Sudhakar Pandey

Sudhakar Pandey
  • D.Phil.
  • Professor at National Institute of Technology Raipur

About

118
Publications
10,348
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
808
Citations
Introduction
Wireless sensor networks 5G communication Vehicular delay tolerant networks Ad hoc networks Fog computing cloud computing IoT
Current institution
National Institute of Technology Raipur
Current position
  • Professor
Additional affiliations
July 2008 - present
National Institute of Technology Raipur
Position
  • Professor (Associate)

Publications

Publications (118)
Article
Full-text available
Fog computing is an emerging technology that many sectors and industries are currently investing in to establish their own real-time and low-latency environments. Unlike the traditional Internet of Things (IoT), the fog-based IoT systems offers improved performance efficiency and enhanced data security by providing local mechanisms for pre-processi...
Article
Full-text available
Delay Tolerant Networks (DTNs) have the ability to make communication possible without end-to-end connectivity using store-carry-forward technique. Efficient data dissemination in DTNs is very challenging problem due to compromising in Quality-of-Service (QoS) metrics such as delivery ratio, end-to-end delay and overhead ratio. That means, if an al...
Article
The banking industry is experiencing a transformative period due to rapid advancements in big data and artificial intelligence, which present both significant opportunities and challenges. One of the pressing challenges in the domain of customer churn prediction (CCP) is the accurate classification of imbalanced datasets. In this study, we conduct...
Article
An accurate measure of the quality of the air in any given location is the air quality index(AQI). When calculating the AQI, important air pollutants such as SO2, NO2, ground-level O3, CO, and particle matter are taken into account. Numerous organizations worldwide compute these indices based on a range of parameters. In India, the Central Pollutio...
Article
Nowadays, the Internet of Things (IoT) is used for the purpose of gathering data through sensors as well as for storing and processing data. Due to the inherent limitations in the processing and computing capabilities of IoT devices, the inclination towards the integration of cloud computing (CC) with IoT systems is growing rapidly. The CC is capab...
Article
Full-text available
Along with the rising popularity of pay-as-you-go cloud services, many businesses and communities are deploying their business or scientific workflow applications on cloud-based computing platforms. The primary responsibility of cloud service providers is to reduce the monetary cost and execution time of Infrastructure as a Service (IaaS) cloud ser...
Article
Banking fraud is a problem that is becoming more and more serious, along with considerable monetary losses, damage to the bank's brand, loss of client and customer confidence. Fraud identification and prevention are major challenges for many financial organizations, retail firms, and e-commerce companies. Fraud detection is used to both identify an...
Article
Full-text available
Rapid intelligent transportation systems (ITS) innovations need a reliable MAC protocol to enable massive nonsafety message delivery and high‐priority safety broadcasts. The significant rise in spectrum need is regulated by collaboration in cognitive vehicular networks (CVNs). For QoS improvement, a reliable cooperative MAC for CVNs (CCVN‐MAC) is p...
Article
The demand for a quick response from cloud services is rapidly increasing day-by-day. Fog computing is a trending solution to fulfil the demands. When integrated with the cloud, this technology can tremendously improve the performance. Like any other technology, Fog also has the shortcoming of limited resources. The difficulty of efficient scheduli...
Article
Full-text available
The radio-cast nature of wireless communications is always exposed to the eavesdropping attack. To safeguard 5 G communications where both the CUs and Device to Device (D2D) users can communicate securely becomes a prime objection. To examine this issue we have investigated the eavesdropping attack in a considered 5 G Networks, and analysed the sec...
Preprint
Full-text available
Along with the rising popularity of pay-as-you-go cloud services, many businesses and communities are deploying their business or scientific workflow applications on cloud-based computing platforms. The primary responsibility of cloud service providers is to reduce the monetary cost and execution time of Infrastructure as a Service (IaaS) cloud ser...
Article
The internet of things (IoT) has recently become extremely important in our lives. With the advancement in IoT, wireless sensor networks (WSNs) have gained much importance. In WSNs, the routing of clusters has gained more interest. However, there is still a problem with the hotspot. One way to address this issue is uneven clustering. In these, node...
Article
Full-text available
The lack of sufficient contact opportunities in sparse vehicular delay tolerant networks results in poor performance. The network performance can be enhanced by deploying additional small wireless devices called throwbox. Nonetheless, the deployment of throwboxes with distinct placement strategies results in diverse outcomes in terms of metrics suc...
Article
Full-text available
With the development of current computing technology, workflow applications have become more important in a variety of fields, including research, education, health care, and scientific experimentation. A group of tasks with complicated dependency relationships constitute the workflow applications. It can be difficult to create an acceptable execut...
Article
