A NOVEL FINGERPRINT VERIFICATION USING RIDGE EDGE DETECTION TECHNIQUE |
Author : S. Sai Prashanth, G.Mukesh, Diwakar R.Marur, N.Sukirtharaj |
Abstract | Full Text |
Abstract :This paper proposes a method to verify the finger print of any individual based on ridge edge detection. MATLAB is used as the programming tool. The method detects the ridge endings and
bifurcations of an individual finger print. The quality of the finger print image is enhanced by preprocessing for better performance. The verification, takes into account of the relative positions and
alignment of the ridges. This results in a low false detection rate |
|
SEE THROUGH APPROACH FOR THE SOLUTION TO NODE MOBILITY ISSUE IN UNDERWATER SENSOR NETWORK (UWSN) |
Author : Nishit Walter, Nitin Rakesh |
Abstract | Full Text |
Abstract :The top notch problem that we are facing in the field of Underwater Sensor network (UWSN) is of node mobility issue. This well versed problem arise when there is significant deviation in the location of the nodes i.e. from their point of origin to their final position, considering the fact that these nodes are mobile
in nature. To tackle this problem we already proposed an approach named SEE THROUGH and this is the continuation of that work as SEE THROUGH approach part 2. |
|
A FUSION BASED AUTHENTICATION TECHNIQUE |
Author : Deepti Chilbule, Prof. Damodar Tiwari, Dr. Shailendra Singh, Dr. Sanjeev Sharma |
Abstract | Full Text |
Abstract :The Internet connectivity has converted the whole world into a global village and at the same time created many security problems. For any organization, it is essential to protect its internal resources from security threats from all over the world. Security has three important goals - confidentiality, integrity and availability. Confidentiality refers to providing access to only
authorized users, integrity refers to preventing from unauthorized changes and availability refers to providing access to authorized users at any time. |
|
PERFORMANCE STUDY OF IMPROVING SOFTWARE METRICS ON SOFTWARE DEFECTS PREDICTION |
Author : T. ARUN NEHRU, DR. V. SANGEETHA |
Abstract | Full Text |
Abstract :Software maintainability is the most significant methods that play an essential part during the quality of software metrics. The software metrics is designed to differentiate the sizes of selected feature subsets and estimate their efficiency in the framework of software defect prediction. Software quality is the essential method to describe the performance of software products attributes without any defects. |
|
A BLIND NAVIGATION SYSTEM USING RFID FOR INDOOR & OUTDOOR ENVIRONMENTS |
Author : U. SATHWASTA GOLLA, S. PRASANTH KUMAR, DR. K. MANIKANDAN |
Abstract | Full Text |
Abstract :In recent years, several approaches have been made to create systems that allow seamless tracking and navigation both in indoor and outdoor environments. This paper proposes a prototype which uses RFID technology to provide location-based services and navigation to the blind, or visually impaired. An overview of previous work made in the context of systems developed to assist the mobility of blind users. The reader reads the tag’s ID by RFID communication. It then sends this information through a Bluetooth channel to the PDA device. The ID string and data is processed and then an output is sent through another Bluetooth channel to the headsets which finally produce the audio output that is used by
the visually impaired person.
|
|