Sarmistha Neogy

Orcid: 0000-0003-1497-671X

According to our database1, Sarmistha Neogy authored at least 63 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A cross-layer fragmentation approach to video streaming over mobile ad-hoc network using BATMAN-Adv.
Multim. Tools Appl., March, 2024

Designing a Meta Learning Classifier for Sensor-Enabled Healthcare Applications.
SN Comput. Sci., January, 2024

A novel two phase data sensitivity based access control framework for healthcare data.
Multim. Tools Appl., January, 2024

2023
Optimum Node Deployment Policy (ONDP) for WSN: Trade-off Between Maximization of Area Coverage and Lifetime.
Wirel. Pers. Commun., November, 2023

Multi-objective Based Route Selection Approach Using AOMDV in MANET.
SN Comput. Sci., September, 2023

A hybrid tuple selection pipeline for smartphone based Human Activity Recognition.
Expert Syst. Appl., May, 2023

FABEL: feature association based ensemble learning for positioning in indoor environment.
Multim. Tools Appl., February, 2023

An efficient swarm based technique for securing MANET transmission.
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023

2022
FDRF: Fault Detection and Recovery Framework for Seamless Data Transmission in Remote Health Monitoring Using WBAN.
Wirel. Pers. Commun., 2022

Adaptive Cross-Layer Routing Protocol for Optimizing Energy Harvesting Time in WSN.
Wirel. Pers. Commun., 2022

An Optimized Fuzzy Clustering Algorithm for Wireless Sensor Networks.
Wirel. Pers. Commun., 2022

Concat_CNN: A Model to Detect COVID-19 from Chest X-ray Images with Deep Learning.
SN Comput. Sci., 2022

Privacy-Preserving Healthcare Data Modeling Based on Sensitivity and Utility.
SN Comput. Sci., 2022

MLIDS: Machine Learning Enabled Intrusion Detection System for Health Monitoring Framework Using BA-WSN.
Int. J. Wirel. Inf. Networks, 2022

A novel feature based ensemble learning model for indoor localization of smartphone users.
Eng. Appl. Artif. Intell., 2022

Survey on inertial sensor-based ILS for smartphone users.
CCF Trans. Pervasive Comput. Interact., 2022

Framework for Remote Device Localization and Application Level Visualization for Emergency Service Providers.
Proceedings of the MobileHCI '22: Adjunct Publication of the 24th International Conference on Human-Computer Interaction with Mobile Devices and Services, Vancouver, BC, Canada, 28 September 2022, 2022

2021
Comparison of Different Multi-hop Algorithms to Improve the Efficiency of LEACH Protocol.
Wirel. Pers. Commun., 2021

Information-theoretic approach for secure localization against sybil attack in wireless sensor network.
J. Ambient Intell. Humaniz. Comput., 2021

2020
Performance analysis of an efficient object-based schema oriented data storage system handling health data.
Innov. Syst. Softw. Eng., 2020

Dynamic Relay Selection using a Greedy Cluster Strategy.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN.
IEEE Syst. J., 2019

M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes.
IEEE Syst. J., 2019

A survey of issues and solutions of health data management systems.
Innov. Syst. Softw. Eng., 2019

Designing secure and reliable mobile agent based system for reliable MANET.
Int. J. Ad Hoc Ubiquitous Comput., 2019

Fuzzy Logic-Based Range-Free Localization for Wireless Sensor Networks in Agriculture.
Proceedings of the Advanced Computing and Systems for Security, 2019

2018
Intrusion Detection at International Borders and Large Military Barracks with Multi-sink Wireless Sensor Networks: An Energy Efficient Solution.
Wirel. Pers. Commun., 2018

Novel Algorithms for Reliability Evaluation of Remotely Deployed Wireless Sensor Networks.
Wirel. Pers. Commun., 2018

Accessing Data in Healthcare Application.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Cost Based Model for Secure Health Care Data Retrieval.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

2017
On Regulating Lifetime of a 3-sink Wireless Sensor Network Deployed for Precision Agriculture.
Int. J. Next Gener. Comput., 2017

An Asymmetric Key Based Efficient Authentication Mechanism for Proxy Mobile IPv6 Networks.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Information security: course.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Internet of things (IoT): a survey on architecture, enabling technologies, applications and challenges.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Designing a Secure Data Retrieval Strategy Using NoSQL Database.
Proceedings of the Distributed Computing and Internet Technology, 2017

2016
A cloud security framework for a data centric WSN application.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Object based schema oriented data storage system for supporting heterogeneous data.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Crash failure immune offloading framework.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
Checkpointing with Minimal Recover in Adhocnet based TMR.
CoRR, 2015

Developing a secure remote patient monitoring system.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Security management in Wireless Sensor Networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

KPS: A Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

2014
Improved recovery probability of mobile hosts using energy and mobility-based secure checkpointing-recovery.
Int. J. Trust. Manag. Comput. Commun., 2014

A study on efficient path selection algorithms for propagating data messages with a goal of optimising energy dissipation in WSN.
Int. J. Sens. Networks, 2014

An Enhanced Protocol for Bluetooth Scatternet Formation and Routing.
Int. J. Adv. Pervasive Ubiquitous Comput., 2014

Effect of Source Selection, Deployment Pattern, and Data Forwarding Technique on the Lifetime of Data Aggregating Multi-sink Wireless Sensor Network.
Proceedings of the Applied Computation and Security Systems - ACSS 2014, 2014

2013
Reliability Modeling of Embedded Nodes in Real Time Wireless Systems.
Int. J. Embed. Real Time Commun. Syst., 2013

Improving recovery probability of mobile hosts using secure checkpointing.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Reliability of mobile agent system in QoS mobile network.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in WSN.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Reliability of Mobile Agents for Reliable Service Discovery Protocol in MANET
CoRR, 2011

A handoff based checkpointing and failure recovery scheme in mobile computing system.
Proceedings of the 2011 International Conference on Information Networking, 2011

Reliability Estimation of Delay Tolerant QoS Mobile Agent System in MANET.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

Mobile Agent Security Based on Trust Model in MANET.
Proceedings of the Advances in Computing and Communications, 2011

Secured Fault Tolerant Mobile Computing.
Proceedings of the Advances in Computing and Communications, 2011

Secure checkpointing using public key cryptography in mobile computing.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2009
Locating mobile nodes using heuristics with fuzzy logic handoff.
Int. J. Artif. Intell. Soft Comput., 2009

2007
A Consistent Checkpointing-Recovery Protocol for Minimal Number of Nodes in Mobile Computing System.
Proceedings of the High Performance Computing, 2007

WTMR-A New Fault Tolerance Technique for Wireless and Mobile Computing Systems.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

TPRLM: Time-based Probabilistic Relational Location Management Scheme for Wireless Cellular Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2002
Distributed Checkpointing Using Synchronized Clocks.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Checkpoint Processing in Distributed Systems Software Using Synchronized Clocks.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001


  Loading...