43 research outputs found

    A VIBRANT MULTI-GATHERING TECHNIQUE FOR ENCRYPTED DATA

    Get PDF
    Many works were recommended in a number of kinds of threat to attain various functionalities for look for example single keyword search, multi-keyword rated search, and so on.  Of those works, multi-keyword types of rated search has become more importance due to its realistic applicability.  We submit a good search method which is founded on the tree above encrypted cloud information, plus it manages multi-keyword search additionally to dynamic process on range of documents.  For obtaining of high search effectiveness, we create a tree-based index structure and propose an formula in line with the index tree. The forecasted plan is known as to supply multi-keyword query additionally to specific result ranking, furthermore dynamic update above document collections. Because of important structure of tree-based index, forecasted search system will effectively get sub-straight line search some time to manage the whole process of deletion additionally to insertion of documents

    IDENTIFYING MULTI-LEVEL STRUCTURE OF EVIDENCE IN MALICIOUS CONTENT

    Get PDF
    Inside the recent occasions, instead of betting on standard selling solutions, shady developer’s alternative towards many deceitful helps to ensure that to deliberately boost their programs and management chart internet search engine rankings on application store. Ranking fraud will make necessary factors over the due to mobile programs trade. Inside our work we offer a thrilling-natural vision of ranking fraud and introduce a ranking system of fraud recognition supposed for mobile programs. we advise locating ranking fraud by helps to ensure that of mining active periods, particularly leading sessions of mobile programs. These leading sessions ar leveraged for recognition of native anomaly as opposed to world anomaly regarding programs internet search engine rankings. The sessions regarding mobile programs can represent periods of attractiveness, so ranking manipulation can occur in primary sessions thus problem of recognition of ranking fraud should be to differentiate false leading sessions. The forecasted structure is economical that's extendible by alternative domain made evidences for that recognition of ranking fraud

    AN OPEN NET DATA SECURE MODEL FOR GRAPHICAL INFORMATION

    Get PDF
    Distribution of copyrighted multimedia objects by means of uploading visitors to online hosting sites can effect in primary insufficient revenues for content designers. Systems required to uncover clones of multimedia objects take time and effort and important. We advise a manuscript the thought of important multimedia content protection systems.  We focus on the approach to safeguarding multimedia content, that's content-based copy recognition through which signatures are removed original objects. Our physiques for multimedia content protection discovers unlawfully made copies of multimedia objects on the internet. Our design attains fast employment of content protection systems, as it is based on cloud infrastructures that offer computing hardware in addition to software sources. It's two new components like a method of generate signatures of three-dimensional and distributed matching engine for multimedia objects

    CO-EXISTING NET-BASED IN SEQUENCE MODEL USING LOCKED PROTOCOLS

    Get PDF
    While using the growing utilization of very network-attached storage systems, several works has focussed on scalable security. Our purpose must be to design ingenious additionally to secure techniques of authenticated key exchange which will get together particular needs of parallel Network File System.  Our work concentrates on present Internet standards particularly parallel Network File System using Kerberos to start parallel session keys among clients and storage products. We create a study of impracticality of key establishment for efficient many-to-many communications. The suggested techniques can decrease workload of metadata server by way of about fifty percent in comparison to provide Kerberos-based protocol, whereas achieving needed security characteristics additionally to keeping computational overhead at clientsand storage products at practically low-level

    The Ideas of Bloom’s Taxonomy in a Fifteenth-Century Treatise in Sri Lanka

    No full text
    Purpose. The purpose of this article is to study the relationship between Bloom’s Taxonomy and Kawyasekara. According to some, the first instance of Bloom’s Taxonomy was recorded by Benjamin Bloom in 1956, while Kawyasekara was written by Thotagamuwe Sri Rahula Thera in 1449. Methodology. Modern concepts of three hierarchical models, which differ from other types of educational concepts, did not develop until the fifteenth century, according to the critics. In this paper, it is shown how the concept we now refer to as Bloom’s Taxonomy was first presented in a similar manner in a text from the Kotte Era in Sri Lanka, written in the fifteenth century by Thotagamuwe Sri Rahula Thera. Results. This manuscript demonstrates that Thotagamuwe Sri Rahula Thera deserves praise for distinguishing educational notions from other kinds of educational conceptions. Thotagamuwe Sri Rahula Thera categories, which were much more recently discovered, are given special consideration. Conclusions. This document considering contemporary scientific findings and pedagogy exposes instructional ideas that have been around for centuries. These findings’ theoretical and clinical ramifications are also examined

    Climate-Adaptive Potential Crops Selection in Vulnerable Agricultural Lands Adjacent to the Jamuna River Basin of Bangladesh Using Remote Sensing and a Fuzzy Expert System

    No full text
    Agricultural crop production was affected worldwide due to the variability of weather causing floods or droughts. In climate change impacts, flood becomes the most devastating in deltaic regions due to the inundation of crops within a short period of time. Therefore, the aim of this study was to propose climate-adaptive crops that are suitable for the flood inundation in risk-prone areas of Bangladesh. The research area included two districts adjacent to the Jamuna River in Bangladesh, covering an area of 5489 km2, and these districts were classified as highly to moderately vulnerable due to inundation by flood water during the seasonal monsoon time. In this study, first, an inundation vulnerability map was prepared from the multicriteria analysis by applying a fuzzy expert system in the GIS environment using satellite remote sensing datasets. Among the analyzed area, 42.3% was found to be highly to moderately vulnerable, 42.1% was marginally vulnerable and 15.6% was not vulnerable to inundation. Second, the most vulnerable areas for flooding were identified from the previous major flood events and cropping practices based on the crop calendar. Based on the crop adaptation suitability analysis, two cash crops, sugarcane and jute, were recommended for cultivation during major flooding durations. Finally, a land suitability analysis was conducted through multicriteria analysis applying a fuzzy expert system. According to our analysis, 28.6% of the land was highly suitable, 27.9% was moderately suitable, 19.7% was marginally suitable and 23.6% of the land was not suitable for sugarcane and jute cultivation in the vulnerable areas. The inundation vulnerability and suitability analysis proposed two crops, sugarcane and jute, as potential candidates for climate-adaptive selection in risk-prone areas

    Assessment of Land Use Land Cover Changes for Predicting Vulnerable Agricultural Lands in River Basins of Bangladesh Using Remote Sensing and a Fuzzy Expert System

    No full text
    The aim of this study was to assess the LULC changes over 26 years from 1995 to 2021 to find the most changed land use conditions within the 25 km territory of the main river systems of Bangladesh. In addition, the prediction of vulnerable areas for agricultural land use in terms of inundation by river water was also analyzed. The study area includes river networks distributed through eight administrative divisions (Rangpur, Rajshahi, Mymensingh, Sylhet, Dhaka, Khulna, Barishal and Chittagong) of Bangladesh, covering an area of 64,556 km2. The study was conducted by identifying permanent water bodies from NDWI indices and preparing LULC maps that include the five main land use classes (water body, bare land, vegetation, agricultural land, and urban area) in the Google Earth Engine platform using supervised classification. The LULC maps were then analyzed in the ArcGIS® environment. A vulnerability map for agricultural land use was also prepared using a fuzzy expert-based system applying multicriteria analysis. From the land use land cover map of the study area, it was found that among the five land use classes, water bodies, bare land, vegetation, and urban areas increased in size by 3.65%, 2.18%, 3.31% and 2.55%, respectively, whereas agricultural land use significantly decreased by 11.68%. This decrease in agricultural land use was common for the analyzed area of all administrative divisions. According to the vulnerable area map of the eight divisions, more than 50% of the analyzed area of the Khulna and Dhaka divisions and more than 40% of the analyzed area of the Rajshahi, Mymensingh, Sylhet, Barishal and Chittagong divisions were highly vulnerable to agricultural land use due to the possibility of inundation by water. However, approximately 44% of the analyzed area of the Rangpur division was not vulnerable for agricultural land use. The prepared LULC and vulnerability maps can be helpful for the future land use planning of Bangladesh to meet the increasing demand for food production and livelihoods for increasing populations

    The Effect of Thermophoresis on Unsteady Oldroyd-B Nanofluid Flow over Stretching Surface.

    No full text
    There are currently only a few theoretical studies on convective heat transfer in polymer nanocomposites. In this paper, the unsteady incompressible flow of a polymer nanocomposite represented by an Oldroyd-B nanofluid along a stretching sheet is investigated. Recent studies have assumed that the nanoparticle fraction can be actively controlled on the boundary, similar to the temperature. However, in practice, such control presents significant challenges and in this study the nanoparticle flux at the boundary surface is assumed to be zero. We have used a relatively novel numerical scheme; the spectral relaxation method to solve the momentum, heat and mass transport equations. The accuracy of the solutions has been determined by benchmarking the results against the quasilinearisation method. We have conducted a parametric study to determine the influence of the fluid parameters on the heat and mass transfer coefficients
    corecore