• No results found

[PDF] Top 20 Map online system using internet-based image catalogue

Has 10000 "Map online system using internet-based image catalogue" found on our website. Below are the top 20 most common "Map online system using internet-based image catalogue".

Map online system using internet-based image catalogue

Map online system using internet-based image catalogue

... Peta digital adalah imej yang bersaiz besar disebarkan formatnya yang berlainan serta ia membawa sekali maklumat geodata yang penting dalam sesuatu peta topografi. Maklumat biasa yang dibawa dan bermakna adalah seperti ... See full document

91

Image Encryption Algorithm based on Chaotic Map

Image Encryption Algorithm based on Chaotic Map

... the Internet and wireless networks has been developed rapidly, due to the fascinating developments in digital image processing and network ...communicated image information against illegal usage, ... See full document

10

Captcha Authenticated Unwanted Message Filtering Technique for Social Networking Services

Captcha Authenticated Unwanted Message Filtering Technique for Social Networking Services

... security system is to protect the data from unauthorized ...mechanism based on textual passwords provides low level of security against the unwanted ...a system with hybrid graphical password ... See full document

7

Map Function: Image Processing System using Handover Technique on cloud Environment

Map Function: Image Processing System using Handover Technique on cloud Environment

... One of the main concepts in the proposed work is introduction of JAI used for image transformation. If the images are in the improper format, JAI changes the image to the right format. The raw data formats ... See full document

10

INTERNET OF THINGS BASED SMART AGRICULTURE SYSTEM USING PREDICTIVE ANALYTICS

INTERNET OF THINGS BASED SMART AGRICULTURE SYSTEM USING PREDICTIVE ANALYTICS

... Decision tree [18,19] is a widely used model for both regression [20] and classification [19]. A typical decision tree algorithm is described in Algorithm 3. Nodes are added in the tree using the recursive call in ... See full document

5

Chaos-Based Image Encryption Using an        Improved Quadratic Chaotic Map

Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map

... chaotic map is iteratively applied to two initially close points, the iterations quickly diverge, and become uncorrelated in the long ...the map to change quickly, when slightly disturbing the parameters, ... See full document

13

An Image Cryptography using Henon Map and Arnold Cat Map

An Image Cryptography using Henon Map and Arnold Cat Map

... chaotic system is highly sensitive to initial values and parameters of the system the security relies on a secret key along with the image encryption ...cat map and Henon map. The key ... See full document

5

Image steganography using mod 4 embedding algorithm based on image contrast

Image steganography using mod 4 embedding algorithm based on image contrast

... Fig.1 shows the block diagram of the proposed image steganographic model. The input messages can be in any digital form, and are often treated as a bit stream. The input message is first converted into encrypted ... See full document

5

An Efficient Online Shopping System Using Map Reduce Framework in Big data

An Efficient Online Shopping System Using Map Reduce Framework in Big data

... shopping system produces an integrated dataset from various websites that supports the scalability problem and reduces the time consumption which processes the system in an efficient ...this system ... See full document

5

Online Attendance using PCA Based Image Face Recognition

Online Attendance using PCA Based Image Face Recognition

... Till now we had seen the part of the our actual application that was been taking about i.e., we will use this application face detection to get the presence of the person in the institution or an organization for a ... See full document

8

Content based image retrieval using color histogram

Content based image retrieval using color histogram

... Content-Based Image Retrieval (CBIR) systems are search engines for image databases, which index images according to their ...Content-based image retrieval is the application of ... See full document

12

Partial Image Encryption based on Block wise Shuffling using Arnold Map

Partial Image Encryption based on Block wise Shuffling using Arnold Map

... In 2002, Marc Van Droogenbroeck and Raphal Benedett, [4] proposed a selective encryption for compressed image that utilized JPEG compression. In JPEG, the Huffman coder aggregates zero coefficients into runs of ... See full document

5

E-TAILING IN INDIA

E-TAILING IN INDIA

... Internet these days have become very colloquial criteria in everyone in living in this technologically upgraded ...and online shopping have become very important and ...heist, online payment ... See full document

5

Smart Home Using Google Assistant

Smart Home Using Google Assistant

... by using different technologies. By using GSM based home automation System we need to send message/make a call to control home ...complex system. By using Bluetooth home ... See full document

5

An ASTER Digital Elevation Model (DEM) for the Darwin Hatherton Glacial System, Antarctica

An ASTER Digital Elevation Model (DEM) for the Darwin Hatherton Glacial System, Antarctica

... 5.4 An ASTER satellite map of the Darwin-Hatherton glacial system A true colour, 15 m resolution orthorectified image is generated for each individual ASTER image using either the averag[r] ... See full document

86

Automation System for Electronic Devices Using IOT

Automation System for Electronic Devices Using IOT

... control using IoT is the most updated ...through internet. This system is explaining how to control designed circuit of two bulbs wirelessly but according to ones need one can connect any device ... See full document

7

Efficient Satellite Image Segmentation using Energetic Self Organizing Map

Efficient Satellite Image Segmentation using Energetic Self Organizing Map

... the image are removed. The Dynamic Adaptive Threshold based Background Optimization (DATBO) component helps to improve the performance of Fuzzy C-Means ...Energetic-SOM based method is better than ... See full document

8

Role of Knowledge Management in Modern Libraries

Role of Knowledge Management in Modern Libraries

... like internet, open access, online services and E-Databases has brought about a paradigm shift in the repositioning and role of the library and are called information management ... See full document

5

KOHA Web-OPAC: How to use it?

KOHA Web-OPAC: How to use it?

... This paper discusses about the concept of Web –OPAC in special regards of KOHA Web-OPAC at the Indian Institute of science Education and Research Bhopal (IISERB) and highlights, various special features of Koha Web-OPAC ... See full document

18

E-Commerce Strategic Business Environment Analysis in Indonesia

E-Commerce Strategic Business Environment Analysis in Indonesia

... This is the right time for local e-commerce business to provide Indonesia products to Indonesia market and also global market. Increasing the amount of local consumption will also derive to hold Indonesia GDP growth in ... See full document

5

Show all 10000 documents...