Because of the advantages of resource sharing in an efficient and effective way, practical data storage mechanisms, and resources delivered on demand whenever they are needed in an adequate suitable environment, cloud computing plays an indisputable role in today's software. The data available in the cloud is going to be frequently shared via various customers under different cloud categorizations like public cloud, private cloud, hybrid cloud, and so on, as stated via the National Institute of Standards and Technology (NIST). Generally, access control can be defined as a method of confirming authorized users for access to cloud data and resource sharing. Cloud computing, in the opinion of researchers concerned with cloud data security, offers a high level of data mobility, storage, availability, data integrity, backup and recovery, confidentiality and privacy. Researchers studying cloud storage are focusing on data security, whereas also examining the influence of suggested algorithms on the performance of cloud. This work attempts to discuss and review a number of approaches for using RSA in cloud computing, as well as to compare such approaches.
The basic goal of this research study is to show a critical review of existing paper on human brain tumor classification systems above the last 10 years. Attention and study accomplishments in brain tumor classification have arisen essentially above the previous few years, particularly with the need for an assistant to the doctor to diagnose such critical non-faulty diseases has led to the building of this type of system, for instance neural networks is important compounds. Survey and evaluation become necessary, as the number of suggested techniques increases. This study present the survey focus on various researchers applied their systems using neural network, and moreover a contrast between these systems is discussed.
Network <span>security continues to be the priority of many organizations. To ensure the protection of their data, they pay great attention to Encryption systems. Moreover, because of the enormous developments in networks of connection particularly the internet which has used by several people to share a variety of data kinds. The security of data has been a significant issue. As a result, there is a significant focus in using methods of decryption and encryption. Numerous encryption techniques have become advanced to preserve data protection, chaotic encryption systems are one of these methods widely used in recent years, where several techniques were proposed to use a chaotic map for encrypt images for the reason that of their characteristics e.g., random action unpredictability and initial conditions sensitivity. In this paper, proof authentication of sent information is used chaotic encryption algorithm to provide cipher text and hidden in image then send to another user. This approach is applied in cellular operating system environment (android). Thus, the sending and receiving of text will be safe and secure. The proposed approach is tested on different types of mobile. The proposed system gives good results.</span>
Technology in all areas has entered into life in homes (achievement of housework), streets and work, in order to facilitate life matters and saving effort and time, also, the technology has entered the areas of entertainment and communication and achievement of works even remotely and achievement of work that needs strength and short time. Also, artificial intelligence has entered various applications to improve its performance; this research will offer one of the smart technology applications, which is the smart home where the instructions can be handled and performed through speech, in order to add more facilities to our lives and help some people (e.g., elderly or disabled people who live alone) who have difficulty to move and handle the regular appliances in the house. And due to the lack of voice command recognition research in Arabic has resulted in making It difficult to stratify smart house voice command services, especially in the Middle East. Speech recognition is also a nontrivial task in the processing of natural language; this proposed smart house system is based upon detection and recognition of the speech in the Arabic language. Arduino programming was used to accomplish this system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.