The ideology of the people has changed over the decades, with the people's interest shifting towards a more closed environment, thinking about themselves, rather than their environment, consisting of their kith an...
详细信息
ISBN:
(纸本)9781538624609;9781538624593
The ideology of the people has changed over the decades, with the people's interest shifting towards a more closed environment, thinking about themselves, rather than their environment, consisting of their kith and kin and others. The result of this isolation is that the mental psychology of the people changes in accordance with the technological advancement. The major disadvantage is that the people's mental psychology could not be identified to follow any specific pattern. But the root of the tree is clear, the technology. Hence the analysis of the behavior of the user is done by allowing them answer a series of questions.
Now-a-days, food is very important in order to feed to the live people or animals. It is required to know the statistics about the food in terms of proteins, fat, and factors that increase immunity power. Hence, the p...
Now-a-days, food is very important in order to feed to the live people or animals. It is required to know the statistics about the food in terms of proteins, fat, and factors that increase immunity power. Hence, the proposed methodology called food IoT is developed that will scan the food and displays the statistics that guide details to the customer or client. The details describe about calories that are helpful, the details that will increase fat, the details like food is poisoned, and from the provided statistics, any one could judge the food is useful to feed. This proposed application guarantees the good health because health depends on feeding of food. This is more proactive because it guides which items to be added in case there is less kind of positive minerals and less proteins identified. Hence, a sensor to be required that will display the statistics about the food and is more helpful to the people in order to know category of factors involved in the food. The timed out and mineral less food is identified and could come to be known in this proposed approach. Also, this proposed approach helpful in terms of alerting as a guide based on past experience and reports future predictions about the health as like future weather predictions.
This work explains about the physic-chemical characteristics of composites to evaluate the applicability in various purposes over agricultural area. Spectral characteristics of compost materials are compute with spect...
This work explains about the physic-chemical characteristics of composites to evaluate the applicability in various purposes over agricultural area. Spectral characteristics of compost materials are compute with spectroscopy with Fertility index and clean index. This FI of composites was observed for sampling with various classification of higher fertilizing potential. Composites are utilized as fertilizer owing to low fertilizing potential. The concentration has been determined within permissible limits of fertility standards. It is known that these composites is more appropriate option for waste processing as it diminishes weight of organic waste. This analysis is performed with spectroscopy analysis.
Due the fast growth of new technology application like social media analysis, web data analysis and medical information network analysis, here the various types of data are processed frequently. The large amount of ef...
Due the fast growth of new technology application like social media analysis, web data analysis and medical information network analysis, here the various types of data are processed frequently. The large amount of effective data management and analysis is very vital goal. To reduce the data processing complexity, time complexity, and space complexity in Big Data, the paper going to propose the k-nearest neighbor join (KNN) operation. KNN is used to find the K nearest points in S. It is a computational task that will handle the large range of applications such as knowledge discovery or data mining. When the volume and the dimension of data increases, then only distributed approaches can perform the big operations in a given time. Recent works have done on implementing the efficient solutions using the map reduce programming model because it is used for distributing the large scale data processing. Although these works provide different solutions for the same problem, each one has particular constraints and properties. This paper compares the existing of different computation of KNN on MapReduce. First the paper compares the solutions in to three steps for KNN computation on MapReduce: 1) Data processing, 2) Data partitioning and 3) Computation. The Experiment in this paper explains the variety of different data sets, and analyzes the data volume, data dimension and the value of k from many perspectives like time and space complexity, and accuracy.
作者:
Arunkumar O. N.Divya D.Tony MathewAssociate Professor
Department of Mechanical Engineering Sree Narayana Gurukulam College of Engineering Kadayiruppu Kolenchery Ernakulam Kerala India. Assistant Professor
Department of Computer Science and Engineering Adi Shankara Institute of Engineering and Technology Vidya Bharathi Nagar Mattoor Kalady Ernakulam District Kerala India. Assistant Professor
Department of Mechanical Engineering Kottayam Institute of Technology and Science Kottayam Kerala India.
This article discusses goal programming model for optimizing working capital management (WCM) of a tire manufacturing company. The mathematical model is run for the years 2008–2009 to 2012–2013 and values of the res...
详细信息
This article discusses goal programming model for optimizing working capital management (WCM) of a tire manufacturing company. The mathematical model is run for the years 2008–2009 to 2012–2013 and values of the respective goals are taken from it. The validation for the model values with the actual values from the financial data are carried out to check the significance of the model values. The significance test is carried out in one sample t-test. It is observed that all the values got from the model are significant. The sales of the company for the year 2013–2014 is forecasted from the past data by linear regression using Microsoft Excel as a trend line. The model is used to 2analyze the values of variables of WCM for the year 2013–2014 to achieve a 30 percent return on assets (ROA) for the forecasted sales.
this paper intends to exhibit the social and authoritative parts of electronic data frameworks. Presently we are in the 21st century and two decades will be finished soon. A century ago has been considered as the asce...
this paper intends to exhibit the social and authoritative parts of electronic data frameworks. Presently we are in the 21st century and two decades will be finished soon. A century ago has been considered as the ascending of Information and correspondence innovation. These days there is expanding advancement of online data frameworks for social and hierarchical divisions Electronic data frameworks in light of web innovations which shares distinctive kinds of Internet convention and assumes an essential part to gather, putting away, gathering and imparting information from various sources and spread data initially. The speed and productivity of electronic data framework which incorporates both neighborhood and worldwide systems, databases and diverse sorts of program for data preparing makes social and hierarchical life less demanding for individuals. The online applications keep up activities of administration. Such applications incorporates quality administration forms, life cycle of authoritative objective, actualizing and sharing creation plan This electronic innovation affects social connection, social conduct and different association issues.
This paper proposes a method for credit card transaction system which will make use of face recognition and face detection technology, using Haar Cascade and GLCM algorithm. The main problem faced by credit card users...
This paper proposes a method for credit card transaction system which will make use of face recognition and face detection technology, using Haar Cascade and GLCM algorithm. The main problem faced by credit card users is attack to lot of privacy issues such as credit card. This generally happens when users give their credit card number to unknown people or when the card is lost. So, we are proposing a system that will reduce the risk of credit card frauds. The system we are proposing will match the image of user’s face with dataset of respective user. A database will be maintained for authentication purpose. If the image matches, that means user is genuine and he will be allowed to proceed otherwise, the user will be denied to do the transaction.
作者:
A. Amarnadha ReddyB. GangadharB MuthukumarJ Albert MayanU.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
Now-a-days, we see that dustbins that are kept at open areas in the urban regions are flooding as a result of addition of the garbage persistently. It makes unhygienic condition and upsetting smell around the surround...
Now-a-days, we see that dustbins that are kept at open areas in the urban regions are flooding as a result of addition of the garbage persistently. It makes unhygienic condition and upsetting smell around the surroundings resulting in spreading some savage ailments and human diseases. To overcome such issues, Advanced Waste Collection is proposed for Smart Cities which depend on Internet of Things (IoT). It will take fewer efforts to clean all the bins over the city by checking whether the dustbins are full or *** proposed work includes a smart dustbin that separates dry and wet waste so that the waste recycling can be done more *** find the efficient way to find garbage collecting routes, we use shortest path algorithms like Dijkstra's Algorithm.
作者:
C. Prasanth VarmaL. Infant CintyB MuthukumarJ Albert MayanU.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
This paper discusses about data transmission between hot machines and warm machines. We employ a Main Cloud Server (MCS) for this purpose. MCS provides a variety of services. User have to give request to MCS and it wi...
This paper discusses about data transmission between hot machines and warm machines. We employ a Main Cloud Server (MCS) for this purpose. MCS provides a variety of services. User have to give request to MCS and it will provide necessary service. User will be sends request to MCS for data upload and the request will be sent to CSP and that allocates job to Virtual Machines. We need to use two machines such as HOT MACHINES and WARM MACHINES. Hot machines can handle current job. Warm machines can be idle state until the job is assigned. Every machines will be having three virtual machines. The user can raise the service request CSP to access the resources found in cloud. So, the CSP provides approve or rejection is accept by CSP, then user can immediately access or download the resource from cloud server.
作者:
R DineshA Ezra VivinN SrinivasanJ Albert MayanU.G Student
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud comp...
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud computing in order to preserve the information using multi-security levels, and provide sufficient multilevel access and validate authorized identity. The recommended scheme is dynamic in multilevel data security, adaptable to certified resource share in, and protected against different malignant strike. Experimentation result checks the feasibleness. The processed data have multiple security level and access permission.
暂无评论