Test

Warning: include(clanalyticstracking.php): failed to open stream: No such file or directory in C:\xampp_5\htdocs\website\articles\week42.php on line 3

Warning: include(): Failed opening 'clanalyticstracking.php' for inclusion (include_path='C:\xampp_5\php\PEAR') in C:\xampp_5\htdocs\website\articles\week42.php on line 3


Warning: include(articles-leftbar.php): failed to open stream: No such file or directory in C:\xampp_5\htdocs\website\articles\week42.php on line 13

Warning: include(): Failed opening 'articles-leftbar.php' for inclusion (include_path='C:\xampp_5\php\PEAR') in C:\xampp_5\htdocs\website\articles\week42.php on line 13

Articles Published in This Week and Indexed in SCI

(15th October 2018 to 21st October 2018)

Cognitive spammer: A Framework for PageRank analysis with Split by it Over-sampling and Train by Under-fitting

 

Authors: Makkar, A; Kumar, N

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 

Volume: 90     Pages: 381-404     Published: JAN 2019      Language: English       Document type: Article

DOI: 10.1016/j.future.2018.07.046

 

Abstract:

From the past few years, there is an exponential increase in one of the most popular technologies of the modern era called as Internet of Things (IoT). In IoT, various objects perform the tasks of sensing, communication, and computation for providing uninterrupted services (e.g., e-health, e-transportation, security access, etc.) to the end users. In this era, Cognitive Internet of Things (CIoT) is an another paradigm of IoT developed to enhance the capabilities of intelligence in IoT objects where these objects can take independent decisions in any environment. IoT follows the service oriented architecture (SOA), in which the application layer is the topmost layer. It enables the IoT objects to interact with the other objects located across the globe. The power of learning, thinking, and understanding by these objects, can make the information access more accurate and reliable but Web spam is one of the challenges while accessing information from the web. It has been observed from the literature review that search engines are preferred mostly by the people for accessing information. The efficient ranking by the search engines can reduce the computational cost of information exchange by IoT objects. Search engines should be able to prevent the spam from being injected into the web. But, the existing techniques for this problem target in finding the spam after its occurrence in search engine result pages. So, in this proposal, we present an intelligent cognitive spammer framework, Cognitive spammer, which eliminates the spam pages during the web page rank score calculation by search engines. The framework up-date the Google's ranking algorithm, PageRank in such a way that it automatically prevents link spam by considering the link structure of web for rank score computation. The updated PageRank algorithm provided the better ranking of web pages. The proposed framework is validated with the WEBSPAM-UK2007 dataset. Before processing, the dataset is preprocessed with a new technique, called as 'Split by Over-sampling and Train by Under-fitting' to remove the trade off between imbalanced instances of target class. After data cleaning, we applied machine learning techniques (Bagged model, Boosted linear model, etc) with the web page features to make accurate predictions. The detection classifiers only consider the link features of the web page irrespective of the page content. Out of the fifteen classifiers, best three are ensemble, which results in better performance with overall accuracy improvement. Ten-fold cross validation has also been applied with the resulted ensemble model, which results in getting the accuracy of 99.6% in the proposed scheme. (C) 2018 Published by Elsevier B.V.

 

 


Record 2 of 19

Role of particle size distribution and magnetic anisotropy on magnetization of antiferromagnetic nanoparticles

 

Authors: Kaur, N; Tiwari, SD

JOURNAL OF PHYSICS AND CHEMISTRY OF SOLIDS 

Volume: 123     Pages: 279-283     Published: DEC 2018      Language: English       Document type: Article

DOI: 10.1016/j.jpcs.2018.08.013

 

Abstract:

Magnetization measurements on antiferromagnetic iron storage protein ferritin are reported. The magnetization as a function of applied magnetic field data in superparamagnetic region are analyzed considering a distribution in particle size. The estimated particle size distribution is compared with that determined from transmission electron micrograph. Effect of magnetic anisotropy on magnetization process of this nanoparticle system is also discussed.

 

 


 

Record 3 of 19

Buoyancy-driven convective heat transfer from a semi-circular cylinder for various confinements

 

Authors: Gupta, RK; Chandra, A; Gupta, RK

SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES 

Volume: 43     Issue: 11     Published: NOV 2018      Language: English       Document type: Article

DOI: 10.1007/s12046-018-0951-6

 

Abstract:

Buoyancy-driven convective heat transfer from a semi-circular cylinder for various confinements has been studied using numerical simulations for wide ranges of parameters, Reynolds numbers (1Re50), Richardson numbers (0Ri2), Prandtl numbers (0.7Pr50) and confinement ratios (0.20.8). A hot semi-circular cylinder is symmetrically kept in a 2D rectangular confinement. The circular side of the cylinder faces the upstream flow and the fluid flows against gravity in the channel. The governing equations are numerically solved using FLUENT and the results obtained are presented in the form of isotherms, streamlines, pressure coefficients, drag coefficients, Nusselt numbers, etc. The highest value of pressure coefficient increases with blockage ratio for all cases. The drag coefficient decreases with Re and shows complex phenomena with change in Ri and blockage ratio of the channel. Pressure drag has contributed more as compared with viscous drag in all cases. The curved surface showed more heat transfer than the flat surface of the semi-circular cylinder. The value of also has great influence at large value of Peclect numbers (=2500). Overall average heat transfer in terms of average Nusselt number is a function of Ri, Re, Pr and .

 

 


 

Record 4 of 19

Friction stir welding of nuclear grade SA508Gr.3Cl.1 and SS304LN dissimilar steels

 

Authors: Singh, RKR; Rathod, DW; Pandey, S

PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL OF MECHANICAL ENGINEERING SCIENCE 

Volume: 232     Issue: 21     Pages: 3814-3822     Published: NOV 2018      Language: English       Document type: Article

DOI: 10.1177/0954406218799782

 

Abstract:

The present work has been carried out to justify the feasibility of dissimilar metal welds between nuclear grade SA508Gr.3Cl.1 ferritic steel and SS304LN stainless steel using friction stir welding. The evaluation has been made by analysing the metallurgical and mechanical properties of the friction stir welded dissimilar joint. Martensite formation and chemical variations in the weld nugget have been confirmed with optical microscopy, micro-hardness measurement and X-ray diffraction. The resultant chemistry variations owing to solid-state mixing on metallurgical and associated mechanical properties are significant. Transverse tensile tests and Charpy impact tests suggest the required strength of the joint. The tensile specimens were fractured from the SS304LN side, and similar sections of stainless steel have been torn with severe plastic deformation. The significant formation of martensite has not shown any adverse effect on the joint properties. The tool wear rate of tungsten carbide was high for this dissimilar weld.

 

 


 

Record 5 of 19

A Markov based image forgery detection approach by analyzing CFA artifacts

 

Authors: Singh, A; Singh, G; Singh, K

MULTIMEDIA TOOLS AND APPLICATIONS 

Volume: 77     Issue: 21     Pages: 28949-28968     Published: NOV 2018      Language: English       Document type: Article

DOI: 10.1007/s11042-018-6075-5

 

Abstract:

The image acquisition device, the light is filtered through a Color Filter Array (CFA), where each pixel captures only one color (from Red, Green, and Blue), while others are calibrated. This process is known as interpolation process, and the artifacts introduced are called CFA or interpolation artifacts. The structure of these artifacts in the image is disturbed while a forgery is introduced in an image. In this paper, a high-order statistical approach is proposed to detect the inconsistencies in the artifacts of different parts of the image to expose any forgery present. The Markov Transition Probability Matrix (MTPM) is employed to develop various features that will detect the presence or absence of CFA artifacts in a particular region of the image. The Markov random process is applied because it provides an enhanced efficiency and reduced computational complexity for the forgery detection model. The algorithm is tested on 2 x 2 pixel block of the image which provides the results of a fine quality. There is no prior information of the location of the forged region of the image. The algorithm is tested on various images, taken from various social networking websites. The proposed forgery detection technique outperforms the existing state-of-the-art techniques for the different forgery scenarios by providing an average accuracy of 90.58%.

