Are you over 18 and want to see adult content?
More Annotations
A complete backup of sport.se.pl/pilka-nozna/primera-division/messi-zmiazdzony-po-el-clasico-tak-zlych-liczb-argentynczyk-jeszcz
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of ethicalsystems.org
Are you over 18 and want to see adult content?
A complete backup of psyneuen-journal.com
Are you over 18 and want to see adult content?
A complete backup of hrampetraipavlavosstanovlenie.ru
Are you over 18 and want to see adult content?
A complete backup of stworzwnetrze.com.pl
Are you over 18 and want to see adult content?
A complete backup of frintongreatdanes.co.uk
Are you over 18 and want to see adult content?
Text
__ __ __ __ __
__ __
* Register __
* Login __
* Home
* About
* Editorial Team
* Submissions
* Current Issue
* Archives
* Contact
All Issue
Online first
INTERNATIONAL JOURNAL OF ENGINEERING AND COMPUTER SCIENCE ISSN : 2319-7242 | DOI : 10.18535/ijecs | INTEXCOPERNICUS ICV : 76.25RSS
Submission
CALL FOR PAPER VOLUME 9 ISSUE 01 JANUARY 2020 SUBMISSION DEADLINES VOLUME / ISSUE / MONTH : VOLUME 09 ISSUE 01, JANUARY 2020 READ MORE SUBMIT ONLINE : CLICK HERE TO SUBMIT SUBMIT OFFLINE : EDITOR@IJECS.IN FINAL SUBMISSION : EDITOR@IJECS.IN IJECS is an International, Peer reviewed, Journal, Paper will publish immediately in current issue after registration. IJECS accepts original and high quality research and technical papers.:*
Overview
*
Latest Article
*
Most Read
INTERNATIONAL JOURNAL OF ENGINEERING AND COMPUTER SCIENCE IJECS is a leading international journals for publication of new ideas, the state of the art research results and fundamental advances in all aspects of computer science and engineering. IJECS is a scholarly open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications related to Computer Science and Engineering It is an international journal intended for professionals and researchers in all fields of computer science and electronics. The IJECS publishes research articles and reviews within the whole field computer science & engineering, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. IJECS welcomes the submission of documents relating to any branch of the Theory of Computing and Engineering and its applications in business, industry and other topics. The topics covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, industrial engineering, internet computing, networking, operations research scientific computing, software engineering and its applicationsEDITORIAL POLICY
Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected. The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the JournalWHY IJECS
* IJECS is an International, Peer reviewed, Open Access Journal * Paper will publish immediately in current issue afterregistration
* IJECS accepts original and high quality research andtechnical papers
* Authors can download their full length paper at any time * frequency of publication Monthly Articles of IJECS are subjected to peer reviewing and these are included in the standard indexing databases like Cross Ref DOI, Index Copernicus (IC Value), Scientific Indexing Services SIS, Directory of Open Access Journals DOAJ, Directory of Research Journals Indexing DRJI, Google Scholar, Research Bible, New Jour, Jour Informatics, Science Center.IMPORTANT NOTICE
Authors can now directly send their manuscript as an email attachmentto editor@ijecs.in
All manuscripts are subject to rapid peer review. Those of high quality (not previously published and not under consideration for publication in another journal) will be published without delay. First-time users are required to register themselves as an author before making submissions by signing up the author registration format journals website
www. http://ijecs.in With the online journal management system that we are using, authors will be able to track manuscripts progress through the editorial process by logging in as author in authors Dashboard. TOP REASONS FOR PUBLICATION WITH US QUICK QUALITY REVIEW: The journal has strong international team of editors and reviewers, Rapid Decision and Publication VERY LOW PUBLICATION FEES: Comparable journals charge a huge sum for each accepted manuscript. IJEECS only charge the fees necessary to recoup cost associated with running the journal IJECS would take much care in making your article published without much delay with your kind cooperation. IJECS hopes that Researchers, Research scholars, Academician, Industrialists, Consultancy etc. would make use of this journal publication for the development of science and technology FEASIBILITY OF QUANTUM COMPUTERS IN CRYOGENIC SYSTEMS Viplove Divyasheesh, Rakesh Jain FEASIBILITY OF QUANTUM COMPUTERS IN CRYOGENIC SYSTEMS __ VIPLOVE DIVYASHEESH, RAKESH JAIN Quantum computers consist of a quantum processor – sets of quantum bits or qubits operating at an extremely low temperature – and a classical electronic controller to read out and control the processor. The machines utilize the unusual properties of matter at extremely small scales – the fact that a qubit, can represent “1” and “0” at the same time, a phenomenon known as superposition. (In traditional digital computing, transistors in silicon chips can exist in one of two states represented in binary by a 1 or 0 not both). Under the right conditions, computations carried out with qubits are equivalent to numerous classical computations performed in parallel, thus greatly enhancing computing power compared to today’s powerful supercomputers and the ability to solve complex problems without the sort of experiments necessary to generate quantum phenomena. this technology is unstable and needs to be stored in a cool environment for faster and more secure operation.In this paper, we discuss the possibility of integrating quantum computers with electronics at deep cryogenic temperatures.More.. PDF
