Sheena, Mathew; Poulose Jacob,K(International Journal of Computer and Information Engineering, 2008)
[+]
[-]
Abstract:
Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Poulose Jacob,K; Sheena, Mathew(International Journal of Computer, Information & Systems Science & Engineering, September 1, 2008)
[+]
[-]
Abstract:
Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Description:
World Academy of Science, Engineering and Technology
Vol:2 2008-03-28
Santhosh Kumar, G; Surendran, Cherukodan; Humayoon Kabir, S(Emerald Group Publishing Limited, July 31, 2011)
[+]
[-]
Abstract:
The purpose of this paper is to describe the design and development of a digital library at
Cochin University of Science and Technology (CUSAT), India, using DSpace open source software.
The study covers the structure, contents and usage of CUSAT digital library.
Design/methodology/approach – This paper examines the possibilities of applying open source in
libraries. An evaluative approach is carried out to explore the features of the CUSAT digital library.
The Google Analytics service is employed to measure the amount of use of digital library by users
across the world.
Findings – CUSAT has successfully applied DSpace open source software for building a digital
library. The digital library has had visits from 78 countries, with the major share from India. The
distribution of documents in the digital library is uneven. Past exam question papers share the major
part of the collection. The number of research papers, articles and rare documents is less.
Originality/value – The study is the first of its type that tries to understand digital library design
and development using DSpace open source software in a university environment with a focus on the
analysis of distribution of items and measuring the value by usage statistics employing the Google
Analytics service. The digital library model can be useful for designing similar systems
Description:
The Electronic Library
Vol. 31 No. 2, 2013
pp. 217-225
Poulose Jacob,K; Preetha Theresa, Joy(IEEE, February 16, 2014)
[+]
[-]
Abstract:
Cache look up is an integral part of cooperative
caching in ad hoc networks. In this paper, we discuss a
cooperative caching architecture with a distributed cache look up
protocol which relies on a virtual backbone for locating and
accessing data within a cooperate cache. Our proposal consists of
two phases: (i) formation of a virtual backbone and (ii) the cache
look up phase. The nodes in a Connected Dominating Set (CDS)
form the virtual backbone. The cache look up protocol makes use
of the nodes in the virtual backbone for effective data
dissemination and discovery. The idea in this scheme is to reduce
the number of nodes involved in cache look up process, by
constructing a CDS that contains a small number of nodes, still
having full coverage of the network. We evaluated the effect of
various parameter settings on the performance metrics such as
message overhead, cache hit ratio and average query delay.
Compared to the previous schemes the proposed scheme not only
reduces message overhead, but also improves the cache hit ratio
and reduces the average delay
Description:
Advanced Communication Technology (ICACT), 2014 16th International Conference on
Santhosh Kumar, G(Cochin University of Science And Technology, June 23, 2010)
[+]
[-]
Abstract:
Page 1. Web 2.0 Technologies for Education G. Santhosh Kumar Dept. Of Computer Science
Cochin University Page 2. What is Internet? CUSAT is linked to this Web through 10 Mbps leased
line connectivity Page 3. Size of the Web? GYWA = Sorted on Google, Yahoo!, Windows Live
Search (Msn Search) and Ask YGWA = Sorted on Yahoo!, Google, Windows Live Search (Msn
Search) and Ask www.worldwidewebsize.com Page 4. The Machine is Us/ing Us ■
http://in.youtube.com/watch?v=NLlGopyXT_g&feature=channel Page 5. ..
Santhosh Kumar, G(Cochin University of Science And Technology, June 23, 2010)
[+]
[-]
Abstract:
Page 1. Webhosting and Networking G. Santhosh Kumar, Dept. of Computer Science Cochin
University of Science and Technology Page 2. Agenda What is a Network? Elements of a Network
Hardware Software Ethernet Technology World Wide Web Setting up a Network Conclusion Page
3. What is a Network? An interconnected system of things or people Purpose of a Network?
Resource Sharing Communication LANs have become the most popular form of Computer
Networks Page 4. Principle of Locality of Reference Temporal Locality of Reference ...
Poulose Jacob,K; Santhosh, Simon(International Journal of Modern Engineering Research, 2012)
[+]
[-]
Abstract:
The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production.This paper describes the application of wireless sensor network for crop monitoring in the paddy fields of kuttand, a region of Kerala, the southern state of India.
Description:
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug 2012 pp-2017-2020
Santhosh Kumar, G(Cochin University of Science And Technology, May 11, 2011)
[+]
[-]
Abstract:
Page 1. The World of Sensor Networks G Santhosh Kumar, CUSAT Kumar, CUSAT Page
2. Are you as quick as Messi or Bale? WSN adidas innovation (source: http://www.wsnblog.
com/) Page 3. Fukushima nuclear disaster • Fukushima Rescue Workers Facing Depression
and Death • How to measure the levels of radiation of the affected zones without compromising
the life of the workers? • Radiation measurements in real-time Page 4. Fukushima nuclear
disaster Page 5. Fukushima nuclear disaster Page 6. Goals .