Papers by Harinandan Tunga

Sustainability, 2020
The order assignment in the food delivery industry is of high complexity due to the uneven distri... more The order assignment in the food delivery industry is of high complexity due to the uneven distribution of order requirements and the large-scale optimization of workforce resources. The delivery performance of employees varies in different conditions, which further exacerbates the difficulty of order assignment optimization. In this research, a non-linear multi-objective optimization model is proposed with human factor considerations in terms of both deteriorating effect and learning effect, in order to acquire the optimal solutions in practice. The objectives comprised the minimization of the operational cost in multiple periods and the workload balancing among multiple employees. The proposed model is further transformed to a standardized mixed-integer linear model by the exploitation of linearization procedures and normalization operations. Numerical experiments show that the proposed model can be easily solved using commercial optimization softwares. The results indicate that t...
Efficacy analysis of NSGAII and multi-objective particle swarm optimization (MOPSO) in agent based weapon target assignment (WTA) model
International journal of information technology, Feb 5, 2024

Research Square (Research Square), Nov 28, 2023
An efficient online delivery system in the dynamic landscape is a challenging task. The challenge... more An efficient online delivery system in the dynamic landscape is a challenging task. The challenges occur due to the difficulty in generating a proper objective function that can represent theperformance of the delivery system. In this paper, we propose a novel multi-objective function that represents the utility score and time required in the delivery process. The utility score takes into consideration the number of previous orders given by a particular customer. The Time window methodology is used to achieve the two objectives. The multi-objective optimization functions are solved and compared using three multi-objective algorithms. They are Non-dominated sorting genetic algorithm-II (NSGA-II), strength Pareto evolutionary algorithm 2 (SPEA2), and indicator-based evolutionary algorithm (IBEA). The performances are compared extensively and it is found that SPEA2 gives better convergence performance. The proposed objective function minimizes the limitation of currently available methods for online delivery systems.
The paper aims at creating an authentication algorithm using visual cryptography that creates a f... more The paper aims at creating an authentication algorithm using visual cryptography that creates a foolproof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated. In our proposed mechanism we uses a lock and a key, both is one part of given secret image. Every lock-key pair has one associated unique image. The lock is just like a safe door which has a memory and that can be used to transmit and receive signals like the key. Another part of the mechanism is that the lock and the key can change the pixel distribution of the some parts of the secret image when unauthorized access is going on.

Journal of Decision Analytics and Intelligent Computing
Sensors play an important role in monitoring, detecting, recording and recording the physical and... more Sensors play an important role in monitoring, detecting, recording and recording the physical and environmental conditions of a particular place. These physical conditions mainly include temperature, sound, wind, etc. These nodes are connected to each other via a transmission channel and the nodes are battery-operated. So, energy efficient algorithms are needed to reduce energy consumption in the overall setup and increase the lifetime of sensor nodes. In this paper, we propose a method to solve the problem of routing in “Wireless Sensor Networks”, forming clusters such that there are minimal node transfers and the overall energy consumption of the system is reduced. We have implemented Multiple Objective Particle Swarm Optimization (MOPSO) algorithm to devise a technique that considers several parameters like temperature, minimal clustering, routing path distance and energy efficiency to obtain optimal clusters.
A Method of Fully Autonomous Driving in Self‐Driving Cars Based on Machine Learning and Deep Learning
Intelligent Multi‐modal Data Processing, 2021

In this paper, we have presented an efficient non-blocking coordinated check pointing algorithm f... more In this paper, we have presented an efficient non-blocking coordinated check pointing algorithm for distributed systems. It produces a consistent set of checkpoints, without the overhead of taking temporary checkpoints; the algorithm also makes sure that only few processes are required to take checkpoints in its any execution; it uses very few control messages and the participating processes are interrupted fewer number of times when compared to some noted related works. The two most important criteria are non-blocking and minimum number of checkpoints. Cao-Singhal showed in their algorithm that it is impossible to design minimum process non-blocking algorithm but it is not desirable in mobile environment that underlying computation will be blocked whenever a check pointing algorithm invoked. If the check pointing scheme is blocking then the performance of the system will be highly affected by the frequent initiation of check pointing algorithm. We must try to minimize the blocking ...

Graphical User Authentication Techniques for Security: a Comparative Study
Nowadays, user authentication is one of the important topics in information security. Strong te x... more Nowadays, user authentication is one of the important topics in information security. Strong te xt-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their owners to write them down o n papers or even save them in a computer file. Graphical Use r Authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember i mages better than text. In recent years, many networks, co mputer systems and Internet based environments try used gr aphical authentication technique for their user’s authentic ation. All of graphical passwords have two different aspects which a re usability and security. Different techniques for GU A have been proposed in literature over the past few years such asRecognition Based Technique[2], Recall Based Techniqu e[2]. This paper presents a survey of comparative study b etween ...

This paper elaborates polybit shuffling encryption and decryption algorithm based on N Dimensiona... more This paper elaborates polybit shuffling encryption and decryption algorithm based on N Dimensional encryption-decryption matrix which is an attempt to improve over the Classical Playfair Cipher. The unique feature of this algorithm is that it retains the simplicity of Classical Playfair Cipher but increases the robustness against crypto-attack by many folds. Moreover this algorithm can be used on any type of files as it is capable of encrypting binary files because this algorithm, instead of using characters, uses chunks of several bits or bytes to represent data values. The proposed polybit encryption and decryption algorithm uses an N-Dimensional encryption-decryption matrix. The encryption-decryption matrix is first filled up by the keywords (passwords) and then by the rest of the possible chunk values. Encryption is done on N number of chunk values as a block thereby ensuring higher level of encryption and security. Encryption is done by choosing a linear transformation function...
The paper aims at creating an authentication algorithm using visual cryptography that creates a f... more The paper aims at creating an authentication algorithm using visual cryptography that creates a fool-proof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated. In our proposed mechanism we uses a lock and a ...

The Influence of Food Bloggers toward Consumer's Attitude in Restaurant Selection: A Multi-objective Metaheuristic Approach
An analytical approach for a restaurant recommendation system that uses a food blogger ratings an... more An analytical approach for a restaurant recommendation system that uses a food blogger ratings and the cost of food items in the restaurant is proposed by maximizing the restaurant rating and minimizing the overall cost. We construct a multi-objective optimization problem to get restaurant recommendations appropriate for the customer's budget and desired rating. Three evolutionary optimization algorithms, namely Nondominated Sorting Genetic algorithm II (NSGA II), Strength Pareto Evolutionary Algorithm 2 (SPEA 2), and Indicator-Based Evolution Algorithm (IBEA) have been used to identify approximated Pareto solutions for our proposed model. The effectiveness of the algorithms under consideration is given and evaluated against several performance indicators. Using Zomato restaurant data, we compare the results in terms of convergence and diversity, which confirms our suggestion for standardization. The suggested work contributes to an analytical approach based on evolutionary algo...

Intrinsic Profit Maximization of the Offloading Tasks for Mobile Edge Computing with Fixed Memory Capacities and Low Latency Constraints Using Ant Colony Optimization
Mathematical Modelling of Engineering Problems
Artificial intelligence and the Internet of Things (IoT) have resulted in more computationally de... more Artificial intelligence and the Internet of Things (IoT) have resulted in more computationally demanding and time-sensitive applications. Given the limited processing power of current mobile computers, there is a need for on-demand computing resources with minimal latency. Edge computing has already made a significant contribution to mobile networks, enabling the distribution, scaling, and faster access of computational resources at network margins closer to users, especially in power-constrained mobile devices. Offloading tasks efficiently on the Mobile Edge Computing Server (MECS) is an important part of our proposed method. We propose a method of offloading multiple tasks for Mobile Edge Computing servers that require fixed memory capacities and low latency. We calculate the optimum cumulative intrinsic profit of the number of offloaded tasks efficiently using the Ant Colony Optimization (ACO) model, which is flexible and versatile in the context of real-time applications.
Hybrid Algorithm Based on DWT-DCT-RSA with Digital Watermarking for Secure Image Transfer
A Method for Solving Bi-Objective Green Vehicle Routing Problem (G-VRP) through Genetic Algorithm
Journal of the Association of Engineers, India

International Journal of Computer Applications, 2014
Cryptography is an art and science of achieving security by encoding the message to make them non... more Cryptography is an art and science of achieving security by encoding the message to make them non-readable. Extended Visual Cryptography is a type of cryptography which encodes a number of images in the way that when the images on transparencies are stacked together, the hidden message appears without a trace of original images. The decryption is done directly by the human visual system(HVS) with no special cryptographic calculations. We present a system which takes three pictures as an input and generates two images which correspond to two of the three input pictures. The third picture is reconstructed by printing the two output images onto transparencies and stacking them together. Generally, visual cryptography suffers from the deterioration of the image quality. This paper also describes the method to improve the quality of the output images.
International Journal of Computer Applications, 2014
This paper is about encryption and decryption of text using a secret password provided by the use... more This paper is about encryption and decryption of text using a secret password provided by the user. The encryption machine takes the password and source message as input and generates acipher text based on Modified Playfair Algorithm using dynamic rectangular matrix. The decryption machine takes the same password and the cipher text generated by the encryption engine as input to produce the original message. It also checks if the input is valid and blocks the user when an invalid input is provided. In this paper the entire program will be simulated by using an PHP application.

International Journal of Computer Applications, 2012
Energy consumption is one of the most important performance metrics for wireless ad hoc networks ... more Energy consumption is one of the most important performance metrics for wireless ad hoc networks because it directly relates to the operational lifetime of the network. Based on this thought, in this article we will establish an ad-hoc network where the power consumption during transmission can be controlled. To minimize the total energy consumption, we have adopted a simple network layer/routing model that serves as a benchmark for performance evaluation. Herein we have worked with the mesh topology, and each nodes of the network are substituted using directional antenna. The four directional antennas are used to represent each node. When a node needs to send information to others it only enables its particular sector or sectors through which it is connected to those nodes. We have also replaced the nodes in the network with sectors and found that the total energy consumed by the network is much less. We devised an algorithm to find the average dominating set without varying the radius of the network. Also, we found the minimum dominating set within a graph by varying the number of nodes only i.e. the density of the graphs. After establishing our own set of algorithm to find the minimum dominating set in a network, it is compared with Dai & Wu's Algorithm .We believe by using such a generic model, with special added advantages, we will succeed in meeting our goal.

Omics : a journal of integrative biology, 2013
The human Wnt signaling pathway contains 57 genes communicating among themselves by 70 experiment... more The human Wnt signaling pathway contains 57 genes communicating among themselves by 70 experimentally established associations, as given in the KEGG/PATHWAY database. It is responsible for a variety of crucial biological functions such as regulation of cell fate determination, proliferation, differentiation, migration, and apoptosis. Abnormal behavior of its members causes numerous types of human cancers, dramatic changes in bone mass density that lead to diseases such as osteoporosis-pseudo-glioma syndrome, Van-Buchem disease, skeletal malformation, autosomal dominant sclerosteosis, and osteoporosis type I syndromes. So far, single genes have been investigated for their disease-causing properties, and single diseases have been traced backwards to discover foul-play of the system pathways. Differential expression of the whole genome has been mapped by microarray. But how all the genes involved in a pathway affect each other in single/multiple disease state(s) and whether the presenc...
Uploads
Papers by Harinandan Tunga