60 hasil.
-
Sri Nawangsari
•
Dhea Ajeng Clara
•
Eri Prasetyo Wibowo
Satisfaction This research aims to know the effect of electronic service quality, product, price, promotion on customer satisfaction in the Lazada.co.id online store customers in Jakarta. Electronic s...
-
Veera Boopathy E.
Traffic in urban areas is increasing day by day which leads to most critical issues of traffic management this paper proposes a smart and fully automatic traffic control system that will detect and co...
-
Tanweer Alam
•
Abdulrahman A. Salem
•
Ahmad O. Alsharif
•
Abdulaziz M. Alhejaili
Home automation system is a system that controls by the smart device using a mobile application. It can control home appliances such as light, fans, air conditions, and smart security locks, etc. Blue...
-
Noureddine Maouhoub
•
Khalid Rais
Series resistance and mobility attenuation parameter are parasitic phenomena that limit the scaling of advanced MOSFETs. In this work, an iterative method is proposed to extract the series resistance ...
-
Harya Gusdevi
•
Ade Setya
•
Puji Handini Zulaeha
The conversion of kerosene use in household to gas, in addition to the decision of the Republic of Indonesia minister in relation to the movement of kerosene to gas, gas also given an affordable price...
-
Maurizio Nolé
•
Carlo Sartiani
In the recent years many real-world applications have been modeled by graph structures (e.g., social networks, mobile phone networks, web graphs, etc.), and many systems have been developed to m...
-
Shrutika Khobragade
•
Rohini Bhosale
•
Rahul Jiwahe
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software...
-
Hari Jyothula
•
S. Koteswara Rao
•
V. Valli Kumari
Image is a two dimensional capacity f(x, y). The way toward dividing an image into numerous parts or questions is named as Segmentation. There are two noteworthy deterrents in sectioning an image i.e....
-
P. Pallavi
•
Shaik Salam
Water is an important, but often ignored element in sustainable development by now it has been clear that urgent action is needed to avoid global water crisis. Water resource management is the ac...
-
Ravinder Paspula
•
K. Chiranjeevi
•
S. Laxman Kumar
A new-promising technology called DNA-Cryptography is emerged in the area of DNA- Computing field.DNA useful for store, sending the data and also to perform computation. Even it is under primal level,...
-
T. Nagarjuna
•
K. Nehru
•
G. Nagendra Prasad
•
Hema Chowdary
We proposed to use singular wavelet transform (SWT) in OFDM based LTE because the SWT based system does not require a cyclic prefix, so spectrum efficiency is increased. SWT is used to analyze signals...
-
Lalit Moha Satapathy
•
Samir Kumar Bastia
•
Nihar Mohanty
Now-a-days, automation in home is becoming more popular. It always remains important to consideraccuracy and speed in a said job. This paper is addressing an Arduino Mega micro-controller based Home B...
-
Arif- Ul- Islam
•
Shamim H. Ripon
•
Nuruddin Qaisar Bhuiyan
Women of all over the world suffer from a common cancer, named Cervical cancer. Cervical cancer cellsgrow slowly at the cervix. This cancer can be avoided if it is recognized and handled in its first ...
-
M. O. Ajewole
•
P. A. Owolawi
•
J. S. Ojo
•
R. M. Adetunji
Launching into the next generation of wireless communication network (5G network) requires secure highdata rate, high speed and huge bandwidth links. With the tremendous increase in broadband users, t...
-
Sourish Dhar
•
Sudipta Roy
Scientific documents and magazines involve large number of mathematical expressions and formulas alongwith text. The continuous growth of such documents necessitates the requirement of developing spec...
-
Alycia Sebastian
•
K. Siva Sankar
With technology advancement people have started using different type of memory devices for storing dataand keeping it secure has become concern in today's world. Universal Serial Bus (USB) flash drive...
-
Ardhian Agung Yulianto
While a data warehouse is designed to support the decision-making function, the most time-consuming partis the Extract Transform Load (ETL) process. Case in Academic Data Warehouse, when data source c...
-
El Akbar, R. Reza
•
Nani Ratnaningsih
•
Edi Hidayat
Describes the pattern of relationship between internet usages on students, on the assessment of aspects of selfregulated learning. The aspect of self-regulated learning measured from 10 aspects. This ...
-
Asep Kurnia Hidayat
•
El Akbar, R. Reza
•
Ai Sri Kosnayani
An expression of conflict in the field. To overcome this problem is a regulation of several parameters,including regulation of planting schedules and reduction of land area. The model of the irrigatio...
-
Abdullah Basahel
•
Abdullah M. Alqarni
This research is intended to evaluate the efficiency of proceures and processes used by the King AbdulazizInternational Airport (KAIA) in Jeddah, Saudi Arabia with the help of Six Sigma. For, we have ...
-
Ai Nurhayati
•
Frencius Frencius
Antivirus software industry is growing rapidly in the world in 2018. The domestic antivirus software industrymust be able to compete on a global scale. To face free trade, Indonesia's antivirus softwa...
-
Desi Pujiati
•
Margianti Margianti
•
Misdiyono Misdiyono
This study aimed at determining and analyzing the meta analysis on journals review of the managementcontrol system, strategy and company performance theme. The management control system used lever's a...
-
Zarni Sann
•
Thi Thi Soe
•
Kaythi Wyut Mhone Knin
•
Zin May Win
Data encryption is well known as essential for today's technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after ...
-
Debashis Das
•
Sourav Banerjee
•
Ayan Kundu
•
Swagata Chandra
•
Saptarshi Pal
•
1 lainnya
• Utpal Biswas
Cloud computinghas left its remarkable note on the computing world over the last few years. Through itseffectiveness, litheness, scalability & availability cloud computinghas changed the nature of...
-
Ajewole M. O.
•
Owolawi P. A.
•
Ojo J. S.
•
Adetunji R. M.
Reliable broadband communication requires secure high data rate and bandwidth links. With the observedincrease in broadband users, known communication systems such as RF and microwave links cannot pro...
-
Thiri Naing
•
Kyi Kyi Khaing
•
Tin Tin Nwet
Perimeter intrusion detection systems are an integral part of most physical security systems. The mainfocus of the Perimeter Intrusion Detection System (PID) is on the fence intrusion. To secure publi...
-
A. Aranganathan
•
C. D. Suriyakala
Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topologyin which the nodes can move anywhere, may join or leave the network through multi-hop communicatio...
-
Alaa Abid Muslam Abid Ali
•
Mohammed Iqbal Dohan
•
Saif Khalid Musluh
One of the very efficient and resource conservative image processing methodology is with the help of bilateralfilters. This technique filters the image without the help of edge smoothing but it does e...
-
Sarah N. Abdulwahid
The delivered effort in this manuscript is grounded on NS-2 (The Network Simulator 2) to implement thecongestion control process of classic TCP (Transmission Control Protocol), with new congestion con...
-
Srinivasa R. K.
•
A.R2, Hemantha Kumar
The growing interest over the mobile based communication has attracted the Long-Term Evolution (LTE)technique which facilitates higher data transmission rates to its dynamic users. The LTE-based netwo...
-
Hasan Ali Gamal Al-Kaf
•
Nayef Abdulwahab Alduais
•
Musaed Al-Subari
The implantation of a genetic algorithm (GA) in quantitating components of interest in near infraredspectroscopic analysis could improve the predictive ability of a regression model. Thus, this study ...
-
Nitin Arora
•
Alaknanda Ashok
•
Shamik Tiwari
Images are an important part of daily life. The huge repository of digitally existing images cannot be easilycontrolled by any individual. Extensive scanning of the image database is very much essenti...
-
Sengathir Janakiraman
Prompt and reliable data dissemination among the vehicular nodes of the network is indispensable as itsmobility rate and limited coverage characteristics introduce the possibility of frequent topology...
-
G. Shine Let
•
G. Josemin Bala
•
W. Magdalene
Scarce wireless resources, lead to development of cognitive radio network as a solution to unlicensed userscommunication in the licensed frequency band. In response to the behavior of licensed users c...
-
C. K. Shyamala
•
Anand K. Rajagopalan
Automatic identification systems represent a wide classification of devices used primarily in commercialsettings for inventory/logistics control. Familiar examples of such devices are bar codes, magne...
-
Yegireddi Ramesh
•
Kiran Kumar Reddi
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network res...
-
M. Sheshikala
•
D. Rajeswara Rao
•
Md Ali Kadampur
Complete data. Many of the real world data is Uncertain, for example, Demographic data, Sensor networksdata, GIS data etc.,. Handling such data is a challenge for knowledge discovery particularly in c...
-
R. Buli Babu
•
G. Snehal
•
Aditya Satya Kiran
Data mining can be used to detect model crime problems. This paper is about the importance of datamining about its techniques and how we can easily solve the crime. Crime data will be stored in crimin...
-
Santosh Kumar Suman
•
Mohd Aqib
•
Sumit Kumar Singh
Aim of this paper the infrastructure for the traditional grid & smart grid. Together depend uponmanagement and control system but the main modification is in the security system because it activit...
-
Dhanya G.
