Entity

Time filter

Source Type


Laxmi T.,CSIR - Institute of Minerals And Materials Technology | Rao R.B.,Bijupatnaik University of Technology
International Journal of Mining Science and Technology | Year: 2015

In this paper an attempt is made to recover sillimanite by flotation tree analysis process and conventional flotation process from non magnetic fraction of red sediments. The experimental results of both the processes are presented. The data reveal that the deslimed sample contains 33.2% (by weight) total heavy minerals and out of which the sillimanite mineral content is 3.6% (by weight). It is observed that flotation tree analysis needs 10 cells to get five output products and where as conventional flotation process needs 15 cells to recover similar grade of five output products. Thus, flotation tree analysis is not only economic process but also efficient process (to say efficient process, the tree analysis product should be higher grade). © 2015. Source


Tripathy P.K.,Biju Patnaik University of Technology, Orissa | Biswal D.,Bijupatnaik University of Technology
International Review on Computers and Software | Year: 2013

More number of research works develops many authentication protocols and algorithms to provide a security in the mobile networks. But these existing protocols have the drawbacks in which a single and more than one server put in practice. These protocols suffer if the single server is compromised by the adversaries and in more than one server the protocols finds high complexity in design and integration of keys. To address these issues in the existing works, in this paper a new complexity reduced protocol is proposed with multiple servers. In this paper, we propose an indirect security protocol for mobile networks based on ECC scheme. Initially, we generate keys to the multiple servers by the ECC scheme and these servers validate the each user node to provide the information. In mobile networks, it is essential to validate every node when it tries to request information from base station. After the key generation and the validation by the servers the information sharing process is accomplished between the user and the base station. In our security protocol is highly secure by generating cryptographic schemes distributed based on ECC and executed over multiple servers. The proposed indirect security protocol performance is analyzed by invoking more number of authenticated and adversary users and the result from this process guarantees the healthiness of the proposed security protocol. The implementation results show the effectiveness of proposed ECC based indirect security protocol in authenticating the users to access the information from the base station and the achieved improvement in security process. Moreover, the performance of the proposed indirect security protocol is evaluated by comparing with the existing indirect authentication security protocol in mobile networks. © 2013 Praise Worthy Prize S.r.l. - All rights reserved. Source

Discover hidden collaborations