Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    An efficient three-factor authentication protocol for wireless healthcare sensor networks

    Wireless Sensor Networks (WSNs) play a significant role in the health care industry in this digitised world. This technology is used to monitor and store the health-related data for patients. As a result, if s...

    Khushil Kumar Saini, Damandeep Kaur, Devender Kumar in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Exploring geochemical distribution of potentially toxic elements (PTEs) in wetland and agricultural soils and associated health risks

    This study is carried out to understand the degree of soil pollution, transport mechanism, and distribution pattern of potentially toxic elements (PTEs), including the exposure effects on human health. Towards...

    Imran Khan, Bharat C. Choudhary, Saifi Izhar in Environmental Science and Pollution Resear… (2024)

  3. No Access

    Article

    A Bilinear Map** Based Ring Signature Scheme with Batch Verification for Applications in VANETs

    Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation system. In VANETs, vehicles communicate by sending messages over t...

    Lalit Negi, Devender Kumar in Wireless Personal Communications (2024)

  4. No Access

    Chapter and Conference Paper

    Numerical Analysis of Low-Velocity Deformable Projectile Impact on Steel Columns

    The AA 2014-T6 series of Aluminum is widely utilized in aerospace and defense applications as an airframe in missiles etc., due to its lightweight, strength, and resistance to corrosion. In current defense ope...

    Prithvi Sangani, Devender Kumar in Recent Developments in Structural Engineer… (2024)

  5. No Access

    Chapter

    Mathematical Models and Computational Approaches for Assessing Water Quality in Rural Area of India

    Water, one of the valuable resources of nature, nurtures and takes care of almost all forms of life, without which life is impossible. Once known to be abundant in quantity, potable water is now scarce for a v...

    Deepak Kumar, Pooja Khurana, Devender Kumar in Integrated Management of Water Resources i… (2024)

  6. No Access

    Article

    Comparison of Neurodevelopmental Status in Early Infancy of Infants of Women With and Without Gestational Diabetes Mellitus

    To study the neurodevelopmental status of offsprings of mothers with gestational diabetes (OGDM) aged 3½ mo.

    Rimjhim Bersain, Devendra Mishra, Monica Juneja in Indian Journal of Pediatrics (2023)

  7. No Access

    Article

    Genetic analysis for semen quality traits in buffalo bulls

    This study was attempted to estimate the genetic parameters of semen quality traits in buffalo bulls. The study data consisted of 10975 ejaculates from 45 Murrah buffalo bulls (aged 24–72 months) used for bree...

    Devender Kumar, J. S. Mehta, A. Jerome in Tropical Animal Health and Production (2023)

  8. No Access

    Article

    Optical, Structural and Mechanical Properties of Automobile Front Panel Windshield Glasses

    Windshield glasses of different cars are taken from an automotive repair shop to investigate their structural, optical, and mechanical properties, co-related with their chemical constituents. Energy-dispersive...

    Santosh Kumar, K. Singh, Devender Kumar in Silicon (2023)

  9. No Access

    Article

    Assessment of inland salinity in a hard rock aquifer of south India

    This paper describes the existence of high salinity in an inland aquifer system of a limited extent located in the granitic terrain of south India. Salinity levels observed in 55 water samples collected pre- a...

    D. V. Reddy, Devender Kumar, Kiran Kumar Bhukya in Environmental Earth Sciences (2023)

  10. No Access

    Article

    An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things

    Due to the myriad applications of the Internet of Things (IoT) in various sectors like healthcare, military, industry, safety, etc., there is also a need to secure these systems efficiently. The devices in suc...

    Devender Kumar, Siddharth Jain, Aasif Khan in Journal of Ambient Intelligence and Humani… (2023)

  11. No Access

    Chapter and Conference Paper

    Text-to-Image Synthesis using BERT Embeddings and Multi-Stage GAN

    A technique called text-to-image creation is used to create visuals that correspond to provided written descriptions. In this study, we have proposed a Multi-Stage GAN model using BERT Embeddings which consist...

