Search results for: K. K. Soundra Pandian
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7

Search results for: K. K. Soundra Pandian

7 Improved Hash Value Based Stream CipherUsing Delayed Feedback with Carry Shift Register

Authors: K. K. Soundra Pandian, Bhupendra Gupta

Abstract:

In the modern era, as the application data’s are massive and complex, it needs to be secured from the adversary attack. In this context, a non-recursive key based integrated spritz stream cipher with the circulant hash function using delayed feedback with carry shift register (d-FCSR) is proposed in this paper. The novelty of this proposed stream cipher algorithm is to engender the improved keystream using d-FCSR. The proposed algorithm is coded using Verilog HDL to produce dynamic binary key stream and implemented on commercially available FPGA device Virtex 5 xc5vlx110t-2ff1136. The implementation of stream cipher using d-FCSR on the FPGA device operates at a maximum frequency of 60.62 MHz. It achieved the data throughput of 492 Mbps and improved in terms of efficiency (throughput/area) compared to existing techniques. This paper also briefs the cryptanalysis of proposed circulant hash value based spritz stream cipher using d-FCSR is against the adversary attack on a hardware platform for the hardware based cryptography applications.

Keywords: cryptography, circulant function, field programmable gated array, hash value, spritz stream cipher

Procedia PDF Downloads 248
6 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 426
5 Anomalous Course of Left Ovarian Vein Associated with Pelvic Congestion Syndrome

Authors: Viyango Pandian, Kumaresh Athiyappan

Abstract:

Pelvic congestion Syndrome (PCS) is usually seen in multiparous women who give history of chronic dull-aching pelvic pain. We report a case of a 17 year old unmarried female, who presented with acute onset of chronic dull-aching abdominal pain in the left iliac fossa, which particularly increased during menstruation and was finally diagnosed to be pelvic congestion syndrome. On ultrasonography, multiple tortuous and dilated veins were observed in the left adnexa. Both ovaries appeared normal in size, volume and echotexture. Computed tomography (CT) angiography was performed to precisely delineate the venous pathway and to assess any associated abnormality; which showed a dilated and tortuous left ovarian vein with an anomalous course around the left kidney and draining into the left renal vein. Clinical parameters and hormonal levels were within normal limits. This is a rare case of anomalous course of left ovarian vein associated with pelvic congestion syndrome.

Keywords: anomalous course of ovarian vein, computed tomography, pelvic congestion syndrome, ultrasonography

Procedia PDF Downloads 417
4 Cross Cultural Challenges in International Projects: A Comparative Study between Indian and French

Authors: Niranjani Ruba Pandian

Abstract:

In today’s multicultural global business community, most of the businesses and industries are linked with various countries in which different nationalities have different roles and responsibilities throughout the project. The purpose of this research is to examine the cross-cultural challenges between Indian and French and the ways to minimize these challenges to manage effectively the cross-cultural aspect of human resources for the success of global business in an automotive industry. The conducted study utilized quantitative methodology to analyze the data on Indian and French employees' perceptions of 6 cultural dimensions such as power versus distance, individualism versus collectivism, masculinity versus femininity, uncertainty versus avoidance, pragmatic versus normative and indulgence versus restraint. Employees of 4 multinational companies filled in the questionnaire based on the 5-point Likert scale to present quantitative results. The data was analysed with the correlation and multiple regression statistical analyses. It was found that Indian and French have major gap in uncertainty versus avoidance followed by individualism versus collectivism. However, this article highlights the way to minimize these gaps by adopting certain sequenced methodologies.

Keywords: automotive industry, cross cultural challenges, globalization, global business

Procedia PDF Downloads 461
3 Encoded Fiber Optic Sensors for Simultaneous Multipoint Sensing

Authors: C. Babu Rao, Pandian Chelliah

Abstract:

Owing to their reliability, a number of fluorescent spectra based fiber optic sensors have been developed for detection and identification of hazardous chemicals such as explosives, narcotics etc. In High security regions, such as airports, it is important to monitor simultaneously multiple locations. This calls for deployment of a portable sensor at each location. However, the selectivity and sensitivity of these techniques depends on the spectral resolution of the spectral analyzer. The better the resolution the larger the repertoire of chemicals that can be detected. A portable unit will have limitations in meeting these requirements. Optical fibers can be employed for collecting and transmitting spectral signal from the portable sensor head to a sensitive central spectral analyzer (CSA). For multipoint sensing, optical multiplexing of multiple sensor heads with CSA has to be adopted. However with multiplexing, when one sensor head is connected to CSA, the rest may remain unconnected for the turn-around period. The larger the number of sensor heads the larger this turn-around time will be. To circumvent this imitation, we propose in this paper, an optical encoding methodology to use multiple portable sensor heads connected to a single CSA. Each portable sensor head is assigned an unique address. Spectra of every chemical detected through this sensor head, are encoded by its unique address and can be identified at the CSA end. The methodology proposed is demonstrated through a simulation using Matlab SIMULINK.

