A Study: Cryptology Techniques and Methodologies
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 12
Abstract
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and
Efficient Way of Determining the Number of Clusters Using Hadoop Architecture
The process of data mining is to extract information from a data set and transform it into an understandable structure. The clustering task plays a very important role in many areas such as exploratory data analysis, pat...
Cryopreservation of Goat Sperms Collected From Different Regions of the Epididymis
Cryopreservation of epididymal sperms in domestic and non-domestic animals has a number of important practical applications such as preservation of valuable genetic material from non-breedable animals. In the present stu...
The Prevalence of Δ508 in Cystic Fibrosis Patients with Low Bone Mineral Density in Republic of Macedonia
Introduction: Reduced bone mass density (BMD) is frequent in patients with cystic fibrosis (CF). Pathogenesis of CF bone disease is multifactorial. Many studies suggest that there is genetic component, independent of the...
Approaches for User Image Search-goals with Implicit Guidance of User: A Survey
Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found. A search engine is really a general class of programs; however, the term is ofte...
Effect of Ultra High Frequency Radiation from 2G & 3G Cell Phone on Histology of Chick Embryo Retina – A Comparative Study
"The mobile phones have become popular due to faster communication, convenience and lower costs. The electromagnetic fields emitted by them are absorbed into the user’s body. The scientific reports on the possible health...