博電競菠菜平臺 www.rrkuhedt.buzz Shashidhar T Halakatti1,?Shambulinga T Halakatti2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In this paper, the image processing method has been used to recognize traffic sign symbol from the static image. In this paper we have to recognize traffic sign symbol by using single dimension principal component analysis(sdpca).We have focused on traffic sign symbol of triangular shapes .Images are pre processed with several image preprocessing techniques, such as threshold techniques, Gaussian filter and Canny edge detection then the single dimension principal component analysis algorithm stages are performed to recognize the traffic sign symbol.

Hide Abstract

Views 
   PDF Download PDF Downloads: 756



Pramod Kadam,Sachin Kadam

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This paper continues with the initial thought of evolutionary study of sorting problem and sorting algorithms (Root to Fruit (1): An Evolutionary Study of Sorting Problem[1] and Root to Fruit (2): Evolutionary Approach for sorting algorithms)[2] and concluded with a suggestion of creating a framework to manage sorting algorithms related /around knowledge. This paper also consist some possible difficulties and problems in the implementation of suggested knowledge base framework.

Hide Abstract

Views 
   PDF Download PDF Downloads: 562



Rashmi Yadav*,?Ravindra Patel and?Abhay Kothari

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The software ?quality of a software product is challenging? for the software industry. The reason that ?software industry demand of product in less time period so developer or team in on stress due to that they are missing something so software product not up to mark. The purpose of this paper viewing significance of formal technical review of requirement gathering and? design any software, products or tools and reviews missing a thing and improve software product quality. This research paper elaborates how to perform requirement gathering ?and review that, for the reverse reverse engineering tool.

Hide Abstract

Views 
   PDF Download PDF Downloads: 703



Chetan? R. Dudhagara1,?Ashish P. Joshi2, Mayur M. Patel1

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This paper is based on multidisciplinary approach in the fields of computer science (or information technology), bioinformatics and cheminformatics and its effect on modern drug related activities. ?The computational methods is used to study the formation of inter molecular structures in drug discovery activity has been subject of research during last decades. The drug activity is obtained through molecule binding. The drug activity is obtained through the molecular binding of one molecule (i.e. the ligand) to the pocket of another, usually larger; molecule (i.e. the receptor) Mostly protein is used as a receptor or larger molecule. Cheminformatics is the application of informatics methods to solve problem related to chemicals. The term “cheminformatics” was introduced only few years ago. Each compound is trying to become a stable form. In the area of molecular modeling, molecular docking is the method to predict preferred orientation of one molecule to second molecule when bound to each other to form a stable complex.?

Hide Abstract

Views 
   PDF Download PDF Downloads: 619



Monika Patel*,?Priti Srinivas Sajja

 

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In our digital society, the major source of communication is digital media such as images, video, audio or text. So impersonate and copyright protection of digital content remains an indispensable problem across the globe. To deal with this problem, digital watermarking has become advantageous solution for providing ownership of digital content. In this paper we have developed a robust DCT based image watermarking using fusion of Fuzzy Logic and Neural Networks. In this technique, we embed and extract biometric watermark using the fuzzy-neuro based watermarking in middle frequency band. This paper illustrates a modified algorithm for DCT based digital watermarking. To demonstrate working of the aforesaid algorithm, an experimental system is also developed with different input and displays the comparison of the PSNR values for them.?

Hide Abstract

Views 
   PDF Download PDF Downloads: 695



Ashish P. Joshi1,?Chetan? R. Dudhagara2,?Hasamukh B. Patel2?

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

HTML 5 is scripting language which used primarily to designing web page. Earlier HTML 4 was used which is not more comfortable with the graphics, animations, audios, videos, mobile technology, cross browser independency, game development, etc. using in web page. Now a day HTML 5 becomes very popular for its methodology and efficiency in field of designing the web page with remove the above disability. Here, we discuss about the technology which is support by HTML-5 and conclude that how it is better than the previous.

Hide Abstract

Views 
   PDF Download PDF Downloads: 598



Dalima Parwani1,?Amit Dutta2, Piyush Kumar Shukla3, Meenu Tahiliyani1

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Cloud Computing is one of the fastest growing concept of transmitting the data or storing data so that the user can access data from anywhere. But with the advancement of growing new technology various challenges have emerged such as security from various attacks, computational cost and power consumption.? One of the major issues is the Distributed Denial of Service Attack. It is a type of attack where a multitude of compromised systems start attacking on a single target that enables denial of services for the user of the targeted system. Hence, various techniques are implemented for the detection and prevention of these attacks; some of the techniques work better while some have issues, concerns and problems. In this paper, a complete survey and analysis of various Distributed Denial of Service Attack detection and prevention technique is analyzed and discussed so that on the basis of issues surfaced, a new, reformed and efficient technique is implemented for the detection and prevention of Distributed Denial of Service Attack especially in Cloud Computing System.

