Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
13 results
Search Results
Item Mechanical Characterization and Finite Element Analysis of Jute-Epoxy Composite(EDP Sciences edps@edpsciences.com, 2018) Sangamesh, R.; Kumar, N.; Ravishankar, K.S.; Kulkarni, S.M.Natural fiber composite materials are such an appropriate material, that replaces synthetic composite materials for many of practical applications where we need high strength and low density. Natural fiber composites combine the technological, ecological and economical aspects. This leads to discovering its vast applications in the aeronautics, automotive, marine and sporting sectors. This paper deals with the study on mechanical characterization (Tensile, Compression and Flexural) of jute/epoxy (JE) polymer composite. The flexural properties of composites are experimentally tested and are simulated in commercially available FEA software. Flexural tested results are in good agreement with FEA results. Scanning electron microscopy (SEM) analysis of the failed samples reveals the matrix dominated failure. © The Authors, published by EDP Sciences, 2018.Item Multilayer Technique to Secure Data Transfer in Private Cloud for SaaS Applications(Institute of Electrical and Electronics Engineers Inc., 2020) Ghuge, S.; Kumar, N.; Savitha, S.; Suraj, V.In recent times Cloud Computing[CC] has emanated as a substitute paradigm for hosting and providing services over the Internet. Software as a Service (Saas) is one among such services that deliver services to the end-users on pay-as-you-go manner. In spite of all its advantages, security always seems to be major drawback. For securing the users' data on the cloud, this paper proposes an application model for any SaaS application hosted on a private cloud environment. The application is divided into two micro-services, where the first one is Application Layer Firewall and second one is a secured application to login and send sensitive data. The application layer firewall checks for any malicious activity and prevents the intruder to access the features present in the application. Subsequently, a Hidden Markov Model layer is implemented which is a probability-based intrusion detection technique. The second micro-service uses Advanced Encryption Standard (AES) encryption algorithm to encrypt documents having sensitive data, which have to be transferred within the private cloud. Further security is provided by proposing a novel Video Steganography approach using the Least Significant Bit (LSB) technique. This paper gives a detailed structure of hiding the data using multiple levels of security. Thus, this paper provides a holistic approach to implement a high level of security in SaaS applications. © 2020 IEEE.Item Deep Neural Network Models for Detection of Arrhythmia based on Electrocardiogram Reports(Institute of Electrical and Electronics Engineers Inc., 2020) Ghuge, S.; Kumar, N.; Shenoy, T.; Kamath S․, S.Electrocardiogram (ECG) is an indicative technique using which the heartbeat time series of a patient is recorded on the moving strip of paper or line on the screen, for irregularity analysis by experts, which is a time-consuming manual process. In this paper, we proposed a deep neural network for the automatic, real-time analysis of patient ECGs for arrhythmia detection. The experiments were performed on the ECG data available in the standard dataset, MIT-BID Arrhythmia database. The ECG signals were processed by applying denoising, detecting the peaks, and applying segmentation techniques, after which extraction of temporal features was performed and fed into a deep neural network for training. Experimental evaluation on a standard dataset, using the evaluation metrics accuracy, sensitivity, and specificity revealed that the proposed approach outperformed two state-of-the-art models with an improvement of 2-7% in accuracy and 11-16% in sensitivity. © 2020 IEEE.Item Peer Consonance in Blockchain based Healthcare Application using AI-based Consensus Mechanism(Institute of Electrical and Electronics Engineers Inc., 2020) Kumar, N.; Parangjothi, C.; Guru, S.; Manjappa, M.The term 'Blockchain', commonly referred to as the brain behind the Bitcoin network, works on the simple principle of the presence of a distributed and decentralized ledger in a public or private network. Since blockchain is decentralized, it is the duty of the Consensus Algorithm to substantiate the details in the blockchain. Traditional consensus algorithms such as Proof of Work (PoW) and Proof of Stake (PoS), although widely used, are a matter of concern due to computationally expensive operations and convergence towards a monopolized system respectively. Though optimizations of PoW and PoS algorithms were subsequently introduced, their features precincts. This paper aims to provide a solution by presenting a consensus algorithm based on Artificial Intelligence (AI) technology while maintaining the fairness of the system. A Healthcare based system was set up on top of the blockchain network to generate the dataset about the miners in order to train our neural network. On the whole, it incorporated the advantages of the state of the art consensus models which can increase the efficiency of the healthcare industry while diminishing their demerits. © 2020 IEEE.Item Vibration control of beam with magnetic rotating unbalance(American Institute of Physics Inc. subs@aip.org, 2020) Kumar, N.; Joladarashi, S.; Gangadharan, K.V.; Vivek, R.S.Vibration has been one of the important areas of concern while designing structure due to rotating unbalance. However, vibration control is still an active issue and reducing the vibration due to rotating unbalance is a challenging task. Here an innovating balancing process is proposed which greatly give the damping to the beam which is having rotating magnetic unbalance. In the