RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Review and Comparative Analysis of Various Encryption Algorithms

        Rajdeep Bhanot,Rahul Hans 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.4

        Now days, Data security is very challenging issue that touches many areas including computers and communication. Recently, we came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. We have analysed ten data encryption algorithms DES, Triple DES, RSA, AES, ECC, BLOWFISH, TWOFISH, THREEFISH, RC5 and IDEA etc. Among them DES, Triple DES, AES, RC5, BLOWFISH, TWOFISH, THREEFISH and IDEA are symmetric key cryptographic algorithms. RSA and ECC are asymmetric key cryptographic algorithms. In this paper, we have analysed various encryption algorithms on the basis of different parameters and compared them to choose the best data encryption algorithm so that we can use it in our future work.

      • A Secure and Fault Tolerant Platform for Mobile Agent Systems

        Rajdeep Bhanot,Rahul Hans 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.5

        Mobile agents offer a new paradigm in the field of distributed computing. Mobile agent is a program which can migrate from one machine to another machine in order to fulfill the client’s needs. Since it moves from machine to machine on the demand of client, there is threat to the data it carries, from the malicious node or hacker who can steal or change the confidential data of the client. In this paper, we have proposed an integrated framework which is fault tolerant as well as secure from such malicious nodes or hackers. We have applied encryption algorithm for data security and fault tolerant mechanism to avoid any kind of fault using clone and check-pointing with location tracking mechanism. We have implemented the proposed approach and evaluated the time taken by the agent on the basis of various parameters with its fault tolerant and security feature.

      • SCOPUS

        Genetic Optimization based Adaptive Fuzzy Logic Control of a pH Neutralization Process

        Parikshit Kishor Singh,Surekha Bhanot,Hare Krishna Mohanta 보안공학연구지원센터 2014 International Journal of Control and Automation Vol.7 No.11

        Presence of severe nonlinearity in pH neutralization process makes the problem of pH control a difficult and challenging one. Further, optimized control of such highly nonlinear system requires tuning of various parameters with a suitable evolutionary algorithm (EA). This paper presents genetic algorithm (GA) based unconstrained, continuous and single-objective optimization of conventional and adaptive nonlinear fuzzy logic control (FLC) of pH neutralization process for servo and regulatory operations. The GA optimized adaptive FLC scheme changes the universe of discourse of input-output membership functions based on the region of operation and amount of step change in set-point and load. The performance of controllers are evaluated using integral of squared errors (ISE) and tested for random step changes in set-point and load.

      • Influence of Social Value on Purchase 0f Luxury Brands Concerning Demographic Variables : Case of India

        Srini R,Srinivasan,Sandeep Bhanot,Eun Jin Hwang 한국유통과학회 2017 한국유통과학회 학술대회 논문집 Vol.2017 No.-

        The purpose of the study is to understand the influence of social value on the purchase of luxury brands to find whether the perception of social value differs with demographic variables like gender, occupation, age, income, education, religion and marital status. Data collected from 1200 respondents in Mumbai. It was found that social value has a significant effect on the purchase of luxury brands and there was a significant difference in perception of prestige value among people of different age groups, gender, occupation, religion, and monthly income. There was a significant difference in perception of snob value among people of various age groups, ethnicity, gender, and religions. Luxury brand companies can target the right target segment by understanding how social value influences the purchase of luxury brands and whether there is any significant difference in social value concerning the various demographic variables. They can devise strategies to enable the right target segment to access their products efficiently.

      • KCI등재

        Peste des petits ruminants virus detected in tissues from an Asiatic lion (Panthera leo persica) belongs to Asian lineage IV

        Vinayagamurthy Balamurugan,Arnab Sen,Gnanavel Venkatesan,Vandana Bhanot,Vineeta Yadav,Veerakyathappa Bhanuprakash,Raj Kumar Singh 대한수의학회 2012 JOURNAL OF VETERINARY SCIENCE Vol.13 No.2

        In this study, peste des petits ruminants virus (PPRV) was detected in frozen pooled tissue samples from a dead Asiatic lion (Panthera leo persica). The samples were negative for canine distemper virus and positive for PPRV nucleic acids when tested with one-step RT-PCR using the appropriate virus-specific primers. Subsequent amplification, cloning, and sequencing of the partial nucleocapsid, matrix, and fusion genes confirmed the presence of PPRV nucleic acid. Comparative sequence and phylogenetic analyses of the structural genes of the isolated virus confirmed that the virus belonged to Asian lineage IV and was closely related to PPRV circulating in India.

      • SCISCIESCOPUS

        The Somatic Genomic Landscape of Chromophobe Renal Cell Carcinoma

        The Cancer Genome Atlas Research Network,Davis, Caleb F.,Ricketts, C.J.,Wang, M.,Yang, L.,Cherniack, Andrew D.,Shen, H.,Buhay, C.,Kang, H.,Kim, S.,Fahey, Catherine C.,Hacker, Kathryn E.,Bhanot, G.,Gor Cell Press 2014 Cancer Cell Vol.26 No.3

        We describe the landscape of somatic genomic alterations of 66 chromophobe renal cell carcinomas (ChRCCs) on the basis of multidimensional and comprehensive characterization, including mtDNA and whole-genome sequencing. The result is consistent that ChRCC originates from the distal nephron compared with other kidney cancers with more proximal origins. Combined mtDNA and gene expression analysis implicates changes in mitochondrial function as a component of the disease biology, while suggesting alternative roles for mtDNA mutations in cancers relying on oxidative phosphorylation. Genomic rearrangements lead to recurrent structural breakpoints within TERT promoter region, which correlates with highly elevated TERT expression and manifestation of kataegis, representing a mechanism of TERT upregulation in cancer distinct from previously observed amplifications and point mutations.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