 

 


Record 6 of 19

Emperor penguin optimizer: A bio-inspired algorithm for engineering problems

 

Authors: Dhiman, G; Kumar, V

KNOWLEDGE-BASED SYSTEMS 

Volume: 159     Pages: 20-50     Published: NOV 1 2018      Language: English       Document type: Article

DOI: 10.1016/j.knosys.2018.06.001

 

Abstract:

This paper proposes a novel optimization algorithm, called Emperor Penguin Optimizer (EPO), which mimics the huddling behavior of emperor penguins (Aptenodytes forsteri). The main steps of EPO are to generate the huddle boundary, compute temperature around the huddle, calculate the distance, and find the effective mover. These steps are mathematically modeled and implemented on 44 well-known benchmark test functions. It is compared with eight state-of-the-art optimization algorithms. The paper also considers for solving six real-life constrained and one unconstrained engineering design problems. The convergence and computational complexity are also analyzed to ensure the applicability of proposed algorithm. The experimental results show that the proposed algorithm is able to provide better results as compared to the other well-known metaheuristic algorithms.

 

 


 

Record 7 of 19

A sustainable multi-parametric sensors network topology for river water quality monitoring

 

Authors: Jindal, H; Saxena, S; Kasana, SS

WIRELESS NETWORKS 

Volume: 24     Issue: 8     Pages: 3241-3265     Published: NOV 2018      Language: English       Document type: Article

DOI: 10.1007/s11276-017-1532-z

 

Abstract:

The deterioration of water quality due to natural and man-made hazards has affected the life on the Earth. Hence, water quality needs to be monitored regularly. The traditional approaches for monitoring are observed to be more expensive, time consuming with complex infrastructure and are less accurate. Therefore, there is a scope for improvement in monitoring approaches. For the purpose, the paper has presented multi-parametric sensors network topology (MPST). The topology has polyhedron infrastructure to observe the temporal and spatial variations like electrical conductivity, pH, temperature, chloride and dissolved oxygen; in shallow river water. Its main features are energy efficient, in-expensive infrastructure that requires less manpower, sustainable and can cope with varying currents of water. The MPST is tested at Sutlej river, Bassi, Ludhiana in India and the generated results are analyzed on various physical parameters. Further, it is compared with traditional sampling method for the accuracy. From the results, the topology is identified as an economical, scalable and convenient way for river water quality monitoring.

 

 


 

Record 8 of 19

EVaaS: Electric vehicle-as-a-service for energy trading in SDN-enabled smart transportation system

 

Authors: Aujla, GS; Jindal, A; Kumar, N

COMPUTER NETWORKS 

Volume: 143     Pages: 247-262     Published: OCT 9 2018      Language: English       Document type: Article

DOI: 10.1016/j.comnet.2018.07.008

 

Abstract:

The increased adoption of electric vehicles (EVs) in the daily life of consumers have led towards the emergence of greener smart cities. However, the problem of energy stability, i.e., balancing the demand and supply, remains persistent in the context of charging stations (CSs). To solve this problem, a unique conceptual solution using EVs has been presented in this paper. The proposed solution deals with the problem of managing the miscellaneous power or power deficit at the CSs by utilizing EVs-as-a-service (EVaaS). On one hand, EVaaS provides opportunities to the owner of EVs to earn profit and on the other hand, it helps to balance the demand and supply at the CSs. This concept works in two steps; (1) EV-as-a-buyer: EVs act as energy buyers and CSs act as energy sellers, and (2) EV-as-a-seller: EVs act as energy sellers and CSs act as energy buyers. In EVaaS paradigm, the CSs are placed in residential, commercial, and industrial areas which broadcast their price for buying (or selling) the deficit (or excess) power from (or to) the EVs. The EVs would then decide whether to charge (or discharge) their battery power from (or at) which CSs based on the factors such as-price and distance. If both the parties come to an agreement, then the EVs would travel to the specified location and exchange the energy with CSs. For the smooth movement of EVs in the smart city, a mobility model is also designed. In addition, this approach also utilizes the software defined networking (SDN) paradigm for enabling faster communication between the entities involved. For this purpose, a flow management scheme is designed for efficient data transfer between EVs and CSs. Through this study, it has been shown that such a strategy for energy trading would help the CSs to balance their load requirements as well as provide profit to the EV owners. The results prove that SDN improves the communication in terms of delay, throughput and network utilization over the conventional networks; while EVs can be successfully utilized to manage the load requirements of various CSs to gain a significant amount of profit. (C) 2018 Elsevier B.V. All rights reserved.

