Search results for: Umesh K. Singh
1148 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 401147 Morphological Processing of Punjabi Text for Sentiment Analysis of Farmer Suicides
Authors: Jaspreet Singh, Gurvinder Singh, Prabhsimran Singh, Rajinder Singh, Prithvipal Singh, Karanjeet Singh Kahlon, Ravinder Singh Sawhney
Abstract:
Morphological evaluation of Indian languages is one of the burgeoning fields in the area of Natural Language Processing (NLP). The evaluation of a language is an eminent task in the era of information retrieval and text mining. The extraction and classification of knowledge from text can be exploited for sentiment analysis and morphological evaluation. This study coalesce morphological evaluation and sentiment analysis for the task of classification of farmer suicide cases reported in Punjab state of India. The pre-processing of Punjabi text involves morphological evaluation and normalization of Punjabi word tokens followed by the training of proposed model using deep learning classification on Punjabi language text extracted from online Punjabi news reports. The class-wise accuracies of sentiment prediction for four negatively oriented classes of farmer suicide cases are 93.85%, 88.53%, 83.3%, and 95.45% respectively. The overall accuracy of sentiment classification obtained using proposed framework on 275 Punjabi text documents is found to be 90.29%.Keywords: deep neural network, farmer suicides, morphological processing, punjabi text, sentiment analysis
Procedia PDF Downloads 3261146 Risk Prediction Based on Heavy Metal Distribution in Groundwater
Authors: Rama Bhattacharyya, S. N. Ojha, Umesh K. Singh
Abstract:
Anthropogenic control on groundwater chemistry has emerged as a critical concern now-a-days, especially in the industrial areas. In view of this, a comprehensive study on the distribution of the heavy metal in the groundwater was conducted to investigate the impact of urbanization in the aquatic media. Water samples either from well or borehole from Fourty different sites in and around, Durgapur, West Bengal were collected for this purpose. The samples were analyzed using Inductively Coupled Plasma Mass Spectrometry (ICP-MS) for Calcium (Ca), Cobalt (Co), Chromium (Cr), Copper (Cu), Iron (Fe), Potassium (K), Magnesium (Mg), Manganese (Mn), Sodium (Na), Nickel (Ni), Lead (Pb), Zinc (Zn) content and the levels were compared with WHO specified maximum contaminant level as well as permissible limits given by the Bureau of Indian Standards (BIS). The result obtained from the present study indicates a significant risk to the population of this important emerging ‘smart city’ of eastern India. Because of the toxicity of these metals and the fact that for many tube-wells, dug-wells and bore-wells are the only sources of the water supply for a major fraction of the population in this environment. In this study, an attempt has been made to develop metal contamination risk map.Keywords: heavy metals, ground water, maximum contamination level, ICP-MS
Procedia PDF Downloads 2151145 Studies on Corrosion Resistant Composite Coating for Metallic Surfaces
Authors: Navneetinder Singh, Harprabhjot Singh, Harpreet Singh, Supreet Singh
Abstract:
Many materials are known to mankind that is widely used for synthesis of corrosion resistant hydrophobic coatings. In the current work, novel hydrophobic composite was synthesized by mixing polytetrafluoroethylene (PTFE) and 20 weight% ceria particles followed by sintering. This composite had same hydrophobic behavior as PTFE. Moreover, composite showed better scratch resistance than virgin PTFE. Pits of plasma sprayed Ni₃Al coating were exploited to hold PTFE composite on the substrate as Superni-75 alloy surface through sintering process. Plasma sprayed surface showed good adhesion with the composite coating during scratch test. Potentiodynamic corrosion test showed 100 fold decreases in corrosion rate of coated sample this may be attributed to inert and hydrophobic nature of PTFE and ceria.Keywords: polytetrafluoroethylene, PTFE, ceria, coating, corrosion
Procedia PDF Downloads 3831144 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories
Authors: Umesh Kumar Singh, Chanchala Joshi
Abstract:
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.Keywords: CVSS score, risk level, security measurement, vulnerability category
Procedia PDF Downloads 3211143 Influence of Post Weld Heat Treatment on Mechanical and Metallurgical Properties of TIG Welded Aluminium Alloy Joints