•
J. Jayakumari
The expanding significance of securing data over the network has promoted growth of strong encryptionalgorithms. To enhance the information protection in network communications, this paper presents a ...
-
Siti Hardiyanti Rukmana
•
Much Aziz Muslim
The procurement process became one of the important aspects for PT. PLN (Persero) to operate thecompany. One way to meet these needs is through the project tender. The tender process aims to get high-...
-
Prabhat Kumar Sahu
•
Binod Kumar Pattanayak
The modern electronic age consists of many new approaches for the communication among the humancivilizations and the AD HOC network is one of the successful self-configuring and infrastructure-lesscom...
-
Ramanathan P.
Remote PC controlled video transmitting Surveillance Car is a microcontroller based configuration whichsend serial information from PC by means of chip to the auto. This auto works as indicated by the...
-
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embeddedsystem in order to automatically control of multi appliances depend on the temperature value. T...
-
Samidha N. Kalwaghe
•
Atul Vasudev Dusane
The emerging technology of wireless sensor network (WSN) is expected to provide a broad range of applications, such as battlefield surveillance, environmental monitoring, smart spaces and so on. The c...
-
P. Pedda Sadhu Naik
•
T. Venu Gopal
This paper proposed a novel Block based Mean Shift Image Segmentation Algorithm to significantly reduce the computation and improve the segmentation accuracy for high resolution Medical Image. One of ...
-
Mastan Sharif Shaik
•
K. Satya Prasad
•
Rafi Ahamed Shaik
•
D. Venkata Rao
Several sign based LMS adaptive filters, which are computationally free having multiplier free weight update loops, are proposed for acoustic echo cancellation. The adaptive filters essentially minimi...
-
Manoj H. M.
•
Nandakumar A. N.
The role of design pattern in the form of software metric and internal code architecture for object-oriented design plays a critical role in software en-Gineering in terms of production cost efficienc...
-
Ogbeide K. O.
•
E. J, Eko Mwenrenren
The aim of this paper is to present and evaluate artificial neural network model used for path loss prediction of signal propagation in the VHF/UHF spectrum in Edo state.Measurement data obtained from...
-
Asmita Yadav
•
Sandeep Kumar Singh
This paper presents a comprehensive survey of bug triaging approaches in three classes namely machine learning based, meta-data based and profile based. All approaches under three categories are criti...
-
B. Kontagora Nuhu
•
O. T. Arulogun
•
Ibrahim Adepoju Adeyanju
•
Abdullahi I. M.
Riverine flood is a major disaster faced by most countries and has significant adverse effect on long term economic growth of affected regions and their environments. Several systems have previously e...
-
Abi Soliga
•
Godlin Jasil
Blind Image Quality Assessment (BIQA) methods are the most part feeling mindful. The BIQA method learns regression models from preparing images with human subjective scores to predict the perceptual n...
-
Kattaswamy Mergu
With rapid growth in today's technology, digital communication is playing a major role to provide hostile environment to meet various applications. In this communication, Coding plays a prominent role...
-
S. Saravanan
•
A. Jayanthiladevi
•
M. Geetha
Route selection is essential in everyday life. We have several algorithms for detecting efficient route on Large Road Networks. This paper introduces the hierarchical community, is presented. It split...
-
Shital D. Suryawanshi
•
P. V. Baviskar
The process of removing the specific object or area or repairing the damaged area in an image is known as image inpainting. This algorithm [5] is proposed for removing objects from digital image. The ...
-
Charlyn Pushpa Latha
•
Mohana Priya
Deep Learning is the recent machine learning technique that tries to model high level abstractions in databy using multiple processing layers with complex structures. It is also known as deep structur...
-
Busari Sherif A.
•
Dunmoye Abibat F.
•
Akingbade Kayode F.
Data Acquisition Systems (DAS) are used for a variety of applications such as environmental monitoring,indoor climate control, health management and medical diagnostics, traffic surveillance and emerg...
-
Mayank Kumar Gautam
•
Vinod Kumar Giri
ECG is basically the graphical representation of the electrical activity of cardiac muscles duringcontraction and release stages. It helps in determination of the cardiac arrhythmias in a well manner....
-
Paul W. Mutua
•
Mwangi Mbuthia
This paper describes the design of an intelligent energy efficient lighting system that uses multi-colouredLEDs and a fuzzy logic controller to produce light of the required luminance level and colour...
-
R. Ramalakshmi
•
S. Subash Prabhu
•
C. Balasubramanianb
The sensor network is used to observe surrounding area gathered and spread the information to other sink.The advantage of this network is used to improve life time and energy. The first sensor node or...