 

 


 

Record 9 of 19

Performance of low-cost country sourcing projects - Conceptual model & empirical analysis

 

Authors: Moser, R; Narayanamurthy, G; Kusaba, K; Kaiser, G

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS 

Volume: 204     Pages: 30-43     Published: OCT 2018      Language: English       Document type: Article

DOI: 10.1016/j.ijpe.2018.07.011

 

Abstract:

Several of the firms have failed to achieve targeted performance in their low-cost country sourcing (LCCS) projects. A clear need exists to understand what drives the performance of LCCS projects and how they can be worked around for achieving the targeted performance. In this study, we evaluate the impact of LCCS project's characteristics on their performance using contingency theory. We collected data from 177 professionals directly involved in LCCS projects in automotive industry and used structural equation modeling for conducting the analysis. Our results convey that LCCS Project characteristics, namely Skill Management, Target Management and Structure Management positively impacts Process Management of LCCS project, which in turn positively drives the Performance of LCCS project. We also find that LCCS project's Strategic Alignment positively impacts Skill Management, Target Management and Structure Management. Results from the analysis have implications for researchers and practitioners attempting to understand and improve the performance of LCCS projects.

 

 


Record 10 of 19

Participation of nucleons among different harmonics of anisotropic flow

 

Authors: Deepshikha; Kumar, S

CANADIAN JOURNAL OF PHYSICS 

Volume: 96     Issue: 10     Pages: 1092-1097     Published: OCT 2018      Language: English       Document type: Article

DOI: 10.1139/cjp-2017-0607

Abstract:

We present the comprehensive interpretation of the momentum distribution of nucleons participating in different kinds of nuclear flow, within the framework of isospin-dependent quantum molecular dynamics (IQMD) model. Our study reveals that the number of nucleons decreases with increasing order of different harmonics < v1 >, < v2 >, < v3 >, and < v4 >. The magnitude of flow harmonics depends strongly on transverse momentum.

 

 


Record 11 of 19

Adaptive ball drop algorithm for toolpath generation of axisymmetric triangulated parts to eliminate overcutting

 

Authors: Jawanda, AS; Batish, A; Bedi, S

INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY 

Volume: 99     Issue: 1-4     Pages: 461-474     Published: OCT 2018      Language: English       Document type: Article

DOI: 10.1007/s00170-018-2507-7

 

Abstract:

Computer Numeric Control (CNC) milling lathes are used for pseudo-symmetric ornamental woodworking. A stereolithography (STL) part model is used for gouge-free toolpath generation using methods such as the geometry offset method and the ball drop method. The tool movement between cutter location (CL) points results in gouging of the STL part at convex intersections of triangles (path-gouging). This path-gouging can be controlled to be within user-specified tolerance, with large number of equispaced points in forward and sidestep directions. The resulting toolpath with large number of tool positions considerably slows the machining process. There exists a need for a universal method for efficiently eliminating this gouging and slowdown. In this work, a refined ball drop method is presented that eliminates path-gouging and reduces slowdown by automatically generating a variable step size in the side step and forward directions. To further optimise the number of side steps generated by the presented method, banding is used to reduce machining time while minimising un-machined material and eliminating gouging. The developed algorithm was tested on sample parts and verified by simulation and machining of wooden parts.

