International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 54    Submit Your Rating     Cite This   Download        Certificate

NANOTECHNOLOGY REVOLUTION

    1 Author(s):  NISHI

Vol -  2, Issue- 3 ,         Page(s) : 132 - 136  (2011 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Nanotechnology is a broad and interdisciplinary area of research and development activity that has been growing explosively worldwide. This NT revolution promises to revolutionize the ways, in which materials and products are created; and the wide range and nature of functionalities that can be accessed. With in the next few years we can expect to see major technological changes brought by the tiny atom-atom based manufacturing techniques.Integrity is the assurance to an entity that data has not been altered (intentionally or unintentionally) during transmission, from origin to destination. Integrity mechanisms can be divided into two classes: prevention and detection mechanisms. Prevention mechanisms seek to maintain integrity by thwarting any unauthorised attempts to modify the data, while the purpose of detection mechanisms is to signal if the data’s integrity is breached. The main components of security are confidentiality, integrity and availability . Confidentiality is the assurance that information can only be accessed by the intended and authorized recipients. Access control mechanisms can be used to preserve confidentiality. Cryptography can for example be used to make the information unreadable to anyone except the parties who hold the cryptographic key to unscramble the data. Integrity is the assurance to an entity that data has not been altered (intentionally or unintentionally) during transmission, from origin to destination. Integrity mechanisms can be divided into two classes: prevention and detection mechanisms. Prevention mechanisms seek to maintain integrity by thwarting any unauthorised attempts to modify the data, while the purpose of detection mechanisms is to signal if the data’s integrity is breached. In a distributed database system, a program often referred to as the database's "back end" runs constantly on a server, interpreting data files on the server as a standard relational database. Programs on client computers allow users to manipulate that data, using tables, columns, rows, and fields. To do this, client programs send SQL statements to the server. The server then processes these statements and returns replies to the client program.

  1. National Renewable Energy Laboratory. (n.d.). NREL: Energy Conversion and Storage. [Online]. Available: http://www.nrel.gov/basic_sciences/enrgystor.html [2003, April 20].
  2. NEC. (2003). Products, Services and Recycline: Environmentally Sound Products and IT Solutions. [Online]. Available: http://www.nec.co.jp/eco/en/download/pdf/2002_04_e.pdf [2003, May 11].
  3. Nerger, Matthias. (2002, December 4). Factor Four Desk Research, Wuppertal Institute, Germany. Personal Interview.
  4. Nutek. (n.d.). Eco-efficiency 2000. [Online]. Available: http://www.nutek.se/information/ecoefficiency2000/day1/goran_persson.pdf [2002, November 27].
  5. Pacific Northwest National Laboratory. (2002). PNNL Nanotechnology: Nano Revolution. [Online]. Available: http://www.pnl.gov/nano/revolution/index.html [2003, January 30].
  6. Pacific Northwest National Laboratory. (2002a). PNNL Nanotechnology: Grand
  7. Challenges. [Online]. Available: http://www.pnl.gov/nano/grand/  [2002, November 26].
  8. Parker, Randall. (2002, November 21). Self-Cleaning Windows Based On Nanotech. Future Pundit. [Online]. Available: http://www.futurepundit.com/archives/cat_nanotech_advances.html [2002, November 28].
  9. Jaya Arora “Micro-Organisms & Infection”  www.irjmst.com

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details