Close Abstract PDF
Articles | 2020-01-21 | Page 24919-24920 CHALLENGE AND ITS OPPORTUNITY TO DELIVER EDUCATION THROUGH CLOUD COMPUTING ENVIRONMENT IN ETHIOPIAAsebe Teka Nega
CHALLENGE AND ITS OPPORTUNITY TO DELIVER EDUCATION THROUGH CLOUD COMPUTING ENVIRONMENT IN ETHIOPIA__ ASEBE TEKA NEGA
These days technology plays enormous roles in making day to day human activities easier. Previously established institutions need to reconstruct their data centers to run their business in an easy and comfortable manner. information and communication technologies (ICT) used for progressive improvement in the quality of education. in most developing country education disseminate rate is low with different factors poor of infrastructure, well engaged and capable teachers, geographical locations, different education tools, laboratories and also budgeting issues are the main challenges, as government higher education can invest more budget and they can deploy different clouds for a society at least one public university in one state have responded to deploy a cloud. they can distribute centrally different educational information’s, books, and so on, again not expected that all schools are developing their own datacenter and full fill different computing infrastructure’s which cost more instead with this scenario all schools including primary, secondary and university’s mostly fourth-generation universities since they may take a lot of time to deploy their infrastructures until they can use another’s universities cloud minimizing costs and manpower.More.. PDF
Close Abstract PDF
Articles | 2020-01-09 | Page 24913-24918 RESEARCH ON THE COUNTERMEASURES OF BUILDING SMART COMMUNITY BASED ONCLOUD COMPUTING
Liu Li Juan
RESEARCH ON THE COUNTERMEASURES OF BUILDING SMART COMMUNITY BASED ONCLOUD COMPUTING
__ LIU LI JUAN
Smart communities are the result of the evolution of communities under the development of new technologies. Many cities regard smart communities as one of the three regional demonstrations of smart city construction. Based on the experience of the construction of excellent intelligent communities at home and abroad, this paper analyzes the problems and difficulties in the current smart community construction, puts forward specific feasible countermeasures, and designs the smart community structure, which can promote the humanization of community governance, the integration of community services and the intelligentization of home life.More.. PDF
Close Abstract PDF
Articles | 2020-01-06 | Page 24907-24912 THE TREND OF SOFTWARE COST ESTIMATION IN ETHIOPIA CASE STUDY : ADDISABABA
Asebe Teka Nega
THE TREND OF SOFTWARE COST ESTIMATION IN ETHIOPIA CASE STUDY : ADDISABABA
__ ASEBE TEKA NEGA
For a different item, you can purchase it. There are different costs to purchase that you can analysis the benefit and loses, even if on the software it has different approaches to analysis their wages, the developer company can get their analysis by the different methods. There are a lot of software cost estimation methods are appearing in different years but still, those methods have their own drawback on making a correct effort and scheduling estimation, here in the paper Today there are different software cost estimation methods that the software company uses from the requirement to implementation phase. Corrected cost estimation supports us to complete the project on planned times and budgets. This paper is mainly presenting the current situations of cost estimation on software placed in Addis Abebas different software componyMore.. PDF
Close Abstract PDF
Articles | 2019-12-31 | Page 24901-24906 IMPLEMENTATION OF DATABASE USING PYTHON FLASK FRAMEWORK Nidhi Chauhan, Mandeep Singh, Ayushi Verma, Aashwaath Parasher,Gaurav Budhiraja
IMPLEMENTATION OF DATABASE USING PYTHON FLASK FRAMEWORK: COLLEGE DATABASE MANAGEMENT SYSTEM __ NIDHI CHAUHAN, MANDEEP SINGH, AYUSHI VERMA, AASHWAATH PARASHER,GAURAV BUDHIRAJA
This paper is aimed at development of a college database management system that can be used in any educational institution. Python flask framework is used to implement this application, that can be accessed throughout the institution or by any specific department of the institution. This system offers different features to the students and the members of the staff which includes attendance and marks of the students that can be accessed by both student and staff but can be only updated by staff of particular department . Students as well as staffs have separate logins that can be accessed by them easily . The system also includes a library management system which works in real time,a micro transport management system and a training and placement management system.Library management system keeps track of the books issued and also calculates the fine generated for delay in book returning and transport system maintains the record of each student i.e bus number ,route of that bus etc . A separate system for analysing the placement record of the college is also present . This system is developed to maintain and facilitate easy access to information to every member associated with this system. For this the users must be registered with the system after which they can access their accounts as well as modify data as per the permissions given tothem.
Python flask framework is the technology that we have used to develop the college management system. Flask is a web framework written in python. It can be classified into microframework because it does not require any particular tolls or libraries. However flask supports extension that can add application features . For frontend we have used HTML,CSS and javascript whereas for backend we have used python flask and mysql.This system helps college and universities to save time , money and resources.More.. PDF
Close Abstract PDF
Articles | 2019-12-20 | Page 24894-24899 COMPARATIVE PERFORMANCE ANALYSIS OF OPTIMIZED ROUND ROBIN SCHEDULING(ORR) USING DYNAMIC TIME QUANTUM WITH ROUND ROBIN SCHEDULING USING STATIC TIME QUANTUM IN REAL TIME SYSTEM Pallab Banerjee, Biresh kumar, Amarnath Singh, Rahul Kumar, Ritikkumar
COMPARATIVE PERFORMANCE ANALYSIS OF OPTIMIZED ROUND ROBIN SCHEDULING(ORR) USING DYNAMIC TIME QUANTUM WITH ROUND ROBIN SCHEDULING USING STATIC TIME QUANTUM IN REAL TIME SYSTEM __ PALLAB BANERJEE, BIRESH KUMAR, AMARNATH SINGH, RAHUL KUMAR, RITIKKUMAR
_One of major component of operating system is task scheduling for the optimum utilization of the resources. Round Robin had been an effective task scheduling method so far, but it has certain limitations. It uses static time quantum which sometimes leads to starvation. The proposed Optimised Round Robin is a modified version of the existing Round Robin scheduling which results in better average time and average turnaround time and overall increase in the performance. The comparative analysis is being done that indicates ORR gives improvement in the system performance._More.. PDF
Close Abstract PDF
Articles | 2019-12-15 | Page 24890-24893 DESIGN AND ANALYSIS SENSOR DEPLOYMENT SCHEME FOR UNDERWATERCOMMUNICATION
Taranath N L, Shwetha S Y, Chethan B.R., Mr. Darshan L M DESIGN AND ANALYSIS SENSOR DEPLOYMENT SCHEME FOR UNDERWATERCOMMUNICATION
__ TARANATH N L, SHWETHA S Y, CHETHAN B.R., MR. DARSHAN L M At the point while setting up the submerged acoustic sensor system (UASN), hub deployment will be the above all else errand, whereupon numerous basic system administrations, for example, system topology control, directing, & limit recognition, will be manufactured. Where hub deployment at 2-D physical remote sensor systems had been broadly concentrated, little consideration must be gotten through the 3-Dpartners.
This paper goes for examining the effects for hub deployment procedures at localization exhibitions at the 3-D environment. All the more particularly, these re-enactments directed at this project uncover which of general tetrahedron deployment plan outflanks these irregular deployment plan & this 3D shape deployment plan as far as decreasing localization blunder & expanding localization proportion by keeping up these normal number for neighbouring anchor hubs & system availability. Given this way which arbitrary deployment will be essential decision for greater part of viable applications for date, the outcomes will be relied upon for reveal some insight onto the outline UASNs sooner rather than later.More.. PDF
Close Abstract PDF
Articles | 2019-12-04 | Page 24883-24889 CREDIT CARD FRAUD DETECTION USING HIDDEN MARKOV MODEL Mandeep Singh, Sunny Kumar, Sunny Kumar, Tushant Garg CREDIT CARD FRAUD DETECTION USING HIDDEN MARKOV MODEL __ MANDEEP SINGH, SUNNY KUMAR, SUNNY KUMAR, TUSHANT GARG Now a day the usage of credit cards and net banking for online payments has dramatically increased. The most popular mode of online as well as regular purchase payments is through credit card and security of such transactions is also a major issue as frauds are increasing rapidly. In the existing scenario, fraud is detected after the transaction is done and it makes more difficult to find out fraudulent loses barred by issuing authority. In this paper, we observe the behaviour of credit card transactions using a Hidden Markov Model (HMM) and show how it detects frauds. An HMM is initially trained with the normal behaviour of transaction. If the present credit card transaction is not accepted by the trained HMM with enough high probability, then it declares as a fraudulent transaction. At the same time, we try to ensure that no genuine transactions are rejected.More.. PDF
Close Abstract PDF
Articles | 2019-12-01 | Page 24878-24882 MODIFICATION OF KNN ALGORITHM Shubham Pandey, Vivek Sharma, Garima Agrawal MODIFICATION OF KNN ALGORITHM __ SHUBHAM PANDEY, VIVEK SHARMA, GARIMA AGRAWAL K-Nearest Neighbor (KNN) classification is one of the most fundamental and simple classification methods. It is among the most frequently used classification algorithm in the case when there is little or no prior knowledge about the distribution of the data. In this paper a modification is taken to improve the performance of KNN. The main idea of KNN is to use a set of robust neighbors in the training data. This modified KNN proposed in this paper is better from traditional KNN in both terms: robustness and performance. Inspired from the traditional KNN algorithm, the main idea is to classify an input query according to the most frequent tag in set of neighbor tags with the say of the tag closest to the new tuple being the highest. Proposed Modified KNN can be considered a kind of weighted KNN so that the query label is approximated by weighting the neighbors of the query. The procedure computes the frequencies of the same labeled neighbors to the total number of neighbors with value associated with each label multiplied by a factor which is inversely proportional to the distance between new tuple and neighbours. The proposed method is evaluated on a variety of several standard UCI data sets. Experiments show the significant improvement in the performance of KNN method.More.. PDF
Close Abstract PDF
Articles | 2019-11-28 | Page 24869-24877 AN APPROACH FOR IMAGE CONTRAST AND RESOLUTION ENHANCEMENT BASED WAVELET TRANSFORM BY INCORPORATING CUCKOO SEARCH AND SVD ALGORITHMS Sandeepa K S, Basavaraj N Jagadale, J S Bhat AN APPROACH FOR IMAGE CONTRAST AND RESOLUTION ENHANCEMENT BASED WAVELET TRANSFORM BY INCORPORATING CUCKOO SEARCH AND SVD ALGORITHMS __ SANDEEPA K S, BASAVARAJ N JAGADALE, J S BHAT Image enhancement techniques are prominently used to analyze the image by enhancing key factors like contrast, resolution, and quality of the image. With the proper analysis of images, it is desirable to pre-process the image for resolution and contrast enhancement. We present here a new approach based on discrete wavelet transform (DWT), singular value decomposition (SVD) for image contrast and resolution enhancement, The contrast of the image is enhanced by maximum value fusion technique applied to the images created by using modified cuckoo search algorithm (CSA) and singular value decomposition separately. The masking approach is employed, for obtaining residual pixel value between original and scaled images independently. The resolution of the image is enhanced by combining interpolated high-frequency sub-band and maximum value fusion images. The proposed algorithm helps to minimize the noise artifacts and over enhancement problems. Experimental results are tested in terms of peak signal to noise ratio (PSNR) and absolute mean brightness error (AMBE). The proposed method shows better performance compared to other contrast and resolution enhancement techniques.More.. PDF
Close Abstract PDF
Articles | 2019-11-20 | Page 24858-24868 THE APPLICATION OF EXPERT SYSTEM OF ARTIFICIAL INTELLIGENCE FOR ADVICE IN DETECTION OF DISEASE IN HEALTH CARE Mr. Rohit Kumar, Dr. Amar Nath Singh THE APPLICATION OF EXPERT SYSTEM OF ARTIFICIAL INTELLIGENCE FOR ADVICE IN DETECTION OF DISEASE IN HEALTH CARE __ MR. ROHIT KUMAR, DR. AMAR NATH SINGH In the present scenario the health is the prime concern for every of us. Due to the increase in pollution and the other contaminants in environmental atmosphere the chances of getting a disease is became a common factor. No, doubt we are very cautious to prevent ourselves but still due to because of busy schedule we can’t able to take a proper precaution. Hence the medical science in association with modern technology and with the contribution of AI, has invented various gadgets using which we can take a precaution at earlier stages of disease. These devices are using the secure mode of data transmission for transferring the data in private mode. Here in this paper we are going to discuss the various aspect of medically analysis and detection of disease in Health care.More.. PDF