Due to the inherent variation across fog, cloud and end devices, task offloading and resource allocation have become complicated issues in a heterogeneous fog–cloud computing environment (HFCE). This study makes an effort to resolve the issue using two popular multi-criteria decision-making (MCDM) techniques, i.e. the analytic hierarchy process (AH...
Preprint
Full-text available
For a long time, anomaly detection is such a well topic. Its use in the banking industry has aided in the detection of questionable hacking activity. In the network of bitcoin, since all nodes are unlabeled, there is no proof that any particular transaction is the result of illegal activity, this thesis seeks to identify transactions that are unusu...
Article
Delay Tolerant Networks (DTNs) can enable communication in the challenging area where end-to-end connectivity does not exist between nodes. This magical characteristic of communication has fascinated researchers for invention. Major issues in DTNs are due to less opportunity to get connected with each other between nodes. Hence, delivery ratio is n...
Article
Vehicular delay tolerant networks (VDTNs) suffer due to insufficient connection opportunities in sparse infrastructure. The sparsity of the network results in poor delivery ratio (DR). Deployment of additional small nodes named throwbox increases the contact opportunities, resulting in improved performance in terms of DR. However, randomly deployed...
Chapter
Delay Tolerant Networks, the heterogeneous wireless network, are having the ability to enable communication in intermittent connectivity. But, the network suffers from poor performance due to low contact opportunity between nodes. Contact opportunity between nodes must be increased to improve the performance of the network. For that we can deploy s...
Preprint
Full-text available
The demand for a quick response from cloud services is rapidly increasing day-by-day. Fog computing is a trending solution to fulfil the demands. When integrated with the cloud, this technology can tremendously improve the performance. Like any other technology, Fog also has the shortcoming of limited resources. Efficient scheduling of tasks among...
Chapter
A delay-tolerant network (DTN) is one of the methods in computer network model that concerns about the cases where limited connectivity is available between nodes to exchange information. DTN uses store-carry-forward technique to enable communication in challenged networks. Authors have proposed multiple routing techniques based on social behaviour...
Preprint
Full-text available
Cloud Computing (CC) is the most popular tool of choice for conducting scientific experimentation on Cloud Servers (CDs). It can be even more efficient strategy to use Fog Computing (FC) for allocating and executing operations on Fog Devices (FDs). Complex scientific operations need the effective use of virtual machines (VMs). Scientific workflow s...
Conference Paper
With the development of a lot of delay-sensitive applications, it is very difficult to perform all the tasks locally because our devices have less computation power. Traditional cloud servers have a lot of computational power and storage, but they’re far away from IoT devices, so they use a lot of energy and take a long time to complete tasks. Loca...
Article
Delay Tolerant Network (DTN) is the decentralized wireless network that can enable to communicate without having end-to-end connectivity between nodes using store-carry-forward technique. We cannot use traditional routing techniques in DTN since it requires end-to-end connectivity between nodes. Earlier, authors have proposed many techniques for re...
Article
Full-text available
Vehicular delay‐tolerant networks (VDTNs) play prominent part in smart transportation and smart city paradigm to diminish the drivers' risk to meet accidents and offer many infotainment and entertainment services. All the operations are carried out by exchanging data among nodes. However, due to open communication nature of VDTN, the data broadcast...
Article
Delay-tolerant networks allow communication using store-carry-forward technique between source and destination nodes where no end-to-end connectivity exists. In case of network disconnection, messages get stored in a node and wait till the connection is restored, which could be forwarded to another node. To explore the possibility of improvement, m...
Article
Full-text available
Delay tolerant network (DTN) has attracted significant attention of the researchers due to its capability of delivering the message even in the situation where network connectivity is irregular. Irregular networks result in non‐delivery of data to user at right time, and the same is not possible with traditional algorithms due to requirement of end...
Article
The multi-hop Device-to-Device (M-D2D) communication has a potential to serve as a promising technology for upcoming 5G networks. The prominent reason is that the M-D2D communication has the potential to improve coverage, enhanced spectrum efficiency, better link quality, and energy-efficient communication. One of the major challenges for M-D2D com...
Preprint
Full-text available
Nowadays, wireless sensor network (WSN) improves people's lives by assisting them with a variety of applications. The major challenge in WSN is consumption of power as well as lifetime of the network. Clustering is the important method for saving energy in WSN because the separation of the sender and the receiver is related to transmission energy....
Article
Vehicular delay tolerant network (VDTN) technology uses vehicles on the road as moving nodes to deliver data from source to destination using several intermediate nodes. Efficient data dissemination in VDTN is a difficult problem due to existing trade-offs between several metric variables such as delivery ratio, delay, and overhead ratio. Inclusion...
Article
Full-text available
The routing in vehicular delay tolerant networks (VDTNs) does not presume an end-to-end connectivity from source to destination. One substitute is to use the real-time geographical information of vehicles to relay messages. However, if mobile destination is considered, then real-time information might not be generally available due to the sparse ne...
