Entity

Time filter

Source Type

Guntūr, India

Rupa Ch.,VVIT | Avadhani P.S.,Andhra University
Advances in Intelligent and Soft Computing | Year: 2012

Information technology is facing lots of problems, while transmitting sensitive data and confidential data due to rapid growth of technology. The sensitive data is intended to share between only authorized persons, not for all. Information security concentrates on sensitive knowledge pattern that can be exposed when extracting the data. Therefore, researchers, for a long time period, have been investigating paths to improve privacy for sensitive data in information security analysis task process. So, many techniques have been introduced on privacy preserving issues in information security by using cryptography, steganography and their combination. In this paper we proposed an effective and efficient approach based on cryptography and Chains Matrix Multiplication (CMM) steganography uses optimal substructure property for generating random key to hide the data. It has to be improved privacy of sensitive data in information security analysis. © 2012 Springer-Verlag GmbH. Source


Rajan K.,BIT | Laxmi V.,BIT | Mohanta D.K.,BIT | Das S.,VVIT
International Journal of Applied Engineering Research | Year: 2015

In the past few years, numbers of vehicle have increased worldwide, particularly in India. Therefore, managing traffic is a very big challenge in India. The purpose of this work is to develop a laboratory model of real-time application for detecting and recognizing the vehicle license plate. The system can be installed at a toll gate or restricted entry area or at a border crossing. The system comprises of a computer with a video camera, which captures video frames including visible vehicle license plate and processes them. Once the vehicle license plate is recognized through the system, the characters are recognized and displayed in the graphical user interface (GUI) of LabVIEW and checked using the database. The focus is on designing algorithms for extracting the vehicle license plate from captured image and subsequently identifying the characters of the vehicle license plate. The proposed system has been implemented by using Vision Assistant 12 and LabVIEW 12. The performance of this system has been investigated for about 546 vehicles. The similar system has been executed in Matlab 7.0. The results obtained by both the software prove the efficacy of real-time laboratory prototype. © Research India Publications. Source


Thirumalai R.,Kumaraguru College of Technology | Selvarani P.,Government Polytechnic College | Senthilkumaar J.S.,VVIT
International Review of Mechanical Engineering | Year: 2012

This paper describes the development of response model of flank wear for machining Inconel 718. The machining experiments are conducted based on the design of experiments by varying the cutting speed, feed, and depth of cut as machining parameters against the response flank wear. The performance of uncoated carbide cutting tool was investigated at various cutting conditions under dry machining and refrigerated coolant machining. This paper made an attempt to Taguchi optimization technique to study the machinability performances of Inconel 718. An orthogonal array of L27 was used and anova analysis was carried out to identify the significant factors. The objective of this study is to predict the optimum cutting conditions to minimize the flank wear. Taguchi's optimization analysis indicates that the factors level, its significance to influence the flank wear for the machining processes. Confirmation tests were conducted at an optimal condition to make a comparison between the experimental results foreseen from the mentioned correlations and found satisfactory. © 2012 Praise Worthy Prize S.r.l.-All rights reserved. Source


Rao K.P.,P.A. College | Rupa Ch.,VVIT
2013 International Conference on Human Computer Interactions, ICHCI 2013 | Year: 2013

Cryptography is used to provide the security to the information. At present various security algorithms are used by the users to protect their data from intruders. Even though, attacks are being done by the assailants on the data due to rapid growth of the technology as well as its diffidence also. Hence in this paper we proposed a security approach using unit fractions of the Linear Algebra i.e Hilbert Matrix. The main important properties of the Hilbert matrix are symmetric and positive definitive, which makes determinant of every sub matrix, is positive and useful to generate different cipher texts to the same plain text. It improves the security to the data by confusing the intruders. We show that the various properties that just differ by the standard security algorithms such as RSA. Cryptanalysis of the proposed algorithm shows that it is resistant to various attacks and stronger than existed encryption algorithms. © 2013 IEEE. Source


Srinivasarao T.,VVIT | Rathakrishnan E.,Indian Institute of Technology Kanpur
Applied Mechanics and Materials | Year: 2014

The effect of inner nozzle lip thickness on the co-flow jet characteristics has been studied experimentally. Co-flow nozzles with inner nozzle lip thicknesses of 3 mm and 15 mm have been investigated. The thick-lip nozzle promotes mixing better than the thin-lip nozzle, for all the underexpanded operating conditions. The co-flow nozzle with thin-lip is effective in preserving the shock-cells nature, bringing down the longer shock-cell into shorter one and increasing the number of shock-cells compared to that of the co-flow nozzle with thick-lip. © (2014) Trans Tech Publications, Switzerland. Source

Discover hidden collaborations