Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Satyananda Champati Rai is active.

Publication


Featured researches published by Satyananda Champati Rai.


Int'l J. of Communications, Network and System Sciences | 2010

A Multi-Objective QoS Optimization with Fuzzy Based Parameter Setting for Real-Time Multicasting

Satyananda Champati Rai; Bijan Bihari Misra; Ajit Kumar Nayak; Rajib Mall; Sateesh Kumar Pradhan

We propose a multi-objective Pareto-optimal technique using Genetic Algorithm (GA) for group communication, which determines a min-cost multicast tree satisfying end-to-end delay, jitter, packet loss rate and blocking probability constraints. The model incorporates a fuzzy-based selection technique for initialization of QoS parameter values at each instance of multicasting. The simulation results show that the proposed algorithm satisfies on-demand QoS requirements (like high availability, good load balancing and fault-tolerance) made by the hosts in varying topology and bursty data traffic in multimedia communication networks.


computer and information technology | 2015

MERA: A Multi-clustered Energy Efficient Routing Algorithm in WSN

Samaleswari Pr. Nayak; Satyananda Champati Rai; Sateesh Kumar Pradhan

A synchronized network time is always necessary for scheduling to achieve energy efficiency, data fusion, localization for WSN applications. The major limitation in a WSN is the battery usage and lifetime of the nodes. Due to the power restriction of nodes, efficient routing is very important to save the battery of sensors to enhance the lifetime of the sensor area. The multi-head chain concept is responsible for maximization of network duration. Thus, an algorithm hace been proposed for efficient multi clustered Energy efficient routing protocol (MERA) a multiple-neighbor prototype with minimization of distance control mechanism to obtain almost maximum energy utilisation of WSNs. As the automatic movement of node is steered by energy, there is a need to confine this movement within boundaries and the trajectory of different nodes should be fixed. In our technique, the sink is kept fix and data transfer with aggregation at different nodes guarantee complete data collection. In our algorithm as per the capacity of mobile nodes We ultimately have performed various instance of experiments to find the performance of the cluster chain leader (CCL)where each CCL communicate to its nearest CCL and finally to the sink. The results says that the proposed finding is nearly optimal and also better than PEGASIS with respect various features.


computer and information technology | 2016

Critique of Some Fine-Grained Access Control Models in Cloud Computing Environment

Kasturi Dhal; Prasant Kumar Pattnaik; Satyananda Champati Rai

Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the service providers are changing their server storage to cloud storage. It is a great challenge for the service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy preservation and data security is an area of concern. In general the cloud servers are being deployed on different trusted domain by different data owner. There will be need to encrypt sensitive data and store them in cloud server and disclose decryption key to authorized users. But drawback of this method is that owner of file can selectively share data by sharing his private key. Most of the computation for key distribution and management are done by the data owner. T here are various fine-grained access control models for sharing of encrypted data on cloud server. Some of these model used key policy Attribute Based Encryption (KP-ABE) and others used Cipher text Policy Attribute Based Encryption (CP-ABE). These techniques can be used to keep shared data confidential even if data is stored on remote server. These models are used to define and enforcing access control policy based on attributes and delegates most of the computation task involved in fine grained access control without disclosing data to storage server. This paper under takes critical study on available access control approaches that has been deployed in cloud computing environment.


computer and information technology | 2016

Efficient Attribute Revocation Scheme for Multi-authority Attribute Cloud Storage System

Kasturi Dhal; Prasant Kumar Pattnaik; Satyananda Champati Rai

Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the organization are changing their storage server to cloud server without any botheration. It is a great challenge for the cloud service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy preservation and data security is an area of concern. In general the cloud servers are being deployed on different trusted domain. Fine grained access control is major area of concern in data outsourcing and sharing in untrusted cloud server. There will be need to encrypt sensitive data and store them in cloud server and disclose decryption key to authorized users. But drawback of this method is that owner of file has to know receivers prior to encryption which is not possible in most of the case. Cipher text Policy Attribute Based Encryption (CPABE) is one of the technique that is used for fine grained access control in untrusted server. This techniques used to keep shared data confidential even if data is stored on remote server. It uses trusted authority to issue attribute and distribute key to users in the system. There can be multiple authority in a CPABE system and each authority issue attributes and keys independent of each other. Efficient decryption and attribute revocation is major area of research in multi authority cloud storage system. Attribute revocation in multi authority cloud storage system should achieve both forward and backward security.


Archive | 2016

Computer Network Simulation Using NS2

Ajit Kumar Nayak; Satyananda Champati Rai; Rajib Mall


International Journal of Intelligent Systems and Applications | 2018

Intelligent Scheduling of Demand Side Energy Usage in Smart Grid Using a Metaheuristic Approach

Nilima R. Das; Satyananda Champati Rai; Ajit Kumar Nayak


Archive | 2016

Wireless Network Simulation

Ajit Kumar Nayak; Satyananda Champati Rai; Rajib Mall


Archive | 2016

Basics of Protocol Simulation Using Ns2

Ajit Kumar Nayak; Satyananda Champati Rai; Rajib Mall


Archive | 2016

Network Programming Using Socket Api

Ajit Kumar Nayak; Satyananda Champati Rai; Rajib Mall


Archive | 2016

Introduction to NS2

Ajit Kumar Nayak; Satyananda Champati Rai; Rajib Mall

Collaboration


Dive into the Satyananda Champati Rai's collaboration.

Top Co-Authors

Avatar

Ajit Kumar Nayak

Siksha O Anusandhan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rajib Mall

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Samaleswari Pr. Nayak

Silicon Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge