Graphical passwords

CHAPTER 3 AN ENHANCED MULTILEVEL AUTHENTICATION SCHEME USING GRAPHICAL PASSWORDS Now-a-days there are several types of technologies to avoid online attacks . Still there are some limitations which are leading to violation of the security. This results in attacks in which the intruder can claim the user’s confidential information. 3.1 Traditional Password Authentication In the … Read more

PLC controllers

Introduction: The PLC – logic controllers or programmable – Is an electronic device used in automation in industrial systems Kaltgm mechanism of action of the production lines at the plant what , and unlike systems traditional computer has been designed to suit the conditions more difficult in terms of the areas of bearing temperatures and dust … Read more

Essay introduction: Digital watermarking scheme

ABSTRACT Digital media application, multimedia security, copyright protection are becoming important in today’s world as its distribution over network is increasing rapidly, indeed left a concern for the owner about their ownership protection. For the copyright protection of the digital applications, digital watermarking is introduced that enables to mark the digital image with undetectable secret … Read more

The Differences of Functionalities Between Database Management System And Information Retrieval System

Nowadays, modern organizations usually use database management system or information retrieval system in order to store and retrieve their information and data efficiently. Both systems have their own advantage and disadvantage. Database Systems work with relational database but Information Retrieval System works on unstructured data. The main data structure was used in Database System is … Read more

Data stream in clustering based outlier detection

The rest of the paper, is described out the combined process of Hierarchical and Partition hybrid approach of (BIRCH with CLARANS), (CURE with CLARANS) clustering process and finding the outliers in data streams, it is followed by new enhanced hybrid approach techniques(E-CURE with E-CLARANS) for data stream clustering algorithm for detecting the outliers, discussed in … Read more

Implementing Swifinet

ABSTRACT Use of wireless sensor networks (WSN) has resulted in many revolutionary changes in human life. WSN has gain significant concentration from scientist and end users. ‘SWiFiNet’ is task distributed reusable system architecture. In this architecture complex functionality has been transfer to the second tire devices of the system. Second tire devices are provided with … Read more

User demand modelling based on domain modelling

V. ON-DEMAND SERVICES User demand modelling based on domain modelling; domain demand models are the basis for modelling users personalized demands. A demand model that supports uncertainty, consumers may be unspecific or provide incomplete information, accurately predicting resource demands is a key concern of demand modelling. User scenario modelling, modelling demands in uncertain scenarios, a … Read more

Essay on video segmentation

2. Introduction Video Segmentation decomposes a video into many frames throughout the sequence. Video segmentation applications are used in the field of robotics, video surveillance, traffic monitoring, video indexing etc. A group of pixels follow a analogous motion segmentation. Video is a series of frames ( pictures) displayed sequentially at fixed rate. All the pictures( … Read more

Essay on Information Technology in India

INTRODUCTION The world today functions majotly on the Information Technology. Information technology in India is an industry consisting of two major components: IT Services and business process outsourcing (BPO). The sector has increased its contribution to India’s GDP from 1.2% in 1998 to 7.5% in 2012. According to NASSCOM, the sector aggregated revenues of US$100 … Read more

Essay on advantages and disadvantages of using a computer to learn and communicate with other people

 Discuss with reference to your own experience of studying U130. Using a computer to learn is quick and efficient.  Assignments and conference posts can be generated on the computer rather than hand-written, and this allows for drafting and editing without having to start afresh each time. A computer is invaluable for downloading a CV template, formatting … Read more