- Winfred D. Thomas
- N. M. Ganesh Babu
- Utkarsh Ghate
- P. S. Udayan
- S. P. Subramani
- K. Udaiyan
- R. Vijaya Sankar
- P. Ravichandran
- T. S. Srinivasamurthy
- Mohan Karnat
- V. Prabhakaran
- S. N. Elkunchwar
- Satish Jadhav
- G. S. Goraya
- Noorunnisa Begum
- Umesh Kumar Tiwari
- K. Sangeetha
- V. Lakshmanan
- R. Ganesan
- K. Ramamurthy
- R. Vijaya Sankar
- D. K. Ved
- S. Noorunnisa Begum
- E. Elamathi
- Aroky Raju
- K. Lakshmi
- M. Karthikeyan
- D. Revathi
- A. Udhayakumar
- A. Anitha
- A. Kannammal
- Balamurugan
- A. Abirami
- Durgadevi
- Sameswari
- S. A. Jameel
- V. Suneetha
- J. Thanislass
- S. Jeevanandam
- Ashutosh Das
- Mukesh Goel
- R. Suganya
- J. Udayakumar
- R. K. Monika
- Indian Forester
- Journal of Natural Remedies
- Indian Journal of Science and Technology
- Nelumbo - The Bulletin of the Botanical Survey of India
- Current Science
- Wireless Communication
- Networking and Communication Engineering
- Research Journal of Science and Technology
- International Journal of Technology
- International Journal of Advanced Networking and Applications
- Nature Environment and Pollution Technology
- ICTACT Journal on Soft Computing
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ravikumar, K.
- Sustainable Harvest of Medicinal Plants: an Initiative in Southern India
Authors
Source
Indian Forester, Vol 131, No 3 (2005), Pagination: 397-409Abstract
Urbanisation and scientific rediscovery is increasing the demand for herbal products, whose overharvest threatens 30% of the traded species. Sustainable harvest traditions are eroding due to (a) poor prices paid to the raw drug gatherers, (b) competition between, (c) market insecurity, (d) many youth gatherers and (e) vehicular mobility to new collection areas. To revive traditions through equitable benefit sharing, Gram Mooligai (i.e. Village Herbs) Company Limited (GMCL) was established, with gatherer's groups as shareholders in Tamil Nadu state in Southern India. Sustainable Biometric experiments could not continue or help in predicting yield but participant observations and "memory harvesting" revealed that focal species have become rare amongst 25% of their earlier collection areas. Major pressures other than harvest indude (a) scarce or untimely rainfall, (b) habitat encroachments and (c) grazing. To earn more better price and sustained business demand, GMCL gatberers maximised not quantity but quality tbrougb tbumb rules ("do's and don'ts") of sustainable barvesting practices: (a) appropriate babitat area (b) maturity timing (c) less damaging methods (d) proper post-harvest treatment (e) user (buyer, co-harvester) agreements.- Notes on Distribution of Capparis rotundifolia Rottler (Capparaceae) - in Southern India
Authors
Source
Indian Forester, Vol 130, No 3 (2004), Pagination: 313-317Abstract
Capparis rotundifolia Rottler is distributed in India, Burma and Sri Lanka. In India, it is restricted to the peninsular region. The taxonomy, ecology and distribution of this taxon are discussed in detail for a better understanding of this uncommon species.- New Plant Reports from the State of Karnataka
Authors
Source
Indian Forester, Vol 130, No 5 (2004), Pagination: 551-564Abstract
Detailed botanical studies conducted in 9 Medicinal Plants Conservation Areas (MPCAs), located in Karnataka state have resulted in the collection of many interesting plants. After critical study, 12 of them Including 2 exotic naturalized species are new distribution record to Karnataka State.- Tinospora sinensis (Lour.) Merr. (Menispermaceae) - a Hitherto Unreported Red Listed Medicinal Plant from Tamil Nadu State
Authors
Source
Indian Forester, Vol 130, No 6 (2004), Pagination: 731-734Abstract
