Institution
Thapar University
Education•Patiāla, Punjab, India•
About: Thapar University is a education organization based out in Patiāla, Punjab, India. It is known for research contribution in the topics: Computer science & Cloud computing. The organization has 2944 authors who have published 8558 publications receiving 130392 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, an attempt has been made to model the four response variables, i.e., machining rate, surface roughness, dimensional deviation and wire wear ratio in WEDM process using response surface methodology.
Abstract: This paper presents an investigation on WEDM of pure titanium (grade-2). An attempt has been made to model the four response variables, i.e., machining rate, surface roughness, dimensional deviation and wire wear ratio in WEDM process using response surface methodology. The experimental plan is based on Box–Behnken design. The six parameters, i.e., pulse on time, pulse off time, peak current, spark gap voltage, wire feed and wire tension have been varied to investigate their effect on output responses. These responses have been optimized using multiresponse optimization through desirability. The ANOVA has been applied to identify the significance of developed model. The test results confirm the validity and adequacy of the developed RSM model. Finally, the optimum parametric setting has been designed for the optimization of process.
170 citations
••
TL;DR: This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack.
Abstract: The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs.
170 citations
••
TL;DR: This article proposes a new concept called fog vehicular computing (FVC) to augment the computation and storage power of fog computing and designs a comprehensive architecture for FVC and presents a number of salient applications.
Abstract: Fog computing has emerged as a promising solution for accommodating the surge of mobile traffic and reducing latency, both known to be inherent problems of cloud computing. Fog services, including computation, storage, and networking, are hosted in the vicinity of end users (edge of the network), and, as a result, reliable access is provisioned to delay-sensitive mobile applications. However, in some cases, the fog computing capacity is overwhelmed by the growing number of demands from patrons, particularly during peak hours, and this can subsequently result in acute performance degradation. In this article, we address this problem by proposing a new concept called fog vehicular computing (FVC) to augment the computation and storage power of fog computing. We also design a comprehensive architecture for FVC and present a number of salient applications. The result of implementation clearly shows the effectiveness of the proposed architecture. Finally, some open issues and envisioned directions are discussed for future research in the context of FVC.
169 citations
••
TL;DR: In this article, the photocatalytic activity of undoped and Cu doped zinc oxide (ZnO) photocatalyst were investigated by the degradation of Crystal Violet (CV) dye in aqueous medium under exposure of UV-Visible light irradiations.
169 citations
••
TL;DR: The paper discusses the taxonomy of fog computing, how this is different from cloud computing and edge computing technologies, its applications, emerging key technologies and various challenges involved in fog technology.
Abstract: Cloud computing plays a vital role in processing a large amount of data. However, with the arrival of the Internet of Things, huge data are generated from these devices. Thus, there is the need for bringing characteristics of cloud closer to the request generator, so that processing of these huge data takes place at one-hop distance closer to that end user. This led to the emergence of fog computing with the aim to provide storage and computation at the edge of the network that reduces network traffic and overcomes many cloud computing drawbacks. Fog computing technology helps to overcome challenges of big data processing. The paper discusses the taxonomy of fog computing, how this is different from cloud computing and edge computing technologies, its applications, emerging key technologies (i.e., communication technologies and storage technologies) and various challenges involved in fog technology.
168 citations
Authors
Showing all 3035 results
Name | H-index | Papers | Citations |
---|---|---|---|
Gaurav Sharma | 82 | 1244 | 31482 |
Vinod Kumar | 77 | 815 | 26882 |
Neeraj Kumar | 76 | 587 | 18575 |
Ashish Sharma | 75 | 909 | 20460 |
Dinesh Kumar | 69 | 1333 | 24342 |
Pawan Kumar | 64 | 547 | 15708 |
Harish Garg | 61 | 311 | 11491 |
Rafat Siddique | 58 | 183 | 11133 |
Surya Prakash Singh | 55 | 736 | 12989 |
Abhijit Mukherjee | 55 | 378 | 10196 |
Ajay Kumar | 53 | 809 | 12181 |
Soumen Basu | 45 | 247 | 7888 |
Sudeep Tanwar | 43 | 263 | 5402 |
Yosi Shacham-Diamand | 42 | 287 | 6463 |
Rupinder Singh | 42 | 458 | 7452 |