scispace - formally typeset
Search or ask a question
Institution

KCG College of Technology

About: KCG College of Technology is a based out in . It is known for research contribution in the topics: Computer science & The Internet. The organization has 427 authors who have published 381 publications receiving 2193 citations.


Papers
More filters
Proceedings ArticleDOI
07 Oct 2021
TL;DR: In this article, the authors proposed a new variant of public-key encryption with keyword search named hierarchic public key cryptography with catchphrase search (HPE-CPS), which is a semi-conventional development using a public key tree and public encryption key with the data search.
Abstract: Distributed storage turns into the need for putting away and sharing information for big business clients. Scrambling before transferring information to the cloud is the best appreciation to defending organisation favored experiences, in any case, it forestalls the invaluable technique on plaintexts, like exploring the cloud data. Furthermore, staff in the partner endeavor has different layers structures and the following layer laborer have some of the the advantage to notice the bottom layer representatives' information to check whether these clients abuse the guideline while not holding the specialist's recollect of. private and public cryptography with watchword search could be a notable cryptanalytic crude fitting for secure distributed storage, that upholds catchphrase search while not coding public and private key cryptography Unfortunately, no current public and private key encrypted with data search topic upholds the watching execution while not approval from the To deal with this issue, we to will, in general, propose a variation of public-key encryption with keyword search named hierarchic Public Key cryptography with Catchphrase Search and supply a semi-conventional development using a public key tree and public encryption key with the data search.
Proceedings ArticleDOI
10 Sep 2015
TL;DR: In this article, a voltage copier circuit with high efficiency is proposed which minimizes the current stress and the pulsation current which are found in the classical circuits, and the circuit is simulated in MATLAB Simulink.
Abstract: Due to increasing demands, Multi-port dc-dc converters with high-voltage gain have been researched thoroughly. In recent years, these converters are widely used in automotive and photovoltaic systems. The Portable consumer products consist of different submodules and they require various voltage or/and current levels of supplies. The main objective of this paper is to simulate and implement a level shifting multiple input voltage copiers. The copier includes five different circuits. This converter can be used to copy and shift the input voltage. With lesser number of component counts, the cost is reduced considerably and the overall efficiency is increased. The double, half and inverting circuits are to be studied to implement this dc-dc converter while summation and subtraction have been presented before. Each level circuit includes only seven electronic components therefore ensure the simplicity and reliability of the voltage copier. The switching losses are to be reduced by resonant switching. In this paper, a voltage copier circuit with high efficiency is proposed which minimize the current stress and the pulsation current which are found in the classical circuits. Simulation results verify the performance of the voltage copier and the proposed method. The circuit is simulated in MATLAB Simulink.
Journal ArticleDOI
TL;DR: A novel remote steganography method utilizing the MIMO-OFDM structure, the sensitive information processing and also an Eigenbeam-space Division Multiplexing conveyance is proposed, and the essential execution of the system was assessed.
Abstract: Nowadays, students of electronics, electrical and computer science engineering are very much curious to know about the various security issues in wireless communication. Therefore, these st...
Book ChapterDOI
01 Jan 2017
TL;DR: In this article, the rotor profiles are built using the mathematical models and CFD analysis was conducted for various span angle designs using ANSYS CFX, which gives the fluid behavior inside the pump.
Abstract: A Gerotor pump is a positive displacement pump which will deliver a predetermined quantity of fluid in proportion to speed. The main advantages of this pump are: (i) having only two moving parts, (ii) high speed operation, (iii) constant flow rate. The outer and inner rotor profiles are formed by epicycloids and hypocycloids and by using the inter relationship between the outer rotor and inner rotor. The span angle design of tooth profile affect the motion and pumping performance of the Gerotor pump. The rotor profiles are built using the mathematical models and CFD Analysis was conducted for various span angle designs using ANSYS CFX. The overall fluid analysis gives the fluid behavior inside the pump. In this paper, the various flow characteristics are analyzed for different span angle designs of Gerotor pump.
09 Apr 2019
TL;DR: This paper focuses on designing a cloud storage system for robustness, confidentiality, and functionality, considered as a large scale distributed storage system that consists of many independent storage servers.
Abstract: Cloud computing is concept that treats the resources on the Internet as a unified entity, a cloud. Users just use services without being concerned about how computation is done and storage is managed. In this paper, we focus on designing a cloud storage system for robustness, confidentiality, and functionality. A cloud storage system is considered as a large scale distributed storage system that consists of many independent storage servers. Data robustness is a major requirement for storage systems. There have been many proposals of storing data over storage servers. One way to provide data robustness is to replicate a message such that each storage server stores a copy of the message. It is very robust because the message can be retrieved as long as one storage server survives. Another way is to encode a message of k symbols into a codeword of n symbols by erasure coding. To store a message, each of its codeword symbols is stored in a different storage server.

Authors

Showing all 427 results

NameH-indexPapersCitations
G. Nagarajan462757004
Raghavan Murugan331263838
B. Nagalingam22292255
G. V. Uma201081357
V. Edwin Geo18631023
R. Lakshmipathy1230442
Sellappan Palaniappan1129803
M. Kannan1028309
B. Vidhya1046399
S. Ramesh948503
R. Gladwin Pradeep921190
T. Ravi823153
K. Vijayaraja815133
C. Clement Raj78212
Maya Joby712309
Network Information
Related Institutions (5)
Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

79% related

National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

78% related

Thapar University
8.5K papers, 130.3K citations

77% related

National Institute of Technology, Karnataka
7K papers, 70.3K citations

77% related

National Institute of Technology, Tiruchirappalli
8K papers, 111.9K citations

77% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
2021102
202039
201957
201839
201741