Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Iti Saha Misra is active.

Publication


Featured researches published by Iti Saha Misra.


Progress in Electromagnetics Research C | 2008

Improved Adaptive Bacteria Foraging Algorithm in Optimization of Antenna Array for Faster Convergence

Tanumay Datta; Iti Saha Misra; Biswa Binayak Mangaraj; Sk Imtiaj

This paper proposes an improved adaptive approach involving Bacterial Foraging Algorithm (BFA) to optimize both the amplitude and phase of the weights of a linear array of antennas for maximum array factor at any desired direction and nulls in specific directions. The Bacteria Foraging Algorithm is made adaptive using principle of adaptive delta modulation. To show the improvement in making the algorithm adaptive, results for both adaptive and nonadaptive algorithms are given. It is found that Adaptive Bacteria Foraging Algorithm (ABFA) is capable of improving the speed of convergence as well as the precision in the desired result.


global communications conference | 2008

Bandwidth and Delay Guaranteed Call Admission Control Scheme for QOS Provisioning in IEEE 802.16e Mobile WiMAX

Suresh Kalikivayi; Iti Saha Misra; Kalpana Saha

An efficient Call Admission Control (CAC) scheme for IEEE 802.16e Mobile WiMAX that satisfies both bandwidth and delay guarantee to the admitted connections has been proposed in this paper. The proposed CAC scheme provides higher priority to Handoff connections, because it is more annoying to drop an ongoing connection than blocking a newly originated connection. Also UGS connections are given higher priority because UGS is the most common service used by the people for communication in everyday life. An analytical model is developed to evaluate the performance of the CAC scheme. The proposed CAC scheme is compared with two other existing CAC schemes proposed in literatures. Numerical results show that the proposed CAC scheme could be the better choice forAn efficient Call Admission Control (CAC) scheme for IEEE 802.16e Mobile WiMAX that satisfies both bandwidth and delay guarantAn efficient call admission control (CAC) scheme for IEEE 802.16e Mobile WiMAX that satisfies both bandwidth and delay guarantee to the admitted connections has been proposed in this paper. The proposed CAC scheme provides higher priority to handoff connections, because it is more annoying to drop an ongoing connection than blocking a newly originated connection. Also UGS connections are given higher priority because UGS is the most common service used by the people for communication in everyday life. An analytical model is developed to evaluate the performance of the CAC scheme. The proposed CAC scheme is compared with two other existing CAC schemes proposed in literatures. Numerical results show that the proposed CAC scheme could be the better choice for admission control in terms of blocking and dropping probabilities of the connections and bandwidth utilization of the system.


Progress in Electromagnetics Research-pier | 2006

DESIGN, ANALYSIS AND OPTIMIZATION OF V-DIPOLE AND ITS THREE-ELEMENT YAGI-UDA ARRAY

Iti Saha Misra; Rajat Subhra Chakrabarty; Biswa Binayak Mangaraj

This paper presents an optimum design technique ofan asymmetric V-dipole antenna and its a three-element Yagi-Uda array using Genetic Algorithm (GA). The optimization parameter for the V-dipole is the directivity and that for the Yagi-Uda array are the input impedance and directivity. The theoretical analysis has been done using a Moment-Method technique in a very simple step-by-step way, and subsequently the GA is applied for obtaining the optimized parameters. Comparative results are provided for 3-elements straight dipole Yagi and V-dipole Yagi array. Further, analysis for directivity with respect to included angle is given for the GA based optimization problem that gives an important aspect in the design ofV-Yagi.


International Journal of Communication Systems | 2011

Performance study of mobile WiMAX network with changing scenarios under different modulation and coding

Suman Sankar Bhunia; Iti Saha Misra; Salil Kumar Sanyal; Anindita Kundu

WiMAX—the Worldwide Interoperability for Microwave Access is a promising technology for offering high-speed data, video and multimedia services over mobile platform evolving toward all IP networks. The increasing demand of WiMAX for VoIP and high-speed multimedia is due to the simplicity of installation and cost reduction compared with the traditional wired DSL cable. The challenges to service providers lie with the Quality of Service (QoS) under varying fading environment while at the same time maximizing for resource utilization. In this paper, a rigorous and comprehensive performance study of mobile WiMAX has been made with respect to adaptive modulation and coding techniques considering the variation in the speed of the mobile, path-loss, scheduling services and application type for comparing with the fixed type of modulations. The OPNET 14.5.A modeler for WiMAX platform has been used as simulator for adaptation at the physical layer of the transmission in WiMAX OFDMA structure. Observation reveals that dynamic adaptation of modulation and coding schemes based on channel condition enables better QoS while consuming low overall bandwidth of the system. Copyright


vehicular technology conference | 2006

An Approach for Optimal Hierarchical Mobility, Management Network Architecture

Iti Saha Misra; Mohuya Chakraborty; Debashis Saha; Amitava Mukherjee

The focus of this paper is to get the optimal hierarchical mobility management solution for next generation wireless IP-based networks. Hierarchical architectures prove advantageous in minimizing signaling overhead by limiting registration signaling locally. Our ultimate goal is to find the optimum hierarchy level, which should provide best performance in terms of networks parameters like signaling overhead, handoff latency and frequency of location updates. For this purpose an n-tiered architecture has been considered and optimality test on the number of tiers has been performed through analytical and ns-2 based simulation results. From the performance evaluation it is seen that time-bandwidth product is minimum for three-tiered network architecture leading as the optimal solution


