博電競菠菜平臺 www.rrkuhedt.buzz Israa Mohammed Hassoon

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Reading skills or recognizability of letters and shapes are one of the human potential. The main objective in the design of any recognition system is to reduce the amount of data and get the perfect ratio of recognition. In this work ,eigen values matrix is used to recognize English letters .The process of recognize English letters (small letters , capital letters) in different sizes and different fonts that captured from scanner has been done by extracting topological features that study of qualitative properties of? letters , then topological features used to build eigenvalues matrix .

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.01

Views 
   PDF Download PDF Downloads: 977



H. B. Basanth Kumar?

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

?Multimedia security is extremely significant concern for the internet technology because of the ease of the duplication, distribution and manipulation of the multimedia data. The digital watermarking is a field of information hiding which hide the crucial information in the original data for protection illegal duplication and distribution of multimedia data. The image watermarking techniques may divide on the basis of domain like spatial domain or transform domain or on the basis of wavelets. The spatial domain techniques directly work on the pixels and the frequency domain works on the transform coefficients of the image. This paper presents classification of watermarking, stages in watermarking, watermarking approaches and its applications.

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.02

Views 
   PDF Download PDF Downloads: 9969



Gaurav Kumar Singh Gaharwar1, 2, V. V. Nath3, Raina Gaharwar4

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Image forgery is always been sought after field of digital forensics, as it becomes very convenient now to edit/forge any image with many desktop based and online tools available. Also, to prove authenticity of any image in the court of law, there is a need of algorithm which can used to check forgery of any image, irrespective of its forgery type. Proposed model in the paper aims to provide neuro-fuzzy based algorithm which utilizes capabilities of best algorithms for each type and provides accurate result about the forgery in the image. It also provides analysis about type of forgery in the image along with the area forgered in the image.

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.03

Views 
   PDF Download PDF Downloads: 866



M.Rajesh1?and J. M Gnanasekar2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In most distributed systems, naming of nodes for low-level communication leverages topological location (such as node addresses) and is independent of any application. In this paper, we investigate an emerging class of distributed systems where low-level communication does not rely on network topological location. Rather, low-level communication is based on attributes that are external to the network topology and relevant to the application. When combined with dense deployment of nodes, this kind of named data enables in-network processing for data aggregation, collaborative signal processing, and similar problems. These approaches are essential for emerging applications such as sensor networks where resources such as bandwidth and energy are limited. This paper is the first description of the software architecture that supports named data and in-network processing in an operational, multi-application sensor-network. We show that approaches such as in-network aggregation and nested queries can significantly affect network traffic. In one experiment aggregation reduces traffic by up to 42% and nested queries reduce loss rates by 30%. Although aggregation has been previously studied in simulation, this paper demonstrates nested queries as another form of in-network processing, and it presents the first evaluation of these approaches over an operational test bed.

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.04

Views 
   PDF Download PDF Downloads: 499



G.Sumalatha1 and P. Anil Kumar2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In this paper we have reviewed application of energy aware routing protocols like LEACH, LEACH-C, PEGASIS, BCDCP, ENPC-NPSO, ANPC etc In WSN sensors are randomly deployed in the sensor field which brings the coverage problem. Hence energy and coverage problem are very scarce resources for such sensor systems and has to be managed wisely in order to extend the life of the sensors and maximizing coverage for the duration of a particular mission. In past a lot of cluster based algorithm and techniques were used. In this paper we also find out all type of PSO based algorithm, their application and limitation over present techniques to overcome the problems of low energy and coverage of sensor range.

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.05

Views 
   PDF Download PDF Downloads: 968



Prakash R. Kolhe?and?Pradip P. Kolhe

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Henry David said “Men Have Become the Tools of Their Tools.” In this era all the developing technology begin from calculation influenced by the computer programming ICT-tool. Today energy is main problem, by utilizing sun light energy(solar energy) problem can be minimize. Sun drying is still the most common method used to preserve agricultural products in most tropical and subtropical countries. However, being unprotected from rain, wind-borne dirt and dust, infestation by insects, rodents and other animal, products may be seriously degraded to the extent that sometimes become inedible and the resulted loss of food quality in the dried products may have adverse economic effects on domestics and international markets. The conditions in tropical countries make the use of solar energy for drying food practically attractive and environmentally sound. Dryers have been developed and used to dry agricultural products in order to improve shelf life. Solar drying facilities are economical for small holders, especially under favourable meteorological conditions.

This paper discuss to design to calculate design of solar dryer. In this different parameters are determined i.e Moisture removed, Water activity, Equilibrium Relative humidity, Total Heat Needed, Enthalpy, Average Drying rate, Drying time, Collector area, Length of air vent, Velocity required. The calculator was developed using C language Version 3.0 Turbo c++ copyright (c)1990, 1992 by Borland International was developed.

