Automatic identification systems represent a wide classification of devices used primarily in commercialsettings for inventory/logistics control. Familiar examples of such devices are bar codes, magne...
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network res...
Complete data. Many of the real world data is Uncertain, for example, Demographic data, Sensor networksdata, GIS data etc.,. Handling such data is a challenge for knowledge discovery particularly in c...
Data mining can be used to detect model crime problems. This paper is about the importance of datamining about its techniques and how we can easily solve the crime. Crime data will be stored in crimin...
Aim of this paper the infrastructure for the traditional grid & smart grid. Together depend uponmanagement and control system but the main modification is in the security system because it activit...
The expanding significance of securing data over the network has promoted growth of strong encryptionalgorithms. To enhance the information protection in network communications, this paper presents a ...
The procurement process became one of the important aspects for PT. PLN (Persero) to operate thecompany. One way to meet these needs is through the project tender. The tender process aims to get high-...
The modern electronic age consists of many new approaches for the communication among the humancivilizations and the AD HOC network is one of the successful self-configuring and infrastructure-lesscom...
Remote PC controlled video transmitting Surveillance Car is a microcontroller based configuration whichsend serial information from PC by means of chip to the auto. This auto works as indicated by the...
In this research, the design and simulation of an automatic system for temperature control using embeddedsystem in order to automatically control of multi appliances depend on the temperature value. T...