author: suresh chandra satapathy

Proceedings of the International Congress on Information and Communication Technology: ICICT 2015, Volume 1

... Novel overlay/underlay cognitive radio waveforms using SD-SMSE framework to ... Yaddanapudi, and M. Shadaram, “Flexible spectrum and power allocation for ... novel subblock linear combination scheme for peak-to-average power ratio ...

Intelligent Data Engineering and Analytics: Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021)

... fluentin3months.com/learn-a-song/ 3. Karimi, S., Scholer, F., Turpin, A.: Machine transliteration survey. ACM Comput. Surv. 43(3) 2011. https://doi.org/10.1145/1922649.1922654 4. Antony, P., Soman, K..: Machine transliteration for ...

Intelligent System Design: Proceedings of Intelligent System Design: INDIA 2019

... Airtel Tweet Analysis for Twitter is not a unique one in relation to estimation investigation for different ... wikipedia.org/wiki/Tf-idf. 13. Liu, Z.,. 1. Ouyang, C., Zhou, W., & Yu, Y., et al. (2014). Point sentiment analysis in Chinese ...

Smart Computing Techniques and Applications: Proceedings of the Fourth International Conference on Smart Computing and Informatics, Volume 1

... Dua, M.: Attribute selection and ensemble classifier based novel approach to intrusion detection system. Proc ... Yaseen, W., Idrees, A.: Differential evolution wrapper feature selection for intrusion detection system. Proced. Comput ...

Data Engineering and Intelligent Computing: Proceedings of ICICC 2020

... CGPA, and contextual factors namely no. of courses and course-difficulty to ... formula suggested by Zainudin [9] course-difficulty was calculated. The size ... CGPA = u1 + α3 difficulty(course-difficulty of the courses per year) + no. of ...

Internet of Things and Big Data Analytics Toward Next-Generation Intelligence

... Bascom. AVR. IDE. It is a window BASIC COMPILER IDE for AVR family. There are many microcontrollers available to write the code but we used Bascom AVR IDE which is very powerful and AVR-Eclipse is a plug-in for eclipse IDE which adds tool ...

Embedded Systems and Artificial Intelligence: Proceedings of ESAI 2019, Fez, Morocco

... musicians use it for installations and experiment with new musical instruments. (2) Bluetooth module (HC-05): This module is a serial port protocol designed for transferring the captured information from Arduino to an application ...

Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 2

... Sharma, Vikrant Bhateja and Abhishek Tripathi GSM Based Automated Detection Model for Improvised Explosive Devices ... Suma and Jawahar Rao Big Data Management System for Personal Privacy Using SW and SDF. . . . . . . . . . . . . . . . . . .

Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1

... MATLAB, Pearson Education, India (2004). ISBN: 8177588982 4. Sridhar, S.: Digital Image Processing, Oxford University Press, Oxford (2011). ISBN: 0198070780, India http://xlinux.nist.gov/dads/HTML/manhattanDistance.html https://en.wikipedia ...

Proceedings of the 2nd International Conference on Data Engineering and Communication Technology: ICDECT 2017

... CST Microwave Design Studio software has been used to simulate the design of the said antenna. The analysis of return loss, VSWR, gain, and radiation pattern was carried out. The proposed antenna shows return loss of −19.23 dB at 2.2 ...

Intelligent Manufacturing and Energy Sustainability: Proceedings of ICIMES 2020

... ASTM G75-95. As the percentage of fiber increases from 15 to 35%wt, the erosion rate decreases from 2.5 to 1.33%. This is a mainly due to resistance offered by the fiber against. Fig. 24.3 a Tensile results for pure polyester resin and ...

Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 1

... (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997) 9. Desmedt, Y.: Broadcast Anti-jamming Systems. Computer Networks 35(2/3), 223–236 (2001) 10. Stinson, D.: Cryptography: Theory and practice. CRC Press (2006) 11 ...

Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1

... LMS for recording Attendance, Grades, Assignments, Quiz and many more day to day activities of students. Typically LMS works on intranet or internet depends on the policy of the University/College. Objective of implementing LMS is to ...

Smart Computing and Informatics: Proceedings of the First International Conference on SCI 2016, Volume 2

... Solid Edge ST8. The design is created by 2D drawings to 3D object. Since the Solid Edge ST8 supports a direct interaction with the designer, hence the. Fig. 1 A schematic diagram for machine parts detection in model assembly line Fig. 2 ...

Evolution in Signal Processing and Telecommunication Networks: Proceedings of Sixth International Conference on Microelectronics, Electromagnetics and Telecommunications (ICMEET 2021), Volume 2

... efficiency in transmitting the power. The issues while connecting the ... fractal-based loop antenna structure with ILGP for proper impedance matching ... polarized rectenna with differential source feeding [17] were proposed. Fractal ...

Intelligent Computing and Information and Communication: Proceedings of 2nd International Conference, ICICC 2017

... NfDump Collector. The interval for capturing flows in nfcapd files is 5 min by default which was kept unchanged. The captured flows are extracted with and without aggregation and analysis is performed on these flows according to the ...

Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA)

... (ROI). Many techniques have been proposed in literature for quality ... used as an objective evaluation index for edge maps of synthetic images ... most important information in any image. The reliability of reconstruction estimation ...

Smart Computing Techniques and Applications: Proceedings of the Fourth International Conference on Smart Computing and Informatics, Volume 2

... Roy, Chandrima, 451 Roy, Ruben, 655 Shrivas, Simran, 209 Shrivastava, Poornima, 383 Shrivastava, Sonika, 209 ... Saranya, 353, 495 Y Yadav, Preksha, 425 Yasmeen, Nuzhat, 683 Yindumathi, K. M., 129 Author Index 827.

Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 2

Proceedings of the Second International Conference on SCI 2018, Volume 2 Suresh Chandra Satapathy ... solutions/trends/iot/docs/computing-overview.pdf. Last accessed 9 Oct 2017 6. Olsson, J.: 6LoWPAN demystified. Texas Instrum. p. 13 (2014) 7 ...

Information and Communication Technology for Intelligent Systems: Proceedings of ICTIS 2018, Volume 2

... translator, the gestures made by the PWD are identified and the corresponding Tamil letters are displayed. The gesture identification and training is done by SIFT algorithm. This system ... Tamil Sign Language Translator ... 257 References.

Intelligent Manufacturing and Energy Sustainability: Proceedings of ICIMES 2021

... AISI 1018 and AISI 4130 is greater than that of AISI 1020. AISI 1018 and AISI 1020 have better weldability as compared to AISI 4130 (Fig. 43.6). 43.5 Conclusion The FEA of a chassis is vital as it helps in determining both the weakness ...

Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1

... script from script market and install it into the Grease Monkey browser extension if the browser is Mozilla Firefox or install it into the Tamper Monkey in case of Google Chrome. Users can install any suitable scripts according to their ...

Information Systems Design and Intelligent Applications: Proceedings of Second International Conference INDIA 2015, Volume 2

... templates for a given service requirement specified by the user through the system's GUI. We illustrate one such composition template scenario in the case study that follows. 5.1. Case. Study. We used several different sample queries in ...

Proceedings of the International Conference on Data Engineering and Communication Technology: ICDECT 2016, Volume 2

... MATLAB netinv - MathWorks India. ann application in oil refinery - Google Search. Artificial neuron - Wikipedia, the free encyclopedia. Neuron Model - MATLAB & Simulink - MathWorks India. customizing transfer function (neural net domian) ...

Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 1

... round key. Note that both the right segment and the key are 48-bits long. Likewise take note of that the round key is ... unscramble ciphertext message C, raise it to another force d modulo n 4. The encryption key (e,n) is made open. The ...

Information Systems Design and Intelligent Applications: Proceedings of Fourth International Conference INDIA 2017

Proceedings of Fourth International Conference INDIA 2017 Vikrant Bhateja, Bao Le Nguyen, Nhu Gia Nguyen, Suresh ... Hung, Dao Tuan, 64 Hung, Nguyen Manh, 304 Hung, Pham Ngoc, 105 Huong, Nguyen Thi Viet, 423 Huy, Du Dao, 137 Huynh, Tu ...

Frontiers in Intelligent Computing: Theory and Applications: Proceedings of the 7th International Conference on FICTA (2018), Volume 1

... Bao Le Nguyen, Nhu Gia Nguyen, Dac-Nhuong Le. Intuition-Based Autonomous Vehicle System ..................... 89 ... Hung Le, and Thi-Thu-Huyen Tran A Proposal of Expert System Using Deep Learning Neural Networks and Fuzzy Rules for ...

Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015

... password recover facility to the registered user. Fig. 2 Forgot password recovery process Fig. 3 Smart card revocation process 2.5 Smart Card Revocation. Secure Remote Login Scheme ... 499 2.4 Forgot Password Recover Process.

Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016

... layer model [8], 5-layer model, 5-layer with enhanced perception layer [9, 10], low energy 5-layer model [11] as shown in Fig. 2. From a bottom-up approach, the following are the main characteristics of the various protocols in this low ...

Proceedings of the International Conference on Information Systems Design and Intelligent Applications 2012 (India 2012) held in Visakhapatnam, India, January 2012

... 1 GIS, GITAM University, Visakhapatnam, India {dkaladhar,nagesh.uma,harikrishnareddy.6,sriteja111}@gmail.com 2 GIT, GITAM University, Visakhapatnam, India pvlakshmi@gitam.edu, nagesh@gitam.in Abstract. Data mining techniques can be well ...

Microelectronics, Electromagnetics and Telecommunications: Proceedings of ICMEET 2015

... one that considered serving under this SOA. V. Sujatha (&) GITAM School of Technology, GITAM University, Hyderabad, India e-mail: varadi.sujatha@gmail.com G. Appa Rao GITAM Institute of Technology, GITAM University, Visakhapatnam, India ...

Frontiers in Intelligent Computing: Theory and Applications: Proceedings of the 7th International Conference on FICTA (2018), Volume 2

... problems other than the FP and the DLP can be used as their base cryptographic primitive. The response to this ... (HDLP) as the base cryptographic primitive. Section 2 introduces the known form of the HDLP and describes the finite ...

ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I: Hosted by CSI Vishakapatnam Chapter

... open. Android applications make use of advanced hardware and software, as ... [5] predicted that in the near future, android could be the target of 92% of all ... Bootloader Bootloader is the first program to be run on the system. It ...

Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2

Volume 2 Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J. K. Mandal. [5]. Xiang Wang, Qiang Zhang [6], demonstrated RSA algorithm using public-key cryptography DNA sequence as keys. This paper focuses on generating ...

Advances in Decision Sciences, Image Processing, Security and Computer Vision: International Conference on Emerging Trends in Engineering (ICETE), Vol. 2

... MDN's central servers, where a focal server is a typical server shared by a sub- stantial level of the drive-by download attacks in the same MDN. A set of regular expression based signatures are formed based on URLs of every focal ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.