Time filter

Source Type

Nellore, India

Bala Anki Reddy P.,Vellore Institute of Technology | Bhaskar Reddy N.,NBKRIST | Suneetha S.,Rashtreeya Vidyalaya College of Engineering
Journal of Applied Fluid Mechanics | Year: 2012

The radiation effects on unsteady flow of a viscous incompressible fluid past an exponentially accelerated infinite isothermal vertical plate with uniform mass diffusion is considered in the presence of magnetic field and heat source. The governing partial differential equations are converted into a non-dimensional form and solved numerically by applying a Crank-Nicholson type of implicit finite difference method with a tri-diagonal matrix manipulation and an iterative procedure. The profiles of unsteady velocity, temperature and concentration are shown graphically for different values of thermo physical parameters. Also, the simulated values of the skin-friction coefficient, Nusselt number and Sherwood number are presented. This model finds applications in solar energy collection systems, geophysics and astrophysics, aero space and also in the design of high temperature chemical process systems. Source

Sarvabhatla M.,NBKRIST | Vorugunti C.S.,Dhirubhai Ambani Institute of ICT
2015 7th International Conference on Communication Systems and Networks, COMSNETS 2015 - Proceedings | Year: 2015

Emerging markets looks cloud computing as a facilitator to lower their investments related to ICT. Unlimited throughput, on demand and elastic nature of cloud attracted the medium and large scale organizations to adopt it and move their critical data, software resources to cloud. Outsourcing of critical data to third party results in lots of security issues like user authentication, integrity of data etc. and need to be addressed very effectively. In 2011, Hao et al of SUNY, have proposed a time-bound ticket-based mutual authentication scheme and claimed that their scheme is secure. In 2013, Jaidhar et al claimed that Hao et al scheme is vulnerable to DoS attack and proposed an improved scheme. In this paper, we will show that Jaidhar et al scheme is still vulnerable to all major cryptographic attacks like offline password guessing attack, user impersonation attack, server masquerade attack etc. As a part of our contribution, we propose an improved mutual authentication scheme, which is secure and resistant to all major cryptographic attacks. © 2015 IEEE. Source

Sarvabhatla M.,NBKRIST | Vorugunti C.S.,Dhirubhai Ambani Institute of ICT
2015 7th International Conference on Communication Systems and Networks, COMSNETS 2015 - Proceedings | Year: 2015

The advancement of semiconductor and ubiquitous technology resulted in a smart sensor networking system, which is an application of wireless sensor networks to health care applications (WMSN). Wireless Medical Sensor Network (WMSN) is a real-time continuous patient monitoring system, which provides a cost-optimal wireless sensor networking platform to track patient's physiological data through the sensors attached to patient body. Limited computational power, storage, communication and energy capacity of WMSN demands for energy efficient, light weight and high security mutual authentication schemes which provides unbreakable connectivity for end to end secure data delivery. In 2014, He et al. proposed an authentication scheme for WMSN and claimed that their scheme is light weight and resists all major cryptographic attacks. However, in this paper we will show that He et al scheme is vulnerable to offline password guessing attack and other major ones. As a part of our contribution, we will propose an energy efficient, light weight and highly secure authentication scheme for WMSN which 56%more energy efficient compared to He et al scheme and 20.18%compared to Kumar et al scheme. © 2015 IEEE. Source

Mudarakola L.P.,NBKRIST | Vudatha C.P.,Koneru Lakshmaiah College of Engineering
International Journal of Applied Engineering Research | Year: 2014

Pair-wise testing is a combinatorial test criterion technique based on specification, which requires that for each pair of parameters, every combination of their valid value should be covered by at least one test case in the test set. Pairwise test set generation is the process of producing a subset of all possible test case inputs to a system in situations where exhaustive testing is not possible or is prohibitively expensive. Some of pairwise test techniques like IPOG, AETG, MIPOG, BCO, and ACO etc. are available to generate the pairwise test cases. This paper proposes an artificial neural networks (ANNs) strategy to generate the optimized pair-wise test cases. The theoretical study demonstrates that the test cases generated through associative mapping suggest optimized solution when comparing to other strategies and also useful in many web applications like Railway reservation system, Hospital management system etc. We have implemented a tool called ANN-PTSG (Artificial Neural Network-Pair wise Test case Strategy Generator) based on ANNs algorithm to generate pair wise test cases, which was written in C and Java language. The results generated by ANNs strategy are compared to other deterministic algorithms. The experimental results demonstrate the optimized test cases for pair wise testing in case of web applications by using the above approach which calculates the dependency, coverage and time with high efficiency. The work can be extended to develop ANNs strategy for t-wise combinatorial testing where t stands for 3, 4 and so on. © Research India Publications. Source

Sarvabhatla M.,NBKRIST | Reddy M.C.,Veltech University | Vorugunti C.S.,DhirubhaiAmbani Institute of ICT
ACM International Conference Proceeding Series | Year: 2015

Cloud computing is a virtualization of computing resources which facilitates the outsourcing of computing, storage and networking resources elastic to geographically segregated users. Due to hosting of sensitive organizational data in the far off third party server and accessing those resources through insecure Internet, results in stringent requirements for data integrity and user authenticity. In this context, recently Mishra et al has proposed an identity based authentication scheme in cloud context and supported that their scheme is faultless. In this manuscript, we analyze the security aspects of Mishra et al scheme and demonstrate that their scheme is susceptible to user impersonation attack, replay attack etc. As a part of our contribution, we proposed a robust identity based authentication scheme and validate both formally and informally that our scheme is attack resistant. © 2015 ACM. Source

Discover hidden collaborations