作者:
R D DhaniyaK M UmamaheswariResearch Scholar
School of Computing Department of Computer science and Engineering SRM Institute of Science and Technology Kattankulathur-603203 Assistant Professor
School of Computing Department of Computer science and Engineering SRM Institute of Science and Technology Kattankulathur-603203
The path planning problem under two-dimensional maps is a fundamental issue in mobile robotics and other applications (unmanned vehicles, and so forth). The traditional algorithms (graph searching, artificial potentia...
The path planning problem under two-dimensional maps is a fundamental issue in mobile robotics and other applications (unmanned vehicles, and so forth). The traditional algorithms (graph searching, artificial potential field and so forth) are used to find the shortest path that rely on grid-by-grid searching. The main disadvantage of the traditional methods is robot size is not considered and has much redundant in sharp curves which is difficult to guide a robot movement. In this paper, we compared the five baseline approaches of heuristic methods to find the optimal path which reduces the number of turns and time costs to attain a target. The experimental analysis shows that the second-order x derivative has an advantage over other baseline approaches that the search time and the number of turns are reduced.
作者:
Ruchi GargPoonam GuptaAmandeep KaurAssistant Professor
Electronics and Communication Engineering Department M.M.(Deemed to be University) Mullana Ambala Haryana India Assistant Professor
Computer Science and Engineering Department M.M.(Deemed to be University) Mullana Ambala Haryana India Associate Professor
Computer Science and Engineering Department M.M. University Sadopur Ambala Haryana. India
Block chain technology had gained popularity because of its use in crypto-currencies like bitcoin. Today uses of blockchain are growing in number of areas like banking, industries, health centers and even security of ...
Block chain technology had gained popularity because of its use in crypto-currencies like bitcoin. Today uses of blockchain are growing in number of areas like banking, industries, health centers and even security of IOT. Moreover, the use of IOT is growing exponentially every year with its aim in 5G technologies like e- health, smart homes, distributed intelligence etc. but it faces challenges in security and privacy. The privacy of a user data is at a risk because of its (i.e. IoT) centralized client-server model. This centralized approach of the server poses a serious vulnerability to the data security. This data at the server attracts the attackers to enter into the network and invade through the data and schedule attacks or inject a malware. It indicates that the central architecture of IoT possess a compromised confidentiality, integrity, and security of data which disrupts its use as the widespread adoption of this technology. Therefore, it is essential to evade the hostile centralized server architecture for IoT to enhance its security. It implies a need for decentralized architecture to maintain the data. The data can be kept at the different users without any central control with the help of blocks as suggested by Blockchain. This paper addresses the various security issues in IOT and how block chain helps in solving these issues.
作者:
Amandeep KaurPoonam GuptaRuchi GargAssociate Professor
Computer Science and Engineering Department M.M. University Sadopur Ambala Haryana India Assistant Professor
Computer Science and Engineering Department M.M. (Deemed to be) University Mullana Ambala Haryana India Assistant Professor
Electronics and Communication Engineering Department M.M. (Deemed to be) University Mullana Ambala Haryana India
The large Wireless Senor Networks (WSNs) comprises Sensor Nodes (SN) in some hundreds with sensing and communication capabilities. Major limitation of WSN is limited energy source of SN. Clustering is one of energy ef...
The large Wireless Senor Networks (WSNs) comprises Sensor Nodes (SN) in some hundreds with sensing and communication capabilities. Major limitation of WSN is limited energy source of SN. Clustering is one of energy efficient method for energy conservation in WSNs. Clustering is the process to distribute SN in various logical groups known as cluster. Each cluster bears a Cluster Head (CH), who is responsible for transmitting aggregated data of its cluster to Base Station (BS). The literature is enriched by various clustering protocols proposed with the assistance of soft computing. This paper, presents the survey of soft computing paradigm-based clustering protocols.
Nowadays E-commerce plays a major role in a business organization. People prefer online shopping rather than offline shopping which helps them to purchase their product from anywhere around the world through mobile ph...
Nowadays E-commerce plays a major role in a business organization. People prefer online shopping rather than offline shopping which helps them to purchase their product from anywhere around the world through mobile phones and laptop. Online shopping websites help people by saving time and product order can be done easily by clicking the product. Online shopping websites are built using the Single Page Application (SPA) framework and the objective of this research is to find the customer preference product prediction by tracking the frequent clicks of the product by the customer. By tracking the clicks of customer we can find their product choice and helps retailer to add the products according to user preference.
Permissioned blockchain is the blockchain network that requires access to be part of the network. Participant's actions are governed by the control layer that runs on top of the blockchain. This type of blockchain...
