Fast growing Internet and network applications have increased the fast the need to protect such a... more Fast growing Internet and network applications have increased the fast the need to protect such applications. Encryption algorithms play the main role in information security systems. On the other hand, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of five most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2 and RC6. A comparative study has been conducted for these encryption algorithms for different sizes of data blocks, battery power consumption, different key size and finally encryption/decryption speed.
In this paper a hybrid approach for image encryption is proposed by combining AES, a standard cry... more In this paper a hybrid approach for image encryption is proposed by combining AES, a standard cryptography algorithm, along with splitting and block permutation. A standard image (Lena) is taken as an input and to enhance the security, the image is divided into 4*4 matrix followed by block permutation before encryption of the image with AES. Comparison of various parameters with and without block permutation confirms the superiority of the proposed method in terms of better results after using splitting and permutation functions.
This article investigates a mechanism to tolerate omission failure in moving sequencer based atom... more This article investigates a mechanism to tolerate omission failure in moving sequencer based atomic broadcast at distributed systems. Various mechanisms are already given for moving sequencer based atomic broadcast like RMP [1], DTP [2], Pin Wheel [3] and mechanism proposed by [4]. But none of these mechanisms are efficient to tolerate different failure. Scholarly observation is that, these algorithms can tolerate only crash failure but not capable to tolerate omission or byzantine failure. This work is an extension of [4]. This work proposes a mechanism to tolerate omission failure in moving sequencer based atomic broadcast. Hence this work is a refined version of [4]. This work relies on unicast broadcast hence it will introduce a very less number of messages in comparison to previous mechanisms [5]. B [6] has been used as formal technique for development of proposed model. B uses set theory as a modeling notation, refinements to represent system at different abstraction level. Pr...
Business analytics has proven itself as a high business performance tool that can be applied to m... more Business analytics has proven itself as a high business performance tool that can be applied to multiple divisions of an enterprise and creates a fact based culture across the organisation. The use of Quantitative analysis, predictive models and statistical tools helps the business managers in gaining a different view of the data, and deriving maximum value out of it, which in turn contributes towards improved decision making and problem solving in an organisation. However, it has been observed that despite the several benefits that are anticipated with Business Analytics adoption, very few have achieved proficiency in its implementations and organizations are facing adoption barriers, most of them being management and culture related rather than being data and technology related. The present study was undertaken to bridge this gap between the highly proclaimed business benefits of Analytics and the problems faced by organizations in successfully implementing this tool. It presents ...
International Journal of Advance Research and Innovative Ideas in Education, 2016
Ad- hoc network is defined as the network in which the users communicate with each other by formi... more Ad- hoc network is defined as the network in which the users communicate with each other by forming a network on-fly without any centralized node or base station. Here each node act as a host as well as a router and allow packet forwarding to neighbours. Ad hoc networks are highly dynamic in nature. They have highly deployable and self-configurable topologies. Due to self- organizing, self-configuring capability MANET is used in different areas like emergency search and rescue, military, etc. Various routing protocols are defined for these Mobile Ad-hoc networks. One of main problem in Ad hoc network is energy issue in mobile nodes. As the Ad-hoc network node operates on battery power the routing algorithms must take account the node battery status while selecting the routing path between source and destination. The reason of packet drop in MANETs is link break which could be a result of mobility or node failure (due to battery exhaust or some hardware failure). Each drop packet is ...
Most of the routing protocols focus on obtaining a workable route without considering network tra... more Most of the routing protocols focus on obtaining a workable route without considering network traffic condition for a mobile ad-hoc network (MANETs). Therefore, the quality of service (QoS) is not easily achieved by the real time or multimedia applications. Providing quality-of-service (QoS) in wireless ad-hoc networks is an intrinsically complex task due to node mobility, distributed channel access, and fading radio signal effects. To find a QoS constrained route from source to destination, it should be able to effectively determine the available resources throughout the route. The routing protocol is the most integral part of any type of QoS provisioning. In this paper, modification has been proposed in the existing MANET protocols to get the information about total path bandwidth for delay analysis. It uses modified technique for bandwidth estimation and for route maintenance. Resultof simulationshows that there is much improvement in Packet delivery ratio, overheads, delaysignif...