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.06

Views 
   PDF Download PDF Downloads: 544



Renu Singh1*, Arvind Kumar Singh1?and Utpal Bhattacharjee2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This paper presents a reviewof various speaker verification approaches in realistic world, and explore a combinational approach between Gaussian Mixture Model (GMM) and Support Vector Machine (SVM) as well as Gaussian Mixture Model (GMM) and Universal Background Model (UBM).

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.07

Views 
   PDF Download PDF Downloads: 524



Rajesh Kadchha

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This manuscript proposes an agricultural environment monitoring server system for monitoring information concerning an outdoors agricultural production environment utilizing Wireless Sensor Network (WSN) technology. The proposed agricultural server collects environmental, agricultural land, seeds and soil information on the outdoors through WSN-based environmental and soil sensors, collects snaps information through CCTVs, area information????? through RFID and collects location information using GPS modules.? This collected information is converted into data and saved in to a database through the agricultural server consisting of a sensor manager, which manages information gathered from the WSN sensors, an image information manager, which manages image information collected from CCTVs, RFID and a GPS manager, which processes location information of the agricultural server system, and provides it to producers. In addition, a solar cell-based power supply is implemented for the server system so that it could be used in agricultural environments with insufficient power infrastructure. This agricultural server could even monitor the environmental information on the outdoors, and it could be look forward that the use of such a system could participate to increasing crop yields and improving quality in the agricultural field by supporting the decision making of crop producers through analysis of the collected information.

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.08

Views 
   PDF Download PDF Downloads: 496



J. Tamizhkumaran.1, Ranjanmayee Sabar1, P. Manesh Kumar2?and?P. Ramajayan3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

A study was conducted among the veterinary college students to ascertain the usage pattern of e-commerce in mobile application. A total of 120 students were interviewed personally with a semi structured interview schedule designed for the study. The study revealed that majority of the respondent (85 %) preferred android based phones, the main purpose for e-commerce usage through cell phones were used for recharging cell phones (78.3 %), booking tickets (53.3%), paying the bills (35%), online shopping (28.3%), money transfer (05.8%) and hotel booking (5%). The major e-commerce activity was carried out using debit/ ATM cards (80%), internet banking (35%) and mobile banking (11.6 %). The popular apps preferred by the respondents were Paytm (71.6%), Red Bus (44.1%), Book My show (43.3%), Ticket New (39.1%) and Irctc (32.5%). It is clear from the study that college students are interested in e-commerce usage through mobile applications and in coming years the trend of e-commerce usage will surely take a turn around.

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.09

Views 
   PDF Download PDF Downloads: 671



CH Sravan Kumar, P. Buddha Reddy, K. Srinivas

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

A huge data space includes set of interesting points; Skyline is an important operation in many applications to return a set of interesting points from a potentially huge data space [1].This survey paper highlights the characteristics of big data and their challenges. This paper also discusses the tools and techniques of big data.? The existing algorithms like SaLSa, SSPL are novel computation algorithms. SaLSa exploits the idea of presorting the input data so as to effectively limit the number of tuples to be read and compared [2].SSPL utilizes sorted positional index lists which require low space overhead to reduce I/O cost significantly [1].SSPL consists of two phases. In phase 1, SSPL computes scan depth of the involved sorted positional index lists. During retrieving the lists in a round-robin fashion, SSPL performs pruning on any candidate positional index to discard the candidate whose corresponding tuple is not skyline result. Phase 1 ends when there is a candidate positional index seen in all of the involved lists. In phase 2, SSPL exploits the obtained candidate positional indexes to get skyline results by a selective and sequential scan on the table [1].

Hide Abstract

DOI : http://dx.doi.org/10.13005/ojcst/901.10

Views 
   PDF Download PDF Downloads: 504



Kostantin P. Nikolic

[ View:    Abstract ] [ HTML Full Text] [ 博電競菠菜平臺 ] [ XML ]

Although vast research works have been paid (throughout some 20 years back) regarding formal synthesis of an ANN it is somehow still open issue. This paper does not consider the mentioned formal synthesis aspects but intends to introduce an original engineering approach offering some advantages whenever training and designing of artificial neurel networks are under consideration. In that sense the author uses powerful combined method of stochastic direct search, the univerzal approximator and simulation method. Author has created specific stochastic serch algorithm wich in some cases having advantages over numerous known methods wich are based on the application of the gradient. The said algorithm incorporates universal approximation and simulation during designing and training neurel networks. The offered approach is applicable for wide range of artificial neural networks ?types icluding recurrent ones in real time. The presented numerical examples illustrate applicability of the offered advanced approach.

Hide Abstract

Views