IEEE Transactions on Antennas and Propagation | 1998

Study of impedance and radiation properties of a concentric microstrip triangular-ring antenna and its modeling techniques using FDTD method

Iti Saha Misra; S. K. Chowdhury

A concentric microstrip triangular-ring antenna structure using the log-periodic principle for increasing the impedance bandwidth of the microstrip patch antenna is described. The finite-difference time-domain (FDTD) method is applied to analyze the proposed structure. A special technique to model the slanted metallic boundaries of the triangular ring has been used in the general FDTD algorithm to avoid the staircase approximation. The method improves the accuracy of the original FDTD algorithm without increasing the complexity. The radiation patterns at different frequencies over a wide bandwidth are obtained experimentally.


IEEE Antennas and Propagation Magazine | 2009

A Comparative Study of Optimization Techniques in Adaptive Antenna Array Processing: The Bacteria-Foraging Algorithm and Particle-Swarm Optimization

Tanumay Datta; Iti Saha Misra

This paper presents a comparative study between the Bacteria-Foraging (BF) and Particle-Swarm Optimization (PSO) algorithms, and their application to the antenna-array optimization problem. The performance of the Bacteria-Foraging Algorithm is studied by varying its different parameters in beamforming and null-steering problems. Null steering along with sidelobe suppression is also done for various degrees of complexity. A generic cost function is developed, the parameters of which can be controlled to meet the requirements of the particular application. The two algorithms are compared for null depth, average sidelobe level, and rate of convergence for different numbers of interference signals. The performance of these methods are compared for output noise power for the same noise inputs. Results are shown for a linear dipole antenna-array system.


communication systems and networks | 2011

Study of enhanced VoIP performance under congested wireless network scenarios

Atri Mukhopadhyay; Tamal Chakraborty; Suman Sankar Bhunia; Iti Saha Misra; Salil Kumar Sanyal

Stringent QoS maintenance in a wireless environment for VoIP communication is a major challenge. VoIP inherently generates constant bit rate traffic and is highly sensitive to network delay. However, unpredictable network congestion makes a VoIP session so degraded that its QoS goes below a tolerable limit. Accordingly, a suitable solution is needed to adapt varying network conditions satisfying minimum QoS while maintaining transparency to the end user. We have extensively studied the effect of variable voice packet payload size with changing number of voice sample frames in the payload of the RTP packets. For this, we have used OPNET Modeler 14.5.A to observe the performance in terms of MOS, End-to-end delay through extensive simulations. Results are provided with valid discussions. Based on the observation, we propose an Adaptive VoIP (AdVoIP) algorithm that may be used in any real life VoIP network for further enhancement of the performance. The adaptive algorithm may use RTCP Receiver Reports to assess the network conditions in real wireless scenarios.


computer and information technology | 2010

Optimization technique for configuring IEEE 802.11b access point parameters to improve VoIP performance

Tamal Chakraborty; Atri Mukhopadhyay; Iti Saha Misra; Salil Kumar Sanyal

The performance of wireless LANs is greatly affected by path loss, RF interference and other sources of signal attenuation in addition to network congestion. The primary factors involved in effective real-time communication, namely delay and loss, must be within certain controlled limits in such a scenario. In this paper, we analyze the various factors driving IEEE 802.11b access points through extensive simulations and thereafter develop an optimization technique to configure the parameters of the Access Point. We simulate our test bed scenario and apply the developed algorithm. Finally, we implement the configured parameters in our testbed to provide optimum Voice over IP (VoIP) performance. Simulation and measured results have been included.


international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011

Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis

Avijit Sahana; Iti Saha Misra

Application of Wireless sensor network (WSN) is increasing in a rapid speed. As sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that security concern be addressed from the beginning of the system. But sensor networks also introduce severe resource constraints due to their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor network. There has to be some compromise between the security and the energy. Asymmetric protocol like RSA has not been implemented due to high power constrain and for memory issue. In this paper, we have shown that RSA can be implemented for sensor in an efficient manner by using optimized computation. We have simulated the protocol in NS2.34 platform. The energy requirement gives an optimistic result quite similar to symmetric protocol energy requirement for sensor.

Collaboration


Dive into the Iti Saha Misra's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nitul Dutta

Sikkim Manipal University

View shared research outputs
Top Co-Authors

Avatar

Biswa Binayak Mangaraj

Veer Surendra Sai University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge