Repository logo
Institutional Repository
Communities & Collections
Browse
Quick Links
  • Central Library
  • Digital Library
  • BHU Website
  • BHU Theses @ Shodhganga
  • BHU IRINS
  • Login
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Ashutosh Srivastava"

Filter results by typing the first few letters
Now showing 1 - 6 of 6
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    PublicationArticle
    An energy and time-saving task scheduling algorithm for UAV-IoT collaborative system
    (Elsevier B.V., 2023) Anuradha Banerjee; Abu Sufian; Ashutosh Srivastava; Sachin Kumar Gupta; Saru Kumari; Sachin Kumar
    Unmanned Aerial Vehicles (UAVs) are capable of providing significant potential to the Internet of Things (IoT) devices through sensors, cameras, GPS systems, etc. Therefore, the smart UAV-IoT collaborative system has become a current hot research topic. However, there are issues like resource allocation, security, and privacy preservation, trajectory optimization, intelligent decision, energy harvesting, etc. that need extensive research and analysis. In this article, we propose an energy-efficient and time-saving task scheduling algorithm that divides the IoT devices into certain clusters based on physical proximity. By utilizing the algorithm, cluster heads can apply an Auto Regressive Moving Average (ARMA) model to predict intelligently the timestamp of the arrival of the next task and associated estimated payments. Based on the overall expected payment, a cluster head can smartly advise the UAV about its time of next arrival. Simulation results demonstrate that our proposed Energy and Time-saving Task Scheduling (ETTS) algorithm show significant improvement in terms of energy (around 67%) as well as a delay (around 36%) over the Task scheduling for Indoor Environment (TSIE) and Time Division Multiple Access-Workflow Scheduler (TDMA-WS). The improvement in delay arises from the saved time of retransmissions. ARMA model basically tries to ensure that processing capacity of an UAV doesn't remain unutilized or under-utilized. The energy that UAV invests to arrive at one particular clusterhead, should be reciprocated by a full or close-to-full task queue of a clusterhead. © 2023
  • Loading...
    Thumbnail Image
    PublicationConference Paper
    Automatic Shopping Cart System using ZigBee Technology and RFID Module
    (Institute of Electrical and Electronics Engineers Inc., 2021) Nakshatar Sharma; Akshita Gupta; Sachin Kumar Gupta; Radha Raman Chandan; Ashutosh Srivastava; Poonam Yadav
    In every city of our country, we see a vast hurry in malls. This increases so with great discounts on items. Now a day, people do have not much time to go daily shopping. Therefore, they buy things in bulk do for carrying that many of items we need a trolley or a cart so the proposed design of the cart is to make life easy so that usually after a complete purchase we go to the counter for the billing process. The cashier has a barcode reader on his desk the cashier makes a bill which is a time-consuming process and to reach that billing desk you have to stand in a long line. This design of our p showing a sight of installing a set-up in the shopping malls and stores to get the better of the above problem. To achieve this, all items offered for sale must have an RFID tag, and all cards should include an RFID reader and LCD screen. Therefore, the price is added to the total amount to be paid. If we desire to detach a product from the cart, you can take out the product and the amount of that individual item is taken from the total amount and the same detail passes to the flash magic payment software using ZigBee technology. So, the charge is made on the trolley, thus saving a lot of time. © 2021 IEEE.
  • Loading...
    Thumbnail Image
    PublicationConference Paper
    Comparative Analysis of Data Mining Techniques to Predict Heart Disease for Diabetic Patients
    (Springer, 2020) Abhishek Kumar; Pardeep Kumar; Ashutosh Srivastava; V.D. Ambeth Kumar; K. Vengatesan; Achintya Singhal
    The healthcare sectors have many difficulties and challenges in finding diseases. Healthcare organizations are collecting bulk amount of patient data. The Data mining methods are utilized to decide covered data that is valuable to healthcare specialists with effective analytic decision making. Data mining strategies are utilized in the field of the healthcare industry for different purposes. The objective of this paper is to assess and analyze using three unique data mining arrangement methods, for example, Naïve Bayes (NB), Support Vector Machine (SVM) and Decision Tree to decide the potential approaches to predict the possibility of heart disease for diabetic patients dependent on their predictive accuracy. © 2020, Springer Nature Singapore Pte Ltd.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Compressive Sensing Node Localization Method Using Autonomous Underwater Vehicle Network
    (Springer, 2022) Madhumitha Kulandaivel; Arulanand Natarajan; Sathiyamoorthi Velayutham; Ashutosh Srivastava; Sachin Kumar Gupta; P. Suresh; Nitin Goyal
    Autonomous underwater vehicle networks is a significant resource for aquatic life maintenance and monitoring underwater pollution. It is necessary to study the underwater localization algorithms which self-localize themselves. The proposed work concentrates only on the range-free localization model with a goal is to use only very few sensing nodes in the network with low cost and high battery power to self-localize themselves. Few beacon nodes have been used to localize the sensor nodes in the definite position of the network. Compressive sensing theory based on hop count information for localizing the sensor nodes has also been used for localization. This research aims to collect the connectivity information of all the nodes in the network with compressive sensing theory and improve the localization accuracy. The analysis presents that the proposed method works well with location accuracy. Compressive Sensing Node Localization reduces cost and enhances sensors' energy efficiency compared to other underwater localization algorithms. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
  • Loading...
    Thumbnail Image
    PublicationArticle
    DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network
    (Springer Science and Business Media Deutschland GmbH, 2021) Ashutosh Srivastava; Sachin Kumar Gupta; Mohd Najim; Nitesh Sahu; Geetika Aggarwal; Bireshwar Dass Mazumdar
    Mobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered. © 2021, The Author(s).
  • Loading...
    Thumbnail Image
    PublicationArticle
    Securing communication by attribute-based authentication in HetNet used for medical applications
    (Springer, 2020) Tufail A. Lone; Aabid Rashid; Sumeet Gupta; Sachin Kumar Gupta; Duggirala Srinivasa Rao; Mohd Najim; Ashutosh Srivastava; Abhishek Kumar; Lokendra Singh Umrao; Achintya Singhal
    One of the major applications of the Heterogeneous Network (HetNet) is in the healthcare system. Deploying HetNet in healthcare systems enables patients, physicians, and other stakeholders to communicate easily with each other. Due to the large growth in the network’s subscribers, the security of the stored health data became one of the major concerns because unauthorized access to this data may lead to very serious complications, and unreliable transmission of data may lead to fatal risks to the patient’s life. Therefore, taking data integrity into consideration, user authentication has become one of the main factors. However, significant research work has been performed at HetNet’s physical layer to secure communication, but the result of this leads to an increase in hardware components. The increasing hardware components not only costs money but also power consumption. Therefore, this paper presents an alternate way of securing communication in HetNet at the network layer. However, resolving security problems at the network layer increases computational complexity. Nevertheless, earlier, some encryption techniques like identity-based encryption (IBE), symmetric key encryption (SKE), and public-key encryption (PKE) have been utilized for securing data. Due to their own disadvantages, this paper utilizes an attribute-based encryption (ABE) authentication scheme for securing health data in medical applications. With the help of this method, access to the intruders is denied which results in reduced communication overhead. This authentication scheme helps protect the essential information against attacks by the intruders. It includes a third party server that helps to authenticate and store patient’s information. The whole security technique has been written in the form of HLPSL (high-level protocol specification language) codes, and the results are then validated with the help of AVISPA (automated validation of Internet security protocols and applications) tool. © 2020, The Author(s).
An Initiative by BHU – Central Library
Powered by Dspace