Farming or Agriculture is the science and art of cultivating plants. It is the vital enrichment in the growth of human living. It creates food and the other related things by farming with domestic animals and will ena...
Farming or Agriculture is the science and art of cultivating plants. It is the vital enrichment in the growth of human living. It creates food and the other related things by farming with domestic animals and will enable people to live long and healthy life. There are two agricultural categories, one is traditional Agriculture and the second one is Modern Agriculture. In Traditional Agriculture Farmers had faced many difficulties to Farm, but with the modern Agriculture Farmers can be able to see many improvements in Framing due to the agronomy, use of agricultural chemicals such as pesticides and fertilizers, Plant breeding and technological growth, these enrichments in Farming would yield good crop.(IoT)Internet of Things very often called as a system it can able to connect real physical Things, Implanted sensors, Embedded software's along with different technologies to connect and to transfer data amongst various diverse devices over the Internet. It is the hopeful expertise or technology which gives accurate and most reliable solutions on the way to too many domains. There is an extensive set of wide range of real time applications of IoT devices such as Industrial, Consumer, Commercial, Infrastructure may made IoT is the one of the best Technology to see enhancements in many domains. Solutions which are given by IoT would reduce human efforts in Farming and may provide sound of crop. In this paper a small survey will be presented to see how Internet of Things and its equivalent or other represent technologies AI, Cloud Computing would be useful to provide SMART AGRICULTURE along with Modern agricultural improvements will also be presented.
作者:
N Satya SriveniK Hema LathaA Viji Amutha MaryMercy Paul SelvanUG Student
Department of Computer Science and Engineering Sathyabama Insititute of Science and Technology Chennai India Associate Professor
Department of Computer Science and Engineering Sathyabama Instititute of Science and Technology Chennai India Assistant Professor
Department of Computer Science and Engineering Sathyabama Insititute of Science and Technology Chennai India
Bone fracture is one of the most ordinary problems in mortals because of accidents or other causes. Breaking bones can occur in our body, such as the wrist, heel, ankle, hip, rib, leg, chest, etc. Fractures cannot be ...
Bone fracture is one of the most ordinary problems in mortals because of accidents or other causes. Breaking bones can occur in our body, such as the wrist, heel, ankle, hip, rib, leg, chest, etc. Fractures cannot be seen with the naked eye, so X-ray/CT images are used to detect them. But sometimes these images lack sufficient detail for diagnosis. Today image processing plays an important role in detecting bone fractures. Image processing is important for the archiving and transmission of modern data, in particular for image transmission, video encoding, digital libraries, image databases, and remote sensing. This research paper presents detailed research on image processing methods for detecting bone fractures. The following research will help in studying various techniques that can be used to detect fractures in boned through the process of image processing and also includes updating of some new techniques as an improvement.
As the crime rates are increasing, the process of ensuring security has become one of the important demands in wide networks. There is always a chance by third-party to threatened the data privacy and security, which ...
As the crime rates are increasing, the process of ensuring security has become one of the important demands in wide networks. There is always a chance by third-party to threatened the data privacy and security, which led to continued development the information security. Cryptography defined as the process of encoding or encoding data to make it incomprehensible using mathematical operations. DNA cryptography is a new branch of DNA computation that represents a new era of technology in security for data transfer over the internet. In this paper, a Novel Algorithm Based on DNA Cryptography and Combination with One Time Pad and Caesar cipher has been introduced. The output of the algorithm is the tested using National Institute of Standards and Technology (NIST) statistical test suite much time to check the strength of an algorithm with the encrypted text. The algorithm has shown promising results.
In the world, about 21 percent of death occurs in the age group of 28-72 years because of a cardiac arrest. Many people among us lose their life because of heart-attack. After the occurrence of heart-attack only, the ...
In the world, about 21 percent of death occurs in the age group of 28-72 years because of a cardiac arrest. Many people among us lose their life because of heart-attack. After the occurrence of heart-attack only, the patient can be monitored. To help our society from heart-attack, I am developing a system that helps to decrease the death rate and early detection of a heart attack. Thus, this system is used to save the life of many people. We detect the prior occurrence of heart-attack of a patient using their monitored lungs datasets using image processing along with IoT.
作者:
M NagalakshmiK SaravananMohammad JabirullahT Rajesh KumarAssociate Professor
Department of Computer Science and Engineering Marri Laxman Reddy Institute of Technology Dundigal Telangana India Associate Professor
Department of Information Technology R.M.D Engineering College Kavaraipettai Tamil Nadu India Associate Professor
Department of Electronics and Communication Engineering CMR Engineering College Hyderabad Telangana India Associate Professor
Department of Computer Science and Engineering Koneru Lakshmaiah Deemed to be University Guntur Andhra Pradesh India
Verification and completeness are main challenges for today's ever more diverse supply chains. Even with the ability to counter blockchain technologies by offering a trail of manipulation-resistant audit It does n...
