Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jeyamala, C.
- Application of Logistic Equations for Generation of Symmetric Keys in Cryptography
Abstract Views :145 |
PDF Views:3
Authors
Affiliations
1 Department of Information Technology at Thiagarajar College of Engineering, Madurai, IN
2 Thiagarajar College of Engineering, Madurai, IN
1 Department of Information Technology at Thiagarajar College of Engineering, Madurai, IN
2 Thiagarajar College of Engineering, Madurai, IN
Source
Networking and Communication Engineering, Vol 4, No 15 (2012), Pagination: 933-937Abstract
Key management deals with the planning, secure generation, distribution, and storage of keys. Once a key is randomly generated, it must remain secret to avoid unfortunate mishaps and is used for encryption and decryption. Modern cryptographic systems include symmetric key algorithms and public key algorithms for the purpose of providing confidentiality. Symmetric system requires prior sharing of key; hence it is impossible to communicate with unknown users. The key generation in the symmetric crypto system has highly complicated internal structure which involves more number of iterations and cannot be supported by embedded systems and other low powered devices. Considering asymmetric systems, even though it avoids pre sharing of keys, the usage of large primes increases the time complexity of encryption and decryption and also the storage space requirement. Our proposed system for random key generation is designed using logistic equations aiming at independent generation of keys at sender and receiver with minimal parameter exchange offering the same level of security. Key generation involves the exchange of seed value, start value, skip value and precision supported by the calculating machines. The keys generated can be used as session keys which are used for very short duration of time. This enables the encryption algorithm to be as simple as possible like use of Exclusive-OR operations between keys and the plain text. Experimental results proves the efficiency of key generation exhibiting high randomness as specified by National Institute of Standards and Technology (NIST) involving less computational power in terms of time and space and with no compromise in security.Keywords
Avalanche Effect, One Time Pads, Logistic Equation.- Enhancing Student Learning and Engagement in Freshman Course on Problem Solving Using Computers
Abstract Views :187 |
PDF Views:0
Authors
C. Jeyamala
1,
A. M. Abirami
1
Affiliations
1 Department of Information Technology, Thiagarajar College of Engineering , Madurai, Tamil Nadu, IN
1 Department of Information Technology, Thiagarajar College of Engineering , Madurai, Tamil Nadu, IN
Source
Journal of Engineering Education Transformations, Vol 33, No 0 (2020), Pagination: 192-200Abstract
The paper presents a detailed impact analysis of incorporating appropriate active learning strategies for enhancing student learning and engagement in the first year introductory course on Problem Solving using Computers. The major challenge in Education system is that, most of the graduates learn by rote all the way from school to college. Most of the students do not have prior experience in programming and exhibit an aversion towards programming. Active learning techniques have been proved as a viable solution to eradicate rote learning. In order to promote higher order cognitive skills and student engagement, a systematic plan incorporating appropriate active learning techniques has been designed. The experimental study has been carried out in a first year student group comprising of 119 members from the Department of Information Technology at Thiagarajar College of Engineering, Madurai. Along with traditional assessment strategies, exclusive rubrics have been designed to measure the learning outcomes.This blend of instructor led and inquiry based teaching practices in the introductory course on Problem Solving using Computers has shown positive impact on student learning and engagement. Compared with the previous academic years, Students' performance in continuous assessment and End Semester Examinations has improved significantly. Positive feedback from students and increased count of participation in programming contests and online certifications demonstrate the improved effectiveness of the adopted teaching learning strategies in promoting self learning.Keywords
Computer Programming, Problem Based Learning, Active Learning, Higher Order Thinking Skills, Self Learning.- Analysis of In-House Training Workshops for Enhancing Faculty Competence in CDIO Implementation - A Case Study
Abstract Views :220 |
PDF Views:106
Authors
S. J. Thiruvengadam
1,
S. Baskar
1,
S. Saravana Perumaal
2,
C. Jeyamala
3,
D. Anitha
3,
R. Rajan Prakash
3
Affiliations
1 Professor, Academic Process Team, Thiagarajar College of Engineering, Madurai, IN
2 Associate Professor, Academic Process Team, Thiagarajar College of Engineering, Madurai, IN
3 Assistant Professor, Academic Process Team, Thiagarajar College of Engineering, Madurai, IN
1 Professor, Academic Process Team, Thiagarajar College of Engineering, Madurai, IN
2 Associate Professor, Academic Process Team, Thiagarajar College of Engineering, Madurai, IN
3 Assistant Professor, Academic Process Team, Thiagarajar College of Engineering, Madurai, IN