Hide Abstract

Views 
   PDF Download PDF Downloads: 1037



T Venkat?Narayana Rao1, Jella Shruthi2, Thakkallapally Sneha2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Now a days , web injection exhibits in different modes, but basically occurs when malicious and unwanted actors tamper directly with browser sessions for their business profits. Malware’s are injected through ad networks into websites. How an individual play different roles in this kind of tampering browsers is being discussed. The consequences of malware attacks are explored, as these are new trends in website attacks and ?describe ?types of malware you need to watch out? on your site. Finally, this paper discusses solutions for reducing malware threats and also includes some best practices for protecting website and business.

Hide Abstract

Views 
   PDF Download PDF Downloads: 577



T Venkat? Narayana Rao1, Maithreyi Simhachalam2, Smitha Bandyala2, B. Vasundara Devi4

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Quantum cryptography is a technology that ensures the security. Quantum cryptography ensures secure communication based on the fundamental physical laws. The quantum cryptography is based on the two elements of quantum mechanics -the Heisenberg Uncertainty principle and the principle of photon polarization. This paper focuses on the principle of quantum cryptography, mechanism how photons are encrypted and its contribution towards real-time security in all domains of application development.

 

Hide Abstract

Views 
   PDF Download PDF Downloads: 560



Boshra F. Zopon AL Bayaty1, Shashank Joshi2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Word sense disambiguation is process of identifying correct meaning based on algorithm used. Many more research is carried out in this domain popular dataset referred is ?wordnet. This paper discuss about word sense disambiguation using adaboost algorithm. In thiswork wordnet data and senseval standards are used resolve meaning of word with the help of given context.

Hide Abstract

Views 
   PDF Download PDF Downloads: 631



Geeta Dangar*, Vipul Vekariya, Daxa Vekariya

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In any of the organizations many efforts is taken for research project selection.It is necessary for each research proposal, before it given to the appropriate experts, research proposals needed grouping according to their research topics and area of research. In this paper clustering methods and text data mining approaches are used to group research proposals and give it to expert reviewer for reviewing the proposals. This paper uses the real data of BNSF (Beijing Natural Science Foundation).

Hide Abstract

Views 
   PDF Download PDF Downloads: 558



Aiman Turani

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Many practitioners and researcher have stated that the widespread of Computer Support of Collaborative work has not been as successful as hoped. There have been many challenges that have faced managers and team members when conducting collaborative work sessions in the virtual environment. Collaboration Script is considered a relatively a new approach in assisting designing successful collaboration sessions. Collaboration Script is a script that formally defines the flow of activities that are needed during a collaboration session. Yet, researchers have been uncertain regarding the complexity nature of such scripts.

The key strength of the proposed framework is in its ability to derive a collaborative scripting language that can describe complex designs and in the same time keeps its simplicity. ?The resulted scripting language should be similar to software programming scripting languages and in the same time based on profound collaboration techniques. Team leaders and managers with basic programming skills should be able to adopt and use such language in a short time and in the same time not afraid of designing complex team collaboration sessions.

The proposed framework is composed of four main layers. The First layer is based on well known collaborative techniques that contain a set of mini-activities which are located in the second layer. The third layer formulates the notation and rules of the proposed scripting language. It encloses the required components and commands that should be used in such script. The forth layer provides the needed support to implement such scripts by providing appropriate set of collaborative and supportive tools.

Hide Abstract

Views 
   PDF Download PDF Downloads: 527



Parag Shukla1, Bankim Radadiya2?and?Kishor Atkotiya3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The data in amount of large size in world is growing day by day. Data is growing because of use of digitization, internet, smart cell and social media and networking. A collection of data sets which is very large in size as well as complex is called Big Data which is use in current trend and next generation data transformation, data analysis and data storage of agricultural crops, seeds, works, labors, tools and environment data. Generally before current scenario, size of the data is measure in Megabyte and Gigabyte but now a day it measure in Petabyte and Exabyte.

Traditional database systems are not able to capture, store and analyze this large scale of data. As the internet is growing, amount of big data continue to grow. Big data analytics provide new ways for businesses updates and requirement for updating and government to analyze unstructured data. Now a days, Big data is one of the most important and challenging point in information technology world. It is executing very important role in future.

Big data changes the way of world for management and use big amount of data. Some of the applications are in areas such as medical issues, healthcare, traffic issues, banking management, retail management, education? and so on. Organizations are becoming more reliable & flexible and more open. Figure 2 is display a big data and analytics road map for large amount of data analysis and storage.

Hide Abstract

Views 
   PDF Download PDF Downloads: 737