107 research outputs found
The state and civil society in disaster response: An analysis of the Tamil Nadu tsunami experience
ReportCAREEuropean Union's
Humanitarian Aid Department
Data Encryption and Authetication Using Public Key Approach
AbstractToday various numbers of diverse applications that include e- payments in secure commerce and payment applications to provide security for their communications and transactions by protecting passwords. Encryption is a fundamental tool for the protection of sensitive information. The purpose is to use encryption is privacy for preventing disclosure or confidentiality in during communications. In this paper, we proposed a new method which is based on the Euler's Totient theorem to produce a set of numbers that encrypt the data stream and then we used our proposed method using an ECC approach to generate the signature key which is added to encrypt data before transmission and decryption operation and a signature can verify at the receiver site
Image Encryption Using Elliptic Curve Cryptograhy and Matrix
AbstractThe enlarged size of the internet and vast communication across it and also medical needs digital images require of security plays vital role. So different techniques are used to protect confidential image data from unauthorized access. In this paper, we propose a New encryption technique Using elliptic curve cryptography with a magic matrix operations for securing images that transmits over a public unsecured channel. There are two most important groups of image encryption algorithms: some are non chaos-based selective methods and chaos- based selective methods. The majority of these algorithms is planned for a specific image format, compressed or uncompressed
Development of 17-4PH stainless steel bimodal powder injection molding feedstock with the help of interparticle spacing/lubricating liquid concept
Design of a powder injection molding (PIM) feedstock with proper selection of powder with unique particle size, particle shape and solid loading plays a significant role in controlling defects and distortion of PIM products. Using the concept of "interparticle spacing/volume fraction of lubricating liquid" 17-4PH stainless steel feedstocks with various bimodal powder combinations in thermoplastic polymer binder were designed and evaluated using both capillary and torque rheometers. Tendency to powder-binder separation, which is a factor indicating unacceptable distortions of sintered parts, is determined from the density variance during time-dependent viscosity measurement and thresholds in volume fraction of lubricating liquid as well as interparticle spacing parameters. The tailored feedstock with an optimum bimodal powder combination of coarse and fine particles exhibits suitable rheological performance with no evidence of separation and limited sintering distortion. © 2015 Elsevier B.V.Operational Program Research and Development for Innovations - ERDF; National Budget of Czech Republic [CZ.1.05/2.1.00/03.0111
A Bio-Crypto Protocol for Password Protection Using ECC
In information security the following security parameters like, integrity , non repudiation and confidentiality , authentication must be satisfied. To avoid thievery of organization resources it needs be secured in more efficient way and there is always demand for different levels of security attacks include virus , brute force and Eveadroper in business that organizations make use of voice biometrics an attractive low-cost. Voice biometrics is the cheapest among the other biometrics and used all levels for management to buy readily available metric and it is the way of identifying individuals remotely with high level of accuracy . In this work, we have been designed a new password- authentication approach that provides security using voice biometrics for authentication and uses the device itself into an authenticator which uses voice itself as its passwords and we are primarily interested in keys that can be temporally reproduced on the same device from the same user’s voice. Public and private keys are generated randomly from the user's voice and stored in the voice file(.wav).This Method uses voice recognition , include the operation of register( recording feature ) or voice prints and storing of one or more voice passwords into the database. It uses ECDSA to perform the authentication process that matching the voice sample with the database. The recognition, entity makes the database to decide that the sample is matched to perform an operation or not. Our proposed approach generates cryptographic keys from voice input itself and this algorithm developed an adhoc basis. It can effectively defend attacks specially brute force attack in system networks
Particle swarm optimization and Taguchi algorithm-based power system stabilizer-effect of light loading condition
A robust design of particle swarm optimization (PSO) and Taguchi algorithm-based power system stabilizer (PSS) is presented in this paper. It incorporates a novel concept in which Taguchi and PSO techniques are integrated for stabilization of single machine infinite bus (SMIB). The system tolerates uncertainty and imprecision to a maximum extent. The proposed controller's effectiveness is proved through experiments covering light load condition using MATLAB/Simulink platform. The performance of the system is compared without PSS and with a conventional PSS. The settling time of the optimal PSS is decreased by more than 75% to conventional PSS. The study reveals that the proposed hybrid controller offers enhanced performance with respect to settling time as well as peak overshoot of the system
The state and civil society in disaster response: an analysis of the Tamil Nadu tsunami experience
Investigation on wear and corrosion behavior of equal channel angular pressed aluminium 2014 alloy
Aluminium 2014 alloy solutionized at 495°C, aged at 195°C was subjected to Equal Channel Angular Pressing (ECAP). Dry sliding wear tests were conducted using pin on disc tribometer system under nominal loads of 10N and 30N with constant speed 2m/s for 2000m in order to investigate their wear behavior after ECAP. The Co-efficient of friction and loss in volume were decreased after ECAP. The dominant wear mechanism observed was adhesion, delamination in addition to these wear mechanisms, oxidation and transfer of Fe from the counter surface to the Al 2014 pin were observed at higher loading condition. The corrosion behavior was evaluated by potentiodynamic polarization (PDP) and electrochemical impedance spectroscopy (EIS) in 3.5% NaCl solution. The results obtained from PDP showed higher corrosion potential and lower corrosion density after ECAP than base. Electrochemical impedance spectroscopy (EIS) showed higher charge transfer resistance after ECAP. Surface morphology showed decreased pit size and increased oxygen content in ECAP sample than base after PDP
Hydroimidazolone Modification of the Conserved Arg12 in Small Heat Shock Proteins: Studies on the Structure and Chaperone Function Using Mutant Mimics
Methylglyoxal (MGO) is an α-dicarbonyl compound present ubiquitously in the human body. MGO reacts with arginine residues in proteins and forms adducts such as hydroimidazolone and argpyrimidine in vivo. Previously, we showed that MGO-mediated modification of αA-crystallin increased its chaperone function. We identified MGO-modified arginine residues in αA-crystallin and found that replacing such arginine residues with alanine residues mimicked the effects of MGO on the chaperone function. Arginine 12 (R12) is a conserved amino acid residue in Hsp27 as well as αA- and αB-crystallin. When treated with MGO at or near physiological concentrations (2–10 µM), R12 was modified to hydroimidazolone in all three small heat shock proteins. In this study, we determined the effect of arginine substitution with alanine at position 12 (R12A to mimic MGO modification) on the structure and chaperone function of these proteins. Among the three proteins, the R12A mutation improved the chaperone function of only αA-crystallin. This enhancement in the chaperone function was accompanied by subtle changes in the tertiary structure, which increased the thermodynamic stability of αA-crystallin. This mutation induced the exposure of additional client protein binding sites on αA-crystallin. Altogether, our data suggest that MGO-modification of the conserved R12 in αA-crystallin to hydroimidazolone may play an important role in reducing protein aggregation in the lens during aging and cataract formation
- …