Authors: Gurmeet Singh Cheema, Navjotinder Singh, Gurjinder Singh, Amardeep Singh
Abstract:
Aluminium and its alloys play have excellent corrosion resistant properties, ease of fabrication and high specific strength to weight ratio. In this investigation an attempt has been made to study the effect of different post weld heat treatment methods on the mechanical and metallurgical properties of TIG welded joints of the commercial aluminium alloy. Three different methods of post weld heat treatments are, solution heat treatment, artificial aged and combination of solution heat treatment and artificial aging are given to TIG welded aluminium joints. Mechanical and metallurgical properties of as welded and post weld treated joints of the aluminium alloys was examined.Keywords: aluminium alloys, TIG welding, post weld heat treatment
Procedia PDF Downloads 5751142 Performance Analysis of VoIP Coders for Different Modulations Under Pervasive Environment
Authors: Jasbinder Singh, Harjit Pal Singh, S. A. Khan
Abstract:
The work, in this paper, presents the comparison of encoded speech signals by different VoIP narrow-band and wide-band codecs for different modulation schemes. The simulation results indicate that codec has an impact on the speech quality and also effected by modulation schemes.Keywords: VoIP, coders, modulations, BER, MOS
Procedia PDF Downloads 5161141 Estimation of Population Mean Using Characteristics of Poisson Distribution: An Application to Earthquake Data
Authors: Prayas Sharma
Abstract:
This paper proposed a generalized class of estimators, an exponential class of estimators based on the adaption of Sharma and Singh (2015) and Solanki and Singh (2013), and a simple difference estimator for estimating unknown population mean in the case of Poisson distributed population in simple random sampling without replacement. The expressions for mean square errors of the proposed classes of estimators are derived from the first order of approximation. It is shown that the adapted version of Solanki and Singh (2013), the exponential class of estimator, is always more efficient than the usual estimator, ratio, product, exponential ratio, and exponential product type estimators and equally efficient to simple difference estimator. Moreover, the adapted version of Sharma and Singh's (2015) estimator is always more efficient than all the estimators available in the literature. In addition, theoretical findings are supported by an empirical study to show the superiority of the constructed estimators over others with an application to earthquake data of Turkey.Keywords: auxiliary attribute, point bi-serial, mean square error, simple random sampling, Poisson distribution
Procedia PDF Downloads 1561140 Mind-Wandering and Attention: Evidence from Behavioral and Subjective Perspective
Authors: Riya Mishra, Trayambak Tiwari, Anju Lata Singh, I. L. Singh, Tara Singh
Abstract:
Decrement in vigilance task performance echoes impediment in effortful attention; here attention fluctuated in the realm of external and internal milieu of a person. To examine this fluctuation across time period, we employed two experiments of vigilance task with variation in thought probing rate, which was embedded in the task. The thought probe varies in terms of <2 minute per thought probe and <4 minute per thought probe during vigilance task. A 2x4 repeated measure factorial design was used. 15 individuals participated in this study with an age range of 20-26 years. It was found that thought probing rate has a negative trend with vigilance task performance whereas the subjective measures of mind-wandering have a positive relation with thought probe rate.Keywords: criterion response, mental status, mind-wandering, thought probe, vigilance
Procedia PDF Downloads 4251139 Characterisation and in vitro Corrosion Resistance of Plasma Sprayed Hydroxyapatite and Hydroxyapatite: Silicon Oxide Coatings on 316L SS
Authors: Gurpreet Singh, Hazoor Singh, Buta Singh Sidhu
Abstract:
In the current investigation plasma spray technique was used for depositing hydroxyapatite (HA) and HA – silicon oxide (SiO2) coatings on 316L SS substrate. In HA-SiO2 coating, 20 wt% SiO2 was mixed with HA. The feedstock and coatings were characterized by X-ray diffraction (XRD) and scanning electron microscopy (SEM)/energy-dispersive X-ray spectroscopy (EDX) analyses. The corrosion resistance of the uncoated, HA coated and HA + 20 wt% SiO2 coated 316L SS was investigated by electrochemical corrosion testing in simulated human body fluid (Ringer’s solution). The influence of SiO2 (20 wt%) on corrosion resistance was determined. After the corrosion testing, the samples were analyzed by XRD and SEM/EDX analyses. The addition of SiO2 reduces the crystallinity of the coating. The corrosion resistance of the 316L SS was found to increase after the deposition of the HA + 20 wt% SiO2 and HA coatings.Keywords: HA, SiO2, corrosion, Ringer’s solution, 316L SS
Procedia PDF Downloads 4191138 Reduction of Wear via Hardfacing of Rotavator Blades
Authors: Gurjinder Singh Randhawa, Jonny Garg, Sukhraj Singh, Gurmeet Singh Cheema
Abstract:
A major problem related to the use of rotavator is wear of rotavator blades due to abrasion by soil hard particles, as it seriously affects tillage quality and agricultural production economy. The objective of this study was to increase the wear resistance by covering the rotavator blades with two different hard facing electrodes. These blades are generally produced from low carbon or low alloy steel. During the field work i.e. preparing land for the cultivation these blades are subjected to severe wear conditions. Comparative wear tests on a regular rotavator blade and two kinds of hardfacing with electrodes were conducted in the field. These two different hardfacing electrodes, which are designated HARD ALLOY-400 and HARD ALLOY-650, were used for hardfacing. The wear rate in the field tests was found to be significantly different statistically. When the cost is taken into consideration; HARD ALLOY-650 and HARD ALLOY-400 have been found to be the best hardfacing electrodes.Keywords: hardfacing, rotavator blades, hard alloy-400, abrasive wear
Procedia PDF Downloads 4261137 Effect of Ultrasonic Vibration on the Dilution, Mechanical, and Metallurgical Properties in Cladding of 308 on Mild Steel
Authors: Sandeep Singh Sandhu, Karanvir Singh Ghuman, Parminder Singh Saini
Abstract:
The aim of the present investigation was to study the effect of ultrasonic vibration on the cladding of the AISI 308 on the mild steel plates using the shielded metal arc welding (SMAW). Ultrasonic vibrations were applied to molten austenitic stainless steel during the welding process. Due to acoustically induced cavitations and streaming there is a complete mixture of the clad metal and the base metal. It was revealed that cladding of AISI 308 over mild steel along with ultrasonic vibrations result in uniform and finer grain structures. The effect of the vibration on the dilution, mechanical properties and metallographic studies were also studied. It was found that the welding done using the ultrasonic vibration has the less dilution and CVN value for the vibrated sample was also high.Keywords: surfacing, ultrasonic vibrations, mechanical properties, shielded metal arc welding
Procedia PDF Downloads 4931136 An Overview of Heating and Cooling Techniques Used in Green Buildings
Authors: Umesh Kumar Soni, Suresh Kumar Soni, S. R. Awasthi
Abstract:
Worldwide biggest difficulties are climate change, future availability of fossil fuels, and economical feasibility of renewable energy. They force us to use to a greater extent renewable energy and develop suitable hybrid renewable systems. Building heating/cooling consumes significant amount of energy. It can be conserved by use of proper heating/cooling techniques. This paper reviews and critically analyzes various active, passive and hybrid heating/cooling techniques used in green buildings.Keywords: natural ventilation, energy conservation, hybrid ventilation techniques, climate change
Procedia PDF Downloads 6051135 Customer Relationship Management: An Essential Tool for Librarians
Authors: Pushkar Lal Sharma, Sanjana Singh, Umesh Kumar Sahu
Abstract:
This paper helps to understand the need of Customer Relationship Management in Libraries and why Librarians should implement the marketing concept of Customer Relationship Management in their libraries. As like any industry, libraries too face growing challenges to continuously meet customer expectations, and attract and retain users in light of overflowing competition. The ability to understand customers, build relationships and market diverse services is essential when considering ways to expand service offerings and improve Return on Investment. Since Library is service oriented Enterprise, hence the Customer/User/ Reader/Patron are the most important element of Library & Information System to whom and for whom library offers various services. How