Mrutyunjaya Panda

Mrutyunjaya Panda
Utkal University | Utkal · Department of Computer Science and Applications

Ph.D

About

129
Publications
131,791
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,311
Citations
Citations since 2016
81 Research Items
976 Citations
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
Introduction
Mrutyunjaya Panda currently works at the Department of Computer Science and Applications, Utkal University. Mrutyunjaya does research in Computer Engineering, Communication Engineering and Telecommunications Engineering.
Additional affiliations
December 2014 - present
Utkal University
Position
  • Professor (Associate)
Description
  • Teaching and research
May 2011 - December 2014
Gandhi Institute for Technological Advancement
Position
  • Head of Faculty
May 1999 - May 2011
Gandhi Institute of Engineering and Technology
Position
  • Professor
Description
  • Teaching, research and administration, hostel superintendent

Publications

Publications (129)
Article
A mobile ad hoc network (MANET) is a set of autonomous mobile devices connected by wireless links in a distributed manner and without a fixed infrastructure. Mobile Ad-Hoc Networks (MANETs) is considered as an infrastructure-less and constant self-configured network of wireless devices. Here, multicast has emerged as an efficient tool for communica...
Article
Full-text available
In recent years, ransomware attacks have become increasingly rampant by the offenders for which ransomware has maintained a major cyber security threat as time progresses. With paradigm shift from social to technical factors, ransomware has also maintained the equal adaptiveness by shifting its focus from initial days' scareware and locker attacks...
Article
Machine learning using the ANN approach is presented in this paper to design 101 channels of optical DEMUX in the range of 1300–1400 nm. This work is used to envisage the optical parameters of silicon grating structure such as the thickness of SiO and Si which are the decisive factors to allow the desired signal through the structure to realize opt...
Chapter
Machine learning is a learning process where computer data analysis can be modeled without any human interference and carry out certain tasks. Change detection of forest cover is very vital for the environment and its applications. It is a method to detect how the area of a particular region changed over different periods. It can be caused due to v...
Article
Full-text available
This paper focuses on the study of automated process discovery using the Inductive visual Miner (IvM) and Directly Follows visual Miner (DFvM) algorithms to produce a valid process model for educational process mining in order to understand and predict the learning behavior of students. These models were evaluated on the publicly available xAPI (Ex...
Chapter
Artificial neural networks (ANNs) are popular nonlinear approximation techniques for solving complex multimodal functions. Performance of such methods is vastly depending on the learning method. In contrast to gradient-based ANN learning, nature-inspired optimization algorithms-based ANN training are found competent. Artificial electric field algor...
Chapter
Therapy that uses “Guided Images” along with visualization to restore or increase the positiveness in behaviors and thoughts with stress reduction is referred to as Guided Imagery Therapy. The most critical requirement for this therapy is that the client should be in a relaxed state so that the subconscious mind can be accessed and the relationship...
Chapter
In this chapter, application of deep learning techniques in mental disorder is proposed to enable medical practitioners to detect the disease accurately and help them in efficient decision making subsequently. Mental illness is a type of health condition that changes a person’s mind, emotions or behaviour (or all three), which witnessed its impact...
Article
Software reliability prediction is the foremost challenge in software quality assurance. Several models have been developed that effectively assess software reliability, but no single model produces accurate prediction results in all situations. This paper proposes a recurrent chemical functional link artificial neural network model to predict the...
Article
Full-text available
Multicast Routings is a big challenge due to limitations such as node power and bandwidth Mobile Ad-hoc Network (MANET). The path to be chosen from the source to the destination node requires protocols. Multicast protocols support group-oriented operations in a bandwidth-efficient way. While several protocols for multi-cast MANETs have been evolved...
Article
Full-text available
The proliferation of Internet of Things (IoT) systems and smart digital devices, has perceived them targeted by network attacks. Botnets are vectors buttoned up which the attackers grapple the control of IoT systems and comportment venomous activities. To confront this challenge, efficient machine learning and deep learning with suitable feature en...
Article
Full-text available
Earth surveillance through aerial images allows more accurate identification and characterization of objects present on the surface from space and airborne platforms. The progression of deep learning and computer vision methods and the availability of heterogeneous multispectral remote sensing data make the field more fertile for research. With the...
Book
Full-text available
In today’s digital world, the huge amount of data being generated is unstructured, messy, and chaotic in nature. Dealing with such data, and attempting to unfold the meaningful information, can be a challenging task. Feature engineering is a process to transform such data into a suitable form that better assists with interpretation and visualizatio...
