Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 10 of 32
  • Item
    Industrial wastewater treatment using bioelectrochemical systems and the potential for energy recovery
    (Elsevier, 2022) Kumar, M.; Sinharoy, A.; Uddandarao, U.; Singh, K.S.
    Energy crises and environmental pollution are predicted to be among the major global problems in the 21st century. Over past centuries, massive increase in human population and industrial development has resulted in energy crises, global climate change, environmental degradation, and associated health problems. Therefore, the greatest challenge for researchers is to find alternative sources of energy and means to prevent and reduce environmental degradation, due to which, biotechnological products and processes using renewable resources have gained attention during recent times. In this context, bioelectrochemical systems (BESs) have the potential to provide solutions for simultaneous wastewater treatment and resource recovery in the form of bioenergy and other value added products. Both types of BES, viz., microbial fuel cell and microbial electrolysis cell, are capable of treating wastewater generated from a variety of industrial sources and producing energy (electricity, hydrogen, methane) as well as recovering other resources such as biomass, heavy metals, nutrients (nitrogen, phosphate), and minerals. This chapter is focused on providing a detailed overview of different BESs, more particularly, MFCs used for treatment of industrial wastewater, and the potential for bioenergy production. © 2023 Elsevier Inc. All rights reserved.
  • Item
    Study of Effect of Process Parameters on Mechanical Properties of Build Parts Using Fused Deposition Modeling: Medical Application
    (CRC Press, 2025) Choudhary, N.; Kumar, M.; Rajput, V.S.
    Three-dimensional (3D) printing technology has become increasingly important in producing economic products at a faster rate in many industries. Fused deposition modeling (FDM) is an efficient 3D printing technique designed to create functional, customized parts with no tooling required. Despite having various advantages, FDM still faces challenges in building parts. It is due to various process variables, including build direction, layer height, air gap, raster angle, infill type, and percentages. These affect mechanical behavior, parts’ quality, dimensional accuracy, and process time. It is crucial to understand the properties and the impact of various process variables in a printing material based on the intended use. However, this task is complicated due to the numerous combinations of materials, slicing software, and process parameters. This chapter focuses on gathering the information associated with mechanical research for different polymers at various process behaviors based on potential applications. This chapter will examine the work that has been done till now to refine the process variables for FDM and create samples utilizing different composite materials. Additionally, the chapter will introduce optimization methods, and algorithms that can be used for optimization of parameters based on mathematical equations for different output responses. Overall, the chapter presents FDM process parameters and optimization techniques. © 2026 selection and editorial matter, Anshuman Kumar Sahu and Siba Sankar Mahapatra; individual chapters, the contributors.
  • Item
    Capturing important information from an audio conversation
    (Institute of Electrical and Electronics Engineers Inc., 2017) Roshan, S.; Vinay Kumar, S.; Kumar, M.
    A conversation between people can involve exchange of important information. Often in an ongoing conversation, someone has to manually keep on taking notes of important points. This is a tedious process and can involve errors. In today's era of technology, there is a need for an automated process for extracting important information from a conversation, with minimal manual efforts. In this paper, we propose methods of transcribing a conversation between two people. We will consider two major modes of conversation-when the conversation is happening over a phone call, and when the conversation is happening in person. In addition to transcribing a conversation, this paper will also suggest ways to extract important parts of a conversation. We will extract important information from a conversation, using three different approaches-noun phrase extraction, named entity extraction and open information extraction method. Since current mobile operating systems provide limited support for transcribing a phone call, we will suggest ways of transcribing a call, and extracting important information from it. © 2017 IEEE.
  • Item
    Project spear: Reporting human trafficking using crowdsourcing
    (Institute of Electrical and Electronics Engineers Inc., 2017) Roshan, S.; Vinay Kumar, S.; Kumar, M.
    Human trafficking is a severe crime which is prevailing in the society. It is hard to track and report incidents of human trafficking to the concerned authorities, due to the complex nature of this crime. This paper introduces a crowdsourcing approach to report incidents of human trafficking, using a mobile application. Crowdsourcing is the practice of obtaining information from a large number of people. Information about human trafficking incidents reported using this mobile application is forwarded to the concerned authorities of the country where the crime has been reported. A user can also upload crime scene photos and provide details of the crime location using Global Positioning System. The mobile application introduced in this paper currently focuses on top ten countries which have the highest rates of human trafficking in the world, while very basic support for the rest of the countries. Since the process of reporting human trafficking incidents to the authorities can be complex, time consuming and dangerous, the mobile application allows users to stay anonymous. The aim of this mobile application is to create huge impact in the fight against human trafficking, by using the collective power of the crowd to report incidents of human trafficking. Also, a section of the mobile application is dedicated to educating the user about basic knowledge of human trafficking, its types and measures taken by various governments to fight against it. © 2017 IEEE.
  • Item
    Performance evaluation of web browsers in iOS platform
    (Institute of Electrical and Electronics Engineers Inc., 2017) Roshan, S.; Vinay Kumar, S.; Kumar, M.
    The number of mobile users have grown tremendously in the past few years. Nowadays, mobile phones are not just used for the purpose of making calls, rather they have become an important modern gadget which helps people in various aspects of their lives. With this increase, a lot of time on mobile is spent in browsing the internet websites through mobile web browsers. Hence, mobile web browsers actually play an important role in the mobile market, and in the lives of the users. In this paper, we have analyzed the performance of six web browsers present in the iOS platform. These web browsers are selected based on their market share in the iOS platform and their popularity. We have evaluated them on different parameters such as browser features, speed, security, performance benchmark tests, plugin support and video streaming. We propose the best web browser based on each parameter used for performance evaluation. Also, we recommend the best web browser based on the overall performance evaluation. © 2017 IEEE.
