Global

Cloud computing is an internet based computing which provides different users an opportunity to store their data in the cloud. While data outsourcing relieves the owner of the burden of the local data storage and maintenance but as they have no longer physical possession of outsourced data makes data integrity protection a very challenging task. This paper explores the secure cryptographic hash function along with some other techniques that can be used by TPA to ensure the integrity of data stored in the cloud at regular intervals or on user request.
Cloud computing is an amazing technology where users can remotely store their data into the cloud to enjoy high quality application and services. Cloud being the most vulnerable next generation architecture consist of two major design elements i.e. the Cloud Service Provider(CSP) and the Client. Even though the cloud computing is promising and efficient, there are many challenges for data privacy and security. This paper explores the security of data at rest as well as security of data while moving.
This paper represents the most effective automatic power factor improvement by using static capacitors which will be controlled by a Microcontroller with very low cost although many existing systems are present which are expensive and difficult to manufacture. In this study, many small rating capacitors are connected in parallel and a reference power factor is set as standard value into the microcontroller IC. Suitable number of static capacitors is automatically connected according to the instruction of the microcontroller to improve the power factor close to unity. Some tricks such as using resistors instead of potential transformer and using one of the most low cost microcontroller IC (ATmega8) which also reduce programming complexity that make it most economical system than any other controlling system.
Network management systems are a necessary part of every production network. Nowadays management is always scrutinizes every dollar spent on hardware and software. The costs of these systems need be justified in the same manner that infrastructure and data center upgrades need to be justified. Network management systems not only are cost affective but also benefits the network management team in giving them the ability to look into their network to see what is going on. Without NMS you cannot answer questions such as why did the network go down or why is the network slow?
Security of data transmitted through internet has posed a number of challenges. Data transmitted can be in the form of text, pictures, audio and video clips. In this paper a study has been carried out to find the relationship between the complexities of various Indian languages and its relation to text data security through an intelligent method of converting the text data before transmission. Complexity has been determined from the percentage retrieval by cryptanalyst using reverse frequency mapping without knowing the key. Percentage retrieval with and without converting the text data into an intelligent intermediate form have been compared and repeated in many languages along with English. The percentage retrieval of encrypted data using a language other than English, after converting the same data into a coded file and a dictionary is almost negligible.
The proliferation of domain specific ontologies has improved the ability to represent process and store information in regard to highly specialized domains. However, adhoc transfer of information between domain specific ontologies is not possible. Consequently, multiple solutions have beenpro-posed and evaluated as means of facilitating the adhoc transfer of information between another. These range from, structural approaches, which attempt to match knowledge structures between ontologies; lexicographical approaches, that use high level reasoning to match concepts between relatedontologies and finally, local structure approaches which look for similar local structures between ontologies to facilitate the transfer of information. To date, the success rate of the published algorithms has been relatively poor. Some of the most successful algorithms, at best are able to match around 50% of the concepts between related ontologies. In this paper we propose a novel global-local hybrid approach to improve the success and accuracy of adhoc information transfer between domain specific ontologies. We demonstrate the efficiency of the proposed algorithm by matching the nodes of three inter-related medical domain ontologies. This demonstrates a significant improvement over existing lexicographical and structural approaches.
Many problems of river management and civil protection consist of the evaluation of the maximum water levels and discharges that may be attained at particular locations during the development of an exceptional meteorological event. Numerical methods have become a useful tool to predict discharges and water levels in hydraulic systems. The shallow water or St. Venant equations, being a hyperbolic quasi- linear partial differential system represents a good candidate for the application of many of the techniques developed originally for Fluid Dynamics. In this paper we will present different numerical schemes such as Lax-Friedrich scheme, Lax-Wendroff scheme, Leap-Frog scheme for the shallow water equation and implement the numerical schemes by computer programming. Next we will compare these different schemes with respect to their efficiency and the quality of the solution indeed. Here we apply linear advection equation in order to test the accuracy of these schemes for shallow water equation.
Your Understanding how biological visual systems recognize objects is one of the ultimate goals in computational neuroscience. People are able to recognize different types of objects despite the fact that the objects may vary in view, points, sizes, scale, texture or even when they are translated or rotated. In this paper we focus on syntactic approach for the description of objects as Normalized Vector Codes using which objects are recognized based on their shapes.
An innovatory approach has been recently proposed for the derivation of infinite product representation of elementary functions. The approach is based on the comparison of different alternative forms of Green’s functions for boundary-value problems stated for the two-dimensional Laplace equation. A number of new infinite product representations of elementary functions was actually derived within the scope of that approach. The present study continues the trend: it aims at an analysis of the approach and exploring ways for its extending to some other problem statements that might also be efficiently treated.
This study identifies and analyzes the use of New Information and Communication services companies in Brazilian state of Santa Catarina. We have surveyed 14 companies of all sizes and segments. The study design was exploratory and descriptive and uses qualitative approach. Anon-probability sampling has been adopted and the information was collected through structured non-disguised interviews with the leaders of the selected companies. The main conclusion of the study is that companies are not using the NICTs properly and, because of that, do not exploit all its possibilities. Lack of marketing culture in this area has been detected. The companies also need to clearly define their objectives and the criterion of evaluating the results regarding the NICTs.