M. Tech
YOU?
Author Swipe
View article: A CLOUD BASED SECURITY FOR ADVANCED MINIMIZINGENERGY BASED DATA SHARING IN MULTI-CLOUDS
A CLOUD BASED SECURITY FOR ADVANCED MINIMIZINGENERGY BASED DATA SHARING IN MULTI-CLOUDS Open
Protect Cloud is better than protecting your account calculate with internal consumption characteristics assets. In terms of cloud computing, it provides cloud services give an endless storage and file information and creates an abstracts …
View article: A Comprehensive Review-Parr Reduction Techniques OFDM Technology
A Comprehensive Review-Parr Reduction Techniques OFDM Technology Open
The major challenge in multicarrier transmission is peak average power (PAPR). The OFDM suffers from the problem of high PAPR where PAPR is the ration of maximum power in a signal to the average power of any signal. Such kind of problem is…
View article: A Real time Application for Insurance fraud detection using Machine learning
A Real time Application for Insurance fraud detection using Machine learning Open
Insurance is something people buy to protect themselves. Insurance fraud is an act of receiving the benefits to which they are not entitled or when a person makes false claims to receive the benefits. The type of insurance fraud are divers…
View article: Internet of Things (IoT) Based Smart Home Automation and Scrutiny System
Internet of Things (IoT) Based Smart Home Automation and Scrutiny System Open
Internet of Things (IoT) is a developing innovation that makes our reality more intelligent. Now a days, the home security is fundamental as a potential results of interference are growing well ordered. Security has turned into a significa…
View article: Genetic Load Balancing Algorithms in Cloud Environment
Genetic Load Balancing Algorithms in Cloud Environment Open
Cloud services are broadly used in accomplishment, logistics, and computerized applications. It is not an easy technology, it consists of lots of issues like virtual machine management, scheduling of virtual machines, data security, provid…
View article: Electric Spring for Voltage and Power Stability and Power Factor Correction
Electric Spring for Voltage and Power Stability and Power Factor Correction Open
electric powered Animation (ES), another smart applique innovation, has advanced been accustomed for accessories voltage and expertise adherence ina accursedly managed/unbiased sustainable interest the front fueled network. it's been propo…
View article: Research on Coherent Clue Based Route Search for Travel Route Search
Research on Coherent Clue Based Route Search for Travel Route Search Open
Further in geo-situating innovations with Location-based services (LBS), it is today basic designed for street systems near enclose a literary substance through vertices. Past work on trademark and best way to facilitate cover an arrangeme…
View article: A Robust Method to Detect Coverage Holes And Network Re-Establishment for NB-IOT Enabled
A Robust Method to Detect Coverage Holes And Network Re-Establishment for NB-IOT Enabled Open
Sensing coverage with respect to WSN (Wireless Sensor Network) research has gained immense consideration. Implementation of WSNs in the domain of IoT (Internet of Things) ensures consideration of IoT features when thinking of sensing cover…
View article: An Scrutiny of Run-time Ramification for 5-Proviso Busy Beaver Proving Empirical Composition
An Scrutiny of Run-time Ramification for 5-Proviso Busy Beaver Proving Empirical Composition Open
The major aim of this paper is to undertake an experimental investigation for analyze the fluctuation between the descriptional (program-size) and computational time complexity. The investigation proceeds by systematic and exhaustive study…
View article: Design of Heavy Vehicle Chassis Frame By using Ansys
Design of Heavy Vehicle Chassis Frame By using Ansys Open
Chassis is main part of the vehicle it is also called back bone of the vehicle. the total load of the vehicle will occur on the chassis frame only. In this paper we did structural analysis on the chassis frame by the fem approached softwar…
View article: Sentiment Analysis using Naïve Bayes Classifier
Sentiment Analysis using Naïve Bayes Classifier Open
In recent years, the remarkableexpansion of web technologies, lead to an massive quantity of user generated information in online systems.This large amount of information on web platforms make them viable for use as data sources, in applic…
View article: Broadcasting Mechanism In Vanets For Successful Transmission: A Review
Broadcasting Mechanism In Vanets For Successful Transmission: A Review Open
Ad hoc network is a part of wireless networking.MANETs and VANETs fall under the category of ad hoc networks.The MANET is the mobile ad hoc networks in which the nodes are self-organizing.The VANETs are also a type of ad hoc networks, but …
View article: Upgraded Secrecy of Cloud Storage Data Users Using Improved Data Access Control Strategy for Multi-Authority Cloud Storage
Upgraded Secrecy of Cloud Storage Data Users Using Improved Data Access Control Strategy for Multi-Authority Cloud Storage Open
Cloud computing is one of the emerge technologies. To protect the data and Secrecy of users the access control strategy ensures that authorized users can access the data and the system. Cipher text-Policy Attribute-based Encryption (CP-ABE…
View article: Comparative Performance Analysis of Speech Enhancement Methods
Comparative Performance Analysis of Speech Enhancement Methods Open
The implementation of Speech Enhancement using Spectral Subtraction method and Kalman Filtering method are presented here.Spectral subtraction mainly removes the background noise from noisy speech spectrum.Original speech is obtained by su…
View article: An Efficient Method on Identification of Product Aspect and Ranking System
An Efficient Method on Identification of Product Aspect and Ranking System Open
Identification of important product aspects become necessary as both consumers and firms are benefited by this. Consumers can easily make purchasing decision by paying attention to the important aspects as well as firms can focus on improv…
View article: Concurrent and Free Accessing in Encrypted Cloud Databases
Concurrent and Free Accessing in Encrypted Cloud Databases Open
The major security challenge with clouds is that the owner of the data may not have control of where the data is placed.This is because if one wants to exploit the benefits of using cloud computing. Cloud computing is one of the most incre…
View article: An Adaptive Partitioning Technique to Improve the Performance of Bigdata
An Adaptive Partitioning Technique to Improve the Performance of Bigdata Open
The performance of parallel computing purely depends on the data partitions. Hadoop is the framework to perform the computations on the partitioned data across many systems and produce the results. It also suffers with the statistic partit…
View article: A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage
A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage Open
To ensure outsourced information in distributed storage against debasements, adding adaptation to non-critical failure to distributed storage together with information honesty checking and disappointment reparation gets to be basic. As of …
View article: Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud
Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud Open
Cryptography in the field of information technology is an art to protect data privacy using standard mathematical techniques. Cloud computing, one of the emerging techniques to lease computing resources on demand, makes use of remote data …
View article: A SURVEY ON CLUSTER BASED ENERGY EFFICIENT ROUTING PROTOCOLS
A SURVEY ON CLUSTER BASED ENERGY EFFICIENT ROUTING PROTOCOLS Open
Wireless sensor networks (WSNs) have been mainly deployed in remote areas for usually environment monitoring purposes, military application, infrastructure monitoring etc.It is very difficult to maintain or repair sensor nodes every now an…