博電競菠菜平臺 www.rrkuhedt.buzz Abedalhakeem T. E. Issa

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Easy and safe people transportation is a big challenge facing the governments any time anywhere. So roads and Traffic control lie at the heart of the modern civilization. [1] (OTS)

The integration of Geographic Information System (GIS) and Global Positioning System (GPS) technologies together can be achieved by a variety of ways and their applications are numerous [1]. Determining the overall transport monitoring (OTM) is essential issue of integration GPS and GIS.

Transport Monitoring System (TMS), which can efficiently monitor and control the vehicles location, speed, traffic congestion and delay, is emerging in many Intelligent Transportation Management Systems (ITMS) [4]. GIS and GPS technology linked with means of wireless communication are essential to the system for determining the vehicle location and speed and from the data collected by GPS receiver and that stored in Databases we can derived a lot of useful helpful information in monitoring and managing transport. It is required to have a technique to handle the huge amount of spatial data entailed in a digital road map and data that received from the GPS belongs to the coordinates and speed, in order to trace the accurate position within a reasonable time. In this paper, we propose a client/server solution, two integrated databases the first for the spatial data processing and the second is textual as an alternative database to store text coordinates of the spatial data to eliminate the processing time, and a cache method to improve the system performance.

Hide Abstract

Views 
   PDF Download PDF Downloads: 1110



Ravi Kumar H. Roogi

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Cloud computing is a type of parallel distributed computing system that has become a frequently used computer application. Increasingly larger scale applications are generating an unprecedented amount of data. However, the increasing gap between computation and I/O capacity on High End Computing machines makes a severe bottleneck for data analysis. Big data is an emerging paradigm applied to data sets whose size or complexity is beyond the ability of commonly used computer software and hardware tools. Such data sets are often from various sources (Variety) yet unstructured such as social media, sensors, scientific applications, surveillance, video and image archives, Internet texts and documents, Internet search indexing, medical records, business transactions and web logs; and are of large size (Volume) with fast data in/out (Velocity). More importantly, big data has to be of high value (Value) and establish trust in it for business decision making (Veracity). To handle the dynamic nature of big data successfully, architectures, networks, management, mining and analysis algorithms should be scalable and extendable to accommodate the varying needs of the applications. In this paper we propose a big data solution through cloud computing by using divide and conquer technique in parallel distribution system.

Hide Abstract

Views 
   PDF Download PDF Downloads: 729



Sagar S. Nikam*

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Classification is used to find out in which group each data instance is related within a given dataset. It is used for classifying data into different classes according to some constrains. Several major kinds of classification algorithms including C4.5, ID3, k-nearest neighbor classifier, Naive Bayes, SVM, and ANN are used for classification. Generally a classification technique follows three approaches Statistical, Machine Learning and Neural Network for classification. While considering these approaches this paper provides an inclusive survey of different classification algorithms and their features and limitations.

Hide Abstract

Views 
   PDF Download PDF Downloads: 10924



S Venu Gopal1,?N Sambasiva Rao2??

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In a peer to peer system searching a file in each and every node it is very difficult. These days everybody using file sharing, and video streaming. So here while sharing or downloading a file there may be loss of data in the file. To avoid all these problems I proposed a concept providing file surveillance to actively search for files by using query performance in structured peer to peer overlay systems. using querying performance in structured overlay peer to peer systems if any node is leaving dynamically data should not loss.

Hide Abstract

Views 
   PDF Download PDF Downloads: 577



M. A. Deshmukh1, S. S. Chopde 2, S. D. Kalyankar2, V. D. Kele2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Computer Application will optimize solution in dairy industry. Using solution, user has optimized their production in the reducing production cost and unit costs. Computer application/ automation will improve the physical working environment considering the number of monotonous, repetitive tasks to be eliminated or minimize, increasing efficiency in production.Computer application available in the agriculture today, makes it possible to manage a dairy industry on a more detailed level than before. The dairy manager can make more rational decision through acquiring amount of information, the dairy manager has to operate several computers each day and manually transfer data from one unit to another. The paper aims to analyze information feasibility and the application of computer in modern dairy industry, this system as dairy management tools to describe, document and control all processes on dairy production, especially the multi-purpose and multi-agent system application support management of the dairy and provide documentation for entire dairy supply chain members. Customization of IT platforms for use in dairy industry is emerging as a major opportunity for change.

Hide Abstract

Views 
   PDF Download PDF Downloads: 2307



Deepa S

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Query optimization in fuzzy relational databases aims to come out with a minimal execution cost for the available execution strategies.? Each type of cost is estimated by a cost function. All cost functions together with their parameters and assumptions forms a cost model for the fuzzy query optimizer. The cost function usually takes the size of tables as inputs.? It is possible that exact information is not available where by fuzzy data is assumed. Also estimating the nature of different cost models needs to be examined. A fuzzy cost function is used for this purpose which produces a fuzzy value that represents a soft estimate of the real cost while a traditional crisp cost function, produces a hard crisp estimate.

Hide Abstract

Views 
   PDF Download PDF Downloads: 645



Basanth Kumar H B

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

As the propagation of video and image data in digital form has increased, Content Based Image Retrieval (CBIR) has become a prominent research topic. Therefore an important problem that needs to be addressed is fast retrieval of images from large databases. To find images that are perceptually similar to a query image, image retrieval systems attempt to search through a database. CBIR can greatly enhance the accuracy of the information being returned and is an important alternative and complement to traditional text-based image searching. This paper presents an overview on content-based image retrieval.

