scispace - formally typeset
Search or ask a question

Showing papers by "Sir Padampat Singhania University published in 2013"


Journal ArticleDOI
TL;DR: An encryption algorithm for gray images using a secret key of 128-bits size using a key dependent dynamic blocks to validate the high security features and effectiveness of proposed system.

111 citations


Journal Article
TL;DR: In this article, the authors made an attempt to decipher the embedded attitude of the customers towards online advertising on the social community sites and further investigated the instrumentality of key discriminating attributes configuring attitude on the premise of customers' proclivity for online advertising.
Abstract: Over the past few years, social networking Iuls became papular and accerunt for a major chunk of the time internet users spend online. With the increase in online users, advertisers are tempted to explore & exploit social networking sites as a new advertising delivery vehicle. Moreover, advertisers increasingly recognized the potency of social community in terms of interactivity which includes shopping experiences, personalized selections, wide information search and greater convenience. This study makes an attempt to decipher the embedded attitude of the customers towards online advertising on the social community sites. It further investigates the instrumentality of key discriminating attributes configuring attitude on the premise of customers' proclivity for online advertising. Nevertheless, the study renders scope to test the supremacy of online advertising over other conventional media for advertising. The study advanced in the paper weruld provide enough insights to the marketers, advertisers, and strategy makers at the top of the organizational pyramid for framing strategy to maximize the fiwourable impact of advertising on a spectrum of mass media.

49 citations


Journal ArticleDOI
TL;DR: In this article, the authors discussed the law of variation of scale factor, which yields a time-dependent deceleration parameter (DP) representing a new class of models that generate a transition of universe from the early decelerated phase to the recent accelerating phase.
Abstract: In this paper we discuss the law of variation of scale factor $a = (t^{k}e^{t})^{\frac{1}{n}}$ which yields a time-dependent deceleration parameter (DP) representing a new class of models that generate a transition of universe from the early decelerated phase to the recent accelerating phase. Exact solutions of Einstein’s modified field equations in Bianchi type-V space-time with perfect fluid and heat conduction are obtained within the framework of Saez-Ballester scalar-tensor theory of gravitation and the model is found to be in good agreement with recent observations. We find, for n=3,k=1, the present value of DP in derived model as q 0=−0.67 which is very near to the observed value of DP at present epoch. We find that the time-dependent DP is sensible for the present day Universe and give an earmark description of evolution of universe. Some physical and geometric properties of the models are also discussed.

16 citations


Posted Content
TL;DR: In this paper, the authors explored the relationship between consumer innovativeness on mobile technology adoption and found that consumers' reluctance to adopt innovations vis-a-vis mobile technology is mainly attributed to higher tendency to comply with the constructs which include user interface clarity, usage friendliness, social influence, support of product and service providers, and learning predispositions.
Abstract: In the present competitive scenario, marketing practitioners often attempt to learn about customer innovators — those who are open to new ideas and to be among the first to try new products, services or practices. This study explores the relationship between consumer innovativeness on the mobile technology adoption. The results of the study reveal consumers’ reluctance to adopt innovations vis-a-vis mobile technology is chiefly attributed to higher tendency to comply with the constructs which include user interface clarity, usage friendliness, social influence, support of product and service providers, and learning predispositions. However, social influence has a moderate influence on new mobile technology adoption for the consumers who take decisions independently. The study is deemed significant as it would provide enough insights to the marketers to navigate the forces that lead to buying inertia towards newness.

14 citations


Proceedings ArticleDOI
13 May 2013
TL;DR: An ant based resource discovery and mobility aware trust management for mobile grid systems and it is shown that the proposed approach is efficient and offers more security.
Abstract: In Mobile Grid systems, the automatic service deployment initially requires the node discovery. Most of the existing security mechanisms on Grid systems rarely consider the mobility of the nodes which may affect the applied security mechanisms leading to insufficient and inaccurate security. In order to overcome these issues, in this paper, we propose an ant based resource discovery and mobility aware trust management for mobile grid systems. Initially the super-grid nodes are selected in the network using ant colony optimization based on the parameters such as distance, CPU speed, available bandwidth and residual battery power. These selected nodes are utilized in the resource discovery mechanism. In order to maintain strong security with mobility management system, a proficient trust reputation collection method has been adopted. By simulation results, we show that the proposed approach is efficient and offers more security.

13 citations



Proceedings Article
02 Feb 2013
TL;DR: Experimental results prove that the scheme is also robust to wide range of attacks and reduces the size of the codebook and probability of false positives when compared to the existing works.
Abstract: In this paper, a watermark hiding scheme based on Visual Cryptography and Discrete Wavelet Transform is proposed. The proposed method modifies the codebook of related works, and utilizes statistical average to offer better security. The proposed method also reduces the size of the codebook and probability of false positives when compared to the existing works. Experimental results prove that the scheme is also robust to wide range of attacks

Proceedings ArticleDOI
15 Dec 2013
TL;DR: This paper addresses the need for a centralized monitoring system in cloud computing in the cost and performance angles with a tight comparison of various implementation and architectural possibilities.
Abstract: So far, monitoring in cloud computing mostly tends to focus only on QoS and Service Level Agreements. However, if we tend to monitor user activities on clouds we have to look at a centralized approach. Having a centralized monitoring system in cloud computing is becoming more and more necessary, it is worthwhile to address this kind of monitoring in the cost and performance angles also. The performance and cost studies will not be appropriate without a tight comparison of various implementation and architectural possibilities. A Simulation is made so as to reveal the best options based on cost and performance.