Institution
National Institute of Technology, Karnataka
Education•Mangalore, Karnataka, India•
About: National Institute of Technology, Karnataka is a education organization based out in Mangalore, Karnataka, India. It is known for research contribution in the topics: Corrosion & Cloud computing. The organization has 5017 authors who have published 7057 publications receiving 70367 citations.
Topics: Corrosion, Cloud computing, Microstructure, Alloy, Heat transfer
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, a thermal activity monitor III (TAM III) was used under various isothermal conditions to obtain the thermokinetics parameters of reaction mechanisms and the rich behavioral patterns of these autocatalytic reactions were revealed through multiple specific illustrations.
29 citations
••
TL;DR: In this article, an analytical investigation carried out on free vibration characteristics of functionally graded graphene reinforced nanocomposite (FG-GRC) plate under different non-uniform edge loads is presented.
Abstract: An analytical investigation carried out on free vibration characteristics of functionally graded graphene reinforced nanocomposite (FG-GRC) plate under different non-uniform edge loads is presented. Graphene nano-platelets (GPLs) are homogeneously dispersed and graded by varying weight fraction through the thickness. An analytical method based on strain energy approach is adopted to estimate the buckling load. Natural frequencies of the FG-GRC plate are attained using analytical solutions derived based on Reddy's third-order shear deformation theorem (TDST). Results revealed that buckling and free vibration behavior of the plate is influenced by the GPLs dispersion pattern and weight fraction under non-uniform edge loads. It is also observed that buckling mode and the fundamental vibration mode of the plate under combined tensile-compression load is entirely different from the other non-uniform edge load cases.
29 citations
••
TL;DR: Based on the adsorptive capacity and good recovery of the biosorbent, maghemite coated Bacillus subtilis proves to be an efficient adsorbent for the removal of Cd2+ ions from its aqueous solution.
29 citations
••
TL;DR: In this paper, three new receptors L1, L2 and L3 were designed and synthesized in a single pot synthesis, and the synthesized receptors were characterized by 1H NMR, FT-IR and Mass spectrometry.
29 citations
••
TL;DR: The proposed hybrid trust management scheme (HTMS) detects the malicious, faulty, selfish node and untrustworthy data in WSN by assigning the trust score to data items and sensor nodes based on data quality and communication trust respectively.
Abstract: Wireless sensor network (WSN) consists of wireless small sensor nodes deployed in the terrain for continuous observation of physical or environmental conditions. The data collected from the WSN is used for making decisions. The condition for making critical decision is to assure the trustworthiness of the data generated from sensor nodes. However, the approaches for scoring the sensed data alone is not enough in WSN since there is an interdependency between node and data item. If the overall trust score of the network is based on one trust component, then the network might be misguided. In this work, we propose the hybrid approach to address the issue by assigning the trust score to data items and sensor nodes based on data quality and communication trust respectively. The proposed hybrid trust management scheme (HTMS) detects the data fault with the help of temporal and spatial correlations. The correlation metric and provenance data are used to score the sensed data. The data trust score is utilized for making decision. The communication trust and provenance data are used to evaluate the trust score of intermediate nodes and source node. If the data item is reliable enough to make critical decisions, a reward is given by means of adding trust score to the intermediate nodes and source node. A punishment is given by reducing the trust score of the source and intermediate nodes, if the data item is not reliable enough to make critical decisions. Result shows that the proposed HTMS detects the malicious, faulty, selfish node and untrustworthy data.
29 citations
Authors
Showing all 5100 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ajay Kumar | 53 | 809 | 12181 |
Bhiksha Raj | 51 | 359 | 13064 |
Alexander P. Lyubartsev | 49 | 184 | 9200 |
Vijay Nair | 47 | 425 | 10411 |
Sukumar Mishra | 44 | 405 | 7905 |
Arun M. Isloor | 38 | 261 | 6272 |
Vinay Kumaran | 36 | 262 | 4473 |
M. C. Ray | 30 | 115 | 2662 |
Airody Vasudeva Adhikari | 30 | 119 | 2832 |
Ian R. Lane | 27 | 129 | 2947 |
D. Krishna Bhat | 26 | 95 | 1715 |
Anurag Kumar | 26 | 126 | 2276 |
Soma Biswas | 25 | 127 | 2195 |
Chandan Kumar | 25 | 66 | 1806 |
H.S. Nagaraja | 23 | 90 | 1609 |