• No results found

international research journal of computer science and information systems

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

... programs. Computer and network of computer become the very important part of companies, organization and government ...important information is stored in computers and transferred across networks and ...

8

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

... IoT is vast collection of inter-dependent and independent systems working in parallel. Data mining forms the crux of identifying the useful knowledge of the whole Internet eco-system and share and build it ...

8

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

... programs. Computer and network of computer become the very important part of companies, organization and government ...important information is stored in computers and transferred across networks and ...

9

Prototype Survey of Different Resource Provisioning Procedures in Cloud Computing

Prototype Survey of Different Resource Provisioning Procedures in Cloud Computing

... facilitating, content conveyance, and constant instrumented information preparing. Every one regarding these application writes has diverse creation, arrangement, and organization necessities. Evaluating the ...

8

A Review on Compression and Encryption of Data for Secure Transmission

A Review on Compression and Encryption of Data for Secure Transmission

... digital information to be stored in the computer in the form of text documents, audios, videos, or other types of ...clippings, computer programs, graphs, charts, maps, tables, ...sound, ...

5

Cryptography Techniques

Cryptography Techniques

... into computer systems by being copied from contained disks or downloaded from online services by unsuspecting ...the information stored on entire hard ...

5

Mobile Ad Hoc Networks (MANET) An Overview

Mobile Ad Hoc Networks (MANET) An Overview

... routing information in the table invalid quickly. When the routing information becomes invalid quickly, there are many short-lived routes that are being determined and not used before they turn ...

5

Variety of Cloud Computing and Authentication with Artificial Intelligence

Variety of Cloud Computing and Authentication with Artificial Intelligence

... H. Artificial Intelligence in Future Technology The cloud technology can help AI’s by providing the required information for the learning processes while the AI can help cloud by providing information that ...

8

Wireless Ad hoc Network Simulators: Analysis of Characterstic Features, Scalability, Effectiveness and Limitations

Wireless Ad hoc Network Simulators: Analysis of Characterstic Features, Scalability, Effectiveness and Limitations

... Wireless sensor networks (WSN) are one of the most actively developing areas in network research communities. As the technologies for wireless nodes improve, the requirements for networking are increasing. Testbed ...

6

Robotic Arm Manipulation Using Shape and Color Based On Visual Servoing

Robotic Arm Manipulation Using Shape and Color Based On Visual Servoing

... ongoing computer vision project for which many enhancements have been done during the last years; the aim of the paper is to present a system for controlling a robot arm, based on image processing and ...

7

NS in Digitalization: Attacks and Defence

NS in Digitalization: Attacks and Defence

... card information at threat, there are innumerable software’s such as intervention in detection which have been averting these attacks, but on most of the occasion it’s all because of a human oversight that these ...

6

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

... In VANETs, the main aim of the routing protocols is to increase the packet delivery ratio and decrease the end to end delay. Each vehicle in the network is equipped with GPS to obtain its location information. ...

6

Customer accessibility through a multiple perspective framework

Customer accessibility through a multiple perspective framework

... Customer care has become one of the major issues for many businesses, prompting many organisations around the world to define it as being made up of Courtesy, Accessibility, Responsiveness and Effectiveness. Customer ...

15

Relational Rewards: Creating a Fulfilling Workplace Environment

Relational Rewards: Creating a Fulfilling Workplace Environment

... the information needs of the end users, the organizational environment, and any system presently being used, developing the functional requirements of a system that can meet the needs of the ...

8

To Augment Protection of data in Cloud Computing using Digital Signature

To Augment Protection of data in Cloud Computing using Digital Signature

... Cloud computing is an information technology for thedecade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. Since ...

5

Image Watermarking is the Process of Embedding an Imperceptible Data (Watermark) Into Cover Image

Image Watermarking is the Process of Embedding an Imperceptible Data (Watermark) Into Cover Image

... that information hiding began receiving wide attention from research community and information technology industry, with hundreds of publications and dozens of patents coming out in the past few ...

5

Digital Signal Processing Of Coherent and Generation Detection of QPSK Signal

Digital Signal Processing Of Coherent and Generation Detection of QPSK Signal

... The electrical signals SA and SB contain information on the amplitude and the phase of the optical QPSK signal. The signals SA and SB are simultaneously sampled once after every symbol period T with ADCs of the ...

5

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

... Object position is a popular retrieval task in various applications. In relational databases, we rank tuples using an aggregate score function on their attribute values. For example, a real estate agency maintains a ...

13

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

... A voiceprint is a set of measurable characteristic features of a human voice that uniquely identifies an individual person. These characteristics, such as length of the vocal tract, nasal passage, and pitch, cadence, ...

9

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

... Abstract— Attendance is a data collection activity to find out the presence of students in a class or an event. This is an important process throughout the teaching and learning process. One of them is supporting ...

8

Show all 10000 documents...

Related subjects