The article deals with issues of impact of the digital economy on the development of agriculture, it determines the degree of influence of information technologies on agricultural production processes, presents the ty...
The article deals with issues of impact of the digital economy on the development of agriculture, it determines the degree of influence of information technologies on agricultural production processes, presents the types of information received from farmers and proposes process solutions for digitalization of production for each agricultural producer. The main directions of digitalization of breeding and seed production have been considered. It has been established that digital technologies make it possible to achieve the intended results faster and more efficiently and to reveal the fullest genetic potential of plants.
作者:
B MuthukumarJ Albert MayanGokul NambiarDenil NairProfessor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India U.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
The utility of a QR Code, is plenty in terms of usage to identify a particular entity. They are barcode of sorts that can hold a certain data set. Biometric security measures are one of the safest security measures, w...
The utility of a QR Code, is plenty in terms of usage to identify a particular entity. They are barcode of sorts that can hold a certain data set. Biometric security measures are one of the safest security measures, with fingerprint based biometric security being a rather easy and efficient way. In this paper, we discuss a way to efficiently check-in to a seat, during train travel by using a QR Code and fingerprint-based authentication system. A Quick Response Code (QR Code) can be used to mark one's attendance at their seat. Fingerprint authentication is the means to authenticate a person's identity without having to carry any form of physical identity proof along with them, during travel. Given the present system to check tickets is rather redundant and time consuming, having to manually check the ticket and identity of each passenger. By using this system, we can create a more efficient and less time-consuming system, that has much lesser probabilities of human error to occur.
In 21st century, the medical industry is tending to reach its pinnacle, unattended and ignored medical emergencies still remain a loophole in the system. Hence this paper proposes the idea of medical heli-carriage. Th...
In 21st century, the medical industry is tending to reach its pinnacle, unattended and ignored medical emergencies still remain a loophole in the system. Hence this paper proposes the idea of medical heli-carriage. The proposed system promises to reach the patient irrespective of local traffic conditions, variable terrains and climatic conditions. It employs solar power as the primary energy source and also has sufficient battery backup in case of inadequate solar energy. Under any unlikely event of technical fault in the system, it will acknowledge the nearest medical heli-carriage available and the task will be rescheduled to the latter. It will be capable of carrying first aid medical instruments along with two institutional staffs and the patient. Under any critical situation, the patient will tap on the smart watch, which will send a signal to the nearest hospital. The GPS location of the received signal will be tracked by the hospital and fed into the heli-carriage so that it can reach the very location to the earliest. Hence, the system can prove out to be a revolutionary step in the modern medical industry.
作者:
R DineshA Ezra VivinN SrinivasanJ Albert MayanU.G Student
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud comp...
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud computing in order to preserve the information using multi-security levels, and provide sufficient multilevel access and validate authorized identity. The recommended scheme is dynamic in multilevel data security, adaptable to certified resource share in, and protected against different malignant strike. Experimentation result checks the feasibleness. The processed data have multiple security level and access permission.
作者:
Anidhya AthaiyaDeepa ModiGunjan PareekM.Tech Scholar
Department of Computer Science and Engineering wami Keshvanand Institute of Technology Management & Gramothan Jaipur Rajasthan Assistant Professor
Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Management & Gramothan Jaipur Rajasthan
Word Sense Disambiguation (WSD) is the procedure of selecting precise sense or meaning for a word in a given context. Word sense disambiguation goes about as an establishment to different AI applications as data minin...
详细信息
ISBN:
(纸本)9781538647660
Word Sense Disambiguation (WSD) is the procedure of selecting precise sense or meaning for a word in a given context. Word sense disambiguation goes about as an establishment to different AI applications as data mining, information recovery, and machine interpretation. The issue solicits to figure out which sense from the polysemous word is appropriate in a given context. Previously a few methodologies have been proposed for WSD in English, German and so forth, however, work on WSD in Hindi is limited. In this work, a genetic algorithm based approach is presented for Hindi WSD. The feature of dynamic setting window is used which contains left and right expression of a vague word. The cardinal supposition of this approach is that the target word must have a common topic in its neighborhood. For finding all possible senses of an ambiguous word, WordNet created by IIT Bombay is used.
