21 research outputs found
Extraction of Multidimensional Data using Subset Selection Algorithm
Highlight Extraction includes recognizing a subset of the most helpful elements that produces perfect outcomes as the first whole arrangement of components. An element determination calculation might be assessed from both the productivity and adequacy perspectives. While the productivity concerns the time required to discover a subset of elements, the adequacy is identified with the nature of the subset of components. In light of these criteria, a quick bunching based element determination calculation, FAST, is proposed and tentatively assessed in this paper. The FAST calculation works in two stages. In the initial step, highlights are separated into bunches by utilizing chart theoretic grouping strategies. In the second step, the most illustrative component that is unequivocally identified with target classes is chosen from each bunch to shape a subset of elements. Elements in various groups are generally free; the bunching based system of FAST has a high likelihood of creating a subset of helpful and autonomous elements. To guarantee the proficiency of FAST, we receive the productive least crossing tree grouping technique.
 
Tight Short-Lived Signatures
A Time-lock puzzle (TLP) sends information into the future: a predetermined
number of sequential computations must occur (i.e., a predetermined amount of
time must pass) to retrieve the information, regardless of parallelization.
Buoyed by the excitement around secure decentralized applications and
cryptocurrencies, the last decade has witnessed numerous constructions of TLP
variants and related applications (e.g., cost-efficient blockchain designs,
randomness beacons, e-voting, etc.).
In this poster, we first extend the notion of TLP by formally defining the
"time-lock public key encryption" (TLPKE) scheme. Next, we introduce and
construct a "tight short-lived signatures" scheme using our TLPKE. Furthermore,
to test the validity of our proposed schemes, we do a proof-of-concept
implementation and run detailed simulations
Trenchcoat: Human-Computable Hashing Algorithms for Password Generation
The average user has between 90-130 online accounts, and around passwords are in use this year. Most people are terrible at
remembering "random" passwords, so they reuse or create similar passwords using
a combination of predictable words, numbers, and symbols. Previous
password-generation or management protocols have imposed so large a cognitive
load that users have abandoned them in favor of insecure yet simpler methods
(e.g., writing them down or reusing minor variants).
We describe a range of candidate human-computable "hash" functions suitable
for use as password generators - as long as the human (with minimal education
assumptions) keeps a single, easily-memorizable "master" secret - and rate them
by various metrics, including effective security.
These functions hash master-secrets with user accounts to produce sub-secrets
that can be used as passwords; s, takes a website
, produces a password , parameterized by master secret , which may or
may not be a string.
We exploit the unique configuration of each user's associative and
implicit memory (detailed in section 2) to ensure that sources of randomness
unique to each user are present in each master-secret . An adversary
cannot compute or verify efficiently since is unique to each
individual; in that sense, our hash function is similar to a physically
unclonable function. For the algorithms we propose, the user need only complete
primitive operations such as addition, spatial navigation or searching.
Critically, most of our methods are also accessible to neurodiverse, or
cognitively or physically differently-abled persons.
We present results from a survey (n=134 individuals) investigating real-world
usage of these methods and how people currently come up with their passwords,
we also survey 400 websites to collate current password advice
Poverty in India: The Rangarajan Method and the 2022–23 Household Consumption Expenditure Survey
This paper examines data on poverty in India from the most recent Household Consumption and Expenditure Survey, whose reference year is 2022–23. When these data were released by the Government of India, reports and studies stated that the data showed a substantial decline in poverty in India. We computed poverty levels by using the method proposed by the Expert Group to Review the Methodology for the Measurement of Poverty chaired by Dr. C. Rangarajan, which submitted its report in 2014. Our results showed significantly higher levels of poverty in 2022–23 than previously suggested
Role in new age marketing - revolutionary or evolutionary
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2014Cataloged from PDF version of thesis.Includes bibliographical references.This paper is a result of my passion for marketing and a humble attempt to understanding the changes surrounding, and impacting how companies communicate value to their customers and partners. It outlines the evolution process of marketing from being a miniscule function in large companies to a key gatekeeper for most large companies in the ad tech space today including tech biggies like Google and Facebook that earn a whopping majority of their revenue through digital marketing. It's also an attempt to refer to external economic and technological changes that may or may not have caused a change in the way businesses position, segment, or target consumers or, more currently appropriate, end users. Amidst a lot of jargon thrown around marketing analytics, big data, & audience profiling, the underlying intention is to observe possibilities of digital marketing being another step in the evolution of marketing or a disruption that changes the way marketing is scientifically applied. The paper aims to ignite a discussion around where the bandwagon marches towards, what is going to be the next big wave in reaching out to your customers, and how do we communicate value that customers find