Institution
National Institute of Technology, Karnataka
Education•Mangalore, Karnataka, India•
About: National Institute of Technology, Karnataka is a education organization based out in Mangalore, Karnataka, India. It is known for research contribution in the topics: Computer science & Corrosion. The organization has 5017 authors who have published 7057 publications receiving 70367 citations.
Topics: Computer science, Corrosion, Cloud computing, Microstructure, Alloy
Papers published on a yearly basis
Papers
More filters
••
TL;DR: Experimental results demonstrate that the proposed scheduling algorithm outperforms state-of-the-art benchmark algorithms in terms of Quality of Service (QoS) parameters (Reliability, Time and Cost) while executing the BoT in the heterogeneous cloud environment.
38 citations
••
TL;DR: The current study depicts that the PM10 and PM2.5 in ambient air of Mangalore region has 70% of its contribution from vehicular emissions (both exhaust and non-exhaust).
38 citations
••
TL;DR: An enhanced authentication scheme using chaotic maps is proposed, which has been discussed in this paper along with its cryptanalysis, which proves that the scheme is more robust and suitable for implementation.
Abstract: With the speedy progress in technology, the Internet has become a non-separable part of human life. It is obvious to use the Internet in all fields and medical field is no exception. The concept of establishing telecare medicine information systems(TMIS) for patients is gaining more popularity recently. To ensure the privacy of patients and to allow authorized access to remote medical servers, many authentication schemes have been proposed. Li et al., in 2016, proposed a secure dynamic identity and chaotic maps based user authentication and key agreement scheme. They claimed that the scheme is resistant to most of the known attacks. However, from thorough cryptanalysis, we have proved that their scheme is vulnerable to user impersonation attack, password guessing attack and server impersonation attack. We have also illustrated that their scheme does not provide user anonymity, convenient smart card revocation and security to session key. To overcome the aforementioned security weaknesses, we have proposed an enhanced authentication scheme using chaotic maps, which has been discussed in this paper along with its cryptanalysis. Cryptanalysis of the proposed scheme proves that the scheme is more robust and suitable for implementation.
38 citations
••
TL;DR: In this paper, an attempt made using taguchi method to analyze the squeeze cast process variables such as squeeze pressure, die and pouring temperature considering at three different levels using L 9 orthogonal array.
38 citations
••
TL;DR: The results suggest that these phenothiazine incorporated 1,2,3-triazole compounds are a promising class of molecular entities for the development of new antitubercular leads.
38 citations
Authors
Showing all 5100 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ajay Kumar | 53 | 809 | 12181 |
Bhiksha Raj | 51 | 359 | 13064 |
Alexander P. Lyubartsev | 49 | 184 | 9200 |
Vijay Nair | 47 | 425 | 10411 |
Sukumar Mishra | 44 | 405 | 7905 |
Arun M. Isloor | 38 | 261 | 6272 |
Vinay Kumaran | 36 | 262 | 4473 |
M. C. Ray | 30 | 115 | 2662 |
Airody Vasudeva Adhikari | 30 | 119 | 2832 |
Ian R. Lane | 27 | 129 | 2947 |
D. Krishna Bhat | 26 | 95 | 1715 |
Anurag Kumar | 26 | 126 | 2276 |
Soma Biswas | 25 | 127 | 2195 |
Chandan Kumar | 25 | 66 | 1806 |
H.S. Nagaraja | 23 | 90 | 1609 |