Papers by Paramartha Dutta
Communications in computer and information science, 2017
Quantum-Dot Cellular Automata (QCA) is a well accepted for the next generation computer technolog... more Quantum-Dot Cellular Automata (QCA) is a well accepted for the next generation computer technology as it is capable of overcoming certain technical limitations of existing CMOS technology. We have designed the Gray code counter using two-dot one-electron QCA. As the Set-Reset flipflop is the building block of the Gray code counter, we also designed the Set-Reset flipflop. Computing the potential energies we have substantiated and analyzed the proposed design and calculated the energy and power related parameters. We have also compared our work with the four-dot two-electron QCA architecture and found that the proposed designs are superior to the existing ones in terms of space utilization, energy and power dissipation.

Journal of Information and Optimization Sciences
Abstract In mobile ad-hoc networks, traditional multi-path routing techniques elect multiple good... more Abstract In mobile ad-hoc networks, traditional multi-path routing techniques elect multiple good paths based on metrics like hop count, delay, or energy consumption, and are not suitable for multipath scenario, especially when the data transmission is supposed to take place simultaneously through all the selected paths. The present multi-path routing protocol EMR-PL estimates the life of routes depending upon the energy-oriented lifespan and velocity-oriented lifespan of links. Among all the discovered routes, the collection consuming minimum energy and having required lifespan is elected for communication. To the best of authors’ knowledge, the present article is the first one to focus on the single nodemulti-path problem and give solution to it. The data transfer is multi-track that is, all the routes belonging to the selected collection, simultaneously forward data packets. The protocol performance is evaluated in terms of data packet delivery ratio, message cost, average node lifetime, consumed energy and end-to-end delay.

2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2017
Mobile ad hoc networks (MANETs) is an infrastructure less network where topology is very dynamic ... more Mobile ad hoc networks (MANETs) is an infrastructure less network where topology is very dynamic and nodes are energy constrained. Therefore, scheduling for data packets transfer is very important. We can classify all the data packets into two categories — real time and non-real time. Scheduling of non-real time data packets should be different from real time data packet. Here timely delivery is not an important criterion to be met. The main intention here is to reduce the number of route request messages, as much as possible, through the scheduling policy. Therefore, high priorities are given to those packets which are travelling along fragile paths compared to those traveling along the stable paths. Moreover, when a communication session is on the verge of completion, its packets should be forwarded urgently. This scheduling algorithm FSNRP is designed to consider all these factors. The performance improvement it produces is very significant compared to other scheduling protocols.
Encyclopedia of Renewable and Sustainable Materials, 2020

Communications in Computer and Information Science, 2019
Cloud computing is an idea of diminution-based distributional model which depends on appropriate ... more Cloud computing is an idea of diminution-based distributional model which depends on appropriate protocol over the internet. To meet the end user requirement here the resources like CPU, bandwidth and memory are provisioned and un-provisioned dynamically via an internet. To provide large scale computing infrastructure, these resources need to be scaled up and down dynamically on demand of the users in very flexible manner. The last decade records an aggressive growth in internet that is the reason cloud computing get a solid platform to expand its era. Though, it has a glorious future ahead but needs to resolve some problem. Load balancing is one of them. Load balancing is a mechanism to detect under loaded and overloaded node and distribute the load to balance them. To maintain the Quality of Service (QoS) cloud service provider (CSP) must have to satisfy the end users request on time for resources. For this reason, service providers must have to select a proper node that may complete user's task in between the deadline. So, providers must have to distribute a dynamic workload evenly across multiple nodes which ensure that no nodes are overloaded or under loaded which helps to reduce the average response time. It can be thought as an optimization problem and should have some adapting strategy to the changing needs. In this paper we propose a novel load balancing strategy to search under loaded node to balance load from overloaded one. Experimental results are really very encouraging of the sample application which is simulated by CloudAnalyst and the results of the proposed strategy are compared and outperformed the traditional strategy like First Come First Serve (FCFS), Round Robin (RR), local search algorithm like Stochastic Hill Climbing (SHC) and Genetic Algorithm (GA).
2013 3rd IEEE International Advance Computing Conference (IACC), 2013
A mobile ad hoc network is an infrastructure less network where the nodes can move freely in any ... more A mobile ad hoc network is an infrastructure less network where the nodes can move freely in any direction. Since the nodes have limited battery power, energy efficient route discovery mechanisms are critical for proper performance of this kind of networks. Experience-based Energy-efficient Routing Protocol (EXERP) [1] is one such protocol that intelligently addresses this issue and it requires two caches, namely, history cache (H-cache) and packet cache (P-cache). These two caches are dependent upon one another. In this article, we propose a fuzzy controlled cache management (FCM) technique for EXERP in ad hoc networks. Simulation results establish that the proposed scheme achieves a high hit ratio at low complexity than other cache management schemes.
Intelligence Enabled Research, 2020
Mobile ad hoc networks largely suffer from the constraint of battery power. A node continuously s... more Mobile ad hoc networks largely suffer from the constraint of battery power. A node continuously senses the information about the network by sending the HELLO packet and receiving the Acknowledgment packet. It consumes huge energy that affects each node based on battery power. This article proposed an optimized HELLO devoid version of the FAIR protocol that intelligently reduces the requirement of continuous HELLO packets, and as a result, provides huge energy preservation that leads to significant performance improvement in terms of energy consumption, lifetime of network, end-to-end delay, and network throughput.
In civilian data communication using mobile ad hoc networks (MANETs), all mobile nodes cannot be ... more In civilian data communication using mobile ad hoc networks (MANETs), all mobile nodes cannot be of homogeneous type and these nodes do not do one specific job or communication. Therefore, cooperation among these nodes is a big issue, which is very essential to successfully run a MANET for this type of data communication. Denial of service and malicious behavior of a node are the main obstacles to a secure and successful communication in this type of a network. This scheme proposed a generic idea to avoid and prevent selfish behavior of a node as well as encourage to increase cooperation among nodes by the cluster head using a single-hop clustering strategy.