essential to them?This research touches upon key trends and hallmark points of evolution in marketing as a function and its scope. The introduction of new channels of marketing, and the inclusion of data modelling are examples of new methods that help marketing evolve as a practice. Although this research does outline the fact that the core concepts of marketing hold their firm ground. I would like to forewarn that this is purely a qualitative research. Coming with a great deal of experience in digital marketing with Google, I do realize the importance of marketing analytics and it is a subject that is widely written about so my attempt to take on the qualitative side of this business. Qualitative research is more perceptive and, therefore, more intriguing to me. The evolution of marketing in itself is based on how customer preferences have changed overtime whether it is to do with what they expect of a car or what they expect from companies to tell them about the car. Love it or hate it, there is a revolution happening in the pretext of an evolution or a possible long-predicted evolution taking place with revolutionary impact. It is a paradigm shift in the way we communicate, the way we interact with one another and in groups. It is the palpable effect of guzzling Exabytes of information and producing awe-inspiring state-of-the-art marketing analytics that companies use to woo their customers. It is this game of thrones that inspires more and more research work in this field. Everybody has an opinion on it and here is mine.by Ruthu Sreebashyam.S.M. in Engineering and ManagementS.M. in Engineering and Management Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Progra
Design of Components for Liquefaction of Nitrogen Using DWSIM
The field of Cryogenics deals with low temperature refrigeration applications such as liquefaction of gases. The various cryogenic cycles such as the Linde cycle, Claude cycle, Kapitza cycle help in liquefaction of various gases such as nitrogen, helium etc. Of all the three cryogenic cycles, Linde cycle was chosen as it is the simplest cycle. Liquid nitrogen has wide applications in various industries like food processing and transportation, medicine, medical therapy, manufacturing of computers etc. Operating variables such as flow rates, temperature, pressure, energy in a thermal system operating in a steady state can be calculated by a process simulation. Since design of plants is a cost and time-consuming process in reality, chemical engineers use simulators to simulate design and operation of a chemical plant and its equipment which saves money and time. Today, many simulators are in use. DWSIM was our choice for the project as it was open software, easy to work on and gave accurate results.</jats:p
RANDGENER: Distributed Randomness Beacon from Verifiable Delay Function
Buoyed by the excitement around secure decentralized applications, the last
few decades have seen numerous constructions of distributed randomness beacons
(DRB) along with use cases; however, a secure DRB (in many variations) remains
an open problem. We further note that it is natural to want some kind of reward
for participants who spend time and energy evaluating the randomness beacon
value -- this is already common in distributed protocols.
In this work, we present RandGener, a novel -party commit-reveal-recover
(or collaborative) DRB protocol with a novel reward and penalty mechanism along
with a set of realistic guarantees. We design our protocol using trapdoor
watermarkable verifiable delay functions in the RSA group setting (without
requiring a trusted dealer or distributed key generation)
Identification and Quantification of “Cancer Stem Cells” in Potentially Malignant and Malignant Disorders of Head and Neck Region: A Flow-Cytometric Study
Background: Cancer stem cells (CSCs) are subpopulation of cells existent in a cancerous mass of cells. These CSCs hijack the properties of stem cells like self-renewal as well as being resistant to any conventional cancer therapies. The objective of this study was to identify and quantify the presence of these CSCs by using surface markers CD44, CD133, and ALDH1 among three groups of subjects who were age and gender matched (Normal controls, Oral cancers, Potentially malignant disorders). Methodology: This study was conducted in a sample of 108 subjects who were divided into three groups: Group I- Controls (C), Group II- Oral cancer (OC), Group III- Potentially Malignant Disorders (PMDs). Among them, 40 subjects each were present in Group I & II and 28 subjects were included in group III, and they were respectively diagnosed histopathologically as OC and PMDs. The identification of the sub-population of CSCs by means of above mentioned surface markers was done using Flow cytometry. Results interpretation: Non-parametric tests were applied. Median age limit was 59 years in group II, which was higher than Group I or Group III subjects. p-value was 0.002* which was significant. Group I included 19 females (47.5%) and 21 males (52.5%). In Group II, 18 subjects were females (45%) and 22 were males (55%), and in Group III, 17 subjects were females (60.7%) and 11 were males (39.3%). p-value was 0.409, which was not very significant. In group II, 23 subjects (57.5%) were in clinical stage 2, 11 (27,5%) were in clinical stage 1 and six (15%) were in clinical stage 3. Histopathologically in group II, 15 (37.5%) were in grade I, 20 (50%) were in grade II and five (12.5%) were in grade III. Results of the three groups were compared and correlated regarding the presence of cancer stem cells based on the surface markers CD44, CD133 and ALDH1. Unlike other similar studies, our study showed no statistically significant presence of CD44, ALDH1 positive cells, but only CD133 was slightly significant. Inference: The results of our study showed no statistically significant evidence in identification of the presence of cancer stem cells in the oral cancers as well as potentially malignant disorders based on the presence of surface markers.</jats:p