Article
In the present research, VLSI circuit partitioning is addressed with the application of a novel advanced genetic algorithm for the design of an efficient Full adder circuit. In this, the circuit partitioning is realized by considering a different number of populations. Further, the fitness function is calculated with respect to mutation probability...
Chapter
OCR is the recognition of characters from digitized documents and the OCR systems tries to eliminate human interactions with computer and now days for better result and effectiveness; OCR systems are completely involved in our daily life. The OCR component becomes an important component of document scanners and is used in numerous fields such as po...
Chapter
Full-text available
This research is focused on the efficient classification of BHP flooding attacks in the Optical switching network environment. The burst switching network is the backbone of the future generation of the optical network. The burst header packet flooding attacks poses a key security challenge that may have a negative impact on its resource utilizatio...
Chapter
Mobile ad-hoc networks (MANETs) presenting a distinct and infrastructure free network which are group of wireless nodes functioning with self-driven and self-routing principle. Ad-hoc networks, a new set of communication platform, experimented for enabling effective communication during cyclonic disaster and calamities. Dynamic mobility system is a...
Chapter
Technological advancements have increased the size of image databases and their applications in different fields. This has also increased the importance of image processing and its subfields like image classification, image segmentation, image retrieval, image enhancement, image compression, image restoration etc. This is also the reason behind the...
Book
This book highlights recent research on bio-inspired computing and its various innovative applications in information and communication technologies. It presents 38 high-quality papers from the 10th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2019) and 9th World Congress on Information and Communication...
Chapter
Full-text available
Thresholding is one of the important steps in image analysis process and used extensively in different image processing techniques. Medical image segmentation plays a very important role in surgery planning, identification of tumours, diagnosis of organs, etc. In this article, a novel approach for medical image segmentation is proposed using a hybr...
Chapter
Software bugs (or malfunctions) pose a serious threat to software developers with many known and unknown bugs that may be vulnerable to computer systems, demanding new methods, analysis and techniques for efficient bug detection and repair of new unseen programs at a later stage. This chapter uses Evolutionary Grey wolf (GW) search optimization as...
Preprint
Full-text available
The novel Corona-virus (COVID-2019) epidemic has posed a global threat to human life and society. The whole world is working relentlessly to find some solutions to fight against this deadly virus to reduce the number of deaths. Strategic planning with predictive modelling and short term forecasting for analyzing the situations based on the worldwid...
Article
Full-text available
The classification has gained popularity in the research community due to its wide variety of applications in different fields. The complexity in the extraction of information from images and the use of this information for classification task has made image classification a tedious job. The Proposed method of classification uses the SIFT algorithm...
Article
Nevertheless a meticulous research on photonic integrated circuit have been focused since a last decade, the present research brings a different type of approach to envisage optical ADDER circuit. Further the novelty of present research deals with the realization of photonic based ADDER circuit with the use of minimum number optical elements, where...
Chapter
Software reliability is one of the key aspects of software quality estimation and prediction during software testing period. Hence, accurate prediction of software reliability is an important but critical job. Machine Learning (ML) techniques have been proven victorious in providing superior results than traditional techniques for software reliabil...
Article
Thresholding is one of the important steps in image analysis process and used extensively in different image processing techniques. Medical image segmentation plays a very important role in surgery planning, identification of tumours, diagnosis of organs, etc. In this article, a novel approach for medical image segmentation is proposed using a hybr...
Article
Full-text available
Software is an important part of human life and with the rapid development of software engineering the demands for software to be reliable with low defects is increasingly pressing. The building of a software defect prediction model is proposed in this article by using various software metrics with publicly available historical software defect data...
Article
he mobile ad hoc networks (MANETs) are gaining popularity in recent years due to their flexibility and they can be deployed at any location without pre-existing infrastructure. Clustering is an important research topic for mobile ad hoc networks (MANETs) because clustering guarantee basic levels of system performance, such as throughput and delay,...
Chapter
This chapter introduces a novel learning scheme based on chemical reaction optimization (CRO) for training functional link artificial neural network (FLANN) to improve the accuracy of software reliability prediction. The best attributes of FLANN such as capturing the inner association between software failure time and the nearest ‘m’ failure time h...
Chapter
Full-text available
The Big Data, due to its complicated and diverse nature, poses a lot of challenges for extracting meaningful observations. This sought smart and efficient algorithms that can deal with computational complexity along with memory constraints out of their iterative behavior. This issue may be solved by using parallel computing techniques, where a sing...
