291 research outputs found

    Review of an Enhanced Authentication Strategy for Multiservice Authorization over Mobile Cloud

    Get PDF
    Cloud computing has changed the corporate as well as educational industry since it was introduced. The cloud computing is basically cost effective, convenient and on demand service offered to the end users. For instance it lead to cost reserve funds as well as better resource usage and removing the need of specialized technical skill for the users. There exists a huge security concern when utilizing cloud services. The security is extremely vital in cloud computing since individuals and organizations store private information in the cloud and it should likewise be not difficult to utilize the services provided to users. Since the control of services and information required for the regular run of a organization is handled by third party service providers, End user needs to believe the third party cloud service providers and trust that they handle their information in a right way and resources are available as and when needed. There are many approaches proposed for authentication in cloud services. They are intricate, insecure or highly exclusive. In this Paper we have carried of the comparative study of different authentication schemes in cloud computing finally summarize on the basis of different evaluation criteria

    PHYTOCHEMICAL STUDY OF GOKSHUR (TRIBULUS TERRESTRIS LINN.) AND EVALUATION OF ITS ANTIBACTERIAL ACTIVITY WITH SPECIAL REFERENCE TO MUTRAKRUCHCHA

    Get PDF
    Infection of the urinary tract is the second commonest site after respiratory tract infection. It is more frequent in women than men. Almost 50% women suffer UTI. In our classical texts, urinary tract infection is described as Mutrakruchcha. A great Acharya Charak has mentioned it in Chikitsa sthana, Trimarmiya adhyay, its 8 types and Basti as a Marma. For the treatment of all types of Mutrakruchcha, Gokshur is mentioned. Gokshur is diuretic, aphrodisiac, tonic and rejuvenating herb with the ability to build lean muscle and strength. Gokshur possess Madhur rasa, Madhur vipaka and sheet Virya which causes diuresis by increasing Kleda in the body. So in this study 30 patients complaining of urinary tract infection were taken. 50 ml of Gokshur decoction, twice a day was given orally for 30 days. Weekly assessment was done on the basis of sign and symptoms like Mutra daha (burning micturition), Sashula mutrapravruti (painful micturition), Bastishul (suprapubic pain), Mutrapravruti (frequency of micturition), Jwaraprachiti (fever with chills), Sarakta mutrapravruti (haematuria), Sapuya mutrapravruti (pyuria). Objective improvement was done on the basis of reduction in pus cells in urine and serum creatinine at initial and after 30 days. Subjective improvement was shown in percentage it was 67.71%. The observations were found to be significant. Paired t test was found to be highly significant at 1 % level of significance i. e. p < 0. 01

    A Review on Numerical Simulation and Comparison of Carbide and HSS Tool Wear Rate while Drilling with Difficult To Cut Super Alloy Titanium Based on Archard Model

    Full text link
    A Carbide and HSS tool wear rate simulation using Archardˊs wear model is proposed, finite element modelling is done using commercial finite element software ABAQUS/explicit. ABAQUS interface was used to simulate the contact pressure. For measuring wear depth of tool's drilling operation is performed experimentally then wear depth is measured on profilprojecter. Comparing the wear rate, based on Archad model

    An Enhanced Authentication Strategy for Multiservice Authorization over Mobile Cloud

    Get PDF
    Over the past decade the enterprise computing has been shifted to new paradigm called as Cloud computing. The cloud-computing paradigm provides several service models fitting the needs of an individual or organization. The ease of deployment, reduced costs, availability, scalability, accessibility, flexibility and location independence are some of the very strengths of this paradigm, giving rise to its popularity. Another emerging trend in enterprise computing is the use of smart phone devices, the Smart phone devices has been advanced greatly, in recent years, so has malicious code. Although, smart phones are advancing in terms of computational power, rapidly replacing Personal Computers (PCs) as first choice of a computing device but there is a major problem of resource poverty. For overcoming that issues now most of the organizations started to providing cloud services to their users. This flexibility and accessibility increases the popularity of Mobile cloud computing. On the contrary, security and privacy issues are limiting its wide spread deployment. This paper introduced a new Authentication Strategy for a mobile cloud, Which will provide high security while accessing the number of services provided by the cloud. The propose system overcomes the issue of stealing the authorization tokens through malicious insiders by using a multi tokens as well provides a security against Eaves Dropping and Man In Middle attack. DOI: 10.17762/ijritcc2321-8169.150316