During botanical studies conducted in Thiruvannamalai District of Tamil Nadu State, India as a part of compilation ofthe district flora, Tinospora sinensis (Lour.) Merr. was collected from Javvadhu ('Javadi') hills. It is a Red Listed medicinal plant which also forms an addition to the Flora of Tamil Nadu. It is presented here in detail with nomenclature, description, distribution data, threat status and medicinal information.- Tinospora sinensis (Lour.) Merr. (Menispermaceae) - a Hitherto Unreported Red Listed Medicinal Plant from Tamil Nadu State
Authors
Source
Indian Forester, Vol 130, No 7 (2004), Pagination: 731-734Abstract
During botanical studies conducted in Thiruvannamalai District of Tamil Nadu State, India as a part of compilation ofthe district flora, Tinospora sinensis (Lour.) Merr. was collected from Javvadhu ('Javadi') hills. It is a Red Listed mdicinal plant which also forms an addition to the Flora of Tamil Nadu. It is presented here in detail with nomenclature, description, distribution data, threat status and medicinal information.- Medicinal Plants Conservation and Sustainable Use Through Forest Gene Banks
Authors
Source
Indian Forester, Vol 129, No 2 (2003), Pagination: 179-186Abstract
State Forest Departments (SFDs) of Andhra Pradesh , Karnataka , Kerala ,Tamil Nadu and Maharashtra , in consultation with FRLHT and the support of DANIIDA and UNDP have established 54 forest gene banks sites termed 'Medicinal Plant Conservation Areas (MPCA)'. The network of 54 MPCAs measuring 200 ha to 500 ha each established gradually since 1993 represents all forest types and large bio-climatic and soil regime variation. These gene banks harbour recorded populations of 45% of flowering and medicinal plants of Peninsular India , including 70% of the red listed. The intra-specific diversity i.e. germplasm conserved in the MPCA network can be used to provide authenticated quality planting material for commercial cultivation to meet rising demands of the herbal industry. MPCAs also constitute 'study sites' for threatened species recovery research. MPCAs have proved crucial in capacity building of forestry staff , local communities and researchers in the conservation of Medicinal Plants for sustainable use and equitable benefit sharing. This experience can help in implementing plans and programmes under the Biological Diversity Act 2002 , National Biodiversity Strategy and Action Plan (NBSAP) and Medicinal Plants Board.- Rediscovery of Hopea canarensis Hole (Dipterocarpaceae) - an Endemic and Little Known Species from the Western Ghats of Karnataka, India
Authors
Source
Indian Forester, Vol 125, No 2 (1999), Pagination: 225-229Abstract
Hopea canarensis Hole has been rediscovered from the type locality after a lapse of nearly 80 years and is described here in detail with notes on phenology, distribution and associated plants. The differences between Hopea canarensis and two closely allied Hopea species are tabulated.- The Identification of Medicinal Plants
Authors
Source
Journal of Natural Remedies, Vol 7, No 2 (2007), Pagination: 294-295Abstract
No Abstract.- Solanum sisymbriifolium Lam. - A New Record for the Flora of Gujarat State
Authors
1 Foundation for Revitalisation of Local Health Traditions (FRLHT), Institute of Ayurveda and Integrative Medicine, No.74/2, JarakbandeKaval,Post: Attur, Via Yelahanka, Bengaluru - 560 064, Karnataka, IN
2 Foundation for Revitalisation of Local Health Traditions (FRLHT), Institute of Ayurveda and Integrative Medicine, No.74/2, JarakbandeKaval,Post: Attur, Via Yelahanka, Bengaluru - 560 064, Karnataka, IN
Source
Indian Forester, Vol 140, No 2 (2014), Pagination: 201-202Abstract
No AbstractReferences
- Almeida, M.R. (2001). Flora of Maharashtra. Orient Press, Mumbai.III (B): 373-382.
- Bohsand, L. and Olmstead, R.G. (1997). Phylogenetic relationships in Solanum (Solanaceae) based on ndhF sequences. Systematic Botany, 22: 5-17.
