GLNA Institute of Technology


GLNA Institute of Technology

Time filter
Source Type

Saxena K.K.,GLNA Institute of Technology | Srivastava V.,P.A. College | Sharma K.,GLA University
Advanced Materials Research | Year: 2012

The non-local formulation of elasticity has been introduced as a correction to the local theory in order to account for long ranged inter-atomic forces. This elasticity theory is useful to estimate the in-plane stiffness of Single Wall Carbon Nanotube. The non-local effect is present in Single Wall Carbon Nanotube through the introduction of a non-local nanoscale which depends of the material and a molecular internal characteristics length. This non-local nanoscale goes to zero at macro scale and hence the non-local effect vanishes with reference to classical mechanics. The resulting from the non-local elasticity theory is verified through molecular simulations results. For this study of non-local theory in analysis of Carbon Nanotube, the value of scale coefficient is about 0.7nm.

Sharma K.,Motilal Nehru National Institute of Technology | Tomar A.,GLA University | Saxena K.K.,GLNA Institute of Technology | Shukla M.,Motilal Nehru National Institute of Technology | Shukla M.,University of Johannesburg
Proceedings of the International Conference on Nanoscience, Engineering and Technology, ICONSET 2011 | Year: 2011

Molecular dynamics simulation has been carried out to study the mechanical properties of a 42.59 Å long armchair (6, 6), (8, 8), (10, 10), and (12, 12) single-walled carbon nanotubes (SWCNTs) with an increase number of Stone-Wales (SW) defects, by varying their relative position and orientation. Brenner bond order potential has been employed for energy minimization. In the present work, calculations of fundamental mechanical properties of SWCNTs were performed using molecular dynamics (MD) simulations via material studio by Accelrys Inc. Maximum percentage reduction of 7.5 % in Young's modulus and increase in potential energy which is also accountable to stabilize carbon nanotubes (CNT), observed as 26.8%. Strain amplitude 0.003 is employed and no of steps for each strain is 4. During the simulation 0.001 kcal/mol energy, 0.5 kcal/mol/Å force, maximum number of iteration 500 with Steepest Descent Algorithm has been used. The fluctuation of the total energy and temperature during the MD were also calculated. This simulation carries an optimized structure before calculating the Young's modulus. © 2011 IEEE.

Tiwari R.K.,GLNA Institute of Technology | Sahoo G.,BIT Mesra
International Journal of Electronic Security and Digital Forensics | Year: 2010

The rapid development of internet opened up unlimited opportunities in the field of computing. However, it brought about a plethora of new issues and concerns, chief among them is the security of information that to be exchanged. Developing information hiding techniques have been seriously taken by many researchers, steganography, the science of embedding secret information into carrier image file is one of the main concern. In the current digital era, the steganographic methods may participate in the field of ultra wideband wireless communication, but the major hurdles is the pre-existing carrier with low embedding capacity. If we create the carrier file based on the transmitting message that will help us in two aspects, first it saves the bandwidth and second it maintains the utmost security as well. Unlike the other steganographic efforts, where data embedding in carrier file works in the principle of pre-existing carrier file, we propose here a method that works on the principle of creating its own carrier file based on the transmitting message. The major advantage of this approach is that there is never a mother carrier file created or exits in order to give a chance to other concerned to suspect the hiding of any secret file and at the same time, we utilise the minimum bandwidth with maximum security protection. Copyright © 2010 Inderscience Enterprises Ltd.

Sahoo G.,BIT Mesra | Tiwari R.K.,GLNA Institute of Technology
International Journal of Electronic Security and Digital Forensics | Year: 2010

In this fast growing digital world, the dramatic rise and progress of the internet have opened a path to connect a computer in the world to any other computer, no matter how far the two are located form each other. This is undoubtedly a great advantage for any individual and corporate as well. However, this can be a nightmare for network support staff, to maintain least amount of payload with utmost security. As a solution, cryptographic algorithm alone is not sufficient as, it creates the heavy payload. In the other solution, the highly secured steganographic algorithm requires high capacity carriers for data transfer. To overcome, we have designed a new methodology which hides the secret data inside the secret data which reduces 50% of payload with high layer of securities. The proposed methodologies have been implemented by creating stego text creator and secret text viewer in Microsoft platform.