Close Abstract PDF
Articles | 2019-10-26 | Page 24855-24857 ITD DATA QUALITY MATURITY (A CASE STUDY)Hewa Majeed Zangana
ITD DATA QUALITY MATURITY (A CASE STUDY) __ HEWA MAJEED ZANGANA Nowadays, more and more organizations are realizing of importance of their data, because it can be considered as an important asset in present nearly all business organizational processes. Information Technology Division (ITD) is a department in the International Islamic University Malaysia (IIUM) that consolidates efforts in providing IT services to the university. The university data management started with decentralized units, where each center or division has its own hardware and database system. Later it improved to become became centralized, and ITD is now trying to one policy across the whole university. This will optimize the high performance of data management in the university. A visit has been done to ITD building and a presentation has been conducted discussing many issues concerning data management quality maturity in IT division at IIUM. We got some notices like server’s room location, power supply and backup and existence of data redundant. These issues are discussed in details in the next sections of this paper and some recommendations are suggested to improve data quality in theuniversity.
The quality of the data is very important in decision making, especially for a university that is trying to improve its strategy towards a research university and rise its rank among the WorldUniversity Ranking.
More.. PDF
Close Abstract PDF
Articles | 2019-10-14 | Page 24851-24854 STOCK MARKET PREDICTION USING MACHINE LEARNING AND CLOUD COMPUTINGNirbhay Narkhede
STOCK MARKET PREDICTION USING MACHINE LEARNING AND CLOUD COMPUTING__ NIRBHAY NARKHEDE
In the world with increasing globalization , where money places a crucial role in determining the expansion and earnings of a company trading places a very crucial role. Multiple companies invest millions and billions of dollars in other countries with an expectation to make profits. In such a risky business Predicting the movement of the market can help companies or individual in making good decisions and can prevent severe loses. In this research paper we will discuss how we can use the computational power of the computer on cloud along with the machine learning algorithms to predict the closing values of the stocks which is a big challenge otherwise. For this purpose we will use Python as our programming language which supports a lot of ML based Libraries. The models we will be using are SVM(Support Vector Machine) , Linear Regression , Random Forest, XGBoost ,LSTM for deeplearning
More.. PDF
Close Abstract PDF
Articles | 2019-09-26 | Page 24847-24850 MAMDANI-FUZZY FRAMEWORK FOR ACADEMIC STAFF SELECTION AND PLACEMENT IN NIGERIAN UNIVERSITIES Ibrahim Manga, S.D. Samaila, H. Bello MAMDANI-FUZZY FRAMEWORK FOR ACADEMIC STAFF SELECTION AND PLACEMENT IN NIGERIAN UNIVERSITIES __ IBRAHIM MANGA, S.D. SAMAILA, H. BELLO Selection and placement of appropriate personnel for the right job leads to great success in any organization. However, this is one of the most important activities carried out by Human Resource (HR). Minimizing imprecision and subjective value judgment in personnel selection processes were taken into consideration in this research by developing personnel selection and placement framework using the Mamdani- fuzzy model. This research work is aimed at developing Mamdani- fuzzy framework for academic staff selection and placement. A model with three levels has been developed to manage the database, and the necessary conditions required from applicants for selection and placement, and the consideration of individual temperament was paramount. Tools: Java script and HTML (for the front end) PHP and MySQL (for the database storage as back end). Experimental results using fuzzy classification membership function defined by the truth value of a fuzzy propositional function would also be used as part of the analysis and design. When the need arise, MathLab would be employed for some analysis and simulations. A graphical user interface (GUI) would be developed for all the relevant forms in order to effectively interact with the users of the systemMore.. PDF
Close Abstract PDF
Articles | 2019-09-19 | Page 24838-24846 AN EFFICIENT CLUSTERING ALGORITHM FOR MAX LINK SELECTION ON CRN Mahiboob Pasha RM, Surendranath H AN EFFICIENT CLUSTERING ALGORITHM FOR MAX LINK SELECTION ON CRN __ MAHIBOOB PASHA RM, SURENDRANATH H Lifetime enhancement has always been a crucial issue as most of the cognitive radio network (CRNs) operates in unattended environment where human access and monitoring are practically infeasible. Clustering is one of the most powerful techniques that can arrange the system operation in associated manner to attend the network scalability, minimize energy consumption and achieve prolonged network lifetime. To conquer this issue, current researchers have triggered the proposition of many numerous clustering algorithms. However, most of the proposed algorithms overburden the cluster head (CH) during cluster formation. To overcome this problem, many researchers have come up with the idea of fuzzy logic (FL), which is applied in CRN for decision making. These algorithms focus on the efficiency of CH, which could be adoptive, flexible, and intelligent enough to distribute the load among the sensor nodes that can enhance the network lifetime. But unfortunately, most of the algorithms use type-1 FL (T1FL) model. In this work, we propose a clustering algorithm on the basis of interval type-2 FL model, expecting to handle uncertain level decision betterthan T1FL model.
