This document summarizes an article from the International Journal of Electronics and Communication Engineering & Technology about generating cryptographically secure pseudo-random numbers using an FPGA. It discusses different methods of random number generation including pseudo-random number generators (PRNGs) and true random number generators (TRNGs). It also describes the Blum Blum Shub generator for generating cryptographically secure pseudo-random numbers and its implementation on a Virtex-5 FPGA using VHDL. Simulation results are shown validating the random number generation using CORDIC and ChipScope Pro.
The document discusses hardware Trojan detection techniques. It describes the objective of detecting Trojans in circuits by analyzing power and delay. It then discusses different Trojan detection techniques like power measurement, path delay measurement, and physical design based testing. It also describes different types of hardware Trojans and provides implementation results of detecting Trojans in circuits like an 8:1 MUX and full adder using LBIST. LBIST was also implemented in an AES core to detect Trojans, achieving high test coverage while detecting minimal changes in area and power between Trojan-free and Trojan-inserted circuits.
This is a seminar on hardware trojan that i have given during my M.tech. It follows the latest classification of hardware trojans used in research community. 3 latest hardware trojan detection technique and 2 insertion techniques are presented in slides.
Hardware trojan detection technique using side channel analysis for hardware ...Ashish Maurya
The document presents two techniques for detecting hardware Trojans: detection using power analysis and detection using active current sensing circuits. For power analysis, a ring oscillator network is used to detect Trojans by measuring changes in oscillation frequency from power supply noise. NAND gate-based ring oscillators are more sensitive than NOT gate-based ones. For current sensing, circuits measure switching activity and path delays to detect Trojans even if they do not impact delays or power. Both techniques aim to detect rarely activated Trojans through side-channel analysis of power signatures.
Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGAVivek Venugopalan
This document discusses hardware Trojan threats in FPGAs. It proposes a novel metric called the Hardware Trojan Threat Detectability Metric (HDM) that uses weighted physical parameters to detect Trojans. Several Trojans were designed and implemented in an FPGA testbed to compromise systems. HDM increased detection rates to 86% compared to 57% using single parameters. The document analyzes potential attack surfaces in FPGAs and discusses optimization of Trojans to avoid detection.
Hardware Trojans, a relatively unheard threat viz-a-viz the typical software based malwares and virus attacks ,that keep befalling across is being realized gradually by the IT security domain including the users, the IT Security guys and the corporate sector who all of a sudden recognize the immense threat they might already be living in with. A distinctive dormant Hardware Trojan threat can be so flagitious that the victim doesn’t even know if he is effectuated when he might already be. Hardware Trojans are evolving threats that can shake the roots of any set and constituted government or corporate giant for that matter. Unlike Software virus/malware threats, Hardware Trojans are persistent in nature ie once infected in an IC, the threat remains and cannot be removed even once detected. The presentation i plan to run will bring out the over view of these threats including classifications, mechanisms they work on,few case studies and the current set of countermeasures being researched upon.
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET Journal
This document summarizes research on homomorphic encryption in cloud computing. It begins by defining homomorphic encryption as an encryption scheme that allows computations to be performed on encrypted data without decrypting it first. It then categorizes homomorphic encryption schemes as partially homomorphic, somewhat homomorphic, or fully homomorphic based on the types and number of computations they allow. The document provides details on specific partially and somewhat homomorphic encryption schemes before focusing on fully homomorphic encryption, the first practical version of which was introduced in 2009. It concludes by discussing benefits like enhanced privacy but also drawbacks like complexity of fully homomorphic encryption schemes.
Hardware Trojan detection using Clock sweeping methodAshish Maurya
The document summarizes a presentation on detecting hardware Trojans using clock sweeping. It introduces the clock sweeping technique, which involves applying test patterns at different clock frequencies to obtain path delay information without additional hardware. Signatures are generated from the path delay data and compared to identify potential Trojans. The technique aims to detect Trojans through their impact on circuit delays, especially shorter paths. It is shown to be effective for critical and non-critical paths, and can detect Trojans without full activation. However, process variations and measurement noise still pose challenges.
The document discusses hardware Trojan detection techniques. It describes the objective of detecting Trojans in circuits by analyzing power and delay. It then discusses different Trojan detection techniques like power measurement, path delay measurement, and physical design based testing. It also describes different types of hardware Trojans and provides implementation results of detecting Trojans in circuits like an 8:1 MUX and full adder using LBIST. LBIST was also implemented in an AES core to detect Trojans, achieving high test coverage while detecting minimal changes in area and power between Trojan-free and Trojan-inserted circuits.
This is a seminar on hardware trojan that i have given during my M.tech. It follows the latest classification of hardware trojans used in research community. 3 latest hardware trojan detection technique and 2 insertion techniques are presented in slides.
Hardware trojan detection technique using side channel analysis for hardware ...Ashish Maurya
The document presents two techniques for detecting hardware Trojans: detection using power analysis and detection using active current sensing circuits. For power analysis, a ring oscillator network is used to detect Trojans by measuring changes in oscillation frequency from power supply noise. NAND gate-based ring oscillators are more sensitive than NOT gate-based ones. For current sensing, circuits measure switching activity and path delays to detect Trojans even if they do not impact delays or power. Both techniques aim to detect rarely activated Trojans through side-channel analysis of power signatures.
Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGAVivek Venugopalan
This document discusses hardware Trojan threats in FPGAs. It proposes a novel metric called the Hardware Trojan Threat Detectability Metric (HDM) that uses weighted physical parameters to detect Trojans. Several Trojans were designed and implemented in an FPGA testbed to compromise systems. HDM increased detection rates to 86% compared to 57% using single parameters. The document analyzes potential attack surfaces in FPGAs and discusses optimization of Trojans to avoid detection.
Hardware Trojans, a relatively unheard threat viz-a-viz the typical software based malwares and virus attacks ,that keep befalling across is being realized gradually by the IT security domain including the users, the IT Security guys and the corporate sector who all of a sudden recognize the immense threat they might already be living in with. A distinctive dormant Hardware Trojan threat can be so flagitious that the victim doesn’t even know if he is effectuated when he might already be. Hardware Trojans are evolving threats that can shake the roots of any set and constituted government or corporate giant for that matter. Unlike Software virus/malware threats, Hardware Trojans are persistent in nature ie once infected in an IC, the threat remains and cannot be removed even once detected. The presentation i plan to run will bring out the over view of these threats including classifications, mechanisms they work on,few case studies and the current set of countermeasures being researched upon.
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET Journal
This document summarizes research on homomorphic encryption in cloud computing. It begins by defining homomorphic encryption as an encryption scheme that allows computations to be performed on encrypted data without decrypting it first. It then categorizes homomorphic encryption schemes as partially homomorphic, somewhat homomorphic, or fully homomorphic based on the types and number of computations they allow. The document provides details on specific partially and somewhat homomorphic encryption schemes before focusing on fully homomorphic encryption, the first practical version of which was introduced in 2009. It concludes by discussing benefits like enhanced privacy but also drawbacks like complexity of fully homomorphic encryption schemes.
Hardware Trojan detection using Clock sweeping methodAshish Maurya
The document summarizes a presentation on detecting hardware Trojans using clock sweeping. It introduces the clock sweeping technique, which involves applying test patterns at different clock frequencies to obtain path delay information without additional hardware. Signatures are generated from the path delay data and compared to identify potential Trojans. The technique aims to detect Trojans through their impact on circuit delays, especially shorter paths. It is shown to be effective for critical and non-critical paths, and can detect Trojans without full activation. However, process variations and measurement noise still pose challenges.
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data ExfiltrationCheckmarx
Pedro Umbelino, a researcher on the Checkmarx Security Research Team, presented recently at Hack.lu. The focus was on covert channels for air-gapped systems, data exfiltration, NFC research and BLE Smart Bulb research.
Quantum cryptography for secured communication networksIJECEIAES
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
Abstract: Design verification is an essential step in the development of any product. It ensures that the product as designed is the same as the product as intended. Software simulation is the common approach for validating hardware design unfortunately, it will take hours together to execute. Difficulties in validation arise due to the complexity of the design and also due to the lack of on chip observability. One common solution to this problem is to instrument the prototype using trace-buffers to record a subset of internal signals into on-chip memory for subsequent analysis. In the proposed system, an example circuit is implemented to perform the tracing operation and various trace buffers are designed to record the different stages of internal signal states. The resulting signal states are to be stored, like a error outputs. Low power methodologies are also implemented to achieve low power consumption. Thus the errors are separately stored in the memory for analyzing the signals. This might be used for changes in the logic wherever needed. Thus this tracing is performed to monitor signal states of an FPGA.
Telecom security from ss7 to all ip all-open-v3-zeronightsP1Security
Telecom security is way more than SIP-breaking some peripheral PBXs and raking a few thousands of dollars of free calls. From the formerly closed garden of SS7 to new all-IP telecom protocols such as Diameter and LTE protocols, the telecom domain faces now both the challenges of availability -one minute of downtime costs literally millions- and signaling vulnerabilities cutting down entire countries, causing massive frauds and the all new networking protocols. These new telecom protocols are rolled out in IP-centric fashion, with its myriad of standard IP security pitfalls and vulnerabilities, as well as very specific telecom vulnerabilities. The HLR is not only using TCP/IP for OAM and business workflow, but also now being named an HSS, it uses IP-only protocols such as Diameter for its Core Network signaling operations. That means that now telecom are facing new security risks both in term of exposure and threats, with its Core Network being exposed to unsophisticated IP-centered attackers, and the continuous waves of telecom-centered defrauders. In this presentation, we'll demo the new technologies of 3G and LTE networks and how to attack and defend them. We'll also show what kind of exposure one telecom companies, Mobile Network Operators and SS7 providers shows to external attackers.
The document summarizes a technique called FERNS that uses the power-up state of SRAM cells to provide both device identification and random number generation capabilities without requiring additional hardware. SRAM power-up state varies across chips due to manufacturing variations, providing a fingerprint for identification. It also varies across power cycles due to noise, providing a source of randomness. FERNS was tested on both passive RFID tags and microcontrollers, demonstrating its potential low-cost applications for device identification and random number generation using only existing SRAM circuits.
Essential principles of jitter part 2 the components of jitterteledynelecroy
-The power of statistical analysis
-The five fundamental types of jitter: ISI, DCD, Periodic, Random, Other
-Their statistical “signature”
-The jitter “tree”
-Synthesizing examples based on their root cause
Optimization of latency of temporal key Integrity protocol (tkip) using graph...ijcseit
The document discusses optimization of latency in the Temporal Key Integrity Protocol (TKIP) using hardware-software co-design and graph theory. It presents a mathematical model to partition TKIP algorithms between hardware and software blocks to minimize latency. Simulation results showed the proposed technique achieved lower latency than a hardware-only implementation, reducing latency from 10us to 8us. The technique models TKIP modules as a graph and uses algorithms to assign modules to hardware or software based on latency calculations.
This document presents a MATLAB Simulink model of a QPSK modulated reusable UWB-based optical network. Key aspects include:
1) The model simulates a WDM PON system using QPSK modulation to transmit data over single mode fiber, with and without wavelength reuse from downstream UWB signals.
2) System performance is evaluated by measuring BER and SNR over increasing fiber lengths.
3) Results show that wavelength reuse does not degrade performance, as SNR and BER values closely resemble the non-reuse method over transmission lengths up to 40,000km.
4) The study demonstrates an effective method for wavelength reuse in optical networks to reduce implementation costs without compromising performance.
This document presents a novel dual open stub and U-slot loaded square microstrip antenna design for quad-band operation between 4.37-9.40 GHz. The antenna consists of a square patch with two open stubs placed diagonally and a U-slot embedded in the center. Experimental results show the antenna resonates at four bands with impedance bandwidths between 1.7-9.25% and achieves a peak gain of 2.76 dB, which is 3.45 times higher than a conventional square microstrip antenna. The proposed antenna design is compact, uses low-cost materials, and may be suitable for wireless applications such as WLAN and systems operating in the X-band frequency range.
This document summarizes an experimental study on improving the productivity of a single basin solar still. Two similar solar stills were constructed and tested, with one having a water-cooled glass cover to reduce the condensing surface temperature. Over the course of eight-hour experiments on multiple days, temperatures and solar intensity were recorded every 30 minutes. Cooling the glass cover was found to increase both the convective and evaporative heat transfer coefficients compared to the uncovered still. This led to a 17% increase in distillate output due to the higher temperature difference achieved between the evaporating and condensing surfaces.
The document summarizes research on the effect of adding nano silicon dioxide (SiO2) particles to polylactic acid (PLA) films on their mechanical properties. PLA films were produced with 0%, 1%, 3%, and 5% nano SiO2 via solution casting. Tests showed adding 5% nano SiO2 increased the tensile strength of PLA films by 35% and the Young's modulus by 25%. Characterization with FTIR and X-ray diffraction confirmed the nano SiO2 was well dispersed in the PLA matrix and showed interactions between the materials. The improved mechanical properties are due to good polymer-filler interactions from uniform nano SiO2 dispersion in the PLA matrix. The research
Total quality management (TQM) principles from manufacturing can be applied to engineering education in India to improve quality. The document discusses mapping Deming's 14 points for quality to the context of technical institutes. It also examines using external quality awards to guide quality improvement efforts and maintain standards. Quality frameworks and assessment models adapted from programs like the EFQM can help institutions prioritize improvement projects and conduct self-assessments.
This document discusses localization techniques for wireless sensor networks. It begins by introducing the importance of localization for applications involving search and rescue operations. It then reviews existing localization approaches, distinguishing between range-free methods that rely on connectivity information and range-based methods that use distance measurements. The document proposes a new algorithm for 3D localization in wireless sensor networks that combines both range-free and range-based approaches to achieve high accuracy localization, important for applications involving human lives. It describes the steps of the proposed algorithm and how it bounds the location of sensor nodes within rectangular regions to narrow down possible positions.
This document summarizes a research paper that presents the design and development of a dual notch loaded square microstrip antenna for operation across five frequency bands (penta band). The antenna was fabricated on a low-cost glass epoxy substrate measuring 80 x 50 x 1.6 mm3. Experimental results showed the antenna operated between 2.83-8.40 GHz with a maximum bandwidth of 5.7% and a peak gain of 2.86 dB. Dual notches placed diagonally on the patch enabled multiband operation. This low-cost and compact antenna design could enable applications in wireless local area networks and systems operating in the C band frequencies.
This document summarizes an article from the International Journal of Management that examines the relationship between corporate social responsibility and financial performance. The article reviews definitions of CSR from various scholars, noting there is no universally agreed upon definition. It examines factors that contribute to CSR and explores how CSR may impact financial performance based on a company's contributions in its industry. The article also reviews research techniques used in similar studies. The summary provides key definitions and concepts discussed in the document to give an overview of the topic and goals of the article.
sequence of random numbers i.e. the pseudo for generating
important in securing the Internet traffic in places where low memory utilization in the area of cryptography and low
l(eLvFeSl Ro)f. specseuuridtoy riasn rdeoqmui rbeidt . sTeqhue epnsceeusd oar-era npdroovmid ne ubmyb eLri ngear feedback shift registers for a variety of purposes and
widely used as synchronization codes, masking or scrambling codes, and signal sets in
access) communications, white noise signals in Communication systems key stream generators in stream cipher
cryptosystems, random number generators in many cryptographic primitive algorithms, and for testing vectors in
hardware design.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Random Number Generator Using Seven Segment Display In LabviewIJERA Editor
Random number generator [RNG] is use to generate random numbers between any given limit, RNG's are two kinds 1.True random number and 2.pseudom numbers. True random numbers are not predictable by any mathematical formula because they are mainly depends on the atmospheric noise, coming to the pseudo numbers are mainly used in most of computers, this randomness can be predictable by using mathematical formula and it is fine many purposes, but it may not be random in the way you expect if you are used to dice rolls and lottery drawings. In this mini project we are doing RNG [pseudo numbers] by using NI labview software and generating random numbers by pressing push button and coming output we are displaying on seven segment display. In the labview it easy to generate a random number by using different block‟s and main advantage of the labview is there is no need of any programming languages like[c,c++,java,matlab].Main function of this project is used for gaming and priority number generation and etc. A sequence of uniform random numbers, which is generated within the computer in a deterministic manner, is often referred to as a pseudo-random number sequence.[1]
This document describes an FPGA implementation of the Park-Miller algorithm to generate a sequence of 32-bit pseudo-random keys for encrypting and decrypting text messages. The Park-Miller algorithm is used to generate the pseudo-random keys on an FPGA using 32-bit operations. The generated keys are then used to encrypt plaintext by XORing the text with the keys to produce ciphertext. The same keys are also used to decrypt the ciphertext back to the original plaintext. The design is programmed in Verilog HDL and simulated in Modelsim to verify it works as intended. It is then synthesized for and implemented on a Spartan 6E FPGA.
This document discusses pseudo-random number generators (PRNGs) and methods for improving their properties. It proposes a new reseeding-mixing method to extend the period length and enhance statistical properties of a chaos-based PRNG. The reseeding method removes short periods of a digitized logistic map, while mixing with a DX generator extends the period to over 2253. It also discusses periodically changing an initial pattern to increase randomization. The proposed PRNG combines a nonlinear module, reseeding module, and vector mixing module. The reseeding module compares state values to detect fixed points and increases a reseeding counter to perturb states away from fixed points.
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...IJECEIAES
For a long time, random numbers have been used in many fields of application. Much work has been conducted to generate truly random numbers and is still in progress. A popular method for generating random numbers is a linear-feedback shift register (LFSR). Even though a lot of work has been done using this method to search for truly random numbers, it is an area that continues to attract interest. Therefore, this paper proposes a circuit for generating random numbers. The proposed circuit is designed to produce different sequences of numbers. Two segments of Fibonacci LFSR are used to form a generator that can produce more varied random numbers. The proposed design consists of blocks: segment 1, segment 2, and a clock controller. The system produces random numbers based on an external clock. The clock signal for the first segment is that of the external clock, whereas that for the second segment is modified by the clock controller. The second stage (segment 2) is executed only after every 2 n1 −1 clock cycles. The proposed design can generate different sequences of random numbers compare to those of the conventional methods. The period of the proposed system is less than that of the original Fibonacci LFSR. However, the period is almost equal to the original one when the system is realized in 32-bit or 64bit form. Finally, the proposed design is implemented on a fieldprogrammable gate array (FPGA). It occupies more area and runs at a lower frequency compared with the original Fibonacci LFSR. However, the proposed design is more efficient than the segmented leap-ahead method concerning space occupancy.
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
This paper shows a new technic applicable for the digital devices that are the result of the finite’s
effect precision in the chaotic dynamics used in the coupled technic and the chaotic map’s perturbation
technics used for the generation of a Pseudo-Random Number Generator (PRNGs).The use of the
pseudo- chaotic sequences coupled to the orbit perturbation method in the chaotic logistic map and the
NewPiece-Wise Linear Chaotic Map (NPWLCM). The pseudo random number generator’s originality
proposed from the perturbation of the chaotic recurrence. Furthermore the outputs of the binary sequences
with NPWLCM are reconstructed conventionally with the Bernoulli’s sequences shifts map to change the
shapes with the bitwise permetation then the results in simulation are shown in progress.After being
perturbed, the chaotic system can generate the chaotic binary sequences in uniform distribution and the
statistical properties invulnerable analysis. This generator also has many advantages in the possible useful
applications of spread spectrum digitalimages, such as sensitive secret keys, random uniform distribution
of pixels in Crypto system in secure and synchronize communication.
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data ExfiltrationCheckmarx
Pedro Umbelino, a researcher on the Checkmarx Security Research Team, presented recently at Hack.lu. The focus was on covert channels for air-gapped systems, data exfiltration, NFC research and BLE Smart Bulb research.
Quantum cryptography for secured communication networksIJECEIAES
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
Abstract: Design verification is an essential step in the development of any product. It ensures that the product as designed is the same as the product as intended. Software simulation is the common approach for validating hardware design unfortunately, it will take hours together to execute. Difficulties in validation arise due to the complexity of the design and also due to the lack of on chip observability. One common solution to this problem is to instrument the prototype using trace-buffers to record a subset of internal signals into on-chip memory for subsequent analysis. In the proposed system, an example circuit is implemented to perform the tracing operation and various trace buffers are designed to record the different stages of internal signal states. The resulting signal states are to be stored, like a error outputs. Low power methodologies are also implemented to achieve low power consumption. Thus the errors are separately stored in the memory for analyzing the signals. This might be used for changes in the logic wherever needed. Thus this tracing is performed to monitor signal states of an FPGA.
Telecom security from ss7 to all ip all-open-v3-zeronightsP1Security
Telecom security is way more than SIP-breaking some peripheral PBXs and raking a few thousands of dollars of free calls. From the formerly closed garden of SS7 to new all-IP telecom protocols such as Diameter and LTE protocols, the telecom domain faces now both the challenges of availability -one minute of downtime costs literally millions- and signaling vulnerabilities cutting down entire countries, causing massive frauds and the all new networking protocols. These new telecom protocols are rolled out in IP-centric fashion, with its myriad of standard IP security pitfalls and vulnerabilities, as well as very specific telecom vulnerabilities. The HLR is not only using TCP/IP for OAM and business workflow, but also now being named an HSS, it uses IP-only protocols such as Diameter for its Core Network signaling operations. That means that now telecom are facing new security risks both in term of exposure and threats, with its Core Network being exposed to unsophisticated IP-centered attackers, and the continuous waves of telecom-centered defrauders. In this presentation, we'll demo the new technologies of 3G and LTE networks and how to attack and defend them. We'll also show what kind of exposure one telecom companies, Mobile Network Operators and SS7 providers shows to external attackers.
The document summarizes a technique called FERNS that uses the power-up state of SRAM cells to provide both device identification and random number generation capabilities without requiring additional hardware. SRAM power-up state varies across chips due to manufacturing variations, providing a fingerprint for identification. It also varies across power cycles due to noise, providing a source of randomness. FERNS was tested on both passive RFID tags and microcontrollers, demonstrating its potential low-cost applications for device identification and random number generation using only existing SRAM circuits.
Essential principles of jitter part 2 the components of jitterteledynelecroy
-The power of statistical analysis
-The five fundamental types of jitter: ISI, DCD, Periodic, Random, Other
-Their statistical “signature”
-The jitter “tree”
-Synthesizing examples based on their root cause
Optimization of latency of temporal key Integrity protocol (tkip) using graph...ijcseit
The document discusses optimization of latency in the Temporal Key Integrity Protocol (TKIP) using hardware-software co-design and graph theory. It presents a mathematical model to partition TKIP algorithms between hardware and software blocks to minimize latency. Simulation results showed the proposed technique achieved lower latency than a hardware-only implementation, reducing latency from 10us to 8us. The technique models TKIP modules as a graph and uses algorithms to assign modules to hardware or software based on latency calculations.
This document presents a MATLAB Simulink model of a QPSK modulated reusable UWB-based optical network. Key aspects include:
1) The model simulates a WDM PON system using QPSK modulation to transmit data over single mode fiber, with and without wavelength reuse from downstream UWB signals.
2) System performance is evaluated by measuring BER and SNR over increasing fiber lengths.
3) Results show that wavelength reuse does not degrade performance, as SNR and BER values closely resemble the non-reuse method over transmission lengths up to 40,000km.
4) The study demonstrates an effective method for wavelength reuse in optical networks to reduce implementation costs without compromising performance.
This document presents a novel dual open stub and U-slot loaded square microstrip antenna design for quad-band operation between 4.37-9.40 GHz. The antenna consists of a square patch with two open stubs placed diagonally and a U-slot embedded in the center. Experimental results show the antenna resonates at four bands with impedance bandwidths between 1.7-9.25% and achieves a peak gain of 2.76 dB, which is 3.45 times higher than a conventional square microstrip antenna. The proposed antenna design is compact, uses low-cost materials, and may be suitable for wireless applications such as WLAN and systems operating in the X-band frequency range.
This document summarizes an experimental study on improving the productivity of a single basin solar still. Two similar solar stills were constructed and tested, with one having a water-cooled glass cover to reduce the condensing surface temperature. Over the course of eight-hour experiments on multiple days, temperatures and solar intensity were recorded every 30 minutes. Cooling the glass cover was found to increase both the convective and evaporative heat transfer coefficients compared to the uncovered still. This led to a 17% increase in distillate output due to the higher temperature difference achieved between the evaporating and condensing surfaces.
The document summarizes research on the effect of adding nano silicon dioxide (SiO2) particles to polylactic acid (PLA) films on their mechanical properties. PLA films were produced with 0%, 1%, 3%, and 5% nano SiO2 via solution casting. Tests showed adding 5% nano SiO2 increased the tensile strength of PLA films by 35% and the Young's modulus by 25%. Characterization with FTIR and X-ray diffraction confirmed the nano SiO2 was well dispersed in the PLA matrix and showed interactions between the materials. The improved mechanical properties are due to good polymer-filler interactions from uniform nano SiO2 dispersion in the PLA matrix. The research
Total quality management (TQM) principles from manufacturing can be applied to engineering education in India to improve quality. The document discusses mapping Deming's 14 points for quality to the context of technical institutes. It also examines using external quality awards to guide quality improvement efforts and maintain standards. Quality frameworks and assessment models adapted from programs like the EFQM can help institutions prioritize improvement projects and conduct self-assessments.
This document discusses localization techniques for wireless sensor networks. It begins by introducing the importance of localization for applications involving search and rescue operations. It then reviews existing localization approaches, distinguishing between range-free methods that rely on connectivity information and range-based methods that use distance measurements. The document proposes a new algorithm for 3D localization in wireless sensor networks that combines both range-free and range-based approaches to achieve high accuracy localization, important for applications involving human lives. It describes the steps of the proposed algorithm and how it bounds the location of sensor nodes within rectangular regions to narrow down possible positions.
This document summarizes a research paper that presents the design and development of a dual notch loaded square microstrip antenna for operation across five frequency bands (penta band). The antenna was fabricated on a low-cost glass epoxy substrate measuring 80 x 50 x 1.6 mm3. Experimental results showed the antenna operated between 2.83-8.40 GHz with a maximum bandwidth of 5.7% and a peak gain of 2.86 dB. Dual notches placed diagonally on the patch enabled multiband operation. This low-cost and compact antenna design could enable applications in wireless local area networks and systems operating in the C band frequencies.
This document summarizes an article from the International Journal of Management that examines the relationship between corporate social responsibility and financial performance. The article reviews definitions of CSR from various scholars, noting there is no universally agreed upon definition. It examines factors that contribute to CSR and explores how CSR may impact financial performance based on a company's contributions in its industry. The article also reviews research techniques used in similar studies. The summary provides key definitions and concepts discussed in the document to give an overview of the topic and goals of the article.
sequence of random numbers i.e. the pseudo for generating
important in securing the Internet traffic in places where low memory utilization in the area of cryptography and low
l(eLvFeSl Ro)f. specseuuridtoy riasn rdeoqmui rbeidt . sTeqhue epnsceeusd oar-era npdroovmid ne ubmyb eLri ngear feedback shift registers for a variety of purposes and
widely used as synchronization codes, masking or scrambling codes, and signal sets in
access) communications, white noise signals in Communication systems key stream generators in stream cipher
cryptosystems, random number generators in many cryptographic primitive algorithms, and for testing vectors in
hardware design.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Random Number Generator Using Seven Segment Display In LabviewIJERA Editor
Random number generator [RNG] is use to generate random numbers between any given limit, RNG's are two kinds 1.True random number and 2.pseudom numbers. True random numbers are not predictable by any mathematical formula because they are mainly depends on the atmospheric noise, coming to the pseudo numbers are mainly used in most of computers, this randomness can be predictable by using mathematical formula and it is fine many purposes, but it may not be random in the way you expect if you are used to dice rolls and lottery drawings. In this mini project we are doing RNG [pseudo numbers] by using NI labview software and generating random numbers by pressing push button and coming output we are displaying on seven segment display. In the labview it easy to generate a random number by using different block‟s and main advantage of the labview is there is no need of any programming languages like[c,c++,java,matlab].Main function of this project is used for gaming and priority number generation and etc. A sequence of uniform random numbers, which is generated within the computer in a deterministic manner, is often referred to as a pseudo-random number sequence.[1]
This document describes an FPGA implementation of the Park-Miller algorithm to generate a sequence of 32-bit pseudo-random keys for encrypting and decrypting text messages. The Park-Miller algorithm is used to generate the pseudo-random keys on an FPGA using 32-bit operations. The generated keys are then used to encrypt plaintext by XORing the text with the keys to produce ciphertext. The same keys are also used to decrypt the ciphertext back to the original plaintext. The design is programmed in Verilog HDL and simulated in Modelsim to verify it works as intended. It is then synthesized for and implemented on a Spartan 6E FPGA.
This document discusses pseudo-random number generators (PRNGs) and methods for improving their properties. It proposes a new reseeding-mixing method to extend the period length and enhance statistical properties of a chaos-based PRNG. The reseeding method removes short periods of a digitized logistic map, while mixing with a DX generator extends the period to over 2253. It also discusses periodically changing an initial pattern to increase randomization. The proposed PRNG combines a nonlinear module, reseeding module, and vector mixing module. The reseeding module compares state values to detect fixed points and increases a reseeding counter to perturb states away from fixed points.
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...IJECEIAES
For a long time, random numbers have been used in many fields of application. Much work has been conducted to generate truly random numbers and is still in progress. A popular method for generating random numbers is a linear-feedback shift register (LFSR). Even though a lot of work has been done using this method to search for truly random numbers, it is an area that continues to attract interest. Therefore, this paper proposes a circuit for generating random numbers. The proposed circuit is designed to produce different sequences of numbers. Two segments of Fibonacci LFSR are used to form a generator that can produce more varied random numbers. The proposed design consists of blocks: segment 1, segment 2, and a clock controller. The system produces random numbers based on an external clock. The clock signal for the first segment is that of the external clock, whereas that for the second segment is modified by the clock controller. The second stage (segment 2) is executed only after every 2 n1 −1 clock cycles. The proposed design can generate different sequences of random numbers compare to those of the conventional methods. The period of the proposed system is less than that of the original Fibonacci LFSR. However, the period is almost equal to the original one when the system is realized in 32-bit or 64bit form. Finally, the proposed design is implemented on a fieldprogrammable gate array (FPGA). It occupies more area and runs at a lower frequency compared with the original Fibonacci LFSR. However, the proposed design is more efficient than the segmented leap-ahead method concerning space occupancy.
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
This paper shows a new technic applicable for the digital devices that are the result of the finite’s
effect precision in the chaotic dynamics used in the coupled technic and the chaotic map’s perturbation
technics used for the generation of a Pseudo-Random Number Generator (PRNGs).The use of the
pseudo- chaotic sequences coupled to the orbit perturbation method in the chaotic logistic map and the
NewPiece-Wise Linear Chaotic Map (NPWLCM). The pseudo random number generator’s originality
proposed from the perturbation of the chaotic recurrence. Furthermore the outputs of the binary sequences
with NPWLCM are reconstructed conventionally with the Bernoulli’s sequences shifts map to change the
shapes with the bitwise permetation then the results in simulation are shown in progress.After being
perturbed, the chaotic system can generate the chaotic binary sequences in uniform distribution and the
statistical properties invulnerable analysis. This generator also has many advantages in the possible useful
applications of spread spectrum digitalimages, such as sensitive secret keys, random uniform distribution
of pixels in Crypto system in secure and synchronize communication.
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
Information And Data Security Pseudorandom Number Generation and Stream Cipher seminar
Mustansiriya University
Department of Education
Computer Science
Good cryptography requires good random numbers. This paper evaluates the hardwarebased Intel Random Number Generator (RNG) for use in cryptographic applications.
Almost all cryptographic protocols require the generation and use of secret values that must be unknown to attackers. For example, random number generators are required to generate public/private keypairs for asymmetric (public key) algorithms including RSA, DSA, and Diffie-Hellman. Keys for symmetric and hybrid cryptosystems are also generated randomly. RNGs are also used to create challenges, nonces (salts), padding bytes, and blinding values. The one time pad – the only provably-secure encryption system – uses as much key material as ciphertext and requires that the keystream be generated from a truly random process.
The aim of this research paper is to design a new pseudorandom number generator based on FCSR registers, with not affecting the speed of generation.In the main part, a deep description of the cascades used in the design and describe the working principle of GPRN. The analyzed statistical characteristics are obtained from various generated sequences using test package NIST 800-22 and then confirmed by experiment, that a modeled GPRN has a higher period of repetition and works faster.
This is a briefing about Random Number Generators.
