Algorithm for Robot Navigation Without Collisions

19 Apr 2018

5 (1,641 )

ALGORITHM FOR ROBOT NAVIGATION AT ENVIRONMENT WITHOUT COLLISION   ALGORITHM REPRESENTATION FOR NAVIGATION OF MOBILE ROBOT WITHOUT OBSTACLE COLLISON Mobile robot It is a kind of robot that has the ability to travel Relative to the environment (i.e. locomotion), and one of the actuators of the robot is the locomotive system This chapter of my bachelor thesis is to develop algorithms that will help the autonomous ...

Click here to read more arrow

A Review on the Role of Expert System in Nephrology

19 Apr 2018

4 (1,545 )

Mr. Sagar S. Mali, Dr. R. V. Kulkarni Abstract Expert system refers to ability of the machine to collect data, performing operations on that data, and provide the correct and accurate results. The Expert system brings the intelligence like the human intelligence which is embedded into them by the computer programs. The use of Expert system in Nephrology concerns itself with the study of ...

Click here to read more arrow

SMTP Security via Opportunistic DANE TLS

19 Apr 2018

9 (3,309 )

SUJANA MAMIDALA   ABSTRACT This paper provides an insight about a protocol designed for SMTP transport, which offers downgrade resistance. This protocol deploys as security for Domain Name System (DNS) Authentication of Named Entities (DANE) based Mail Transfer Agents (MTA). To a client who uses authenticated and encrypted transport layer security (TLS), using this protocol provides a support to the Internet email and allows ...

Click here to read more arrow

Analysis of Cloud Storage In Robotic Environment

19 Apr 2018

8 (3,150 )

Cloud Computing: Analysis of Cloud Storage In Robotic Environment Tushar Gupta Sunil Yadav   Abstract— Cloud is a well-designed data storage model concerned with the storage of information on the web. Such storage has greatly revolutionized the robotic environment for learning purpose. This paper provides an overview of how databases in cloud deliberate to store knowledge fabricated by both robots and human in a ...

Click here to read more arrow

Image Quality Assessment Techniques Using Gabor Filters

19 Apr 2018

6 (2,015 )

A SURVEY ON IMAGE QUALITY ASSESSMENT TECHNIQUES USING GABOR FILTERS Deepa Maria Thomas, S. John Livingson   (DEEPA MARIA THOMAS, ROOM NO 303, DMR RESIDENCE, KARUNYA LADIES HOSTEL, KARUNYA UNIVERSITY, COIMBATORE-641114) Abstract-Image quality assessment has a very important role, especially because the impact that the quality of images have on a viewer is significant. This makes it important that visual information is assessed for ...

Click here to read more arrow

Power Line Communication: a Green Computing

19 Apr 2018

4 (1,561 )

Varsha Mohite Tejas Kandgaonkar ABSTRACT After evolution of wireless technology, classical Public Switched Telephone Network (PSTN) suffered through the drastic change. As a result of it, approximate 80-90% wired telephone networks are replaced by wireless network. But due to wireless network humans are nowadays facing various problems such as sleep disturbances, heart palpitations, migraines, and general poor health due to electromagnetic radiations. So there ...

Click here to read more arrow

Dentitic Cell and Immune Networks Algorithm Comparison

19 Apr 2018

8 (2,890 )

A Comparative study of Dentitic cell and immune networks algorithm for Artificial immune networks. Jaspreet kaur, Kamal Kumar   Abstract – Artificial immune systems are the systems used for advanced computational systems for the need of robust and secure functioning of computer systems. They are the systems inspired by the human immune systems in the human immunity save the body from external threats. We ...

Click here to read more arrow

Privacy Supportive Geo-Location Search Software

19 Apr 2018

8 (3,031 )

Devika BV   1 Introduction 1.1 Purpose The purpose of this document is to present a detailed description of the Locating Service Similarity with Privacy using queries. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli. 1.2 ...

Click here to read more arrow

Cactus Stack Approach with Dijkstra’s Algorithm

19 Apr 2018

7 (2,795 )

Advance Dijkstra’s Algorithm with Cactus Stack Implementation Logic Idea Proposed for the Cactus Stack Approach with Dijkstra’s Algorithm Palak Kalani Nayyar Khan   Abstract— This paper illustrates a possible approach to reduce the complexity and calculation burden that is normally encountered in the Shortest Path Problems. We intend to give a new concept based on the look ahead values of the input nodes given ...

Click here to read more arrow

Intelligent Public Transport System Design

19 Apr 2018

8 (3,180 )

An Intelligent Public Transport System for Smart City Gurnoor Walia, Kuljit Kaur   Abstract -- Road safety has changed into a main subject for governments and automobile manufacturers in the last decade. The advancement vehicular technologies has privileged researchers, institutions and companies to target their efforts on improving road safety. new kinds of networks, such as for instance Vehicular Ad Hoc Networks (VANETs), have ...

Click here to read more arrow

Server Architectures of Existing Presence Services

19 Apr 2018

7 (2,414 )

In this section, we describe the system model, and the search problem. Formally, we assume the geographically distributed presence servers to form a server to-server overlay network, G = (V,E), where V is the set of the Presence Server (PS) nodes, and E is a collection of ordered pairs of V . Each PS node ni ∈ V represents a Presence Server and an element of ...

Click here to read more arrow

Concepts in Differential Privacy

19 Apr 2018

5 (1,649 )

Abstract Stored data in search log is insecure process to the search engine. Search log contains extremely sensitive data, as evidenced by the AOL incident. To Store information in the search log is identify the behavior of user. To maintain this sensitive data is risky process, because some security methods containing the drawbacks. Search engine companies provide security for search logs, in some cases intruder identifies ...

