Time filter

Source Type

Sharma H.K.,Malwa Institute of Technology and Management | Pandey G.,Madhav Institute of Technology and Science | Shrivastava S.,Gyani Inder Singh Institute of Professional Studies | Tomar V.,ITM University
Nanoscience and Nanotechnology Letters | Year: 2010

In present investigation we report an easy method of preparation of silver nanoparticles by laser beam irradiation on metal salt solution in presence of ligand containing azo-resorcinol group. A solution mixture of silver nitrate and alkaline solution of ligand EBT (Eriochrome Black T, NaH2L) was irradiated with laser beam (λ = 4000 Å) for a period of five minutes. The morphology of silver nanoparticles thus formed was studied by TEM analysis. A plaussible formation mechanism has also been discussed in this article. Copyright © 2010 American Scientific Publishers.


Kotwal S.B.,SMVD University | Abrol R.,SMVD University | Nigam S.,SMVD University | Verma S.,Indian Institute of Information Technology Allahabad | Tomar G.S.,Malwa Institute of Technology and Management
International Journal of Simulation: Systems, Science and Technology | Year: 2010

This paper presents the analysis of received signal strength (RSSI) and angle of arrival (AoA) measurements based Localization algorithm for location detection of unknown nodes in wireless sensor networks (WSNs). The present work determines region of unknown nodes with respect to anchor nodes using irregular distance and angle measurements. This node transmits its region with some certainty to other unknown nodes to help them determine their own region. The error propagation increases size of regions of nodes in subsequent hops because of irregular distance and angle measurements. The proposed localization algorithm reduces the error propagation of this irregular distance and angle measurements as well reduces the region of all unknown nodes within a given communication range from each other using one anchor node only. The goal is to reduce the size of the region which is likely to have a node. Authors present the concept and share the simulation results. The efficiency of proposed algorithm in comparison with existing algorithms is indicated in the results. The simulation results show that the uncertainty region of localized nodes is reduced significantly and the propagation of associated estimation error for subsequent hops for localization is reduced.


Chaurasia B.K.,Indian Institute of Information Technology | Verma S.,Indian Institute of Information Technology | Tomar G.S.,Malwa Institute of Technology and Management
International Journal of Grid and High Performance Computing | Year: 2010

This paper proposes a mechanism for sustaining privacy of a vehicle in a vehicular ad hoc network (VANET) through pseudonym update. In a VANET, vehicles on the road are involved in dissemination of information as they move. An association can be formed between the physical location of the source vehicle and the transmitted messages. This relationship between the physical vehicle and its identity can breach its privacy. In this work, a strategy for optimal pseudonym update for maximizing privacy has been formulated when a vehicle is being observed by adversaries with different capabilities. Results indicate that updating pseudonyms in accordance to the strategy maximizes the privacy of a vehicle in the given situation. © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.


Gupta S.,SMVD University | Verma S.,Indian Institute of Information Technology | Tomar G.S.,Malwa Institute of Technology and Management | Abrol R.K.,SMVD University
International Journal of Grid and High Performance Computing | Year: 2010

Most of the application-oriented research in the field of Wireless Sensor Networks has been in remote monitoring, including environmental, building automation, and security. However, this paper presents the methodology followed for implementation of a Wireless Sensor Network based solution in a process plant for energy management and leak detection. The sensor network acquires data pertaining to detection of leakage in a plant. The network further serves effectively as a maintenance and diagnostic system that is used to manage the plant and conserve energy in a process plant. The critical design issues, testing methodologies and implementation problems pertaining to the system are also presented. Additionally, special focus has been placed on the calculations pertaining to the network life time. Copyright © 2010, IGI Global.


Pandey G.,Babasaheb Bhimrao Ambedkar University | Sharma H.K.,Malwa Institute of Technology and Management | Srivastava S.K.,Banaras Hindu University | Kotnala R.K.,National Physical Laboratory India
Materials Research Bulletin | Year: 2011

γ-MnS nanocrystalline materials have been prepared by reaction of Na 2[Mn(HL) 2(H 2O) 2]; 1:2 (M:L) chelate complex with alkaline solution of thiocarbamide in aqueous solution phase. Effect of metal chelate complex, reaction time and surfactant sodium dodecyl sulfate; SDS on phase, morphology and size of the products have been investigated. The metal chelate complex was synthesized by reacting Mn(II) ions with eriochrome black T (NaH 2L) in alkaline medium. γ-MnS crystals were formed when metal complex was used as metal source whereas Mn 3O 4 was the dominant product when MnSO 4· H 2O was used as metal source. Materials thus formed having various morphologies were characterized by X-ray diffraction, scanning electron microscopy (SEM), transmission electron microscopy (TEM) to determine the crystallinity, phase, structure and morphology. The optical properties of the thus prepared samples were determined by UV-vis absorption spectra and photoluminescence spectra. A possible formation mechanism of crystals has been discussed in this article. © 2011 Elsevier Ltd. All rights reserved.


Chaurasia B.K.,Indian Institute of Information Technology Allahabad | Verma S.,Indian Institute of Information Technology Allahabad | Tomar G.S.,Malwa Institute of Technology and Management
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2010

The paper presents a privacy preserving authentication protocol for vehicles in a VANET. The authentication process involves authentication of the vehicle and the corresponding RSU by a fixed infrastructure (CTA). Every RSU has a public key infrastructure and continuously broadcasts public key. The vehicle encrypts its identity, RSU Id and timestamp using its symmetric key. The encrypted bits along with the pseudonym of vehicle and timestamp are again encrypted by the public key of RSU and send to the RSU. RSU forwards the encrypted part to the CTA. CTA sends its verification to the RSU. The verification of the vehicle is encrypted by the vehicle symmetric key and sends along with authentication of the vehicle to the RSU. The encrypted portion is forwarded to the vehicle which confirms the authentication of the RSU after decryption. The CTA also sends a temporary short certificate to the vehicle for vehicle to vehicle communication. The whole process needs only one request and reply between different entities. Simulation results indicate the time taken (~ 223 ms) for the whole process is small and constitutes only a small portion of the stay time of a vehicle within an RSU region. © 2010 Springer-Verlag Berlin Heidelberg.

Loading Malwa Institute of Technology and Management collaborators
Loading Malwa Institute of Technology and Management collaborators