![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
An efficient three-factor authentication protocol for wireless healthcare sensor networks
Wireless Sensor Networks (WSNs) play a significant role in the health care industry in this digitised world. This technology is used to monitor and store the health-related data for patients. As a result, if s...
-
Article
Exploring geochemical distribution of potentially toxic elements (PTEs) in wetland and agricultural soils and associated health risks
This study is carried out to understand the degree of soil pollution, transport mechanism, and distribution pattern of potentially toxic elements (PTEs), including the exposure effects on human health. Towards...
-
Article
A Bilinear Map** Based Ring Signature Scheme with Batch Verification for Applications in VANETs
Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation system. In VANETs, vehicles communicate by sending messages over t...
-
Chapter and Conference Paper
Numerical Analysis of Low-Velocity Deformable Projectile Impact on Steel Columns
The AA 2014-T6 series of Aluminum is widely utilized in aerospace and defense applications as an airframe in missiles etc., due to its lightweight, strength, and resistance to corrosion. In current defense ope...
-
Chapter
Mathematical Models and Computational Approaches for Assessing Water Quality in Rural Area of India
Water, one of the valuable resources of nature, nurtures and takes care of almost all forms of life, without which life is impossible. Once known to be abundant in quantity, potable water is now scarce for a v...
-
Article
Comparison of Neurodevelopmental Status in Early Infancy of Infants of Women With and Without Gestational Diabetes Mellitus
To study the neurodevelopmental status of offsprings of mothers with gestational diabetes (OGDM) aged 3½ mo.
-
Article
Genetic analysis for semen quality traits in buffalo bulls
This study was attempted to estimate the genetic parameters of semen quality traits in buffalo bulls. The study data consisted of 10975 ejaculates from 45 Murrah buffalo bulls (aged 24–72 months) used for bree...
-
Article
Optical, Structural and Mechanical Properties of Automobile Front Panel Windshield Glasses
Windshield glasses of different cars are taken from an automotive repair shop to investigate their structural, optical, and mechanical properties, co-related with their chemical constituents. Energy-dispersive...
-
Article
Assessment of inland salinity in a hard rock aquifer of south India
This paper describes the existence of high salinity in an inland aquifer system of a limited extent located in the granitic terrain of south India. Salinity levels observed in 55 water samples collected pre- a...
-
Article
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Due to the myriad applications of the Internet of Things (IoT) in various sectors like healthcare, military, industry, safety, etc., there is also a need to secure these systems efficiently. The devices in suc...
-
Chapter and Conference Paper
Text-to-Image Synthesis using BERT Embeddings and Multi-Stage GAN
A technique called text-to-image creation is used to create visuals that correspond to provided written descriptions. In this study, we have proposed a Multi-Stage GAN model using BERT Embeddings which consist...
-
Chapter and Conference Paper
Performance Analysis of a Jet Im**ed Solar Air Heater Having the Corrugated Absorber Plate: A CFD Approach
The present work has been presented to improve efficiency by using jet im**ement through the corrugated absorber plate. Due to this, jet im**ement turbulence enhancement takes place because of which the ra...
-
Chapter and Conference Paper
Statistical Analysis of Feature Selection and Clustering for Building the Optimised Drug Toxicity Prediction Model
Artificial intelligence and machine learning are crucial in medication research and development. Because of the likelihood of toxicity, many pharmacological evaluations can be omitted. Toxicity prediction is c...
-
Article
Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
Multimedia technology is a sub field of Internet of Things (IoT) in which multimedia devices are embedded to Wireless Sensor Network (WSN). In this, such devices are used for the flow of multimedia application...
-
Article
Exploitation of deep aquifer in granitic terrain and its implications on recharge using isotopes and hydrochemistry
In the Precambrian granitic terrain, the occurrence of a multi-aquifer system is common. This study has examined the inter-communications between the shallow and deep aquifers using the hydrochemical and isoto...
-
Chapter and Conference Paper
A Systematic Analysis of Fingerprint Matching Techniques for Fingerprint Recognition System
The recognition of fingerprints is the widely adaptable and recognizable biometric system for the identification of individuals. The fingerprint authentication system pertains the high-end security than the ot...
-
Article
CSIR-NGRI’s Quest for Understanding Earth Surface Processes and Liquefaction Based Paleoseismology in the Himalaya and Adjoining Region
CSIR-NGRI has developed pioneering facilty of the 14C and expertises to pursue paleoseismic and neotectonic studies aimed at building earthquake chronology from earthquake-prone regions in India. We present some ...
-
Article
The suitability of surface waters from small west-flowing rivers for drinking, irrigation, and aquatic life from a global biodiversity hotspot (Western Ghats, India)
The present study provides surface water types and water quality indices (WQI) for 70 large coastal rivers of the Western Ghats (WG). Irrespective of seasons and lithology, concentration of cations (Ca2+ > Na+ > ...
-
Article
A secure and efficient user authentication protocol for wireless sensor network
To provide the secure communication in wireless sensor networks (WSNs) is one of the challenging issues as the channel used is wireless. User authentication is a mechanism which is used to provide the secure c...
-
Chapter and Conference Paper
Challenges and Learnings During Integration of Phasor Measurement Unit Data with Supervisory Control and Data Acquisition System—An Indian Experience
With gradual expansion of the grid, the conventional Supervisory Control and Data Acquisition (SCADA) required additional visualization tools to operate the grid in more efficient manner. Due to low situationa...