This document discusses securing the Tesla broadcast protocol with Diffie-Hellman key exchange. It first provides background on the Tesla broadcast protocol and its use of time to provide asymmetric authentication through one-way key chains. It then discusses using Diffie-Hellman key exchange to securely distribute the cryptographic keys in the one-way chain. The document outlines how Diffie-Hellman key exchange works and explains how it can be integrated with Tesla to build a public key infrastructure for secure broadcast authentication with loosely time synchronized nodes.
This document summarizes a research paper on deniable encryption. The paper proposes a receiver-deniable public key encryption scheme with the following properties:
1) It is a one-move scheme that does not require any pre-encryption communication between the sender and receiver.
2) It does not require any pre-shared secrets between parties.
3) It provides strong deniability equivalent to factoring a large composite number.
4) It has no decryption errors.
5) It significantly improves bandwidth efficiency compared to previous schemes.
The proposed scheme uses a mediated RSA infrastructure and relies on oblivious transfer between the receiver and security mediator to enable deniability for the receiver.
The document summarizes SPINS, a set of security protocols for sensor networks proposed by Perrig et al. SPINS includes SNEP for point-to-point data confidentiality, authentication and replay protection, and μTESLA for authenticated broadcast. μTESLA uses one-way key chains and delayed key disclosure to provide authentication with low overhead. SPINS aims to provide security services like data authentication and confidentiality while meeting the constraints of sensor networks, such as limited resources and communication patterns between sensor nodes and base stations.
This document analyzes the RC4 encryption algorithm and examines how its performance is affected by changing parameters like encryption key length and file size. Experimental tests were conducted to measure encryption time for different key lengths and file types. The results show encryption time increases with longer keys and larger files, and are modeled mathematically. The document also provides background on encryption methods, how RC4 works, and compares stream and block ciphers.
SPINS: Security Protocols for Sensor NetworksJoon Young Park
This document summarizes a master's thesis on security protocols for sensor networks. It introduces SPINS, which defines requirements for data confidentiality, authentication, integrity, and freshness. It describes the SNEP, counter-exchanging, and μTESLA protocols. SNEP provides semantic security, authentication, and replay protection with low overhead. Counter-exchanging handles bootstrapping and re-synchronizing counters with nonces. μTESLA allows for authenticated broadcast from a base station to sensor nodes in an efficient way by disclosing authentication keys. The thesis evaluates the implementation and performance of these protocols.
This document summarizes a research paper that proposes using the Rivest Cipher version 6 (RC6) algorithm to provide message authentication and source privacy in wireless sensor networks. It discusses challenges with existing symmetric and public key approaches to message authentication in wireless sensor networks due to their high computational overhead and lack of scalability. The proposed approach aims to achieve efficient hop-by-hop message authentication, identity privacy, and location privacy using RC6 encryption. It evaluates RC6 in terms of computational overhead, energy consumption, message delay, and memory consumption compared to other techniques.
This document summarizes the SPINS security protocols for sensor networks. It discusses SNEP, a protocol that provides data authentication, integrity and confidentiality with low overhead. SNEP uses counter-based encryption and CBC-MAC. It also discusses μTESLA, a protocol that provides broadcast authentication through delayed key disclosure and requires loose time synchronization. μTESLA uses one-way key chains where keys are disclosed in intervals to allow nodes to authenticate messages. These protocols aim to provide strong security with low overhead suitable for resource constrained sensor networks.
The document discusses the RSA algorithm and its implementation in SSL-VPN architectures. It begins by introducing SSL-VPN and how it uses the RSA algorithm. It then provides a high-level overview of the mathematical concepts behind the RSA algorithm, including generating public and private key pairs using large prime numbers. It also describes how the RSA algorithm is used for encryption and decryption in SSL-VPN systems to securely transmit encrypted data between private networks over the internet.
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networksijceronline
This document summarizes a research paper that proposes a new key pre-distribution and multi-path routing scheme for wireless sensor networks. The paper begins with an introduction that describes the importance of security in wireless sensor networks and challenges with key management. It then reviews existing key pre-distribution and routing schemes. The document proposes a new hexagon-based multi-path routing algorithm combined with a key pre-distribution scheme. It describes the details of the algorithm and compares its performance to other schemes through simulations. The results show the proposed scheme achieves better security, efficiency and message delivery compared to previous works.
This document summarizes a research paper on deniable encryption. The paper proposes a receiver-deniable public key encryption scheme with the following properties:
1) It is a one-move scheme that does not require any pre-encryption communication between the sender and receiver.
2) It does not require any pre-shared secrets between parties.
3) It provides strong deniability equivalent to factoring a large composite number.
4) It has no decryption errors.
5) It significantly improves bandwidth efficiency compared to previous schemes.
The proposed scheme uses a mediated RSA infrastructure and relies on oblivious transfer between the receiver and security mediator to enable deniability for the receiver.
The document summarizes SPINS, a set of security protocols for sensor networks proposed by Perrig et al. SPINS includes SNEP for point-to-point data confidentiality, authentication and replay protection, and μTESLA for authenticated broadcast. μTESLA uses one-way key chains and delayed key disclosure to provide authentication with low overhead. SPINS aims to provide security services like data authentication and confidentiality while meeting the constraints of sensor networks, such as limited resources and communication patterns between sensor nodes and base stations.
This document analyzes the RC4 encryption algorithm and examines how its performance is affected by changing parameters like encryption key length and file size. Experimental tests were conducted to measure encryption time for different key lengths and file types. The results show encryption time increases with longer keys and larger files, and are modeled mathematically. The document also provides background on encryption methods, how RC4 works, and compares stream and block ciphers.
SPINS: Security Protocols for Sensor NetworksJoon Young Park
This document summarizes a master's thesis on security protocols for sensor networks. It introduces SPINS, which defines requirements for data confidentiality, authentication, integrity, and freshness. It describes the SNEP, counter-exchanging, and μTESLA protocols. SNEP provides semantic security, authentication, and replay protection with low overhead. Counter-exchanging handles bootstrapping and re-synchronizing counters with nonces. μTESLA allows for authenticated broadcast from a base station to sensor nodes in an efficient way by disclosing authentication keys. The thesis evaluates the implementation and performance of these protocols.
This document summarizes a research paper that proposes using the Rivest Cipher version 6 (RC6) algorithm to provide message authentication and source privacy in wireless sensor networks. It discusses challenges with existing symmetric and public key approaches to message authentication in wireless sensor networks due to their high computational overhead and lack of scalability. The proposed approach aims to achieve efficient hop-by-hop message authentication, identity privacy, and location privacy using RC6 encryption. It evaluates RC6 in terms of computational overhead, energy consumption, message delay, and memory consumption compared to other techniques.
This document summarizes the SPINS security protocols for sensor networks. It discusses SNEP, a protocol that provides data authentication, integrity and confidentiality with low overhead. SNEP uses counter-based encryption and CBC-MAC. It also discusses μTESLA, a protocol that provides broadcast authentication through delayed key disclosure and requires loose time synchronization. μTESLA uses one-way key chains where keys are disclosed in intervals to allow nodes to authenticate messages. These protocols aim to provide strong security with low overhead suitable for resource constrained sensor networks.
The document discusses the RSA algorithm and its implementation in SSL-VPN architectures. It begins by introducing SSL-VPN and how it uses the RSA algorithm. It then provides a high-level overview of the mathematical concepts behind the RSA algorithm, including generating public and private key pairs using large prime numbers. It also describes how the RSA algorithm is used for encryption and decryption in SSL-VPN systems to securely transmit encrypted data between private networks over the internet.
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networksijceronline
This document summarizes a research paper that proposes a new key pre-distribution and multi-path routing scheme for wireless sensor networks. The paper begins with an introduction that describes the importance of security in wireless sensor networks and challenges with key management. It then reviews existing key pre-distribution and routing schemes. The document proposes a new hexagon-based multi-path routing algorithm combined with a key pre-distribution scheme. It describes the details of the algorithm and compares its performance to other schemes through simulations. The results show the proposed scheme achieves better security, efficiency and message delivery compared to previous works.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
Transforming Security: Containers, Virtualization and SoftwarizationPriyanka Aash
This session will explore how we can leverage containers, network/endpoint virtualization technologies and virtualized security instrumentation, concurrently, to transformationally improve security visibility, security analytics, system resilience and actionable context, greatly increasing our ability to attest that systems will be secure and compliant in any state into which they may be driven.
(Source: RSA USA 2016-San Francisco)
The document discusses principles of public-key cryptography and the Diffie-Hellman key exchange algorithm. It begins by explaining the problems with symmetric encryption that public-key cryptography aims to address. It then provides an overview of public-key cryptosystems and their requirements. The document goes on to describe the RSA algorithm in detail and provide an example of how it works. It also explains the Diffie-Hellman key exchange algorithm, how it allows two parties to securely exchange a key without transmitting it, and provides a numerical example.
The document discusses principles of public-key cryptography and algorithms like RSA and Diffie-Hellman key exchange. It provides the following key points:
1. Public-key cryptography solves the key distribution problem of symmetric encryption by using different but mathematically-related public and private keys.
2. The RSA algorithm was one of the first practical public-key cryptosystems, using modular exponentiation with large prime numbers.
3. Diffie-Hellman key exchange allows two parties to jointly establish a shared secret over an insecure channel without any prior secrets. It is based on the difficulty of calculating discrete logarithms.
The document contains a list of URLs and exam answers for CCNA certification courses. It provides the answers to multiple choice questions from exams for CCNA 1 through CCNA 4, as well as the answers to final exams, practice exams, and pre-tests for each course. The answers cover topics such as network protocols, the OSI model, IP addressing, switching, routing, WANs, and network security.
Sharing and Controlling the IoT, by Kasun De Zoysa.
A presentation given at APNIC 42's Introduction to Internet of Things (IoT) session on Tuesday, 4 October 2016.
The IPSec feasibility study tested the use of IPSec tunnels between ECMWF and four member states to evaluate using IPSec as a backup network. The tests focused on device authentication using certificates, data integrity using HMAC-SHA and HMAC-MD5, data encryption using 3DES and DES, and performance. The results showed that most devices could authenticate and establish IPSec tunnels, with some issues around different certificate formats between devices. Data integrity and encryption tests were successful, with performance varying depending on device hardware.
This document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptographic primitives designed for devices with limited resources like memory, speed and power consumption. It then outlines various lightweight cryptographic mechanisms like block ciphers, hash functions, stream ciphers and authenticated ciphers. For each mechanism, it discusses their desirable properties and design principles. It also discusses implementation issues like decryption costs and resistance to related key attacks. Finally, it mentions the Fair Evaluation of Lightweight Cryptographic Systems (FELICS) benchmarking tool for evaluating and comparing the performance of lightweight cryptographic algorithms on different platforms.
This document proposes a new multi-agent architecture for Pretty Good Privacy (PGP) to improve its performance. PGP currently uses a hierarchical structure where each component executes sequentially, causing idle time. The proposed architecture assigns each PGP component to an independent agent. Using semaphores, the agents can execute concurrently, eliminating bottlenecks and reducing overall execution time compared to the classic PGP architecture. Experimental results showed the new multi-agent approach runs 30% faster than classic PGP across different hardware configurations.
The document discusses Message Queue Telemetry Transport (MQTT), a lightweight publish/subscribe messaging protocol that is well-suited for Internet of Things (IoT) devices and applications where connectivity and bandwidth are limited. MQTT allows devices to publish telemetry data (sensor readings) to a broker which then delivers it to subscribers. It supports different quality of service levels to ensure reliable delivery. Key features include low bandwidth usage, publish/subscribe messaging, and support for mobile and embedded devices. Common uses of MQTT include connecting devices in applications like smart homes and industrial IoT.
Securing the cloud computing systems with matrix vector and multi-key using l...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed
the security through encryption of their data, with the help of a common key. Both the parties should agree
on this key prior to communication. The cryptographic systems which perform these tasks are designed to
keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus
key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the
mathematical complexity of the algorithm. But quantum computation is expected to revolutionize computing
paradigm in near future. This presents a challenge amongst the researchers to develop new cryptographic
techniques that can survive the quantum computing era. This paper reviews the radical use of quantum
mechanics for cryptography
Slides from the presentation "Modern Cryptography" delivered at Deovxx UK 2013. See Parleys.com for the full video https://www.parleys.com/speaker/5148920c0364bc17fc5697a5
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
This document proposes an Expedite Message Authentication Protocol (EMAP) for vehicular ad hoc networks (VANETs) that aims to significantly decrease message loss ratio due to message verification delay compared to conventional authentication methods using certificate revocation lists (CRLs). EMAP replaces the time-consuming CRL checking process with a more efficient revocation checking process using hash-based message authentication codes (HMACs) shared only between valid vehicles. It also uses a novel probabilistic key distribution method to securely share and update keys.
A study of cryptography for satellite applicationsRajesh Ishida
This document discusses and compares various cryptographic algorithms for use in securing satellite downlink communications. It begins with an overview of aspects of satellite security and introduces cryptography. It then covers symmetric and asymmetric cryptographic algorithms like AES, RSA and stream ciphers. It analyzes the performance of algorithms in terms of hardware usage and throughput. Block cipher modes and attacks on cryptosystems are also examined. The document concludes by recommending the KHAZAD block cipher and A5/1 stream cipher as best suited for satellite security based on a performance comparison.
This document discusses a study on users of the Moodle learning management system through the lens of the Sarasin learning styles model. It begins with background on e-learning and different learning style theories, including Sarasin's model of visual, auditory, and tactile/kinesthetic learning. It then examines the components and characteristics of e-learning systems and models. Tables list and describe various open source and server-based e-learning software options. The document focuses on Moodle, evaluating which features may benefit different Sarasin learning styles. The goal is to determine how Moodle usage aligns with Sarasin's model in the researchers' campus.
Eye tracking and detection by using fuzzy template matching and parameter bas...IAEME Publication
This document summarizes a research paper on eye tracking and blink detection using fuzzy template matching and parameter-based judgment. The paper proposes a method to automatically initialize eye blink detection in video sequences for real-time eye tracking applications. It uses motion analysis to locate the eyes, then creates an online template of the open eye to track between frames using normalized correlation. Experiments on 100 videos achieved 79% accuracy in template generation and 89.33% accuracy in blink detection by comparing automatic and manual counts. The method provides an efficient initialization technique for eye tracking and blink detection with potential applications in automotive safety, security, and medical diagnosis.
Fabrication and characterisation of in situ al-tic compositeIAEME Publication
1) The document describes the fabrication and characterization of an in-situ aluminum-titanium carbide (Al-TiC) composite.
2) An Al-TiC composite with 5% TiC was produced by a reaction between molten aluminum and potassium hexafluorotitanate (K2TiF6) and graphite powder.
3) Scanning electron microscopy, energy dispersive X-ray spectroscopy, and microhardness testing were used to characterize the composite and showed homogeneous distribution of TiC particles less than 1 μm in the aluminum matrix, presence of TiC particles, and increased hardness with the addition of TiC.
Este documento contém instruções interativas para decorar uma cena de Natal virtual, incluindo colocar uma imagem, ouvir música, acender a chaminé, fazer correr a água no rio, acender as luzes na árvore e telhado, animar o boneco de neve, iluminar a ponte, adicionar neve, colocar letras desejando paz, amor e felicidade para as festas.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
Transforming Security: Containers, Virtualization and SoftwarizationPriyanka Aash
This session will explore how we can leverage containers, network/endpoint virtualization technologies and virtualized security instrumentation, concurrently, to transformationally improve security visibility, security analytics, system resilience and actionable context, greatly increasing our ability to attest that systems will be secure and compliant in any state into which they may be driven.
(Source: RSA USA 2016-San Francisco)
The document discusses principles of public-key cryptography and the Diffie-Hellman key exchange algorithm. It begins by explaining the problems with symmetric encryption that public-key cryptography aims to address. It then provides an overview of public-key cryptosystems and their requirements. The document goes on to describe the RSA algorithm in detail and provide an example of how it works. It also explains the Diffie-Hellman key exchange algorithm, how it allows two parties to securely exchange a key without transmitting it, and provides a numerical example.
The document discusses principles of public-key cryptography and algorithms like RSA and Diffie-Hellman key exchange. It provides the following key points:
1. Public-key cryptography solves the key distribution problem of symmetric encryption by using different but mathematically-related public and private keys.
2. The RSA algorithm was one of the first practical public-key cryptosystems, using modular exponentiation with large prime numbers.
3. Diffie-Hellman key exchange allows two parties to jointly establish a shared secret over an insecure channel without any prior secrets. It is based on the difficulty of calculating discrete logarithms.
