作者:
E. NirmalaS. MuthurajkumarD. SubithaResearch Scholar
Department of Computer Technology Madras Institute of Technology (MIT) Campus Anna University Chennai India Assistant Professor
Department of Computer Technology Madras Institute of Technology (MIT) Campus Anna University Chennai India Assistant Professor
Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Vel Nagar Chennai
The keyword searching algorithm plays a vital role in cloud computing Architecture. Here, the searching technique is applied as a tool to encrypted data set which is outsourced. This technique works well, by either di...
The keyword searching algorithm plays a vital role in cloud computing Architecture. Here, the searching technique is applied as a tool to encrypted data set which is outsourced. This technique works well, by either directed on multi keyword findings with exact match or one keyword search with fuzzy logic with a result of true or false. Though the existing techniques come across sensible difficultyin execution upon the encrypted data set, in the execution of multiple keyword based searching, keyword correction is difficult to achieve. To overcome with this problem, we construct a highly efficient, multiple corrections in keyword searching algorithm using ranking scheme. Multiple corrections like spell checks and errors. In the existing system of Author Wang and others scheme, they were unable to address the aforementioned problems, But in our method of multiple keyword searching technique, the Fuzzy Gramm algorithm helps to detect and handle the spelling errors by making a function call. Additionally the keywords with similar ancestry can be found by making use of stemming procedure. Alongside with thatrank keyword is used to achieve accurate checking with matched text file content. Thus the proposed approach enhances security and reliability to the maximum extent compared to the existing system.
作者:
Lalan kumarDeepanjali MishraAyush KumarAmit KumarAshish BajpaiAsst. Professor
Dept. of Master of Computer Application G.L. Bajaj Institute of Technology and Management Gr.Noida UP India Scholar
Dept. of Master of Computer Application G.L. Bajaj Institute of Technology and Management Gr.Noida UP India Asst.Professor
Dept. of Master of Computer Application KIET Group of Institutions Ghaziabad UP India Asst.Professor
Dept. of Computer Science KIET Group of Institutions Ghaziabad UP India
Data security is one of the fundamental concerns when it comes to modern networking and information sharing as any breach or data loss can end up causing major losses in terms of credibility, personal data and/or law ...
Data security is one of the fundamental concerns when it comes to modern networking and information sharing as any breach or data loss can end up causing major losses in terms of credibility, personal data and/or law suites. This paper studies data encryption and decryption techniques using algorithms like DES algorithm, 3 DES algorithm, AES algorithm and RSA algorithm. Cryptography was introduced for data security while transmitting data. However, only cryptography cannot give a robust security approach; as a result, a disorganized message can still be snooped [9]. This leads to a desire for information security. There are several techniques available, among those have taken a few of them and will review them considering cryptography measures. We will analyse the algorithm mentioned above, and try to find out better among them.
作者:
T MalathiD SelvamuthukumaranC S Diwaan ChandarV NiranjanA K SwashthikaAssistant Professor
Department of Computer Science & Engineering Bannari Amman Institute of Technology Sathyamangalam Erode Tamilnadu - 638401 Assistant Professor
Department of Mechanical Engineering Bannari Amman Institute of Technology Sathyamangalam Erode Tamilnadu - 638401 Second Year
Department of Information Science & Engineering Bannari Amman Institute of Technology Sathyamangalam Erode Tamilnadu - 638401 Second Year
Department of Computer Technology Bannari Amman Institute of Technology Sathyamangalam Erode Tamilnadu - 638401
Robotic Process Automation (RPA) plays an important role in the solution for automating human digital interaction in various software domains like IT, Business Strategy and so on. Optical Character Recognition(OCR) su...
Robotic Process Automation (RPA) plays an important role in the solution for automating human digital interaction in various software domains like IT, Business Strategy and so on. Optical Character Recognition(OCR) superimposes subtitled characters on an *** we use two Open source OCR engines, Google Tesseract OCR - It literally makes use of the open source Tesseract OCR Engine[1]. Microsoft OCR - This is another open source OCR engine accessible in the Robotics Process Automation tool, UiPath[1]. The technique of optical character recognition (OCR) has been used to transform printed text into editable text. In various applications, OCR is a very useful and common technique. OCR precision can be dependent on algorithms for text preprocessing and segmentation. Often because of different scale, design, orientation, complex picture context, etc., it is difficult to retrieve text from the image. We begin this paper with an introduction to the Optical Character Recognition (OCR) process, in this paper, we propose a research analysis to estimate the accuracy of two open source OCR engines with Robotics Process Automation(RPA). These RPA processes are created using the UiPath tool and our results compare the OCR engines performance during the execution with the workflow and save the results to our local storage or on cloud storage if cloud support enabled and here we used local storage for purpose, and the result analysis and error analysis was evaluated by manual process which also included excel formulas to calculate the accuracy of the extracted string with the original string.
Backtracking line-search is an old yet powerful strategy for finding a better step sizes to be used in proximal gradient algorithms. The main principle is to locally find a simple convex upper bound of the objective f...
