Algorithm for Robot Navigation Without Collisions

19 Apr 2018

5 (1,641 )

ALGORITHM FOR ROBOT NAVIGATION AT ENVIRONMENT WITHOUT COLLISION   ALGORITHM REPRESENTATION FOR NAVIGATION OF MOBILE ROBOT WITHOUT OBSTACLE COLLISON Mobile robot It is a kind of robot that has the ability to travel Relative to the environment (i.e. locomotion), and one of the actuators of the robot is the locomotive system This chapter of my bachelor thesis is to develop algorithms that will help the autonomous ...

Click here to read more arrow

A Review on the Role of Expert System in Nephrology

19 Apr 2018

4 (1,545 )

Mr. Sagar S. Mali, Dr. R. V. Kulkarni Abstract Expert system refers to ability of the machine to collect data, performing operations on that data, and provide the correct and accurate results. The Expert system brings the intelligence like the human intelligence which is embedded into them by the computer programs. The use of Expert system in Nephrology concerns itself with the study of ...

Click here to read more arrow

SMTP Security via Opportunistic DANE TLS

19 Apr 2018

9 (3,309 )

SUJANA MAMIDALA   ABSTRACT This paper provides an insight about a protocol designed for SMTP transport, which offers downgrade resistance. This protocol deploys as security for Domain Name System (DNS) Authentication of Named Entities (DANE) based Mail Transfer Agents (MTA). To a client who uses authenticated and encrypted transport layer security (TLS), using this protocol provides a support to the Internet email and allows ...

Click here to read more arrow

Analysis of Cloud Storage In Robotic Environment

19 Apr 2018

8 (3,150 )

Cloud Computing: Analysis of Cloud Storage In Robotic Environment Tushar Gupta Sunil Yadav   Abstract— Cloud is a well-designed data storage model concerned with the storage of information on the web. Such storage has greatly revolutionized the robotic environment for learning purpose. This paper provides an overview of how databases in cloud deliberate to store knowledge fabricated by both robots and human in a ...

Click here to read more arrow

Image Quality Assessment Techniques Using Gabor Filters

19 Apr 2018

6 (2,015 )

A SURVEY ON IMAGE QUALITY ASSESSMENT TECHNIQUES USING GABOR FILTERS Deepa Maria Thomas, S. John Livingson   (DEEPA MARIA THOMAS, ROOM NO 303, DMR RESIDENCE, KARUNYA LADIES HOSTEL, KARUNYA UNIVERSITY, COIMBATORE-641114) Abstract-Image quality assessment has a very important role, especially because the impact that the quality of images have on a viewer is significant. This makes it important that visual information is assessed for ...

Click here to read more arrow

Power Line Communication: a Green Computing

19 Apr 2018

4 (1,561 )

Varsha Mohite Tejas Kandgaonkar ABSTRACT After evolution of wireless technology, classical Public Switched Telephone Network (PSTN) suffered through the drastic change. As a result of it, approximate 80-90% wired telephone networks are replaced by wireless network. But due to wireless network humans are nowadays facing various problems such as sleep disturbances, heart palpitations, migraines, and general poor health due to electromagnetic radiations. So there ...

Click here to read more arrow

Dentitic Cell and Immune Networks Algorithm Comparison

19 Apr 2018

8 (2,890 )

A Comparative study of Dentitic cell and immune networks algorithm for Artificial immune networks. Jaspreet kaur, Kamal Kumar   Abstract – Artificial immune systems are the systems used for advanced computational systems for the need of robust and secure functioning of computer systems. They are the systems inspired by the human immune systems in the human immunity save the body from external threats. We ...

Click here to read more arrow

Privacy Supportive Geo-Location Search Software

19 Apr 2018

8 (3,031 )

Devika BV   1 Introduction 1.1 Purpose The purpose of this document is to present a detailed description of the Locating Service Similarity with Privacy using queries. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli. 1.2 ...