Mobile Ad hoc Networks (MANETs) is rapidly gaining popularity due to its infrastructureless and s... more Mobile Ad hoc Networks (MANETs) is rapidly gaining popularity due to its infrastructureless and self-configured capabilities. In MANETs, a group of nodes make a network where every node, individually can play sender, receiver or router and the communication is either single hop or multi-hops. So, scheduling is an important part to this kind of network for either route discovery or data packet transfer within this network. All scheduling algorithms in MANETs are either packet scheduling in term of QoS or MAC access. Packet scheduling algorithm is more important than MAC access. Packets are also two types, control packet which are used for route establishment and data packet. Scheduling algorithms can be priority based or non-priority based. We can broadly classify the entire scheduling schemes into two types: Non-real-time scheduling or Real-time scheduling. This paper makes a survey of all kind of scheduling algorithms in Mobile Ad hoc Networks in chronological order with classifica...
ArXiv, 2019
The mobile ad hoc network (MANET) is a wireless network based on a group of mobile nodes without ... more The mobile ad hoc network (MANET) is a wireless network based on a group of mobile nodes without any centralised infrastructure. In civilian data communication, all nodes cannot be homogeneous-type and not do a specific data communication. Therefore, node co-operation and cheat-proof are essential characteristics for successfully running MANETs in civilian data communication. Denial of service and malicious behaviour of the node are the main concerns in securing successful communication in MANETs. This scheme proposed a generic solution to preventing malicious behaviour of the node by the cluster head through the single hop node clustering strategy.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 2021
This book chapter proposes use of Ant Colony Optimization (ACO), a novel computational intelligen... more This book chapter proposes use of Ant Colony Optimization (ACO), a novel computational intelligence technique for balancing loads of virtual machine in cloud computing. Computational intelligence(CI), includes study of designing bio-inspired artificial agents for finding out probable optimal solution. So the central goal of CI can be said as, basic understanding of the principal, which helps to mimic intelligent behavior from the nature for artifact systems. Basic strands of ACO is to design an intelligent multi-agent systems imputed by the collective behavior of ants. From the perspective of operation research, it's a meta-heuristic. Cloud computing is a one of the emerging technology. It's enables applications to run on virtualized resources over the distributed environment. Despite these still some problems need to be take care, which includes load balancing. The proposed algorithm tries to balance loads and optimize the response time by distributing dynamic workload in t...
Expert Systems with Applications, 2020
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Wireless Personal Communications, 2019
Nodes in ad hoc networks are mostly mobile, moving with arbitrary velocity and direction. Therefo... more Nodes in ad hoc networks are mostly mobile, moving with arbitrary velocity and direction. Therefore, it is always beneficial if nodes are equipped with alternative paths to successors. The present article proposes both energy and velocity based (together called weight based) tree multicast protocol where not only the relative velocity of nodes, but also their expected residual lifetime contribute in computing acceptability of a path from a multicast sender to a multicast receiver. Experimental results confirm superiority of the proposed scheme over existing state-of-the-art multicast protocols, in terms of data packet delivery ratio, multicast route lifetime, control message overhead and end-to-end delay.

