Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 10 of 12
  • Item
    Effect of Rolling Reduction on Microstructure and Mechanical Properties Cu-3%Ti Alloy
    (Pleiades journals, 2019) Singh, P.; Ramesh, S.; Anne, G.; Shivananda Nayaka, H.
    Cu-3%Ti alloy is cold rolled with different reduction ratios and the microstructures and mechanical properties are compared with that of as-cast Cu-3%Ti alloy. Microstructure was analyzed using optical microscope and scanning electron microscope. Optical microscopy revealed significant grain refinement that occurred during the rolling process. Tensile test results indicate that the UTS is increased by a significant amount up to 80% rolling reduction. A significant amount of tensile strength increased up to 812 MPa is about 1.69 times that of the cast Cu-3%Ti alloy. Hardness of the rolled Cu-3%Ti increased as % reduction increased. Dimples were revealed on the fracture surface of the rolled Cu-3%Ti specimens indicating a ductile nature of the fracture. © 2019, Springer Nature Singapore Pte Ltd.
  • Item
    Physicochemical characterization of microcrystalline cellulose extracted by sequential dual acid hydrolysis
    (Elsevier, 2024) Kalita, R.D.; Chakraborty, I.; Singh, P.; Banik, S.; Mal, S.S.; Zhuo, G.-Y.; Mazumder, N.
    Properties and applications of microcrystalline cellulose (MCC) differ based on its source and method of extraction. In this article, MCC was extracted from Saccharum spontaneum using single acid hydrolysis (MCC1) and sequential dual acid hydrolysis (MCC2). Scanning electron microscope (SEM) images exhibited that the dimension of MCC2 is much smaller compared to MCC1. X-ray diffraction (XRD) indicated that sequential dual acid hydrolysis results in decrease the crystallinity index (CI%) in case of MCC2 (34.45%). Fourier transform infrared spectroscopy (FTIR) spectra indicates the presence of characteristic bonds such as O–H stretching, C–H stretching, OH bending, and C–O–C stretching in both MCC1 and MCC2. Based on thermal analysis conducted using differential scanning calorimetry (DSC) and thermogravimetric analysis (TGA), it was confirmed that MCC2 (275.0°C) melts at much lower temperature compared to MCC1 (342.04°C). MCC2 is also less thermally stable compared to MCC1 in terms of mass loss (%). In all, both MCC1 and MCC2 have different physicochemical properties based on the process of extraction and may have different applications. Based on their physicochemical characteristics, smaller MCC particles are known to be favored for wide variety of applications such as pharmaceutical excipients and impact factors such as tablet hardness, friability, and disintegration. © 2024 Elsevier Inc. All rights are reserved including those for text and data mining AI training and similar technologies.
  • Item
    Performance comparison of executing fast transactions in bitcoin network using verifiable code execution
    (IEEE Computer Society help@computer.org, 2013) Singh, P.; Chandavarkar, B.R.; Arora, S.; Agrawal, N.
    In this paper, we study Bitcoin network for electronic cash transactions, and compare the extension to the BTCs network which inculcates provision of executing fast transactions with greater security and assurance with the former method of Proof-Of-Work for executing transactions. Above milestones are achieved by introducing the concepts of mutual trust and verifiable code execution between the payer and the payee in the network. Our work proposes a significant modification of the Pioneer model to provide a two-party trust framework for Bitcoin transactions; considerably faster compared to the generic trust platform of Bitcoin networks based on slow proof-of-work. The scheme proposed can promote the use of Bitcoin transactions in real life scenarios, where fast transactions are desirable due time constraints between the payment and the service. © 2013 IEEE.
  • Item
    Adaptive Selection of Cryptographic Protocols in Wireless Sensor Networks using Evolutionary Game Theory
    (Elsevier B.V., 2016) Arora, S.; Singh, P.; Gupta, A.J.