Click here to read more arrow

Privacy-handling Techniques and Algorithms for Data Mining

18 Apr 2018

3 (941 )

VIVEK UNIYAL ABSTRACT Data mining can extract a previously unknown patterns from vast collection of data. Nowadays networking, hardware and software technology are rapidly growing outstanding in collection of data amount. Organization are containing huge amount of data from many heterogeneous database in which private and sensitive information of an individual. In data mining novel pattern will be extracted from such data by which ...

Click here to read more arrow

HDFC Bank: Securing Online Banking

18 Apr 2018

8 (3,013 )

James Rapp Managing Information Security in Information Systems   Summary The importance of banking online has grown enormously in the past decade. Making for more profit and better convenience it is not likely to fade away anytime soon. This also presents some new hurdles for the online banking community. As the number of banking online customers increases the amount of criminal attacker will also ...

Click here to read more arrow

Enhanced Frame-based Video Coding

18 Apr 2018

9 (3,288 )

Abstract- This paper displays the improved edge based feature coding plan. The info source feature to the improved edge based feature encoder comprises of a rectangular-size feature and states of subjectively molded questions on feature outlines. The rectangular edge composition is encoded by the ordinary casing based coding method and the feature object's shape is encoded utilizing the form based vertex coding. It is conceivable to ...

Click here to read more arrow

Architecture for Secure IPv4/IPv6 Address Translation

18 Apr 2018

8 (2,978 )

An Integrated Architecture for Secure IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks Amutha J, Meenakshi Sundaram R, Albert Rabara S3   Abstract. An All-IP network is probably getting highly feasible since all applications and services in the telecommunication are already getting IP enabled. Internet Protocol version 6 or IPv6, is a later version of IP suite as it is designed to handle the ...

Click here to read more arrow

Improving the Performance of Overbooking

18 Apr 2018

7 (2,792 )

Improving the Performance of Overbooking by Application Collocate Using Affinity Function ABSTRACT: One of the main features provided by clouds is elasticity, which allows users to dynamically adjust resource allocations depending on their current needs. Overbooking describes resource management in any manner where the total available capacity is less than the theoretical maximal requested capacity. This is a well-known technique to manage scarce and valuable resources ...

Click here to read more arrow

Study of Document Layout Analysis Algorithms

18 Apr 2018

5 (1,831 )

Relative Study of Document Layout Analysis Algorithms for Printed Document Images Divya Kamat, Divya Sharma, Parag Chitale, Prateek Dasgupta   ABSTRACT In the following survey paper, the different algorithms that could be used for document layout analysis have been studied and their results have been compared. For the removal of image mask, Bloomberg’s algorithm and CRLA have been described. For the purpose of text ...

Click here to read more arrow

An Architecture for Source Code Protection

18 Apr 2018

5 (1,819 )

Abstract—Due to great competition in software industry the source code and binaries have to be protected. Source code available in plain form could be easily stolen and launched on any computer using IDE. We will discuss a protocol that will be used in both (single user and teaming environment) in order to provide source code protection. This would be achieved though authentication, authorization, encryption/decryption and hashing. ...

Click here to read more arrow

Techniques to Extract Topical Experts in Twitter: A Survey

18 Apr 2018

9 (3,242 )

Techniques to Extract Topical Experts in Twitter: A Survey Kuljeet Kaur, Jasminder Singh   ABSTRACT An Online Social Network (OSN) such as Facebook, Twitter, Google+ etc. socially connects users around the world. Through these social media platforms, users generally form a virtual network which is based on mutual trust without any personal interaction. As more and more users are joining OSNs, the topical expert ...

Click here to read more arrow

Distance Measurement Using RSSI Method in WSN

18 Apr 2018

7 (2,751 )

Distance Measurement Using RSSI Method in Wireless Sensor Networks Akhand Pratp Singh, Devesh Pratap Singh, Santosh Kumar   Abstract. RSSI method gives distance measurement between beacon nodes and unknown node. RSSI is Range-based localization depends on the assumption that the absolute distance between a sender and a receiver can be estimated by one or more features of the communication signal from the sender to ...

Click here to read more arrow

Reversible Data Hiding on Color Images

18 Apr 2018

7 (2,619 )

REVERSIBLE DATA HIDING ON COLOR IMAGES USING DIFFERENCE HISTOGRAM MODIFICATION Subash David A    Abstract: Data embedding is done by processing these selected coefficients of the modified subband histograms. We present a high capacity reversible watermarking scheme using the technique of difference & average value coefficients of image blocks by using the tool Matlab. This scheme takes advantage of difference & average value coefficients, ...

Click here to read more arrow

Higher Quality Input Phrase To Driven Reverse Dictionary

18 Apr 2018

9 (3,594 )

Implementing a Higher Quality Input Phrase To Driven Reverse Dictionary E.Kamalanathan and C.Sunitha Ram ABSTRACT Implementing a higher quality input phrase to driven reverse wordbook. In contrast to a conventional forward wordbook, that map from word to their definitions, a reverse wordbook takes a user input phrase describing the specified construct, and returns a group of candidate words that satisfy the input phrase. This work ...

Click here to read more arrow

Improving the Efficiency of Semantic Based Search

18 Apr 2018

8 (2,935 )

An Effective Approach to Improve the Efficiency of Semantic Based Search Merlin Ann Roy   ABSTRACT: The incredible progress in the size of data and with the great growth of amount of web pages, outdated search engines are not suitable and not proper any longer. Search engine is the best significant device to determine any information in World Wide Web. Semantic Search Engine is ...

Click here to read more arrow

Information Retrieval from Large Databases: Pattern Mining

18 Apr 2018

8 (2,982 )

Efficient Information Retrieval from Large Databases Using Pattern Mining Kalaivani.T, Muppudathi.M   Abstract With the widespread use of databases and explosive growth in their sizes are reason for the attraction of the data mining for retrieving the useful informations. Desktop has been used by tens of millions of people and we have been humbled by its usage and great user feedback. However over the ...

