We propose a healthcare system that would allow ubiquitous monitoring of patient's health continuously across the clock. This system thrives on advanced wireless communication technology with body sensor nodes as active participants. These nodes are mounted on a patient's body, sense physical stimulations, and subsequently transform the same into digital readings. Such wireless body sensor networks (WBANs) are capable of providing remote health monitoring in a ubiquitous manner.
The flexibility and availability of such healthcare can be increased if it can be provisioned as an on-demand service to patients. Therefore, we envision to acquire and analyze in real-time the physiological data from multiple WBANs integrated with a cloud framework to provide immediate, on-demand medical support through seamless, location independent procedures. The raw health data concerning a patient's health are transmitted to a cloud of healthcare service providers through a middleware. Health data analytics are continuously executed on the raw data to detect any unusual health condition. Detection of irregularity, if any, is notified immediately to the concerned patient. The healthcare teams also analyze the causative factors behind the abnormality and provide some valuable medical suggestions and feedbacks to the respective patients via the middleware.
Considering the existing problems of ehealthcare services, the following objectives is proposed in this project.
The developed Web portal in this project is as follows:
1. Pradyumna Kumar Bishoyi (Pursuing PhD)
2. Niloy Saha (Pursuing MS)
May, 2014 - May, 2017.
Patent Filed :
1. S. Sarkar, S. Chatterjee, S. Misra, E. A. Ansari, D. Ghatak, S. Sarkar, “A Privacy-Aware Ambulatory Healthcare System Using Wireless Body Area Networks (WBANs)”, Indian Patent, File no.: 201631000214, January, 2016.
Over the past decade, India has witnessed a growing scarcity of and competition for water among different users (domestic, municipal, industrial, and environmental purposes). To meet the water demands of other users and to ensure food security of growing population, irrigated agriculture is under severe pressure to use water more efficiently to produce more per drop while protecting the environment. Efficient irrigation water management requires precise information on irrigation demand in near real-time. WSNs are being increasingly used for monitoring root zone soil water status, weather conditions, and nutrient status. These parameters can help in efficient water and nutrient management. However, the presently available soil moisture sensors and WSNs are mostly imported, and they do not provide flexibility in their programming. To avoid these problems and for massive adaptation of this technology by Indian farmers, it is necessary to develop low-cost WSNs, which are useful for agricultural applications.
Objective of the Project:
The developed Web portal in this project is as follows:
March, 2014 – March, 2017.
Unsustainable exploitation of surface and groundwater resources for irrigation with inefficient management practices has resulted in alarming groundwater depletion in many agriculture-dominated watersheds/regions across India. Improved agricultural productivity via increased efficiency in farm practices, choice of crops, and improved irrigation practices are needed to ensure food and fresh water security for growing population. Furthermore, climate variability (episodic droughts and heat waves) and climate change may further increase irrigation water demands while reducing crop yields in future. We aim to address the two grand challenges identified by the Strategy Formulation Meeting (SFM) of the Information Technology Research Academy (ITRA): 1) technological solutions to water quantity and quality issues, and 2) groundwater quality and quantity management.
Considering the existing problems of Agricultural Productivity, the following objectives is proposed in this project.
March, 2013 - March, 2017.
1. T. Ojha, S. Misra, N. S. Raghuwanshi, "Wireless Sensor Networks for Agriculture: The State-of-the-Art in Practice and Future Challenges", Computers and Electronics in Agriculture, vol. 118, pp. 66-84, 2015.[Featured as one of the most downloaded article in this journal]
1. T. Ojha, S. Bera, S. Misra, and N. S. Raghuwanshi, "Dynamic Duty Scheduling for Green Sensor-Cloud Applications," in Proc. IEEE CloudCom, pp. 841-846, Singapore, December 2014.
Research analysis manifest clear trends of growing interest of the Computer Science students towards e-learning. To keep this trend as well as the pace with the rapid advancement of software technologies the "Software Engineering Virtual Lab" has been developed. This lab attempts to provide basic concepts to the students on a wide range of topics including Requirements analysis, ER modeling, identification of domain classes, use-case diagrams, designing a test suite. Ample illustrations and simulations are used to reinforce ones understanding. Once concepts are clear, a set of exercises given on the concerned topics would help the students to evaluate themselves and their progress of learning. The main focus is to enable the students to interact with the "virtual" teacher in an effective and efficient manner compared to how they would do in a real lab on the subject.
1. Barun Saha (Pursuing PhD)
2. Tuhin Chakroborty (MS Awarded)
May, 2010 - Mrach, 2017.