Keywords: optical encoding, fluorescence, multipoint sensing

Procedia PDF Downloads 709
2 Adolescent Sleep Hygiene Scale and Adolescent Sleep Wake Scale: Factorial Analysis and Validation for Indian Population

Authors: Sataroopa Mishra, Mona Basker, Sneha Varkki, Ram Kumar Pandian, Grace Rebekah

Abstract:

Background: Sleep deprivation is a matter of public health importance among adolescents. We used adolescent sleep wake scale and adolescent sleep hygiene scale to determine the sleep quality and sleep hygiene respectively of school going adolescents in Vellore city of India. The objective of the study was to do factorial analysis of the scales and validate it for use in local population. Methods: Observational questionnaire based cross sectional study. Setting: Community based school survey in a semi-urban setting in three schools in Vellore city. Data collection: Non probability sample was collected form students studying in standard 9 and 11. Students filled Adolescent Sleep Wake scale (ASWS) and Adolescent Sleep Hygiene Scale (ASHS) translated into vernacular language. Data Analysis: Exploratory Factorial Analysis was used to see the factor loading of various components of the two scales. Confirmatory factorial analysis is subsequently planned for assessing the internal validity of the scales.Results: 557 adolescents were included in the study of 12 – 17 years old. Exploratory factorial analysis of adolescent sleep hygiene scale indicated significant factor loading for 18 items from 28 items originally devised by the authors and has been reconstructed to four domains instead of 9 domains in the original scale namely sleep stability, cognitive – emotional, Physiological - bed time routine - behavioural arousal factor (activites before bedtime and during bed time), Sleep environment (lighting and bed sharing). Factorial analysis of Adolescent sleep wake scale showed factor loading of 18 items out of 28 items in original scale reconstructed into 5 aspects of sleep quality. Conclusions: The factorial analysis gives a reconstructed scale useful for the local population. Further a confirmatory factorial analysis has been subsequently planned to determine the internal consistency of the scale for local population.

Keywords: factorial analysis, sleep hygiene, sleep quality, adolescent sleep scale

Procedia PDF Downloads 291
1 The Burmese Exodus of 1942: Towards Evolving Policy Protocols for a Refugee Archive

Authors: Vinod Balakrishnan, Chrisalice Ela Joseph

Abstract:

The Burmese Exodus of 1942, which left more than 4 lakh as refugees and thousands dead, is one of the worst forced migrations in recorded history. Adding to the woes of the refugees is the lack of credible documentation of their lived experiences, trauma, and stories and their erasure from recorded history. Media reports, national records, and mainstream narratives that have registered the exodus provide sanitized versions which have reduced the refugees to a nameless, faceless mass of travelers and obliterated their lived experiences, trauma, and sufferings. This attitudinal problem compels the need to stem the insensitivity that accompanies institutional memory by making a case for a more humanistically evolved policy that puts in place protocols for the way the humanities would voice the concern for the refugee. A definite step in this direction and a far more relevant project in our times is the need to build a comprehensive refugee archive that can be a repository of the refugee experiences and perspectives. The paper draws on Hannah Arendt’s position on the Jewish refugee crisis, Agamben’s work on statelessness and citizenship, Foucault’s notion of governmentality and biopolitics, Edward Said’s concepts on Exile, Fanon’s work on the dispossessed, Derrida’s work on ‘the foreigner and hospitality’ in order to conceptualize the refugee condition which will form the theoretical framework for the paper. It also refers to the existing scholarship in the field of refugee studies such as Roger Zetter’s work on the ‘refugee label’, Philip Marfleet’s work on ‘refugees and history’, Lisa Malkki’s research on the anthropological discourse of the refugee and refugee studies. The paper is also informed by the work that has been done by the international organizations to address the refugee crisis. The emphasis is on building a strong argument for the establishment of the refugee archive that finds but a passing and a none too convincing reference in refugee studies in order to enable a multi-dimensional understanding of the refugee crisis. Some of the old questions cannot be dismissed as outdated as the continuing travails of the refugees in different parts of the world only remind us that they are still, largely, unanswered. The questions are -What is the nature of a Refugee Archive? How is it different from the existing historical and political archives? What are the implications of the refugee archive? What is its contribution to refugee studies? The paper draws on Diana Taylor’s concept of the archive and the repertoire to theorize the refugee archive as a repository that has the documentary function of the ‘archive’ and the ‘agency’ function of the repertoire. It then reads Ayya’s Accounts- a memoir by Anand Pandian -in the light of Hannah Arendt’s concepts of the ‘refugee as vanguard’ and ‘story telling as political action’- to illustrate how the memoir contributes to the refugee archive that provides the refugee a place and agency in history. The paper argues for a refugee archive that has implications for the formulation of inclusive refugee policies.

Keywords: Ayya’s Accounts, Burmese Exodus, policy protocol, refugee archive

Procedia PDF Downloads 140