作者:
A. Amarnadha ReddyB. GangadharB MuthukumarJ Albert MayanU.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
Now-a-days, we see that dustbins that are kept at open areas in the urban regions are flooding as a result of addition of the garbage persistently. It makes unhygienic condition and upsetting smell around the surround...
Now-a-days, we see that dustbins that are kept at open areas in the urban regions are flooding as a result of addition of the garbage persistently. It makes unhygienic condition and upsetting smell around the surroundings resulting in spreading some savage ailments and human diseases. To overcome such issues, Advanced Waste Collection is proposed for Smart Cities which depend on Internet of Things (IoT). It will take fewer efforts to clean all the bins over the city by checking whether the dustbins are full or *** proposed work includes a smart dustbin that separates dry and wet waste so that the waste recycling can be done more *** find the efficient way to find garbage collecting routes, we use shortest path algorithms like Dijkstra's Algorithm.
作者:
B MuthukumarJ Albert MayanGokul NambiarDenil NairProfessor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India U.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
The utility of a QR Code, is plenty in terms of usage to identify a particular entity. They are barcode of sorts that can hold a certain data set. Biometric security measures are one of the safest security measures, w...
The utility of a QR Code, is plenty in terms of usage to identify a particular entity. They are barcode of sorts that can hold a certain data set. Biometric security measures are one of the safest security measures, with fingerprint based biometric security being a rather easy and efficient way. In this paper, we discuss a way to efficiently check-in to a seat, during train travel by using a QR Code and fingerprint-based authentication system. A Quick Response Code (QR Code) can be used to mark one's attendance at their seat. Fingerprint authentication is the means to authenticate a person's identity without having to carry any form of physical identity proof along with them, during travel. Given the present system to check tickets is rather redundant and time consuming, having to manually check the ticket and identity of each passenger. By using this system, we can create a more efficient and less time-consuming system, that has much lesser probabilities of human error to occur.
作者:
C. Prasanth VarmaL. Infant CintyB MuthukumarJ Albert MayanU.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
This paper discusses about data transmission between hot machines and warm machines. We employ a Main Cloud Server (MCS) for this purpose. MCS provides a variety of services. User have to give request to MCS and it wi...
This paper discusses about data transmission between hot machines and warm machines. We employ a Main Cloud Server (MCS) for this purpose. MCS provides a variety of services. User have to give request to MCS and it will provide necessary service. User will be sends request to MCS for data upload and the request will be sent to CSP and that allocates job to Virtual Machines. We need to use two machines such as HOT MACHINES and WARM MACHINES. Hot machines can handle current job. Warm machines can be idle state until the job is assigned. Every machines will be having three virtual machines. The user can raise the service request CSP to access the resources found in cloud. So, the CSP provides approve or rejection is accept by CSP, then user can immediately access or download the resource from cloud server.
作者:
R DineshA Ezra VivinN SrinivasanJ Albert MayanU.G Student
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud comp...
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud computing in order to preserve the information using multi-security levels, and provide sufficient multilevel access and validate authorized identity. The recommended scheme is dynamic in multilevel data security, adaptable to certified resource share in, and protected against different malignant strike. Experimentation result checks the feasibleness. The processed data have multiple security level and access permission.
Unmanned aerial vehicles (UAV) are commonly used for search and rescue missions in unknown environments, where an exact mathematical model of the environment may not be available. This paper proposes a framework for t...
详细信息
ISBN:
(纸本)9781538655733
Unmanned aerial vehicles (UAV) are commonly used for search and rescue missions in unknown environments, where an exact mathematical model of the environment may not be available. This paper proposes a framework for the UAV to locate a missing human after a natural disaster in such environment, using a reinforcement learning (RL) algorithm. A function approximation based RL algorithm is proposed to deal with a large number of states representation and to obtain a faster convergence time. We conducted both simulated and real implementations to show how the UAVs can successfully learn to carry out the task without colliding with obstacles. Technical aspects for applying RL algorithm to a UAV system and UAV flight control were also addressed.
The article deals with issues of impact of the digital economy on the development of agriculture, it determines the degree of influence of information technologies on agricultural production processes, presents the ty...
The article deals with issues of impact of the digital economy on the development of agriculture, it determines the degree of influence of information technologies on agricultural production processes, presents the types of information received from farmers and proposes process solutions for digitalization of production for each agricultural producer. The main directions of digitalization of breeding and seed production have been considered. It has been established that digital technologies make it possible to achieve the intended results faster and more efficiently and to reveal the fullest genetic potential of plants.