More.. PDF
Close Abstract PDF
Articles | 2019-09-13 | Page 24834-24837 COMPARATIVE STUDY ON DATA MINING TECHNIQUES USED TO PREDICT RISK OFHEART DISEASE
Tejali Chandrakant Mhatre, Satishkumar Varma COMPARATIVE STUDY ON DATA MINING TECHNIQUES USED TO PREDICT RISK OFHEART DISEASE
__ TEJALI CHANDRAKANT MHATRE, SATISHKUMAR VARMA Heart disease is considered as one of the major causes of death throughout the world. Classification of heart disease can be valuable for medical practitioners to predict disease at early stage. To get accurate result of prediction of disease medical diagnosis system very useful. There are different data mining techniques available to classify medical data related to heart disease. In this paper, survey is carried out to find which are different data mining techniques can be used for heart disease prediction system.More.. PDF
Close Abstract PDF
Articles | 2019-08-21 | Page 24829-24833 DESIGN AND IMPLEMENTATION OF MULTIDIMENSIONAL STUDENTS RESULT ANALYTICAL PROCESSING FOR TERTIARY INSTITUTIONS Ekwonwune Emmanuel N, Anyaduba Obiageli J, Vivian Osinachi DESIGN AND IMPLEMENTATION OF MULTIDIMENSIONAL STUDENTS RESULT ANALYTICAL PROCESSING FOR TERTIARY INSTITUTIONS __ EKWONWUNE EMMANUEL N, ANYADUBA OBIAGELI J, VIVIAN OSINACHI Online Analytical Processing (OLAP) is playing a vital role in today’s business work as well as in other domain. It gives the users an analytical view of data resulting in effective decision making. Many domains are applying Online Analytical Processing (OLAP) for different kinds of analysis due to its excellent performance and wide adaptability, such as analysis of network traffic and remote sensing images. The objective of this work therefore is to develop a web result portal that will enable lecturers post and compare students’ results for quick assessment. I was motivated in order to reduce stress, workload and discomfort always encountered by the lecturers and school examination body during computation, compilation and reconciliation of students’ results. Object-Oriented Analysis (OOADM) will be adopted as the methodology while Java will be used as the programming language. The expected result is web-based software for students result processing that will eliminate the problems of manual database system used in tertiary institutions.More.. PDF
Close Abstract PDF
Articles | 2019-08-20 | Page 24814-24828 BIOMETRIC AUTHENTICATION SYSTEM USING FACE GEOMETRY Ibebuogu Chinwe C, Philip Seth, Anyaduba Obiageli J BIOMETRIC AUTHENTICATION SYSTEM USING FACE GEOMETRY __ IBEBUOGU CHINWE C, PHILIP SETH, ANYADUBA OBIAGELI J _This seminar paper deals with biometric authentication, using human facial geometry as the login verification parameter. Biometric is the measurement and statistical analysis of human's unique physical and behavioral characteristics by mapping face geometry, fingerprints, iris, and voice. The aim of this seminar paper is to develop a functional Biometric Authentication System Using Face Geometry as the authentication method. Facial Geometry Authentication is a category of biometric technology that maps an individual's facial features mathematically and stores the data as face-prints in a database. Meanwhile the objective of this paper is to improve data access security, enhance identification accuracy, and contribute to the improvement of the existing facial recognition systems, focusing mainly on increasing its accuracy performance. On the other hand, hacking into users’ privacy, loss of confidential information, and high running costs, among others geared the motivation to develop a biometric authentication system using face geometry. Furthermore, the software engineering methodology adopted in this seminar paper is the Structural System Analysis and Design Methodology (SSADM). The software is developed in Visual C-sharp, and the database in SQL Server 2012; using Microsoft Visual Studio 2012 as the integrated development environment. Besides, OpenCV 2.4.8 library is used for image processing, image mapping, and computer vision. The expected result of this seminar paper include: improved user data security, and increased efficiency in facial detection/recognition._More.. PDF