Chapter
The use of intelligent artificial devices has solved many real-world problems and also improved the living style of human beings. The capability of providing unbiased and accurate result has also increased the demand for these devices. For getting faster and well-organized outcomes, scientists and researchers are giving more and more interest in de...
Book
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Traditional algorithm software cannot deal with such complex and vast amounts of data, necessitating the developm...
Article
Full-text available
The process of capturing, transfer and sharing of information in the form of digital images have become easier due to the use of advanced technologies. Retrieval of desired images from these huge collections of image databases is one of the popular research areas and has its applications in various fields. An image set consists of images containing...
Article
Full-text available
With the explosive growth of internet, there are a big amount of data being collected in terms of text document, that attracts many researchers in text mining. Traditional data mining methods are found to be trapped while dealing with the scale of text data. Such large scale data can be handled by using parallel computing frameworks such as: Hadoop...
Preprint
Full-text available
Software is becoming an indigenous part of human life with the rapid development of software engineering, demands the software to be most reliable. The reliability check can be done by efficient software testing methods using historical software prediction data for development of a quality software system. Machine Learning plays a vital role in opt...
Article
One of the major objectives of image analysis is to identify an object in the image or identify different objects or regions separately. The role of segmentation is very important in this identification process. The process of segmentation becomes more complex in case of colour images. Different techniques are used to find the optimal threshold val...
Poster
Full-text available
Speech Recognition(SR), is a subfield of computational linguistic, which deals in developing methodologies and technologies for recognizing and translating spoken language into text, with help of computers. Sometimes it is also known as Speech to Text or Automatic Speech Reorganization(ASR). Now days all the leading IT companies are adopting this f...
Chapter
Full-text available
With the rapid development of Internet of Things (IoT), it has now become a buzzword for everyone who works in this area of research. Further, it is seen that with the rapid development of sensors and devices with their connection to IoT become a treasure trove for big data analytics. It has found numerous applications in developing smart cities wh...
Article
Full-text available
Whenever a feedback system comes into mind, it's always a demand of the e-commerce organizations to get the customer feedbacks in real time and to build some strong dashboards on top of these feedbacks/ratings. So that they can easily know the performance of any product at any point of time as well as they could able to take a decision, on what to...
Chapter
Full-text available
IoT is a prototypical example of big data. In order to have viable solutions to that effect, artificial intelligence (AI) techniques are considered to be the right choice. Hence, the IOT system with AI techniques makes us to have smart applications like smart e-health, smart metering, and smart city to name a few. Although IoT is gaining everybody'...
Conference Paper
Full-text available
Big data shall mean the massive volume of data that could not be stored, processed and managed by any traditional database management systems. Big Data Analytics becoming a comprehensive research area today this has attracted to all academia and industry to extract knowledge and information from a large amount of data. Oracle SQL is a prominent DBM...
Article
Full-text available
—Development of advanced technology has increased the size of data and has also created different categories of data. Classifying these different categories of data is the need of the era. We have proposed a method of classifying the image database containing four categories of images like human face, airplane, cup and butterfly. Our approach invol...
Conference Paper
Full-text available
Wide use of internet and web applications like, feedback collection systems are now making peoples smarter. In these applications, peoples used to give their feedback about the movies, products, services, etc through which they have gone, and this feedback are publicly available for future references. It is a tedious task for the machines to identi...
Article
Full-text available
The Big Data, due to its complicated and diverse nature, poses a lot of challenges for extracting meaningful observations. This sought smart and efficient algorithms that can deal with computational complexity along with memory constraints out of their iterative behavior. This issue may be solved by using parallel computing techniques, where a sing...
Article
Full-text available
Smart grids, or intelligent electricity grids that utilize modern IT/communication/control technologies, become a global trend nowadays. Smart Grids which enable two-way communication and monitoring between service providers and end-users need novel computational algorithms for supporting generation of power from wide range of sources, efficient en...
Article
Full-text available
Even though, many researchers tried to explore the various possibilities on multi objective feature selection, still it is yet to be explored with best of its capabilities in data mining applications rather than going for developing new ones. In this paper, multi-objective evolutionary algorithm ENORA is used to select the features in a multi-class...
Article
Full-text available
Deep Learning is considered to be a quite young in the area of machine learning research, found its effectiveness in dealing complex yet high dimensional dataset that includes but limited to images, text and speech etc. with multiple levels of representation and abstraction. As there are a plethora of research on these datasets by various researche...