Verification and completeness are main challenges for today's ever more diverse supply chains. Even with the ability to counter blockchain technologies by offering a trail of manipulation-resistant audit It does not address the confidence issue associated with the source chain activities also information related to a produce life cycle Information itself. Reputation mechanisms are a promising solution for this faith problem. Yet existing structures of credibility are Not ideal for supply chain applications based on blockchain as centred on restricted findings, lack of granularity and their overhead was not discussed and automation. We recommend the system as a three-layer faith in this job. Management platform is using a blockchain consortium tracking relationships between actors in the supply chain and Assign trust and prestige dynamically dependent on these interactions. Its novelty is based on a Model for credibility assessing product quality and the trust of individuals based on many observations funding for credibility qualities in supply chain incidents separating the member in the supply chain from the goods, enables brand credibility to be reserved for smart contracts for straightforward use by the same participant, Effective, secure, and automatic credibility scoring measurement, and the latency and throughput minimum overhead as compared to a straightforward supply chain model based on blockchain.
Wireless sensor networks have wide use in different fields such as medical, military defense. This paper discusses the primary hidden protection framework for data privacy. The hidden key, remote node, and base statio...
Wireless sensor networks have wide use in different fields such as medical, military defense. This paper discusses the primary hidden protection framework for data privacy. The hidden key, remote node, and base station are used to connect and hack through secrets. We used fiber labeling technologies to secure data transmission Between the base station and the far node. We combined those techniques with Data slice, homomorphism, data privacy and data security defense encryption technology. The only way to obtain more than a sufficient number of different secrets That can decode data from base station to remote node. To order to protect data privacy, the homomorphism encryption technology Sets up a safe and powerful network of wireless sensors.
An Internet bot performs automated tasks over the Internet. This software application is also known as a web robot or robot or simply bot, Typically, bots runs simple and structurally repetitive tasks, at a much highe...
An Internet bot performs automated tasks over the Internet. This software application is also known as a web robot or robot or simply bot, Typically, bots runs simple and structurally repetitive tasks, at a much higher rate than would be possible for a human alone. This effort is to help the users by providing all the basic student's academic details like subjects, faculty names, books, notes and routine according to their need using bot. Users can also get other information like fees structure, library inventory list, calendar etc. Additional information like top educational sites, most trending educational videos etc will be regularly updated by the admin. This is an all-in-one application which can also be used to fetch and update information which is purely related to COVID-19.
In current days, knowledge enhancement is growing more. Nanotechnology can applied to self-repeating machines and mechanical technology, compound designing, mechanical designing, science, natural designing, and electr...
In current days, knowledge enhancement is growing more. Nanotechnology can applied to self-repeating machines and mechanical technology, compound designing, mechanical designing, science, natural designing, and electrical designing. Nanotechnology has the great preference to improves produce new and superior product. Nanomaterials to perceive avoid and eliminate pollution. Nanotechnologies are blueprint, invention and applied in medicine, therapy, diagnostic, sequencing and environmental protection. The usage of nanotechnology is rapidly increases in entire future market. This article explore the nanotechnology for medicine, diagnostic and therapy.
A ransomware is a unique class of malware which has gotten extremely famous in digital crooks to corkscrew cash. It categorizes the client confines by accessing their machines (PCs, cell phones and IoT gadgets) unless...
A ransomware is a unique class of malware which has gotten extremely famous in digital crooks to corkscrew cash. It categorizes the client confines by accessing their machines (PCs, cell phones and IoT gadgets) unless the payoff is paid. Consistently, security specialists report numerous types of ransomware assaults, including ransomware families. User's data will be collected at the time of dynamic process. The collected data will be in crypto ransomware type from that we can extract features like IP address, file length, URL. We will do dynamic analyse of the presently data with the antecedent data. Using machine learning algorithm (by combining Random Forest, Gradient Tree Boosting and Support Vector machine algorithm) we can classify the data as benign or ransomware. The achievement rate of classification using machine learning algorithm is 98.45% with false rate *** proposed achievement rate will be compared among linear regression, navie Bayes and adaboost algorithm. Gandcrab ransomware-Version, algorithm is to be identified.
Skin diseases are hazardous and often contagious, especially melanoma, eczema, and impetigo. These skin diseases can be cured if detected early. The fundamental problem with it is, only an expert dermatologist is able...
Skin diseases are hazardous and often contagious, especially melanoma, eczema, and impetigo. These skin diseases can be cured if detected early. The fundamental problem with it is, only an expert dermatologist is able to detect and classify such disease. Sometimes, the doctors also fail to correctly classify the disease and hence provide inappropriate medications to the patient. Our project proposes a skin disease detection method based on Image Processing and Deep Learning Techniques. Our system is Personal computer based so can be used even in remote areas. The patient needs to provide the image of the infected area and it is given as an input to the application. Image Processing and Deep Learning techniques process it and deliver the accurate output. The output is used to get the best medical cure for the disease with nearest hospital details. In this project, we present a comparison of two different approaches for real-time skin disease detection algorithm based on accuracy.
暂无评论