Research analysis manifest clear trends of growing interest of the Computer Science students towards e-learning. To keep this trend as well as the pace with the rapid advancement of software technologies the "Advanced Network Technologies Virtual Lab" has been developed. This lab expose students to various advanced topics including Wi-Fi, WiMAX, MANET, WSN, and encourages them to work on related problems in a partially constrained environment. Apart from providing detailed theory on each topic, each "virtual" experiment in the lab has a set of exercises to be solved using remote network simulations. Network Simulator 2 (ns2) and Network Simulator 3 (ns3) have been used for this purpose.
This virtual lab also offer benefits such as reduced software and hardware costs for setting up an actual advanced network technology lab, improved learning by interactive visualization, and self-learning advanced network technologies in the absence of a real-life instructor. Additionally, the students can learn at their own pace any time and from any place which has a PC with high speed Internet connectivity.
May, 2010 - March 2017.
1. B. K. Saha, S. Misra, and M. S. Obaidat, "A web-based integrated environment for simulation and analysis with NS-2," IEEE Wireless Communications, vol. 20,
no. 4, pp.109--115, August 2013. (Feature article)
1. B. Pati, S. Misra, B. K. Saha, "Advanced network technologies virtual lab: a human-computer interface for performing experiments on wireless sensor networks," in Proc. 2012 4th International Conference on Intelligent Human Computer Interaction (IHCI), Kharagpur, India, pp. 1--4, December 2012.
Implementation of certificate based infrastructures like PKI is computationally expensive and its practicality associates many potential difficulties due to the complexity in framework. Use of this type of framework in defence applications to safeguard the confidential data to ensure Authenticity, Integrity, and Non-Repudiation is very difficult. It is an expensive solution as it involves cost to deploy a third party mediator. PKI can also be a security risk in case the private key is compromised. Regular seeking of revocation list leads to flooding, transaction delays and power consumption. Digital signatures have been proposed as an effective solution for non-repudiation in electronic transactions such as e-tendering and e-filing of income tax returns and e-commerce solutions throughout the world. However, while integrating with PKI, several factors arise in our mind, which pulls back the implementation of PKI.
Using an Identity based cryptosystems removes the need of certificates and the complexities of certificate management, their storage and distribution, and revocation strategies. The naming problems that exist in PKI are not solved simply by using an identity based cryptosystem. Designing this type of cryptosystem is not an easy exercise as there is no straight mapping mechanism to turn a public key cryptosystem into an identity based cryptosystem.
Considering the existing problems in the frameworks for security, the following objectives are proposed in this project.
1.Samaresh Bera (Pursuing PhD) 2.Sumana Maiti (Pursuing PhD) 3.Aishwariya Chakraborty (Pursuing MS) 4.Prajnamaya Dass (Pursuing PhD)
March, 2015 - March, 2018.
The development of highly flexible and intelligent networks, which offers large amounts of bandwidth-on-demand, is required for broadband communications over dynamically changing networks. This will enable the delivery of multimedia communications instantly and transparently anytime and anywhere. WASN, which have relatively recently gained popularity due to reasons such as their infrastructure-less setup and administration, ease and low-cost of deployment, have the potential to significantly contribute to this goal. Ad hoc networks are of different types – mobile ad hoc networks (MANETs) have mobile nodes, ad hoc wireless sensor networks (WSN), in which the nodes are sensors capable of sensing various environmental information and other events around them. The sensor networks can also have either stationary or mobile nodes in them.
In typical WASN, especially in MANETs, there is a cooperative engagement of nodes with potential for continuous change in infrastructures, without the requirement for the presence of centralized network managers, access points, fixed base stations, or a backbone network for controlling the network management functions. They do not possess designated routers for making routing decisions. All nodes in such networks take part in routing by acting as routers for one another. However, several hops are normally needed in such networks for transmission of data from one node to another because of the limited wireless transmission range of operation of the mobile nodes.
The above-mentioned characteristics of WASN, particularly those arising due to the mobility of nodes (if any), and the potential for continuously changing network infrastructures in the absence of centralized network managers and access points, pose several challenges. It is typical that the routes that were once considered to be the "best", may no longer remain the same at a later time instant. This, therefore, requires a continuous re-computation of routes, and there is no permanent convergence to a fixed set of routes in such networks. This makes it challenging to learn the optimum set of routes. So, any routing protocol that needs to operate in WASN network environments should take these issues into consideration.
1. Judhistir Mahapatro (PhD Awarded)
2. Nabiul Islam (PhD Awarded)
2010 - 2013.
North-East Region has significant coal reserves and geological conditions are conducive for underground coal gasiﬁcation (UCG). Due to very difficult geo-mining conditions, the exploration of these reserves faces acute problems. The mining constraints are mainlyinconsistent seam structure, high inclination, gassiness, weak strata, proneness to self heating,poor slope stability, high and prolonged rain fall, soil erosion and environmental degradation etc.
The UCG is a promising technology as it is a combination of mining, exploitation and gasiﬁcation. The main motivation for moving toward UCG as the future coal utilizing technique is the environmental and other advantages (low cost method, no surface disposal of ash and coal tailings, include increased worker safety, low water consumption low methane emission to atmosphere etc.) over the conventional mining process.
Considering the existing problems of underground coal mines, the following objectives is proposed in this project.
June, 2011 - 2014.
Under the surface of water, networks of sensors can be used for different applications such as submarine monitoring, oil exploration, seismic monitoring and ocean mapping. Data acquisition scheme for those applications using underwater sensor networks (UWSNs) faces many challenges due to dynamic behavior of aquatic environment and acoustic communication. These behaviors include the varying levels of salinity, temperature and pressure under the surface of water, large and variable propagation delay, node mobility due to underwater current, frequent loss of connection among the nodes, very less bandwidth for communication, ambient noise of marine life, and error prone communication medium. Therefore, in this project we have scoped down our work to the investigation of the following issues.
Two simulators are developed in this project. These are as follows:
March, 2010 - February, 2013
1. S. Misra, T. Ojha, A. Mondal, "Game-theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks", IEEE Transactions on Mobile Computing (Accepted on July 6, 2014).
2. A. Mandal, S. Misra, M. K. Dash, T. Ojha, "Performance Analysis of Distributed Underwater Wireless Acoustic Sensor Networks Systems in the Presence of Internal Solitons", International Journal of Communication Systems (Wiley) (Accepted on July 5, 2014).
3. M. Khatua and S. Misra, "CURD: Controllable reactive jamming detection in underwater sensor networks", Pervasive and Mobile Computing (Elsevier),Vol. 13, pp. 203–220, 2014.
4. T. Ojha, M. Khatua, and S. Misra, "Tic-Tac-Toe-Arch: A Self-organizing Virtual Architecture for Underwater Sensor Networks", IET Wireless Sensor Systems, 2013.
5. S. Misra, S. Dash, M. Khatua, A. V. Vasilakos, and M. S. Obaidat, "Jamming in Underwater Sensor Networks: Detection and Mitigation," IET Communications, 2012, (Accepted for publication).
1. A. K. Mandal, S. Misra, and M. K. Dash, "Effect of near-surface bubble plumes on acoustics signal used in UWACNs", In proceedings of IEEE IWCMC, Cagliari, Italy, July 2013.
2. A. K. Mandal, S. Misra, and M. K. Dash, "Stochastic modeling of internal wave induced acoustic signal fluctuation and performance evaluation of shallow UWANs", In proceedings of ICC SCPA, Budapest, Hungary, June 2013.
3. T. Ojha, and S. Misra, "HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor Networks", In proceedings of QShine, Noida, India, January 2013.
4. M. Khatua and S. Misra, "Exploiting Partial-Packet Information for Reactive Jamming Detection: Studies in UWSN Environment", In proceedings ICDCN, TIFR, Mumbai, January 3-6, 2013.
5. S. Misra and M. Khatua, "Cross-Layer Techniques and Applications in Wireless Sensor Networks", In H. F. Rashvand and Y. S. Kavian (Eds.), Using Cross-Layer Techniques for Communication Systems, pp. 94-119, 2012, USA, IGI Global.
6. S. Misra and A. Ghosh, "The Effects of Variable Sound Speed on Localization in Underwater Sensor Networks", In proceedings ATNAC, Australia, Nov. 9-11, 2011.
Book or book Chapter :
1. S. Misra and M. Khatua, "Cross-Layer Techniques and Applications in Wireless Sensor Networks", In H. F. Rashvand and Y. S. Kavian (Eds.), Using Cross-Layer Techniques for Communication Systems, pp.94-119, 2012, USA, IGI Global.
Wireless Sensor Networks (WSNs) find many real life applications including target tracking for different purposes such as surveillances, wild life tracking and military applications. The problem of target tracking is fundamentally concerned with keeping a track on the movement of a target and its location within the field at different intervals of time. One of the fundamental requirements from such a WSN deployed for target tracking is to have efficient cooperation and collaboration among the different sensor nodes. In real life it may happen so that some nodes fail to do so, either intentionally or non-intentionally. It is, therefore, a challenging task to identify such misbehaving nodes and take proper decisions even in their presence. Target tracking over a given region could involve two broad scenarios: (a) Tracking a single target and (b) Tracking multiple targets at the same time. The problems in either scenario become even more challenging when the realism of the presence of misbehaving nodes is seeded into these problems. The objectives of the project are as follows:
December, 2011 - Juanuary, 2014.