 

 


 

Record 12 of 19

Hydrothermal synthesis of Eu3+-doped Gd2O3 nanophosphors and its Judd-Ofelt analysis

 

Authors: Priya, R; Pandey, OP

VACUUM 

Volume: 156     Pages: 283-290     Published: OCT 2018      Language: English       Document type: Article; Proceedings Paper

DOI: 10.1016/j.vacuum.2018.07.038

 

Abstract:

A series of Gd2-xO3:x% Eu (x = 0 to 10 mol%) were synthesized by hydrothermal method. The structural, morphological and optical properties of as-synthesized samples were studied by X-ray diffraction, field emission scanning electron microscopy (FE-SEM), energy dispersive X-ray analysis (EDX), FT-IR spectroscopy, thermo-gravimetric analysis (TGA), differential scanning calorimetric (DSC), UV/Vis spectroscopy and photoluminescence (PL) spectroscopy techniques. The effect of the doping concentration has been studied by experimental and theoretical methods. When the phosphors were exposed to UV radiation (250 rim), they exhibited a sharp red emission at 611 rim which corresponds to the hypersensitive D-5(0) -> F-7(2) transition of Eu3+ ions. The Judd-Ofelt parameters (Omega(2), Omega(4) and Omega(6) and other spectral parameters were calculated using Judd-Ofelt theory from emission spectra. The pristine phosphors are expected to have tremendous applications in the field of semiconductor devices, field emission displays and optical devices.

 

 


Record 13 of 19

Masses and strong decay properties of radially excited bottom states B(2S) and B(2P) with their strange partners B-s(2S) and B-s(2P)

 

Authors: Gupta, P; Upadhyay, A

EUROPEAN PHYSICAL JOURNAL A 

Volume: 54     Issue: 9     Published: SEP 26 2018      Language: English       Document type: Article

DOI: 10.1140/epja/i2018-12590-6

 

Abstract:

In this paper, we analyzed the experimentally available radially excited charm mesons to predict the similar spectra for the n = 2 bottom mesons. In the heavy quark effective theory, we explore the flavor independent parameters Delta((b))(F) = Delta((c))(F) and Delta((b))(F) = Delta((c))(F) to calculate the masses for the experimentally unknown n = 2 bottom mesons B(2S), B(2P), B-S(2S) and B-S(2P). We have also analyzed these bottom masses by applying the QCD and 1/mQ corrections to the Lagrangian leading to the modification of flavor symmetry parameters as Delta((b))(F) = Delta((c))(F) delta Delta(F) and Delta((b))(F) = Delta((c))(F)delta Delta(F). Further strong decay widths are determined using these calculated masses to check the sensitivity of these corrections for these radially excited mesons. The calculated decay widths are in the form of strong coupling constant (g) over tilde HH, (g) over tilde SH and (g) over tilde TH. We concluded that these corrections are less sensitive for n = 2 masses as compared to n = 1 masses. Branching ratios and branching fractions of these states are calculated to have a deeper understanding of these states. These predicted values can be confronted with the future experimental data.

 

 


Record 14 of 19

CO2 adsorption on oxygen enriched nanostructured carbons derived from silica templated resorcinol-formaldehyde

 

Authors: Tiwari, D; Kaur, S; Bhunia, H; Bajpai, PK

JOURNAL OF INDUSTRIAL AND ENGINEERING CHEMISTRY 

Volume: 65     Pages: 146-155     Published: SEP 25 2018      Language: English       Document type: Article

DOI: 10.1016/j.jiec.2018.04.023

 

Abstract:

