719 research outputs found

    Secure And Insubstantial Data Sharing Chart For Mobile Cloud Computing

    Get PDF
    We focus on the extent of transparency as a result of major updates that this customer may have, and certified outsourcing of major updates is a brand new product known as Cloud Storage Auditing. Let's here in this case, major updates can be outsourced safely to an accredited entity, thus the weight of updating the least important items is stored around the customer. In addition, our client design provides us with the ability to validate validity using encrypted secret keys that is set by in particular, we benefit from external auditors in many of the current general audit designs; allow it to act as an authorized party in our center, which makes it Responsible for both storage checks and key updates, lock key conflicts. When uploading new files to the cloud, the customer should download the encrypted secret key that was only downloaded in... After that, the authorized party will hold the encrypted secret key from the client to check the cloud storage and update it below the encrypted state in each time period. The customer downloads and decrypts the encrypted secret key to the authorized party and they want to upload new files to the cloud. Within our design, THE should only be an encrypted form of a customer's secret key while performing each of these challenging tasks in honor of the customer. Within our design, THE should only be an encrypted form of a customer's secret key while performing each of these challenging tasks in honor of the customer. We formalize the meaning as well as the type of security in this example

    Advanced Cooling of Gas Turbine Blades with Sodium Liquid and Air

    Full text link
    Gas turbines are extensively used for air craft propulsion, land based power generation and industrial applications. Thermal efficiency of gas turbine can be improved by increasing turbine rotor inlet temperature. The current rotor inlet temperature in advanced gas turbine is for above the melting point of blade material. A sophisticated cooling scheme must be developed for continuous safe operation of gas turbines with high performance. Gas turbines are cooled externally and internally. Several methods have been suggested for the cooling of blades and vanes. The technique that describes in thesis is by cooling the blade by circulating sodium liquid filled inside it. The hot less denser sodium liquid travels the bottom region of the blade and transfer heat to the high velocity air passing near it. In this thesis a turbine blade model is designed and modeled in CATIA V5. CFD analysis of the model is performed for variant models. A comparative study of the results like temperature, turbulent kinetic energy and heat transfer rate through cooling air is made to find the best model which delivers effective cooling of the blade

    The Effect of Indole-3-Acetic Acid (IAA) on the Activity Levels of Dehydrogenases in the Silkgland of Silkworm, Bombyx Mori L

    Full text link
    The effect of indole-3-acetic acid (IAA) on the glucose-6-phosphate dehydrogenase (G-6-PDH),lactate dehydrogenase (LDH), glutamate dehydrogenase (GDH), iso-citrate dehydrogenase (ICDH), succinate dehydrogenase (SDH) and malate dehydrogenase (MDH) were studied The stimulation of G-6-PDH activity in the silk gland of experimental larva indicates increased oxidation of glucose resulting in higher levels of NADPH. Increased G-6-PDH activity in the present study suggests this as compensatory mechanism to maintain the structural complexity, functional integrity and metabolic centrality of the cells The activity of LDH, ICDH, MDH and SDH were increased in the silk gland of IAA treated larvae. The increased activity of the dehydrogenases may be attributed to increased turnover of aminoacids and oxidative metabolism in the silk gland. The activity level of GDH was increased in silk gland which indicates the increased oxidation of glutamate

    Social Thought in the Works of Poet Vaali

    Get PDF
    Millions of people all over the world are still listening to Vaali's songs every day. Poet Vaali has carved a niche for himself in the film industry for more than 60 years as a film lyricist. Vaali entered the film industry when Kannadasan was ruling the industry with his songs and became famous for composing songs on par with Kannadasan's songs. He has written a variety of songs such as traditional poetry, new poems, and musical compositions, and made them fly the flag of success. He is also able to deal with social ills and social problems with a view to creating social awareness. The poet Vaali is someone who can use film songs and poetry as a good means of communication. This article explores how he has approached social evils and social woes in his works with his rich vocabulary

    Security in 5G Networks: A Systematic Analysis of High-Speed Data Connections

    Get PDF
    Maximum user systems on 5G networks will now not be consumer phones or computers, but IoT device. Via 2021, there might be about 30 billion such devices. The quantity of attacks on the IoT is growing. Device protection is terrible and malware distribution is without problems scalable. Protection has ended up the primary challenge in many telecommunications industries these days as risks may have high outcomes. especially, because the center and enable technologies might be related to the 5G network, the confidential information will pass at all layers in destiny Wi-Fi structures. Even with modern-day 4G networks, now not each operator succeeds in securely configuring the center network and protecting it from all angles. As SDN and NFV are carried out for network cutting in 5G, the administration will become even extra difficult. Flexibility in 5G networks comes at the fee of multiplied complexity and high bandwidth communication settings to monitor. 5G will offer broadband access anywhere, entertain better person mobility, and permit connectivity of a large number of devices in an ultra- reliable and low-priced manner. Furthermore, we present protection solutions to those demanding situations and future instructions for secure 5G systems