Random Number Generators are important in the data center because of their role in cryptography. This briefing introduces Random Number Generators, types of Random Number Generators including TRNG and PRNG, and a visual example of "randomness." http://boblandstrom.com
Fpga Design Of Clutter Generator For Radar Testingcsijjournal
Detection of weak target echo in the presence of strong clutter is the main objective of any RADAR. To
evaluate the performance of RADAR it is required to generate the clutter of various types including land and sea. This clutter is of non Gaussian distribution such as lognormal, Weibull and k-type. In this project it is proposed to develop a clutter generation algorithm of given distribution type. This process consists of
random number generator with Gaussian distribution converting into a non Gaussian using ZMNL (Zero
Memory Nonlinearity Transformation) technique. It also includes amplitude shaping and addition other interference signals. The complete algorithm is first simulated using Xilinx ISE 9.2i and would be implemented in VIRTEX-V FPGA.T
Fpga design of clutter generator for radar testingcsijjournal
Detection of weak target echo in the presence of strong clutter is the main objective of any RADAR. To evaluate the performance of RADAR it is required to generate the clutter of various types including land and sea. This clutter is of non Gaussian distribution such as lognormal, Weibull and k-type. In this project it is proposed to develop a clutter generation algorithm of given distribution type. This process consists of random number generator with Gaussian distribution converting into a non Gaussian using ZMNL (Zero Memory Nonlinearity Transformation) technique. It also includes amplitude shaping and addition other interference signals. The complete algorithm is first simulated using Xilinx ISE 9.2i and would be implemented in VIRTEX-V FPGA.This algorithm will be used for the testing of RADAR system. Results are compared with standard results.
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...IOSR Journals
This document describes the implementation of an XOR-based pad generation mutual authentication protocol for RF links. It begins with an introduction to the need for security in RF data transmission and describes existing protocols. It then presents the design of a new XOR pad generation function to securely transmit access passwords for authentication. Random numbers generated by a linear feedback shift register are input to the pad generation function along with passwords to produce encoded pads. The protocol is implemented on an FPGA for hardware verification. Simulation results demonstrate the protocol generating pads for authentication.
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...IOSR Journals
In RF link, without security the messages exchange between the two devices are monitoring by an
eavesdropper. So the exclusive-OR (XOR) based pad generation protocol is used to safely transfer the data to
the other point with necessary security and it maintaining confidentiality. This protocol produce the cover
coding pad to mask the access password before the datas are transmitted. A specially designed pad generation
will be implemented in digital domain to solve the insecurity problem in data communication RF link. This
protocol developed under regulation of ISO 18000 – 6 type C protocol also known as EPC C1G2 RFID
protocol. The linear feed back shift register (LFSR) generate the pseudo random binary sequence (PRBS) and it
is used as data source to the pad generation function. The Xilinx 13.x software is used for synthesize and
modelsim SE6.0 is used for simulating the result. The pad generation algorithm has been implemented in FPGA
Spartan 3 PQ208-4 board to verify the result
This document proposes a true random number generator (TRNG) that exploits nonlinear signal processing and chaos. It can be implemented using standard analog-to-digital converter (ADC) building blocks, allowing data rates in the tens of megabits per second range. This design approach increases security for cryptographic applications by generating unpredictable and non-repeatable binary sequences. The generator quality is validated against standard randomness tests both theoretically and accounting for implementation errors.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...IJNSA Journal
Cryptographic applications such as online banking, and securing medical and military data require the usage of random keys, which should remain unpredictable by adversaries. This paper focuses on the strengths and limitations of the techniques and algorithms that are used in the generation of random keys and a new method to generate random keys is proposed using fractals. Fractals are generated using the Sierpinski triangle and fed as input for Non-Deterministic Finite Automata (NDFA) to generate an Initial Vector (IV). Trellis Coded Genetic Algorithm (TCGA) code generator generates seed value using IV as input. Pseudo-Random Key Generator (PRKG) generates a Session Key matrix (SKM) using a seed value. Images are encrypted using SKM to generate cipher images. The randomness of the TCGA code is tested using entropy measure and efficiency based on NIST Tests. SKM with high entropy value is used for image encryption. The Number of Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI) values are used for calculating the randomness of cipher images.
DSP Based Implementation of Scrambler for 56kbps ModemCSCJournals
Scrambler is generally employed in data communication systems to add redundancy in the transmitted data stream so that at the receiver end, timing information can be retrieved to aid the synchronization between data terminals. Present paper deals with simulation and implementation of the scrambler for 56Kbps voice-band modem. Scrambler for the transmitter of 56kbps modem was chosen as a case study. Simulation has been carried out using Simulink of Matlab. An algorithm for the scrambling function has been developed and implemented on Texas Instrument’s based TMS320C50PQ57 Digital Signal Processor (DSP). Signalogic DSP software has been used to compare the simulated and practical results.
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
A large share of embedded applications are wireless, which makes the communication channel especially vulnerable. The research in the field of ECC is mostly focused on its implementation on application specific systems, which have restricted resources like storage, processing speed and domain specific CPU architecture. The focus of this research is on the implementation of ECC in an embedded iOS application to compare the performance measures obtained in the wireless environment or embedded systems by using elliptic curve cryptography (ECC), with a traditional cryptosystem like RSA.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.