Learn More
1 Strength, durability and health monitoring aspects of composite overlays on civil engineering structures are discussed. The perspective and benefits of the repair, upgrade, retrofit, and rehabilitation of US civil infrastructure using composite overlays is briefly reviewed. Bond strength, durability, and in-service health monitoring are identified as(More)
Music and its attributes have been used in cryptography from early days. Today music is vastly used in information hiding with the use of Steganography techniques. This paper proposes an alternative to steganography by designing an algorithm for the encryption of text message into music and its attributes. The proposed algorithm converts the plain text(More)
"Music can be used as a language communicable". Eric Sam's in his article "Musical Cryptography" has annotated various cryptographic techniques using music. Music and its attributes have been used in cryptography from early days. Musical symbols and musical notes have been used as substitution cipher. The algorithms applied to musical cryptography use(More)
commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstracts-An approach is described for generating a secret key using polarized photons in quantum systems. A message is encoded and decoded by using code generated through the properties of Hadamard matrices. The algorithm uses the features of certain(More)
Micro-machines are being used in more and more applications in our technology dependent lives and perhaps soon, like electronics, we shall not be able to live without them. Many of these micro-machines are applied in mission critical devices, like life sustaining medical devices, combat aircraft, airbags, and so on. It is critical that these devices are in(More)
Regression testing is time consuming and expensive activity in software testing. In Regression testing when any changes made to already tested program it should not affect to other part of program. Regression testing is crucial activities in software testing and maintenance phases. If some part of code is altered then it is mandatory to validate the(More)
Use of short selling and derivatives is limited in most emerging markets because such instruments are not as readily available as they are in developed capital markets. These limitations raise questions about the value added provided by hedge funds, especially compared to traditional mutual funds active in these markets. We use five existing performance(More)
  • 1