The document contains a list of URLs and exam answers for CCNA certification courses. It provides the answers to multiple choice questions from exams for CCNA 1 through CCNA 4, as well as the answers to final exams, practice exams, and pre-tests for each course. The answers cover topics such as network protocols, the OSI model, IP addressing, switching, routing, WANs, and network security.
Sharing and Controlling the IoT, by Kasun De Zoysa.
A presentation given at APNIC 42's Introduction to Internet of Things (IoT) session on Tuesday, 4 October 2016.
The IPSec feasibility study tested the use of IPSec tunnels between ECMWF and four member states to evaluate using IPSec as a backup network. The tests focused on device authentication using certificates, data integrity using HMAC-SHA and HMAC-MD5, data encryption using 3DES and DES, and performance. The results showed that most devices could authenticate and establish IPSec tunnels, with some issues around different certificate formats between devices. Data integrity and encryption tests were successful, with performance varying depending on device hardware.
This document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptographic primitives designed for devices with limited resources like memory, speed and power consumption. It then outlines various lightweight cryptographic mechanisms like block ciphers, hash functions, stream ciphers and authenticated ciphers. For each mechanism, it discusses their desirable properties and design principles. It also discusses implementation issues like decryption costs and resistance to related key attacks. Finally, it mentions the Fair Evaluation of Lightweight Cryptographic Systems (FELICS) benchmarking tool for evaluating and comparing the performance of lightweight cryptographic algorithms on different platforms.
This document proposes a new multi-agent architecture for Pretty Good Privacy (PGP) to improve its performance. PGP currently uses a hierarchical structure where each component executes sequentially, causing idle time. The proposed architecture assigns each PGP component to an independent agent. Using semaphores, the agents can execute concurrently, eliminating bottlenecks and reducing overall execution time compared to the classic PGP architecture. Experimental results showed the new multi-agent approach runs 30% faster than classic PGP across different hardware configurations.
The document discusses Message Queue Telemetry Transport (MQTT), a lightweight publish/subscribe messaging protocol that is well-suited for Internet of Things (IoT) devices and applications where connectivity and bandwidth are limited. MQTT allows devices to publish telemetry data (sensor readings) to a broker which then delivers it to subscribers. It supports different quality of service levels to ensure reliable delivery. Key features include low bandwidth usage, publish/subscribe messaging, and support for mobile and embedded devices. Common uses of MQTT include connecting devices in applications like smart homes and industrial IoT.
Securing the cloud computing systems with matrix vector and multi-key using l...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed
the security through encryption of their data, with the help of a common key. Both the parties should agree
on this key prior to communication. The cryptographic systems which perform these tasks are designed to
keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus
key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the
mathematical complexity of the algorithm. But quantum computation is expected to revolutionize computing
paradigm in near future. This presents a challenge amongst the researchers to develop new cryptographic
techniques that can survive the quantum computing era. This paper reviews the radical use of quantum
mechanics for cryptography
Slides from the presentation "Modern Cryptography" delivered at Deovxx UK 2013. See Parleys.com for the full video https://www.parleys.com/speaker/5148920c0364bc17fc5697a5
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
This document proposes an Expedite Message Authentication Protocol (EMAP) for vehicular ad hoc networks (VANETs) that aims to significantly decrease message loss ratio due to message verification delay compared to conventional authentication methods using certificate revocation lists (CRLs). EMAP replaces the time-consuming CRL checking process with a more efficient revocation checking process using hash-based message authentication codes (HMACs) shared only between valid vehicles. It also uses a novel probabilistic key distribution method to securely share and update keys.
A study of cryptography for satellite applicationsRajesh Ishida
This document discusses and compares various cryptographic algorithms for use in securing satellite downlink communications. It begins with an overview of aspects of satellite security and introduces cryptography. It then covers symmetric and asymmetric cryptographic algorithms like AES, RSA and stream ciphers. It analyzes the performance of algorithms in terms of hardware usage and throughput. Block cipher modes and attacks on cryptosystems are also examined. The document concludes by recommending the KHAZAD block cipher and A5/1 stream cipher as best suited for satellite security based on a performance comparison.
This document discusses a study on users of the Moodle learning management system through the lens of the Sarasin learning styles model. It begins with background on e-learning and different learning style theories, including Sarasin's model of visual, auditory, and tactile/kinesthetic learning. It then examines the components and characteristics of e-learning systems and models. Tables list and describe various open source and server-based e-learning software options. The document focuses on Moodle, evaluating which features may benefit different Sarasin learning styles. The goal is to determine how Moodle usage aligns with Sarasin's model in the researchers' campus.
Eye tracking and detection by using fuzzy template matching and parameter bas...IAEME Publication
This document summarizes a research paper on eye tracking and blink detection using fuzzy template matching and parameter-based judgment. The paper proposes a method to automatically initialize eye blink detection in video sequences for real-time eye tracking applications. It uses motion analysis to locate the eyes, then creates an online template of the open eye to track between frames using normalized correlation. Experiments on 100 videos achieved 79% accuracy in template generation and 89.33% accuracy in blink detection by comparing automatic and manual counts. The method provides an efficient initialization technique for eye tracking and blink detection with potential applications in automotive safety, security, and medical diagnosis.
Fabrication and characterisation of in situ al-tic compositeIAEME Publication
1) The document describes the fabrication and characterization of an in-situ aluminum-titanium carbide (Al-TiC) composite.
2) An Al-TiC composite with 5% TiC was produced by a reaction between molten aluminum and potassium hexafluorotitanate (K2TiF6) and graphite powder.
3) Scanning electron microscopy, energy dispersive X-ray spectroscopy, and microhardness testing were used to characterize the composite and showed homogeneous distribution of TiC particles less than 1 μm in the aluminum matrix, presence of TiC particles, and increased hardness with the addition of TiC.
Este documento contém instruções interativas para decorar uma cena de Natal virtual, incluindo colocar uma imagem, ouvir música, acender a chaminé, fazer correr a água no rio, acender as luzes na árvore e telhado, animar o boneco de neve, iluminar a ponte, adicionar neve, colocar letras desejando paz, amor e felicidade para as festas.
El documento introduce los conceptos básicos de informática, incluyendo la definición de informática como el tratamiento automático de la información mediante ordenadores, las tres fases del procesamiento de datos, la diferencia entre datos e información, y la representación binaria de números y caracteres utilizada por los ordenadores.
NativoWeb 1.0 es una solución contable y financiera que ofrece control total del negocio a través de herramientas como estado de resultados, balance general y flujo de efectivo. Proporciona funciones como plan de cuentas, registros de activos, proyecciones financieras y consolidación de estados contables de múltiples empresas. Usa tecnología como SQL Server, ASP.NET, Windows Server y certificado digital para ofrecer una solución segura, escalable y multiplataforma.
Mandriva Linux es una distribución Linux desarrollada en Francia. Ha tenido varias versiones desde 1998, incluyendo versiones gratuitas como Mandriva Linux Free y versiones de pago como Powerpack. Ofrece herramientas únicas para facilitar la administración del sistema. Viene con más de 20,000 paquetes de software y se actualiza cada 6 meses.
O documento descreve a trajetória humanitária de Angelina Jolie, atriz que doa parte de sua renda e tempo para ajudar refugiados em diversos países. Ela se envolve em projetos da ONU para construir abrigos e levar apoio a crianças carentes, mesmo correndo riscos como quando contraiu malária. Sua motivação é que seu filho se lembre dela como alguém que melhorou o mundo.
O autor pertence à "geração dos anos dourados" que viveu intensamente com respeito e romantismo. Essa geração soube enfrentar tormentas com dignidade e usufruiu da vida sem destruí-la. Agora, o autor vê a sociedade muito diferente, com menos romantismo e mais explícita. Sua geração será lembrada com saudade.
O documento lista uma série de coisas proibidas, incluindo chorar sem aprender, ter medo das recordações, não sorrir diante dos problemas, abandonar os sonhos, não demonstrar amor, fingir diante das pessoas, e não viver cada dia como se fosse o último.
O documento conta uma história sobre uma mãe que queimou torradas para o jantar após um longo dia de trabalho. Quando a mãe se desculpou, o pai disse que preferia as torradas assim e que uma torrada queimada não faz mal a ninguém, enfatizando a importância de aceitar as imperfeições dos outros e manter a neutralidade e conexão em relacionamentos.
