Browsing by Author "Kumar, R.S."
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Item Cryptanalysis of a remote user authentication protocol using smart cards(2014) Madhusudhan, R.; Kumar, R.S.Remote user authentication using smart cards is a method of verifying the legitimacy of remote users accessing the server through insecure channel, by using smart cards to increase the efficiency of the system. During last couple of years many protocols to authenticate remote users using smart cards have been proposed. But unfortunately, most of them are proved to be unsecure against various attacks. Recently this year, Yung-Cheng Lee improved Shin et al.'s protocol and claimed that their protocol is more secure. In this article, we have shown that Yung-Cheng-Lee's protocol too has defects. It does not provide user anonymity; it is vulnerable to Denial-of-Service attack, Session key reveal, user impersonation attack, Server impersonation attack and insider attacks. Further it is not efficient in password change phase since it requires communication with server and uses verification table. � 2014 IEEE.Item Cryptanalysis of a remote user authentication protocol using smart cards(IEEE Computer Society help@computer.org, 2014) Madhusudhan, R.; Kumar, R.S.Remote user authentication using smart cards is a method of verifying the legitimacy of remote users accessing the server through insecure channel, by using smart cards to increase the efficiency of the system. During last couple of years many protocols to authenticate remote users using smart cards have been proposed. But unfortunately, most of them are proved to be unsecure against various attacks. Recently this year, Yung-Cheng Lee improved Shin et al.'s protocol and claimed that their protocol is more secure. In this article, we have shown that Yung-Cheng-Lee's protocol too has defects. It does not provide user anonymity; it is vulnerable to Denial-of-Service attack, Session key reveal, user impersonation attack, Server impersonation attack and insider attacks. Further it is not efficient in password change phase since it requires communication with server and uses verification table. © 2014 IEEE.Item Optimization of Processing Parameters and Wear Performance of B4C Reinforced AA6061 Composites Through Taguchi Methodology(Springer, 2025) Manjunatha, C.; Varun, K.R.; Nagaraja, K.C.; Soni, P.K.; Kumar, R.S.; Prasad, C.; Kumar, P.; Nithesh, K.G.Two or more elements with different physical and chemical characteristics make up the composite material. The composite may be prepared using a variety of methods, but stir casting is a popular choice since it is easy to use and reasonably priced. In this investigation, stir casting was used to create AA6061-Boron Carbide (B4C) composites. Composites with 10% weight percentage of B4C were selected for wear analysis. The Taguchi technique was applied to the wear study in order to identify the ideal values. Utilizing a Pin-on-Disk testing device under dry sliding circumstances, anthropological investigations were carried out. With B4C content and wear depth as the system output, the three factors load (N), sliding distance (SD), and sliding velocity (SV) were evaluated using the L27 orthogonal array. To comprehend the impact of factors and how they contribute to wear loss, analysis of variance was used. Experimental tests were conducted to validate the analysis results using the optimal values. Scanning Electron Microscopic (SEM) analysis of the samples revealed both abrasive and adhesive wear on the contact surfaces of the specimens, aiding in understanding the wear mechanisms in the composites. © The Institution of Engineers (India) 2024.Item Prediction of Remaining Useful Life in MEMS Devices Using a Stacking Model Approach(Institute of Electrical and Electronics Engineers Inc., 2025) Sanjay, M.; Kumar, R.S.Accurate estimation of the Remaining Useful Life (RUL) of Micro-Electro-Mechanical Systems (MEMS) devices is essential for enhancing predictive maintenance in industrial settings. This paper proposes a robust stacking ensemble model for Remaining Useful Life (RUL) prediction of MEMS devices, integrating sensor and mechanical component data. Publicly available RUL datasets were augmented using Generative Adversarial Networks (GANs), ensuring diverse input data. Key algorithms-Bayesian Ridge, Random Forest, and XGBoost-were identified using Lazy Predict and combined with a Support Vector Regressor (SVR) as the meta-learner. Hyperparameter optimization was performed using the Deep Deterministic Policy Gradient (DDPG) algorithm, offering enhanced efficiency for large datasets and dynamic retraining. The model demonstrated superior performance based on RMSE and R2 metrics compared to traditional methods. Deployment was achieved via a Flask web application integrated with a CI/CD pipeline using GitHub Actions and Docker, ensuring scalability and reproducibility. This research contributes a scalable and efficient framework for advancing predictive maintenance in industrial automation. © 2025 IEEE.Item Review of Slope Stability Analysis under Drawdown Conditions for Mine Slopes(World Researchers Associations, 2025) Perumalla, R.; Kumar, R.S.; Govindaraj, M.The slope steadiness is influenced by slope configuration, material characteristics and the applied forces interim both internally and externally. These forces encompass the impact of water internally through pore water pressure, seepage forces and externally through hydrostatic and hydrodynamic effects. Examining the slope under various levels of submergence and drawdown illustrates the significant influence of water on slope stability. The presence of water develops effective water pressure in open pit slopes which is more concerned for slope pit designer and geotechnical engineers. This study tried to discuss about the influence of drawdown and rapid drawdown conditions for a mine slope stability in the light of slope stability studies under hydrogeological characteristics. This study includes preliminary generalities considered for drawdown conditions like soil properties, hydraulic properties and drawdown phenomenon. © 2025, World Researchers Associations. All rights reserved.Item ZigBee based Real Time System for Environmental Parameters Monitoring in Model Mine: An Experimental Study(World Researchers Associations, 2025) Naik Anil, S.; Kumar, R.S.; Raj, M.G.The global mining industry, known for extracting valuable minerals like coal, iron ore, gold, silver, copper and zinc, primarily operates through underground mining. These underground mine environments are influenced by various environmental factors including toxic and flammable gases, increased carbon dioxide (CO2) levels and decreased oxygen (O2) concentrations. These factors significantly impact the productivity and safety of mine workers, making monitoring harmful gases crucial. Various methods exist to measure gas concentrations and respond appropriately when these levels exceed safe thresholds. However, each method has its own set of limitations. In underground mines, wireless monitoring systems are essential to monitor environmental parameters in real time. This study focuses on the assessment of ZigBee-based wireless techniques for their application in underground mines. The developed ZigBee wireless communication system was tested and validated at the surface level and in a model mine laboratory at the Mining Engineering Department of the National Institute of Technology Karnataka (NITK), Surathkal, India. This laboratory replicates an underground mine setting. The ZigBee-based system is designed to wirelessly monitor environmental parameters. Experiment results suggest that the ZigBee network is suitable for real-time monitoring of environmental conditions in underground mines. Further details regarding the functioning, effectiveness and potential applications of the ZigBee-based system in underground mining are discussed in the study. © 2025, World Researchers Associations. All rights reserved.