Click here to read more arrow

Cactus Stack Approach with Dijkstra’s Algorithm

19 Apr 2018

7 (2,795 )

Advance Dijkstra’s Algorithm with Cactus Stack Implementation Logic Idea Proposed for the Cactus Stack Approach with Dijkstra’s Algorithm Palak Kalani Nayyar Khan   Abstract— This paper illustrates a possible approach to reduce the complexity and calculation burden that is normally encountered in the Shortest Path Problems. We intend to give a new concept based on the look ahead values of the input nodes given ...

Click here to read more arrow

Intelligent Public Transport System Design

19 Apr 2018

8 (3,180 )

An Intelligent Public Transport System for Smart City Gurnoor Walia, Kuljit Kaur   Abstract -- Road safety has changed into a main subject for governments and automobile manufacturers in the last decade. The advancement vehicular technologies has privileged researchers, institutions and companies to target their efforts on improving road safety. new kinds of networks, such as for instance Vehicular Ad Hoc Networks (VANETs), have ...

Click here to read more arrow

Server Architectures of Existing Presence Services

19 Apr 2018

7 (2,414 )

In this section, we describe the system model, and the search problem. Formally, we assume the geographically distributed presence servers to form a server to-server overlay network, G = (V,E), where V is the set of the Presence Server (PS) nodes, and E is a collection of ordered pairs of V . Each PS node ni ∈ V represents a Presence Server and an element of ...

Click here to read more arrow

Concepts in Differential Privacy

19 Apr 2018

5 (1,649 )

Abstract Stored data in search log is insecure process to the search engine. Search log contains extremely sensitive data, as evidenced by the AOL incident. To Store information in the search log is identify the behavior of user. To maintain this sensitive data is risky process, because some security methods containing the drawbacks. Search engine companies provide security for search logs, in some cases intruder identifies ...

Click here to read more arrow

Privacy-handling Techniques and Algorithms for Data Mining

18 Apr 2018

3 (941 )

VIVEK UNIYAL ABSTRACT Data mining can extract a previously unknown patterns from vast collection of data. Nowadays networking, hardware and software technology are rapidly growing outstanding in collection of data amount. Organization are containing huge amount of data from many heterogeneous database in which private and sensitive information of an individual. In data mining novel pattern will be extracted from such data by which ...

Click here to read more arrow

HDFC Bank: Securing Online Banking

18 Apr 2018

8 (3,013 )

James Rapp Managing Information Security in Information Systems   Summary The importance of banking online has grown enormously in the past decade. Making for more profit and better convenience it is not likely to fade away anytime soon. This also presents some new hurdles for the online banking community. As the number of banking online customers increases the amount of criminal attacker will also ...

Click here to read more arrow

Enhanced Frame-based Video Coding

18 Apr 2018

9 (3,288 )

Abstract- This paper displays the improved edge based feature coding plan. The info source feature to the improved edge based feature encoder comprises of a rectangular-size feature and states of subjectively molded questions on feature outlines. The rectangular edge composition is encoded by the ordinary casing based coding method and the feature object's shape is encoded utilizing the form based vertex coding. It is conceivable to ...

Click here to read more arrow

Architecture for Secure IPv4/IPv6 Address Translation

18 Apr 2018

8 (2,978 )

An Integrated Architecture for Secure IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks Amutha J, Meenakshi Sundaram R, Albert Rabara S3   Abstract. An All-IP network is probably getting highly feasible since all applications and services in the telecommunication are already getting IP enabled. Internet Protocol version 6 or IPv6, is a later version of IP suite as it is designed to handle the ...

Click here to read more arrow

Improving the Performance of Overbooking

18 Apr 2018

7 (2,792 )

Improving the Performance of Overbooking by Application Collocate Using Affinity Function ABSTRACT: One of the main features provided by clouds is elasticity, which allows users to dynamically adjust resource allocations depending on their current needs. Overbooking describes resource management in any manner where the total available capacity is less than the theoretical maximal requested capacity. This is a well-known technique to manage scarce and valuable resources ...

Click here to read more arrow

Study of Document Layout Analysis Algorithms

18 Apr 2018

5 (1,831 )

Relative Study of Document Layout Analysis Algorithms for Printed Document Images Divya Kamat, Divya Sharma, Parag Chitale, Prateek Dasgupta   ABSTRACT In the following survey paper, the different algorithms that could be used for document layout analysis have been studied and their results have been compared. For the removal of image mask, Bloomberg’s algorithm and CRLA have been described. For the purpose of text ...

Click here to read more arrow

An Architecture for Source Code Protection

18 Apr 2018

5 (1,819 )

Abstract—Due to great competition in software industry the source code and binaries have to be protected. Source code available in plain form could be easily stolen and launched on any computer using IDE. We will discuss a protocol that will be used in both (single user and teaming environment) in order to provide source code protection. This would be achieved though authentication, authorization, encryption/decryption and hashing. ...

Click here to read more arrow

Techniques to Extract Topical Experts in Twitter: A Survey

18 Apr 2018

9 (3,242 )

Techniques to Extract Topical Experts in Twitter: A Survey Kuljeet Kaur, Jasminder Singh   ABSTRACT An Online Social Network (OSN) such as Facebook, Twitter, Google+ etc. socially connects users around the world. Through these social media platforms, users generally form a virtual network which is based on mutual trust without any personal interaction. As more and more users are joining OSNs, the topical expert ...

Click here to read more arrow

Distance Measurement Using RSSI Method in WSN

18 Apr 2018

7 (2,751 )

Distance Measurement Using RSSI Method in Wireless Sensor Networks Akhand Pratp Singh, Devesh Pratap Singh, Santosh Kumar   Abstract. RSSI method gives distance measurement between beacon nodes and unknown node. RSSI is Range-based localization depends on the assumption that the absolute distance between a sender and a receiver can be estimated by one or more features of the communication signal from the sender to ...

Click here to read more arrow

Reversible Data Hiding on Color Images

18 Apr 2018

7 (2,619 )

REVERSIBLE DATA HIDING ON COLOR IMAGES USING DIFFERENCE HISTOGRAM MODIFICATION Subash David A    Abstract: Data embedding is done by processing these selected coefficients of the modified subband histograms. We present a high capacity reversible watermarking scheme using the technique of difference & average value coefficients of image blocks by using the tool Matlab. This scheme takes advantage of difference & average value coefficients, ...

Click here to read more arrow

Higher Quality Input Phrase To Driven Reverse Dictionary

18 Apr 2018

9 (3,594 )

Implementing a Higher Quality Input Phrase To Driven Reverse Dictionary E.Kamalanathan and C.Sunitha Ram ABSTRACT Implementing a higher quality input phrase to driven reverse wordbook. In contrast to a conventional forward wordbook, that map from word to their definitions, a reverse wordbook takes a user input phrase describing the specified construct, and returns a group of candidate words that satisfy the input phrase. This work ...

Click here to read more arrow

Improving the Efficiency of Semantic Based Search

18 Apr 2018

8 (2,935 )

An Effective Approach to Improve the Efficiency of Semantic Based Search Merlin Ann Roy   ABSTRACT: The incredible progress in the size of data and with the great growth of amount of web pages, outdated search engines are not suitable and not proper any longer. Search engine is the best significant device to determine any information in World Wide Web. Semantic Search Engine is ...

Click here to read more arrow

Information Retrieval from Large Databases: Pattern Mining

18 Apr 2018

8 (2,982 )

Efficient Information Retrieval from Large Databases Using Pattern Mining Kalaivani.T, Muppudathi.M   Abstract With the widespread use of databases and explosive growth in their sizes are reason for the attraction of the data mining for retrieving the useful informations. Desktop has been used by tens of millions of people and we have been humbled by its usage and great user feedback. However over the ...

Click here to read more arrow

Conditional Statement Strategies for Code Obfuscation

18 Apr 2018

7 (2,425 )

Chandan Kumar Behera, Pawan Kumar, D. Lalitha Bhaskari   Abstract Obfuscated code syntax has been set intentionally unclear. Different obfuscation techniques may have different impacts on the source code. In the presented paper, the ‘if condition’ has been used several times with the purpose to make the code obfuscated one, but in the mean time, the code should look like very simple. The idea ...

Click here to read more arrow

Security Metrics Maturity Model for Operational Security

18 Apr 2018

7 (2,708 )

CHAPTER ONE: Introduction In this chapter, the key concepts and definitions by well known security authorities on security metrics is introduced and discussed. Then the issues and motivation that brings about this research topic is explained. Thereafter, the end result which is the objectives is put forth. To achieve these objectives, the goals are briefly outlined. There is also a section that explains the scope of ...

Click here to read more arrow

Understanding Linear Cryptanalysis

18 Apr 2018

14 (5,219 )

Dipanjan Bhowmik Abstract The objective of this paper is to provide a better understanding of the Linear Cryptanalysis Attack developed by M.Matsui [2]. This paper has been written after going through noted literature in this field and has been structured in such a way that a beginner in this field would be able to understand the idea with little prior knowledge. The paper describes a simple ...

Click here to read more arrow

Big Data as an e-Health Service

18 Apr 2018

7 (2,480 )

Abstract: Bigdata in healthcare relates to electronic health records, patients reported outcomes all other data sets.It is not possible to maintain large and complex data with traditional database tools. After many innovation researches done by researchers Big Data is regenerating the health care, business data and finally society as e-Health .The study on bigdata e-health service. In this paper we come to know why the current ...

Click here to read more arrow

Data Processing in Big Data Centres Cost Reduction Approach

18 Apr 2018

6 (2,144 )

A Cost Reduction Approach for Data Processing in Big Data Centers R. Reni Hena Helan   ABSTRACT- The tremendous development in cloud data processing leads to the high load on computation, storage and communication in the data storage centers, which influence the data center providers to spend a considerable expenditure in data processing. There are three features leading to this increased expenditure, ie., job allotment, ...

Click here to read more arrow

Run Time Adaptation of Service Feedback Control

18 Apr 2018

6 (2,256 )

Runtime Adaptation of Service With Feedback Control Self Optimization T.Priyaradhikadevi, R.Anandhi   Abstract In a composite service which needs to be in uncertain and changing optimized environment which have service selection along with runtime adaptation. For maximum satisfaction for stakeholders quality and requirement needs for adapting composite services which responds to various environments. Service selection and business process for quality preference that made statistics during ...

Click here to read more arrow

Replica Synchronization in Distributed File System

18 Apr 2018

7 (2,614 )

J.VINI Racheal ABSTRACT - The Map Reduce framework provides a scalable model for large scale data intensive computing and fault tolerance. In this paper, we propose an algorithm to improve the I/O performance of the distributed file systems. The technique is used to reduce the communication bandwidth and increase the performance in the distributed file system. These challenges are addressed in the proposed algorithm ...

Click here to read more arrow

A Survey on Ranking in Information Retrieval System

18 Apr 2018

6 (2,344 )

Shikha Gupta Abstract Available information is expanding day by day and this availability makes access and proper organization to the archives critical for efficient use of information. People generally rely on information retrieval (IR) system to get the desired result. In such a case, it is the duty of the service provider to provide relevant, proper and quality information to the user against the ...

Click here to read more arrow

Behavior of Packet Counts for Network Intrusion Detection

18 Apr 2018

4 (1,463 )

Statistical Behavior of Packet Counts for Network Intrusion Detection Abstract— Intrusions and attacks have become a very serious problem in network world. This paper presents a statistical characterization of packet counts that can be used for network intrusion detection. The main idea is based on detecting any suspicious behavior in computer networks depending on the comparison between the correlation results of control and data planes in ...

Click here to read more arrow

Cloud Computing Service Level Agreement and Governance

18 Apr 2018

10 (3,789 )

Service Level Agreement and Governance for Cloud Computing The contractual side of a service level agreement (SLA) and governance for cloud computing Ali Raslan   Abstract In the world of information technology (IT), cloud computing has been the futuristic concept of modern computing for the last decade or more. Nevertheless, in the last few years this concept has become the mainstream. However, with the ...

Click here to read more arrow
Get in Touch With us

Get in touch with our dedicated team to discuss about your requirements in detail. We are here to help you our best in any way. If you are unsure about what you exactly need, please complete the short enquiry form below and we will get back to you with quote as soon as possible.