scispace - formally typeset
Search or ask a question
Institution

Thapar University

EducationPatiāla, Punjab, India
About: Thapar University is a education organization based out in Patiāla, Punjab, India. It is known for research contribution in the topics: Cloud computing & Fuzzy logic. The organization has 2944 authors who have published 8558 publications receiving 130392 citations.


Papers
More filters
Journal ArticleDOI
Harish Garg1
TL;DR: By considering all these degrees, some aggregation operators, namely picture fuzzy weighted average, picture fuzzy ordered weightedAverage, and picture fuzzy hybrid average aggregation operators have been proposed along with their desirable properties and a decision-making approach based on these operators has been presented.
Abstract: The objective of the work is to present some series of the aggregation operators for the picture fuzzy sets (PFSs). As PFSs have been an extended version of the intuitionistic fuzzy set theory which not only considers the degree of acceptance or rejection but also taken into the account the degree of refusal during the analysis. Thus, by considering all these degrees, some aggregation operators, namely picture fuzzy weighted average, picture fuzzy ordered weighted average, and picture fuzzy hybrid average aggregation operators, have been proposed along with their desirable properties. A decision-making approach based on these operators has also been presented. Finally, an illustrative example has been given for demonstrating the approach.

254 citations

Journal ArticleDOI
TL;DR: A new secure remote user authentication scheme for a smart home environment that is efficient for resource-constrained smart devices with limited resources as it uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions.
Abstract: The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living, smart health and smart transportation. Among all these applications, smart home is most popular, in which the users/residents can control the operations of the various smart sensor devices from remote sites also. However, the smart devices and users communicate over an insecure communication channel, i.e., the Internet. There may be the possibility of various types of attacks, such as smart device capture attack, user, gateway node and smart device impersonation attacks and privileged-insider attack on a smart home network. An illegal user, in this case, can gain access over data sent by the smart devices. Most of the existing schemes reported in the literature for the remote user authentication in smart home environment are not secure with respect to the above specified attacks. Thus, there is need to design a secure remote user authentication scheme for a smart home network so that only authorized users can gain access to the smart devices. To mitigate the aforementioned isses, in this paper, we propose a new secure remote user authentication scheme for a smart home environment. The proposed scheme is efficient for resource-constrained smart devices with limited resources as it uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions. The security of the scheme is proved using the rigorous formal security analysis under the widely-accepted Real-Or-Random (ROR) model. Moreover, the rigorous informal security analysis and formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. Finally, the practical demonstration of the proposed scheme is also performed using the widely-accepted NS-2 simulation.

253 citations

Journal ArticleDOI
TL;DR: An architecture for patient monitoring health-care system in WMSN is proposed and an anonymity-preserving mutual authentication protocol for mobile users is designed and it is demonstrated that the proposed protocol is efficient and robust.

249 citations

Journal ArticleDOI
TL;DR: It is demonstrated that microbial calcite acts as a sealing agent for filling the gaps or cracks and fissures in constructed facilities and natural formations alike.
Abstract: Microbiologically induced calcite precipitation by the bacterium Sporosarcina pasteurii (NCIM 2477) using the industrial effluent of the dairy industry, lactose mother liquor (LML) as growth medium was demonstrated for the first time in this study. The urease activity and the calcite precipitation by the bacterium was tested in LML and compared with the standard media like nutrient media and yeast extract media. Calcite constituted 24.0% of the total weight of the sand samples plugged by S. pasteurii and urease production was found to be 353 U/ml in LML medium. The compressive strength of cement mortar was increased by S. pasteurii in all the media used compared to control. No significant difference in the growth, urease production and compressive strength of mortar among the media suggesting LML as an alternative source for standard media. This study demonstrates that microbial calcite acts as a sealing agent for filling the gaps or cracks and fissures in constructed facilities and natural formations alike.

248 citations

Journal ArticleDOI
TL;DR: The architecture and its security and privacy requirements are studied, and potential solutions to address challenging issues such as privacy leakage, data confidentiality protection, and flexible accessibility are outlined.
Abstract: A recent trend in both industry and research is the Internet of Drones, which has applications in both civilian and military settings. However, drones (also known as unmanned aerial vehicles) are generally not designed with security in mind, and there are fundamental security and privacy issues that need study. Hence, in this article, we study the architecture and its security and privacy requirements. We also outline potential solutions to address challenging issues such as privacy leakage, data confidentiality protection, and flexible accessibility, with the hope that this article will provide the basis for future research in this emerging area.

248 citations


Authors

Showing all 3035 results

NameH-indexPapersCitations
Gaurav Sharma82124431482
Vinod Kumar7781526882
Neeraj Kumar7658718575
Ashish Sharma7590920460
Dinesh Kumar69133324342
Pawan Kumar6454715708
Harish Garg6131111491
Rafat Siddique5818311133
Surya Prakash Singh5573612989
Abhijit Mukherjee5537810196
Ajay Kumar5380912181
Soumen Basu452477888
Sudeep Tanwar432635402
Yosi Shacham-Diamand422876463
Rupinder Singh424587452
Network Information
Related Institutions (5)
Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

96% related

Indian Institutes of Technology
40.1K papers, 652.9K citations

95% related

Indian Institute of Technology Delhi
26.9K papers, 503.8K citations

94% related

Indian Institute of Technology Kharagpur
38.6K papers, 714.5K citations

94% related

Anna University
19.9K papers, 312.6K citations

93% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202347
2022149
20211,237
20201,083
2019962
2018933