Chapter
Advanced agriculture system includes a method of allowing water to irrigate the roots of plant according to the soil moisture status and it takes care of the plant health by checking the leaf for disease detection. Agriculture is considered as a main source of income in our country because a majority of people are dependent on farming. From last fe...
Chapter
In rural areas an ambulance carrying a patient may require to connect with experts in a city. In rural areas it is not possible that network connectivity to the ambulance available all the time. In this type of situation concept of delay-tolerant networks may be utilized for the opportunistic connectivity with a person at distance. Delay-Tolerant N...
Article
Wireless Sensor Networks is a complex network with millions of small-scale sensor nodes, working together to detect certain physical phenomena. Sensor nodes are operated by battery therefore the major concern is energy efficiency. Clustering is an effective technique to decrease the energy depletion in the network. However, choosing the optimum Clu...
Chapter
In the vehicular delay-tolerant networks, (VDTN) association between the sources to the destination is not always achievable at any required period. Consequently, the carrier node saves the message in its intrinsic buffer until an opportunity occurs for forwarding. Fix nodes facilitate in message storage and message relaying. It also helps in impro...
Chapter
An azimuth tree-based network algorithm is proposed on a uniform random distribution of scattered points which is actually graph-based. In the proposed azimuth on a tree-based network, first tree is established through the algorithm for finding the weight function of the tree would constrain the number of points to be considered during azimuth rout...
Chapter
“Vehicular delay tolerant network (VDTN)” appears as a challenging network. VDTN is characterized by the unavailability of prior terminal path amidst the source and the destination nodes. Therefore, routing is one of the pivotal affair in such networks. To transmit a packet, VDTN uses a “store-carry-forward (SCF)” paradigm. The packets are stored i...
Article
Full-text available
Wireless sensor networks (WSNs) not only have become an essential technology in the current scenario but also has been established as a core technology for many applications, like the Internet of Things (IoT). The drawback of limited energy resources in WSN creates the challenge of designing an energy‐efficient network topology and routing path. As...
Article
Full-text available
Device-to-device (D2D) communication plays a significant role for the next generation networks i.e. (5G). The D2D communication leads to an efficient spectral utilization which results in a potential reduction in the overhead at the evolved node B side. However, without an efficient interference management scheme in place, cellular users experience...
Chapter
Communication is mainly the transfer of information or trading data so as the IOT is exchanging of anything with several things. A slight change in measuring the speed of an object is called motion. This paper is describing the relative study between various threshold techniques for motion identification to utilize the best suitable techniques betw...
Chapter
The topic model includes statistical modeling of unstructured data. The critical requirement for efficient topic model includes the removal of unrelated words that might lead to specious coexistence of the unrelated words infiltrating the topic models. To obtain a better quality of topic for the documents, pre-processing is an essential step to rem...
Article
Full-text available
Wireless sensor networks (WSN) encompasses millions of nodes that work jointly, senses environmental information, and transmits to the Base Station (BS). “Energy hole” or “hot‐spot” is a problem in which sensor nodes near to the BS deceasetoo early which creates the partitioning of the network. This is due to the reason of the difference in the con...
Article
Full-text available
The fundamental unit of the Internet of Things (IoT) is wireless sensor networks (WSNs). Due to their low cost and prospective use, WSNs have drawn interest in various applications over the last years. Since sensor nodes are equipped with limited battery, it is vital energy consumption be carefully monitored. Therefore, minimizing the node energy c...
Article
Full-text available
A wireless sensor network (WSN) is a prominent technology that could assist in the fourth industrial revolution. Sensor nodes present in the WSNs are functioned by a battery. It is impossible to recharge or replace the battery, hence energy is the most important resource of WSNs. Many techniques have been devised and used over the years to conserve...
Article
Full-text available
Delay Tolerant Networks finds its application in variety of environments and addresses issues like intermittent connection, long and variable delays and high latency. Vehicular Delay Tolerant Networks was introduced due to its various characteristic matches with DTNs. In particular class of VDTN there are two types of nodes: Stationary and Mobile n...
Article
Security is the utmost importance for the safe operation of the Internet of Things (IoT) devices. Behind IoT, a sensor network operates. Hence, security and lifetime extensions of the sensor networks are the primary concern. Node clustering is a technique to lengthen the lifetime of sensor networks. In a clustering technique, Cluster Heads (CH) are...
Article
Community question-answering (CQA) sites are popular as information-seeking platforms where users communicate to their peers. Security-related posts are gaining popularity with the rapid development of information technology in these sites and. CQA sites contains wide range of posts from classic cryptography to recently popular mobile security. Inv...