  • Item
    Study on fracture toughness of carbon-carbon composites at low temperatures
    (Elsevier Ltd, 2022) Sunil Kumar, B.V.S.; Neelakantha, N.V.; Kumar, M.; Lokesha, M.; Vasantha Kumar, S.N.; Surendranathan, A.O.
    Carbon-carbon composites (C-CC), employed as composites in space and other industries for their outstanding properties. In extreme temperatures, the C-CC has proved to be the most efficient material. C-CC is one of the top thermal quality high-temperature materials such as high-temperature stability, excellent thermal conductivity, and low-temperature expansion coefficients. C-CC brake disks are highly demanded in aviation, trains, trucks, even race vehicles. Although C-CC is normally utilized at very high service temperatures, recently it has been necessary to explore these in low-temperature circumstances as components must also pass through low-temperature conditions in modern applications. In developing engineering structures, materials and systems for their technical safety, durability, and reliability, fractures and damage prevention and evaluation have an important role to play. Fracture toughness means quantifying the resistance of the fracture when a crack occurs. The present experimental study explores the influence of low temperature on the fracture toughness of C-CC. The low temperatures test of the samples has been done at a temperature between -10 °C and -40 °C. The results demonstrate that the fracture toughness value consistently raised as the temperature dropped. The Fluctuation began at a -10 °C from 2 % with a forecast of -40 °C to 32 %. © 2022 Elsevier Ltd. All rights reserved.
  • Item
    Machine Learning-Based Technique for Phishing URLs Detection from TLS 1.2 and TLS 1.3 Traffic Without Decryption
    (Springer Science and Business Media Deutschland GmbH, 2023) Kumar, M.; Pais, A.R.; Rao, R.S.
    Phishing is one of the major leading cyberattack leading to huge financial loss and sensitive information loss such as account information, card details, password, login credentials. Existing techniques for phishing URL detection are unable to efficiently classify them. The use of TLS 1.2 and TLS 1.3 for client/server applications to communicate over the Internet securely has also contributed to the increase in these attacks. TLS 1.2 and TLS 1.3 traffic is encrypted, so detecting phishing URLs from encrypted traffic without decryption is a challenging task. In this paper, a machine learning (ML)-based technique is proposed for the detection of phishing URLs from encrypted traffic. The features are extracted from TLS 1.2 and TLS 1.3 traffic and based on the extracted features URLs are classified using ML algorithms. The dataset has been prepared for legitimate and phishing sites based on the features extracted from TLS 1.2 and TLS 1.3 traffic. Based on the experimental results, it is observed that the proposed model achieved promising results in the detection of phishing URLs from the encrypted traffic with an accuracy of 89.6%. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
  • Item
    Machine learning models for phishing detection from TLS traffic
    (Springer, 2023) Kumar, M.; Kondaiah, C.; Pais, A.R.; Rao, R.S.
    Phishing is a fraudulent tactic for attackers to obtain victims personal information, such as passwords, account details, credit card details, and other sensitive information. Existing anti-phishing detection methods using at the application layer and cannot be applied at the transport layer. A novel machine learning (ML) based phishing detection technique from transport layer security (TLS) 1.2 and TLS 1.3 encrypted traffic without decryption is proposed in this paper. Our proposed model detects phishing URLs at the transport layer and classifies them as legitimate or phishing. The features are extracted from TLS 1.2 and TLS 1.3 traffic, and phishing detection is performed using ML algorithms based on the extracted features. The datasets for legitimate and phishing sites are created using features derived from TLS 1.2 and TLS 1.3 traffic. According to the experimental results, the proposed model effectively detects phishing URLs in encrypted traffic. The proposed model achieves an accuracy of 93.63% for Random Forest (RF), 95.07% for XGBoost (XGB), and the highest accuracy of 95.40% for Light GBM (LGBM). © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
  • Item
    Optimization of WDM lightwave systems (BAC) design using error control coding
    (Academic Press Inc., 2007) Mruthyunjaya, H.S.; Umesh, G.; Kumar, M.
    In a binary asymmetric channel (BAC) it may be necessary to correct only those errors which result from incorrect transmission of one of the two code elements. In optical fiber multichannel systems, the optical amplifiers are critical components and amplified spontaneous emission noise in the optical amplifiers is the major source of noise in it. The property of erbium doped fiber amplifier is nearly ideal for application in lightwave long haul transmission. We investigate performance of error correcting codes in such systems in presence of stimulated Raman scattering and amplified spontaneous emission noise with asymmetric channel statistics. Performance of some best known concatenated coding schemes is reported. © 2006 Elsevier Inc. All rights reserved.
  • Item
    Concatenated Error Control Coding Applied to WDM Optical Communication Systems for Performance Enhancement
    (International Academy of Microwave and Optical Technology (IAMOT), 2007) Mruthyunjaya, H.S.; Umesh, G.; Kumar, M.
    Long haul incoherent optical multichannel communication systems employing N * N Wavelength Division Multiplexing (WDM) in presence of Stimulated Raman Scattering (SRS) and other receiver noises including channel and Amplified Spontaneous Emission (ASE) beat noises is analyzed. Concatenated error control coding techniques are employed to counter system degradation due to these limiting factors. It is shown that the Bit Error Rate (BER) of the order of 10-9 can be achieved for large values of N (=270) at link length of 200km without crossing SRS threshold of 1dB. Also power penalty due to multiplexer crosstalk effectively comes down from 5.5dB to 0.14dB for a 64 channel WDM system. © 2007 ISRAMT. All Rights Reserved.