Skip to main content

previous disabled Page of 5
and
  1. Article

    Open Access

    A multifaceted survey on privacy preservation of federated learning: progress, challenges, and opportunities

    Federated learning (FL) refers to a system of training and stabilizing local machine learning models at the global level by aggregating the learning gradients of the models. It reduces the concern of sharing t...

    Sanchita Saha, Ashlesha Hota, Arup Kumar Chattopadhyay in Artificial Intelligence Review (2024)

  2. No Access

    Article

    A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks

    The Internet of Things (IoT) is an expanding field of computer networks where resource-constrained devices connect to the internet through various wireless technologies. IoT systems already cover a broad spectrum...

    Pradeepkumar Bhale, Santosh Biswas in International Journal of Information Secur… (2024)

  3. No Access

    Article

    Synthesis and characterization of related compounds of Bisoprolol fumarate: a β-blocker agent

    Bisoprolol is a beta blocker used for the treatment of high blood pressure. During the synthesis and scale up of Bisoprolol, several related compounds will be generated. In this article we have disclosed a fac...

    Santhosh Reddy Pindi, Venkateswara Rao Gollapalli, Paul Douglas Sanasi in Chemical Papers (2024)

  4. No Access

    Chapter and Conference Paper

    Anonymous and Privacy Preserving Attribute-Based Decentralized DigiLocker Using Blockchain Technology

    DigiLocker is an Aadhaar-based sharable public cloud service from Government of India. Similar to other centralized services, DigiLocker may operate the system to its full discretion which may not be fully ali...

    Puneet Bakshi, Sukumar Nandi in Modeling, Simulation and Optimization (2024)

  5. No Access

    Chapter and Conference Paper

    Hierarchical Aadhaar-Based Anonymous eSign Based on Group Signatures

    In the past few years, other than traditional security requirements, privacy and anonymity are also getting increased importance. For example, in case of the online electronic signature service, eSign, an eSig...

    Puneet Bakshi, Sukumar Nandi in Modeling, Simulation and Optimization (2024)

  6. No Access

    Chapter and Conference Paper

    Design Fiction: A Way to Foresee the Future of Human–Computer Interaction Design Challenges

    Human–computer interaction is centred around exploring the relationship between computational technologies and their users. HCI designers address the concerns of users by making innovative use of computational...

    Suvodeep Misra, Debayan Dhar, Sukumar Nandi in Design in the Era of Industry 4.0, Volume 1 (2023)

  7. No Access

    Chapter and Conference Paper

    Load Profile Oriented Balanced Cluster Assignment in 5G IoT Based Sensor Network

    One of the massive machine type communication (mMTC) applications for monitoring and sensing in 5G cellular network is the Internet of Things (IoT) based wireless sensor network (WSN). Load balanced cluster fo...

    B. Dey, Sivaji Bandyopadhyay, Sukumar Nandi in Internet of Things (IoT): Key Digital Tren… (2023)

  8. No Access

    Chapter and Conference Paper

    Privacy Enhanced Registered Devices for Fine-Grained Access Control

    Aadhaar is one of the largest biometric identity systems in the world which aims to assign a unique digital identity to each resident of India. A resident can authenticate himself using his Aadhaar number and ...

    Puneet Bakshi, Sukumar Nandi in Edge Analytics (2022)

  9. No Access

    Chapter and Conference Paper

    Energy-aware Application Scheduling on DVFS-Enabled Edge Computing with Mobile–Edge–Cloud Cooperation

    With a significant increase in the compute-intensive mobile applications in recent times, the seamless integration of the cloud platform with mobile devices becomes essential. As a result, the mobile cloud com...

    Vishal Deka, Manojit Ghose, Sukumar Nandi in Edge Analytics (2022)

  10. No Access

    Chapter and Conference Paper

    An Artificial Intelligence-Based Approach Towards Segregation of Folk Songs

    genre/type classification has been an active area of interest for researchers. There has been development of disparate systems for Western music, but a scarcity of such systems is observed for India...