Tiwari R.K.,GLNA Institute of Technology | Sahoo G.,B.I.T. Mesra
Information Security Journal | Year: 2011

Portable Document Format (PDF) is a file format developed by Adobe Systems for representing documents in a manner that is independent of the original application software, hardware, and operating system. A PDF file can describe documents containing any combination of text, graphics, and images in a device independent and/or resolution independent format. It is now used everywhere across academic, technical, and governmental institutions. For secure communication, this platform and hardware independent file can be used as a secure cover media for voluminous data concealing. The methods develop so far for data hiding in PDF files satisfy low-embedding characteristics. In this work, we have developed two techniques. The first searches trash spaces in the PDF file and replaces them with the encrypted secret data. The second technique is useful for storing voluminous encrypted secret data without disturbing any format, features, or characteristics of the file. The practical implementation of this has been done on Microsoft platform. Experimental results show the feasibility of the proposed techniques. © Taylor & Francis Group, LLC.

Pandey B.P.,GLNA Institute of Technology | Tripathy S.K.,Indian School of Mines | Kumar V.,Indian School of Mines
2012 Students Conference on Engineering and Systems, SCES 2012 | Year: 2012

This paper has described the heat capacity of LiInX 2 (X S, Se, Te) compounds. Four relations are proposed for the calculation of the heat capacity of these compounds. Out of the four, two are based on the best fit of the experimental data of C p and the other two on similarity factor. The proposed relations are applicable in the temperature range 25-311 (K). The calculated values of heat capacity from all equations are in good agreement with the experimental values and the values reported by different workers. © 2012 IEEE.

Roy T.,GLNA Institute of Technology | Sisodia P.,GLNA Institute of Technology | Upadhyay D.,GLNA Institute of Technology | Dutta K.,National Institute of Technology Hamirpur
Advances in Intelligent Systems and Computing | Year: 2012

The appearance of public access wireless networks enables ever-present Internet services, whereas it inducing more challenges of security due to open air mediums. As one of the most widely used security mechanisms, authentication is provide for secure communications by preventing unauthorized usage and negotiating credentials for verification. In the intervening time, it generates heavy overhead and delay to communications, further deteriorating overall system performance. First, a system model based on challenge/response authentication mechanism by using the elliptic curve cryptographic digital signature is introduced, which is wide applied in wireless environment to reduce the computational cost, communication bandwidth and the server overload . Then, the concept of security levels is proposed to describe the protection of communications with regard to the nature of security. © 2012 Springer-Verlag.

Tiwari R.K.,GLNA Institute of Technology | Sahoo G.,Birla Institute of Technology
International Journal of Internet Technology and Secured Transactions | Year: 2011

The prevalence of multimedia data in our digital world exposes a new opportunity for communication using steganographic mediums and new steganographic cover mediums for data hiding are constantly being proposed from classical image file, mp3, mp4, text, html and executable files. Most of the previous works on executable file were consequently done at the source code or compilation level and stores only a small amount of secret data. In this work, we present and analyse a novel methodology that illustrates how we can store a large amount of secret data in executable files. For implementing our proposed methodologies we use Microsoft platform for the illustration purpose only. © 2011 Inderscience Enterprises Ltd.

Vijay A.,GLNA Institute of Technology
Indian Journal of Pure and Applied Physics | Year: 2011

Several papers published in recent years on the Grüneisen parameter and its volume derivatives, are found to be inconsistent with the thermodynamic constraints developed by Stacey. The shortcomings have been rectified by using the Stacey formulations for the Grüneisen parameter. The results for the volume dependence of the Grüneisen parameter and its higher order derivatives have been presented up to very high pressures for NaCl and hcp iron.

Ali S.,GLNA Institute of Technology
Proceedings of the 2013 International Conference on Information Systems and Computer Networks, ISCON 2013 | Year: 2013

Several academic degree programs have research component. As a first step in the research activity, Research scholar has to undertake literature survey, which enables them to understand the domain of their research and to identify the problem, which they would like to address. This literature survey maps to searching the web for published papers in different professional society like ACM, IEEE and by any related digital library of their domain of interest. These Professional Societies have knowledge base regarding research publication. The knowledge base uses ontology build by ontology expert of that domain, publically available to reuse. These ontologies suffer from the limitations of domain knowledge. We have proposed a novel scheme to map among different types of ontology build by different professional society using Metadata of research publication. To map ontology we use DDC (Dewey Decimal Code), a classification system, to fit different domain ontologies into one based on the metadata. The metadata play vital role to make ontology, which are obtained from research publications, has attributes Subject, Title, keyword, Author Name, and Affiliation etc. This Integrated ontology is generalization of world knowledge. © 2013 IEEE.

Loading GLNA Institute of Technology collaborators
Loading GLNA Institute of Technology collaborators