IT Services are very much crucial for the smooth functioning of the system. And so is their administration. IT Services should be monitored at periodically for maintaining an efficient and productive system at an IT W...
IT Services are very much crucial for the smooth functioning of the system. And so is their administration. IT Services should be monitored at periodically for maintaining an efficient and productive system at an IT Workplace. Errors or Incident are bound to occur, which are then converted into 'Tickets'. Every ticket has a general format in which they are created. Tickets are then sent to the Admin side for the further resolution procedures. Classification of tickets is an instrumental step in which the emerged tickets from a monitoring system are classified using context basis. After this, all the tickets have a correct hierarchy, they are then sent to separate ticket resolution teams for the incident resolution.
In 21st century, the medical industry is tending to reach its pinnacle, unattended and ignored medical emergencies still remain a loophole in the system. Hence this paper proposes the idea of medical heli-carriage. Th...
In 21st century, the medical industry is tending to reach its pinnacle, unattended and ignored medical emergencies still remain a loophole in the system. Hence this paper proposes the idea of medical heli-carriage. The proposed system promises to reach the patient irrespective of local traffic conditions, variable terrains and climatic conditions. It employs solar power as the primary energy source and also has sufficient battery backup in case of inadequate solar energy. Under any unlikely event of technical fault in the system, it will acknowledge the nearest medical heli-carriage available and the task will be rescheduled to the latter. It will be capable of carrying first aid medical instruments along with two institutional staffs and the patient. Under any critical situation, the patient will tap on the smart watch, which will send a signal to the nearest hospital. The GPS location of the received signal will be tracked by the hospital and fed into the heli-carriage so that it can reach the very location to the earliest. Hence, the system can prove out to be a revolutionary step in the modern medical industry.
作者:
Ram PratapTaskeen ZaidiAssistant Professor
Department of MCA ShriRamswaroop Memorial Group of Professional Colleges Lucknow India Associate Professor
Faculty of Computer Science &Engineering ShriRamswaroopMemorial University Barabanki India
Delivery of reliable services in cloud environment is a major issue. Reliability may be achieved by implementing the fault tolerance. Due to the abundant growth of traffic and service request on cloud datacenters, bal...
详细信息
ISBN:
(纸本)9781538646939
Delivery of reliable services in cloud environment is a major issue. Reliability may be achieved by implementing the fault tolerance. Due to the abundant growth of traffic and service request on cloud datacenters, balancing the load in cloud environment is one of the serious challenges as failure may occur due to increase in power consumption, node failure, machine failure etc. Therefore there is a need of a policy for balancing the load among the datacenters and various solutions to balance the load have been proposed by researchers. Load distribution is the mechanism of dispersal the load between different nodes based on certain parameters such as underloaded(node) and overloaded (node). In this research article we have discussed the concept of dispersal of load and then perform a comparative analysis of various task-scheduling policies such as First Come First Serve, Shortest Job First and Round Robin on *** simulation results on Cloudsim depicted that RR task-scheduling is much better than the FCFS and SJF whether we are using the Time shared policy or Space shared policy for execution of cloudlet.
作者:
Anidhya AthaiyaDeepa ModiGunjan PareekM.Tech Scholar
Department of Computer Science and Engineering wami Keshvanand Institute of Technology Management & Gramothan Jaipur Rajasthan Assistant Professor
Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Management & Gramothan Jaipur Rajasthan
Word Sense Disambiguation (WSD) is the procedure of selecting precise sense or meaning for a word in a given context. Word sense disambiguation goes about as an establishment to different AI applications as data minin...
详细信息
ISBN:
(纸本)9781538647660
Word Sense Disambiguation (WSD) is the procedure of selecting precise sense or meaning for a word in a given context. Word sense disambiguation goes about as an establishment to different AI applications as data mining, information recovery, and machine interpretation. The issue solicits to figure out which sense from the polysemous word is appropriate in a given context. Previously a few methodologies have been proposed for WSD in English, German and so forth, however, work on WSD in Hindi is limited. In this work, a genetic algorithm based approach is presented for Hindi WSD. The feature of dynamic setting window is used which contains left and right expression of a vague word. The cardinal supposition of this approach is that the target word must have a common topic in its neighborhood. For finding all possible senses of an ambiguous word, WordNet created by IIT Bombay is used.
暂无评论