Existem diferenças biológicas e sociais entre homens e mulheres. Biologicamente, homens e mulheres diferem em aspectos como estrutura corporal e hormônios. Socialmente, papéis e expectativas de gênero variam entre culturas e épocas.
Este documento discute os efeitos negativos da mágoa, rancor, ressentimento e ódio e enfatiza a importância do perdão para o bem-estar e felicidade. Sugere que escolher sentir esses sentimentos negativos é uma escolha que afeta a saúde, enquanto o perdão liberta e permite ser feliz, esquecendo o mal feito e não se vingando.
Patrocine o piloto Adalberto Jardim na Fórmula Truck 2013. Coloque a sua marca e/ou seus produtos na maior categoria de competições de velocidade da América Latina.
El documento describe un festival internacional de cine que se llevará a cabo del 6 al 8 de mayo de 2011 en Formentera, España. El festival presentará cortometrajes, documentales y videoarte de todo el mundo, además de eventos como conciertos, performances de arte y conferencias. El objetivo del festival es promover Formentera a través de la cultura y convertir a la isla en un punto de encuentro artístico.
Las ranuras son lugares en la placa base donde se insertan tarjetas que agregan funcionalidad al computador, como sonido, video, modem. Existen diferentes tipos de ranuras como PCI, AGP, ISA y PCMCIA para portátiles. Permiten conectar tarjetas que brindan capacidades como reproducción de audio, video, acceso a Internet y expansión de puertos.
A região de 1.000 ilhas localiza-se entre Ontário, Canadá e Nova York, Estados Unidos. Os índios a chamavam de "Jardim do Grande Espírito". Compreende 80 km de ilhas no rio São Lourenço, entre o Lago Ontário e o Oceano Atlântico, com até 1.865 ilhas e profundidades de 60 m, permitindo navegação entre os Grandes Lagos e o Atlântico. Há muitas mansões construídas em ilhas particulares e um castelo inacabado projetado como prova de amor
Este documento describe los diferentes tipos de fresas y sistemas de pulido utilizados en odontología. Explica la historia y clasificación de las fresas, incluyendo su material, forma, tamaño de grano y aplicaciones. También cubre los diferentes abrasivos como piedras montadas y no montadas que se usan para acabar y pulir restauraciones dentales.
O documento lista os muitos benefícios nutricionais e de saúde das bananas, incluindo que elas fornecem energia sustentada, ajudam a prevenir anemia, tensão alta, depressão e azia, e promovem a saúde mental, digestiva e imunológica. Recomenda-se comer bananas diariamente para obter esses benefícios e manter o corpo saudável.
Andy era el hermano menor de tres hermanos y pasaba mucho tiempo en cama pintando y escuchando la radio. Cambió su nombre quitándose la "A" final y vivía en una casa grande donde guardaba objetos que consideraba arte, ayudando a crear el movimiento "Pop Art" que convierte objetos cotidianos en arte.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document discusses message authentication and source privacy in wireless sensor networks using the RC6 algorithm. It begins by reviewing existing approaches to message authentication like symmetric-key and public-key cryptosystems, which have limitations related to overhead and scalability. The document then proposes using the RC6 algorithm to provide efficient hop-by-hop message authentication and source privacy in wireless sensor networks. It aims to authenticate messages at each forwarding node while also hiding the identity and location of the message sender. The document reviews related work on wireless sensor networks and the network simulator NS-2 before describing the proposed RC6-based approach and its goals of message authentication, source privacy, and efficiency.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
This document summarizes a research paper that proposes a new hybrid text encryption approach combining elliptic curve cryptography and the Hill cipher algorithm for use on mobile ad hoc networks. The approach aims to address security weaknesses in the Hill cipher by converting it from a symmetric to an asymmetric technique. It generates public and private keys using elliptic curve cryptography so the secret key does not need to be shared over unsecured channels. The approach also allows direct encryption and decryption of characters from the full 128-character ASCII table using their numeric values, avoiding the need for a character mapping table. The advantages are seen as improved security, efficiency and faster computation compared to other techniques.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...IAEME Publication
A smart grid represents a straightforward improvement of a power grid, which effectively hands over electricity from suppliers to clients. It generally uses a two-way digital communication with an eye on managing the devices at client households. They are also competent to conserve energy, scale down overhead costs and to enhance consistency and lucidity. It is home to smart meters, which pave the way for communication with the main central system. As against home energy monitors, smart meters are capable of collecting data for distant reporting. The distribution or receipt of the data is very safely carried out to safeguard the confidentiality of the client power utilization and also to ensure continuous power distribution. Therefore, the cryptography technique is effectively used for increasing the safety and for furnishing the consistent power supply for the uninterrupted power distribution.
