Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2

Search results for: Manjeet Marpara

2 Evaluation of the Efficacy of Titanium Alloy Dental Implants Coated by Bio-ceramic Apatite Wollastonite (Aw) and Hydroxyapatite (Ha) by Pulsed Laser Deposition

Authors: Betsy S. Thomas, Manjeet Marpara, K. M. Bhat

Abstract:

Introduction: After the initial enthusiasm and interest in hydroxyapatite products subsided due to dissolution of the coating and failure at the coating interface, this was a unique attempt to create a next generation of dental implant. Materials and Methods: The adhesion property of AW and HA coatings at various temperature by pulsed laser deposition was assessed on titanium plates. Moreover, AW/HA coated implants implanted in the femur of the rabbits was evaluated at various intervals. Results: Decohesion load was more for AW in scratch test and more bone formation around AW coated implants on histological evaluation. Discussion: AW coating by pulsed laser deposition was more adherent to the titanium surface and led to faster bone formation than HA. Conclusion: This experiment opined that AW coated by pulsed laser deposition seems to be a promising method in achieving bioactive coatings on titanium implants.

Keywords: surface coating, dental implants, osseo integration, biotechnology

Procedia PDF Downloads 275
1 Security and Integrity of Data in Cloud Storage to Efficient Dynamic Auditing

Authors: Manjeet Kaur

Abstract:

Cloud security is one of the important roles in the cloud; here, we can preserve our data in cloud storage. More and more clients would like to store their data on public cloud servers (PCS) along with the rapid development of cloud computing. Cloud storage services allow users to save their data on the cloud servers with local data storage costs. It makes the clients check the data on the cloud without downloading the whole data. In our system, we are using a checksum algorithm for our own auditing based on token generation. Using this key generation technique, we compare the key values from the original keys, and we can find out the changes in the file. The content will be stored and also encrypted in the cloud server. Here we are using a blockchain double hashing algorithm for splitting the original file into three different files and storing that files in three different locations in the cloud. The Encryption and Decryption Technique (EDT) is done by using Cryptographic Hashing Techniques (CHT). Anyone can download the files from the server with the file owner's permission. At the time of download, a key will be generated (code-based key generation), and it will send to the file owner. We can download that file by using the verification key.

Keywords: cloud security, cloud computing, public cloud servers, encryption and decryption technique, cryptographic hashing technique

Procedia PDF Downloads 19