scispace - formally typeset
Search or ask a question
Institution

Christ University

EducationBengaluru, India
About: Christ University is a education organization based out in Bengaluru, India. It is known for research contribution in the topics: Computer science & Convection. The organization has 2267 authors who have published 2715 publications receiving 14575 citations. The organization is also known as: Christ College & Christ University.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors considered the three-dimensional flow and heat transport of viscous dissipating Cu-H2O nanoliquid over an elongated plate in a rotating frame of reference.
Abstract: In this article, the three-dimensional (3D) flow and heat transport of viscous dissipating Cu-H2O nanoliquid over an elongated plate in a rotating frame of reference is studied by considering the modified Buongiorno model. The mechanisms of haphazard motion and thermo-migration of nanoparticles along with effective nanoliquid properties are comprised in the modified Buongiorno model (MBM). The Rosseland radiative heat flux and prescribed heat flux at the boundary are accounted. The governing nonlinear problem subjected to Prandtl’s boundary layer approximation is solved numerically. The consequence of dimensionless parameters on the velocities, temperature, and nanoparticles volume fraction profiles is analyzed via graphical representations. The temperature of the base liquid is improved significantly owing to the existence of copper nanoparticles in it. The phenomenon of rotation improves the structure of the thermal boundary layer, while, the momentum layer thickness gets reduced. The thermal layer structure gets enhanced due to the Brownian movement and thermo-migration of nanoparticles. Moreover, it is shown that temperature enhances owing to the presence of thermal radiation. In addition, it is revealed that the haphazard motion of nanoparticles decays the nanoparticle volume fraction layer thickness. Also, the skin friction coefficients found to have a similar trend for larger values of rotation parameter. Furthermore, the results of the single-phase nanoliquid model are limiting the case of this study.

7 citations

01 Jan 2011
TL;DR: In this paper, the authors conducted a study by collecting primary data from 389 respondents spread over 38 Information Technology companies in India and found that organizational climate influences to a great extent the performance of the employees because it has a major impact on motivation and job satisfaction.
Abstract: The world has recognized India’s competitive advantage in software services and today India is a magnet for software clients owing to the quality of its skilled software manpower. Organizational climate has been defined as a perception of the psychologically important aspects of the work environment and is recognized as a potential influence on employees’ workplace behavior and job satisfaction (Ashforth, 1985). Climate consists of a set of characteristics that describe an organization, distinguish it from other organizations, are relatively enduring over time and influence the behavior of people in it. Organizational climate influences to a great extent the performance of the employees because it has a major impact on motivation and job satisfaction of individual employees. So the managements of Information Technology companies should strive to create a congenial organizational climate in their organizations for retaining the employees and maintaining high productivity. The study is conducted by collecting primary data from 389 respondents spread over 38 Information Technology companies in India. The study suggests the methods for improving the organizational climate in Information Technology companies.

7 citations

Proceedings ArticleDOI
05 Mar 2014
TL;DR: This paper focuses on implementation of an asymmetric secure multi-party computation protocol using anonymization and public-key encryption where all parties have access to trusted third party (TTP) and ensures following: confidentiality, security, and privacy.
Abstract: Privacy preservation is very essential in various real life applications such as medical science and financial analysis. This paper focuses on implementation of an asymmetric secure multi-party computation protocol using anonymization and public-key encryption where all parties have access to trusted third party (TTP) who (1) doesn't add any contribution to computation (2) doesn't know who is the owner of the input received (3) has large number of resources (4) decryption key is known to trusted third party (TTP) to get the actual input for computation of final result. In this environment, concern is to design a protocol which deploys TTP for computation. It is proposed that the protocol is very proficient (in terms of secure computation and individual privacy) for the parties than the other available protocols. The solution incorporates protocol using asymmetric encryption scheme where any party can encrypt a message with the public key but decryption can be done by only the possessor of the decryption key (private key). As the protocol works on asymmetric encryption and packetization it ensures following: (1) Confidentiality (Anonymity) (2) Security (3) Privacy (Data).

7 citations

Journal ArticleDOI
N. Jayapandian1
TL;DR: The proposed method is to ensure best encryption method to reducing the average encode and decode time in multimedia data to ensure the quality of service is improved by using proposed scheduling technique.
Abstract: The cloud computing is interlinked with recent and out-dated technology. The cloud data storage industry is earning billion and millions of money through this technology. The cloud remote server storage is on-demand technology. The cloud users are expecting higher quality in minimal cost. The quality of service is playing a vital role in any latest technology. The cloud user always depends on thirty party service providers. This service provider is facing higher competition. The customer is choosing a service based on two parameters one is security and another one is cost. The reason behind this is all our personal data is stored on some third party server. The customer is expecting higher security level. The service provider is choosing many techniques for data security, best one is encryption mechanism. This encryption method is having many algorithms. Then again one problem is raised, that is which algorithm is best for encryption. The prediction of algorithm is one of major task. Each and every algorithm is having unique advantage. The algorithm performance is varying depends on file type. The proposed method of this article is to solve this encryption algorithm selection problem by using tabu search concept. The proposed method is to ensure best encryption method to reducing the average encode and decode time in multimedia data. The local search scheduling concept is to schedule the encryption algorithm and store that data in local memory table. The quality of service is improved by using proposed scheduling technique.

7 citations


Authors

Showing all 2404 results

Network Information
Related Institutions (5)
Amity University
12.7K papers, 86K citations

80% related

Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

79% related

VIT University
24.4K papers, 261.8K citations

78% related

SRM University
11.7K papers, 103.7K citations

78% related

Punjabi University
5.9K papers, 73.1K citations

77% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202371
2022172
2021795
2020479
2019360
2018239