrum Shifting Architecture for Low Complexity Flexible UFMC in 5G" - Page 4 corrected typos
Article
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers’ efficiency to a great extent as it detects the threat on a pas...
Article
With the growing popularity of immersive interaction applications, e.g., industrial teleoperation and remote-surgery, the service demand of communication network is switching from packet delivery to remote control-based communication. The Tactile Internet (TI) is a promising paradigm of remote control-based wireless communication service, which ena...
Article
The IEEE 802.15.4 standard is one of the widely adopted specifications for realizing different applications of the Internet of Things. It defines several physical layer options and Medium Access Control (MAC) sub-layer for devices with low-power operating at low data rates. As devices implementing this standard are primarily battery-powered, minimi...
Article
Full-text available
The core objective of the Wireless Sensor Networks (WSNs) in livestock industry is monitoring the state and activities of different animals for their well-being. Being energy-constrained, the consumption of these tiny devices needs to be optimized. Several techniques have been developed for making clusters in WSNs. The sensor nodes attached to the...
Article
In recent days, due to the emergence of communicable infectious diseases, healthcare, and medical technologies are expected to play a critical role. The advancement of communication and sensor network technologies has accelerated mass screening systems to combat the disease. Human temperature detection is one of the measurements for crowd screening...
Article
Full-text available
Existing object detection algorithms rely excessively on instance-level labels, which are both time-consuming and expensive. In particular, for remote sensing images (RSI) with small and dense objects, the labeling cost is much higher than that of general images. Moreover, the propagation process of the labels over the noisy channel results in blur...
Article
Average-consensus protocol is one of the ways to develop distributed time-synchronization algorithms in Internet of Things (IoT) networks. However, the large number of iteration leads to a common time notion issue in nodes. This poses a critical challenge in the convergence of the time-synchronization algorithm and resulting asymptotic convergence...
Article
Full-text available
This special section solicits original research and practical contributions which advance the security and privacy of federated learning solutions for industrial IoT applications.
Preprint
Full-text available
Internet of Things (IoT) with edge computation enhances efficiency, safety, and availability of an industrial automation system. However, there is a continued effort to increase the reliability of the system with minimal downtime. This can be achieved through a modular, re-configurable, and integrable system design approach. In this paper, we propo...
Preprint
Full-text available
Internet of Things (IoT) with edge computation enhances efficiency, safety, and availability of an industrial automation system. However, there is a continued effort to increase the reliability of the system with minimal downtime. This can be achieved through a modular, re-configurable, and integrable system design approach. In this paper, we propo...
Article
Multiple object tracking (MOT) has gained increasing attention due to its academic and commercial interests in computer vision tasks. Most of the existing state-of-the-art MOT methods consider the tracking-by-detection (TBD) framework, which localizes the pedestrian in each frame and connects these object hypotheses into the trajectories without an...
Article
In this paper, we study the deadline-aware task data offloading in edge-cloud computing systems. The hard-deadline tasks strictly demand to be processed within their delay deadline, whereas the deadline can be relaxed for the soft-deadline tasks. Generally, edge computing aims to shorten the transmission delay between the remote cloud and the end-u...
Preprint
Full-text available
The advantage of computational resources in edge computing near the data source has kindled growing interest in delay-sensitive Internet of Things (IoT) applications. However, the benefit of the edge server is limited by the uploading and downloading links between end-users and edge servers when these end-users seek computational resources from edg...
Article
Full-text available
Semantic segmentation of remote sensing images (RSI) plays a significant role in urban management and land cover classification. Due to the richer spatial information in the RSI, existing convolutional neural network (CNN)-based methods cannot segment images accurately and lose some edge information of objects. In addition, recent studies have show...
Article
Full-text available
With the emergence of multi-view data, many multi-view clustering methods have been developed due to the effectiveness of exploiting the complementary information of multi-view data. However, most existing multi-view clustering methods have the following two drawbacks: (1) they usually explore the relationships between samples in the original space...
Conference Paper
Full-text available
The advantage of computational resources in edge computing near the data source has kindled growing interest in delay-sensitive Internet of Things (IoT) applications. However, the benefit of the edge server is limited by the uploading and downloading links between end-users and edge servers when these end-users seek computational resources from edg...
Preprint
Full-text available
The advantage of computational resources in edge computing near the data source has kindled growing interest in delay-sensitive Internet of Things (IoT) applications. However, the benefit of the edge server is limited by the uploading and downloading links between end-users and edge servers when these end-users seek computational resources from edg...
Article
The IEEE 802.15.4 standard is one of the widely adopted networking specification for realizing different applications of Internet of Things (IoT). It defines several physical layer options and Medium Access Control (MAC) sub-layer protocols for low-power devices supporting low-data rates. One such MAC protocol is the Deterministic and Synchronous M...
Preprint
Full-text available
Multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) cellular network is promising for supporting massive connectivity. This paper exploits low-latency machine learning in the MIMO-NOMA uplink transmission environment, where a substantial amount of data must be uploaded from multiple data sources to a one-hop away edge server f...
Preprint
Full-text available
Reconfigurable intelligent surface (RIS)-empowered communication is being considered as an enabling technology for sixth generation (6G) wireless networks. The key idea of RIS-assisted communication is to enhance the capacity, coverage, energy efficiency, physical layer security, and many other aspects of modern wireless networks. At the same time,...
Preprint
Full-text available
Reconfigurable intelligent surface (RIS)-empowered communication is being considered as an enabling technology for sixth generation (6G) wireless networks. The key idea of RIS-assisted communication is to enhance the capacity, coverage, energy efficiency, physical layer security, and many other aspects of modern wireless networks. At the same time,...
Article
The Internet of Things (IoT) technology has been widely introduced to the existing medical system. An eHealth system based on IoT devices has gained widespread popularity. In this article, we propose an IoT eHealth framework to provide an autonomous solution for patients with interventional cardiovascular diseases. In this framework, wearable senso...
Preprint
The hardware realization of Universal Filtered Multi-Carrier (UFMC) architecture has attracted significant attention in fifth generation (5G) and beyond. In addition to the flexibility in fast Fourier transform (FFT)-length, a flexible prototype filter in combination with multiplicative complex spectrum shifting co-efficients is required for realiz...
Article
Full-text available
Password is one of the most well-known authentication methods in accessing many Internet of Things (IoT) devices. The usage of passwords, however, inherits several drawbacks and emerging vulnerabilities in the IoT platform. However, many solutions have been proposed to tackle these limitations. Most of these defense strategies suffer from a lack of...
Article
Full-text available
Traditional multimedia forensics techniques inspect images to identify, localize forged regions and estimate forgery methods that have been applied. Provenance filtering is the research area that has been evolved recently to retrieve all the images that are involved in constructing a morphed image in order to analyze an image, completely forensical...
Article
Due to the powerful capacity of exploring complementary and consistent information by generating a consensus affinity graph from multi-view data, multi-view graph clustering (MVGC) methods have attracted intensive attention. However, multi-view data is usually existed in high-dimensional space, where redundant and irrelevant features may result in...
Article
A cooperative relaying system based on non-orthogonal multiple access (NOMA) is considered a promising technique in next-generation wireless communications. In this letter, we investigate the performance of a dual-hop decode-and-forward based on the NOMA relaying system in terms of achievable rate and power allocation coefficient over imperfect est...
Article
Intelligent reflecting surface (IRS), which is composed of a large number of low-cost passive elements, has the ability to reflect the incident signal independently with an adjustable phase and amplitude shifts, has been regarded as a key and emerging technology for achieving the cost-effectively spectrum and addressing energy issues in the next ge...
Article
Full-text available
High-resolution remote sensing (HRRS) images, when used for building detection, play a key role in urban planning and other fields. Compared with the deep learning methods, the method based on morphological attribute profiles (MAPs) exhibits good performance in the absence of massive annotated samples. MAPs have been proven to have a strong ability...
Article
In this paper, we present an algorithm for capacity optimization in intelligent reflecting surface (IRS)-based multiple-input multiple-output (MIMO) communication systems. To maximize the capacity of elements in IRS, we use augmented Lagrange method with the equivalent transformations on the covariance matrix and reflection matrix constraints. This...
Article
Channel models are vital for theoretical analysis, performance evaluation, and system deployment of the communication systems between the transmitter and receivers. For sixth-generation (6G) wireless networks, channel modeling and characteristics analysis should combine different technologies and disciplines, such as high-mobility, multiple mobilit...
Article
Next-generation wireless networks are witnessing an increasing number of clustering applications, and produce a large amount of non-linear and unlabeled data. In some degree, single kernel methods face the challenging problem of kernel choice. To overcome this problem for non-linear data clustering, multiple kernel graph-based clustering (MKGC) has...
Article
With the increasing popularity of multi-view data, multi-view subspace clustering (MVSC) has attracted intensive attention. However, the curse of dimensionality of the high-dimensional multi-view data constantly obsesses the development of multi-view method. Together with the curse of dimensionality, the existence of noise and outliers further obst...
Article
Radio-frequency-energy-powered cognitive radio network (RF-CRN) is being taken seriously in Connected Vehicles, especially in 5G network, which can better address the challenges of energy limitation and spectrum scarcity. However, the energy efficiency (EE) of the RF-CRN wherein multiple secondary users (SUs) share the same channel is rarely presen...
Article
Edge computing has already shown its potential benefits to support the delay-sensitive and computation-intensive service provisioning in the Internet-of-Things-based environments. Simultaneously, artificial intelligence is expected to enhance the cognizance and intelligence of edge computing, resulting in a new paradigm, intelligent edge computing....
Article
Full-text available
With the recent advancement in wireless communication and networks, we are at the doorstep of the Tactile Internet. The Tactile Internet aims to enable the skill delivery and thereafter democratize the specialized skills for many emerging applications (e.g., remote medical, industrial machinery, remote robotics, autonomous driving). In this article...
Article
Classical automated schemes in the Industrial Internet of Things (IIoT) are challenged by the problems related to huge record storage and the way they respond. To properly manage the manufacturing settings, cognitive systems aim to find a way to efficiently adapt their actions based on uncertainty management and sensory data. However, due to the la...
Article
In the cognitive computing of intelligent Industrial Internet of Things (IIoT), clustering is a fundamental machine learning problem to exploit the latent data relationships. To overcome the challenge of kernel choice for non-linear clustering tasks, multiple kernel clustering (MKC) has attracted intensive attention. However, existing graph-based M...
Article
Full-text available
Multiple pedestrian tracking (MPT) has gained significant attention due to its huge potential in a commercial application. It aims to predict multiple pedestrian trajectories and maintain their identities, given a video sequence. In the past decade, due to the advancement in pedestrian detection algorithms, Tracking-by-Detection (TBD) based algorit...
Article
The IEEE 802.15.4 standard specifies two network topologies: star and cluster-tree. A cluster-tree network comprises of multiple clusters that allow the network to scale by connecting devices over multiple wireless hops. The role of a cluster-head (CH) is to aggregate data from all the devices in the cluster and then transmit it to the overall pers...
Article
Full-text available
The use of quadrotors is proliferating across many civil applications, including those in the areas of the Internet of Things (IoT) and communications. Attitude control plays an important role in these applications, and designing a quadrotor attitude controller is a challenging task. Recently, several design methods for the attitude controller were...
Article
In this letter, we study the computational offloading scheme for the delay-aware tasks of the end-users in the fog computing network. We consider a fog federation of different service providers where an individual fog node allocates its computing resources to the end-user in its proximity, while a fog manager coordinates the load balancing among th...
Article
Full-text available
With the emergence of the Internet of Things (IoT), billions of heterogeneous physical objects are connected through a network for collecting and sharing information, which can improve various aspects of daily lives, including smart living and transportation, and smart ambient environment, including smart city, smart home, smart agriculture, smart...
Article
Full-text available
As remote sensing (RS) images increase dramatically, the demand for remote sensing image retrieval (RSIR) is growing, and has received more and more attention. The characteristics of RS images, e.g., large volume, diversity and high complexity, make RSIR more challenging in terms of speed and accuracy. To reduce the retrieval complexity of RSIR, a...