2,066 research outputs found

    Spectrum Sensing in Cognitive Radio using Energy Detection under Non Fading Environment

    Get PDF
    The growing demand for wireless applications leads to the effective utilization of available spectrum. The explosion of wireless applications creates an ever-increasing demand for more radio spectrum. However these bands are significantly underutilized due to static allocation. The issue of spectrum underutilization can be solved in a better way by using cognitive radio technology. Cognitive Radio can able to sense smartly and adapts with the changing environment. The main issues with cognitive radios are that it should not interfere with the primary users and should vacate the band when it is required. For this purpose energy detector is discussed in this paper and performance evaluation of this is calculated. The performance evaluation is done between cooperative and non cooperative spectrum sensing schemes under non fading environment

    Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm

    Get PDF
    Storing data in a third party cloud system causes serious problems on data confidentiality. Generally, encryption techniques provide data confidentiality but with limited functionality, which occurs due to unsupported actions of encryption operation in cloud storage space. Hence, developing a decentralized secure storage system with multiple support functions like encryption, encoding, and forwarding tends to get complicated, when the storage system spreads. This paper aims mainly on hiding image information using specialized steganographic image authentication (SSIA) algorithm in clustered cloud systems. The SSIA algorithm is applied to virtual elastic clusters in a public cloud platform. Here, the SSIA algorithm embeds the image information using blowfish algorithm and genetic operators. Initially, the blowfish symmetric block encryption is applied over the image and then the genetic operator is applied to re-encrypt the image information. The proposed algorithm provides an improved security than conventional blowfish algorithm in a clustered cloud system

    In Need of Translation: An Analysis of Sri Lankan Tamil Dalit Literature

    Get PDF

    Entrenched Fissures: Caste and Social Differences among the Devadasis

    Get PDF
    The religiously sanctioned Devadasi system in India exemplifies intersectional oppression of gender, caste, and sexuality. Historically, Devadasis, or “servants of God,” were women wedded to God who performed temple duties and were considered sacral women with ritual powers. As part of her duties, the Devadasis offer sexual services to her patrons, invariably the economically and socially powerful patriarch/s in society. The Devadasis were not a monolithic community; there were caste-based segregations within the Devadasi community which delineated their social positions. Devadasis were drawn from castes lower in the hierarchy (non-Brahmins) and the Scheduled castes (Dalits). To distinguish the two categories, the Devadasis from the non-Brahmin castes were referred to as Kalavantin/Isai Vellalar/ Kalavantulu and those from the Dalit castes were referred to as Jogini/Mathamma; their social and economic status were entirely different. The Devadasis from the non-Brahmin communities performed classical music and dance, while the Dalit Devadasis performed folk dances during temple festivals. Though the Devadasi system was outlawed in 1988, the practice of dedicating young girls as Devadasis continues to be prevalent among the Scheduled castes. This paper argues that the activists who fought for the liberation of the Devadasis from the oppressive system focused mostly on the Devadasis from the non-Brahmin castes, excluding the Devadasis from the Scheduled castes. This paper contextualizes the prevalence of the Devadasi system within the interconnected matrices of caste and gender structures in Hindu society. Drawing on the socio-historical trajectory of the emancipation of Devadasis in Goa, a state in Western India, this paper analyzes the caste hierarchies and social inequities embedded within the Devadasi system. Apart from discussing the legal interventions initiated by the State to abolish the Devadasi system, this paper also analyses the role of Non-Governmental Organisations (NGOs) in the emancipation and empowerment of Dalit Devadasis

    In Perennial Oppression: Internalized Ideologies of the Devadasis

    Get PDF
    The Madras Anti-Devadasi Act was passed in 1947 with the primary objective of liberating women from the oppressive norms of the Devadasi system. Sanctioned by religion, the institutionalization of the Devadasi system within the Hindu community legitimated women from certain caste groups to become ‘servants of god’. Through ritualistic norms, the Devadasis were wedded to God and the caste Hindu patriarchs were authorized to control the sexuality of the Devadasis. Given their vulnerable status in terms of caste, class, and gender, women from the castes lower in hierarchy were forced into the system. Despite the legislative intervention of the Anti-Devdasi Act seven decades ago, there are newspaper reports, which substantiate the continuation of the Devadasi systems in some villages in Tamil Nadu, reiterating the power of caste and sexist ideologies within Hindu society. In contemporary times, the Devadasis are mainly drawn from the Scheduled castes, otherwise referred to as Dalits. Literatures by historically marginalized communities play a pivotal role in their liberation. On the contrary an analysis of the literatures by (or on) the Devadasis reveal the internalization of societal ideologies which impedes their empowerment and emancipation. Drawing on Simone de Beauvoir’s conceptualizations of the gendered body and Pierre Bourdieu’s theory of “habitus”, which underlines the embodied nature of social positions, this paper discusses the physical and psychological conditioning of the Devadasis within the caste Hindu society. Through an analysis of two Tamil novels, Moovalur Ramamirtham’s Dasigalin Mosavalai allathu Mathi Petra Minor and Imayam’s Sedal, this paper argues that the Devadasis depicted in the novels are embedded in caste and gender norms that denigrate and oppress them. Hence, as a paradox, their resistance to the system results in perpetuating the oppressive and discriminative social system rather than enabling liberation

    SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS

    Get PDF
    With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm

    Influencing Parameters on the Seismic Behavior of Steel Frames from Pushover Analysis

    Get PDF
    Soft storey collapse is one of the major reasons for failure of framed structures during earthquake. Lack of stiffness due to the absence of infill in one of the floors generally makes that floor relatively soft compared to the rest of the floors. Steel building frames are becoming popular in recent times, owing to the speed of construction, low maintenance requirements, strength and durability. Pushover analysis is a nonlinear static approach for the seismic analysis of structures subjected to permanent vertical load and gradually increasing lateral load at very large strains up to failure. Considering these aspects, in the present work, an attempt is made to describe the performance of soft storey steel frames against lateral seismic loads up to failure from Pushover analysis. For this purpose, ETABS, finite element software has been used. Typical Three dimensional steel frames are modeled and their seismic performance with soft storey at different storey levels having varying stiffness ratios is evaluated using pushover curves. Base shear carried status of performance point and number & status of hinges formed are the parameters used to quantify the performance of building frames. Sensitivity analysis of several factors such as floor position of soft storey, relative stiffness of soft storey with respect to other floors etc. is made. It is inferred that structures with soft storey are most vulnerable to earthquake forces. They possess lower lateral load carrying capacity and experience increased roof displacement. In the present study an attempt is also made to study the influence of bracings and connections on steel structures
    • 

    corecore