Role Of Statistical Parameter In Digital Image Enhancement |
Author : Dhirendra Pal Singh |
Abstract | Full Text |
Abstract :There are several domains like medical, astronomical, hybrid techniques, remote sensing, pattern recognition, high resolution display etc., in which people want to get an image and store it so that the images may be used to extract some valuable information using image quality features in the future. Image quality estimation aims to evaluate the image information automatically by a computational model hence plays a significant role in digital image processing systems. In this paper to meet the need of accuracy and effectiveness for gray scale images, role of various image enhancement quality features are discussed. |
|
Recovery And Concurrency Challenging In Big Data And NoSQL Database Systems |
Author : Amira Hassan Abed |
Abstract | Full Text |
Abstract :Big data is becoming a very important concept nowadays as it can handle data in different formats and structures, velocity, and huge volume. NOSQL databases are used for handling the data with these characteristics as traditional database can’t be used in managing this type of data. NoSQL database design is based on horizontal scalability with the concept of BASE which supports eventual consistence and data is considered in a soft state and basically available. Although NoSQL has a lot to offer when used in big data it is still not mature enough and faces some challenges including low join performance, concurrency control and recovery. Not only this but also it is very challenging for organizations to know which NoSQL data model to use and how does it fit with its organizational needs. This paper mainly displays the different NOSQL data models and the opportunities and challenges alongside with some techniques for handling these challenges. |
|
Maximal Security Issues And Threats Protection In Grid And Cloud Computing Environment |
Author : Saurabh Gupta, Sangeeta Rani, Kalpana Batra |
Abstract | Full Text |
Abstract :Cloud computing empowers the sharing of assets for example, storage, network, applications and programming through web. Cloud clients can rent various assets agreeing to their necessities, and pay just for the administrations they use. Be that as it may, in spite of all cloud benefits there are numerous security concerns identified with equipment, virtualization, network, information and specialist organizations that go about as a noteworthy obstruction in the selection of cloud in the IT business. In this paper, we overview the top security concerns identified with cloud computing. For each of these security threats we depict, I) how it very well may be utilized to abuse cloud parts and its impact on cloud elements, for example, suppliers and clients, and ii) the security arrangements that must be taken to forestall these threats. These arrangements incorporate the security procedures from existing writing just as the best security rehearses that must be trailed by cloud heads. |
|
Nakagami Fading Impact On The Performances Of VANET Routing Protocols In A Realistic Urban Area Setting |
Author : Hanene Brahmia, Cherif Tolba |
Abstract | Full Text |
Abstract :Quality of service is negatively impacted by the attenuation of the communication signal over the transmission distance. The attenuation phenomena can be modelled using different fading models; Nakagami model is regarded as the most realistic one. Attenuation in VANET is more challenging since it depends also on vehicle’s length and node density. The main purpose of this paper is to evaluate the performances of Ad hoc On-demand Distance Vector, Dynamic destination-Sequenced Distance Vector and Optimized Link State Routing protocols. A real map from an urban zone has been used. The map has been prepared using the simulator of urban mobility (SUMO) for the network simulator 3 (ns-3). Results show that Ad hoc On-demand Distance Vector Routing Protocol outperforms the others being the most resistant to fading phenomena. |
|
Efficient-Path Selection Scheme Using Optimized Adhoc On Demand Multipath Routing Protocol For Adhoc Networks |
Author : Bekan Kitaw, Fisseha Bayu, Gemechu Birhanu |
Abstract | Full Text |
Abstract :Mobile Adhoc Networks are used in various areas each of which has its own set of requirements. In this paper we concentrate on application areas which require fast data delivery, less delay and high availability of the network. Fast delivery and less delay concepts are related to the relative position and status of nodes (links) while network availability is a direct cost of overall network lifetime. Our focus here is on developing a network layer strategy, i.e. one that uses routing protocols. For MANET, in some applications packets become useless as a result of delay and distance between nodes. Hence it is required to design Efficient-Path selection scheme using optimized on-demand Multipath routing protocol with goals of improving throughput, delay and data delivery. With this our new approach we are going to evaluate the performance of our protocol against the traditional AOMDV. The practical simulation is done using NS2 network simulator. |
|
Scientific Trends And Role Of Robots In The Agricultural Sector |
Author : E Mamatha, S Saritha, Krishna Anand, CS Reddy |
Abstract | Full Text |
Abstract :The agriculture sector is essential to implement the automation technology to grow rapidly for better results and to produce crops for the requirement of the world population in the present scenario. Present existing technology and old mythologies and tools and types of machinery are not sufficient to achieve the targets. The enhanced technology and optimized energy utilization tools are straightaway to be adopted in the form of information technology machines that are more effective with old methods. The precision formation has revealed the advantages of machinery technology but needs to improve more for the next new equipment for the coming generations, which we call robotics technologies. The initiation of an autonomous system gives us a better prospect to build up a completely new variety of farming kits with the support of small elegant equipments like types of machinery which will do an accurate process, at the right time with the exact place, in the correct approach. A machine that contains an automatic control mechanism tracks the front running vehicle and follows, which has advantages of both vehicles that can be controlled and monitored effectively by a single driver in large farming sectors. |
|
New Identity Batch Verification Privacy Scheme In VANET |
Author : Shazia Suthana, Dr. B N Manjunatha Reddy |
Abstract | Full Text |
Abstract :VANET has exposed improvements in solving traffic congestion; the fundamental idea is to use RSU (Road Side Unit) or another vehicle to send traffic related parameters. The broadcast of traffic information used by safety road applications in wireless channel makes secure data hazardous and testing problem in vanet. Mislead of these messages causes accidents and breakdown of human lives at poorer level and thereby, Privacy in vehicular adhoc network has become a great issue, concerning to drivers convenience. Vehicles have to be barred from these attacks and mishandling of privacy information. For this reason, privacy preserving scheme is major requirement for vehicular adhoc network. The identity batch verification privacy scheme is implemented using ECC algorithm which is considered as more secure and practically efficient. |
|
Fibonacci Technique For Privacy And Security To Sensitive Data On Cloud Environment |
Author : Harikrishna Bommala, Dr. S. Kiran, T.Venkateswarlu, M. Asha Aruna Sheela |
Abstract | Full Text |
Abstract :Cloud computing is increasingly popular in the distribution of the computing environment. Process and implement cloud storage data to become a global movement. Software as an organization Software as a Service (SaaS) has many commercial applications and in our day to day, we can only say that it is disruptive technology [1]. Data security has become a major problem in the field of cloud ecosystems because data is available in various parts of the world to access the Internet for free as it progresses. The global security record for mid-2018, with a cloud data migration of approximately 86.67%, a global analyst estimates that this range can be 100% [8, 9]. Change the data of two or more people, so that unauthorized people can access real data. There are many different ways to perform this conversion, but the method there has proposed a text input method so that the recipient can access the original information. Encryption has become a solution and alternative encryption algorithms play an important role in the security of data in the cloud. In this process, the process investigation operation is designed to obtain data to avoid breaking an unauthorized person. In this way, you can protect any type of files using the Fibonacci series. The proposed algorithm s is encryption and decryption process takes a less of time compare with other traditional security algorithms. |
|