Mining client practices in portable situations is a developing and imperative theme in information mining fields. Past inquires about have consolidated moving ways and buy exchanges to discover versatile consecutive e...
Mining client practices in portable situations is a developing and imperative theme in information mining fields. Past inquires about have consolidated moving ways and buy exchanges to discover versatile consecutive examples. Be that as it may, these examples can't reflect real benefits of things in exchange databases. In this work, we investigate another issue of mining high utility versatile consecutive examples by coordinating portable information mining with utility mining. To the best of our insight, this is the primary work that joins versatility designs with high utility examples to discover high utility portable consecutive examples, which are portable successive examples with their utilities. Two tree-based strategies are proposed for mining high utility versatile successive examples. A progression of investigations on the execution of the two calculations are led through trial assessments. The outcomes demonstrate that the proposed calculations convey preferred execution over the cutting edge one under different conditions.
IT Services are very much crucial for the smooth functioning of the system. And so is their administration. IT Services should be monitored at periodically for maintaining an efficient and productive system at an IT W...
IT Services are very much crucial for the smooth functioning of the system. And so is their administration. IT Services should be monitored at periodically for maintaining an efficient and productive system at an IT Workplace. Errors or Incident are bound to occur, which are then converted into 'Tickets'. Every ticket has a general format in which they are created. Tickets are then sent to the Admin side for the further resolution procedures. Classification of tickets is an instrumental step in which the emerged tickets from a monitoring system are classified using context basis. After this, all the tickets have a correct hierarchy, they are then sent to separate ticket resolution teams for the incident resolution.
This paper proposes a method for credit card transaction system which will make use of face recognition and face detection technology, using Haar Cascade and GLCM algorithm. The main problem faced by credit card users...
This paper proposes a method for credit card transaction system which will make use of face recognition and face detection technology, using Haar Cascade and GLCM algorithm. The main problem faced by credit card users is attack to lot of privacy issues such as credit card. This generally happens when users give their credit card number to unknown people or when the card is lost. So, we are proposing a system that will reduce the risk of credit card frauds. The system we are proposing will match the image of user’s face with dataset of respective user. A database will be maintained for authentication purpose. If the image matches, that means user is genuine and he will be allowed to proceed otherwise, the user will be denied to do the transaction.
A numbers of distributed autonomous sensor nodes are deployed in a wireless sensor network environment for carrying out multiple tasks. Data packets transmitted in wireless sensor network needs to be protected. Securi...
详细信息
ISBN:
(纸本)9781538614433;9781538614426
A numbers of distributed autonomous sensor nodes are deployed in a wireless sensor network environment for carrying out multiple tasks. Data packets transmitted in wireless sensor network needs to be protected. Security keys can be generated and used to transmit data securely. These security key generation task needs to be properly managed in WSN. Efficient key management assists in providing confidentiality, integrity to the transmitted information. The security keys, if properly managed, blocks unauthorized users from accessing the transmitted data. Numerous key management mechanisms have been proposed in research literature. This proposed work presents a detailed survey performed on the current set of widely practiced key management techniques in WSNs. Both asymmetric encryption and hybrid type of encryption techniques are applied in key management. The survey presented analyzes the various key management techniques pertaining to computational overhead, communication complexity, energy consumption, robustness and scalability. The survey will be helpful for researchers in selecting the appropriate key management technique specific to their application needs.
作者:
M. Ajay ChowdaryM. KundanA. Viji Amutha MaryU.G Student
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India U.G Student
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
In the present system, credit card forgery is frequently happening, there is no big security is implemented at all. In the proposing system, Multi level security is implemented. It includes the Hex Keypad, GPS, and RF...
In the present system, credit card forgery is frequently happening, there is no big security is implemented at all. In the proposing system, Multi level security is implemented. It includes the Hex Keypad, GPS, and RFID. The secure information inside can be further secured with secondary system that consisting of formal fingerprint scanner. Modifying process is our Implementation, rather having multiple sensors integrated output in one process, which is actually time consuming, and we implement RFID with Keypad Matrix. POS based payment system. OTP is also verified from the Android application of the user so as to track the location of original user. Payment is made to the receiver only if both the User's Card & Mobile are in the same location. This system will avoid payment made by the attackers when Credit card is lost or when your details are hacked.
暂无评论