A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Leena, C.
- An Enhanced Speech Based Vmail for Visually Impaired People
Authors
1 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
Source
Wireless Communication, Vol 8, No 1 (2016), Pagination: 1-5Abstract
In today's reality correspondence has turned out to be so natural because of coordination of correspondence innovations with web. However the outwardly tested individuals discover it extremely hard to use this innovation in view of the way that utilizing them requires visual observation. Voice message building design blinds individuals to get to email and other interactive media elements of working framework (tunes, text).Also in versatile application SMS can be perused by framework itself. Presently a days the headway made in PC innovation opened stages for outwardly weakened individuals over the world. This paper goes for adding to an email framework that wills even an innocent outwardly impeded individual to utilize the administrations for correspondence without past preparing. This building design will likewise diminish subjective burden taken by heedless to recall and sort characters utilizing console. This framework can be utilized by any ordinary individual likewise for instance the person who is not ready to peruse. The framework is totally taking into account intelligent voice reaction which will make it easy to understand and proficient to utilize.Keywords
IVR, Mouse Click Event, Screen Reader, Voice Mail.- Timeserving Direction-Finding Algorithm with Regard to Inform Node Choice in Cellular Sensor Communities
Authors
1 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
2 Department of ECE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
3 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
Source
Wireless Communication, Vol 7, No 10 (2015), Pagination: 317-323Abstract
Energy cost savings optimisation becomes on the list of important worries inside Wireless Sensor System (WSS) routing method style, simply because that most sensor nodes are equipped with your restricted non rechargeable battery power. With this document, we concentrate on reducing electricity consumption along with exploiting system life span regarding files communicate with One-Dimensional (1-D) Line System. Pursuing the basic principle associated with opportunistic routing idea, multihop communicate selection to optimise your system electricity efficiency is done in line with the dissimilarities involving sensor nodes, when it comes to both their own distance to sink and the left over electricity of each one additional. Specifically, a power Conserving by way of Timeserving Direction-finding (TDF) Algorithm is built to make sure minimum strength charge through files communicate along with defend your nodes using relatively low left over electricity. Considerable simulations along with genuine testbed final results show that this proposed option TDF may significantly increase the system effectiveness in electricity saving along with wireless online connectivity which have a practical additional recent Wireless Sensor routing systems
Keywords
One-Dimensional (1-D) Line System, Timeserving Direction-Finding Routing, Communicate Node, Wireless Sensor System (WSS).- Secure Information Distribution in Cloud Computing
Authors
1 Department of CSE, V.R.S College of Engineering and Technology, Arasur, Villupuram, IN
Source
Wireless Communication, Vol 6, No 9 (2014), Pagination: 330-334Abstract
Cloud computing would be the supply involving computing services online. It allow persons and also corporations to utilize software and also equipment which are handled by simply 3 rd parties on distant destinations. Though the end user can't discuss sensitive info inside untrusted cloud as a result of lack of safety measures problems. With this document we offer safety measures towards the end user by the ways of encryption and also decryption. When the end user uploads the actual document, technique critical will be made by simply CP-ABE approach. This particular technique critical will be provided for highly regarded end user email no .. The person utilizes this critical pertaining to decryption in order to track one more critical, that may acquire particular document. A different factor in this document acquire and also publish charge involving sole end user and also collection could be represented as information.
Keywords
Wireless Circle, Facts Discussing, Cloud Research.- An Efficient Dynamic Cluster Head Table Design for Time Minimization using BVLI's Data Structures
Authors
1 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN