Notice Board :

Call for Paper
Vol. 10 Issue 2

Submission Start Date:
February 1, 2024

Acceptence Notification Start:
February 10, 2024

Submission End:
February 15, 2024

Final MenuScript Due:
February 25, 2024

Publication Date:
February 29, 2024


                         Notice Board: Call for PaperVol. 10 Issue 2      Submission Start Date: February 1, 2024      Acceptence Notification Start: February 10, 2024      Submission End: February 15, 2024      Final MenuScript Due: February 25, 2024      Publication Date: February 29, 2024




Volume II Issue V

Author Name
Nitin Rajput
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Cloud security term refers to a broad field that has to do with the protection of data and cloud systems. Cloud security has historical roots that include ciphers, subterfuge, and other practices whose goals were to protect the confidentiality of written messages. In our era, cloud security is generally understood to involve domains that are involved in the security of IT systems as well as with the non-IT processes that are in interaction with IT systems. The objective of cloud security is to protect data as well as cloud systems from unauthorized access, use, disclosure, disruption, modification, or destruction. We will create public cloud using openshift cloud then apply Advanced Encryption Standard algorithm on file, which will store on cloud storage and also calculate encryption and decryption time.
PaperID
2016/IJRRETAS/6/2016/9610

Author Name
Nitin Rajput
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Cloud security term refers to a broad field that has to do with the protection of data and cloud systems. Cloud security has historical roots that include ciphers, subterfuge, and other practices whose goals were to protect the confidentiality of written messages. In our era, cloud security is generally understood to involve domains that are involved in the security of IT systems as well as with the non-IT processes that are in interaction with IT systems. The objective of cloud security is to protect data as well as cloud systems from unauthorized access, use, disclosure, disruption, modification, or destruction. We will create public cloud using openshift cloud then apply Advanced Encryption Standard algorithm on file, which will store on cloud storage and also calculate encryption and decryption time.
PaperID
2016/IJRRETAS/6/2016/9611

Author Name
Tejaswita Salunkhe, Chhaya Nayak
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Protection of digital media become unavoidable in today’s world. Due to increase in need to secure digital media from unauthorized access, many watermarking techniques are developed in this paper, we propose a new algorithm for color images along with reversible watermarking. With the help of Discrete Wavelet Transform, watermark embedding and extraction is carried out. Along with Emboss Filter, discrete wavelet transform and discrete cosine transform are used as a composite technique to protect the image from illegitimate users. The Watermarked image’s quality is enhanced by using a composite technique with Emboss filtering. At last we test proposed algorithm on various images with the performance parameter PSNR .The results authenticate that the proposed algorithm improves the quality of cover image.
PaperID
2016/IJRRETAS/6/2016/8611

Author Name
Nandini kranti, Anand Singh Rajawat
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Information stockpiling on cloud is given by the administration supplier. Capacity of this information on un-trusted capacity makes secure information sharing a testing issue. Disseminated processing is the new perfect model giving the customer orchestrated organizations which are flexible in nature for Optimized Resource Management Decision System (ORM-DS). Consistently this flexibility is achieved by executing the crucial form of cloud i.e. virtualization. Here the issue basically creates in directing migrations of different virtualization stages and distinctive virtual machines across over physical machines without intrusion framework [1]. Here the associated figuring must ensures the pile altering when different virtual machines keep running on various physical machines. The field of administering resources and there booking start with Cloud based work space and extended to cloud stadium. QoS as the scattered model and taking care of is getting universality is the
PaperID
2016/IJRRETAS/6/2016/8612

除此之外粉嫩公主酒酿蛋,最重要的还是粉嫩公主酒酿蛋一直秉承“自然、健康、安全”的丰胸理念丰胸产品,根据中国女性的身体特点,经过多年研究,食用粉嫩公主酒酿蛋的同时丰胸效果,可以辅以简单的按摩手法,舒经活络,有效成分瞬间渗透、快速吸收,深度改善胸部血液循环丰胸方法