http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A New Marginal Color Image Water Marking Method based on Logical Operators
B. Vijaya Kumar,M.Radhika Mani,G. Roseline NesaKumari,Dr. V. Vijaya Kumar 보안공학연구지원센터 2009 International Journal of Security and Its Applicat Vol.3 No.4
Image hiding is a technique that embeds the images into a cover image which makes the watermarks imperceptible so that they can be securely transmitted to the receiver. In this paper, an effective color image watermarking method based on the marginal strategy is proposed. The method uses logical operators like AND and XOR on the nibble to hide the image with in the cover image. To test the robustness of the stego image the present method is applied on different kinds of cover images and the resulting perceptual quality is good.
Machine learning-based design automation of CMOS analog circuits using SCA-mGWO algorithm
Vijaya Babu E,Syamala Y 한국전자통신연구원 2022 ETRI Journal Vol.44 No.5
Analog circuit design is comparatively more complex than its digital counterpart due to its nonlinearity and low level of abstraction. This study proposes a novel low-level hybrid of the sine-cosine algorithm (SCA) and modified greywolf optimization (mGWO) algorithm for machine learning-based design automation of CMOS analog circuits using an all-CMOS voltage reference circuit in 40-nm standard process. The optimization algorithm’s efficiency is further tested using classical functions, showing that it outperforms other competing algorithms. The objective of the optimization is to minimize the variation and power usage, while satisfying all the design limitations. Through the interchange of scripts for information exchange between two environments, the SCA-mGWO algorithm is implemented and simultaneously simulated. The results show the robustness of analog circuit design generated using the SCAmGWO algorithm, over various corners, resulting in a percentage variation of 0.85%. Monte Carlo analysis is also performed on the presented analog circuit for output voltage and percentage variation resulting in significantly low mean and standard deviation.
User Behaviour Profiling in Cloud using One Class SVM : A Review
Vijaya Lakshmi Paruchuri,S. Suresh Babu,P S V S Sridhar,Debnath Bhattacharyya,Hye-Jin Kim 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.9
Distributed computing guarantees to on a very basic level change the way we utilize PCs and get to and store our own specific and business data. With these new registering and correspondences models develop new data security challenges. Existing information security structures, for instance, encryption have fizzled in imagining information theft strikes, particularly those executed by an insider to the cloud supplier. We propose a substitute methodology for securing information in the cloud utilizing adversarial mimic improvement. We screen data access in the cloud and perceive unpredictable data access outlines. Right when unapproved access is suspected and after that confirmed using test questions, we dispatch a disinformation strike by giving back a considerable measure of fake information to the attacker. This secures against the misuse of the customer's real data. Trials coordinated in a neighbor-hood archive setting give confirmation this technique may give unprecedented levels of customer data security in a Cloud space.
Ciphertext-Policy Attribute-Based Encryption for Access Control of Data in Cloud
Vijaya Lakshmi Paruchuri,N Lakshmipathi Anantha,Vara Lakshmi Konagala,Debnath Bhattacharyya 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.8
In Distributed systems, the users with a certain set of attributes can only be able to access the data. At present this process can be done through a trusted server where we will store the data and there will be certain constraints on the access of the data. In this case there will be a possibility to compromise the data and so the confidentiality of the data is lost. An Attribute-Based Encryption (ABE) is an encryption scheme, where users with some attributes can decrypt ciphertexts associated with these attributes. Now this is our turn to develop a system with a more complex policy of access of the encrypted data and which can be called as Ciphertext Policy Attribute-based Encryption (CP-ABE). By using this method the information can't be traded off even through the trusted server where the information is put away. These methods are also secure against the collusion attack. In this method attributes are generally assigned in the form of access trees. The attributes are placed at the leaf nodes of this access tree. In older Attribute-based encryption strategies encrypted data is described by the attributes and policies are given to the user’s keys, while in our system users credentials are described by the attributes and there will be a policy where it tells us about who should access or decrypt the data. So, this type of access method is very much closer to the Role-based attribute-based encryption.
Failure Criteria of Cellular Steel Beams Under Ambient and Elevated Temperature
Vijaya K. Kotapati,Ashish P. Khatri 한국강구조학회 2022 International Journal of Steel Structures Vol.22 No.5
The fi re resistance time of a member plays a signifi cant role in structural fi re safety. The determination of FR time for cellular steel beam is quite complicated because of irregular geometry due to the presence of web openings. Hence, the present numerical study intends to provide the upper bound FR time of CBs with eff ect of governing load determined either from shear or fl exure criteria. The fi nite element models are fi rst validated against a set of beam tests and numerical data from literature by performing structural, thermal, and thermo-mechanical analyses of solid as well as CBs. The developed FE model is used to perform parametric studies to further investigate the structural response of CBs in a standard fi re. The various parameters considered in the present study are the size and spacing of the opening, various span to depth ratios of beams, and web slenderness. In all the numerical analyses, CBs are analyzed with a uniformly distributed load and having simply supported boundary conditions. The FR time of CB is evaluated based on the three failure criterias viz. shear, fl exure, and defl ection. The study shows that the web slenderness with size and spacing of the opening infl uences governing failure mechanism at elevated temperatures.
Vijaya Kumar Narne,Nachiketa Tiwari 한국언어재활사협회 2021 Clinical Archives of Communication Disorders Vol.6 No.2
Purpose: The Long-Term Average Speech Spectrum (LTASS) and Dynamic Range (DR) of speech strongly influence estimates of Speech Intelligibility Index (SII), gain and compression required for hearing aid fitting. It is also known that acoustic and linguistic characteristics of a language have a bearing on its LTASS and DR. Thus, there is a need to estimate LTASS and DR for Indian languages. The present work on three Indian languages fills this gap and contrasts LTASS and DR attributes of these languages against British English. Methods: For this purpose, LTASS and DR were measured for 21 one-third octave bands in the frequency range of 0.1 to 10 kHz for Hindi, Kannada, Indian English and British English. Results: Our work shows that the DR of Indian languages studied is 7–10 dB less relative to that of British English. We also report that LTASS levels for Indian languages are 7 dB lower relative to British English for frequencies above 1 kHz. Finally, we observed that LTASS and DR attributes across genders were more or less the same. Conclusions: Given the evidence presented in this work that LTASS and DR characteristics for Indian languages analyzed are markedly different than those for BE, there is a need to determine Indian language specific SII, as well as gain and compression parameters used in hearing aids.
????? ???(Vijaya Sati) 한국외국어대학교 인도연구소 2014 남아시아연구 Vol.20 No.1
Bhaw?n? Pras?d Mi?ra is not only a reputed modern Hindi poet but is also, in many ways a very different poet from his contemporaries. Bhaw?n? Pras?d Mi?ra was born on 29 March 1913 in a small village of present day Madhya Prade?, a state in Central India. He died on 20 February 1985 in his hometown in Madhya Prade?. He was active as a poet during 1930-1985. His poetry plays a vital role in understanding the freedom struggle of India and the views and values of Mah?tm? G?ndh?. He participated in Indian freedom movement and was jailed. Poetry for him is another way of expressing love and affection for his nation. He loved everything about his homeland - be it a small flower, a leaf, the ocean or the sky. This is expressed in his poetry and must be understood to fully comprehend his poems. Bhaw?n? Pras?d Mi?ra is a poet who grapples with the questions of his time. In his poetry there is a samv?d(dialogue) and s?hcharya(association) with life and deep self analysis. He leaves a message through his poetry.