scispace - formally typeset
Search or ask a question
Author

Shailendra Mishra

Other affiliations: DIT University
Bio: Shailendra Mishra is an academic researcher from Majmaah University. The author has contributed to research in topics: Computer science & Routing protocol. The author has an hindex of 9, co-authored 62 publications receiving 375 citations. Previous affiliations of Shailendra Mishra include DIT University.


Papers
More filters
Journal ArticleDOI
TL;DR: Various possible applications of vehicular network, along with its features, and implementations in the real world are primarily categorized.
Abstract: The Vehicular Safety Consortium (VSC), the Crash-Avoidance Metrics Partnership (CAMP) consortium and the Vehicle Infrastructure Initiative (VII) [1] along with the giants of the light-duty vehicle manufactures, are working to develop pre-competitive safety technologies and various applications that can be offered in Vehicular ad-hoc Networks (VANETs), a special kind mobile ad-hoc networks where wireless equipped element called on-board unit (OBU) in vehicles form a network with the Roadside unit (RSU) without any additional infrastructure. In this paper, we are primarily categorizing various possible applications of vehicular network, along with its features, and implementations in the real world.

146 citations

Journal ArticleDOI
TL;DR: An analytic hierarchy process (AHP) inspired methodology is proposed for PQ assessment of distorted distribution power systems under the presence of renewable-based DGs and validates the efficacy of the presented approach in assessing the overall PQ performance of each of the buses and the entire DN.
Abstract: The proliferation of not only power electronics supported consumption technologies but also the expansion of the renewable-based distributed generation (DG) systems has given rise to severe power quality (PQ) phenomena in consort with the offered technical, economic and environmental benefits under deregulated environment. The forthcoming complexity of distribution power networks caused by incorporation of a large number of DG units in deregulated electricity market unquestionably makes PQ assessment procedure a quite cumbersome one. In present work, an analytic hierarchy process (AHP) inspired methodology is proposed for PQ assessment of distorted distribution power systems under the presence of renewable-based DGs. The proposed PQ assessment approach is based on formulating a unified power quality index (UPQI) for assessing the overall PQ performance of individual buses of the network along with the entire distribution network (DN) considered taking four PQ phenomena, viz. voltage harmonics, voltage sags, voltage unbalance and steady-state voltage profile at each bus into account. t. The application significance of the presented methodology is established by utilizing it on an IEEE 13 bus test distribution system modified through incorporating the nonlinear loads and DG systems based on three types of RES namely, photovoltaic (PV), wind and fuel cell, in MATLAB/Simulink environment. The results achieved validates the efficacy of the presented approach in assessing the overall PQ performance of each of the buses and the entire DN along with benchmarking it with respect to the threshold level of unity. Based on obtained results, also the comparative analysis is performed among PQ performances of DN with selected three RES based DGs. Moreover, the impact of the employing the custom power devices (CPDs) as well as excessive penetration level of renewable energy over PQ performance of distribution network, are also investigated by the application of the formulated index.

46 citations

Journal ArticleDOI
TL;DR: This paper aims to resolve issues and provide the countermeasures relating to security issues in clouds based web applications and observed most of the vulnerabilities identified during the scanning are related to security due to mis-configurations of web servers.
Abstract: The Cloud computing is a powerful tool to optimize the cost in terms of hardware, controllable, utility to sharing the data, due to abovementioned features most of the organization switching their applications and services on the cloud. Cloud services offer secure and scalable services, but there is always some security problem when data have transmitted from a central storage server to a different cloud, personal and private data commitment increase risk of data confidentiality, integrity, availability, and authentication before one choose a vendor in the cloud or choose the cloud and move services in the cloud. This paper aims to resolve issues and provide the countermeasures relating to security issues in clouds based web applications. The vulnerability scores, its impact on confidentiality, integrity, availability, access complexity, and risk on assets calculated, and it observed most of the vulnerabilities identified during the scanning are related to security due to mis-configurations of web servers. The results analyzed for the vulnerability scores, vulnerabilities impact on confidentiality, integrity, availability, access complexity, and risk are analyzed description, and risk assessment. The countermeasures for each vulnerability based on the experimental results discussed.

30 citations

Journal ArticleDOI
TL;DR: The key focus of this synthesize approach is to optimize the rule that generated by mining methodology and to provide more accurate results.
Abstract: Rule Mining technique that attempt to unearthing interesting pattern or relationship between data in large Database. Genetic Algorithm is a search heuristic which is used to generate useful solution for optimization and search problems. Genetic Algorithm based evaluation in Mining Technique is backbone for mining interesting Rule based on GA parameters like fitness function, Crossover Rate, Mutation Rate. The key focus of this synthesize approach is to optimize the rule that generated by mining methodology and to provide more accurate results. The Proposed Approach is to generate rules based on Quantitative dataset, using the concept of threshold - frequent item sets are define as initial population which the first step of Genetic algorithm. Crossover & mutation is applied to generate more combination of rule & can identify Co-occurrence of item sets.

26 citations

Journal ArticleDOI
TL;DR: An Under Water Density Based Clustered Sensor Network (UWDBCSN) scheme using heterogeneous sensors is proposed, found to be more energy efficient helps in extending the life time of underwater sensor networks.
Abstract: An underwater sensor network comprise of sensors and vehicles to perform numerous tasks. In underwater ad-hoc sensor network acoustic signals are transmitted through multi-hop sequence so as to save sensors' energy and to achieve longer life time. Re- charging batteries of deep water deployed sensors is practically not feasible. Clustering is the best strategy to achieve efficient multi-hopping, where cluster head is made responsible to collect local data and forward it to the sink. Cluster-head selection is the challenging job in a cluster, as it loses its energy in transmitting its own data and aggregated data, as compared to other sensors. In this paper we have proposed an Under Water Density Based Clustered Sensor Network (UWDBCSN) scheme using heterogeneous sensors. The scheme utilizes two types of sensors: one having high energy capacity, working as cluster head, having small quantity and other are ordinary sensors in huge quantity. Further cluster-head selection is based on node degree i.e. the density of the sensors in a region. The proposed scheme is found to be more energy efficient helps in extending the life time of underwater sensor networks.

23 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of the possibilities offered by connected functionalities on cars and the associated technological issues and problems is provided, as well as to enumerate the currently available hardware and software solutions and their main features.
Abstract: The connected car—a vehicle capable of accessing to the Internet, of communicating with smart devices as well as other cars and road infrastructures, and of collecting real-time data from multiple sources—is likely to play a fundamental role in the foreseeable Internet Of Things. In a context ruled by very strong competitive forces, a significant amount of car manufacturers and software and hardware developers have already embraced the challenge of providing innovative solutions for new-generation vehicles. Today’s cars are asked to relieve drivers from the most stressful operations needed for driving, providing them with interesting and updated entertainment functions. In the meantime, they have to comply with the increasingly stringent standards about safety and reliability. The aim of this article is to provide an overview of the possibilities offered by connected functionalities on cars and the associated technological issues and problems, as well as to enumerate the currently available hardware and software solutions and their main features.

230 citations

Journal ArticleDOI
TL;DR: A lightweight authentication protocol for RFID (Radio-Frequency Identification devices) has been proposed to overcome the drawbacks of existing solutions and to provide better performance in terms of low detection time, low CPU and memory consumption to strengthen the existing IoV environment.

188 citations

Journal ArticleDOI
TL;DR: A particle swarm optimization (PSO)-based fuzzy expert system for the diagnosis of coronary artery disease (CAD) based on the Cleveland and Hungarian Heart Disease datasets has yielded 93.27% classification accuracy.
Abstract: This paper presents a particle swarm optimization (PSO)-based fuzzy expert system for the diagnosis of coronary artery disease (CAD). The designed system is based on the Cleveland and Hungarian Heart Disease datasets. Since the datasets consist of many input attributes, decision tree (DT) was used to unravel the attributes that contribute towards the diagnosis. The output of the DT was converted into crisp if-then rules and then transformed into fuzzy rule base. PSO was employed to tune the fuzzy membership functions (MFs). Having applied the optimized MFs, the generated fuzzy expert system has yielded 93.27% classification accuracy. The major advantage of this approach is the ability to interpret the decisions made from the created fuzzy expert system, when compared with other approaches.

155 citations