2,080 research outputs found

    Spectrum Sensing in Cognitive Radio using Energy Detection under Non Fading Environment

    Get PDF
    The growing demand for wireless applications leads to the effective utilization of available spectrum. The explosion of wireless applications creates an ever-increasing demand for more radio spectrum. However these bands are significantly underutilized due to static allocation. The issue of spectrum underutilization can be solved in a better way by using cognitive radio technology. Cognitive Radio can able to sense smartly and adapts with the changing environment. The main issues with cognitive radios are that it should not interfere with the primary users and should vacate the band when it is required. For this purpose energy detector is discussed in this paper and performance evaluation of this is calculated. The performance evaluation is done between cooperative and non cooperative spectrum sensing schemes under non fading environment

    Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm

    Get PDF
    Storing data in a third party cloud system causes serious problems on data confidentiality. Generally, encryption techniques provide data confidentiality but with limited functionality, which occurs due to unsupported actions of encryption operation in cloud storage space. Hence, developing a decentralized secure storage system with multiple support functions like encryption, encoding, and forwarding tends to get complicated, when the storage system spreads. This paper aims mainly on hiding image information using specialized steganographic image authentication (SSIA) algorithm in clustered cloud systems. The SSIA algorithm is applied to virtual elastic clusters in a public cloud platform. Here, the SSIA algorithm embeds the image information using blowfish algorithm and genetic operators. Initially, the blowfish symmetric block encryption is applied over the image and then the genetic operator is applied to re-encrypt the image information. The proposed algorithm provides an improved security than conventional blowfish algorithm in a clustered cloud system

    In Need of Translation: An Analysis of Sri Lankan Tamil Dalit Literature

    Get PDF

    Entrenched Fissures: Caste and Social Differences among the Devadasis

    Get PDF
    The religiously sanctioned Devadasi system in India exemplifies intersectional oppression of gender, caste, and sexuality. Historically, Devadasis, or “servants of God,” were women wedded to God who performed temple duties and were considered sacral women with ritual powers. As part of her duties, the Devadasis offer sexual services to her patrons, invariably the economically and socially powerful patriarch/s in society. The Devadasis were not a monolithic community; there were caste-based segregations within the Devadasi community which delineated their social positions. Devadasis were drawn from castes lower in the hierarchy (non-Brahmins) and the Scheduled castes (Dalits). To distinguish the two categories, the Devadasis from the non-Brahmin castes were referred to as Kalavantin/Isai Vellalar/ Kalavantulu and those from the Dalit castes were referred to as Jogini/Mathamma; their social and economic status were entirely different. The Devadasis from the non-Brahmin communities performed classical music and dance, while the Dalit Devadasis performed folk dances during temple festivals. Though the Devadasi system was outlawed in 1988, the practice of dedicating young girls as Devadasis continues to be prevalent among the Scheduled castes. This paper argues that the activists who fought for the liberation of the Devadasis from the oppressive system focused mostly on the Devadasis from the non-Brahmin castes, excluding the Devadasis from the Scheduled castes. This paper contextualizes the prevalence of the Devadasi system within the interconnected matrices of caste and gender structures in Hindu society. Drawing on the socio-historical trajectory of the emancipation of Devadasis in Goa, a state in Western India, this paper analyzes the caste hierarchies and social inequities embedded within the Devadasi system. Apart from discussing the legal interventions initiated by the State to abolish the Devadasi system, this paper also analyses the role of Non-Governmental Organisations (NGOs) in the emancipation and empowerment of Dalit Devadasis

    In Perennial Oppression: Internalized Ideologies of the Devadasis

    Get PDF
    The Madras Anti-Devadasi Act was passed in 1947 with the primary objective of liberating women from the oppressive norms of the Devadasi system. Sanctioned by religion, the institutionalization of the Devadasi system within the Hindu community legitimated women from certain caste groups to become ‘servants of god’. Through ritualistic norms, the Devadasis were wedded to God and the caste Hindu patriarchs were authorized to control the sexuality of the Devadasis. Given their vulnerable status in terms of caste, class, and gender, women from the castes lower in hierarchy were forced into the system. Despite the legislative intervention of the Anti-Devdasi Act seven decades ago, there are newspaper reports, which substantiate the continuation of the Devadasi systems in some villages in Tamil Nadu, reiterating the power of caste and sexist ideologies within Hindu society. In contemporary times, the Devadasis are mainly drawn from the Scheduled castes, otherwise referred to as Dalits. Literatures by historically marginalized communities play a pivotal role in their liberation. On the contrary an analysis of the literatures by (or on) the Devadasis reveal the internalization of societal ideologies which impedes their empowerment and emancipation. Drawing on Simone de Beauvoir’s conceptualizations of the gendered body and Pierre Bourdieu’s theory of “habitus”, which underlines the embodied nature of social positions, this paper discusses the physical and psychological conditioning of the Devadasis within the caste Hindu society. Through an analysis of two Tamil novels, Moovalur Ramamirtham’s Dasigalin Mosavalai allathu Mathi Petra Minor and Imayam’s Sedal, this paper argues that the Devadasis depicted in the novels are embedded in caste and gender norms that denigrate and oppress them. Hence, as a paradox, their resistance to the system results in perpetuating the oppressive and discriminative social system rather than enabling liberation

    SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS

    Get PDF
    With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm

    Cross-Layer Fragment Indexing based File Deduplication using Hyper Spectral Hash Duplicate Filter (HSHDF) for Optimized Cloud Storage

    Get PDF
    Cloud computing and storage processing is a big service for maintaining a large number of data in a centralized server to store and retrieve data depending on the use to pay as a service model. Due to increasing storage depending on duplicate copy presence during different sceneries, the increased size leads to increased cost. To resolve this problem, we propose a Cross-Layer Fragment Indexing (CLFI) based file deduplication using Hyper Spectral Hash Duplicate Filter (HSHDF) for optimized cloud storage. Initially, the file storage indexing easy carried out with Lexical Syntactic Parser (LSP) to split the files into blocks. Then comparativesector was created based on Chunk staking. Based on the file frequency weight, the relative Indexing was verified through Cross-Layer Fragment Indexing (CLFI). Then the fragmented index gets grouped by maximum relative threshold margin usingIntra Subset Near-Duplicate Clusters (ISNDC). The hashing is applied to get comparative index points based on hyper correlation comparer using Hyper Spectral Hash Duplicate Filter (HSHDF). This filter the near duplicate contentdepending on file content difference to identify the duplicates. This proposed system produces high performance compared to the other system. This optimizes cloudstorage and has a higher precision rate than other methods
    • 

    corecore