Articles written in Sadhana
Volume 17 Issue 2 June 1992 pp 299-313
Approximate factorization scheme for transonic potential flow computations
The implicit approximate factorization scheme known as
Volume 30 Issue 1 February 2005 pp 21-46
Ion cyclotron resonance heating system on Aditya
D Bora Sunil Kumar Raj Singh S V Kulkarni A Mukherjee J P Singh Raguraj Singh S Dani A Patel Sai Kumar V George Y S S Srinivas P Khilar M Kushwah P Shah H M Jadav Rajnish Kumar S Gangopadhyay H Machhar B Kadia K Parmar A Bhardwaj Suresh Adav D Rathi D S Bhattacharya
An ion cyclotron resonance heating (ICRH) system has been designed, fabricated indigenously and commissioned on Tokamak Aditya. The system has been commissioned to operate between 20.0 and 47.0 MHz at a maximum power of 200 kW continuous wave (CW). Duration of 500 ms is sufficient for operation on Aditya, however, the same system feeds the final stage of the 1.5 MW ICRH system being prepared for the steady-state superconducting tokamak (SST-1) for a duration of 1000 s. Radio frequency (RF) power (225 kW) has been generated and successfully tested on a dummy load for 100 s at 30.0 MHz. Lower powers have been coupled to Aditya in a breakdown experiment. We describe the system in detail in this work.
Volume 39 Issue 6 December 2014 pp 1409-1423
Identifying the best market to sell: A cost function formulation
Sunil Kumar Kopparapu Vikram Saxena
One of the main objectives of a farmer is to sell his final agricultural produce so as to maximize his profits. While he has several options, in terms of the markets where he can sell his produce, he is faced with a dilemma of identifying a market where he should sell his produce. There are several factors, like
the distance of the market from the farmers location
the type of produce
the transportation cost
the time taken to transport
that determine and influence the choice of market to sell. The main contributions of this paper include
the formulation of an optimization problem to identifying the
demonstrating the usefulness of the formulation on real world data.
Volume 41 Issue 9 September 2016 pp 993-1017
Genetic algorithms in supply chain management: A critical analysis of the literature
SUNIL KUMAR JAUHAR MILLIE PANT
Genetic algorithms (GAs) are perhaps the oldest and most frequently used search techniques for dealing with complex and intricate real-life problems that are otherwise difficult to solve by the traditional methods. The present article provides an extensive literature review of the application of GA on supply chain management (SCM). SCM consists of several intricate processes and each process is equally important formaintaining a successful supply chain. In this paper, eight processes (where each process has a set of subprocesses) as given by Council of SCM Professionals (CSCMF) are considered. The idea is to review the application of GA on these aspects and to provide the readers a detailed study in this area. The authors have considered more than 220 papers covering a span of nearly two decades for this study. The analysis is shown in detail with the help of graphs and tables. It is expected that such an extensive study will encourage and motivate the fellow researchers working in related area; to identify the gaps and to come up with innovative ideas.
Volume 43 Issue 4 April 2018 Article ID 0053
Spoken Indian language identification: a review of features and databases
BAKSHI AARTI SUNIL KUMAR KOPPARAPU
Spoken language is one of the distinctive characteristics of the human race. Spoken language processing is a branch of computer science that plays an important role in human–computer interaction (HCI), which has made remarkable advancement in the last two decades. This paper reviews and summarizes theacoustic, phonetic and prosody features that have been used for spoken language identification specifically for Indian languages. In addition, we also review the speech databases, which are already available for Indian languages and can be used for the purposes of spoken language identification.
Volume 45 All articles Published: 4 July 2020 Article ID 0174
Simultaneous two-sample learning to address binary class imbalance problem in low-resource scenarios
SRI HARSHA DUMPALA RUPAYAN CHAKRABORTY SUNIL KUMAR KOPPARAPU
Binary class imbalance problem refers to the scenario where the number of training samples in one class is much lower compared with the number of samples in the other class. This imbalance hinders the applicability of conventional machine learning algorithms to classify accurately. Moreover, many real world training datasets often fall in the category where data is not only imbalanced but also low-resourced. In this paper we introduce a novel technique to handle the class imbalance problem, even in low-resource scenarios. Inour approach, instead of, as is common, learning using one sample at a time, two samples are simultaneously considered to train the classifier. The simultaneous two-sample learning seems to help the classifier learn both intra- and inter-class properties. Experiments conducted on a large number of benchmarked datasets demonstrate the enhanced performance of our technique over the existing state of the art techniques
Volume 47 All articles Published: 12 February 2022 Article ID 0035
A quantum secure ID-based cryptographic encryption based on group rings
GAURAV MITTAL SUNIL KUMAR SANDEEP KUMAR
Identity-based (ID-based) encryption is a very important cryptographic primitive. It is advantageous over the conventional public key cryptosystems due to direct and easy verification of the public keys. The security of most of the ID-based encryption schemes is based directly or indirectly on solving integer factorizationproblem, Elliptic curve discrete logarithm problem or discrete logarithm problem. It is known that these well-studied problems are not safe against attacks on a sufficiently large quantum computer. Therefore, in this paper we propose a secure ID-based encryption scheme whose security depends on the newly discovered hard problems in the algebraic structure of group rings. We show that the proposed scheme is IND-ID-CPA secure and safe against the chosen ciphertext attack. Moreover, we also comment on the IND-ID-CCA security of theproposed scheme.
Volume 48, 2023
Continuous Article Publishing mode
Click here for Editorial Note on CAP Mode