This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database
In this paper,the vector equation of a generaliseddoubly wound helix was derived.Treloar’s pliedyarn geometry could be obtained as a special case ofthe general