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
Nowadays, Wireless Sensor Networks are emerging because of the technological
developments in Wireless Communication. Wireless Sensor Networks are deployed mostly in open
and unguarded environment. The key features of Wireless Sensor Networks are low power, lowmemory, low-energy scaled nodes. Security is a fundamental requirement for Wireless Sensor
Network. Security is the main concern for everything whether it is for wired based network or
wireless based network. Security in Wireless Sensor Network plays an important role in node
communication. For Wireless Sensor Network so many security protocol available but some have
some limitation. In this paper, our center of attention is security protocols for Wireless Sensor
Network through this paper; we have to identify the security protocols and their limitation for
Wireless Sensor Network.
The document proposes an efficient generalized signcryption scheme based on elliptic curve cryptography (ECC) that avoids computationally heavy bilinear pairing operations. It first identifies security issues in a previous tripartite signcryption scheme and proposes corrections. The corrected scheme is extended to support multiple receivers. It then further extends this signcryption scheme to a generalized signcryption scheme that provides either confidentiality, authentication, or a combination of both for messages with multiple receivers. The proposed schemes use only ECC operations and satisfy security properties like forward secrecy and public verification more efficiently than other existing schemes. An application of the generalized signcryption scheme for key management in wireless sensor networks is also discussed.
Wireless channel-based ciphering key generation: effect of aging and treatmentIJECEIAES
Key generation for data cryptography is vital in wireless communications secu- rity. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the ran- domness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this pa- per, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is de- veloped which decreases the correlation between keys generated at consecutive coherence times. When compared to the conventional method, the randomness improvement is significant at each time interval. The simulation results show that the proposed method improves the randomness of the encrypting keys.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
This document proposes an efficient message authentication scheme for wireless sensor networks based on elliptic curve cryptography (ECC). It discusses the limitations of existing symmetric-key and polynomial-based authentication schemes, such as vulnerability to node compromise and threshold limitations. The proposed scheme generates a source anonymous message authentication code (SAMAC) using a modified ElGamal signature scheme on elliptic curves. This provides unconditional source anonymity, efficient hop-by-hop authentication without threshold limitations, and resilience against node compromise attacks. The scheme aims to authenticate messages with low computational and communication overhead suitable for resource-constrained wireless sensor networks.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
This document proposes a Tiered Authentication scheme called TAM for multicast traffic in ad-hoc networks. TAM exploits network clustering to reduce overhead and ensure scalability. Within a cluster, one-way hash chains authenticate message sources by appending an authentication code to messages. Between clusters, messages include multiple authentication codes based on different keys from the source to authenticate it. TAM aims to securely deliver multicast traffic while addressing challenges like resource constraints and packet loss in ad-hoc networks.
A Two Tiered Data Origin Authentication Scheme for Adhoc Networkijsrd.com
Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. Since we are using small system in the adhoc network application, memory usage is also an important issue. Here we are presenting a system which reduces the memory attacks and control the memory usage of the devices in the adhoc network. By clustering the adhoc network we also achieve high scalability. One way hash function and MACs are used for the authentication purpose. The simulation demonstrates the advantage of this system to existing system in terms of throughput, memory, delay, etc.
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used
in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.
Secure Checkpointing Approach for Mobile Environmentidescitation
The document describes a secure checkpointing approach for mobile environments. It proposes using elliptic curve cryptography combined with checkpointing to provide a low overhead, secure, fault tolerant system. Key points:
- Checkpointing is used to save system states to allow recovery from failures. Elliptic curve cryptography provides security by encrypting communication and generating digital signatures.
- The approach shifts cryptographic calculations to base stations to reduce mobile node overhead. Checkpoints and recovery information are stored at base stations.
- Mobile nodes save checkpoints and transfer them to the current base station they are connected to. A recovery algorithm allows processes to rollback and resume from the last saved checkpoint if a failure occurs.
Similar to Securing tesla broadcast protocol with diffie hellman key exchange (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.