Articles written in Sadhana
Volume 44 Issue 6 June 2019 Article ID 0139
Streamlining multitemporal vegetation indices for dependable crop growth monitoring in Himalayan foothill region
SANDEEP KUMAR SINGLA RAHUL DEV GARG OM PRAKASH DUBEY
Satellite data in conjunction with geoinformatics are used to study the land cover change dynamics, extraction of crop information and the monitoring of crop growth. The information derived from the satellite may contain contaminated values due to the atmospheric effects, geometric errors, snow and clouds. These contaminated values can be identified and eliminated using time series analysis to further streamline for agricultural monitoring and prognostic applications. The inherent advantages and disadvantages of existing streamlining methods limit their usability in particular situation. The method proposed in this study synergizesthe use of interpolation, running median and moving average. This has clearly shown the proposal’s capability in preserving the trend in the series in addition to streamlining the temporal profile of satellite data in the Himalayan foothills. This will make the road map for satisfactory crop growth monitoring and crop yieldestimation. Analysis based on the root mean square error and F-Test has been presented to deduce the results and interpretations.
Volume 47 All articles Published: 12 February 2022 Article ID 0035
A quantum secure ID-based cryptographic encryption based on group rings
GAURAV MITTAL SUNIL KUMAR SANDEEP KUMAR
Identity-based (ID-based) encryption is a very important cryptographic primitive. It is advantageous over the conventional public key cryptosystems due to direct and easy verification of the public keys. The security of most of the ID-based encryption schemes is based directly or indirectly on solving integer factorizationproblem, Elliptic curve discrete logarithm problem or discrete logarithm problem. It is known that these well-studied problems are not safe against attacks on a sufficiently large quantum computer. Therefore, in this paper we propose a secure ID-based encryption scheme whose security depends on the newly discovered hard problems in the algebraic structure of group rings. We show that the proposed scheme is IND-ID-CPA secure and safe against the chosen ciphertext attack. Moreover, we also comment on the IND-ID-CCA security of theproposed scheme.
Volume 48, 2023
Continuous Article Publishing mode
Click here for Editorial Note on CAP Mode