Click here to read more arrow

Conditional Statement Strategies for Code Obfuscation

18 Apr 2018

7 (2,425 )

Chandan Kumar Behera, Pawan Kumar, D. Lalitha Bhaskari   Abstract Obfuscated code syntax has been set intentionally unclear. Different obfuscation techniques may have different impacts on the source code. In the presented paper, the ‘if condition’ has been used several times with the purpose to make the code obfuscated one, but in the mean time, the code should look like very simple. The idea ...

Click here to read more arrow

Security Metrics Maturity Model for Operational Security

18 Apr 2018

7 (2,708 )

CHAPTER ONE: Introduction In this chapter, the key concepts and definitions by well known security authorities on security metrics is introduced and discussed. Then the issues and motivation that brings about this research topic is explained. Thereafter, the end result which is the objectives is put forth. To achieve these objectives, the goals are briefly outlined. There is also a section that explains the scope of ...

Click here to read more arrow

Understanding Linear Cryptanalysis

18 Apr 2018

14 (5,219 )

Dipanjan Bhowmik Abstract The objective of this paper is to provide a better understanding of the Linear Cryptanalysis Attack developed by M.Matsui [2]. This paper has been written after going through noted literature in this field and has been structured in such a way that a beginner in this field would be able to understand the idea with little prior knowledge. The paper describes a simple ...

Click here to read more arrow

Big Data as an e-Health Service

18 Apr 2018

7 (2,480 )

Abstract: Bigdata in healthcare relates to electronic health records, patients reported outcomes all other data sets.It is not possible to maintain large and complex data with traditional database tools. After many innovation researches done by researchers Big Data is regenerating the health care, business data and finally society as e-Health .The study on bigdata e-health service. In this paper we come to know why the current ...

Click here to read more arrow

Data Processing in Big Data Centres Cost Reduction Approach

18 Apr 2018

6 (2,144 )

A Cost Reduction Approach for Data Processing in Big Data Centers R. Reni Hena Helan   ABSTRACT- The tremendous development in cloud data processing leads to the high load on computation, storage and communication in the data storage centers, which influence the data center providers to spend a considerable expenditure in data processing. There are three features leading to this increased expenditure, ie., job allotment, ...

Click here to read more arrow

Run Time Adaptation of Service Feedback Control

18 Apr 2018

6 (2,256 )

Runtime Adaptation of Service With Feedback Control Self Optimization T.Priyaradhikadevi, R.Anandhi   Abstract In a composite service which needs to be in uncertain and changing optimized environment which have service selection along with runtime adaptation. For maximum satisfaction for stakeholders quality and requirement needs for adapting composite services which responds to various environments. Service selection and business process for quality preference that made statistics during ...

Click here to read more arrow

Replica Synchronization in Distributed File System

18 Apr 2018

7 (2,614 )

J.VINI Racheal ABSTRACT - The Map Reduce framework provides a scalable model for large scale data intensive computing and fault tolerance. In this paper, we propose an algorithm to improve the I/O performance of the distributed file systems. The technique is used to reduce the communication bandwidth and increase the performance in the distributed file system. These challenges are addressed in the proposed algorithm ...

Click here to read more arrow

A Survey on Ranking in Information Retrieval System

18 Apr 2018

6 (2,344 )

Shikha Gupta Abstract Available information is expanding day by day and this availability makes access and proper organization to the archives critical for efficient use of information. People generally rely on information retrieval (IR) system to get the desired result. In such a case, it is the duty of the service provider to provide relevant, proper and quality information to the user against the ...

Click here to read more arrow

Behavior of Packet Counts for Network Intrusion Detection

18 Apr 2018

4 (1,463 )

Statistical Behavior of Packet Counts for Network Intrusion Detection Abstract— Intrusions and attacks have become a very serious problem in network world. This paper presents a statistical characterization of packet counts that can be used for network intrusion detection. The main idea is based on detecting any suspicious behavior in computer networks depending on the comparison between the correlation results of control and data planes in ...

Click here to read more arrow

Cloud Computing Service Level Agreement and Governance

18 Apr 2018

10 (3,789 )

Service Level Agreement and Governance for Cloud Computing The contractual side of a service level agreement (SLA) and governance for cloud computing Ali Raslan   Abstract In the world of information technology (IT), cloud computing has been the futuristic concept of modern computing for the last decade or more. Nevertheless, in the last few years this concept has become the mainstream. However, with the ...

Click here to read more arrow

Making Renewable Energy SMART using Internet of Things (IOT)

18 Apr 2018

6 (2,023 )

Manuj Darbar, Kripa Shankar Pathak, Rajesh Goel   Abstract: The paper highlights the cooperative behaviour of Multi agent systems by combining various renewal energy sources and then feeding the power to the grid. The process uses 6LoWPAN protocol to communicate with each other and C-ARTAGO's interface control with Guarde properties to intelligently manage the demand and supply. Keywords: SMART Grids, Renewal Energy sources, IoT. ...

Click here to read more arrow

Impact of Computer Technology on Modern Society and Culture

18 Apr 2018

8 (2,810 )

Establishing the Foundations of Modern Computer Systems In 1812, mathematics professor Charles Babbage laid the foundations of modern computing when he recognised the relation between machines and mathematics, machines performed tasks repeatedly without making mistakes, while mathematics often requires the repetition of particular tasks or steps. Ten years after making his discovery Babbage began the development of a machine that would have been the first general-purpose ...

Click here to read more arrow

Pinpoint Colluding Attackers for Software-as-a-Service Cloud

18 Apr 2018

8 (2,848 )

Abstract- Software as a Service (SaaS) is a distribution model of software in which service provider or vendor develops applications and these are accessible by the customers over a network. SaaS clouds are vulnerable to malicious attacks because of their sharing nature. IntTest, service integrity attestation framework has been anticipated and it uses a novel integrated attestation graph analysis scheme to pinpoint attackers. But IntTest has ...

Click here to read more arrow

Adaptive User Interface Framework: Android Mobile Platform

18 Apr 2018

8 (2,915 )

Mr. Tulip Das Abstract—Adapting a graphical interface (GUI) to a range of resources with completely different capabilities is exciting topic of mobile computer. The user interface created for an application ought to modification its layout and parts to the user need and changes for every user. We propose a framework for mobile applications to form the user interfaces adaptable for user. This identifies an ...

Click here to read more arrow

Strategies of Privacy: Managing Constant Query Evaluation

10 Apr 2018

4 (1,477 )

STRATEGIES OF PRIVACY FOR MANAGING CONSTANT EVALUATION OF QUERIES ABSTRACT: The problems of data confidentiality are fetching more and more significant and not easy to handle. While preserving database confidentiality or else privacy of the individuals concerned, we require assuring that database makes available as informative answers to needy. The design as well as functioning of a database would be constructed in an approach that will ...

Click here to read more arrow

Secure Data Retrieval Based on Hybrid Encryption

09 Apr 2018

7 (2,691 )

SECURE DATA RETRIEVAL BASED ON HYBRID ENCRYPTION FOR DISRUPTION-TOLERANT NETWORK Kollipara Durgesh, Dr.P. Sriramya   I. ABSTRACT Military network is one of the most important network in any country but this network mostly suffers from intermittent network connectivity because of the hostile region and the battlefield. To solve the network problem faced by the military network we use Disruption-tolerant network (DTN) technologies which is widely becoming ...

Click here to read more arrow

Optimizing Cloud Resources Implementation of IPTV Service

09 Apr 2018

8 (2,984 )

Optimizing Cloud Resources Implementation of IPTV service delivery through Virtualization MOHAMMAD ISMAIL Abstract- The Internet Protocol Television is a system over which Internet television services are delivered using the networking and architecture methods of the Internet Protocol Suite through a packet-switched network infrastructure, e.g., the Internet and broadband Internet access networks, rather of being delivered over traditional radio frequency broadcast, satellite signal, and cable ...

Click here to read more arrow

Review of Binding Updates Security in MIPv6

09 Apr 2018

8 (2,965 )

Avishek Dutta & Vikram Raju R.   Abstract— Mobile Nodes (MN) in Mobile IPv6 (MIPv6) are given the opportunity to eliminate triangle routing that is inefficient with their own corresponding node (CN) using Route Optimization (RO). This greatly improves the performance of the network. Unfortunately, using this method allows several security vulnerabilities to manifest itself with the MIPv6. Among those, common issues are those concerns the verification ...

Click here to read more arrow

Cache Manager to Reduce the Workload of MapReduce Framework

09 Apr 2018

8 (3,091 )

Provision of Cache Manager to Reduce the Workload of MapReduce Framework for Bigdata application Ms.S.Rengalakshmi, Mr.S.Alaudeen Basha Abstract: The term big-data refers to the large-scale distributed data processing applications that operate on large amounts of data. MapReduce and Apache’s Hadoop of Google, are the essential software systems for big-data applications. A large amount of intermediate data are generated by MapReduce framework. After the completion of the task ...

Click here to read more arrow

Nucleus Real Time Operating System

09 Apr 2018

5 (1,724 )

What is Real Time OS? An ongoing working framework (RTOS) is a working framework (OS) proposed to serve constant application process information as it comes in, ordinarily without buffering postponements. Preparing time necessities (counting any OS deferral) are measured in tenths of seconds or shorter. NUCLEUS RTOS: INTRODUCTON: The Nucleus RTOS is conveyed in more than 3 billion gadgets and gives a profoundly versatile small scale ...

Click here to read more arrow

Cells Breaks the Tor’s Anonymity: Onion Router

09 Apr 2018

8 (2,941 )

Ms. S.SIVARANJANI   Ms. R.BACKIYALAKSHMI B.E, M.Tech.,   Abstract - To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells. A new cell-counting attack against Tor allows the attacker to confirm anonymous communication relationship among users very ...

Click here to read more arrow

Overview of Cryptography and Encryption Techniques

09 Apr 2018

5 (1,687 )

What is cryptography Cryptography is the discipline of cryptography and cryptanalysis and of their interaction. The word “cryptography” is derived from the Greek words “Kryptos” means concealed, and “graphien” means to inscribe. It is the science of keeping secrets secret. One objective of cryptography is protecting a secret from adversaries. Professional cryptography protects not only the plain text, but also the key and more generally tries ...

Click here to read more arrow

E-Business Distribution Systems and Value Strategies

09 Apr 2018

5 (1,919 )

Srishti Mittal   What is a "business portal?" Ans. The term business portal is used to describe a feature on a company website that allows authorized users to access restricted content or information. This tool is growing in popularity, as it provides a single gateway for staff to access different applications. Some of the most common features of a business portal include ...

Click here to read more arrow

Modified Insertion Sort Algorithm: Binary Search Technique

09 Apr 2018

11 (4,075 )

Modified Insertion Sort Algorithm with Binary Search Technique: Application to Ranking of Images Retrieved by CBIR M. K. I. Rahmani M. A. Ansari Abstract—Due to the abundance of the high quality digital images in image repositories of very huge size on the ever growing Internet by enterprise houses, research institutions, medical & healthcare organizations and academic institutions etc., finding a set of useful images ...

Click here to read more arrow

Ethical Analysis of Children on the Internet

09 Apr 2018

10 (3,682 )

Children on the Internet Abeer AlSouly Ghada AlFantookh  Naima AlRashed Overview: Many people may consider the Internet as the greatest invention ever created by man. No doubt about that if we talked about how fast knowledge exchanging has become today, or how easy can people communicate with each other globally. Also children nowadays practice many activities on the Internet; the most popular ones are schoolwork, social networking ...

Click here to read more arrow

User Interface: Complexity, Types and Performance

09 Apr 2018

4 (1,552 )

User interface complexity A user interface is the means in which a person controls a software application. A user interface should provide the user with an easy experience, allowing them to interact with the software in a stress-free and natural way. The GUI (graphical user interface) is a program that contains graphical controls which the user can select with a keyboard or mouse. “The GUI complexity ...

Click here to read more arrow

Reengineering and Code Migration Strategies

09 Apr 2018

6 (2,019 )

GENERAL The most important quality of software reengineering is to improve or transformation of an existing software system so that it can be understood, controlled and user-friendly. Software is used to replace high software maintenance cost of the legacy systems. So software reengineering is more beneficial for recovering and reusing existing software assets, putting high software maintenance costs under control. It also establishes a base for ...

Click here to read more arrow

Concepts and Applications of Deep Learning

09 Apr 2018

5 (1,619 )

Abstract: Since 2006, Deep Learning, also known as Hierarchal Leaning has been evolved as a new field of Machine Learning Research. The deep learning model deals with problems on which shallow architectures (e.g. Regression) are affected by the curse of dimensionality. As part of a two-stage learning scheme involving multiple layers of nonlinear processing a set of statistically robust features is automatically extracted from the data. ...

Click here to read more arrow

Development of App for Gaming

09 Apr 2018

10 (3,893 )

Chapter 4 RESULTS AND DISCUSSION This section will demonstrate the after effects of distinctive devices utilized as a part of presentation, investigation and understanding of the outcome in assessment. Tables are likewise included in the section for effortlessly comprehension of the contrast between the current and the proposed programming. 1. Entities used in the proposed software An entity is a thing of enthusiasm to an association ...

Click here to read more arrow

Healthcare Technology and Big Data

09 Apr 2018

5 (1,714 )

Introduction As technology advances, medical devices are able to record increasing amounts of information. These devices are also becoming much more assessable to consumers than in the past. In Adam Tanner’s article “Health Entrepreneur Debates Going To Data’s Dark Side,” he discusses the company Safe Heart. Safe Heart is developing medical devices for consumer use. These devices are able to measure values like blood oxygen saturation, ...

Click here to read more arrow

Water Meter Data Management System Analysis

09 Apr 2018

4 (1,486 )

SYSTEM ANALYSIS EXISTING SYSTEM The conventional billing system for water usage involves person visits each residential and read the meter data manually. The collected data are used for billing purpose. Manual readings can cause error and can lead to corruption. Thus the billing system can become inaccurate and inefficient. There are chances of leaks and theft which could not be identified. ...

Click here to read more arrow

Google Drive: Functions, Security and Applications

09 Apr 2018

6 (2,385 )

Table of Contents (Jump to) Introduction What is Google Drive and its function? How to start with Google Drive? How secure is Google Drive? How do people use Google Drive? What is the maximum upload limit of Google Drive and supported files? What is Google Drive’s storage plan pricing? What are Google Drive’s compatible Operating Systems? Conclusion References Introduction In addition to the development velocity of ...

Click here to read more arrow

Improving Structure and Links for User Navigation Session

09 Apr 2018

6 (2,314 )

Improving Structure and Links for Analysis of User Navigation Sessions Bhagyashri Biranje, Priti Harpale, Dushyant Singh, Meenal Jadhav, Sindhu M.R.   ABSTRACT In this paper, we are designing a well-structured website to facilitate effective user navigation to relink webpages to improve navigability using user navigation data. We will completely reorganized new structure of a website, which can be highly unpredictable. It will also illustrate how ...

Click here to read more arrow

Overview of Crawlers and Search Optimization Methods

09 Apr 2018

7 (2,477 )

With the explosive growth of knowledge sources out there on the planet Wide internet, it's become progressively necessary for users to utilize automatic tools in the notice the specified data resources, and to trace and analyze their usage patterns. Clustering is worn out some ways and by researchers in several disciplines, like clump is done on the premise of queries submitted to look engine. This paper provides an ...

Click here to read more arrow

Automated Protocol to Restrict Password Guessing Attacks

09 Apr 2018

9 (3,397 )

D.Ganesh Dr.V.V.RamaPrasad   ABSTRACT- Password login services are now widespread and ever increasing. Attacks that take place on password-only remote login services are brute force and dictionary attack. Providing convenient login for legitimate user.In the proposed system we use Password Guessing Resistant Protocol (PGRP) which improves more security by restricting the number ...

Click here to read more arrow

Risks and Challenges to Young People on the Internet

09 Apr 2018

7 (2,797 )

Children on the Internet   Dalia Alhejji Nada Alzahrani   Overview: Nowadays, the internet has become a fundamental facial expression of our lives over recent epoch years and it's becoming integral part of our life also it's considered as an increasing role of today's culture , especially for children and ...

Click here to read more arrow

Security Issues of Social Networking Sites

09 Apr 2018

7 (2,513 )

C. Divya Gowri, K. Rajalakshmi, PG Scholar, S.Suresh Abstract--Social Networking Sites (SNS) are a platform to build social relationship or social networks among people. It is web-based service which allows people to create public profiles; it is similar to online community. The only difference is social network service is individual centred whereas online community is group centred. It groups the individuals into specific groups ...

Click here to read more arrow

CRM Implementation in SME Sector: Case Study of Mobile Use

09 Apr 2018

8 (2,996 )

CRM Implementation in SME Sector: Case Study of Mobile Usage in INDIA Prof. (Dr.) Subhash Desai A B S T R A C T Through 2004/05, enterprise CRM has re-emerged as a non-discretionary initiative, focused on business transformation and revenue attainment. CRM business processes and the CRM technology are to achieve value-based customer life-cycle patterns. The efforts needed for a successful CRM are iterative in nature. ...

Click here to read more arrow

Development of Online eResume with Job Portal

09 Apr 2018

12 (4,722 )

7.3.3 Sequence diagram for Employer Figure No. 7.3.2: Sequence diagram for Employer This sequence starts with Employer authenticating into the system. After successful authenticating, Employer will login to Job Portal. Employer can post jobs in job portal and display in main page. And Employer can view the user profile who applied for that job. 7.4 ACTIVITY DIAGRAM An activity diagram represents the work flow of ...

Click here to read more arrow

AIS-MACA- Z: MACA based Clonal Classifier for Splicing Site

09 Apr 2018

5 (1,996 )

AIS-MACA- Z: MACA based Clonal Classifier for Splicing Site, Protein Coding and Promoter Region Identification in Eukaryotes Pokkuluri Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N    Abstract Bioinformatics incorporates information regarding biological data storage, accessing mechanisms and presentation of characteristics within this data. Most of the problems in bioinformatics and be addressed efficiently by computer techniques. This paper aims at building a classifier based ...

Click here to read more arrow

Emotion Recognition From Text-a Survey

09 Apr 2018

10 (3,769 )

Ms. Pallavi D. Phalke , Dr. Emmanuel M. ABSTRACT Emotion is a very important facet of human behaviour which affect on the way people interact in the society. In recent year many methods on human emotions recognition have been published such as recognizing emotion from facial expression and gestures, speech and by written text. This paper focuses on classification of emotion expressed by the online ...

Click here to read more arrow

Ant Colony Optimization Algorithm

09 Apr 2018

4 (1,486 )

To solve the planning problem, we proposed an ACO algorithm with further designed. ACO builds solutions in a step-by-step manner and enables the use of problem-based heuristics to guide the ants to search the way; it is possible to design heuristics are useful to direct the ants to schedule the critical tasks as early as possible and to assign the project tasks to suitable employees with ...

Click here to read more arrow

Improving Effectiveness and Efficiency of Sentiment Analysis

09 Apr 2018

4 (1,409 )

Modha Jalaj S. Chapter – 1 1. Introduction: Big Data has been created lot of buzz in Information Technology word. Big Data contain large amount of data from various sources like Social Media, News Articles, Blogs, Web, Sensor Data and Medical Records etc. Big Data includes Structured, Semi-Structured and Unstructured data. All these data are very useful to extract the important information for analytics. 1.1 Introduction ...

Click here to read more arrow

GDI Security Policy Document

09 Apr 2018

7 (2,408 )

  1.0 Introduction This security policy document offers a sufficient summary of the state of security concerns with the herein mention corporation and no alteration of the information contained herein is allowed without the consent of the Global Distribution Inc. The document offers a brief outlay of the corporation and the structures of its state of security as well as propositions set in order to ensure ...

Click here to read more arrow

How to Write a Research Dissertation/Thesis

09 Apr 2018

6 (2,225 )

How Research is to be written and presented Research writing Research writing is a major factor of success for any student, scholar or anyone interested in the pursuit of knowledge as a research paper can be used to identify and explore scientific, historical, technical, political, social, and any other issues that affects man and his society. It presents the information and indicates where the information is ...

Click here to read more arrow

Determining Attributes to Maximize Visibility of Objects

09 Apr 2018

7 (2,686 )

A Critique on Determining Attributes to Maximize Visibility of Objects Muhammed Miah Gautam Das Vagelis Hristidis Heikki Mannila Vidisha H. Shah 1. Summary of the published work Das, Hristidis, and Mannila (2009, p. 959) discussed about the ranking function and top k retrieval algorithms that helps user (potential buyers to search for the required product from the available catalog. The problem is how a user (potential ...

Click here to read more arrow

Database System Development Exam

09 Apr 2018

9 (3,548 )

Adam Warsame Course: FDSc Computing Module Title: Database Systems Assignment Title: Database Systems Assessment     Introduction The task for this assignment is to develop a database for a local garden centre. To understand the system better and what way it should operate; it was a good idea to review other examples of databases online. From these reviewed examples, was able to gather a rough understanding ...

Click here to read more arrow

Winds of Change: From Vendor Lock-in to the Meta Cloud

09 Apr 2018

4 (1,394 )

Introduction: A software requirement specification is a complete explanation of the system that is to be created. Software requirement specification includes non-functional and functional requirements. Use case technique can be used in prepared to identify the functional requirements of the software inventions. Non-functional requirements are requirements which force constraints on the implementation and design. As systems grew more complex, it becomes more apparent that the goal ...

Click here to read more arrow

Survey on Spatial Database Systems

09 Apr 2018

4 (1,525 )

 Abstract—In this survey, the term of “spatial database”, its data models, its data types with implementations, and its management techniques are described with providing at least spatial join methods. Also the storage and query processing algorithms for such databases are surveyed. (Abstract section will be updated with final report) 1.Introduction Various fields need various data types such as character, number, date, time, and image ...

Click here to read more arrow

Reducing Communication and Processing Overhead

09 Apr 2018

7 (2,792 )

RACE: Reducing Communication And Processing Overhead And Ensuring Security Milu Sayed Liyamol Aliyar   Abstract— RACE, Report based payment scheme for multi-hop wireless network. Race is a secure incentive protocol which used for the multi-hop wireless network, helps packet transmission and enforce fairness. The protocol uses the concept of evidences and the regularity of the nodes. The trusted party evaluates the nodes competence and ...

