107 research outputs found

    The state and civil society in disaster response: An analysis of the Tamil Nadu tsunami experience

    Get PDF
    ReportCAREEuropean Union's Humanitarian Aid Department

    Data Encryption and Authetication Using Public Key Approach

    Get PDF
    AbstractToday various numbers of diverse applications that include e- payments in secure commerce and payment applications to provide security for their communications and transactions by protecting passwords. Encryption is a fundamental tool for the protection of sensitive information. The purpose is to use encryption is privacy for preventing disclosure or confidentiality in during communications. In this paper, we proposed a new method which is based on the Euler's Totient theorem to produce a set of numbers that encrypt the data stream and then we used our proposed method using an ECC approach to generate the signature key which is added to encrypt data before transmission and decryption operation and a signature can verify at the receiver site

    Image Encryption Using Elliptic Curve Cryptograhy and Matrix

    Get PDF
    AbstractThe enlarged size of the internet and vast communication across it and also medical needs digital images require of security plays vital role. So different techniques are used to protect confidential image data from unauthorized access. In this paper, we propose a New encryption technique Using elliptic curve cryptography with a magic matrix operations for securing images that transmits over a public unsecured channel. There are two most important groups of image encryption algorithms: some are non chaos-based selective methods and chaos- based selective methods. The majority of these algorithms is planned for a specific image format, compressed or uncompressed

    Development of 17-4PH stainless steel bimodal powder injection molding feedstock with the help of interparticle spacing/lubricating liquid concept

    Get PDF
    Design of a powder injection molding (PIM) feedstock with proper selection of powder with unique particle size, particle shape and solid loading plays a significant role in controlling defects and distortion of PIM products. Using the concept of "interparticle spacing/volume fraction of lubricating liquid" 17-4PH stainless steel feedstocks with various bimodal powder combinations in thermoplastic polymer binder were designed and evaluated using both capillary and torque rheometers. Tendency to powder-binder separation, which is a factor indicating unacceptable distortions of sintered parts, is determined from the density variance during time-dependent viscosity measurement and thresholds in volume fraction of lubricating liquid as well as interparticle spacing parameters. The tailored feedstock with an optimum bimodal powder combination of coarse and fine particles exhibits suitable rheological performance with no evidence of separation and limited sintering distortion. © 2015 Elsevier B.V.Operational Program Research and Development for Innovations - ERDF; National Budget of Czech Republic [CZ.1.05/2.1.00/03.0111

    A Bio-Crypto Protocol for Password Protection Using ECC

    Get PDF
    In  information  security the  following security parameters like, integrity , non repudiation and confidentiality , authentication   must be satisfied.  To avoid thievery of organization resources  it needs be secured in more efficient way  and there is always demand  for different levels of security attacks include virus , brute force and Eveadroper  in business that  organizations make use of voice biometrics an attractive low-cost. Voice biometrics is the  cheapest  among the  other biometrics and used all levels for management to buy readily available metric and it is the way of  identifying individuals remotely  with high level of accuracy . In this work, we have been designed a  new  password- authentication approach  that provides security  using voice biometrics for authentication and uses the device  itself into an authenticator which uses  voice itself as its passwords and we are primarily interested in keys that can be temporally reproduced on the same device from the same user’s voice. Public and private keys are generated  randomly from the user's voice  and stored in the voice file(.wav).This Method uses voice recognition , include the operation of  register( recording feature ) or voice prints  and  storing of one or more voice passwords into the  database. It uses ECDSA to perform the authentication process that matching the  voice sample  with the database. The recognition, entity makes the database  to decide that  the sample is matched to perform an operation or not. Our proposed approach  generates cryptographic keys from voice input itself and this algorithm developed an adhoc basis. It can effectively defend  attacks specially brute force attack in system networks

    Particle swarm optimization and Taguchi algorithm-based power system stabilizer-effect of light loading condition

    Get PDF
    A robust design of particle swarm optimization (PSO) and Taguchi algorithm-based power system stabilizer (PSS) is presented in this paper. It incorporates a novel concept in which Taguchi and PSO techniques are integrated for stabilization of single machine infinite bus (SMIB). The system tolerates uncertainty and imprecision to a maximum extent. The proposed controller's effectiveness is proved through experiments covering light load condition using MATLAB/Simulink platform. The performance of the system is compared without PSS and with a conventional PSS. The settling time of the optimal PSS is decreased by more than 75% to conventional PSS. The study reveals that the proposed hybrid controller offers enhanced performance with respect to settling time as well as peak overshoot of the system

    Investigation on wear and corrosion behavior of equal channel angular pressed aluminium 2014 alloy

    Get PDF
    Aluminium 2014 alloy solutionized at 495°C, aged at 195°C was subjected to Equal Channel Angular Pressing (ECAP). Dry sliding wear tests were conducted using pin on disc tribometer system under nominal loads of 10N and 30N with constant speed 2m/s for 2000m in order to investigate their wear behavior after ECAP. The Co-efficient of friction and loss in volume were decreased after ECAP. The dominant wear mechanism observed was adhesion, delamination in addition to these wear mechanisms, oxidation and transfer of Fe from the counter surface to the Al 2014 pin were observed at higher loading condition. The corrosion behavior was evaluated by potentiodynamic polarization (PDP) and electrochemical impedance spectroscopy (EIS) in 3.5% NaCl solution. The results obtained from PDP showed higher corrosion potential and lower corrosion density after ECAP than base. Electrochemical impedance spectroscopy (EIS) showed higher charge transfer resistance after ECAP. Surface morphology showed decreased pit size and increased oxygen content in ECAP sample than base after PDP

    Hydroimidazolone Modification of the Conserved Arg12 in Small Heat Shock Proteins: Studies on the Structure and Chaperone Function Using Mutant Mimics

    Get PDF
    Methylglyoxal (MGO) is an α-dicarbonyl compound present ubiquitously in the human body. MGO reacts with arginine residues in proteins and forms adducts such as hydroimidazolone and argpyrimidine in vivo. Previously, we showed that MGO-mediated modification of αA-crystallin increased its chaperone function. We identified MGO-modified arginine residues in αA-crystallin and found that replacing such arginine residues with alanine residues mimicked the effects of MGO on the chaperone function. Arginine 12 (R12) is a conserved amino acid residue in Hsp27 as well as αA- and αB-crystallin. When treated with MGO at or near physiological concentrations (2–10 µM), R12 was modified to hydroimidazolone in all three small heat shock proteins. In this study, we determined the effect of arginine substitution with alanine at position 12 (R12A to mimic MGO modification) on the structure and chaperone function of these proteins. Among the three proteins, the R12A mutation improved the chaperone function of only αA-crystallin. This enhancement in the chaperone function was accompanied by subtle changes in the tertiary structure, which increased the thermodynamic stability of αA-crystallin. This mutation induced the exposure of additional client protein binding sites on αA-crystallin. Altogether, our data suggest that MGO-modification of the conserved R12 in αA-crystallin to hydroimidazolone may play an important role in reducing protein aggregation in the lens during aging and cataract formation
    corecore