    Robust Digital Watermarking For Color Images Using Fuzzy Vault

    Get PDF
    The advent of the Internet has resulted in many new opportunities for the creation and delivery of content in digital form. Applications include electronic advertising, real-time video and audio delivery, digital repositories and libraries, and Web publishing. An important issue that arises in these applications is the protection of the rights of all participants. It has been recognized for quite some time that current copyright laws are inadequate for dealing with digital data. This has led to an interest towards developing new copy deterrence and protection mechanisms. One such effort that has been attracting increasing interest is based on digital watermarking techniques. Digital watermarking is the process of embedding information into digital multimedia content such that the information (the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control. Digital watermarking has become an active and important area of research, and development. Key research problem that we still face today is the development of truly robust, transparent and secure watermarking technique for different digital media including images, video and audio. So we propose a new robust digital watermarking system based on DCT and fuzzy vault techniques

    Ionic liquid catalyzed one pot green synthesis of isoxazolone derivatives via multicomponent reaction

    Get PDF
    459-464A series of 3-methyl-4-((3-aryl-1-phenyl-1H-pyrazol-4-yl)methylene)isoxazol-5(4H)-one derivatives have been efficiently synthesized by environmentally benign, one-pot three component condensation of substituted 1,3-diaryl-1H-pyrazole-4-carboxyaldehyde, β-keto ester and hydroxyl amine hydrochloride in the presence of ionic liquid [HNMP][HSO4] as a catalyst in ethanol. These derivatives have been synthesized by conventional, ultrasound and microwave irradiation methods. The combination of ionic liquid with ultrasound as well as microwave irradiation makes the protocol fascinating and environmentally benign. In addition, it has several benefits such as simple work-up procedure, clean reaction profile, short reaction time and good yields

    An Image Based Approach of IRIS Recognition for Person Identification using Segmentation Algorithm

    Get PDF
    A biometric system gives automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition system is regarded as the most reliable and accurate biometric identification system available. Also, Iris recognition is considered to be the most reliable and accurate biometric identification system present. Iris recognition system captures an image of an individual’s eye, the iris in the image is then meant for the segmentation and normalization for extracting its features. The performance of iris recognition systems mainly depends on the segmentation. Segmentation is used for the localization of the correct iris region in the particular region of an eye and it should be done accurately and correctly to remove the eyelids, eyelashes, reection and pupil noises present in iris region. Iris images are selected from the Database, then the iris and pupil boundary is detected from rest of the eye image,by removing the noises. The segmented iris region was normalized to compress the dimensional inconsistencies between two iris regions by using Then the features of the iris were encoded by convolving the normalized iris. The Hamming distance was chosen as a matching metric parameter, which gave the measure of how many bits disagreed between the templates of the iris

    Study of Properties of Al LM-25/SIC fabricated by using Stir Casting Method and Wear Analysis by RSM

    Full text link
    Aluminum MMC’s are widely used in various applications because of their higher mechanical and physical properties when compared with their base Al alloy. This paper focuses on the change in mechanical properties of various Al/SiC composites fabricated by using stir casting method. Effect of SiC reinforcement in different Al alloys on mechanical properties like hardness, tensile strength, wear test, percentage elongation, residual stress measurements are discussed in detail. For this purpose various reinforcement of SiC with 0,4,8 percent weight and different particle sizes are considered along with Al alloys. Variations in process parameters of stir casting are also made and taken into consideration
    corecore