Growth and Characterization of L-Asparagine (LAS) Crystal Admixture of Paranitrophenol (PNP): A NLO Material

L-asparagine admixture Paranitrophenol (LAPNP) single crystals were grown successfully by solution method with slow evaporation technique at room temperature. Crystals of size 12mm×5 mm×3mm have been obtained in 15 days. The grown crystals were Brown color and transparent. The solubility of the grown samples has been found out at various temperatures. The lattice parameters of the grown crystals were determined by X-ray diffraction technique. The reflection planes of the sample were confirmed by the powder X-ray diffraction study and diffraction peaks were indexed. Fourier transform infrared (FTIR) studies were used to confirm the presence of various functional groups in the crystals. UV–visible absorption spectrum was recorded to study the optical transparency of grown crystal. The nonlinear optical (NLO) property of the grown crystal was confirmed by Kurtz–Perry powder technique and a study of its second harmonic generation efficiency in comparison with potassium dihydrogen phosphate (KDP) has been made. The mechanical strength of the crystal was estimated by Vickers hardness test. The grown crystals were subjected to thermo gravimetric and differential thermal analysis (TG/DTA). The dielectric behavior of the sample was also studied

An Anonymity-Based Secure On-Demand Routing for Mobile Ad Hoc Networks

Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) due to its unique nature such as scarce of resources and absence of centralized authority. There are number of protocols have been proposed to provide privacy and security for data communication in an adverse environment, but those protocols are compromised in many ways by the attackers. The concept of anonymity (in terms of unlinkability and unobservability) and pseudonymity has been introduced in this paper to ensure privacy and security. In this paper, a Secure Onion Throat (SOT) protocol is proposed to provide complete anonymity in an adverse environment. The SOT protocol is designed based on the combination of group signature and onion routing with ID-based encryption for route discovery. The security analysis demonstrates the performance of SOT protocol against all categories of attacks. The simulation results ensure the necessity and importance of the proposed SOT protocol in achieving such anonymity.