Carbon dioxide capture needs development of cost effective CO2 capture technologies. This paper describes oxygen enriched nanostructured carbons synthesized from nanocasting technique using mesoporous silica as template and resorcinol-formaldehyde as precursor. Carbonization at various temperatures (600 degrees C-800 degrees C) was carried out to develop range of carbon adsorbents. Thorough characterization of textural, surface and chemical properties was carried out on prepared carbons and evaluated for CO2 capture performance using thermogravimetric analyser under dynamic conditions. Highest dynamic CO2 uptake capacity was reported to be 1.5 mmolg(-)(1), by SRF-700 at 30 degrees C in 100% pure CO2. The CO2 uptake performance of the prepared carbons is affected by both the textural properties and surface chemistry. Four adsorption-desorption cycles established the material with complete stability and regenerability. Fractional order kinetic model completely described CO2 adsorption on prepared carbons. Thermodynamic parameter values suggested spontaneous, random and exothermic nature of the process. Energetically heterogeneous surface of adsorbent was confirmed by best fitting of Temkin isotherm and random pattern of isosteric heat of adsorption with surface coverage. Approximately, 1.82 MJ per kg CO2 thermal energy is required for desorption process. (C) 2018 The Korean Society of Industrial and Engineering Chemistry. Published by Elsevier B.V. All rights reserved.

 

 


Record 15 of 19

Donor-pi-acceptor (D-pi-A) dyad for ratiometric detection of Hg2+ and PPi

 

Authors: Rani, R; Kumar, G; Paul, K; Luxami, V

NEW JOURNAL OF CHEMISTRY 

Volume: 42     Issue: 15     Pages: 12729-12736     Published: AUG 7 2018      Language: English       Document type: Article

DOI: 10.1039/c8nj00741a

 

Abstract:

A donor-pi-acceptor (D-pi-A) dyad 1 has been successfully synthesized by Linking phenanthrenequinone as an eLectron donor unit and anthraquinone as an eLectron acceptor unit through a phenyl ring. Dyad 1 exhibits intramolecular charge transfer and this is a key factor for the detection of Hg2+ and of the pyrophosphate ion (P2O74-, PPi) in a semi-aqueous medium. Dyad 1 exhibits absorption peaks at 430, 370, and 337 nm and an emission peak at 530 nm (lambda(ex) = 430 nm). Dyad 1 exhibits a new absorption peak at 390 nm ratiometrically along with emission quenching in the presence of Hg2+ ions while the presence of PPi results in drastic ratiometric changes in the absorption and emission spectra with new peaks at 495 nm and 620 nm, respectiveLy. The quantum yield of dyad 1 on complexation with PPi was also increased from 0.1 (free dyad) to 0.69 (dyad 1.PPi). The Lowest detection Limits for Hg2+ and PPi were found to be 31 nM and 46.5 nM, respectiveLy. DFT calculations have been performed to develop a mechanism for PPi and Hg2+ ion binding with dyad 1.

 

 


Record 16 of 19

Extended visual cryptography techniques for true color images

 

Authors: Dhiman, K; Kasana, SS

COMPUTERS & ELECTRICAL ENGINEERING 

Volume: 70     Pages: 647-658     Published: AUG 2018      Language: English       Document type: Article

DOI: 10.1016/j.compeleceng.2017.09.017

 

Abstract:

In this work, two extended visual cryptography techniques for sharing color images are proposed. Three meaningful shares are generated in both techniques using a block size of 5 x 5 corresponding to each pixel of original secret image. First proposed technique is (3, 3)-EVCT in which first share contains R component, second contains G component and third contains B component of the secret image. All three shares are required to reconstruct the original secret image on the receiver side. Second technique is (2, 3)-EVCT in which any 2-out-of-3 shares are needed to recover the original secret image on the receiver side. Out of these shares, first share contains the RG components, second contains GB components and third contains RB components of the secret image. All shares in both techniques are meaningful as they contain the cover images along with the information of the original secret image. These shares are made meaningful in order to increase the security and to avoid the suspicion that something is hidden there. The proposed techniques are lossless in nature and are less complex. The dimensions of the original secret image, cover images, regenerated secret image are same. The effectiveness of the proposed techniques have been shown by comparing their results with the results of the existing techniques on the basis of various parameters. (C) 2017 Elsevier Ltd. All rights reserved.

