Exposure fusion scheme

An exposure fusion scheme for differently exposed images with moving objects is presented here. Block diagram of the system is as illustrated in Figure 1. This system involves a ghost removal algorithm in a low dynamic range domain and a selectively detail-enhanced exposure fusion algorithm. Input images. The input to the system would be three … Read more

Data visualisation, analysis and mining

Application is a browser based analytic tool for exploration and visualization. This Software focuses on the innovations of the data exploration techniques of the analytics, modeling and visualization to generate new insight of value from large amount of the complex data. This enables the analysis of the events expected to take places in the future … Read more

DIGITAL AGE TECHNOLOGY – WHY GO DIGITAL?

Analogue Signals and Digital Signals – What are they? Analogue Signals Analogue signals are continuous in both time and amplitude. Analogue signals are used in many systems, although these days the use of analogue signals is declining due to the cheap production of digital signals. Countless natural signals, for example, heat and light, are analogue … Read more

Mobile phone usage

In recent years, the usage of mobile phone is increasing significantly across the world. According to statistics [1]as of 2013, 73% of internet users accessed the internet resources via a mobile device and this percentage projected to nearly 90% by 2017. Mobile phones’ number and types of integrated sensors, processing capacity, battery, and overall hardware … Read more

Ad hoc networks

No predefine range of Network – In Ad-hoc network there is no predefine range of network. Node work in dynamic environment. Node can easily join and leave the wireless medium. Attacks include eaves dropping, Impersonation, tempering, replay and denial of service attack [1]. ‘ End to End packet Delay: -Ad-hoc wireless network is based on … Read more

Tracking internet usage

Internet traffic and usage has grown considerably in recent years. In response to the impact of this growth, internet service providers and other companies have implemented practices which control, limit, and track user’s internet usage. Additionally, the formation and enforcement of laws regarding the web has a lot of evolving to do, considering the internet … Read more

Adders

Abstract–Adders are an integral part of modern day processors, Carry select adders (CSLA) being one of the commonly used efficient adder. But this efficiency comes with the cost of a larger area and higher power dissipation. Over time, scaling the transistor sizes has reduced the area but due to the CMOS logic style designing, the … Read more

RFID (Radio Frequency Identification)

Abstract’RFID (Radio Frequency Identification) uses radio wave to identify an object. It’s mainly used to automatic identification of object in similar manner to barcode but it is not replacement of barcode. Different varieties of RFID tags can be found in market based on their functionalities. Index Terms – History of RFID, Classification of RFID tags, … Read more

MS Office

The one application everyone has besides Facebook is Microsoft Office. Microsoft Office is the world’s greatest and famous work program for studying, personal use, and office work. Microsoft Office includes Access, Excel, Outlook, Power Point, Publisher and Word. It’s used to create, view, edit, save and print documents. One of the most popular tools is … Read more

Social Engineering

Social Engineering is utilized by hackers to hack the techniques and weakness from Programmers and administrators UN agency operates a laptop rather than software system package .Essentially the specialty of obtaining entrance to structures, frameworks or info by misusing human neuroscience, rather than by softening up or utilizing specialized hacking strategies. Offensive computer systems with … Read more

System proposal

Existing System Existing system is nothing but it was in the same place where documents was generated and can be used in any policy or entity and it is already present in the market. Existing system is finished with the hands nothing but it is manual. Cloud providers are invading the market with confusing act … Read more

Opinion mining

E-business is an increasingly pervasive element of ambient intelligence. Ambient intelligence promotes the user-centered system where as per the feedback of user, the system changes itself to facilitate the transmission and marketing of goods and information to the appropriate e-business market. Ambient Intelligence ensures that the e-business activities generate good confidence level among the customers. … Read more

Amplifiers

There are 4 types of amplifier the class A, class B, class AB and class D. Class A is a type of amplifier where the output is as much represented as to the input. A type of amplifier which is a hard working amplifier it is because it is working all the time. The transistor … Read more