- Bole, P.V. and Pathak, J.M. (1988). Flora of Saurashtra.Botanical Survey of India, Calcutta. 2:133-139.
- Cooke, T. (1905). The Flora of Presidency of Bombay. Botanical Survey of India, Calcutta. II: 331-339.
- D'Arcy, W.G. (1979). The classification of the Solanaceae, In: Solanaceae III: The Biology and Taxonomy of the Solanaceae, 3-47 (Hawkes J. G. et al.). London: Academic Press.
- Hooker, J.D. (1885). Flora of British India. Authority of the Secretary of State for India in Council. 4 : 229-237.
- Kumari, R.M. (2004). A Taxonomic Revision of the Indian Solanaceae. PhD Thesis. Botanical Survey of India.
- Mishra, K.K. and Kumar, D. (1992).Note on the occurrence of Solanum sisymbriifolium Lamk. (Solanaceae) in Bihar. J. Econ. Taxon.Bot., 16 (3): 562-564.
- Shah, G.L. (1978). Flora of Gujarat State. Sardar Patel University, Vidyanagar, Gujarat. I: 489-492.
- Shetty, B.V. and Singh, V. (1991).Flora of Rajasthan, Botanical Survey of India, Calcutta. 2: 571-576.
- Yadav.B.L. andMeena, K.L. (2007).Solanumsisymbriifolium Lam. (Solanaceae): A new record for Rajasthan, India. J. Econ. Taxon, 31 (3): 749-753.
- Zhi-Yun, Zh., An-Ming, L. and D'Arcy, W.G., (1994). Solanaceae. In: Flora of China 17: 314–325. [e-flora of China: [http://www.efloras.org/flora_page.aspx?flora_id=2].
- A Novel Traffic Dividing and Scheduling Mechanism for Enhancing Security and Performance in the Tor Network
Authors
1 Bharathiyar University, Coimbatore, IN
2 Computer Science Department, Tamil University, IN
Source
Indian Journal of Science and Technology, Vol 8, No 7 (2015), Pagination: 689-694Abstract
Objective: The main intent of this research is to improve the quality-of-service in the Tor anonymous communication network by splitting the traffic and scheduling it according to the traffic load. Methods: In this manuscript, a Novel Traffic, Dividing and Scheduling (NTDS) mechanism is introduced for improving performance in the Tor anonymous communication network. The performance of the tor network is described by using various network metrics such as bandwidth, latency, jitter, loss etc. In this mechanism, the traffic load is disseminated across circuits depends on each circuit bandwidth capacity, congestion level, measured latency, throughput. Results: The Novel Traffic, Dividing and Scheduling (NTDS) mechanism show higher performance when compared to the existing router selection method. Throughput, congestion level, latency and available bandwidth are measured for the circuit and based on this the traffic is split and scheduled. If the number of nodes is 50, the packet delivery ratio is 70% in NTDS, the throughput in NTDS is 72% and end-to-end delay is 0.69. According to the comparison results, the proposed approach works better than the other existing systems with high quality-of-service. Conclusion: The findings demonstrate that the Novel Traffic, Dividing and Scheduling (NTDS) mechanism is presented and suggested that this method has high quality-of-service.Keywords
Anonymous Communication Network, Bandwidth Estimation, Quality-Of-Service, Path Selection, Tor Network.- A New Variety of Chionanthus ramiflorus Roxb. (Oleaceae) from South India
Authors
1 Botanical Survey of India, Coimbatore, IN
Source
Nelumbo - The Bulletin of the Botanical Survey of India, Vol 31, No 1-4 (1989), Pagination: 163-165Abstract
No Abstract.- Melhania Balakrishanii (Sterculiaceae)-a New Species from Tamil Nadu, India
Authors
1 Botanical Survey of India, Coimbatore, IN
Source
Nelumbo - The Bulletin of the Botanical Survey of India, Vol 31, No 1-4 (1989), Pagination: 172-174Abstract
No Abstract.- Botany of Anapady MPCA, Palghat District, Kerala with Special Emphasis on Species of Conservation Concern
Authors
1 Foundation for Revitalisation of Local Health Traditions (FRLHT), 74/2, Jarakbande Kaval, Yelahanka, Bangalore 560 064, IN
Source
Nelumbo - The Bulletin of the Botanical Survey of India, Vol 49, No 1-4 (2007), Pagination: 165-172Abstract
Detailed botanical survey was carried out in Anapady Medicinal Plants Conservation Area (MPCA) during November 2003 which resulted in the documentation of 442 taxa of flowering plants including several endemic and threatened ones. Screening of literature showed that 58 taxa are additions to the flora of Palghat district. Of these, Desmodium zonatum Miq., Digitaria tomentosa (Koenig ex Willd.) Henrard and Peperomia pseudo-rhombea C.DC. form new reports to the state of Kerala. 34 of these taxa belong to the category of Red Listed medicinal plant species.- 'Asoka' - An Important Medicinal Plant, its Market Scenario and Conservation Measures in India
Authors
1 Repository for Medicinal Resources, Foundation for Revitalisation and Local Health Traditions, # 74/2, Jarakabande Kaval, Attur PO, Bangalore 560 106, IN
Source
Current Science, Vol 107, No 1 (2014), Pagination: 26-28Abstract
No Abstract.- Secure Data Share in Drop Box Using Key-Aggregate Cryptosystem
Authors
1 Department of CSE, RRASE College of Engineering, Padappai, Chennai-601301, IN
Source
Wireless Communication, Vol 7, No 4 (2015), Pagination: 140-145Abstract
Files discussing is definitely an crucial features inside cloud storage. In this paper, all of us display how you can safely and securely, effectively, and also flexibly share data along with some others inside cloud storage. All of us explain new public-key cryptosystems which generate constant-size cipher texts such that successful delegation associated with decryption proper rights for virtually every pair of cipher texts are usually feasible. The originality will be that certain could mixture virtually any pair of key recommendations and also cause them to become seeing that lightweight being a single essential, yet covering the facility of all recommendations getting aggregated. Basically, the key essential case could release a constant-size mixture essential regarding adaptable choices associated with cipher text occur cloud storage, but the some other encrypted records beyond your set keep on being confidential. This kind of lightweight mixture essential may be handily provided for some others or end up being kept within a clever minute card along with very restricted secure storage. Currently official protection investigation of our techniques from the normal product. All of us in addition explain some other application of our techniques. In particular, your techniques provide first public-key patient-controlled encryption regarding adaptable Pecking order that is still to be known.
Keywords
Cloud Safe-Keeping, Files Discussing, Key-Aggregate Encryption.- Tamil Data Communication Security Using Elliptic Curve Cryptography Key Algorithms
Authors
1 Dept.of Computer of Computer Science, Tamil University, Thanjavur, IN
2 Dept.of Computer Science, Tamil University, IN
3 Karpagam University, IN
Source
Wireless Communication, Vol 2, No 11 (2010), Pagination: 450-452Abstract
Tamil data, scripts, files needs to be preserved in computing. As there is a need for security in various computer networks fields, the paper mainly focus an algorithm in the field of secrecy , privacy, confidentiality of the documents in a computer system by the principle “ Cryptography “. Cryptography is defined as an art of security technique for computer networks. A computer user to preserve his documents, scripts needs to search for security oriented algorithms, packages, databases which arises an unfulfilled thirst. To quench the security thirst, a recent algorithm namely ‘Elliptic Curve Cryptography (ECC)’ is framed as it is an approach to public-key cryptography based on some algebraic structure of elliptic curves over finite fields. The creator keeps the knowledge of security key mechanisms such as private key, public keys. The keys which are generated best choose random-numbers that uses products of two large prime numbers as the key. Any user to preserve his documents picks two large random primes as his private key, and publishes the product as his public key. The public key based algorithm ‘Elliptic Curve Cryptography (ECC)’ is based on the creation of different keys that are difficult to solve without certain knowledge about how they were created. Elliptic curve cryptosystems is computationally efficient than the first generation public key systems such as RSA and Diffie-Hellman algorithms as the report says. As an added advantage the paper mainly focus on ECC based security algorithms for Tamil document privacy. The document related in Tamil words are analyzed commonly as a process which includes security mechanisms that emerges finally in the system as a preserved document.Keywords
Elliptic Curve, Scripts, Co-Clustering, Algorithm, Security.- Security in Mobile Communication Using Digital Signature with WAP
Authors
1 Department of Computer Science, The Tamil University, IN
2 Department of Computer Science, The Tamil University, IN
Source
Wireless Communication, Vol 2, No 5 (2010), Pagination: 101-108Abstract
As mobile networks expand their bandwidth, mobile phones, as with any other Internet device, become substantially exposed to Internet security vulnerabilities. Public key cryptography is a primary concept in implementing wireless device security. This paper describes the applicative use of PKI in current and future mobile phone applications, and shows how the standard-compliant implementation of cryptographic algorithms, enables wireless devices to become PKI-enabled. The Wireless Application Protocol is a leading technology for companies trying to unlock the value of the Mobile Internet. The WAP model introduces a Gateway that translates between WAP and Internet protocols. This Gateway is typically located at the site of the mobile operator, although sometimes it may be run by an application service provider or enterprise. WAP enables such capability via use of a crypto API, referred to as the WMLScript Crypto API. WMLScript is a simple script language that allows client-side processing, and instructs the client device to invoke application-level functions.Keywords
Cryptography, Private-Key Cryptography, Public-Key Cryptography, Public Key Infrastructure.- Multi-Party Electronic Payment System Using ECCMA Algorithm
Authors
1 Dept. of Computer Science, Karpagam University, Coimbatore, IN
2 Dept. of Computer Science, Tamil University, Thanjavur-613010, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 6, No 8 (2014), Pagination: 328-334Abstract
Security in digital communications nowadays depends on cryptography. Multiparty Key Access depends on algorithms for generating asymmetric keys. The present algorithmic rule in use is MKA that uses mathematical properties of prime numbers and therefore the quality of resolving giant numbers to come up with secure asymmetric keys. A more modern algorithmic rule that might be used is Elliptic Curve Cryptography (ECC). Elliptic Curves have mathematical properties in which specified uneven keys is generated which is stronger than those created by Existing strategies. To investigate the utilization of ECC for MKA, a basic ECC generator is used and it will generate live keys and coding durations. The comparative key strength of ECC and Existing strategies is taken into thought; ECC is orders of magnitude quicker than Existing strategies for a similar security. The problems preventing the adoption of ECC using MKA in Cryptography area for raising security unit mentioned. The properties rights of ECC are utilized in MKA, the biggest obstacle to ECC adoption are substitution the present MKA infrastructure that uses Existing strategies. It is expected that ECC in MKA can become customary by 2020.Keywords
Cryptography, Decryption, Encryption, Elliptic Curve, Multi-Party.- Performance Analysis for Electronic Payment Systems
Authors
1 Tamil University, Thanjavur, IN
2 Karpagam University, Coimbatore, IN
3 AM Jain College, Chennai, IN
Source
Networking and Communication Engineering, Vol 4, No 13 (2012), Pagination: 800-802Abstract
In this paper, thus the research analysis, design and implementation phase has been described for our research. It is proposed framework architecture for the Secure Multiparty Electronic Payments in mobile computing in order to support self-protection in AmI scenarios. The architecture of our framework is device-and platform independent and focuses on the use of auctions protocols for electronic payments policies. The top priority was the security of the auctions. All secret information that is exchanged between the auctions host and the peers is encrypted and protected against illegitimate modifications. it will extend the modularity of the proposed framework in order to allow individual utility functions and a replaceable module for determining the winning policy. Further, the integration of our framework into the refinement process of semantic high-level policies is in progress.Keywords
Multi-party Security, Mobile Computing, Cryptography, Negotiation.- E Market Place Security Using Elliptic Curve Distributed Key
Authors
1 Dept. of Computer Science, Tamil University, Thanjavur, IN
2 CIT, Coimbatore, IN
3 Karpagam University, IN
4 Tamil University, IN
Source
Networking and Communication Engineering, Vol 3, No 13 (2011), Pagination: 830-832Abstract
Aiming to develop an e-market, need to consider not only technological, but also business issues that might affect their acceptance and profitability. By describing an example of an e-market application, this paper discusses these issues and shows that although technology may provide various different solutions for the development of an e-market, it cannot on its own lead to an e-market’s success. During the last decade e-commerce has quickly evolved through a succession of business models. The commercially operational business sites in eleven categories: e-shop, e-auction, e-procurement, e-mall, third party marketplace, virtual communities, value chain service provider, value chain integrator, collaboration platform, information brokerage and trust. However, that the Internet economy has divided the overall market space into three broader structures: Portals, Market Makers, and Product Service providers. A portal engages primarily in building a community of users seeking information about products and services. A market maker plays a similar role with that of a portal in building a community of buyers, customers. A community of suppliers of products and services. However, market makers differ from portals in that they provide, handle and facilitate the business transaction that takes place between the buyer and the supplier. Last but not least, the product, service providers are dealing directly with their customers when it ultimately comes to the business transaction. These three structures incorporate various business models or different definitions. For example, a market maker is similar to an e-mall, a third party marketplace, an e-marketplace or an e-market. For reasons of clarity, in this paper, define our application by using the term “e-market”. E-markets have evolved and become important elements in the Internet-age economy. The main functionality of an electronic market is to match seller offerings with buyer preferences.Keywords
E-Market, ECC, Distributed Key.- Algorithm for Cryptanalysis with Application to Data Encryption Standard
Authors
Source
Networking and Communication Engineering, Vol 1, No 6 (2009), Pagination: 240-244Abstract
A random search through a finite but large key space is not usually an acceptable cryptanalysis approach. The focus of this work is on the use of a genetic algorithm (GA) to conduct a directed search in a key space. The structure of Lucifer was significantly altered and since the design rationale was never made public and the secret key size was reduced from 128-bit to 56-bits this initially resulted in controversy, and some distrust among the public. In this paper, a new method has been developed for the first time to break DES like examples. These examples include both DES with eight rounds. The performance of the proposed method, as such, is considerably faster than exhaustive search and differential cryptanalysis. Therefore, it can be directly applied to a variety of DES like systems instead of the current techniques. Here, a Genetic Algorithm, GA, is proposed for the cryptanalysis is of DES like systems to find out the underlying key. The genetic algorithm approach is adopted, for obtaining the exact key by forming an initial population of keys that belong to the key subspace. In the proposed algorithms, the premature convergence could be avoided by dynamic variation of control parameters that can affect the fitness function. DES uses a 56-bit encryption key. The key size was apparently dictated by the memory and processing constraints imposed by a single-chip implementation of the algorithm for DES. The key itself is specified with 8 bytes, but one bit of each byte is used as a parity check.
Keywords
Data Encryption Standard, Encryption Algorithm, Genetic Algorithm.- Ruminal bacteriocins-An Effective Tool in Preventing Lactic Acidosis in Ruminants
Authors
1 School of Biosciences and Technology, VIT University, Vellore, IN
2 Rajiv Gandhi College of Veterinary Research and Education, Pondicherry University, Pondicherry, IN
Source
Research Journal of Science and Technology, Vol 6, No 4 (2014), Pagination: 220-224Abstract
Rumen is a rich source of anaerobic microbes which are essential for digestion and microbial protein synthesis, there are number of bacteriocins from rumen microbes were identified and studied such as Butrivibriocin OR79, Butrivibriocin AR10, Bovicin 255. Bovicin HC5 isolated from Streptococcus bovis was found to have antibacterial activity for nisin resistant Streptococcus bovis JB1, bovicin Sb15 a Bacteriocin from Streptococcus bovis strain isolated from australian ruminants and shown completely inhibitory to Lactococcus lactis MG1363.Albucin B isolated from culture supernatant of Ruminococcus albus 7 completely inhibited the growth of Ruminococcus flavifaciens, Theses bacreiocins found to be effectively inhibit the growth of lactic acid bacteria so it can be effectively utilized In preventing lactic acidosis In ruminants..- Comprehensive Study on Textile Dyeing Sludge as a Substitute for Cement in Cement-Mortar
Authors
1 Department of Civil Engineering, M.A.M. College of Engineering, Trichy, Tamil Nadu, IN
2 Department of Civil Engineering, VNR VJIET, Bachupally, Hyderabad, Telangana, IN
3 Centre for Environmental Engineering, PRIST University, Vallam, Thanjavur, Tamil Nadu, IN
Source
International Journal of Technology, Vol 5, No 2 (2015), Pagination: 219-224Abstract
This study examines the reuse of textile effluent treatment plant (ETP) sludge in substituting cement in construction industry. The chemical sludge from CETP of Karur, Tamil Nadu has been taken for study purpose. This is a comprehensive study mainly testing the physical properties such as consistency, initial and final setting time of cement with various percentages of sludge, and compressive strength of the mortar cubes with sludge replacing the cement; testing the chemical properties such as pH, Electrical conductivity, Total Hardness and Heavy metal concentration present in the cured water for various days for various percentages of sludge replacing cement in cement-mortar cubes. The chemical sludge from textile wastewater treatment plants has a potential to be reused up to 20% replacement of cement to ensure the required compressive strength of mortar.
Keywords
Hazardous Waste, Textile Industry, Chemical Sludge, Characterization, Waste Management, Cement, Physico-Chemical Properties, CETP, Karur.- GSIS: A Secure and Timed-Efficient Stream Loss-Tolerant Authentication Protocol For Vehicular Communications
Authors
1 Department of Computer Science, Karpagam University, Coimbatore, IN
2 Department of Computer Science, Tamil University, Thanjavur, IN
Source
International Journal of Advanced Networking and Applications, Vol 5, No 1 (2013), Pagination: 1837-1841Abstract
In this paper, we first identify some unique design requirements in the aspects of security and TESLA for communication between different communication devices in vehicular ad hoc networks. We propose a Time-Efficient stream Loss -Tolerant Authentication broadcast authentication protocol based on Group signature and Identify (ID) based signature techniques. We demonstrate that the proposed protocol as an efficient protocol with communication and computation overhead, which scales to large number of receiver, and tolerate packet loss. TESLA protocol guarantee the requirements of security can provide the desired traceability of each vehicle in the case where the ID of the message sender has to be receiver by the authority of any dispute event Extensive simulation is conducted to verify the efficiency, effectiveness and applicability of the proposed protocol in various application scenarios under different road systems.Keywords
ID – Based Signature, TESLA, and Vehicular Communication.- Hybrid Method of Coagulation-Flocculation and Adsorption-Filtration Processes for the Removal of Hexavalent Chromium from the Aqueous Systems
Authors
1 Environmental Resources Research Centre (ERRC) of M.G. University, Trivandrum, IN
2 Department of Civil Engineering, TKM College of Engineering, Kollam, IN
Source
Nature Environment and Pollution Technology, Vol 16, No 2 (2017), Pagination: 509-514Abstract