to provide better and most efficient services to its users is the main concern of every Library & Information centre in the present era. The basic difference between Business Enterprise and Library Information System is that ‘in Business System ‘the efficiency is measured in terms of ’profit’ or ‘monetary gains’; whereas in a Library & Information System, the efficiency is measured in terms of ‘services’ and therefore the goals that are set in Business Enterprise are’ profit oriented’ whereas goals set in the Library & Information Centre are ‘Service-oriented’. With the explosion of information and advancement of technology readers have so many choices to get information rather than visiting a library. Everything is available at the click of a mouse, library customers have become more knowledgeable and demanding in an era marked by abundance of information resources and services. With this explosion of information in every field of knowledge and choice in selection of service, satisfying user has become a challenge now a day for libraries. Accordingly, Libraries have to build good relationship with its users by adopting Customer relationship Management. CRM refers to the methods and tools which help an organization to manage its relationship with its customers in an organized way. The Customer Relationship Management (CRM) combines business strategy and technology to identify, acquire and retain good customer relationship. The goal of CRM is to optimize management of customer information needs & interests and increase customer satisfaction and loyalty. Implementing CRM in Libraries can improve customer data and process management, customer loyalty, retention and satisfaction.Keywords: customer relationship management, CRM, CRM tools, customer satisfaction
Procedia PDF Downloads 681134 Exploring Relationship between Attention and Consciousness
Authors: Aarushi Agarwal, Tara Singh, Anju Lata Singh, Trayambak Tiwari, Indramani Lal Singh
Abstract:
The existing interdependent relationship between attention and consciousness has been put to debate since long. To testify the nature, dual-task paradigm has been used to simultaneously manipulate awareness and attention. With central discrimination task which is attentional demanding, participants also perform simple discrimination task in the periphery in near absence of attention. Individual-based analysis of performance accuracy in single and dual condition showed and above chance level performance i.e. more than 80%. In order to widen the understanding of extent of discrimination carried in near absence of attention, natural image and its geometric equivalent shape were presented in the periphery; synthetic objects accounted to lower level of performance than natural objects in dual condition. The gaze plot and heatmap indicate that peripheral performance do not necessarily involve saccade every time, verifying the discrimination in the periphery was in near absence of attention. Thus our studies show an interdependent nature of attention and awareness.Keywords: attention, awareness, dual task paradigm, natural and geometric images
Procedia PDF Downloads 5181133 Synthesis Characterisation and Evaluation of Co-Processed Wax Matrix Excipient for Controlled Release Tablets Formulation
Authors: M. Kalyan Raj, Vinay Umesh Rao, M. Sudhakar
Abstract:
The work focuses on the development of a directly compressible controlled release co-processed excipient using melt granulation technique. Erodible wax matrix systems are fabricated in which three different types of waxes are co processed separately with Maize starch in different ratios by melt granulation. The resultant free flowing powder is characterized by FTIR, NMR, Mass spectrophotometer and gel permeation chromatography. Also, controlled release tablets of Aripiprazole were formulated and dissolution profile was compared with that of the target product profile given in Zysis patent (Patent no. 20100004262) for Aripiprazole once a week formulation.Keywords: co-processing, hot melt extrusion, direct compression, maize starch, stearic acid, aripiprazole
Procedia PDF Downloads 4081132 Experimental Investigation on Sustainable Machining of Hastelloy C-276 Utilizing Different Cooling Strategies
Authors: Balkar Singh, Gurpreet Singh, Vivek Aggarwal, Sehijpal Singh
Abstract:
The present research focused to improve the machinability of Hastelloy C-276 at different machining speeds such as 31, 55, and 79 m/min. The use of CO2 gas and Minimum quantity lubrication (MQL) was applied as coolant and lubrication purposes to enhance the machinability of the superalloy. The output in the form of surface roughness (S.R) and heat generation was monitored under dry, MQL, and MQL-CO2-cooled conditions. The Design of the Experiment was prepared using MINITAB software utilizing Taguchi L-27 orthogonal arrays followed by ANOVA analysis for finding the impact of input variables on output responses. At different speeds and lubrication conditions, different behavioral patterns for Surface Roughness and the temperature was observed. ANOVA analysis depicted that the cooling environment impacted the S.R. majorly (50%) followed by cutting speed (29.84%), feed rate (5.09%), and least through depth of cut (4.95%). On the other side, the temperature was greatly influenced by cutting speed (69.12%), Cryo-MQL (8.09%), feed rate (7.59%), and depth of cut (6.20%). Experimental results revealed that Cryo-MQL cooling enhanced the Surface roughness by 12% compared to MQL condition.Keywords: Hastelloy C-276, minimum quantity lubrication, olive oil, cryogenic Cooling (CO2)
Procedia PDF Downloads 1421131 Error Analysis of Wavelet-Based Image Steganograhy Scheme
Authors: Geeta Kasana, Kulbir Singh, Satvinder Singh
Abstract:
In this paper, a steganographic scheme for digital images using Integer Wavelet Transform (IWT) is proposed. The cover image is decomposed into wavelet sub bands using IWT. Each of the subband is divided into blocks of equal size and secret data is embedded into the largest and smallest pixel values of each block of the subband. Visual quality of stego images is acceptable as PSNR between cover image and stego is above 40 dB, imperceptibility is maintained. Experimental results show better tradeoff between capacity and visual perceptivity compared to the existing algorithms. Maximum possible error analysis is evaluated for each of the wavelet subbands of an image. Procedia PDF Downloads 5041130 Investigation of Microstructure and Mechanical Properties of Friction Stir Welded Dissimilar Aluminium Alloys
Authors: Gurpreet Singh, Hazoor Singh, Kulbir Singh Sandhu
Abstract:
Friction Stir Welding Process emerged as promising solid-state welding and eliminates various welding defects like cracks and porosity in joining of dissimilar aluminum alloys. In the present research, Friction Stir Welding (FSW) is carried out on dissimilar aluminum alloys 2000 series and 6000 series this combination of alloys are highly used in automobile and aerospace industry due to their good strength to weight ratio, mechanical, and corrosion properties. The joints characterized by applying various destructive and non-destructive tests. Three critical welding parameters were considered i.e. Tool Rotation speed, Transverse speed, and Tool Geometry. The effective range of tool rotation speed from 1200-1800 rpm and transverse speed from 60-240 mm/min and tool geometry was studied. The two-different difficult to weld alloys were successfully welded. All the samples showed different microstructure with different set of welding parameters. It has been revealed with microstructure scans that grain refinement plays a crucial role in mechanical properties.Keywords: aluminum alloys, friction stir welding, mechanical properties, microstructure
Procedia PDF Downloads 2781129 Digital Image Forensics: Discovering the History of Digital Images
Authors: Gurinder Singh, Kulbir Singh
Abstract:
Digital multimedia contents such as image, video, and audio can be tampered easily due to the availability of powerful editing softwares. Multimedia forensics is devoted to analyze these contents by using various digital forensic techniques in order to validate their authenticity. Digital image forensics is dedicated to investigate the reliability of digital images by analyzing the integrity of data and by reconstructing the historical information of an image related to its acquisition phase. In this paper, a survey is carried out on the forgery detection by considering the most recent and promising digital image forensic techniques.Keywords: Computer Forensics, Multimedia Forensics, Image Ballistics, Camera Source Identification, Forgery Detection
Procedia PDF Downloads 2471128 Constant Dimension Codes via Generalized Coset Construction
Authors: Kanchan Singh, Sheo Kumar Singh
Abstract:
The fundamental problem of subspace coding is to explore the maximum possible cardinality Aq(n, d, k) of a set of k-dimensional subspaces of an n-dimensional vector space over Fq such that the subspace distance satisfies ds(W1, W2) ≥ d for any two distinct subspaces W1, W2 in this set. In this paper, we construct a new class of constant dimension codes (CDCs) by generalizing the coset construction and combining it with CDCs derived from parallel linkage construction and coset construction with an aim to improve the new lower bounds of Aq(n, d, k). We found a remarkable improvement in some of the lower bounds of Aq(n, d, k).Keywords: constant dimension codes, rank metric codes, coset construction, parallel linkage construction
Procedia PDF Downloads 201127 High Temperature Behavior of a 75Cr3C2–25NiCr Coated T91 Boiler Steel in an Actual Industrial Environment of a Coal Fired Boiler
Authors: Buta Singh Sidhu, Sukhpal Singh Chatha, Hazoor Singh Sidhu
Abstract:
In the present investigation, 75Cr3C2-25NiCr coating was deposited on T91 boiler tube steel substrate by high velocity oxy-fuel (HVOF) process to enhance high-temperature corrosion resistance. High-temperature performance of bare, as well as HVOF-coated steel specimens was evaluated for 1500 h under cyclic conditions in the platen superheater zone coal-fired boiler, where the temperature was around 900 °C. Experiments were carried out for 15 cycles each of 100 h duration followed by 1 h cooling at ambient temperature. The performance of the bare and coated specimens was assessed via metal thickness loss corresponding to the corrosion scale formation and the depth of internal corrosion attack. 75Cr3C2-25NiCr coating deposited on T91 steel imparted better hot corrosion resistance than the uncoated steel. Inferior resistance of bare T91 steel is attributed to the formation of pores and loosely bounded oxide scale rich in Fe2O3.Keywords: 75Cr3C2-25NiCr, HVOF process, boiler steel, coal fired boilers
Procedia PDF Downloads 6091126 Development of a Model Based on Wavelets and Matrices for the Treatment of Weakly Singular Partial Integro-Differential Equations
Authors: Somveer Singh, Vineet Kumar Singh
Abstract:
We present a new model based on viscoelasticity for the Non-Newtonian fluids.We use a matrix formulated algorithm to approximate solutions of a class of partial integro-differential equations with the given initial and boundary conditions. Some numerical results are presented to simplify application of operational matrix formulation and reduce the computational cost. Convergence analysis, error estimation and numerical stability of the method are also investigated. Finally, some test examples are given to demonstrate accuracy and efficiency of the proposed method.Keywords: Legendre Wavelets, operational matrices, partial integro-differential equation, viscoelasticity
Procedia PDF Downloads 3361125 Application of Wavelet Based Approximation for the Solution of Partial Integro-Differential Equation Arising from Viscoelasticity
Authors: Somveer Singh, Vineet Kumar Singh
Abstract:
This work contributes a numerical method based on Legendre wavelet approximation for the treatment of partial integro-differential equation (PIDE). Operational matrices of Legendre wavelets reduce the solution of PIDE into the system of algebraic equations. Some useful results concerning the computational order of convergence and error estimates associated to the suggested scheme are presented. Illustrative examples are provided to show the effectiveness and accuracy of proposed numerical method.Keywords: legendre wavelets, operational matrices, partial integro-differential equation, viscoelasticity
Procedia PDF Downloads 4481124 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1241123 Characteristics of Technology Infrastructure in Small Firms
Authors: Davinder Singh, Jaimal Singh Khamba, Tarun Nanda
Abstract:
Growth of the Indian economy has accelerated to 8% and efforts are on to further propel it to 10%. Undoubtedly, all the segments of the economy, viz. agriculture, industry and services have to improve their contribution to the economy. Growth of Micro-small and medium enterprises (MSMEs) is a sine qua non for the growth of industry, exports and other segments of the economy. Furthermore, promotion of entrepreneurship is also vital for sustenance and upward movement of the current growth trajectory of the economy. The MSME sector acts as a catalyst in upholding and encouraging the creation of the innovative spirit and entrepreneurship in the economy, thereby helping in laying the foundation for rapid industrial development. In this competitive world, they need to be able to confront the increasing competition from developed and emerging economies and to plug into the new market opportunities.Keywords: characteristics, management, MSMEs, technology infrastructure
