• Citations Per Year
Learn More
Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off(More)
Congenital cystic adenomatoid malformations (CCAM) are rare developmental anomalies of the lung characterized by cysts of varying sizes and/or adenomatoid proliferation. Type I CCAM, the most frequent subtype, is associated with an increased incidence of malignant transformation, principally bronchioloalveolar carcinoma, with a reported incidence of around(More)
The Internet society is continuously growing and the need of performance studies in this field is essential in order to obtain better throughput for the Web users. Moreover, Internet applications and clients have varied service expectations and demand provisioning of different levels of QoS to multiple traffic classes on the Internet. Meeting client QoS(More)
Cloud Computing has rapidly emerged as a new computing paradigm that arrays massive numbers of computers in centralized and distributed data centers to deliver web-based applications, application platforms, and services via a utility model. Cloud computing technologies include grid computing, utility computing and virtualization. It is very much essential(More)
Alcohol (ethanol) is among some of the potentially harmful factors that are transmitted directly to the embryo. The present study was aimed to find out the changes in the tissue lipid peroxidation level and organ weight in the litters exposed to prenatal alcohol consumption. Adult female wistar rats (n = 6/group) were divided into control group (saline(More)
  • 1