Hexavalent chromium is one the most important water pollutants. There are a number of available technologies used for the remediation of chromium, but none of them is applicable to all situations. In this study a hybrid method of coagulation-flocculation uses Moringa oleifera seed coagulant polymer and adsorption-fine filtration with composite of kaolinite clay and sand media for removing chromium ions present in aqueous systems. 98% of chromium ions were removed from the water by this novel technique of coagulation-flocculation and adsorption-filtration process.Keywords
Moringa oleifera, Kaolinite Clay, Heavy Metals, Chromium Removal.- Protecting Virtualized Infrastructures in Cloud Computing Based on Big Data Security Analytics
Authors
1 Department of Computer Science and Engineering, Knowledge Institute of Technology, IN
Source
ICTACT Journal on Soft Computing, Vol 11, No 2 (2021), Pagination: 2306-2315Abstract
Virtualized infrastructure in cloud computing has become an attractive target for cyber attackers to launch advanced attacks. This paper proposes a novel big data based security analytics approach to detecting advanced attacks in virtualized infrastructures. Network logs as well as user application logs collected periodically from the guest virtual machines (VMs) are stored in the Hadoop Distributed File System (HDFS). Then, extraction of attack features is performed through graph-based event correlation and Map Reduce parser based identification of potential attack paths. Next, determination of attack presence is performed through two-step machine learning, namely logistic regression is applied to calculate attack’s conditional probabilities with respect to the attributes, and belief propagation is applied to calculate the belief in existence of an attack based on them. Experiments are conducted to evaluate the proposed approach using well-known malware as well as in comparison with existing security techniques for virtualized infrastructure. The results show that our proposed approach is effective in detecting attacks with minimal performance overhead.Keywords
Virtualized infrastructure, Virtual Machines, Hadoop Distributed File System.References
- D. Fisher, “Venom’ Flaw in Virtualization Software Could Lead to VM Escapes, Data Theft”, Available at: https://threatpost.com/venomflaw-in-virtualization-software-could-lead-to-vm-escapes-datatheft/112772/, 2015, Accessed at 2015.
- Z. Durumeric, J. Kasten, D. Adrian, J. A. Halderman, M. Bailey, F. Li, N.Weaver, J. Amann, J. Beekman and M. Payer, “The matter of Heart Bleed”, Proceedings of International Conference on Internet Measurement, pp. 475-488, 2014.
- K. Cabaj, K. Grochowski and P. Gawkowski, “Practical Problems of Internet Threats Analyses”, Proceedings of International Conference on Theory and Engineering of Complex Systems and Dependability, pp. 87-96, 2015.
- J. Oberheide, E. Cooke and F. Jahanian, “Cloudav: N-Version Antivirus in the Network Cloud”, Proceedings of International Symposium on USENIX Security, pp. 91-106, 2008.
- X. Wang, Y. Yang and Y. Zeng, “Accurate Mobile Malware Detection and Classification in the Cloud”, Springer Plus, Vol. 4, No. 1, pp. 1-23, 2015.
- N.V. Kousik, S. Jayasr and A. Daniel, “A Survey on Various Load Balancing Algorithm to Improve the Task Scheduling in Cloud Computing Environment”, Journal of Advanced Research in Dynamical and Control Systems, Vol. 11, No. 8, pp. 2397-2406, 2019.
- V. Ganesan and S.G. Dhas, “Analysis on Improving the Response Time with PIDSARSA-RAL in Clowd Flows Mining Platform”, EAI Endorsed Transactions on Energy Web, Vol. 5, No. 20, pp. 1-14, 2018.
- K. Cabaj, K. Grochowski and P. Gawkowski, “Practical Problems of Internet Threats Analyses”, Proceedings of International Conference on Dependability and Complex Systems, pp. 87-96, 2015.
- Y. Lee and D. Kim, “Threats Analysis, Requirements and Considerations for secure Internet of Things”, International Journal of Smart Home, Vol. 9, No. 12, pp. 191-198, 2015.
- S. Fedushko and E. Benova, “Semantic Analysis for Information and Communication Threats Detection of Online Service Users”, Procedia Computer Science, Vol. 160, pp. 254-259, 2019.
- Y. Lee, Y. Park and D. Kim, “Security Threats Analysis and Considerations for Internet of Things”, Proceedings of International Conference on Security Technology, pp. 28-30, 2015.
- R.E. Crossler, F. Belanger and D. Ormond, “The Quest for Complete Security: An Empirical Analysis of Users’ Multi-Layered Protection from Security Threats”, Information Systems Frontiers, Vol. 21, no. 2, pp. 343-357, 2019.