Hide Abstract

Views 
   PDF Download PDF Downloads: 691



Rashmi M. Tank*1,?Hemant D. Vasava,?Vikram Agrawal

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Security is the important criteria relevant to information in transit as well as in storage. Steganography is the technique of hiding secret message in a cover medium in such a way that only the sender and the intended recipient knows the existence of communication. DNA due to its immense storage capacity and high randomness is used now in the field of steganography. Audio steganography is concerned with hiding information in a cover (host) audio signal in an imperceptible way. In this paper, various techniques using DNA sequences and audio files for data hiding is discussed for secure data transmission and reception. It also proposes highly secure method to hide the existence of secret message to prevent unauthorized access. The proposed method has three levels. Single level of encryption and two levels of steganography are used. The main objective of this method is that no one could be able to find the existence of secret message.??

Hide Abstract

Views 
   PDF Download PDF Downloads: 782



Navneet* and Nasib Singh Gill?

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Various attributes within a dataset relate to each other and with the class attribute. The relationship between the different attributes with class attribute may improve the classification accuracy. The paper introduces CCSA algorithm that performs the clustering that is cascaded by classification based on association. The Clustering process generates a group of various instances within the dataset. These clustered instances are classified by using the association. This paper uses the Apriori association to generate the rules for classification. The technique is analyzed by using the soil data set and various other online available datasets using WEKA. The simulation result using the WEKA shows that reduced rules with the improved classification accuracy as compared to the existing association with classification algorithms.?

Hide Abstract

Views 
   PDF Download PDF Downloads: 645



Rupam Sharma*?and Nidhi Tripathi

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Wireless Sensor Networks (WSNs) consists of low power, low-cost smart devices which have limited computing resources. A lot of real world applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. In this paper, we present a snapshot of the wireless sensor network architecture, security requirements and obstacles of sensor security.

Hide Abstract

Views 
   PDF Download PDF Downloads: 822



Anand Kumar Singh1, Umang Kumar Singh, Mahathi Penmetsa, T. Venkat Narayana Rao2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

AIDE is an idea in advance that only ensures safe navigation, but also lets you link up to the universe. AIDE projects a transparent image into the driver’s field of view which appears to roam out of doors of the windscreen. The icon is centered in the space and then the track remains in focus while the driver looks at the information presented by AIDE. This, combined with touchless gesture control, means that the driver is able to use AIDE without ever holding their eyes off the road. When you synchronize the device with your? Android handset or iPhone and by? placing ?the AIDE onto your car's dashboard. With this we can start communicating with the ?vehicle and other people without ever removing your eyes off the road. It is designed to give? relevant information at a glance and the power to respond to that information with voice and theme song-less gesture controls i.e. ?embedded with IR camera and internal microphone. It grows better ?as it possess ?an accelerometer, an e-compass and ?an ambient brightness sensing element. The device, which is to be designed to run on Android 5.0 ??has transparent HUD display of 5.1-inch and has Wi-Fi and Bluetooth for connectivity. For the touch less controls, in terms of navigating it employs an IR camera , it also includes a GLOAN-ASS, digital compass, accelerometer and ambient brightness sensor. It can also warn us when? car needs to be served next and when? oil needs replacement. This paper present a novel and useful interface for the future automated vehicles and disabled people.

Hide Abstract

Views 
   PDF Download PDF Downloads: 599



Sana Qureshi*, Saima Ayyub Khan, Paresh Rawat

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

For enhancing the high color depth and to provide higher resolution for LCD signal driver. This paper proposes a complementary differential amplifier with offset voltage cancellation technique. In order to improve the offset cancellation ability the complementary differential pairs are separated into main and auxiliary trans conductance amplifiers. This achieves Rail-to-Rail output swing. In the proposed method offset cancellation is achieved by dividing offset cancellation and driving phases with the help of three switches. With this proposed architecture the offset voltage is reduced from 8.9 mV to 0.3 mV, which is a considerable amount of reduction. It is also observed that CMRR and Slew rate are not affected with the proposed technique.

Hide Abstract

Views 
   PDF Download PDF Downloads: 787



Jolly Masih*, Mohit Sharma, Amita Sharma

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The study aimed at understanding the retail industry of UK, its latest trends and performance of different retail sections namely high street retail, supermarkets and online retail. Online editorial media was used to collect data using relevant keywords through data crawlers and Google search for retail studies. It was found that Britain’s high street has faced several problems in past few months like high vacancy rates, parking problems, high rents, and an impact of recession which called for protection of high street as it was considered as a symbol of Britain’s great culture. Customers shopping trend had been changing towards high street and shopping malls and they were inclined towards online shopping due to convenience and time savings. Consumers also believed that shopping out of town lead to long driving time, extra purchases and waste of fuel. Same can also be stated with recent decrease in share of supermarket giants like Tesco & Sainsbury. Vigorous price war was initiated between supermarkets, high street shops and online retail shops. Centre?vacancy rate of high street shops was 10.3% in October and in July's rate was 10.1%. Footfall on?high?streets also fell by 1.4% with a rise of 1.9% for out-of-town shopping centres. Due to convenience in shopping, availability of wide variety and time savings, online retail registered a growth of 15.8% in year 2014 as compared to 2013. Mobile shopping and tablet shopping created a revolution in retail industry and increased the percentage of purchases made by several folds. Keeping this in view present study was an attempt to analyse various factors causing a decline in share of high street and supermarkets and an increased interest in online retail.

Hide Abstract

Views 
   PDF Download PDF Downloads: 641