Chapter
The Delay Tolerant Network paradigm was proposed to address communication issues in challenged environments where no end-to-end connectivity exists. DTN is called Opportunistic Network as intermediate node always looks for the best opportunity to relay a message from source to destination. In Vehicular Delay Tolerant networks, some nodes follow a f...
Article
With the arrival of the internet of things and advancement in every front of technology, the field of the smart transportation system is becoming prevailing among the researchers. To avoid the problems in existing transportation systems and to provide better services and information to its users, smart transportation system can be used. This paper...
Chapter
As there is a continuous increase in number of vehicles in urban as well as rural areas, the congestion of vehicles is becoming a very big problem. Smart transportation systems are used to collect information about existing traffic on roads. Wireless sensor networks offer better performance and reduced cost when used in the smart transportation sys...
Chapter
The field of wireless sensor networks has witnessed an increasing traction among researchers in the erstwhile few decades. Since in large networks, sensors are not uniformly distributed; thus, a problem arises in low- and medium-density part of that large network which has a high probability of the packets getting stuck at a specific node due to th...
Article
Over the past few years, Vehicular Delay Tolerant Networks (VDTNs) have been exploited in those communications that do not take place through end-to-end connectivity. VDTNs framework is characterised by frequent disconnection, network partitioning, and high delay. A number of routing protocols have already been proposed for VDTN. These protocols ma...
Article
Delay Tolerant Networks (DTNs) enable communications where connectivity issues like intermittent and sparse connection, variable and long delay, high latency and even no end-to-end connectivity exist. Vehicular Delay Tolerant Networks (VDTNs) used the concept of DTNs where vehicles are used for data transmission. A specific class of VDTN considers...
Article
Full-text available
The 5G communication paradigm provides architecture of coexistence of device-to-device (D2D) communication with the current cellular communication. Direct D2D communication offloads the major traffic by enabling the localized communication between the users with the advantage of close proximity by reusing cellular resource block. However, direct D2...
Article
Community question answering (CQA) sites are the major platform for information sharing where posts are created by users as questions and answers. A large number of posts are created on a day-to-day basis, which raise the problem of information management of these sites. Multiple techniques are suggested in existing research for efficient managemen...
Article
Purpose Recently, with a high volume of users and user’s content in Community Question Answering (CQA) sites, the quality of answers provided by users has raised a big concern. Finding the expert users can be a method to address this problem, which aims to find the suitable users (answerers) who can provide high-quality relevant answers. The purpo...
Article
Device-centric architecture is an important aspect for fifth generation (5G) networks. The current cellular systems are base station-centric where the base-station (BS) is responsible for resource allocation. The BS allocates resources to users based on their channel state information (CSI) and feedback. This resource allocation process increases l...
Article
Present study indicates to improve network performances which use cross-layer approach. Application of transmission power control technique to dynamically adjust transmission power results in significant reduction of energy consumption. Along with this, a weight is calculated by considering ‘ED’, associated with each node to reduce control overhead...
Conference Paper
Wireless sensor networks (WSNs) is a rapidly growing technology. WSNs comprises of sensor nodes having limited energy as battery powers them. These batteries cannot be changed or recharged as they are operated in a harsh environment. Energy conservation mechanism should be developed. Through study, it is found that clustering is an approach for ach...
Article
A hybrid method is proposed to balance the energy consumption of the deployed sensors and that reduces energy holes near the sink by balancing the communication load in this paper. Hilbert Curve have been considered to optimize the network lifetime, a pre-clustering, clustering and sink mobility for fixed sensing points. The cluster heads are selec...
Conference Paper
Community Question Answering1 (CQA) sites allow users to share and exchange the knowledge on various fields. In recent years the CQA sites gain the huge popularity on the web. Searching the information is a very difficult task in CQA sites which is solved with the help of tags, but users assign the tags according to their knowledge. The CQA sites m...
Article
Full-text available
Wireless Sensor Networks (WSN) has the disadvantage of limited and non-rechargeable energy resource in WSN creates a challenge and led to development of various clustering and routing algorithms. The paper proposes an approach for improving network lifetime by using Particle swarm optimization based clustering and Harmony Search based routing in WS...
Article
Full-text available
The energy consumption in wireless sensor networks is a significant matter and there are many ways to conserve energy. The use of mobile sensors is of great relevance to minimize the total energy dissipation in communication and overhead control packets. In a WSN, sensor nodes deliver sensed data back to the sink via multi hopping. The sensor nodes...

Network

Cited By