Indian Institute of Information Technology, Design and Manufacturing
The 'Indian Institute of Information Technology Design and Manufacturing Jabalpur' is an Indian Institute of Information Technology and a deemed university in Jabalpur that focuses on Information Technology enabled Design and Manufacturing. It was declared to be Institute of National Importance by Government of India under IT Act. Wikipedia.
Rao Y.S.,Indian Institute of Information Technology, Design and Manufacturing
International Journal of Communication Systems | Year: 2017
The efficiency of computation is one of the prime concerns in public key cryptography. The notion of online/offline framework speeds up the process of encryption and signing. In this paper, we propose the firstattribute-based online/offline signcryption scheme that is able to provide fine-grained data access control with confidentiality, authenticity, signer anonymity, and public verifiability. The scheme supports large attribute universe and monotone Boolean function predicates. The size of the system public parameters in our scheme is constant, and the selective security of the scheme is realized in random oracle model. Note that, to the best of our knowledge, there is no normal attribute-based signcryption scheme satisfying all the aforementioned functionality. © 2017 John Wiley & Sons, Ltd.
Jain S.K.,Indian Institute of Information Technology, Design and Manufacturing |
Singh S.N.,Indian Institute of Technology Kanpur
IEEE Transactions on Industrial Electronics | Year: 2014
In recent years, harmonic pollution has worried the power engineers considerably due to the increased penetration of power-electronics-based devices in the utility grid. Monitoring of certain low-order harmonics in the power supply is more important than monitoring of the entire spectrum because, usually, these are the most significant ones. In this paper, a technique based on an adaptive wavelet neural network that is the most suitable for dominant low-order harmonic estimation is presented. The proposed method works with only half-cycle data point inputs, compared to the requirement of at least one-complete-cycle data for other estimation techniques. A simple, fast converging, and reliable learning algorithm based on back propagation is used for training of the network parameters. The proposed method is examined with a number of simulated and experimental signals. The test results confirm that the proposed method accurately estimates the dominant low-order harmonics in pragmatic situations of fundamental frequency deviation, presence of interharmonics, low signal-to-noise ratio, etc. © 1982-2012 IEEE.
Jena N.R.,Indian Institute of Information Technology, Design and Manufacturing
Journal of Biosciences | Year: 2012
DNA is continuously attacked by reactive species that can affect its structure and function severely. Structural modifications to DNA mainly arise from modifications in its bases that primarily occur due to their exposure to different reactive species. Apart from this, DNA strand break, inter- and intra-strand crosslinks and DNA-protein crosslinks can also affect the structure of DNA significantly. These structural modifications are involved in mutation, cancer and many other diseases. As it has the least oxidation potential among all the DNA bases, guanine is frequently attacked by reactive species, producing a plethora of lethal lesions. Fortunately, living cells are evolved with intelligent enzymes that continuously protect DNA from such damages. This review provides an overview of different guanine lesions formed due to reactions of guanine with different reactive species. Involvement of these lesions in inter- and intra-strand crosslinks, DNA-protein crosslinks and mutagenesis are discussed. How certain enzymes recognize and repair different guanine lesions in DNA are also presented. © Indian Academy of Sciences.
Mulaveesala R.,Indian Institute of Information Technology, Design and Manufacturing |
Venkata Ghali S.,Indian Institute of Information Technology, Design and Manufacturing
Review of Scientific Instruments | Year: 2011
This paper proposes a Barker coded excitation for defect detection using infrared non-destructive testing. Capability of the proposed excitation scheme is highlighted with recently introduced correlation based post processing approach and compared with the existing phase based analysis by taking the signal to noise ratio into consideration. Applicability of the proposed scheme has been experimentally validated on a carbon fiber reinforced plastic specimen containing flat bottom holes located at different depths. © 2011 American Institute of Physics.
Amarnath M.,Indian Institute of Information Technology, Design and Manufacturing |
Praveen Krishna I.R.,Indian Institute of Space Science and Technology
Measurement: Journal of the International Measurement Confederation | Year: 2014
Gear is a vital transmission element, finding numerous applications in small, medium and large machinery. Excessive loads, speeds and improper operating conditions may cause defects on their bearing surfaces, thereby triggering abnormal vibrations in whole machine structures. This paper describes the implementation of empirical mode decomposition (EMD) method for monitoring simulated faults using vibration and acoustic signals in a two stage helical gearbox. By using EMD method, a complicated signal can be decomposed into a number of intrinsic mode functions (IMF) based on the local characteristic time scale of the signal. Vibration and acoustic signals are decomposed to extract higher order statistical parameters. Results demonstrate the effectiveness of EMD based statistical parameters to diagnose severity of local faults on helical gear tooth. Kurtosis values from EMD and that obtained from vibration and acoustic signals are compared to demonstrate the superiority of EMD based technique. © 2014 Elsevier Ltd. All rights reserved.
