Kar J.,Al Musanna College of Technology |
Majhi B.,King Khalid University
ACM International Conference Proceeding Series | Year: 2011
This paper describes a new deniable authentication protocol whose security is based Diffe-Hellman (CDH) Problem of type Decisional Diffie-Hellman(DDH) and the Hash Diffie-Hellman (HDDH) problem. Here we have used pairing technique i.e the problem is called Bilinear Diffie Hell-man (BDHP) problem. The protocol is of identity-based and can be implemented in low power and small processor mobile devices such as smart card, PDA etc. A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the internet. Our proposed protocol will be achieving the most three security requirement like deniable authentication, authentication and confidentialities. Also it is resistant against Man-in middle Attack. Copyright © 2011 ACM.
Chernysheva M.,Aston University |
Al Araimi M.,Aston University |
Al Araimi M.,Al Musanna College of Technology |
Kbashi H.,Aston University |
And 3 more authors.
Optics Express | Year: 2016
An Erbium-doped fibre ring laser hybrid mode-locked with single-wall carbon nanotubes (SWNT) and nonlinear polarisation evolution (NPE) without an optical isolator has been investigated for various cavity conditions. Precise control of the state of polarisation (SOP) in the cavity ensures different losses for counter-propagating optical fields. As the result, the laser operates in quasi-unidirectional regime in both clockwise (CW) and counter-clockwise (CCW) directions with the emission strengths difference of the directions of 22 dB. Furthermore, by adjusting the net birefringence in the cavity, the laser can operate in a bidirectional generation. In this case, a laser pumped with 75 mW power at 980 nm generates almost identical 790 and 570 fs soliton pulses with an average power of 1.17 and 1.11 mW. The operation stability and pulse quality of the soliton pulses in both unidirectional regimes are highly competitive with those generated in conventional ring fibre lasers with isolator in the cavity. Demonstrated bidirectional laser operation can find vital applications in gyroscopes or precision rotation sensing technologies. © 2016 Optical Society of America.
Sivaprakasam P.,Anna University |
Hariharen P.,Anna University |
Kathikheyen S.,Al Musanna College of Technology |
Balusamy S.,Al Musanna College of Technology
Advanced Materials Research | Year: 2013
Micro Electrical discharge machining (μEDM) is an electro thermal process, the cutting force is negligibly small and material removal occurs irrespective of hardness of work piece material.Micro electrical discharge machining process is capable of machining of complex shape, which is difficult to machine in conventional machining process. Last decade, the EDM process involved demand for machining requirements with short period. Since the major risk of wire breakage, deflections of electrodes were affecting the performance accuracy of EDM operation. This paper describe about a comprehensive review of micro electro discharge machining process and its process optimization techniques used for last 10 years. Micro electro discharge machining has more important given to difficult to machine materials. In order to improve the surface integrity and performance of process, need to select proper process parameters. It reports on the Micro EDM research involving the optimization of the process parameters surveying the influence of the various factors affecting the machining performance and productivity. © (2013) Trans Tech Publications, Switzerland.
Kar J.,Al Musanna College of Technology |
Majhi B.,National Institute of Technology Rourkela |
Anwer M.S.,Al Musanna College of Technology
ICCET 2010 - 2010 International Conference on Computer Engineering and Technology, Proceedings | Year: 2010
In this paper we have proposed an efficient password security of multiparty Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Key exchange protocols allow a group of parties communicating over a public network to establish a common secret key called session key. Due to their significance by in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings.our Protocol is password authentication model, where group member are assumed to hold an individual password rather than a common password. In this work we propose a new multiparty key agreement protocol which addresses truly contributory property and assures users about their participation in the key computation. The design of the protocol is based on polynomial interpolation. We demonstrate that the protocol is provably secure against active adversaries. The performance analysis of the proposed protocol shows that its well suited for mobile environment. Also here we have taken two one-way hash functions to construct high level of security. © 2010 IEEE.
