A. Chandra Sekhar
Gandhi Institute of Technology and Management
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by A. Chandra Sekhar.
granular computing | 2007
A. Chandra Sekhar; K.R. Sudha; P.V.G.D. Prasad Reddy
The coding theory is an application of algebra that has become increasingly important over the decades. There are some different works that have been devoted to the problems of cryptography/cryptology. Cryptography is the study of sending and receiving secret messages. With the widespread use of information technologies and the rise of digital computer networks in many areas of the world, securing the exchange of information has become a crucial task. Currently, very active research is being done with electronic or communication applications. In the present paper an innovative technique for data encryption is proposed based on the random sequence generation using the recurrence matrices and a quadruple vector. The new algorithm provides data encryption at two levels and hence security against crypto analysis is achieved at relatively low computational overhead.
advances in recent technologies in communication and computing | 2009
A. Chandra Sekhar; Ch. Suneetha; G. NagaLakshmi; B.V. RaviKumar
In this paper a new technique of encryption for embedding secret information in the frequency domains of a cover audio signal is described. A novel method is presented for inaudibly hiding information in an audio signal. The method uses quadratic form as key matrix. The data is first encrypted using the key matrix. The secure data is further embedded in the audio signal in frequency domain using fast Fourier transforms and the results have been analyzed. This consists of data encryption at two levels and the cipher text so obtained becomes quite impossible to break or to interrupt.
International Journal of Mathematics Trends and Technology | 2016
A. Chandra Sekhar; D. Chaya Kumari; S. Ashok Kumar
Abstract Multiple encryptions is the process of encrypting the plain text more than once. If the plaintext is encrypted twice, then the process of the first encryption is usual encryption and the process of second-time encryption is referred as the superencryption. For multiple encryptions, same or different algorithms can be used. If the same key is used for multiple encryptions, for an attacker it is not that hard to recover the plain text. In this paper, a symmetric cryptosystem is proposed using Fibonacci numbers for the first level of encryption and Affine or Vigenere transformation is employed for super encryption.
International Journal of Computer Applications | 2012
B. Krishna Gandhi; A. Chandra Sekhar; S. Sri Jaya Lakshmi
Cryptography is the science of transmission and reception of secret messages. Recently electronic communication has become an essential part of every aspect of human life. Message encryption has become very essential to avoid the threat against possible attacks by hackers during transmission process of the message. Finite state machines (FSM), also known as finite state automation (FSA), at their simplest, are models of the behaviors of a system or a complex object, with a limited number of defined conditions or modes, where mode transitions change with circumstance. In the present paper, new cryptographic scheme is proposed using finite state machine and Pauli spins 1⁄2 matrices.
Archive | 2018
I. E. S. Naidu; K.R. Sudha; A. Chandra Sekhar
This paper presents a method to find the dynamic stability margin of power system using genetic algorithm. Power systems are subjected to wide range of operating conditions. Modern power systems are equipped with fast-acting protective devices for transient stability problems. Hence, power systems are operated above the transient stability limit. The dynamic behaviour of system can be evaluated using small signal stability analysis. The maximum loading to which the system can be subjected can be obtained by observing the eigenvalue variations of the system under different loading conditions. The loading for which system exhibits a pair of imaginary eigenvalues is the maximum loading limit. Beyond this limit, the system will become unstable. The loading for which the power system exhibits imaginary eigenvalues is evaluated by using genetic algorithm. The dynamic stability margin is evaluated for a 3-machine 9-bus system. The efficacy of the proposed method is tested for the power system including conventional power system stabilizers (CPSS).
Journal of Information and Optimization Sciences | 2015
A. Chandra Sekhar; V. Anusha; B. Ravi Kumar; S. Ashok Kumar
Abstract The process of encryption plays a vital role for secure communication of data streams through unsecured channels. The concepts in modern algebra are met with a major property that is the existence of inverse for each element in the domain of the chosen algebraic structures. This research article focuses on developing a multi encryption scheme with the existing concepts like basis of a vectors spaces and linear transformations.
International Journal of Mathematical Archive | 2011
G. Naga Lakshmi; B. Ravi Kumar; A. Chandra Sekhar
International Journal of Mathematical Archive | 2013
P. A. Jyotirmie; B. Ravi Kumar; A. Chandra Sekhar; S. Uma Devi
International journal of engineering research and technology | 2013
P. A. Jyotirmie; A. Chandra Sekhar; S. Uma Devi
International journal of engineering science and technology | 2016
A. Chandra Sekhar; Ch. Prgathi; S. Ashok Kumar