详细信息
Mobile cloud computing (MCC) refers to an infrastructure in which data processing and storage can take place far from mobile devices. The convergence of compact registration and network distributed computing has creat...
Mobile cloud computing (MCC) refers to an infrastructure in which data processing and storage can take place far from mobile devices. The convergence of compact registration and network distributed computing has created scalable distributed computing. This technology provides consumers a number of points of interest, similar to storage limits, reliability, scalability and access to real-time information. As a result, it is expanding steadily and is undoubtedly organised into a daily day-to-day life. The Cloud servers can be used for the preparation and storage of ***, in the current conditions, the secrecy of photos and information is generally important. In this paper, we concentrate mainly on the safe re-appropriation of photographs.
作者:
P RayavelA SivakumarP V GopirajanS SurenderanathP RathnavelAssistant Professor
Department of Computer Science and Engineering Sri Sai Ram Institute of Technology Chennai-600044 Tamilnadu India Assistant Professor
Department of Information Technology Sri Sairam Engineering College Chennai-600044 Tamilnadu India Assistant Profesor
Department of Computer Science and Engineering Saveetha Engineering College Chennai-602105 Tamilnadu India Assistant Professor
Department of Electrical and Electronics Engioneering Sri Sai Ram Institute of Technology Chennai-600044 Tamilnadu India
This proposed framework goes about as a home security framework for both Person location and gives security to entryway access control by utilizing facial acknowledgment for the home climate. The more peculiar's f...
This proposed framework goes about as a home security framework for both Person location and gives security to entryway access control by utilizing facial acknowledgment for the home climate. The more peculiar's face is distinguished inside a home climate accomplished by catching a picture from a web camera and handling will be done on caught pictures. The web camera catches the arrangement of pictures when the individual comes before the entryway. The caught picture is analyzed utilizing our face acknowledgment calculation model. In the event that the individual is the approved one, at that point the entryway is opened. Then again, if the individual isn't the approved one. The picture of the individual is shipped off the power in the event that he perceives the individual and wants to open the entryway. He can distantly get to the entryway and permit the individual in.
作者:
P Praveen KumarV Kanchana DeviStudent
Master of Computer Applications Vellore Institute of Technology Chennai Campus Tamilnadu India Associate Professor
School of Computing Science and Engineering Vellore Institute of Technology Chennai Campus Tamilnadu India
Load Balancing is required to distribute tasks across Virtual Machines on one hand and on the other hand in a cloud Environment. Here, a new task scheduling algorithm: 'Optimized Flexi Max-Min Scheduling Algorithm...
Load Balancing is required to distribute tasks across Virtual Machines on one hand and on the other hand in a cloud Environment. Here, a new task scheduling algorithm: 'Optimized Flexi Max-Min Scheduling Algorithm' is proposed. The algorithm maintains a data structure which is modeled after a Binary Search Tree (BST) for estimations, enhanced searching, task allocation, and migration of tasks. Cloud-Sim is used to model and simulate the cloud computing environment in order to obtain simulated data. The result of this experiment shows that the proposed algorithm outperforms the traditional Max-Min task scheduling algorithms.
Time-series data is widely studied in various scenarios, like weather forecast, stock market, customer behavior analysis. To comprehensively learn about the dynamic environments, it is necessary to comprehend features...
详细信息
作者:
S SudhaharC Ganesh BabuD SharmilaAssistant Professor
Bannari Amman Institute of Technology Department of Electronics and Instrumentation Engineering Erode Tamilnadu India Professor
Professor Bannari Amman Institute of Technology Department of Electronics and Instrumentation Engineering Erode Tamilnadu India Professor
Jai Shriram Engineering College Department of Computer Science Engineering Erode Tamilnadu India
Two approaches (centralized and decentralized) for designing a multi-input, multi-output (MIMO) tracing/regulating process are described within article. The vast popular of industrial process control applications are ...
Two approaches (centralized and decentralized) for designing a multi-input, multi-output (MIMO) tracing/regulating process are described within article. The vast popular of industrial process control applications are whist focused on multi loop controllers, ignoring the feedback control attainment with advantages of centralized multivariable controllers. Due to their single loop nature, the plant interactions that are merely in use keen on relation in the controller tuning process cannot be suppressed by decentralized controllers. In many situations, therefore it would be beneficial to delimit the detrimental consequences in pairing among inputs and outputs of the closed loop system under certain context. The centralized model predictive controllers (MPC) and decentralized/multi-loop PI controllers are designed. In terms of integral Absolute Error (IAE), Integral Square Error (ISE), and Integral Time-weighted Absolute Error (ITAE), the output of both controllers is then compared. The results of the simulation showed that the MIMO MPC is better than the other suggested control schemes. The projected central controllers minimize interactions superior than the multi loop controllers that have recently been published.
Deep learning has remarkably impacted several different scientific disciplines over the last few years. For example, in image processing and analysis, deep learning algorithms were able to outperform other cutting-edg...
详细信息
暂无评论