scispace - formally typeset
C

Chandrashekhar Meshram

Researcher at Government Post Graduate College

Publications -  51
Citations -  513

Chandrashekhar Meshram is an academic researcher from Government Post Graduate College. The author has contributed to research in topics: Key (cryptography) & Random oracle. The author has an hindex of 9, co-authored 51 publications receiving 207 citations. Previous affiliations of Chandrashekhar Meshram include Barkatullah University & Rani Durgavati University.

Papers
More filters
Journal ArticleDOI

Application of Artificial Neural Networks, Support Vector Machine and Multiple Model-ANN to Sediment Yield Prediction

TL;DR: The main aim of the present work is to develop four machine learning models, artificial neural networks (ANNs), radial basis function (RBF), support vector machine (SVM) and multiple model (MM)-ANNs for forecasting daily sediment yield.
Journal ArticleDOI

Fractional chaotic maps based short signature scheme under human-centered IoT environments.

TL;DR: In this paper, the authors proposed a short signature scheme using fractional chaotic maps (FCM) for secure communication in IoT-based smart devices, the security of which is closely related to a random oracle based on FCM assumption.
Journal ArticleDOI

Iterative classifier optimizer-based pace regression and random forest hybrid models for suspended sediment load prediction.

TL;DR: Novel integrative intelligence models coupled with iterative classifier optimizer (ICO) algorithm are proposed to compute suspended sediment load in Simga station in Seonath river basin, Chhattisgarh State, India and are found to be more precise than their stand-alone counterparts of RF and PR.
Journal ArticleDOI

Multicriteria Decision Making Taxonomy of Cloud-Based Global Software Development Motivators

TL;DR: The findings of the study provide the prioritization-based taxonomy of the investigated motivators that assists the software organizations to develop and revise their strategies for the successful implementation of CGSD.
Journal ArticleDOI

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

TL;DR: A forward-secure identity-based encryption technique based on subtree for fuzzy user data sharing under cloud computing environment is proposed and it is demonstrated that the technique is semantically secure against a chosen subtree and chosen ciphertext attack (IND-CST–CCA).