International Journal of Information Technology, 2018
A mobile ad hoc network (MANET) is formed when group of mobile wireless nodes collaborate between... more A mobile ad hoc network (MANET) is formed when group of mobile wireless nodes collaborate between them to communicate through wireless links in the absence of the fixed infrastructure and any centralized control. These characteristics make it able to adapt and operate in difficult conditions. It is vital to keep the topology stable as long as possible. An effective clustering scheme renders longer cluster lifetime and incurs low maintenance overhead. However, the mobility of nodes adversely affects the hierarchical structure. Therefore, electing nodes with small relative velocity with respect to it's 1-hop downlink neighbors or cluster members, for the role of cluster head is a preferred option that makes the clusters more stable. In the proposed scheme FESC, we present a relatively stable clustering scheme by considering more powerful however less mobile (w.r.t. the cluster members) nodes as cluster heads. The cluster heads can themselves estimate the competency value of the cluster. If it is small enough, then it advises the nodes with other cluster options to join some better clusters so that they don't arbitrarily join and leave available clusters. The simulation analysis confirms that our scheme delivers more stable clusters with low maintenance effort.

International Journal of Information Technology, 2018
To reduce energy consumption, nodes in ad hoc networks generally move according to a pre-establis... more To reduce energy consumption, nodes in ad hoc networks generally move according to a pre-established schedule of network traffic and movement patterns of uplink and downlink neighbors. While some of them may go to sleep at times, one suitable alternative is to remain in active mode in order to bridge the gap between the uplink and downlink neighbors of the sleeping node. The main challenge of selecting which node should stay in active mode and which node should go to sleep, stem from the need to conserve energy while maintaining communication. Proactive topology management protocols identify redundant nodes that may power off the radios. Such protocols are independent of network traffic and incur backbone maintenance cost even when the network is idle. MGMT is a movement guided topology management scheme that suggests movements of nodes so that, for a given communication link, transmitter and receiver may come closer without hampering their links with other nodes i.e. respective uplink and downlink neighbors. Moreover, MGMT works based on the schedule in which packets are forwarded to the downlink neighbors of a node. It is energy efficient in the sense that it always concentrates on gaining radio-frequency energy at the cost of some kinetic energy which is at most half of the gained radio-frequency energy. Through extensive simulation, we demonstrate that MGMT achieves huge energy conservation while maintaining efficient communication.

International Journal of Convergence Computing, 2016
Quantum-dot cellular automata (QCA) is a post-CMOS upcoming technology in the nanotechnology doma... more Quantum-dot cellular automata (QCA) is a post-CMOS upcoming technology in the nanotechnology domain. Design of different QCA-based circuits is on the top agenda of research community to overcome the limitations of CMOS counterpart in respect of off-state leakage current, energy and power efficiency, and minimum dimension requirement of fabrication. Accordingly, in the present scope, we are trying to explore a design and analysis of a two-dot one-electron QCA-based circuit for ripple carry adder. In course of our detailed description of our article, we have tried to justify the effectiveness of the QCA-based circuit in comparison to CMOS-based counterpart. Our analysis includes derivation of energy and power requirement for such a two-dimensional two-dot one-electron QCA circuit-related issues. Moreover, it will be evident that the proposed architecture is compact if the cells used are square in shape.

Microsystem Technologies, 2017
Quantum-dot cellular automata (QCA) appeared as an alternative nanotechnology which is capable of... more Quantum-dot cellular automata (QCA) appeared as an alternative nanotechnology which is capable of overcoming the shortfalls of the existing CMOS technologies. This energy efficient technology has a few structural variants such as the 4-dot 2-electron (4:2) QCA variant, the 2-dot 1-electron (2:1) QCA variant. The former one is vastly researched. In this present scope the later one i.e. the 2:1 variant is the one which has a lot to be explored. This article presents design strategy of half adder and full adder using the half adders that have been proposed. Both the designs are reversible by nature. An independent design has been proposed which incorporates only 44 number of cells. All the said designs are implemented using the 2:1 variant of QCA. Further the designs are supposed to give a high quotient of energy efiiciency as it reduces the energy requirement to 84% as well as dissipation of energy upto 90%. Consequently the proposed independent full adder design is used to develop an arithmetic circuit which contains four such full adder units.
Indian Journal of Science and Technology, 2016
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient techniqu... more Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.

Indian Journal of Science and Technology, 2016
In ad hoc networks, the scheduling of route-request packets should be different from that of mess... more In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during transmission of message packets the location of the destination is known whereas in route discovery this is not known in most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets in particular that greatly reduces the average delay in route discovery in ad hoc networks.
Uploads
Papers by Paramartha Dutta