scispace - formally typeset
Search or ask a question
Institution

North Eastern Hill University

EducationShillong, Meghalaya, India
About: North Eastern Hill University is a education organization based out in Shillong, Meghalaya, India. It is known for research contribution in the topics: Population & Catalysis. The organization has 2318 authors who have published 4476 publications receiving 48894 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors give an overview about the range of new possibilities accessible by these techniques, and summarizes the presently obtained understanding of ion tracks in polymers, including diffusion simulations and depth profile determinations of ions, molecules, or positrons penetrating into these tracks.
Abstract: New ways have been applied for characterization of ion tracks in polymers in the last few years, which are essentially related to depth profile determinations of ions, molecules, or positrons penetrating into these tracks In combination with tomography, the first three-dimensional results have been obtained Extensive diffusion simulations accompanying the measurements have enabled us to obtain a better understanding of the transport processes going on in ion tracks This paper gives an overview about the range of new possibilities accessible by these techniques, and summarizes the presently obtained understanding of ion tracks in polymers

18 citations

Journal ArticleDOI
TL;DR: In this paper, a D−π−A, D−A−π-A, and other configuration-based organic dyes have shown great potential in the field of dye-sensitized solar cells (DSCs).
Abstract: D−π–A, D–A−π–A, and other configuration-based organic dyes have shown great potential in the field of dye-sensitized solar cells (DSCs) Compared with traditional configurations, D–D′–A offers several advantages such as enrichment of the electron-donating ability, absorption spectral region, and molar extinction coefficient and inhibits dye aggregation Hence, in this work, a novel D–D′–A-type dye has been designed and synthesized for DSC applications In this configuration, substituted imidazole has been used as a primary donor, phenothiazine as an auxiliary donor, and cyanoacetic acid as an acceptor/anchoring group Structural characterizations of a D–D′–A-type dye were done by using NMR and electron ionization–mass spectrometry Photophysical, electrochemical, and computational studies were systematically performed to evaluate its electronic transitions, light-harvesting property, highest occupied molecular orbital (HOMO)/lowest unoccupied molecular orbital (LUMO) levels, and redox behavior The photop

18 citations

Journal ArticleDOI
TL;DR: In this article, the Ricci scalar R plays a dual role: like a physical field as well as a geometrical field under certain conditions, and the concept of phase transition and spontaneous symmetry breaking has been discussed incorporating a temperature-dependent Higgs-like potential for Ricci field.

18 citations

Journal ArticleDOI
TL;DR: Results obtained by simulation and numerical calculations are in favour of the proposed game theoretical defence mechanism and strongly advocate the worthiness of using game theory to defend against DoS and DDoS attacks to strengthen network security.
Abstract: Denial of service (DoS) or distributed denial of service (DDoS) attacks based on bandwidth depletion remain a persistent network security threat and have always been an important issue for system administrators and researchers. Defence mechanisms proposed so far to defend against such attacks could not address the problem adequately and efficiently due to lack of quantitative approaches in modelling defence strategies against DoS/DDoS attacks. Game theory is a microeconomic and mathematical tool that provides a quantitative framework to model such attacks. A model based on game theory can act as a decision support system to the defender and augments its capabilities to take best decisions for maintaining an optimum level of network security round the clock against such attacks. Inspired by this, different DoS/DDoS scenarios, where game theory has been used to represent the strategic interaction between the attacker and a defender, are investigated. Based on the strategic interactions, a game theoretical defence mechanism is proposed to mitigate DoS/DDoS attacks. The proposed mechanism is based on two-player zero-sum game. It considers DoS/DDoS attack based on bandwidth depletion where an attacker wants to occupy maximum bandwidth of a link having a limited capacity. The attacker does so by flooding the network with unsolicited or malicious flows. The attacker has to decide an effective attack rate per flow. It has to choose an optimal size of botnet also for a cost-effective attack. It does trade-off analysis prior to attack. If its payoff or benefit obtained is less than the attack cost, it chooses to refrain from launching such a costlier DoS/DDoS attack. On the other hand, to set an upper bound on network traffic, the defender needs to set an optimum threshold per flow so that maximum attack flows are either dropped or redirected to a honeypot deployed in the network. Arbitrary setting of a threshold for flow rates can also cause a loss of legitimate flows. The defender chooses the optimum threshold value with precise estimation to minimize loss of legitimate flows. The defender also does trade-off analysis and sets the threshold in a way that can minimize the attacker’s payoff. This optimization problem is presented as a game between the attacker and defender. Action sets and objective functions of both players are defined. The network constrains are modelled and payoffs are calculated. The game converges to Nash equilibrium. The best course of actions is deduced from the Nash strategies. Results obtained by simulation and numerical calculations are in favour of the proposed game theoretical defence mechanism and strongly advocate the worthiness of using game theory to defend against DoS and DDoS attacks to strengthen network security.

18 citations

Journal ArticleDOI
TL;DR: The CO2 fixation reaction without organic substrate showed the formation of carbonate-bridged dinuclear nickel(II) complexes, which is the highest catalytic efficiency reported forCO2 fixation using nickel-based catalysts to date.
Abstract: Activation of CO2 and conversion into value-added products is an effective option to mitigate CO2 emission. The nickel(II) complexes [Ni(L1)](ClO4)2 1, [Ni(L2)](ClO4)2 2, and [Ni(L3)(CH3CN)2](Ph4B)...

18 citations


Authors

Showing all 2368 results

NameH-indexPapersCitations
Vivek Sharma1503030136228
Patrick J. Carroll5850513046
Majeti Narasimha Vara Prasad5622715193
Arun Sharma5537111364
Michael Schmittel5338710461
Birgitta Bergman5218710975
Harikesh Bahadur Singh463077372
Lal Chand Rai401344513
B. Dey403548089
Hiriyakkanavar Ila364075633
Jürgen-Hinrich Fuhrhop352085130
Sreebrata Goswami341423228
Gagan B.N. Chainy331074151
J.P. Gaur31643957
Hiriyakkanavar Junjappa303494102
Network Information
Related Institutions (5)
University of Calcutta
19.7K papers, 259K citations

93% related

University of Hyderabad
13K papers, 237.6K citations

92% related

University of Delhi
36.4K papers, 666.9K citations

92% related

Banaras Hindu University
23.9K papers, 464.6K citations

92% related

Aligarh Muslim University
16.4K papers, 289K citations

92% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202321
202254
2021352
2020308
2019293
2018306