18 research outputs found

    Watch Dog for a Plant House

    Get PDF
    The determination in selecting this project is to reduce the effects by the attributes of the nature on the plants. The proposed project we will help the user to check and maintain all the essential things like temperature, moisture in air, water content in soil and salinity in the soil required for an optimal growth of a plant. The Plant House maintenance by the user in a dynamical process is the goal of our project. In the existing system there should be a person in-charge in the room where the trees are planted and grown, to check the temperature and the other attributes which are to be maintained. To reduce the human presence in the process, in the existing system we construct a Greenhouse application which will respond to the changes in the attributes of the environment. The optimal growing environment of the different plants are stored in to the database. The application consists of a main home page where we can see the different room, if the user need to add a room he can add it. The user is recommended to enter required values for the Temperature, Humidity, Water, Fertilizer, Plant Bed, and Lightning, which are the essential needs for a plant growth. Sensors are maintained by the user, values which should match with the optimal values of the plant given by the user in the database. The fields can also be updated and also the room can also be deleted

    Challenges and Issues of Data Security in Cloud Computing

    Get PDF
    Cloud computing is still in its infancy in spite of gaining tremendous momentum recently, high security is one of the major obstacles for opening up the new era of the long dreamed vision of computing as a utility. As the sensitive applications and data are moved into the cloud data centers, run on virtual computing resources in the form of virtual machine. This unique attributes, however, poses many novel tangible and intangible security challenges. It might be difficult to track the security issue in cloud computing environments. So this paper primarily aims to highlight the major security, privacy and trust issues in current existing cloud computing environments and help users recognize the tangible and intangible threats associated with their uses, which includes: (a) surveying the most relevant security, privacy and trust issues that pose threats in current existing cloud computing environments; and (b) analyzing the way that may be addressed to eliminate these potential privacy, security and trust threats, and providing a high secure, trustworthy, and dependable cloud computing environment. In the near future, we will further analysis and evaluate privacy; security and trust issues in cloud computing environment by a quantifiable approach, further develop and deploy a complete security, privacy trust evaluation, management framework on really cloud computing environments

    Electronic structure at the cores of dislocations in transition metals

    No full text
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    corecore