Anooj P.K.,Al Musanna College of Technology
2013 International Conference on IT Convergence and Security, ICITCS 2013 | Year: 2013
As people have interests in their health recently, development of medical domain application has been one of the most active research areas. One example of medical domain application is detection system for heart disease based on computer-aided diagnosis methods, were the data are obtained from some other sources and are evaluated based on computer based applications. At the earlier time, the use of computer is to build knowledge based clinical decision support system which uses knowledge from medical experts and transfers this knowledge into computer algorithms manually. This process is time consuming and really depends on medical expert's opinion which may be subjective. To handle this problem, machine learning techniques have been developed to gain knowledge automatically from examples or raw data. Here, a weighted fuzzy rule-based clinical decision support system (CDSS) is presented for the diagnosis of heart disease, automatically obtaining the knowledge from the patient's clinical data. The proposed clinical decision support system for risk prediction of heart patients consists of two phases, (1) automated approach for generation of weighted fuzzy rules, and (2) developing a fuzzy rule-based decision support system. In the first phase, we have used the mining technique, attribute selection and attribute weightage method to obtain the weighted fuzzy rules. Then, the fuzzy system is constructed in accordance with the weighted fuzzy rules and chosen attributes. Finally, the experimentation is carried out on the proposed system using the datasets obtained from the UCI repository and the performance of the system is compared with the neural network-based system utilizing accuracy, sensitivity and specificity. © 2013 IEEE.
Abhishek K.,N.I.T. |
Roshan S.,Al Musanna College of Technology |
Kumar P.,N.I.T. |
Advances in Intelligent Systems and Computing | Year: 2013
In recent years, the development in Information technology has unleashed new challenges and opportunities for new authentication systems and protocols. Authentication ensures that a user is who they claim to be. The trust of authenticity increases exponentially when more factors are involved in the verification process. When security infrastructure makes use of two or more distinct and different category of authentication mechanisms to increase the protection for valid authentication, It is referred to as Strong Authentication or Multifactor Authentication. Multifactor authentication uses combinations of "Something you know," "Something you have," "Something you are" and "Somewhere you are"/"Someone you know", to provide stronger remote authentication than traditional, unreliable single-factor username and password authentication. In this paper we do a survey on the different aspects of multifactor authentication, its need, its techniques and its impact. © 2013 Springer-Verlag.
Ben George E.,Muscat College |
Rosline G.J.,Muscat College |
Rajesh D.G.,Al Musanna College of Technology
2015 IEEE 8th GCC Conference and Exhibition, GCCCE 2015 | Year: 2015
Nature enthused algorithms are the most potent for optimization. Cuckoo Search (CS) algorithm is one such algorithm which is efficient in solving optimization problems in varied fields. This paper appraises the basic concepts of cuckoo search algorithm and its application towards the segmentation of brain tumor from the Magnetic Resonance Images (MRI). The human brain is the most complex structure where identifying the tumor like diseases are extremely challenging because differentiating the components of the brain is complex. The tumor may sometimes occur with the same intensity of normal tissues. The tumor, edema, blood clot and some part of brain tissues appear as same and make the work of the radiologist more complex. In general the brain tumor is detected by radiologist through a comprehensive analysis of MR images, which takes substantially a longer time. The key inventiveness is to develop a diagnostic system using the best optimization technique called the cuckoo search, that would assist the radiologist to have a second opinion regarding the presence or absence of tumor. This paper explores the CS algorithm, performing a profound study of its search mechanisms to discover how it is efficient in detecting tumors and compare the results with the other commonly used optimization algorithms. © 2015 IEEE.
Khan M.E.,Al Musanna College of Technology
International Journal of Software Engineering and its Applications | Year: 2011
We can define software testing as a process or a series of processes, design to make sure that computer code does what it was actually design to do and it doesn't do anything unintended. Two of the most important software testing techniques are white box testing and black box testing. In my paper I have described one of the main software testing technique that is white box testing. We can define it as a test case design method that uses the control structure of the procedural design to derive test cases. I have also described briefly the working process of white box testing technique and some of its most frequently used techniques that are control flow testing, data flow testing, branch testing, basis path testing and loop testing.
Abhishek K.,NIT Patna |
Roshan S.,Al Musanna College of Technology |
Kumar A.,NIT Patna |
Ranjan R.,NIT Patna
Lecture Notes in Electrical Engineering | Year: 2013
Multifactor Authentication is a term used to describe security mechanisms that make use of two or more distinct and different category of authentication mechanisms to increase the protection for valid authentication. Multifactor Authentication that uses two levels of security can be used to obtain Two-factor Authentication. Introducing One Time Passwords (OTPs) to the existing authentication scheme can provide Two-factor authentication security. An OTP is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional passwords. In this paper we do a survey on the different aspects of one time passwords and its impact on Two-factor Authentication. © 2013 Springer Science+Business Media.
Kar J.,Al Musanna College of Technology
Communications in Computer and Information Science | Year: 2011
Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. This paper describes a secure non-interactive deniable authentication protocol using ECDSA signature scheme. The security of the protocol is based on difficulty of breaking Elliptic Curve Discrete Logarithm Problem. It can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor. © 2011 Springer-Verlag.