Jena N.R.,Indian Institute of Information Technology, Design and Manufacturing |
Mishra P.C.,Banaras Hindu University
Free Radical Biology and Medicine | Year: 2012
DNA damage by endogenous and exogenous agents is a serious concern, as the damaged products can affect genome integrity severely. Damage to DNA may arise from various factors such as DNA base modifications, strand break, inter- and intrastrand crosslinks, and DNA-protein crosslinks. Among these factors, DNA base modification is a common and important form of DNA damage that has been implicated in mutagenesis, carcinogenesis, and many other pathological conditions. Among the four DNA bases, guanine (G) has the smallest oxidation potential, because of which it is frequently modified by reactive species, giving rise to a plethora of lethal lesions. Similarly, 8-oxo-7,8-dihydroguanine (8-oxoG), an oxidatively damaged guanine lesion, also undergoes various degradation reactions giving rise to several mutagenic species. The various products formed from reactions of G or 8-oxoG with different reactive species are mainly 2,6-diamino-4-oxo-5-formamidopyrimidine, 2,5-diamino-4H-imidazolone, 2,2,4-triamino-5-(2H)-oxazolone, 5-guanidino-4-nitroimidazole, guanidinohydantoin, spiroiminodihydantoin, cyanuric acid, parabanic acid, oxaluric acid, and urea, among others. These products are formed from either ring opening or ring opening and subsequent rearrangement. The main aim of this review is to provide a comprehensive overview of various possible reactions and the mechanisms involved, after which these ring-opened and rearranged products of guanine would be formed in DNA. The biological significance of oxidatively damaged products of G is also discussed. © 2012 Elsevier Inc.
Agarwal M.,Indian Institute of Information Technology, Design and Manufacturing
Lecture Notes in Electrical Engineering | Year: 2013
In this paper, we present a novel approach in text steganography using a list of words to hide the secret message. The approach uses the ASCII value of characters and conceals secret message without altering the cover file. The hash value of a message is computed and appended at the end of the message. To provide security, both the message and the appended hash value are encrypted using the proposed encipher algorithm and then the resulting cipher text is embedded inside a cover file using the proposed hide algorithm. After embedding, the stego file, which consists of a list of words, is sent to the receiver. At the receiver side, message authentication and integrity can be verified by applying the same hash function to the deciphered message. The security of the approach is equivalent to the most secure one time pad cryptosystem. We also present an empirical comparison of the proposed approach with some of the existing approaches and show that our approach outperforms the existing approaches. © 2013 Springer Science+Business Media.
Sahu C.,Indian Institute of Information Technology, Design and Manufacturing |
Singh J.,Indian Institute of Information Technology, Design and Manufacturing
IEEE Electron Device Letters | Year: 2014
In this letter, we report for the first time a distinctive approach of implementing a junctionless transistor (JLT) without doping (doping-less) the ultrathin silicon film. A charge-plasma concept is employed to induce n-region for the formation of source and drain for a n-channel JLT using appropriate metal work function electrodes. Electrical characteristics of the proposed device are simulated and compared with that of a conventionally doped JLT of identical dimensions. In conventional JLTs, the channel doping concentration is generally kept high to ensure high ON-state current, but it causes variation in threshold voltage, which may be due to process variations. The proposed device solves the problem of threshold voltage variability without affecting inherent advantages of JLTs. © 2014 IEEE.
Amarnath M.,Indian Institute of Information Technology, Design and Manufacturing |
Krishna I.R.P.,Indian Institute of Technology Madras
Tribology International | Year: 2013
Gears are used for transmission of power, motion or both. Under increased power and higher speeds, tribological failures such as scuffing, pitting, mild wear and tooth breakage are of major concern. This paper presents the results of experimental investigations carried out to assess wear in spur gears of a back-to-back gear box under accelerated test conditions. The studies considered the estimation of specific lubricant film thickness and its effects on the fault growth on gear teeth surface. Ensemble empirical mode decomposition (EEMD) technique is used to extract the fault related features from the vibration signals acquired from the gearbox. The results highlight the advantage of EEMD technique for effective assessment of wear in spurgears. © 2013 Elsevier Ltd.
Damodharan P.,Indian Institute of Information Technology, Design and Manufacturing |
Vasudevan K.,Indian Institute of Technology Madras
IEEE Transactions on Energy Conversion | Year: 2010
This paper describes a position sensorless operation of permanent magnet brushless direct current (BLDC) motor. The position sensorless BLDC drive proposed, in this paper, is based on detection of back electromotive force (back EMF) zero crossing from the terminal voltages. The proposed method relies on a difference of line voltages measured at the terminals of the motor. It is shown, in the paper, that this difference of line voltages provides an amplified version of an appropriate back EMF at its zero crossings. The commutation signals are obtained without the motor neutral voltage. The effectiveness of the proposed method is demonstrated through simulation and experimental results. © 2006 IEEE.