Advances in Electronic Government, Digital Divide, and Regional Development
On 1st July 2015, Government of India launched a Digital India campaign which is a flagship progr... more On 1st July 2015, Government of India launched a Digital India campaign which is a flagship program of the government with an objective to transform India into a digitally empowered society. One key initiative of the program is digital locker service which aims at sharing and storing of electronic documents at one place in a digital locker. A study was undertaken to assess the awareness level of citizens regarding this service, to identify the problems and challenges associated with its implementation, to identify factors that affect adoption of such initiatives, and to make recommendations to various stake holders. The data analysis revealed that main concerns associated with the service include security, confidentiality, and ease of use. The survey data also revealed that the behavioral intention regarding adoption of this service is mainly determined by the user innovativeness and ease of use, usefulness, and compatibility do not seem to have an impact on the behavioral intention...
ABSTRACT Marketers world-wide are using World Wide Web as a vehicle for carrying out their market... more ABSTRACT Marketers world-wide are using World Wide Web as a vehicle for carrying out their marketing activities. The fast, efficient and cost effective nature of Internet is attracting more and more companies to exploit tremendous opportunities offered by this medium which are not present in the conventional methods of marketing. Hence there arises a need to redefine the 4P’s of Marketing in the context of the digital era, where the traditional marketing strategies shall not work. This paper aims at highlighting the paradigm shift in marketing concepts brought about by the advent of e-commerce and the associated technologies.
Internet shopping behavior has remained an area of interest for researchers and has been studied ... more Internet shopping behavior has remained an area of interest for researchers and has been studied under different contexts. The research in this area covers diverse dimensions of Internet shopping and its adoption. It has also been emphasized repeatedly by researchers that there is a lack of consistent framework for Internet shopping behavior. In order to fill this research gap and to put together the vast literature on Internet shopping, this study was undertaken with an objective to organize the researches conducted in this field with respect to the underlying objectives of the particular study. It was found that most of the research in the field of Internet shopping is aimed at (1) Applying constructs from Technology Acceptance Model(TAM) to Internet shopping behavior, (2) Defining Online consumer behavior and its determinants, (3) Studying overall web experience and its role in shaping Internet buying behavior, (4) Understanding the role of Trust, (5) Brand, (6) Security and web ...
The underlying idea behind social media is collaboration and communication, irrespective of the c... more The underlying idea behind social media is collaboration and communication, irrespective of the context in which it is being discussed. Companies have been using social media, as an effective tool for external activities such as branding, marketing and recruiting for quite some time; however, recently there has been a surge in adoption of social media as a tool to enhance internal organizational collaboration, communication, knowledge sharing and innovation amongst the employees. There are both companies’ internal and public social media platforms that are being made available to the employees. This study presents a detailed analysis of success stories of 10 companies from different sectors who have capitalized on the social media boom. Considering the various dimensions of empowering employees with the powerful tool of social media, as identified through the study, we suggest a framework for internal social media strategy for an organization.
Internet shopping in a developing nation such as India is still a nascent activity, hence analysi... more Internet shopping in a developing nation such as India is still a nascent activity, hence analysing the usage pattern of Internet is extremely important to understand the present status of Internet usage as a buying medium; particularly in state like Rajasthan, where this phenomenon has yet to gain momentum. It can be emphasised that the Internet usage pattern holds great significance for e-marketers in order to plan online interactions with potential customers. The place of access of Internet or the number of hours spent on Internet can determine the likelihood of an individual for online transaction. It also helps the marketers to devise a marketing strategy that suits the requirements of Internet users who are the ultimate prospects as online buyers. The online shopping process involves several activities ranging from information search to making payments. However in case of Internet shopping the nature of all these activities differs from offline buying, since availability of in...