    Poonam Rani, Devender Kumar, Nupur Sudhakar in International Conference on Innovative Com… (2023)

  12. No Access

    Chapter and Conference Paper

    Performance Analysis of a Jet Im**ed Solar Air Heater Having the Corrugated Absorber Plate: A CFD Approach

    The present work has been presented to improve efficiency by using jet im**ement through the corrugated absorber plate. Due to this, jet im**ement turbulence enhancement takes place because of which the ra...

    Amitesh Sharma, Sushant Thakur in Recent Trends in Thermal and Fluid Sciences (2023)

  13. No Access

    Chapter and Conference Paper

    Statistical Analysis of Feature Selection and Clustering for Building the Optimised Drug Toxicity Prediction Model

    Artificial intelligence and machine learning are crucial in medication research and development. Because of the likelihood of toxicity, many pharmacological evaluations can be omitted. Toxicity prediction is c...

    Kamal, Devender Kumar, Anuj Kumar Sharma in Information and Communication Technology f… (2023)

  14. No Access

    Article

    Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

    Multimedia technology is a sub field of Internet of Things (IoT) in which multimedia devices are embedded to Wireless Sensor Network (WSN). In this, such devices are used for the flow of multimedia application...

    Damandeep Kaur, Khushil Kumar Saini, Devender Kumar in Multimedia Tools and Applications (2022)

  15. No Access

    Article

    Exploitation of deep aquifer in granitic terrain and its implications on recharge using isotopes and hydrochemistry

    In the Precambrian granitic terrain, the occurrence of a multi-aquifer system is common. This study has examined the inter-communications between the shallow and deep aquifers using the hydrochemical and isoto...

    D. V. Reddy, Devender Kumar, Kiran Kumar Bhukya in Environmental Earth Sciences (2022)

  16. No Access

    Chapter and Conference Paper

    A Systematic Analysis of Fingerprint Matching Techniques for Fingerprint Recognition System

    The recognition of fingerprints is the widely adaptable and recognizable biometric system for the identification of individuals. The fingerprint authentication system pertains the high-end security than the ot...

    Mahesh Kumar, Devender Kumar in Innovations in Computer Science and Engineering (2022)

  17. No Access

    Article

    CSIR-NGRI’s Quest for Understanding Earth Surface Processes and Liquefaction Based Paleoseismology in the Himalaya and Adjoining Region

    CSIR-NGRI has developed pioneering facilty of the 14C and expertises to pursue paleoseismic and neotectonic studies aimed at building earthquake chronology from earthquake-prone regions in India. We present some ...

    Anand K. Pandey, Devender Kumar in Journal of the Geological Society of India (2021)

  18. No Access

    Article

    The suitability of surface waters from small west-flowing rivers for drinking, irrigation, and aquatic life from a global biodiversity hotspot (Western Ghats, India)

    The present study provides surface water types and water quality indices (WQI) for 70 large coastal rivers of the Western Ghats (WG). Irrespective of seasons and lithology, concentration of cations (Ca2+ > Na+ > ...

    S. Kiran Kumar Reddy, Harish Gupta in Environmental Science and Pollution Resear… (2021)

  19. No Access

    Article

    A secure and efficient user authentication protocol for wireless sensor network

    To provide the secure communication in wireless sensor networks (WSNs) is one of the challenging issues as the channel used is wireless. User authentication is a mechanism which is used to provide the secure c...

    Devender Kumar in Multimedia Tools and Applications (2021)

  20. No Access

    Chapter and Conference Paper

    Challenges and Learnings During Integration of Phasor Measurement Unit Data with Supervisory Control and Data Acquisition System—An Indian Experience

    With gradual expansion of the grid, the conventional Supervisory Control and Data Acquisition (SCADA) required additional visualization tools to operate the grid in more efficient manner. Due to low situationa...

    Pramod Singh, Santosh Kumar Jain in Advances in Smart Grid Automation and Indu… (2021)

previous disabled Page of 2