Notice Board :





Volume VII Issue X

Author Name
K Singh
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 10
Abstract
RSA is one among the simplest secure algorithms until at present. This paper describes the encoding decipherment likewise as digital signature mistreatment the RSA system, discuss the secure applications of RSA within the E-Commerce likewise because the speedy realization and the improvement of RSA
PaperID
2015/EUSRM/10/2015/29874

Author Name
N Lahoti
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 10
Abstract
This article uses the microwave radar beams scan characteristics of the phased array microwave radar, ANd proposes an algorithmic program supported the rough sets theory to type the signal of phased array radars. From the analysis of the character of the phased array radar’s beam scanning manners, and use the PDW received from sensors because the set of attributes. Therefore we are able to type the phased array radar signal from the surroundings
PaperID
2015/EUSRM/10/2015/29876

Author Name
Diptanshu Pandya, Dr. M.K. Rawat, Jitendra Dangra
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 10
Abstract
CLOUD COMPUTING is one of the most emerging and new way of computer science engineering, where flexible environment gives number of user can get access desired services as per their requirement where any information may available at anytime and anywhere in world. So there is lots of possibilities arisen to access public and private information by using internet. User needs to be begin to use computing services at remote location store the information in private cloud for confidentiality and share in public cloud. In this paper we are proposing a novel Load Balancing approach. The Load balancing is the process of distributing load over the different nodes which provides good resource utilization when nodes are overloaded with job. Load balancing is required to handle the load when one node is overloaded. When the node is overloaded at that time load is distributed over the other ideal nodes. Many load balancing algorithms are available for load balancing like Static load
PaperID
2015/EUSRM/10/2015/30550

Paper Title
Author Name
Anushree Pandya, Jitendra Dangra, Dr. M.K. Rawat
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 10
Abstract
Cloud computing is delivering services by reducing data ownership, improved scalability, agility to business, infrastructure cost reduction and availability of resources just in time. Cloud Computing is becoming the heart or the central theme for all sort of computing. Cloud is a remote place, at which user can upload data, can download data, can do processing of data, etc. Cloud provides space, computing power, platform and many more services on rent. This paper presents a brief introduction to the concept of clouds & its services. This paper also presents the issues related to the security of data in cloud environment. A few modern attribute based encryption models for the data security have been discussed. This paper also proposes a novel security model for the cloud computing environment. The proposed model combines the advantages of the hierarchical model and the third party auditor based model.
PaperID
2015/EUSRM/10/2015/30551