Fast growing Internet and network applications have increased the fast the need to protect such a... more Fast growing Internet and network applications have increased the fast the need to protect such applications. Encryption algorithms play the main role in information security systems. On the other hand, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of five most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2 and RC6. A comparative study has been conducted for these encryption algorithms for different sizes of data blocks, battery power consumption, different key size and finally encryption/decryption speed.
In this paper a hybrid approach for image encryption is proposed by combining AES, a standard cry... more In this paper a hybrid approach for image encryption is proposed by combining AES, a standard cryptography algorithm, along with splitting and block permutation. A standard image (Lena) is taken as an input and to enhance the security, the image is divided into 4*4 matrix followed by block permutation before encryption of the image with AES. Comparison of various parameters with and without block permutation confirms the superiority of the proposed method in terms of better results after using splitting and permutation functions.
This article investigates a mechanism to tolerate omission failure in moving sequencer based atom... more This article investigates a mechanism to tolerate omission failure in moving sequencer based atomic broadcast at distributed systems. Various mechanisms are already given for moving sequencer based atomic broadcast like RMP [1], DTP [2], Pin Wheel [3] and mechanism proposed by [4]. But none of these mechanisms are efficient to tolerate different failure. Scholarly observation is that, these algorithms can tolerate only crash failure but not capable to tolerate omission or byzantine failure. This work is an extension of [4]. This work proposes a mechanism to tolerate omission failure in moving sequencer based atomic broadcast. Hence this work is a refined version of [4]. This work relies on unicast broadcast hence it will introduce a very less number of messages in comparison to previous mechanisms [5]. B [6] has been used as formal technique for development of proposed model. B uses set theory as a modeling notation, refinements to represent system at different abstraction level. Pr...
Business analytics has proven itself as a high business performance tool that can be applied to m... more Business analytics has proven itself as a high business performance tool that can be applied to multiple divisions of an enterprise and creates a fact based culture across the organisation. The use of Quantitative analysis, predictive models and statistical tools helps the business managers in gaining a different view of the data, and deriving maximum value out of it, which in turn contributes towards improved decision making and problem solving in an organisation. However, it has been observed that despite the several benefits that are anticipated with Business Analytics adoption, very few have achieved proficiency in its implementations and organizations are facing adoption barriers, most of them being management and culture related rather than being data and technology related. The present study was undertaken to bridge this gap between the highly proclaimed business benefits of Analytics and the problems faced by organizations in successfully implementing this tool. It presents ...
International Journal of Advance Research and Innovative Ideas in Education, 2016
Ad- hoc network is defined as the network in which the users communicate with each other by formi... more Ad- hoc network is defined as the network in which the users communicate with each other by forming a network on-fly without any centralized node or base station. Here each node act as a host as well as a router and allow packet forwarding to neighbours. Ad hoc networks are highly dynamic in nature. They have highly deployable and self-configurable topologies. Due to self- organizing, self-configuring capability MANET is used in different areas like emergency search and rescue, military, etc. Various routing protocols are defined for these Mobile Ad-hoc networks. One of main problem in Ad hoc network is energy issue in mobile nodes. As the Ad-hoc network node operates on battery power the routing algorithms must take account the node battery status while selecting the routing path between source and destination. The reason of packet drop in MANETs is link break which could be a result of mobility or node failure (due to battery exhaust or some hardware failure). Each drop packet is ...
Most of the routing protocols focus on obtaining a workable route without considering network tra... more Most of the routing protocols focus on obtaining a workable route without considering network traffic condition for a mobile ad-hoc network (MANETs). Therefore, the quality of service (QoS) is not easily achieved by the real time or multimedia applications. Providing quality-of-service (QoS) in wireless ad-hoc networks is an intrinsically complex task due to node mobility, distributed channel access, and fading radio signal effects. To find a QoS constrained route from source to destination, it should be able to effectively determine the available resources throughout the route. The routing protocol is the most integral part of any type of QoS provisioning. In this paper, modification has been proposed in the existing MANET protocols to get the information about total path bandwidth for delay analysis. It uses modified technique for bandwidth estimation and for route maintenance. Resultof simulationshows that there is much improvement in Packet delivery ratio, overheads, delaysignif...