Permissioned blockchain is the blockchain network that requires access to be part of the network. Participant's actions are governed by the control layer that runs on top of the blockchain. This type of blockchains is preferred by individuals who need role description, identity, and security within the blockchain. Secure multi-party computation (MPC) is a part of cryptography that involves the modeling of procedures for two or more participants who want to work together. These participants involve sharing of input and required computational data for a particular function without sharing their confidential data actively to each other and achieving a common goal which is beneficial to both as the outcome achieved is only revealed to the participants and is highly required for their functional purpose. In this work, SPDZ (Speedz) implementation is explored leveraging additive secret sharing on the private blockchain (Hyperledger fabric). SPDZ protocol is chosen over any other computational protocol as it is highly secured from any active deceptive n-1 participant among the n participants. In this work, a backend is developed that uses a fabric SDK *** library that interacts with the Hyperledger Fabric network. The proposed solution is shown through a demonstration. This paper concludes that for business-to-business scenarios, using SPDZ protocol on permissioned blockchain provides more security against adversaries as permissioned blockchain provides transparency over the participants of the network. As a result, permissioned blockchain is a more secure choice for enterprises to compute confidential data rather than permissionless blockchain.
The real estate market is becoming one of the most competitive in terms of pricing and same tends to vary significantly based on various factors. This paper focuses on identifying the type of land and estimating the p...
The real estate market is becoming one of the most competitive in terms of pricing and same tends to vary significantly based on various factors. This paper focuses on identifying the type of land and estimating the price using convolutional neural network. Deep learning algorithms exhibit marvelous performance over conventional machine learning algorithms identifying the complex patterns. In this paper two Convolutional Neural Network (CNN) models are used. One is self-proposed model and another is ResNet152V2 model. Models are trained using aerial land image dataset. The ResNet152V2model showed high accuracy compared to the self proposed model. This system helps the land owner to acquire some basic essential details about the land.
In today's day of modern era when the data handling objectives are getting bigger and bigger with respect to volume, learning and inferring knowledge from complex data becomes the utmost problem. The research in K...
In today's day of modern era when the data handling objectives are getting bigger and bigger with respect to volume, learning and inferring knowledge from complex data becomes the utmost problem. The research in Knowledge Discovery in Databases has been primarily directed to attribute-value learning in which one is described through a fixed set tuple given with their values. Database or dataset is seen in the form of table relation in which every row corresponds to an instance and column represents an attribute respectively. In this paper a New framework is introduced a much more sophisticated and deserving approach i.e., Hybrid Multi-Relational Decision Tree Learning Algorithm which overcomes with Exiting technology drawbacks and other anomalies. Result show that Hybrid Multi- Relational Decision Tree Learning Algorithm provides certain methods which reduces its execution time. Experimental results on different datasets provide a clear indication that Hybrid Multi-Relational Decision Tree Learning Algorithm is comprehensively a better approach.
The manufacturing industries have been searching and developing new solutions to increase the product quality and to decrease the time taken and costs of production. Defect detection methodologies consume much time in...
The manufacturing industries have been searching and developing new solutions to increase the product quality and to decrease the time taken and costs of production. Defect detection methodologies consume much time in manufacturing and manual inspections for quality enhancement. The existing systems cannot handle the data other than the trained ones as they followed the comparison process with the dataset which is of more time consuming and lack of effective depth representation. In the proposed system, multi scale saliency defect detection algorithm is implemented to obtain the boundaries and range of defect in the surface of industrial products. The defect in the products can be detected using pre-processing defect image with color channels, detecting uneven illumination and post processing the defect image thereby splitting out the defect part from original image with edge detection and contours. Hence the output will be of more robust and accurate comparing to the existing systems.
作者:
N PannirselvamS ManivelAssociate Professor
Department of Civil Engineering SRM Institute of Science and Technology Potheri Kattankulathur - 603203 Chengalpattu District Tamilnadu India Assistant Professor
Department of Civil Engineering SRM Institute of Science and Technology Potheri Kattankulathur - 603203 Chengalpattu District Tamilnadu India.
Fibres used to develop high performance concrete. Fibres such as glass, carbon, polypropylene and aramid fibres need to be improved in view of global sustainable development. Long term durability is achieved with the ...
Fibres used to develop high performance concrete. Fibres such as glass, carbon, polypropylene and aramid fibres need to be improved in view of global sustainable development. Long term durability is achieved with the development of a high alkaline resistance fibre dispersion. This system was called reinforced concrete with glass fibre alkali resistance. To decide compressive and split rigidity, modulus of elasticity, modulus of crack and quick chloride penetrability tests for concrete grade M20 and M30 with and without fluctuating level of glass strands. The specimens were cast and tested at 28 days. The percentage of addition of glass fibres marginally increased the strength of compressive, flexural, split tensile for M20 and M30 grades of concrete when specimens tested at 28 days. A reduction in bleeding and permeability is also observed.
Mobile cloud computing (MCC) refers to an infrastructure in which data processing and storage can take place far from mobile devices. The convergence of compact registration and network distributed computing has creat...
Mobile cloud computing (MCC) refers to an infrastructure in which data processing and storage can take place far from mobile devices. The convergence of compact registration and network distributed computing has created scalable distributed computing. This technology provides consumers a number of points of interest, similar to storage limits, reliability, scalability and access to real-time information. As a result, it is expanding steadily and is undoubtedly organised into a daily day-to-day life. The Cloud servers can be used for the preparation and storage of ***, in the current conditions, the secrecy of photos and information is generally important. In this paper, we concentrate mainly on the safe re-appropriation of photographs.
暂无评论