 

 


Record 17 of 19

A new method for segmentation of pre-detected Devanagari words from the scene images: Pihu method

 

Authors: Jindal, K; Kumar, R

COMPUTERS & ELECTRICAL ENGINEERING 

Volume: 70     Pages: 754-763     Published: AUG 2018      Language: English       Document type: Article

DOI: 10.1016/j.compeleceng.2017.12.017

 

Abstract:

To date, only one method has reported on the segmentation of pre-detected Devanagari words from natural scenic images. The present paper discusses the limitations of the existing method and proposes a new robust method called the "Pihu method" (Pihu is the lovely daughter of the first author). The efficiency of the proposed method over the existing approach is demonstrated by considering a challenging dataset of natural scenic images of Devanagari script. The study shows that the character segmentation accuracy of the Pihu method was 92.11% and that of the existing method was 55.77%. The results show that it takes the Pihu method 2.70 s to segment an image, whereas the existing method takes 4.76 s. (C) 2017 Elsevier Ltd. All rights reserved.

 

 


Record 18 of 19

Effect of gate dielectric on the performance of ZnO based thin film transistor

 

Authors: Vyas, S; Dwivedi, ADD; Dwivedi, RD

SUPERLATTICES AND MICROSTRUCTURES 

Volume: 120     Pages: 223-234     Published: AUG 2018      Language: English       Document type: Article

DOI: 10.1016/j.spmi.2018.05.040

 

Abstract:

The paper report the fabrication and characterization of two different sets of bottom gate top contact ZnO thin film transistors (TFTs) using SiO2 and Al2O3 dielectric layers in an attempt to compare and contrast the effect of gate dielectrics on performance of the two devices. ZnO thin film and dielectric layers were deposited at room temperature by radio frequency (RF) sputtering method. The results were validated by those obtained using commercial software tool ATLAS and an analytical model reported by others. The ZnO TFT with Al2O3 dielectric exhibited superior electrical performance as compared to the ZnO TFT with SiO2 dielectric. The study also revealed that the performance of ZnO/Al2O3 based TFTs are far more consistent and reliable as compared to their ZnO/SiO2 counterpart.

 

 


Record 19 of 19

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network

 

Authors: He, DB; Kumar, N; Wang, HQ; Wang, LN; Choo, KKR; Vinel, A

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 

Volume: 15     Issue: 4     Pages: 633-645     Published: JUL-AUG 2018      Language: English       Document type: Article

DOI: 10.1109/TDSC.2016.2596286

 

Abstract:

With rapid developments of sensor, wireless and mobile communication technologies, Mobile Healthcare Social Networks {MHSNs) have emerged as a popular means of communication in healthcare services. Within MHSNs, patients can use their mobile devices to securely share their experiences, broaden their understanding of the illness or symptoms, form a supportive network, and transmit information (e.g., state of health and new symptoms) between users and other stake holders (e.g., medical center). Despite the benefits afforded by MHSNs, there are underlying security and privacy issues (e.g., due to the transmission of messages via a wireless channel). The handshake scheme is an important cryptographic mechanism, which can provide secure communication in MHSNs (e.g., anonymity and mutual authentication between users, such as patients). In this paper, we present a new framework for the handshake scheme in MHSNs, which is based on hierarchical identity-based cryptography. We then construct an efficient Cross-Domain Handshake (CDHS) scheme that allows symptoms-matching within MHSNs For example, using the proposed CDHS scheme, two patients registered with different healthcare centers can achieve mutual authentication and generate a session key for future secure communications. We then prove the security of the scheme, and a comparative summary demonstrates that the proposed CDHS scheme requires fewer computation and lower communication costs. We also implement the proposed CDHS scheme and three related schemes in a proof of concept Android app to demonstrate utility of the scheme. Findings from the evaluations demonstrate that the proposed CDHS scheme achieves a reduction of 18.14 and 5.41 percent in computation cost and communication cost, in comparison to three other related handshake schemes.