    Himadri Mukherjee, Ankita Dhar in Advances in Speech and Music Technology (2021)

  11. No Access

    Chapter

    Demystifying Security on NDN: A Survey of Existing Attacks and Open Research Challenges

    Named Data Networking (NDN) is a clean slate Future Internet Architecture that incorporates the visionary idea of focusing on contents instead of its location/host. It is mainly designed to address long-standi...

    Madhurima Buragohain, Sukumar Nandi in The "Essence" of Network Security: An End-… (2021)

  12. No Access

    Chapter and Conference Paper

    LIENE: Lifetime Enhancement for 6LoWPAN Network Using Clustering Approach Use Case: Smart Agriculture

    The Internet of Things (IoT) is one of the largest technological evolutions of computing. With the rapid development of communication, there was a tremendous growth of IoT technology across various fields. IoT de...

    Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi in Innovations for Community Services (2021)

  13. No Access

    Chapter and Conference Paper

    Designing a Blockchain Based Framework for IoT Data Trade

    With its application ranging from smart homes and wearables to smart vehicles and smart cities, Internet of Things(IoT) devices have become an integral part of our lives. These devices are enabled with sensing...

    Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi in Innovations for Community Services (2020)

  14. No Access

    Chapter and Conference Paper

    Misbehavior Detection in C-ITS Using Deep Learning Approach

    Cooperative Intelligent Transportation Systems (C-ITS) is one of the most prominent solutions to facilitate many new exciting applications concerning road safety, mobility, environment, and driving comfort. Th...

    Pranav Kumar Singh, Manish Kumar Dash in Intelligent Systems Design and Applications (2020)

  15. No Access

    Chapter

    PGRDP: Reliability, Delay, and Power-Aware Area Minimization of Large-Scale VLSI Power Grid Network Using Cooperative Coevolution

    Power grid network (PGN) of a VLSI system-on-chip (SoC) occupies a significant amount of routing area in a chip. As the number of functional blocks is increasing in an SoC chronologically, the need of the hour...

    Sukanta Dey, Sukumar Nandi, Gaurav Trivedi in Intelligent Computing Paradigm: Recent Trends (2020)

  16. No Access

    Chapter and Conference Paper

    ReFIT: Reliability Challenges and Failure Rate Mitigation Techniques for IoT Systems

    As the number of Internet-of-Things (IoT) devices increases, ensuring the reliability of the IoT system has become a challenging job. Apart from the emerging security issues, reliable IoT system design depends...

    Sukanta Dey, Pradeepkumar Bhale, Sukumar Nandi in Innovations for Community Services (2020)

  17. No Access

    Chapter and Conference Paper

    Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss

    MPTCP aggregates multiple network interfaces for a single TCP session for enhanced transfer rates and improved reliability to applications. Due to this property, MPTCP has the potential to provide better end-u...

    Sunit Kumar Nandi, Pranav Kumar Singh in Advanced Information Networking and Applic… (2020)

  18. No Access

    Chapter and Conference Paper

    BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network

    Internet of Things (IoT) is a network of tangible objects forming a Low-Power Network with each connected device having limited resources and computing power, and each entrusted with a task of data acquisition...

    Pradeepkumar Bhale, Satya Prakash, Santosh Biswas in Innovations for Community Services (2020)

  19. No Access

    Chapter and Conference Paper

    Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network

    The Internet of Things (IoT) has become a widespread technology where everyday objects are being transferred toward intelligent devices. These smart devices incorporate sensing, computing, and networking abilitie...

    Pradeepkumar Bhale, Sukanta Dey, Santosh Biswas in Innovations for Community Services (2020)

  20. No Access

    Chapter and Conference Paper

    TA-ACS: A Trust Aware Adaptive Carrier Selection Scheme for Reliable Routing in Delay Tolerant Networks

    Delay Tolerant Network (DTN) is an infrastructure-less wireless network characterized with sporadic link connectivity and probable co-existence of high end-to-end delay. It relies on opportunistic contacts for...

    Amrita Bose Paul, Susmita Mondal, Santosh Biswas in Innovations for Community Services (2020)

previous disabled Page of 5