Now-a-days, automation in home is becoming more popular. It always remains important to consideraccuracy and speed in a said job. This paper is addressing an Arduino Mega micro-controller based Home B...
Women of all over the world suffer from a common cancer, named Cervical cancer. Cervical cancer cellsgrow slowly at the cervix. This cancer can be avoided if it is recognized and handled in its first ...
Launching into the next generation of wireless communication network (5G network) requires secure highdata rate, high speed and huge bandwidth links. With the tremendous increase in broadband users, t...
Scientific documents and magazines involve large number of mathematical expressions and formulas alongwith text. The continuous growth of such documents necessitates the requirement of developing spec...
With technology advancement people have started using different type of memory devices for storing dataand keeping it secure has become concern in today's world. Universal Serial Bus (USB) flash drive...
While a data warehouse is designed to support the decision-making function, the most time-consuming partis the Extract Transform Load (ETL) process. Case in Academic Data Warehouse, when data source c...
Describes the pattern of relationship between internet usages on students, on the assessment of aspects of selfregulated learning. The aspect of self-regulated learning measured from 10 aspects. This ...
An expression of conflict in the field. To overcome this problem is a regulation of several parameters,including regulation of planting schedules and reduction of land area. The model of the irrigatio...
This research is intended to evaluate the efficiency of proceures and processes used by the King AbdulazizInternational Airport (KAIA) in Jeddah, Saudi Arabia with the help of Six Sigma. For, we have ...
Antivirus software industry is growing rapidly in the world in 2018. The domestic antivirus software industrymust be able to compete on a global scale. To face free trade, Indonesia's antivirus softwa...
This study aimed at determining and analyzing the meta analysis on journals review of the managementcontrol system, strategy and company performance theme. The management control system used lever's a...
Data encryption is well known as essential for today's technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after ...
Cloud computinghas left its remarkable note on the computing world over the last few years. Through itseffectiveness, litheness, scalability & availability cloud computinghas changed the nature of...
Reliable broadband communication requires secure high data rate and bandwidth links. With the observedincrease in broadband users, known communication systems such as RF and microwave links cannot pro...
Perimeter intrusion detection systems are an integral part of most physical security systems. The mainfocus of the Perimeter Intrusion Detection System (PID) is on the fence intrusion. To secure publi...