Procedia PDF Downloads 6421122 Developing an Empirical Relationship to Predict Tensile Strength and Micro Hardness of Friction Stir Welded Aluminium Alloy Joints
Authors: Gurmeet Singh Cheema, Gurjinder Singh, Amardeep Singh Kang
Abstract:
Aluminium alloy 6061 is a medium to high strength heat-treatable alloy which has very good corrosion resistance and very good weldability. Friction Stir Welding was developed and this technique has attracted considerable interest from the aerospace and automotive industries since it is able to produce defect free joints particularly for light metals i.e aluminum alloy and magnesium alloy. In the friction stir welding process, welding parameters such as tool rotational speed, welding speed and tool shoulder diameter play a major role in deciding the weld quality. In this research work, an attempt has been made to understand the effect of tool rotational speed, welding speed and tool shoulder diameter on friction stir welded AA6061 aluminium alloy joints. Statistical tool such as central composite design is used to develop the mathematical relationships. The mathematical model was developed to predict mechanical properties of friction stir welded aluminium alloy joints at the 95% confidence level.Keywords: aluminium alloy, friction stir welding, central composite design, mathematical relationship
Procedia PDF Downloads 5021121 A Review on Aluminium Metal Matric Composites
Authors: V. Singh, S. Singh, S. S. Garewal
Abstract:
Metal matrix composites with aluminum as the matrix material have been heralded as the next great development in advanced engineering materials. Aluminum metal matrix composites (AMMC) refer to the class of light weight high performance material systems. Properties of AMMCs can be tailored to the demands of different industrial applications by suitable combinations of matrix, reinforcement and processing route. AMMC finds its application in automotive, aerospace, defense, sports and structural areas. This paper presents an overview of AMMC material systems on aspects relating to processing, types and applications with case studies.Keywords: aluminum metal matrix composites, applications of aluminum metal matrix composites, lighting material processing of aluminum metal matrix composites
Procedia PDF Downloads 4651120 Performance Analysis and Energy Consumption of Routing Protocol in Manet Using Grid Topology
Authors: Vivek Kumar Singh, Tripti Singh
Abstract:
An ad hoc wireless network consists of mobile networks which creates an underlying architecture for communication without the help of traditional fixed-position routers. Ad-hoc On-demand Distance Vector (AODV) is a routing protocol used for Mobile Ad hoc Network (MANET). Nevertheless, the architecture must maintain communication routes although the hosts are mobile and they have limited transmission range. There are different protocols for handling the routing in the mobile environment. Routing protocols used in fixed infrastructure networks cannot be efficiently used for mobile ad-hoc networks, so that MANET requires different protocols. This paper presents the performance analysis of the routing protocols used various parameter-patterns with Two-ray model.Keywords: AODV, packet transmission rate, pause time, ZRP, QualNet 6.1
Procedia PDF Downloads 8281119 Role of Machine Learning in Internet of Things Enabled Smart Cities
Authors: Amit Prakash Singh, Shyamli Singh, Chavi Srivastav
Abstract:
This paper presents the idea of Internet of Thing (IoT) for the infrastructure of smart cities. Internet of Thing has been visualized as a communication prototype that incorporates myriad of digital services. The various component of the smart cities shall be implemented using microprocessor, microcontroller, sensors for network communication and protocols. IoT enabled systems have been devised to support the smart city vision, of which aim is to exploit the currently available precocious communication technologies to support the value-added services for function of the city. Due to volume, variety, and velocity of data, it requires analysis using Big Data concept. This paper presented the various techniques used to analyze big data using machine learning.Keywords: IoT, smart city, embedded systems, sustainable environment
Procedia PDF Downloads 575