Click here to read more arrow

OpenMP Based Fast Data Searching with Multithreading

09 Apr 2018

8 (2,826 )

V.Karthikeyan, Dr. S.Ravi and S.Flora Magdalene   Abstract The multiprocessor cores with multithreaded capability are continuing to gain a significant share and offer high performance. The use of OpenMP applications on two parallel architectures can identify architectural bottlenecks and introduces high level of resource sharing in multithreading performance complications. An adaptive run-time mechanism provides additional but limited performance improvements on multithreading and is maximized the efficiency of ...

Click here to read more arrow

Email Protocol: SMTP, POP, and MIME

05 Apr 2018

6 (2,386 )

Email protocol governs the interactions between email clients and servers. An Email protocol is a standard method which is used at each end of a communication channel either server side or client side, in order to transmit information properly. User is required to use a mail client to access to the mail server, by using variety of email protocols, the mail client and server can only ...

Click here to read more arrow

Analysis of Tools for Data Cleaning and Quality Management

05 Apr 2018

5 (1,604 )

Data cleaning is needed in process of combining heterogeneous data sources with relation or tables in databases. Data cleaning or data cleansing or data scrubbing is defined as removing and detecting errors along with ambiguities existing in files, log tables. It is done with the aim to improve quality of data. Data quality and data cleaning are both related terms. Both are directly proportional to each ...

Click here to read more arrow

Improving Resource Allocation for Data Center Overbooking

05 Apr 2018

7 (2,637 )

M.Ponmani Bharathi, C.Sindhuja, S.Vaishnavi, Ms.A.Judith Arockia Gladies Abstract Overbooking becomes feasible because user applications tend to overestimate their resources and requirements, that tends to utilize only a fraction of the allocated resources. Overbooking has to be carefully planned in order not to impact application performance. Resource utilization and Data centres utilization can be used in this overbooking scheduler. Data send can send from ...

Click here to read more arrow

System to Filter Unwanted Messages from OSN User Walls

05 Apr 2018

9 (3,247 )

M.Renuga Devi, G.Seetha lakshmi, M.Sarmila Abstract—One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. To fill the gap, in this paper, we propose a system allowing OSN users to have a ...

Click here to read more arrow

Acoustic Cryptanalysis of RSA and Its Counter Measure

05 Apr 2018

6 (2,362 )

Prof. J P Agrawal Saurabh Sharma Siddharth Gupta ABSTRACT Acoustics has come up as a new vulnerability in the field of information security. The RSA encryption algorithm, although h very hard to break mathematically, has been broken recently by using acoustics and power analysis of emanations. Acoustic Cryptanalysis is the side-channel attack which targets implementations of cryptographic algorithms. The cryptographic algorithms are quite secure ...

Click here to read more arrow

Smart Prepaid Energy Meter Using GSM Module

05 Apr 2018

8 (2,810 )

KISHORE KUMAR K   GAYATHRI N   RAJESH KUMAR V T   Abstract This paper aims at proposing a system that reduces the power loss and power theft due to illegal activities. This framework embraces another strategy known as "prepaid power". The GSM module is utilized so that ...

Click here to read more arrow

Techniques for Understanding Human Walking Motion

05 Apr 2018

5 (1,636 )

  Introduction Multimedia is a term that collectively describes a variety of media content available in various forms of text, speech, audio, still images, video, animation, graphics, 3D models and combinations of them used to capture real time moments. Over the recent years the technological advances have enabled wide availability and easy access of multimedia content and much research was dedicated to perform automated computational tasks ...

Click here to read more arrow

Vulnerability Assessment and Penetration Testing Comparison

05 Apr 2018

6 (2,061 )

Jignesh C Doshi Bhushan Trivedi ABSTRACT Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any organizations as result of increasing attacks. There exists different approaches to mitigate various security risks are defensive coding, hardening (Firewall), Monitoring and auditing. This solutions found more towards prevention of attacks or of monitoring types ...

Click here to read more arrow

Smartphone Operating Systems: Evaluation & Enhancements

05 Apr 2018

10 (3,688 )

Muneer Ahmad Dar Javed Parvez Abstract—The increasing number of mobile operating systems that operates the small hand held devices called the Smartphone, has become integral part of our lives. The openness of these new environments has lead to new domain of apps and markets and has enabled greater integration with existing online services like e-banking etc. Smartphone makers are competing in turns to trump ...

Click here to read more arrow

Concepts and Research into Green Networking

05 Apr 2018

6 (2,263 )

Green Networking Abstract: Saving of excessive energy consumption is becoming a key concern in networking, because of theprobable economical benefits. These concerns, usually argued to as “green networking”, relate to inserting energy-awareness in the strategy, in the devicesand in the protocols of networks. In this work, I first formulate a more precise definition of the “green” attribute. I further more classify a few standards that are ...

Click here to read more arrow

Load Balancing as an Optimization Problem: GSO Solution

05 Apr 2018

6 (2,358 )

METHODOLOGY INTRODUCTION In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is employed to solve the above mentioned optimization problem. In the proposed method, excellent features of various existing load balancing algorithms as discussed chapter 2 are also integrated. PROPOSED METHODOLOGY There are numerous cloud computing categories. ...

Click here to read more arrow

Automatic Metadata Harvesting From Digital Content

05 Apr 2018

5 (1,614 )

MR. RUSHABH D. DOSHI, MR. GIRISH H MULCHANDANI Abstract: Metadata Extraction is one of the predominant research fields in information retrieval. Metadata is used to references information resources. Most metadata extraction systems are still human intensive since they require expert decision to recognize relevant metadata but this is time consuming. However automatic metadata extraction techniques are developed but mostly works with structured format. We proposed ...

