D. B. K. Kamesh
YOU?
Author Swipe
View article: RETRACTED: Detecting Faults within a Cloud Using Machine Learning Techniques
RETRACTED: Detecting Faults within a Cloud Using Machine Learning Techniques Open
In distributed computing, clients can get to cloud administrations using the web. In present days, in superior registering and cloud frameworks, disappointment is an inexorably significant issue. Alleviating the impact of misfortune and ma…
View article: Collaborative Filtering and Regression Techniques based location Travel Recommender System based on social media reviews data due to the COVID-19 Pandemic
Collaborative Filtering and Regression Techniques based location Travel Recommender System based on social media reviews data due to the COVID-19 Pandemic Open
Nowadays, Dynamic industries like tourism is a enhance to boost many countries economy in recent years. The hotel sector leads to a significant role among all aspects of the tourism industry. Online travel platforms, in association with ho…
View article: Automatic Path Maker for Emergency Vehicles
Automatic Path Maker for Emergency Vehicles Open
Automatic path maker for emergency vehicles” is the most convenient solution for the people. It is adequate condition into the traffic lights systems, as the emergency vehicles as route concerned in the higher priorities among the junction…
View article: Vision-Based Security System
Vision-Based Security System Open
notion for the actual-time imaginative and prescient-primarily based protection shape movements in putting on developing frightful lead ground these days, which evaluations impedance for excessive-safety areas in which the closeness of an …
View article: The Belief of World Records Fusion and its Software to Cyber Protection
The Belief of World Records Fusion and its Software to Cyber Protection Open
Worldwide statistics Fusion is one of the foremost technologies utilized in complicated structures. While the software of information fusion has already proposed for the implementation of precise tools, its extension to the overall design …
View article: Computer Science Technology:Tutor, Tool and to Explore Language Teaching
Computer Science Technology:Tutor, Tool and to Explore Language Teaching Open
Computer Technology is now being used in all facets of Teaching in English language classroom.It gives wide range of scope for discussions on usage of Computer Technology in Language class room.The application of Technology on Language stu…
View article: Camera based Text to Speech Conversion, Obstacle and Currency Detection for Blind Persons
Camera based Text to Speech Conversion, Obstacle and Currency Detection for Blind Persons Open
Background/Objectives: The main object of this paper is to present an innovated system that can help the blind for handling currency. Methods/Statistical Analysis: Many image processing techniques have been used to scan the currency, remov…
View article: Authenticating Clients without using their Login IDs through Mind Metrics
Authenticating Clients without using their Login IDs through Mind Metrics Open
Background/Objectives: The main objective of this paper is to provide a novel method of identification and authentication of a user through a process of enhancing the password level protection to provide authorised use of the resources hos…