scispace - formally typeset
Search or ask a question
Institution

Thapar University

EducationPatiāla, Punjab, India
About: Thapar University is a education organization based out in Patiāla, Punjab, India. It is known for research contribution in the topics: Computer science & Cloud computing. The organization has 2944 authors who have published 8558 publications receiving 130392 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, coal bottom ash is used as a sand replacement in concrete manufacturing, and compressive and splitting tensile strength of bottom ash concrete mixtures was almost comparable to that of control concrete mixture.

157 citations

Journal ArticleDOI
TL;DR: A novel temporal credential based anonymous lightweight user authentication mechanism for IoD environment, called TCALAS, which has the capability to resist various known attacks against passive/active adversary and lower costs in both computation and communication as compared to existing schemes.
Abstract: A user (external party) is interested in accessing the real-time data from some designated drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to provide this facility, the user needs to be authenticated by an accessed remote drone and vice-versa. After successful authentication both parties can establish a secret session key for the secure communication. To handle this important problem in IoD environment, we design a novel temporal credential based anonymous lightweight user authentication mechanism for IoD environment, called TCALAS. A detailed security analysis using formal security under the broadly applied real-or-random (ROR) model, formal security verification under the broadly used software verification tool, known as automated validation of internet security protocols and applications, and also informal security analysis reveal that TCALAS has the capability to resist various known attacks against passive/active adversary. In addition, a detailed comparative study has been conducted for TCALAS and other related schemes, and the study also reveals that TCALAS provides better security and functionality features, and lower costs in both computation and communication as compared to existing schemes.

157 citations

Journal ArticleDOI
TL;DR: This paper covers the most significant developments in meta-heuristic based image encryption techniques and discusses significant advancements in the field of image encryption and highlighting future challenges.
Abstract: Image encryption techniques play a significant role in multimedia applications to secure and authenticate digital images. This paper presents a comprehensive study of various image encryption techniques. This paper covers the most significant developments in meta-heuristic based image encryption techniques. The various attacks and performance measures related to image encryption techniques have also been studied. The existing techniques are analyzed with respect to differential, statistical, and key analyses. The main goal of this paper is to give a broad perspective on characteristics of image encryption techniques. The paper concludes by discussing significant advancements in the field of image encryption and highlighting future challenges.

156 citations

Journal ArticleDOI
TL;DR: The proposed P2DA scheme against internal attackers using Boneh–Goh–Nissim public key cryptography is proposed, which is more computationally efficient and provably secure and can meet various security requirements.
Abstract: Privacy-preserving data aggregation (P2DA) is an important basic building block that can protect consumer’s privacy in the smart grid environment because it could be used to prevent the extraction of the electricity consumption information of a specific consumer. Due to this important function, the P2DA scheme for the smart grid has attracted a lot of attention from both academic and industry researchers who have proposed many P2DA schemes for the smart grid in recent years. However, most of these P2DA schemes are not secure against internal attackers or cannot provide data integrity. Besides, their computation costs are not satisfactory because the bilinear pairing operation or the hash-to-point operation is performed at the smart meter’s side. To address the deficiencies of previous schemes, we propose a new P2DA scheme against internal attackers using Boneh–Goh–Nissim public key cryptography. The proposed P2DA scheme does not use bilinear pairing or hash-to-point operation making it be more computationally efficient than previous P2DA schemes. We also show that the proposed P2DA scheme is provably secure and can meet various security requirements.

155 citations

Journal ArticleDOI
TL;DR: This paper has evaluated prediction systems for diseases such as heart diseases, breast cancer, diabetes, spect_heart, thyroid, dermatology, liver disorders and surgical data using a number of input attributes related to that particular disease.
Abstract: The Internet of Things (IoT) enabled various types of applications in the field of information technology, smart and connected health care is notably a crucial one is one of them. Our physical and mental health information can be used to bring about a positive transformation change in the health care landscape using networked sensors. It makes it possible for monitoring to come to the people who don't have ready access to effective health monitoring system. The captured data can then be analyzed using various machine learning algorithms and then shared through wireless connectivity with medical professionals who can make appropriate recommendations. These scenarios already exist, but we intend to enhance it by analyzing the past data for predicting future problems using prescriptive analytics. It will allow us to move from reactive to visionary approach by rapidly spotting trends and making recommendations on behalf of the actual medical service provider. In this paper, the authors have applied different machine learning techniques and considered public datasets of health care stored in the cloud to build a system, which allows for real time and remote health monitoring built on IoT infrastructure and associated with cloud computing. The system will be allowed to drive recommendations based on the historic and empirical data lying on the cloud. The authors have proposed a framework to uncover knowledge in a database, bringing light to disguise patterns which can help in credible decision making. This paper has evaluated prediction systems for diseases such as heart diseases, breast cancer, diabetes, spect_heart, thyroid, dermatology, liver disorders and surgical data using a number of input attributes related to that particular disease. Experimental results are conducted using a few machine learning algorithms considered in this paper like K-NN, Support Vector Machine, Decision Trees, Random Forest, and MLP.

155 citations


Authors

Showing all 3035 results

NameH-indexPapersCitations
Gaurav Sharma82124431482
Vinod Kumar7781526882
Neeraj Kumar7658718575
Ashish Sharma7590920460
Dinesh Kumar69133324342
Pawan Kumar6454715708
Harish Garg6131111491
Rafat Siddique5818311133
Surya Prakash Singh5573612989
Abhijit Mukherjee5537810196
Ajay Kumar5380912181
Soumen Basu452477888
Sudeep Tanwar432635402
Yosi Shacham-Diamand422876463
Rupinder Singh424587452
Network Information
Related Institutions (5)
Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

96% related

Indian Institutes of Technology
40.1K papers, 652.9K citations

95% related

Indian Institute of Technology Delhi
26.9K papers, 503.8K citations

94% related

Indian Institute of Technology Kharagpur
38.6K papers, 714.5K citations

94% related

Anna University
19.9K papers, 312.6K citations

93% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202347
2022149
20211,237
20201,083
2019962
2018933