Click here to read more arrow

Proficient Key Tree Structure for Secure Dynamic Groups

05 Apr 2018

6 (2,400 )

Secure Group Communication ensures forward secrecy and backward secrecy of the data. It is the responsibility of the Group Center (GC) to disallow new members to have access to previous data called backward secrecy and existing members who have left the group to have further access to data called forward secrecy. Forward and backward secrecy can be ensured by updating the keys whenever a join/leave request ...

Click here to read more arrow

Information Security Management Plan

05 Apr 2018

4 (1,456 )

Cyber security is about protecting your computer-based equipment and information from unintended or unauthorised access, change, theft or destruction HM Governement (2015), you can manage the risks by Planning, Implementing and Reviewing your Information Security Management System. The following are the key points of Information and Security Management Plan. Risk Assessment and Analysis - The company should assess the security risks or damages that could be ...

Click here to read more arrow

Stages of Alzheimer's Utilizing Machine Learning Techniques

05 Apr 2018

5 (1,835 )

Abstract: Alzheimer’s disease (AD) is the general type of dementia that affects the elderly population globally. An accurate and early diagnosis of Alzheimer is crucial for the treatment of patients suffering from AD. In this paper, two different classifiers, SVM (Support Vector Machine) and an ANFIS (Adaptive Neuro Fuzzy Inference System) have been employed to classify patients between AD control, mild control and normal control. The ...

Click here to read more arrow

Symmetric Key Utilized for EasySMS Convention

05 Apr 2018

4 (1,552 )

Conceptual SMS (Short Message Service) is a generally utilized correspondence between the end clients. SMS is being utilized as a part of our diverse applications. The Short Message Service (SMS) normally whatever we trade the first configuration, now and then we used to send the some mystery message like our email secret word, pass code and bank watchword. We send SMS is in unique organization, our customary SMS ...

Click here to read more arrow

Mutation Testing by Using Formal Method

04 Apr 2018

9 (3,575 )

Jaspreet Singh Abstract Mutation testing was introduced in 1970’s in the field of software testing as a process of testing the test suites by intentionally seeding errors i.e. mutation operators, into the original program’s source code. Its main purpose is to verify the functionality of the test cases which are executed with the aim of catching the variations between the program and the mutants. ...

Click here to read more arrow

Heterogeneous Wireless Sensor Networks (HWSN) Management

04 Apr 2018

9 (3,482 )

A Key Management & Establishment Scheme in Heterogeneous Wireless Sensor Networks (HWSN) Premamayudu B, Venkata rao K, and Suresh Varma P   Abstract: Key management is the one of the fundamental requirement for securing the hierarchical wireless sensor networks (HWSN) and also prevents adversarial activities. This paper presents a new pairwise key management scheme using matrix for HWSNs. In HWSN, cluster headers are more ...

Click here to read more arrow

Skew Detection of Devanagari Script Using Pixels

04 Apr 2018

9 (3,372 )

Skew Detection of Devanagari Script Using Pixels of Axes-Parallel Rectangle and Linear Regression Trupti A. Jundale Ravindra S. Hegadi   Abstract—Skew detection and correction of handwritten data is one of the difficult tasks in pattern recognition area. Here we illustrate the method for skew detection and correction of Devanagari handwritten script. The proposed approach works for single skew. The input images for this research ...

Click here to read more arrow

Efficient Database Driven Reverse Mapping Dictionary

04 Apr 2018

6 (2,312 )

Building an Efficient Database Driven Reverse Mapping Dictionary ABSTRACT With the enormous availability of words in usage it is always being a challenge to find the meaning. Even the versatile speaker may thrash about finding a meaning for certain unheard words. In such cases they need some source for reference like dictionary. In traditional model for using dictionary, forward concept is implemented where it result in ...

Click here to read more arrow

Asynchronous JavaScript and XML (AJAX)

04 Apr 2018

8 (3,049 )

Anjan Thapaliya Abstract AJAX stands for Asynchronous JavaScript and XML. It is a web technology that evolved in early 2000 and uses a mix of technology like JavaScript and XML. This paper discusses about how AJAX technology works in modern web application and various advantages and disadvantages. This paper also discusses about various frameworks available for AJAX that can be used on different platforms. ...

Click here to read more arrow

Emotion Recognition System for Affective Text

04 Apr 2018

9 (3,474 )

K.Thendral, Dr.S.Chitrakala, S.P.Surendernath   ABSTRACT: Mining social emotions deals with a new aspect for categorizing the document based on the emotions such as happy, sad, sympathy, etc., theyhelp online users to select related documents based on their emotional preferences. Aiming to find the connections between social emotions and affect terms and thus predict the social feeling from text content mechanically. Joint emotion-topic model by ...

Click here to read more arrow

Literature Review of the Industrial Wireless

04 Apr 2018

8 (2,850 )

Industrial wireless infrastructure goes beyond a hand full of WSN in the field sending back information to a localised host system, the broader picture of a truly industrial wireless infrastructure envisages a system where the entire oil and gas facility is integrated wirelessly and all arms of the organisation can wirelessly access data from approved wireless devices from any location in the world. This provides a ...

Click here to read more arrow

Optimization of Benchmark Functions using VTS-ABC Algorithm

04 Apr 2018

9 (3,575 )

Performance Optimization of Benchmark Functions using VTS-ABC Algorithm Twinkle Gupta and Dharmender Kumar Abstract- A new variant based on tournament selection called VTS-ABC algorithm is provided in this paper. Its performance is compared with standard ABC algorithm with different size of data on several Benchmark functions and results show that VTS-ABC provides better quality of solution than original ABC algorithm in every case. Keywords— Artificial Bee Colony ...

Click here to read more arrow
ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now