    Game theory applies to scenarios wherein multiple players with contrary motives contend with each other. Various solutions based on Game theory have been recently proposed which dealt with security aspects of wireless sensor networks (WSNs). However, the nodes have limited capability of rationality and evolutionary learning which makes it unfavorable to apply conventional game theory in WSNs. Evolutionary Game Theory (EGT) relies on bounded rationality assumption which is in harmony with the wireless sensor networks characteristics. Based on EGT, authors propose an adaptive security model for WSNs for the selection of cryptographic protocols during runtime. The authors formulate this selection in WSNs with the help of an evolutionary game to obtain the evolutionarily stable strategy (ESS) for the system. In this model, the sensor nodes dynamically adapt their defensive strategies to attain the most efficient defense, corresponding to the attackers' varied strategies. Further, the simulations convey that the proposed system converges rapidly to the Evolutionary Stable Strategy. Not only the system converges, but also forms a stable system which was verified by deliberately destabilizing the system. Results show that the nodes quickly return to ESS even after perturbation. © 2016 The Authors.
  • Item
    Adaptive Selection of Cryptographic Protocols in Wireless Sensor Networks using Evolutionary Game Theory
    (Elsevier B.V., 2016) Arora, S.; Singh, P.; Gupta, A.J.
    Game theory applies to scenarios wherein multiple players with contrary motives contend with each other. Various solutions based on Game theory have been recently proposed which dealt with security aspects of wireless sensor networks (WSNs). However, the nodes have limited capability of rationality and evolutionary learning which makes it unfavorable to apply conventional game theory in WSNs. Evolutionary Game Theory (EGT) relies on bounded rationality assumption which is in harmony with the wireless sensor networks characteristics. Based on EGT, authors propose an adaptive security model for WSNs for the selection of cryptographic protocols during runtime. The authors formulate this selection in WSNs with the help of an evolutionary game to obtain the evolutionarily stable strategy (ESS) for the system. In this model, the sensor nodes dynamically adapt their defensive strategies to attain the most efficient defense, corresponding to the attackers' varied strategies. Further, the simulations convey that the proposed system converges rapidly to the Evolutionary Stable Strategy. Not only the system converges, but also forms a stable system which was verified by deliberately destabilizing the system. Results show that the nodes quickly return to ESS even after perturbation. © 2016 The Authors.
  • Item
    Hybrid Approach for Intrusion Detection System
    (Institute of Electrical and Electronics Engineers Inc., 2018) Singh, P.; Venkatesan, M.
    In the recent research, Intrusion Detection sys- tem in Machine Learning has been giving good detection and high accuracy on novel attacks. The major purpose of this study is implementing a method that combines Random-Forest classification technique and K-Means clustering Algorithms. In misuse-detection, random-forest algorithm will build a patterns of intrusion over a training data. And in anomaly-detection, intrusions will be identified by the outlier-detection mechanism in the random-forest algorithm. This hybrid-detection system will combine the advantage of anomaly and mis-use detection and improves the performance of detection. This paper mainly focused on evaluating the performance of hybrid approaches namely Gaussian Mixture clustering with Random Forest Classifiers and K-Means clustering with Random Forest Classifiers in-order to detect intrusion. These algorithms were evaluated for the four categories of attacks based on accuracy, false-alarm-rate, and detection-rate. From our experiments conducted, K-Means clustering with Random Forest Classifiers outperformed over the Gaussian Mixture clustering with Random Forest Classifiers. © 2018 IEEE.
  • Item
    Advanced Microscopic Visualization for Structural Characterization of Cellulose Extracted from Saccharum Spontaneum (Kohua Bon) of Assam, India
    (Optica Publishing Group (formerly OSA), 2021) Chakraborty, I.; Kalita, R.D.; Singh, P.; Banik, S.; Govindaraju, I.; Mal, S.S.; Zhuo, G.-Y.; Mahato, K.K.; Mazumder, N.
