Pradeep Kumar Mishra
YOU?
Author Swipe
View article: Assessing Supply Chain Resilience Under Imprecise Transportation Delays Using Simulation and Fuzzy DEA
Assessing Supply Chain Resilience Under Imprecise Transportation Delays Using Simulation and Fuzzy DEA Open
This study investigates the resilience of a three-echelon supply chain (SC) subject to potential disruptions in the transportation system. Four key resilience factors—visibility, velocity, redundancy, and flexibility—are considered. A simu…
View article: Mathematical Modelling of Risk Management in the Shipping Industry
Mathematical Modelling of Risk Management in the Shipping Industry Open
Supply chain risk management (SCRM) is primarily a process of systematic identifying, assessing, and mitigating risks within supply chain systems. Despite its complexity and criticality, the offshore and marine industry, particularly the r…
View article: Object Identification: A Review
Object Identification: A Review Open
Artificial neural networks are the best and most popular method for classifying images and identifying objects in images. The paper examines them as a technique that greatly enhances the aforementioned, extremely challenging computer c…
View article: Social Consult: Connecting Brands and Influencer
Social Consult: Connecting Brands and Influencer Open
View article: User Authentication: A Three Level Password Authentication Mechanism
User Authentication: A Three Level Password Authentication Mechanism Open
User authentication is one of the cutting edge research to provide access to legitimate uses. A number of mechanisms like biometric, image based, graphical based have been implemented. In this research work a three level password authentic…
View article: Fast secure matrix multiplications over ring-based homomorphic encryption
Fast secure matrix multiplications over ring-based homomorphic encryption Open
As widespread development of biometrics, concerns about security and privacy are rapidly increasing. Secure matrix computation is one of the most fundamental and useful operations for statistical analysis and machine learning with protecti…
View article: Impact ofthe modulus switching technique on some attacks against learning problems
Impact ofthe modulus switching technique on some attacks against learning problems Open
The modulus switching technique has been used in some cryptographic applications as well as in cryptanalysis. For cryptanalysis against the learning with errors (LWE) problem and the learning with rounding (LWR) problem, it seems that one …
View article: Novel Light Weight Compressed Data Aggregation Using Sparse Measurements for IoT Networks
Novel Light Weight Compressed Data Aggregation Using Sparse Measurements for IoT Networks Open
Optimal data aggregation aimed at maximizing IoT network lifetime by minimizing constrained on-board resource utilization continues to be a challenging task. The existing data aggregation methods have proven that compressed sensing is prom…
View article: An Android Application for Image Steganography
An Android Application for Image Steganography Open
Image Steganography is widely used for hiding a message image into a cover image. This research domain is deployed at the commercial level at both government and private sector to exhaust its opportunities. In this article, we discuss a sp…
View article: Diatomological Mapping of Water Bodies of Indore (M.P) Region
Diatomological Mapping of Water Bodies of Indore (M.P) Region Open
Diatoms are microscopic, eukaryotic and unicellular algae that are abundant in most aquatic habitats and are useful proxies for the ecological analysis. They are used as a tool to differentiate the ante-mortem drowning cases from post-mort…
View article: Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption
Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption Open
Homomorphic encryption enables various calculations while preserving the data confidentiality. In this paper, we apply the somewhat homomorphic encryption scheme proposed by Brakerski and Vaikuntanathan (CRYPTO 2011) to secure matrix multi…
View article: On some Diatoms from High Altitude Gokyo Lake-Iii, Sagarmatha National Park, Nepal
On some Diatoms from High Altitude Gokyo Lake-Iii, Sagarmatha National Park, Nepal Open
The present paper describes total 16 taxa of diatoms under 12 genera, belonging to 1 centric (Cyclotella antiqua W. Smith var. minor Suxena & Venkateswarlu) and 15 pennate species from Gokyo lake- III, Sagarmatha National Park, Nepal. Of t…