Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2019, cegon technologies
…
3 pages
1 file
Advantages: Customers can get their book delivered instead of actually going and buying the book. They can make payment online itself. Managing of inventory in the shop for shopkeeper becomes easier as customers are not visiting and ordering online.
cegon technologies, 2019
The Green Planet aims to raise awareness about the critical situation the environment is currently facing, and human actions that adversely influence climate change. At Green Planet we aim to support sustainability in all aspects of living. Green Planet is your final destination for tools and resources on creating a more sustainable world. Green Planet Certification program open to Solar Energy, Rain Water, Harvesting. At Green Planet we feel we are at the right place at the right time to distributing the information. That is now various affects involving in the Present world. The major problems are using the plastics, cut the trees and unclean water using, chemical fertilizers; using vehicles produce the air pollutions advanced food and technology affect to the environment. These are the main thing To develop the good environment and good infrastructure to inform our people supporting for the green plant awareness.
Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will lead to significant search accuracy performance degradation. Also the volume of data in data centers has experienced a dramatic growth. This will make it even more challenging to design ciphertext search schemes that can provide efficient and reliable online information retrieval on large volume of encrypted data. In this paper, a hierarchical clustering method is proposed to support more search semantics and also to meet the demand for fast ciphertext search within a big data environment. The proposed hierarchical approach clusters the documents based on the minimum relevance threshold, and then partitions the resulting clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search phase, this approach can reach a linear computational complexity against an exponential size increase of document collection. In order to verify the authenticity of search results, a structure called minimum hash sub-tree is designed in this paper. Experiments have been conducted using the collection set built from the IEEE Xplore. The results show that with a sharp increase of documents in the dataset the search time of the proposed method increases linearly whereas the search time of the traditional method increases exponentially. Furthermore, the proposed method has an advantage over the traditional method in the rank privacy and relevance of retrieved documents.
cegon technologies, 2019
With the rapid development ofcomputer technology, cloud-based serviceshave become a hot topic. They not only provideusers with convenience, but also bringmany security issues, such as data sharing andprivacy issue. In this paper, we present an accesscontrol system with privilege separationbased on privacy protection (PS-ACS). In thePS-ACS scheme, we divide users into privatedomain (PRD) and public domain (PUD)logically. In PRD, to achieve read accesspermission and write access permission, weadopt the Key-Aggregate Encryption (KAE)and the Improved Attribute-based Signature(IABS) respectively. In PUD, we constructa new multi-authority ciphertext policy attribute-based encryption (CP-ABE) schemewith efficient decryption to avoid the issuesof single point of failure and complicated keydistribution, and design an efficient attributerevocation method for it. The analysis andsimulation result show that our scheme is feasibleand superior to protect users' privacy incloud-based services. EXISTING SYSTEM: Data security issues brought by data sharing have seriously hindered the development of cloud computing, various solutions to achieve encryption and decryption of data sharing have been proposed. In 2007, Bethencourt et al. first proposed the ciphertext policy attribute-based encryption (CP-ABE).
Informatics for health & social care, 2016
Due to changes in the demographic situation of most Western European countries, interest in Information and Communication Technologies (ICT)-supported care services is growing fast. eCare services that foster better care information exchange, social involvement, lifestyle monitoring services, etc., offered via ICT platforms, integrated in the homes of the elderly are believed to be cost-effective. Additionally, they could lead to an increased quality of life of both care receiver and (in)formal caregiver. Currently, adoption and integration of these eCare platforms (eCPs) is slowed down by several barriers such as unclear added value, a lack of regulations, or lack of sustainable financial models. In this work, the added value of eCPs is identified for the several involved key actors such as the care receiver, the (in)formal care providers, and the home care organizations. In a second step, several go-to-market strategies are formulated. Because the gap between the current way of pr...
cegon technologies, 2019
The current Web has no general mechanisms to make digital artifacts-such as datasets, code, texts, and images-verifiable and permanent. For digital artifacts that are supposed to be immutable, there is moreover no commonly accepted method to enforce this immutability. These shortcomings have a serious negative impact on the ability to reproduce the results of processes that rely on Web resources, which in turn heavily impacts areas such as science where reproducibility is important. To solve this problem, we propose trusty URIs containing cryptographic hash values. We show how trusty URIs can be used for the verification of digital artifacts, in a manner that is independent of the serialization format in the case of structured data files such as nanopublications. We demonstrate how the contents of these files become immutable, including dependencies to external digital artifacts and thereby extending the range of verifiability to the entire reference tree. Our approach sticks to the core principles of the Web, namely openness and decentralized architecture, and is fully compatible with existing standards and protocols. EXISTING SYSTEM In many areas and in particular in science, reproducibility is important. Verifiable, immutable, and permanent digital artifacts is an important ingredient for making the results of automated processes reproducible, but the current Web offers no commonly accepted methods to ensure these properties. Endeavors such as the Semantic Web to publish complex knowledge in a machine-interpretable manner aggravate this problem, as automated algorithms operating on
International Journal of Advanced Research in Management and Social Sciences, 2015
Abstract: A study was conducted to measure the relationship between leadership styles and followership style (i.e. Independent thinking and Active Engagement) using 79 usable questionnaires obtained from employees who are working in Delhi NCR, showed important findings by using Pearson Correlation analysis: first, the most preferred style of leadership is Participative leadership style; second, Exemplary style of followership is most preferred followership style; third, Participative leadership is not significantly correlated with Independent & Critical thinking. Keywords: Participative leadership; Followership style, Active engagement, Independent thinking.
The Nigerian Stock Exchange being the very hub of the Capital market and the pivot around which every activity of the capital market revolves, provides the trading floor in which Securities such as shares, stocks, government bonds, debentures, futures, options and other derivatives are being transacted. This research work however, focus on the Role of Stock Exchange in the Nigerian Capital Market, it seek to examine some of the activities that are carried out on the floor of the Nigerian Stock Exchange being a segment of the secondary market and the regulatory measures put in place to monitor these activities in the stock market so as to avoid market rigging and manipulations, since the market is susceptible to manipulative and deceptive practices owing to the nature of securities traded on it. Therefore, more measures should be put in place by the Securities and Exchange Commission (SEC) being the apex regulatory body of the Exchange such as surveillance, rule making, enforcement and compliance with rules to reduce the rate of manipulations. It is recommended that the Commission should strengthen regulatory oversight, encourage disclosure, transparency and accountability of transactions, ensure proper quotation, provide up-to-date information to investors and also strengthen the institutions of the market.
Chungará (Arica), 2023
I Dialoghi della Comunità con la Chiesa Greco-Cattolica di Bielorussa.
Studia Historica. Historia Medieval, 42/1 (Nuevas perspectivas sobre los cartularios eclesiásticos medievales), 2024
Journal of American Association for Pediatric Ophthalmology and Strabismus
Zeitschrift für romanische Philologie, 138/2, pp. 624–628, 2022
Ecclesiastical Landscapes in Medieval Europe: An Archaeological Approach, 2020
Scientific Reports, 2021
The Spanish journal of psychology, 2012
HAL (Le Centre pour la Communication Scientifique Directe), 2019
European Journal of Interdisciplinary Studies, 2023
Psychopharmacology, 2007
Medicine, 2018
Angewandte Chemie, 2011
Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences, 2020
European Neuropsychopharmacology, 1998
Journal of synchrotron radiation, 2017
Journal of Applied Sciences, 2009