Entity

Time filter

Source Type

Bangalore, India

Sowmyarani C.N.,MSRIT | Srinivasan G.N.,RVCE
International Journal of Applied Engineering Research | Year: 2015

Organizations and government agencies are publishing a huge data, which belongs to many individuals for analysis purpose. The data published will be utilized by researchers to perform mining or analytics. At the same time, the data published should retain the private information of individual. There are many techniques applied on data to preserve private information of individual. Popular techniques used for privacy preservation under data publishing are k-Anonymity, l-diversity, and t-closeness. Each technique is subjected to its own limitations and vulnerable to privacy attacks. In this paper, we are proposing a new privacy preserving technique, which is not vulnerable to many privacy attacks existing in the literature. Our results show that, the technique overcomes privacy attacks existing in the literature and preserves privacy of individual. The proposed technique unifies the popular privacy preserving techniques such as p-sensitive, k-anonymity and t-closeness. P-sensitivity concept included in the technique identifies different levels of sensitive data and closeness concept distributes these sensitive data values though out the table in such a way that, data will be anonymized and it will be difficult for any intruder to know individual information. The results are tested using queries to assure that, the technique is not vulnerable to privacy attacks described in the paper. © Research India Publications. Source


Sathyanarayana S.V.,J.N.N.C.E. | Kumar M.A.,MSRIT | Bhat K.N.H.,NCET
International Journal of Network Security | Year: 2011

In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with Key Sequence derived from random sequence of cyclic elliptic Curve points. P with coordinates (xP; yP) which satisfy the elliptic curve equation is called a point on elliptic curve. The order M is the total number of points (x,y) along with x =∞; y =∞ which satisfy the elliptic curve equation. Least integer N for which NP is equal to point at infinity O is called order of point P. Then P, 2P,. .. (N-1)P are distinct points on elliptic curve. In case of cyclic elliptic Curve there exists a point P having the same order N as elliptic curve order M. A finite field GF(p) (p ̧ N) is considered. Random sequence {ki} of integers is generated using Linear Feedback Shift Register (LFSR) over GF(p) for maximum period. Such sequences are called maximal length sequences and their properties are well established. Every element in sequence {ki} is mapped to kiP which is a point on cyclic elliptic Curve with coordinates say (xi; yi). The sequence {kiP} is a random sequence of elliptic curve points. From the sequence (xi; yi) several binary and non-binary sequences are derived. These sequences find applications in Stream Cipher Systems. Two encryption algorithms - Additive Cipher and Affine Cipher are considered. Results of Image Encryption for a medical image is discussed in this paper. Here, cyclic elliptic Curve over GF(28) is chosen for analysis. Source


Kulkarni S.,Bangalore University | Nagabhushana B.M.,MSRIT | Suriya Murthy N.,Indira Gandhi Center for Atomic Research | Shivakumara C.,Indian Institute of Science | And 2 more authors.
Ceramics International | Year: 2013

Nano-ceramic phosphor CaSiO3 doped with Pb and Mn was synthesized by the low temperature solution combustion method. The materials were characterized by Powder X-Ray Diffraction (XRD), Thermo-gravimetric and Differential Thermal Analysis (TG-DTA), Scanning Electron Microscopy (SEM) and Transmission Electron Microscopy (TEM). The Electron Paramagnetic Resonance (EPR) spectrum of the investigated sample exhibits a broad resonance signal centered at g=1.994. The number of spins participating in resonance (N) and its paramagnetic susceptibility (χ) have been evaluated. Photoluminescence of doped CaSiO3 was investigated when excited by UV radiation of 256 nm. The phosphor exhibits an emission peak at 353 nm in the UV range due to Pb 2+. Further, a broad emission peak in the visible range 550-625 nm can be attributed to 4T1→6A1 transition of Mn2+ ions. The investigation reveals that doping perovskite nano-ceramics with transition metal ions leads to excellent phosphor materials for potential applications. © 2012 Elsevier Ltd and Techna Group S.r.l. Source


Ahmed M.R.,Bangalore University | Sujatha B.K.,MSRIT
International Journal of Engineering and Technology | Year: 2015

The sudden realization of need to modify the machines at architectural level to exhibit intelligence has led many investigations in Biological systems. "Humans" being most intelligent living things are the subject matter. Human Brain is one of the complex system which we are still unable to understand and mimic. In our pursuit of emulating human intelligence using complex hardware systems, many interdisciplinary domains have emerged. Neuromorphic engineering is a domain where electronic systems are designed based on Bio-inspired architectures. This paper provides a Brief review of The Journey of Human race towards imitating human intelligence in machines. Various Facts, Theories and Hypotheses in the domain of Neuromorphic Engineering are discussed. This work outlines the various approaches, architectures, devices and methodologies used in Electronic Implementation of Neuromorphic Systems. This paper will act as primer for any researcher willing to implement morphological circuits. Here we have discussed the progress of current trends in implementation of Cognition in Machine. The gap between software simulation and hardware emulation, FPGA and VLSI implementation is debated. To reach to a wider audience the limitations and open research issues pertaining to Hardware implementation of Bio-inspired architectures are discussed. Source


Kamali C.,National Aerospace Laboratories, Bangalore | Pashilkar A.A.,National Aerospace Laboratories, Bangalore | Raol J.R.,MSRIT
Aerospace Science and Technology | Year: 2011

This paper presents results of evaluation of Recursive Least Squares (RLS) algorithm for real time applications in flight control and testing. The RLS proposed here is based on the equation error principle and can start with zero values of the unknown parameters. The technique makes use of only forgetting factor and a stabilizing parameter to achieve better convergence characteristics. In the present study, the RLS technique is applied for parameter estimation in the context of (i) reconfigurable/restructurable control, (ii) estimation of aircraft short period and Dutch roll characteristics in the absence of calibrated air data, and (iii) online stability (gain and phase) margin estimation. © 2010 Elsevier Masson SAS. Source

Discover hidden collaborations