CLOUD Profit or Loss : Google as Case |
Author : Rana M. Faek, AfraaSayahAlshammari, Dr. KusumYadav Ebtisam, A. Hamed |
Abstract | Full Text |
Abstract :In recent times the cloud storage usage has is tremendously proved its significance in almost every discipline from knowledge,
sciences and technology and education or business and management and the list continues. the impact, usefulness and usability of
different applications in in different sector affecting the technical sector positively. In this paper we are discussing the pros and
cons of cloud storage usage among Arab users and the awareness of its security threats which will shed a further step to examining
cloud computing and evaluate its evolvements. The research survey was conducted in different countries of middle east mainly
Kingdom of Saudi Arabia (KSA), Palestine and Jordan |
|
Mobile Application for the Grantham Script |
Author : U.Azhagurajan, D.Sakthivel, R.Ayyappan, |
Abstract | Full Text |
Abstract :Grantham is one of the Indian script which is mostly used in the sixth century and the twentieth century by
the southern people especially people who all are speak Tamil and Malayalam. Particularly people in Tamilnadu
and Kerala to write Sanskrit and the classical language called Manipravalam. And still the Grantham language is in
restricted use in traditional Vedic Schools called vedha patasala. So this document targets towards create a mobile
application for this ancient language and this application will help the users to learn this language without the
physical guidance. The Grantham script are inserted in the application by using the digital image processor and this
application will help the learners to learn Grantham in the Exact way of teaching in vedha patasala. The main focus
of this document was to develop the mobile application for the educational purpose for the interested people, and in
the future the voice clips also provide for better learning |
|
Mobile Application for the Grantham Script |
Author : U.Azhagurajan, D.Sakthivel, R.Ayyappan, |
Abstract | Full Text |
Abstract :Grantham is one of the Indian script which is mostly used in the sixth century and the twentieth century by
the southern people especially people who all are speak Tamil and Malayalam. Particularly people in Tamilnadu
and Kerala to write Sanskrit and the classical language called Manipravalam. And still the Grantham language is in
restricted use in traditional Vedic Schools called vedha patasala. So this document targets towards create a mobile
application for this ancient language and this application will help the users to learn this language without the
physical guidance. The Grantham script are inserted in the application by using the digital image processor and this
application will help the learners to learn Grantham in the Exact way of teaching in vedha patasala. The main focus
of this document was to develop the mobile application for the educational purpose for the interested people, and in
the future the voice clips also provide for better learning. |
|
The Usage of Vein and Iris Along with Visual Steganography for Efficient User Authentication |
Author : P. Anitha , M. Grace |
Abstract | Full Text |
Abstract :Lately biometric based recognizable pieces of proof are broadly received for individual distinguishing
proof. Uni-modular biometric frameworks utilize just a single biometric quality, for example, unique mark,
finger vein, voice, confront, ear, iris, retina and so forth., which has a few impediments because of clamor,
parody assaults and so forth., These downsides can be overwhelmed by setting up multi-modular biometric
frameworks comprising of at least two biometric modalities in a solitary recognizable proof framework to
enhance the acknowledgment precision. In this paper, a multimodal approach has been proposed by
coordinating the finger vein and iris to improve the individual acknowledgment framework. Saving the
protection of put away biometric formats in a brought together database is of more vital at present. Visual
Steganography gives an intense strategy by which one mystery can be circulated in at least two offers. At the
point when the offers on transparencies are superimposed precisely together, the first mystery can be found
without PC cooperation. In the enlistment methodology, the mystery key (Aadhaar number) is encoded by
utilizing AES calculation and by utilizing the visual steganographicsystem; the encrypted secret key is shared
between the two images. The share1 is kept as the users ID card and the share2 is stored in the database. In the
verification procedure, new finger vein and iris images are obtained and verified with the images stored in the
database. It is computationally hard to obtain the biometric image from any individual stored sheets. This paper
explores the possibility of using visual steganography for efficient biometric security in the multimodal
approach.
|
|
Robonaut 2: About New Legs and Technologies |
Author : Ms. V. Dhivya, S. Divagar, J. Bharath |
Abstract | Full Text |
Abstract :National Aeronautics and Space Administration
(NASA) has now a day introducing the Robots to the space for
many useful and to do many dangerous technical faults that cannot
done by the humans.TheRobonaut2 which is the dexterous
humanoid robot, was designed and introduced by NASAs JSC
(Johnson Space Center) in collaboration with General Motors and
Oceaneering. The research of the Robonaut 2 that have been
started in 1997.And then the research leads to result of R1, human
like prototype of a robot that can be mounted on the wheels. And
the Space Act Agreement was signed in 2007, for the development
of R1.In this paper we discussed about the new legs invention and
first movement of R2 in ISS. The technology of the R2 has many
benefits and application like Logistics and Distribution, Industrial,
Medical and the major work on Hazardous Toxic or Remote
Environment. Robonaut 2 is a humanoid with many capabilities
allowing it to work side-by-side with humans and on task that
would normally not be done by robots.
|
|