1–50 of
60 results.
-
P. Pallavi
•
Shaik Salam
Water is an important, but often ignored element in sustainable development by now it has been clear that urgent action is needed to avoid global water crisis. Water resource management is the ac...
-
Harya Gusdevi
•
Ade Setya
•
Puji Handini Zulaeha
The conversion of kerosene use in household to gas, in addition to the decision of the Republic of Indonesia minister in relation to the movement of kerosene to gas, gas also given an affordable price...
-
Shrutika Khobragade
•
Rohini Bhosale
•
Rahul Jiwahe
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software...
-
T. Nagarjuna
•
K. Nehru
•
G. Nagendra Prasad
•
Hema Chowdary
We proposed to use singular wavelet transform (SWT) in OFDM based LTE because the SWT based system does not require a cyclic prefix, so spectrum efficiency is increased. SWT is used to analyze signals...
-
Noureddine Maouhoub
•
Khalid Rais
Series resistance and mobility attenuation parameter are parasitic phenomena that limit the scaling of advanced MOSFETs. In this work, an iterative method is proposed to extract the series resistance ...
-
Maurizio NolƩ
•
Carlo Sartiani
In the recent years many real-world applications have been modeled by graph structures (e.g., social networks, mobile phone networks, web graphs, etc.), and many systems have been developed to m...
-
Tanweer Alam
•
Abdulrahman A. Salem
•
Ahmad O. Alsharif
•
Abdulaziz M. Alhejaili
Home automation system is a system that controls by the smart device using a mobile application. It can control home appliances such as light, fans, air conditions, and smart security locks, etc. Blue...
-
Veera Boopathy E.
Traffic in urban areas is increasing day by day which leads to most critical issues of traffic management this paper proposes a smart and fully automatic traffic control system that will detect and co...
-
Sri Nawangsari
•
Dhea Ajeng Clara
•
Eri Prasetyo Wibowo
Satisfaction This research aims to know the effect of electronic service quality, product, price, promotion on customer satisfaction in the Lazada.co.id online store customers in Jakarta. Electronic s...
-
Ravinder Paspula
•
K. Chiranjeevi
•
S. Laxman Kumar
A new-promising technology called DNA-Cryptography is emerged in the area of DNA- Computing field.DNA useful for store, sending the data and also to perform computation. Even it is under primal level,...
-
Hari Jyothula
•
S. Koteswara Rao
•
V. Valli Kumari
Image is a two dimensional capacity f(x, y). The way toward dividing an image into numerous parts or questions is named as Segmentation. There are two noteworthy deterrents in sectioning an image i.e....
-
Ajewole M. O.
•
Owolawi P. A.
•
Ojo J. S.
•
Adetunji R. M.
Reliable broadband communication requires secure high data rate and bandwidth links. With the observedincrease in broadband users, known communication systems such as RF and microwave links cannot pro...
-
El Akbar, R. Reza
•
Nani Ratnaningsih
•
Edi Hidayat
Describes the pattern of relationship between internet usages on students, on the assessment of aspects of selfregulated learning. The aspect of self-regulated learning measured from 10 aspects. This ...
-
Ai Nurhayati
•
Frencius Frencius
Antivirus software industry is growing rapidly in the world in 2018. The domestic antivirus software industrymust be able to compete on a global scale. To face free trade, Indonesia's antivirus softwa...
-
Thiri Naing
•
Kyi Kyi Khaing
•
Tin Tin Nwet
Perimeter intrusion detection systems are an integral part of most physical security systems. The mainfocus of the Perimeter Intrusion Detection System (PID) is on the fence intrusion. To secure publi...
-
Debashis Das
•
Sourav Banerjee
•
Ayan Kundu
•
Swagata Chandra
•
Saptarshi Pal
•
1 lainnya
• Utpal Biswas
Cloud computinghas left its remarkable note on the computing world over the last few years. Through itseffectiveness, litheness, scalability & availability cloud computinghas changed the nature of...
-
Desi Pujiati
•
Margianti Margianti
•
Misdiyono Misdiyono
This study aimed at determining and analyzing the meta analysis on journals review of the managementcontrol system, strategy and company performance theme. The management control system used lever's a...
-
Zarni Sann
•
Thi Thi Soe
•
Kaythi Wyut Mhone Knin
•
Zin May Win
Data encryption is well known as essential for today's technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after ...
-
M. O. Ajewole
•
P. A. Owolawi
•
J. S. Ojo
•
R. M. Adetunji
Launching into the next generation of wireless communication network (5G network) requires secure highdata rate, high speed and huge bandwidth links. With the tremendous increase in broadband users, t...
-
Abdullah Basahel
•
Abdullah M. Alqarni
This research is intended to evaluate the efficiency of proceures and processes used by the King AbdulazizInternational Airport (KAIA) in Jeddah, Saudi Arabia with the help of Six Sigma. For, we have ...
-
Ardhian Agung Yulianto
While a data warehouse is designed to support the decision-making function, the most time-consuming partis the Extract Transform Load (ETL) process. Case in Academic Data Warehouse, when data source c...
-
Sourish Dhar
•
Sudipta Roy
Scientific documents and magazines involve large number of mathematical expressions and formulas alongwith text. The continuous growth of such documents necessitates the requirement of developing spec...
-
Asep Kurnia Hidayat
•
El Akbar, R. Reza
•
Ai Sri Kosnayani
An expression of conflict in the field. To overcome this problem is a regulation of several parameters,including regulation of planting schedules and reduction of land area. The model of the irrigatio...
-
Lalit Moha Satapathy
•
Samir Kumar Bastia
•
Nihar Mohanty
Now-a-days, automation in home is becoming more popular. It always remains important to consideraccuracy and speed in a said job. This paper is addressing an Arduino Mega micro-controller based Home B...
-
Alycia Sebastian
•
K. Siva Sankar
With technology advancement people have started using different type of memory devices for storing dataand keeping it secure has become concern in today's world. Universal Serial Bus (USB) flash drive...
-
Arif- Ul- Islam
•
Shamim H. Ripon
•
Nuruddin Qaisar Bhuiyan
Women of all over the world suffer from a common cancer, named Cervical cancer. Cervical cancer cellsgrow slowly at the cervix. This cancer can be avoided if it is recognized and handled in its first ...
-
Sarah N. Abdulwahid
The delivered effort in this manuscript is grounded on NS-2 (The Network Simulator 2) to implement thecongestion control process of classic TCP (Transmission Control Protocol), with new congestion con...
-
Alaa Abid Muslam Abid Ali
•
Mohammed Iqbal Dohan
•
Saif Khalid Musluh
One of the very efficient and resource conservative image processing methodology is with the help of bilateralfilters. This technique filters the image without the help of edge smoothing but it does e...
-
Hasan Ali Gamal Al-Kaf
•
Nayef Abdulwahab Alduais
•
Musaed Al-Subari
The implantation of a genetic algorithm (GA) in quantitating components of interest in near infraredspectroscopic analysis could improve the predictive ability of a regression model. Thus, this study ...
-
Sengathir Janakiraman
Prompt and reliable data dissemination among the vehicular nodes of the network is indispensable as itsmobility rate and limited coverage characteristics introduce the possibility of frequent topology...
-
A. Aranganathan
•
C. D. Suriyakala
Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topologyin which the nodes can move anywhere, may join or leave the network through multi-hop communicatio...
-
Nitin Arora
•
Alaknanda Ashok
•
Shamik Tiwari
Images are an important part of daily life. The huge repository of digitally existing images cannot be easilycontrolled by any individual. Extensive scanning of the image database is very much essenti...
-
Srinivasa R. K.
•
A.R2, Hemantha Kumar
The growing interest over the mobile based communication has attracted the Long-Term Evolution (LTE)technique which facilitates higher data transmission rates to its dynamic users. The LTE-based netwo...
-
G. Shine Let
•
G. Josemin Bala
•
W. Magdalene
Scarce wireless resources, lead to development of cognitive radio network as a solution to unlicensed userscommunication in the licensed frequency band. In response to the behavior of licensed users c...
-
M. Sheshikala
•
D. Rajeswara Rao
•
Md Ali Kadampur
Complete data. Many of the real world data is Uncertain, for example, Demographic data, Sensor networksdata, GIS data etc.,. Handling such data is a challenge for knowledge discovery particularly in c...
-
R. Buli Babu
•
G. Snehal
•
Aditya Satya Kiran
Data mining can be used to detect model crime problems. This paper is about the importance of datamining about its techniques and how we can easily solve the crime. Crime data will be stored in crimin...
-
Prabhat Kumar Sahu
•
Binod Kumar Pattanayak
The modern electronic age consists of many new approaches for the communication among the humancivilizations and the AD HOC network is one of the successful self-configuring and infrastructure-lesscom...
-
Yegireddi Ramesh
•
Kiran Kumar Reddi
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network res...
-
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embeddedsystem in order to automatically control of multi appliances depend on the temperature value. T...
-
C. K. Shyamala
•
Anand K. Rajagopalan
Automatic identification systems represent a wide classification of devices used primarily in commercialsettings for inventory/logistics control. Familiar examples of such devices are bar codes, magne...
-
Dhanya G.
•
J. Jayakumari
The expanding significance of securing data over the network has promoted growth of strong encryptionalgorithms. To enhance the information protection in network communications, this paper presents a ...
-
Siti Hardiyanti Rukmana
•
Much Aziz Muslim
The procurement process became one of the important aspects for PT. PLN (Persero) to operate thecompany. One way to meet these needs is through the project tender. The tender process aims to get high-...
-
Ramanathan P.
Remote PC controlled video transmitting Surveillance Car is a microcontroller based configuration whichsend serial information from PC by means of chip to the auto. This auto works as indicated by the...
-
Santosh Kumar Suman
•
Mohd Aqib
•
Sumit Kumar Singh
Aim of this paper the infrastructure for the traditional grid & smart grid. Together depend uponmanagement and control system but the main modification is in the security system because it activit...
-
Samidha N. Kalwaghe
•
Atul Vasudev Dusane
The emerging technology of wireless sensor network (WSN) is expected to provide a broad range of applications, such as battlefield surveillance, environmental monitoring, smart spaces and so on. The c...
-
P. Pedda Sadhu Naik
•
T. Venu Gopal
This paper proposed a novel Block based Mean Shift Image Segmentation Algorithm to significantly reduce the computation and improve the segmentation accuracy for high resolution Medical Image. One of ...
-
Manoj H. M.
•
Nandakumar A. N.
The role of design pattern in the form of software metric and internal code architecture for object-oriented design plays a critical role in software en-Gineering in terms of production cost efficienc...
-
Ogbeide K. O.
•
E. J, Eko Mwenrenren
The aim of this paper is to present and evaluate artificial neural network model used for path loss prediction of signal propagation in the VHF/UHF spectrum in Edo state.Measurement data obtained from...
-
Mastan Sharif Shaik
•
K. Satya Prasad
•
Rafi Ahamed Shaik
•
D. Venkata Rao
Several sign based LMS adaptive filters, which are computationally free having multiplier free weight update loops, are proposed for acoustic echo cancellation. The adaptive filters essentially minimi...
-
Abi Soliga
•
Godlin Jasil
Blind Image Quality Assessment (BIQA) methods are the most part feeling mindful. The BIQA method learns regression models from preparing images with human subjective scores to predict the perceptual n...