    PHYTOCHEMISTRY AND ETHNOPHARMACOLOGY OF THE SEA GRASS CYMODOCEACEA FAMILY– A REVIEW

    Get PDF
    Cymodoceaceae is a family of flowering plants, sometimes known as the manatee-grass family,†the family Cymodoceaceae includes only marine species. The angiosperm phylogeny II system, of 2003 (unchanged from the APG system, of 1998), does recognize Cymodoceaceae and places it in the order Alismatales, in the clade monocots. They are marine hydrophytes that grow and complete their life cycle in a submerged condition, in a saline environment. Like terrestrial plant they obtain their energy from light through photosynthesis thus, they grow only in clear and shallow water, and at the suitable condition, they form beds or meadows. The family includes five genera, totalling 16 species of marine plants occurring in tropical seas and oceans (so-called seagrasses). Cymodoceaceae consist of five genera such as Amphibolis, Cymodocea, Halodule, Syringodium, and Thalassodendron. In this genera Cymodocea rotundata Ehrenb. and Hempr. Ex Asch. Cymodocea serrulata, (R.Br.) Asch. and Magnus, Halodule pinifolia (Miki) Hartog, Halodule uninervis (Forssk.) Asch and Syringodium isoetifolium (Asch.) are the species mostly adopted in Indian coastal region. These seagrass species have unique nature and wide application to the environment including human being. In this article botanical aspects, phytochemistry and ethnopharmacology of these five seagrass species belong to Cymodoceaceae family will be discussed

    Configuring and Implementing IPS Solutions for IoT Devices using NST

    Get PDF
    The necessity to ensure that Internet of Things (IoT) networks are secure is one of the biggest issues that has arisen as a result of the growing demand for technology that uses the IoT. Considering how many gadgets are linked to the internet, safeguarding their networks is a growing worry. Due to the IoT's network's complexity and resource constraints, traditional intrusion detection systems encounter a number of problems. The main objectives of this project are to design, develop, and evaluate a hybrid level placement method for an IDS based on multi- agent systems, BC technology (Block-Chain), and DL algorithms (Deep Learning). The breakdown of data administration, data collection, analysis, and reaction into its component parts reveals the overall system design. The National Security Laboratory's knowledge discovery and data mining dataset is used to test the system as part of the validation procedure. These results demonstrate how deep learning algorithms are effective at identifying risks at the network and transport levels. The experiment shows that deep learning techniques function well when used to find intrusions in a network environment for the Internet of Things

    Performance Evaluation of wide Bandwidth RF Signal Generator Chip

    Full text link
    The work in this paper is to give an overview of the compact wide band RF signal generator board design, emphasizing on the analyses and evaluation of the performance characteristics corresponding to the output signal purity and stability. The paper describes the design aspects involved in developing a reliable RF generating source which includes details regarding the factors that have taken care for optimum output power, spectral purity and noise performance. The simulation results obtained from the tool given by Maxim integrated are used as reference to evaluate the actual board when it is realised. These results are shown here for reference. Design aspects such as the power supply, noise filtering, loop filter component selection board layout consideration along with easy and compact form factor is considered. The board contains not only the signal generator device but also an FPGA from Xilinx to control the device, to make the board more useful for future applications; the board also has an SDRAM and an USB controller. This paper mainly concentrates on to MAX2870 signal generator and simulation results obtained by EE-Sim tool. Since the actual board is still in the process of being developed, the comparison of the actual performance to the simulation performance may not be possible at this point of time but definitely is in pipeline

    Simulation and Optimization of Cooling Tubes of Transformer for Efficient Heat Transfer

    Full text link
    Temperature variation with in the transformer affects the life and efficiency of the distribution transformer. The top oil temperature in the transformer depends on the type of cooling and cooling ducts/fins design and their layout. The present project investigates methods of onan transformer cooling system by means of increasing heat transfer rate by implanting the axial groves along with fins and porous region within in the cooling tubes and further optimization of the cooling process by adjusting the gravity by orienting the tube. This study is carried out by means of numerical analysis by simulating Transformer geometry in Ansys Fluent .Real case geometry of distribution transformer is used in this simulation
    • …
    corecore