Agro- escalation android-web architecture
The application takes care of certain problems in agriculture and health care by concurrently capturing images, audio and video and sending them to a specified server. Agricultural Scientists or doctors can view or listen to this images/video/audio information and provide proper solutions, accordingly. The Technology used is Content Based Image Processing which matches the histogram of two samples and detect the plant disease at the Server End.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analytical Vs Experimental Approach to Implement Hard Disk Security Architecture
As of January 2011 the internet connected an estimated 941.7 million computers in more than 450 countries on every continent, even Antarctica (Source: Internet Software Consortium’s Internet Domain Survey; www.isc.org/index.pl). The internet is not a single network, but a worldwide collection of loosely connected networks that are accessible by individual computer hosts, in a variety of ways, to anyone with a computer and a network connection.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Youth dependency on communication and information technology in developing countries: an analysis
This paper attempts to look at how information and communication technology continually influence the people, their lives and practices in general in developing countries, and examine whether it is for better or for worse. Dependency of low-income groups on information technology is not a mere phenomenon, but a solid hard-ground fact, and has a number of benefits as well as costs. However, at the end it is suggested that in addition to ICT being more advantageous than disadvantageous for third world countries, more effort needs to be put in educating the users of such technology, so that the costs associated with their use can be minimized, and the benefits maximized.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Data Security with Hybrid Aes-Des
The problem with AES, most extensively used encryption, is that it uses many multivariate equations which are linear in nature . Thus it can be broken using algebraic cryptanalysis. This provides a serious threat as AES was considered to be unbreakable and thus it was used in many encryption systems. The DES predecessor of AES has problem of multivariate linear equation and speed. By exploiting the key steps and vulnerabilities in these algorithms it is possible to break through AES and DES secured data.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Big data: Magnification beyond the relational database and data mining exigency of cloud computing
Today the term big data draws a lot of attention. Big data is the new technology that enables an organization to take advantage of the natural resource of big data. Organizations store up huge amounts of information, they can mine those databases to discover subtle patterns, correlations, or relationships that human brains can’t perceive on their own because the scales involved are beyond our ability to process. Big data is a hot topic in the market today and attracted a lot of attention from retail, automotive, and manufacturing industry, government as well as academia. This paper introduces several enhancements in big data over data mining and relational database. Finally, I discuss the urgency of big data processing in cloud computing environments.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Assessment of readiness for establishment of web-based business processes (Case study of Zabol University)
In the information era, all the processes, sciences and different structures, under the shadow of IT and communication, grow and differ so fast that it puts staff and organizations in need of some tools to use them for coordinating themselves with the fast evolutions that have happened. Therefore, officials should perceive the potential advantages of achieving applications of IT and communication and they should apply these applications in their universities. This current research has the aimed of studying the preparation for establishment of web-based business processes in Zabol University. The method of research is descriptive-survey research. In this research, all the officials and experts of the organizational scope of Zabol University have been chosen as actuarial society. Since the actuarial society was very small, sampling in the form of census was used, so the whole actuarial society was chosen as sample. Therefore, the total number of officials and experts in the organizational scope are 57 People that were chosen as sample. For collecting data, questionnaire with adoption of Kirty Roykar (2004) has been used. The justifiability of the questionnaire is content type and its stability has been calculated by using Cranach’s alpha coefficient of 98%.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Governance of IT in Indian Banks – An Immense Need
Information technology has become an essential component of any financial organization in the present global scenario. Information Technology governance is a concept that has suddenly emerged and become an important issue in the information technology field. It has been observed by researcher banks in India are using IT based systems from last three decades for performing different banking functions but their implementation is done in a disorganized manner. Therefore implementation of IT is not as effective as it should be. In fact implementation is not everything all but its prefect governance is a must to get the optimum benefits of IT enabled modern technologies. For getting real fruits of IT, proper IT governance is required. This article tries to highlight importance of IT governance, obstacles in IT governance and implementation framework for IT governance in banks.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Outerloop pipelining in FFT using single dimension software pipelining
The aim of the paper is to produce faster results when pipelining above the inner most loop. The concept of outerloop pipelining is tested here with Fast Fourier Transform. Reduction in the number of cycles spent flushing and filling the pipeline and the potential for data reuse is another advantage in the outerloop pipelining. In this work we extend and adapt the existing SSP approach to better suit the generation of schedules for hardware, specifically FPGAs. We also introduce a search scheme to find the shortest schedule available within the pipelining framework to maximize the gains in pipelining above the innermost loop. The hardware compilers apply loop pipelining to increase the parallelism achieved, but pipelining is restricted to the only innermost level in nested loop. In this work we extend and adapt an existing outer loop pipelining approach known as Single Dimension Software Pipelining to generate schedules for FPGA hardware coprocessors. Each loop level in nine test loops is pipelined and the schedules are implemented in VHDL. Across the nine test loops we achieve acceleration over the innermost loop solution of up to 7 times, with a mean speedup of 3.2 times. The results suggest that inclusion of outer loop pipelining in future hardware compilers may be worthwhile as it can allow significantly improved results to be achieved at the cost of a small increase in compile time.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Iris recognition - an efficient biometric for human identification
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. In this paper, an efficient method for personal identification based on the pattern of human iris is proposed. It is composed of image acquisition, image preprocessing to make a flat iris then it is converted into eigeniris and decision is carried out using only reduction of iris in one dimension. By comparing the eigenirises it is determined whether two irises are similar. The results show that proposed method is quite effective.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A novel method for text extraction
Text detection and recognition in real images taken in unconstrained environments, such as street view images, remain surprisingly challenging in Computer Vision. Extraction of text and caption from images and videos is important and in great demand for video retrieval, annotation, indexing and content analysis. In this paper, we propose a text extraction algorithm using Dual Tree Complex transform. It is demonstrated that the proposed method achieved reasonable accuracy of the text extraction for moderately difficult examples.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]