Time filter

Source Type

Ghandinagar, India

Dhirubhai Ambani Institute of Information and Communication Technology , is a technological university located in Gandhinagar, Gujarat, India. It is named after the Gujarati entrepreneur and Reliance group founder Dhirubhai Ambani. It is run by the Dhirubhai Ambani Foundation and is promoted by the Anil Dhirubhai Ambani Group.DA-IICT began admitting students in August 2001, with an intake of 240 undergraduate students for its Bachelor of Technology program in Information and Communication Technology . Since then, it has expanded to include postgraduate courses such as Master of Technology in ICT, Master of Science in Information Technology, Master of Science , Master in Design , a five year dual degree programme, along with a Doctorate programme. The Bachelors programme is of four-year duration. The first batch of DA-IICT of post graduates passed out in 2004 and the first batch of graduates in 2005. Wikipedia.

Raut M.K.,Dhirubhai Ambani Institute of ICT
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

The algorithm to compute prime implicates and prime implicants in modal logic has been suggested in [1]. In this paper we suggest an incremental algorithm to compute the prime implicates of a knowledge base KB and a new knowledge base F from Π(KB)∈ F in modal logic, where Π(KB) is the set of prime implicates of KB and we also prove the correctness of the algorithm. © 2014 Springer International Publishing Switzerland. Source

Das M.L.,Dhirubhai Ambani Institute of ICT
Cryptologia | Year: 2011

Over the years, several identity-based signature schemes using bilinear pairings have been proposed, but most of them suffer from key escrow problems and require a secure channel during the private key issuance stage. In this paper, we present an identity-based signature scheme variant using bilinear pairings. We use a binding-blinding technique to eliminate key escrow problems and to avoid using a secure channel in the key issuance stage. We then extend the proposed scheme to a multi-signature scheme. We show that both schemes are secure against chosen message attacks. © Taylor & Francis Group, LLC. Source

Ghosh R.,Dhirubhai Ambani Institute of ICT
International Journal of Remote Sensing | Year: 2014

This research paper focuses on the spatio-temporal coupling of monsoon rainfall with land-surface and energy balance parameters, which are important for understanding hydrological, climatological, and agricultural aspects at local, regional, and global scales. The dynamics of land-surface and energy balance parameters influence summer monsoon over India. Time scales of the land-surface response to monsoon forcing are different for different land-surface conditions due to different physical processes governing the land-surface-atmosphere exchange through energy balance components. A synergy of satellite data from the Moderate Resolution Imaging Spectroradiometer (MODIS) (0.05° × 0.05°) for obtaining land-surface and energy balance parameters, and the Atmospheric Infrared Sounder (AIRS) (1° × 1°) for obtaining atmospheric parameter and gridded rainfall data (1° × 1°) from the Indian Meteorological Department (IMD) during June to September for three consecutive years (2009-2011) representing low to normal rainfall, were used to develop a coupling model in the spatio-temporal domain. Surface energy fluxes were estimated using a surface energy balance model by partitioning available energy at the surface into latent heat flux (LE) and sensible heat flux (H) through the evaporative fraction (EF) concept of a 2D land-surface temperature (LST)-albedo scatter plot. The coupling models were based on statistical methods developed at both temporal and spatial scales to explain the linking of various parameters with monsoon rainfall. A significant positive relationship was obtained between rainfall and land-surface parameters such as normalized difference vegetation indices (NDVIs), and soil wetness/energy balance parameters such as LE and EF, whereas a strong negative relationship was obtained between rainfall and surface radiation parameters (LST and albedo)/energy balance parameters such as soil heat flux (G) and net radiation (Rn). This approach has demonstrated its simplicity with remote sensing technology and could identify 'at risk' regions at spatio-temporal scales based on coupling models. © 2013 © Taylor & Francis. Source

Mulherkar J.,Dhirubhai Ambani Institute of ICT
International Journal of Quantum Information | Year: 2016

We study the classical and entanglement-assisted capacity of a forgetful quantum memory channel that randomly switches between two qubit depolarizing channels. We show that when the input consists of two qubits then depending on channel parameters either the maximally entangled input states or product input states achieve the two-use classical capacity. We conjecture that as the number of input qubits is increased the classical capacity approaches the product state capacity for all values of the parameters. We also derive an expression for the entanglement-assisted classical capacity of this quantum memory channel in terms of the entropy rate of a Markov chain. © 2016 World Scientific Publishing Company. Source

Das M.L.,Dhirubhai Ambani Institute of ICT
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013

RFID (Radio Frequency IDentification) system has found enormous applications in retail, health care, transport, and home appliances. Over the years, many protocols have been proposed for RFID security using symmetric key and public key cryptography. Based on the nature of RFID tags' usage in various applications, existing RFID protocols primarily focus on tag identification or authentication property. Internet of Things (IoT) is emerging as a global network in which every object in physical world would be able to connect to web of world via Internet. As a result, IoT infrastructure requires integration of several complimentary technologies such as sensor networks, RFID system, embedded system, conventional desktop environment, mobile communications and so on. It is prudent that RFID system will play significant roles in IoT infrastructure. In that context, RFID system should support more security properties, such as mutual authentication, key establishment and data confidentiality for its wide-spread adoption in future Internet applications. In this paper, we present a strong security and privacy of RFID system for its suitability in IoT infrastructure. The proposed protocol provides following security goal: - mutual authentication of tags and readers. - authenticated key establishment between tag and reader. - secure data exchange between tag-enabled object and reader-enabled things. The protocol provides narrow-strong privacy and forward secrecy. © 2013 Springer-Verlag. Source

Discover hidden collaborations