A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Murali, G.
- Secure Key Distribution for Large and Dynamic Multicast Groups
Authors
1 Department of Computer Science and Engineering, IN
2 Department of Computer Science and Engineering, Jawaharlal Nehru Technological University- Pulivendula, AP, IN
Source
Wireless Communication, Vol 4, No 5 (2012), Pagination: 248-252Abstract
To provide security in multicasting groups which is one of most challenging issue in network security and these are the vulnerable attacks. In large multicasting groups the addition and deletion process are occur alternatively which makes to provide security. In the literature, the most of the proposed schemes are suffered from collision problems, scalability problems and 1-affectall problems. Group key should be changed and distributed efficiently and securely within the function, whenever function lists changes. The key-distribution (KD) problem is one of the main role in large groups. Efficient key distribution is one of the solutions in large multicast groups. In this paper, an efficient security to the group key is involved in large multicasting groups than the previously developed. A hierarchal tree is proposed here with each node as group member. The main advantages of this approach are less storage of keys for each member function, the sponsor node selection can be reduced during addition and deletion which takes less computations and the tree size is minimum than the previous methods.Keywords
Hierarchal Tree, Key Distribution, Large Multicast Groups, Security.- End to End Security for Mobile Application
Authors
1 Department of Computer Science and Engineering, IN
2 Department of Computer Science and Engineering, Jawaharlal Nehru Technological University- Pulivendula, AP, IN
Source
Wireless Communication, Vol 4, No 5 (2012), Pagination: 253-256Abstract
Today many transactions and information exchange are being carried out using mobile devices and mobile networks. This leads to transfer of real or perceived value in exchange for information, services, or goods. Security is an essential and important factor for various transactions Sensitive data from a mobile application needs to be delivered to the server carefully without being disclosing the data to other parties. In this paper, an end-to-end application-layer security solution for mobile devices using the Java 2 Platform Micro Edition (J2ME) is proposed. The proposed solution uses pure Java components to provide end-to-end client authentication and data confidentiality between wirelesses clients (mobile devices) and servers. Rijndael is used for encryption and SHA1 is used for calculating the message digest. This solution can be implemented with limited resources of a mobile device. There is no need of modifying the underlying protocols or wireless network infrastructure. . We develop a mobile application to check our solution. The mobile application connects to the server and exchanges data with the server. The data sent to the server is encrypted using a key and the server having the same key uses it for decrypting the data and getting the original data. In this paper, we provide a solution for mobile client authentication with the server and confidentiality of data. The mobile application can be run on a Java compatible phone with GPRS facility, so that it can connect to the server.Keywords
J2ME, Rijndael, SHA1, MIDP1.- Effect of Draw Bead Profile and Location in Sheet Metal Drawing Process-Finite Element Analysis and Experimental Validation
Authors
1 School of Mechanical Engg., S R M University, Chennai, IN
2 D.M. I. College of Engg., Chennai, IN
3 Dept. of Prod. Technology, MIT, Anna University, Chennai, IN
Source
Manufacturing Technology Today, Vol 9, No 6 (2010), Pagination: 18-26Abstract
Drawbeads are often applied in the deep drawing process to improve control of the material flow during the forming operation. Drawbeads restrain the sheet from flowing freely into die cavity. This paper deals with analysis of effect of draw bead geometry in sheet metal drawing process. Finite element analysis of drawing of circular blanks into axi-symmetric hemispherical cup is done. Circular and rectangular drawbeads are introduced into the finite element models and their influence in distribution of strain and thickness are investigated. DYNAFORM and LS-DYNA, a commercially available explicit FEA code were used to model and analyze the forming process respectively. These outcomes are compared with experimental results. The results show good agreement between numerical method and experiment. On comparison, rectangular drawbeads restrain the material more than circular drawbead due to their geometry.Keywords
Sheet Metal Forming, Drawbead, LS-DYNA, Plastic Strain.- An Experimental Investigation on the Single Point Incremental Forming of Aluminium Alloy
Authors
1 Department of Mechanical Engineering, SRM University, Chennai, Tamilnadu, IN
Source
International Journal of Engineering Research, Vol 3, No SP 1 (2014), Pagination: 155-159Abstract
Incremental Sheet Forming (ISF) is an innovative forming approach for sheet materials. This process has been promising a flexible, and inexpensive way to form sheet products. The present work be going to be focuses on the attention of single point incremental forming (SPIF) process of a Aluminium alloy. Which have important industrial applications with a high ratio of weight/strength. SPIF test be going to carry out with different tool dimensions, while simultaneously changing the feed rate. In this work the thickness reduction, formability, strain distribution over the sheet surface will studied.
In addition, To know the forming condition. Finite element analysis of Incremental sheet metal forming simulation will have been carried at by using LS-DYNA software finally comparison work is going to do for both experimental and simulation work.