Friday 28 June 2019

Numerical Solution of Boundary Layer Flow of Viscous Fluid Via Successive Linearization Method(CTCSA)- Lupine Publishers

Numerical Solution of Boundary Layer Flow of Viscous Fluid Via Successive Linearization Method(CTCSA)-Lupine Publishers


The aim of this work is to obtain the numerical solutions for the boundary layer flow of heat transfer of incompressible viscous fluid. The governing partial differential equations are converted into ordinary differential equation by using a similarity transformation. The nonlinear equation governing the flow problem is modeled and then solved numerically by means of a successive linearization method (SLM). The numerical results are derived in tables for comparisons. The important result of this comparison is to show the high precision of the SLM in solving system of nonlinear differential equations. Graphical outcomes of various parameters such as Prandtl number (Pr) and Eckert number (Ec) on the flow, field are discussed and analyzed.


For more Lupine Publishers Open Access Journals Please visit our website: www.lupinepublishers.com/

Friday 21 June 2019

Mitigating Disaster using Secure Threshold-Cloud Architecture(CTCSA)- Lupine Publishers

Mitigating Disaster using Secure Threshold-Cloud Architecture(CTCSA)-Lupinepublishers
There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to apply secret sharing methods as used in cryptography to create shares of cryptographic key, disperse and recover the key when needed in a multi-cloud environment. It also aims to prove that the combination of secret sharing scheme and multi-clouds can be used to provide a new direction in disaster management by using it to mitigate cloud outages rather than current designs of recovery after the outages. Experiments were performed using ten different cloud services providers at share policies of 2 from 5, 3 from 5, 4 from 5, 4 from 10, 6 from 10 and 8 from 10 for which at different times of cloud outages key recovery were still possible and even faster compared to normal situations.

https://lupinepublishers.com/computer-science-journal/fulltext/mitigating-disaster-using-secure-threshold-cloud-architecture.ID.000107.php

For more Lupine Publishers Open Access Journals Please visit our website: www.lupinepublishers.com/

Tuesday 18 June 2019

An Image Secret Sharing Method Based on Shamir Secret Sharing(CTCSA)-Lupinepublishers

An Image Secret Sharing Method Based on Shamir Secret Sharing by Selda Calkavur(CTCSA)-Lupinepublishers
The effective and secure protection for important message is a primary concern in commercial and military applications. Numerous techniques, such as image hiding and watermarking, were developed to increase the security of the secret. The secret image sharing approaches are useful for protecting sensitive information [1]. The main idea of secret sharing is to transform an image into n shadow images that are transmitted and stored separately. The original image can be reconstructed only if the shadow images that participated in the revealing process from a qualified set [2]. The (k; n)-threshold image sharing schemes were developed to avoid the single point failure. Hence the encoded content is corrupted during transmission. In these schemes, the original image can be revealed if k or more of these n shadow images are obtained. Moreover, the users who with complete knowledge of k 1 shares cannot obtain the original image.


For more Lupine Publishers Open Access Journals Please visit our website: www.lupinepublishers.com/

Monday 10 June 2019

Wishing you a Magical and Blissful Holiday

 Take a leap of faith and begin this wondrous new year by believing. Happy New Year!