Close Abstract PDF
Articles | 2019-08-20 | Page 24805-24813 THE IMAGE SEGMENTATION BASED ON THRESHOLDING, CLUSTER BASED AND ROIMETHOD
Narendra Kumar S
THE IMAGE SEGMENTATION BASED ON THRESHOLDING, CLUSTER BASED AND ROIMETHOD
__ NARENDRA KUMAR S
_Image processing plays a one of the important vital role in developing real world application is an Image Segmentation, which is used widely in Computer vision for the purpose of object tracking and to identify image boundaries._ _It aims at extracting meaningful objects lying in the image. Generally there is no unique method or approach for image segmentation The different algorithms used in Image segmentation are Clustering-based, Region-based and Edge based. Image segmentation is the division or separation of an image into multiple segments i.e. set of pixels, pixels in a region are similar according to some criterion such as color, intensity or texture.__ This paper gives the view about the methods in image segmentation such as thresholding, k-means clustering, grab-cut method and graph -cut method. Every method is discussed along with its advantage and disadvantages which helps us in deciding which the best and efficient method of image segmentation is. The main aim of the paper is to come out with the more efficient method in image segmentation which can be used for real world application development._More.. PDF
Close Abstract PDF
Articles | 2019-08-05 | Page 24697-24804 EMBEDDING AND EXTRACTION OF IMAGE WATERMARKING USING ALPHA BLENDING TECHNIQUE BASED ON DISCRETE WAVELET TRANSFORM Narendra Kumar S, Mohammed Waseem EMBEDDING AND EXTRACTION OF IMAGE WATERMARKING USING ALPHA BLENDING TECHNIQUE BASED ON DISCRETE WAVELET TRANSFORM __ NARENDRA KUMAR S, MOHAMMED WASEEM Digital watermarking has become a promising research area to face the challenges created by the rapid growth in distribution of digital content over the internet. To prevent misuse of this data, digital watermarking techniques are very useful. Here, a new algorithm that can be used for copyright protection is introduced for the embedding and detection of a watermark in the domain of discrete wavelet transform (DWT). The elements of the logo watermark are embedded directly to the one-level DWT decomposed sub-bands. The experimental tests and results of this scheme have shown that the scheme has the desired properties such as invisibility and robustnessMore.. PDF
Close Abstract PDF
Articles | 2019-08-05 | Page 24690-24796 Analysis and Design Of Multistory Apartment Building Using ETABS59 |
International Journal of Engineering and Computer Science A research Paper on Cryptography Encryption and Compression Techniques31 |
International Journal of Engineering and Computer Science Enhancing the Security of Data Using DES Algorithm along with Substitution Technique30 |
International Journal of Engineering and Computer Science Review of Selection Methods in Genetic Algorithms23 |
International Journal of Engineering and Computer Science A detailed study of Software Development Life Cycle (SDLC) Models21 |
International Journal of Engineering and Computer ScienceMake a Submission
Author Desk
* Call for Paper
* Author Guideline
* Publication Fee
* Mode of payment
* Copyright From
* Manuscript Template* Indexing
* Review Process
* Publishing Ethics
Information
* For Readers
* For Authors
* For Librarians
Current Issue
*
*
*
LATEST ARTICLE
ABOUT US
International Journal of Engineering and Computer Science is , open access, peer reviewed, monthly journals publisher We believe in publication ethics and request all the authors for same.USEFUL LINKS
* __Home
* __Editorial Board
* __Current Issue
* __Archive
INFORMATION
* __Online Submission* __For Authors
* __Disclaimers
* __Terms of use
MAILING LIST
Sign up for our mailing list to get latest updates and offers.__
* __
* __
* __
* __
* __
Published by International Journal of Engineering and Computer Science.
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0