Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Shiv K. Sahu"'
Publikováno v:
International Journal of Computer Applications. 156:15-19
Publikováno v:
International Journal of Advanced Technology and Engineering Exploration. 3:77-81
An intrusion detection system (IDS) is an application platform that records system fuss for malicious activities and management of these activities. It is a malicious attack identification technique. It allows identifying Denial of service (DoS), Use
Publikováno v:
International Journal of Advanced Technology and Engineering Exploration. 3:86-90
World is regular to eyewitness a change in deaths apropos in case of heart diseases. Ancient age ascertaining may count the ruin due to the heart diseases. In this paper a detail analysis and discussion on the related technique have been presented fo
Publikováno v:
International Journal of Computer Applications. 136:15-18
Cloud computing has bring a revolution in the field of computing. Many algorithms are proposed to make it even more efficient. In cloud computing Virtualization plays an important role and whole performance of cloud depends on VM allocation and Migra
Publikováno v:
International Journal of Computer Applications. 87:1-5
this research work a technique is proposed for image compression which is based on Neural Network. Here image compression is done by using Growing Self Organizing Map algorithm (GSOM). This proposed work may be compression up to 90% of the source fil
Publikováno v:
International Journal of Computer Applications. 68:1-4
Mobile communication plays a vital role in disaster recovery management during emergency situations. It is helpful in situations where the system has less robust and less flexible infrastructure. However, the rapid growth in number and multiplicity o
Publikováno v:
International Conference on Information Communication and Embedded Systems (ICICES2014).
In this paper, a wavelet based scheme for digital image watermarking is presented. This proposed scheme inserts two watermarks in an image which serves two different purposes. The first one is inserted using blind watermarking technique while second
Publikováno v:
ResearcherID
At the Estimation of Image Coders, using PSNR is of undecided perceptual power, but there are numbers of algorithms including temporarily computable decoders. PSNR might not be calculated.With a simple rearrangement of a transmit bit stream, the SPIH