Data Secure in Cloud Computing Using Encryption Algorithms
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
"Cloud computing is the outsourcing of IT communications by the use of the Internet and maintaining own hardware and software environment. Cloud computing facilitates computing assets on demand by the use of a service provider. It is there whenever you need it, as much as you need, and you pay as you go and only for what you use. Security is a prim concern in the use of cloud computing. In this paper, we have presented encryption based security algorithms for cloud computing. "
Success of Direct Pulp Capping and Partial Pulpotomy of Primary Teeth using MTA
The purpose of this study was to compare the clinical and radiographic success rate of direct pulp capping (DPC) and partial pulpotomy (PP) treatment using MTA as pulp capping agent in treatment of primary teeth with pu...
Variation in the Incidence and Position of Accessory Mandibular Foramen in East Indian Population in Relation to Age
"ABSTRACT : The passage of blood vessels and nerves make the accessory mandibular foramen (AMF) clinically important for dental surgeons, anaesthesists, oncologists and radiotherapists. The aim of the pr...
Food Availability and Price Stability in Kenya
Food Availability and Price Stability in Kenya
Application of Curve Fitting and Surface Fitting Tools for High Leverage Points and Outliers of Wind Speed Prediction
Climate change is generally accepted as the greatest environmental challenge our world is facing today. Together with the need to ensure long-term security of energy supply, it imposes an obligation on all of us to consi...
A Survey on Malicious Node Detection in Wireless Sensor Networks
Wireless sensor network becomes popular both in civil and military jobs. WSNs are of particular interest to adversaries due to their frequent deployments in open and unprotected environments. Sensor nodes...