present experimental study, magnetic rotating unbalance is mounted on a cantilever beam resulting in beam deflection due to rotating unbalance of the beam. Also, the beam deflection causes the fixed end of cantilever beam to induce more force which in turn causes more stresses. For the controlling of vibration, another rotating magnetic unbalance is mounted at the opposite side of first unbalance. Based on the equal and opposite force cancellation and magnetic properties of magnet, the experimental study is done in which data is collected with accelerometer and force transducer. For the first mode shape amplitude of beam and force transmitted to the fixed end are reduced satisfactory. With this approach without any controller the amplitude of vibration is reduced up to 96.60% and force transmitted to the fix end reduced up to 75%. © 2020 Author(s).Item Three-layer security for password protection using rdh, aes and ecc(Springer, 2021) Kumar, N.; Ghuge, S.; Jaidhar, C.D.In this work a three-layer password protection approach is proposed by utilizing Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC) and Reversible Data Hiding (RDH). RDH is a sort of data concealing approach whereby the host image can be recuperated precisely. The proposed approach was implemented and evaluated by considering various images. Results have been presented by calculating Peak Signal to Noise Ratio (PSNR) and Rate. Obtained experimental results demonstrate the effectiveness of the proposed approach. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021.Item Program Slicing Analysis with KLEE, DIVINE and Frama-C(Institute of Electrical and Electronics Engineers Inc., 2021) Kumar, N.; Neema, S.; Das, M.; Mohan, B.R.Optimizing the Time complexity of any program is still the most researched and sought area for researchers. At the industry level, the Software execution timing is the dominant criteria for Workload selection. One prominent method for reducing the Time complexity of a program is by using program slicing configuration, without affecting the program flow. Program slicing is the process of slicing a program in such a way that it reduces the time of debugging. This paper presents a timed-based analysis of a program with and without slicing with the help of different verification tools, namely KLEE, DIVINE, and Frama-C. This paper aims to compare these tools based on the timing of debugging and validity of a program before and after slicing. © 2021 Chinese Automation and Computing Society in the UK-CACSUK.Item Improved Variable Round Robin Scheduling Algorithm(Institute of Electrical and Electronics Engineers Inc., 2021) Mangukia, A.; Ibrahim, M.; Golamudi, S.; Kumar, N.; Anand Kumar, M.The scheduling strategy used has an impact on system efficiency. It assigns processes in a specified order in order to improve those functions. The Round Robin method is one of several types of scheduling algorithms. In Round Robin, each process is allotted a time quantum (TQ), which indicates that each process consumes the same amount of time as the other processes. There is no precedence among the functions, and the CPU has a relatively short response time. The Time Quantum value cannot be too small because the number of context shifts will increase and hamper performance, while a Time Quantum value that is too large will harm the ART. The suggested study focuses on making the Round Robin approach more practical and efficient. © 2021 IEEE.Item Deepfake Image Detection using CNNs and Transfer Learning(Institute of Electrical and Electronics Engineers Inc., 2021) Kumar, N.; Pranav, P.; Nirney, V.; Geetha, V.Headways in deep learning has enabled the creation of fraudulent digital content with ease. This fraudulent digital content created is entirely indistinguishable from the original digital content. This close identicalness has what it takes to cause havoc. This fraudulent digital content, popularly known as deepfakes having the potential to change the truth and decay faith, can leave impressions on a large scale and even our daily lives. Deepfake is composed of two words, the first being deep: deep learning and the second being fake: fake digital content. Artificial intelligence forming the nucleus of any deepfake formulation technology empowers it to dodge most of the deepfake detection techniques through learning. This ability of deepfakes to learn and elude detection technologies is a matter of significant concern. In this research work, we focus on our efforts towards the detection of deepfake images. We follow two approaches for deepfake image detection, and the first is to build a custom CNN based deep learning network to detect deepfake images, and the second is to use the concept of transfer learning. © 2021 IEEE.Item An Image Transmission Technique using Low-Cost Li-Fi Testbed(Institute of Electrical and Electronics Engineers Inc., 2021) Salvi, S.; Geetha, V.; Maru, H.; Kumar, N.; Ahmed, R.Visible Light Communication (VLC) or Light Fidelity (Li-Fi) with Light Emitting Diodes (LEDs) as transmitter and light sensor as receiver will turn the present lightening system into a communication system. Li-Fi based data communication provides secure communication within the luminous coverage of the light source. Thus, it has several applications in places where Radio Frequency interference is not desirable. Similar to other wireless communication techniques even Li-Fi is used for transmission and reception of digital data. Li-Fi system can also be used to transfer images from one device to another. In this paper, a preliminary study is discussed by proposing and implementing an encoding and decoding scheme for transmission of the binary image using Li-Fi. The proposed system is evaluated based on the light intensity, distance, accuracy, size of the image, image resolution, and transmission time. © 2021 IEEE.