    Alpha, microcrystalline and nanocrystalline cellulose were sequentially extracted from stems and leaves of Saccharum spontaneum and were subjected to morphological and structural characterization using advanced microscopy techniques, including Scanning electron microscopy and nonlinear optical microscopy. © Optica Publishing Group 2021, © 2021 The Author (s)
  • Item
    The DISPLACE Challenge 2023 - DIarization of SPeaker and LAnguage in Conversational Environments
    (International Speech Communication Association, 2023) Baghel, S.; Ramoji, S.; Sidharth; Ranjana, H.; Singh, P.; Jain, S.; Chowdhuri, P.R.; Kulkarni, K.; Padhi, S.; Vijayasenan, D.; Ganapathy, S.
    In multilingual societies, social conversations often involve code-mixed speech. The current speech technology may not be well equipped to extract information from multi-lingual multispeaker conversations. The DISPLACE challenge entails a first-of-kind task to benchmark speaker and language diarization on the same data, as the data contains multi-speaker conversations in multilingual code-mixed speech. The challenge attempts to highlight outstanding issues in speaker diarization (SD) in multilingual settings with code-mixing. Further, language diarization (LD) in multi-speaker settings also introduces new challenges, where the system has to disambiguate speaker switches with code switches. For this challenge, a natural multilingual, multi-speaker conversational dataset is distributed for development and evaluation purposes. The systems are evaluated on single-channel far-field recordings. We also release a baseline system and report the highlights of the system submissions. © 2023 International Speech Communication Association. All rights reserved.
  • Item
    Light-weight Deep Learning Model for Cataract Detection using Novel Activation Function
    (Institute of Electrical and Electronics Engineers Inc., 2023) Singh, P.; Naveen, B.; Mohapatra, A.R.; Annappa, B.; Dodia, S.
    In cataracts, the natural lens behind the iris and pupil is cloudy, which causes light passing through it to be distorted or blocked, causing blurry or dim vision. About 50% of all cases of blindness worldwide is caused by cataract, according to WHO and the National Library of Medicine. A timely diagnosis of cataracts can help prevent vision loss and other disease-related complications. Several recent developments in machine learning have significantly impacted medical science. However, most existing approaches for cataract detection are based on traditional machine learning techniques. There have been a few attempts to use deep learning in recent years; the models have delivered decent outcomes but require much computational power. Reducing ophthalmologists' time can improve patient outcomes, increase access to care, lower costs, address workforce shortages, and improve healthcare efficiency. It allows ophthalmologists to see more patients and provide more accurate, timely diagnoses and treatments. Using lightweight deep learning algorithms, this paper proposes a solution that delivers rapid and precise results without requiring high-end hardware. A novel activation function is also proposed that significantly improved the performance. The proposed model is a lightweight one that achieved 95.8% accuracy using only 16,874 parameters. © 2023 IEEE.
  • Item
    The Second DISPLACE Challenge: DIarization of SPeaker and LAnguage in Conversational Environments
    (International Speech Communication Association, 2024) Kalluri, S.B.; Singh, P.; Roy Chowdhuri, P.; Kulkarni, A.; Baghel, S.; Hegde, P.; Sontakke, S.; Deepak, K.T.; Mahadeva Prasanna, S.R.; Vijayasenan, D.; Ganapathy, S.
    The DIarization of SPeaker and LAnguage in Conversational Environments (DISPLACE) 2024 challenge is the second in the series of DISPLACE challenges, which involves tasks of speaker diarization (SD) and language diarization (LD) on a challenging multilingual conversational speech dataset. In the DISPLACE 2024 challenge, we also introduced the task of automatic speech recognition (ASR) on this dataset. The dataset containing 158 hours of speech, consisting of both supervised and unsupervised mono-channel far-field recordings, was released for LD and SD tracks. Further, 12 hours of close-field mono-channel recordings were provided for the ASR track conducted on 5 Indian languages. The details of the dataset, baseline systems and the leader board results are highlighted in this paper. We have also compared our baseline models and the team's performances on evaluation data of DISPLACE-2023 to emphasize the advancements made in this second version of the challenge. © 2024 International Speech Communication Association. All rights reserved.