Advances in Electronic Government, Digital Divide, and Regional Development
On 1st July 2015, Government of India launched a Digital India campaign which is a flagship progr... more On 1st July 2015, Government of India launched a Digital India campaign which is a flagship program of the government with an objective to transform India into a digitally empowered society. One key initiative of the program is digital locker service which aims at sharing and storing of electronic documents at one place in a digital locker. A study was undertaken to assess the awareness level of citizens regarding this service, to identify the problems and challenges associated with its implementation, to identify factors that affect adoption of such initiatives, and to make recommendations to various stake holders. The data analysis revealed that main concerns associated with the service include security, confidentiality, and ease of use. The survey data also revealed that the behavioral intention regarding adoption of this service is mainly determined by the user innovativeness and ease of use, usefulness, and compatibility do not seem to have an impact on the behavioral intention...
ABSTRACT Marketers world-wide are using World Wide Web as a vehicle for carrying out their market... more ABSTRACT Marketers world-wide are using World Wide Web as a vehicle for carrying out their marketing activities. The fast, efficient and cost effective nature of Internet is attracting more and more companies to exploit tremendous opportunities offered by this medium which are not present in the conventional methods of marketing. Hence there arises a need to redefine the 4P’s of Marketing in the context of the digital era, where the traditional marketing strategies shall not work. This paper aims at highlighting the paradigm shift in marketing concepts brought about by the advent of e-commerce and the associated technologies.
Internet shopping behavior has remained an area of interest for researchers and has been studied ... more Internet shopping behavior has remained an area of interest for researchers and has been studied under different contexts. The research in this area covers diverse dimensions of Internet shopping and its adoption. It has also been emphasized repeatedly by researchers that there is a lack of consistent framework for Internet shopping behavior. In order to fill this research gap and to put together the vast literature on Internet shopping, this study was undertaken with an objective to organize the researches conducted in this field with respect to the underlying objectives of the particular study. It was found that most of the research in the field of Internet shopping is aimed at (1) Applying constructs from Technology Acceptance Model(TAM) to Internet shopping behavior, (2) Defining Online consumer behavior and its determinants, (3) Studying overall web experience and its role in shaping Internet buying behavior, (4) Understanding the role of Trust, (5) Brand, (6) Security and web ...
The underlying idea behind social media is collaboration and communication, irrespective of the c... more The underlying idea behind social media is collaboration and communication, irrespective of the context in which it is being discussed. Companies have been using social media, as an effective tool for external activities such as branding, marketing and recruiting for quite some time; however, recently there has been a surge in adoption of social media as a tool to enhance internal organizational collaboration, communication, knowledge sharing and innovation amongst the employees. There are both companies’ internal and public social media platforms that are being made available to the employees. This study presents a detailed analysis of success stories of 10 companies from different sectors who have capitalized on the social media boom. Considering the various dimensions of empowering employees with the powerful tool of social media, as identified through the study, we suggest a framework for internal social media strategy for an organization.
Internet shopping in a developing nation such as India is still a nascent activity, hence analysi... more Internet shopping in a developing nation such as India is still a nascent activity, hence analysing the usage pattern of Internet is extremely important to understand the present status of Internet usage as a buying medium; particularly in state like Rajasthan, where this phenomenon has yet to gain momentum. It can be emphasised that the Internet usage pattern holds great significance for e-marketers in order to plan online interactions with potential customers. The place of access of Internet or the number of hours spent on Internet can determine the likelihood of an individual for online transaction. It also helps the marketers to devise a marketing strategy that suits the requirements of Internet users who are the ultimate prospects as online buyers. The online shopping process involves several activities ranging from information search to making payments. However in case of Internet shopping the nature of all these activities differs from offline buying, since availability of in...
Uploads
Papers by avinash panwar