Saroj Kumar Lenka
Mody University of Science & Technology
SteganographyAlgorithmImage (mathematics)Precision agricultureData miningEngineeringQuantum cryptographyEncryptionArtificial intelligencePixelCryptographyPattern recognitionCipherComputer visionMathematicsComputer securityComputer scienceLeast significant bitArtificial neural networkFuzzy logicTheoretical computer scienceCiphertext
48Publications
13H-index
447Citations
Publications 48
Newest
#1Ambarish G. Mohapatra (Silicon Institute of Technology)H-Index: 7
#2Saroj Kumar LenkaH-Index: 13
Last. Bright Keswani (Gyanvihar University)H-Index: 4
view all 3 authors...
The efficiency and uniformity of irrigation can be maintained from the complex and diverse information based systems by considering weather, soil, water, and crop data. The model is created by suitable decision support system (DSS) algorithm. The DSS model acquires real-time soil and environmental data using our wireless sensor network mechanism. A radial basis function type of neural network is performed to predict hourly soil moisture content (MC) requirement as well as required soil evapotran...
16 CitationsSource
#1Ambarish G. Mohapatra (Gyanvihar University)H-Index: 7
#2Bright Keswani (Gyanvihar University)H-Index: 4
Last. Saroj Kumar LenkaH-Index: 13
view all 3 authors...
Agriculture is a basic and most important profession of any country as it balances the food requirement and also the essential raw materials of industry. In the similar sense, the adaptation of implementing smart technology in agriculture practices needs to be focused on better land productivity. The fertilizer and manure should be precisely applied during agriculture practice throughout the countryside with the use of digital technologies. This motivates us to develop a reactive web application...
7 CitationsSource
Purpose Quantum key distribution (QKD) is a technology, based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems, to generate and distribute provably secure cipher keys over unsecured channels. The authors are using this concept of QKD for the online banking systems. The paper aims to discuss these issues. Design/methodology/approach In order to function properly, any system using QKD needs to transport both quantum and classical data from a...
Source
#1Sourabh Singh Verma (Mody University of Science & Technology)H-Index: 3
#2R. B. PatelH-Index: 15
Last. Saroj Kumar Lenka (Mody University of Science & Technology)H-Index: 13
view all 3 authors...
Mobile ad-hoc networks (MANET) are vulnerable to various types of attacks, which can hinder the performance of network. In this paper, we have projected in what way request flooding effects on the performance of real data flow considering nodes flooding with variable flooding rates, while real flow have stringent requirements. We also proposed a solution named 'real flow dynamic queue (RFDQ)' which is evaluated against priority queue in ns2 with extensive evaluation and results. It is noticed in...
4 CitationsSource
#1Ambarish G. Mohapatra (Silicon Institute of Technology)H-Index: 7
#2Saroj Kumar LenkaH-Index: 13
A feed forward neural network and fuzzy logic-based hybrid smart decision support system (DSS) for crop specific irrigation notification and control in precision agriculture (PA) is proposed in this paper. This proposed neuro-fuzzy smart DSS can be implemented in any farm land, green-house and poly-house for efficient irrigation management and control for PA. A feed forward neural network is trained and linear regression is performed to predict soil moisture content (MC) in hourly basis. The pre...
3 CitationsSource
#1Mamta Jain (Mody University of Science & Technology)H-Index: 6
#2Saroj Kumar Lenka (Mody University of Science & Technology)H-Index: 13
Last. Sunil Kumar Vasistha (Mody University of Science & Technology)H-Index: 1
view all 3 authors...
Summary The major objective of the article is to supply the novel and efficient methodology of digital image steganography that describes individuality regarding secret transmission using the adaptive circular queue least significant bits (LSBs) substitution. The data structure queue is employed dynamically in resource distribution between multiple communication recipients and once secret information transmitted asynchronously. Here, RSA cryptosystem is employed for secret information confidenti...
12 CitationsSource
In this paper, a partial least square regression PLSR and fuzzy-logic based smart decision support system DSS for crop-specific irrigation notification and control in precision agriculture is proposed, and this can be implemented in farm land, green-house and poly-house. The proposed DSS model continuously acquires real-time soil and environmental data using Zigbee wireless sensor network WSN with WiFi gateway developed during this work. The collected data are used to predict hourly soil moistur...
7 CitationsSource
Apr 1, 2016 in BIS (Business Information Systems)
#1Anand Sharma (Mody University of Science & Technology)H-Index: 7
#2Saroj Kumar Lenka (Mody University of Science & Technology)H-Index: 13
Online banking is a new industry which allows people to interact with their banking accounts via the internet from virtually anywhere in the world. In this system, a strong security system is used but sometimes it is not so much effective. Security of the overall online banking system is reduced to that of the classical approach used for authentication, which could be merely computationally secure rather than unconditionally secure. Thus, for the authentication purpose the concept of quantum cry...
1 CitationsSource
#1Saroj Kumar Lenka (Mody University of Science & Technology)H-Index: 13
#2B.B. Choudhury (Indira Gandhi Institute of Technology)H-Index: 6
Last. Sasmita Nayak (Techno India)
view all 3 authors...
Purpose: Development of industrial robots and its usage by different manufacturing industries in lot many diverse applications is a very much serious task for the selection of robots. As a consequence, the selection process of the robot becomes incredibly complicated for the potential users because they have a large set of attributes and parameters of the robots are available at their disposal. Moreover, the proposed work gives the efficient decision for the selection of the robots to the potent...
Source
#1Mamta Jain (Mody University of Science & Technology)H-Index: 6
#2Saroj Kumar Lenka (Mody University of Science & Technology)H-Index: 13
The main purpose of this work is to provide a novel and efficient method to the image steganography area of research in the field of biomedical, so that the security can be given to the very precious and confidential sensitive data of the patient and at the same time with the implication of the highly reliable algorithms will explode the high security to the precious brain information from the intruders. The patient information such as patient medical records with personal identification informa...
10 CitationsSource