Chapter
Full-text available
Evolutionary harmony search algorithm is used for its capability in finding solution space both locally and globally. In contrast, Wavelet based feature selection, for its ability to provide localized frequency information about a function of a signal, makes it a promising one for efficient classification. Research in this direction states that wav...
Article
Full-text available
IoT is a innovative innovation which bridges interoperability challenges to radically change the way in which healthcare will be delivered, driving better outcomes, increasing efficiency and making healthcare affordable. Industry analysts predict that the ability for patients to take more responsibility of their health and the promotion of preventi...
Article
Full-text available
In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays a vital role in classifying the human characteristics. The user profile status is collected from LinkedIn, a popular professional...
Conference Paper
Full-text available
Data Mining and Knowledge Discovery is an emerging field of research that have been attracting many researchers to extract meaningful pieces of information from the dataset. Image Analysis and Knowledge Discovery from an Image is also taking the front position in both Data Mining and Image Analysis area. In this paper, we use three very popular dat...
Article
Full-text available
Evolutionary harmony search algorithm is used for its capability in finding solution space both locally and globally. In contrast, Wavelet based feature selection, for its ability to provide localized frequency information about a function of a signal, makes it a promising one for efficient classification. Research in this direction states that wav...
Article
Full-text available
This paper aims at providing the concept of information granulation in Granular computing based pattern classification that is used to deal with incomplete, unreliable, uncertain knowledge from the view of a dataset. Data Discretization provides us the granules which further can be used to classify the instances. We use Equal width and Equal freque...
Article
Full-text available
Crisis management is being dealt extensively with reliable data sources that are being collected continuously by national and local authorities. These open data creating a radical opportunity for the successful prediction of crisis. At the same time, it poses some challenges to the researchers for its heterogeneity, real time and massive data. Rece...
Article
Full-text available
Big data is a collection of large data sets that include different types such as structured, unstructured and semi-structured data. This data can be generated from different sources like social media, audios, images, log files, sensor data, transactional applications, web etc. To process or analyse this huge amount of data or extracting meaningful...
Thesis
Full-text available
The menace of illegal access to data resources is a growing concern of researchers in the field of computer science. A significant amount of effort is required to monitor the activities in a computer network with a view to detect any attempt for intrusion. From this perspective, the main motivation behind this research is to design an efficient int...
Book
Full-text available
The aim of this book is to understand the state-of-the-art theoretical and practical advances of swarm intelligence. It comprises seven contemporary relevant chapters. In chapter 1, a review of Bacteria Foraging Optimization (BFO) techniques for both single and multiple criterions problem is presented. A survey on swarm intelligence for multiple an...
Article
Full-text available
In this paper, we propose novel methods to find the best relevant feature subset using fuzzy rough set-based attribute subset selection with biologically inspired algorithm search such as ant colony and particle swarm optimization and the principles of an evolutionary process. We then propose a hybrid fuzzy rough with K-nearest neighbor (K-NN)-base...
Article
Full-text available
The Internet of Things allows various different physical objects named Things to connect and interact with other Things. In order to realise this, users must be willing to trust the devices and communication that happens automatically. Trust management provides a potential solution for the security issues of distributed networks. In this paper, we...
Data
Using Adobe Reader is the easiest way to submit your proposed amendments for your IGI Global proof. If you don't have Adobe Reader, you can download it for free at http://get.adobe.com/reader/. The comment functionality makes it simple for you, the contributor, to mark up the PDF. It also makes it simple for the IGI Global staff to understand exact...
Chapter
Full-text available
Using Adobe Reader is the easiest way to submit your proposed amendments for your IGI Global proof. If you don't have Adobe Reader, you can download it for free at http://get.adobe.com/reader/. The comment functionality makes it simple for you, the contributor, to mark up the PDF. It also makes it simple for the IGI Global staff to understand exact...
Book
Full-text available
With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical a...
Book
Full-text available
This book provides a comprehensive knowledge of the fundamental concepts and techniques in soft computing, which is a burning topic of research now-a-days in the field of computational intelligence along with some of their application to control and pattern recognition. Soft computing paradigms such as fuzzy logic system, neural networks and genet...
Book
Full-text available
This book provides a comprehensive knowledge of the fundamental concepts and techniques in soft computing, which is a burning topic of research now-a-days in the field of computational intelligence alongwith some of their application to control and pattern recognition. Soft computing paradigms such as fuzzy logic system, neural networks and genetic...