A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Hema, A.
- A Study on Pros and Cons of the Cloud Computing
Authors
1 Department of MCA, E.G.S Pillay Engineering College, Nagapattinam, IN
2 Department of MCA, E.G.S Pillay Engineering College, Nagapattinam, IN
Source
Networking and Communication Engineering, Vol 4, No 9 (2012), Pagination: 560-563Abstract
The way people use computers is changing. Instead of data and programs being contained on the device of users, they will be held on servers in a server farm, and users will access the content via the Internet for a fee. Computer usage will become a service, with the benefits being reduced consumer costs, safer data, and more up-to-date programs. This service is known informally as cloud computing.
There are several problems with the development of cloud computing. For one, there is the large problem, as with all programs operating over the Internet, of security. For companies hoping to enter the software as a service (SAAS) market, this problem must be solved.
The three major companies entering the market of cloud computing are Google, Microsoft, and Apple. The various strengths and weaknesses of each, and the relations of these to the issue of cloud computing, will be explored in this presentation.
Keywords
Datacenters, Transaction, Resemblance, Subscription.- Iris Recognition
Authors
1 Department of MCA, E.G.S. Pillay Engineering College, Nagapattinam, IN
2 E.G.S. Pillay Engineering College, Nagapattinam, IN
Source
Biometrics and Bioinformatics, Vol 3, No 8 (2011), Pagination: 374-376Abstract
The pressures on today's system administrators to have secure systems are ever increasing. One area where security can be improved is in authentication and identification. Biometrics provides a promising solution meeting all demands. Biometric identification utilizes physiological and behavioral characteristics to authenticate a person's identity which include facial recognition, fingerprints, palm prints, hand geometry, retinal patterns and iris patterns and signature, voice pattern and key stroke dynamics. Many have suffered from high cost and unsatisfactory error rates. The newer emerging technology IRIS RECOGNITION, which uses the unique patterns of the human iris, overcomes previous shortcomings and provides positive recognition of an individual without contact or invasion, at extremely high confidence levels. The technology is accurate, easy to use, non-intrusive, and difficult to forge and, despite what many people may think is actually quite a fast.- The Identification of Pill Using Feature Extraction in Image Mining
Authors
1 Department of Computer Applications, Manonmaniam Sundaranar University, IN
2 Department of Computer Applications, S.N.R Sons College, IN
Source
ICTACT Journal on Image and Video Processing, Vol 5, No 3 (2015), Pagination: 973-979Abstract
With the help of image mining techniques, an automatic pill identification system was investigated in this study for matching the images of the pills based on its several features like imprint, color, size and shape. Image mining is an inter-disciplinary task requiring expertise from various fields such as computer vision, image retrieval, image matching and pattern recognition. Image mining is the method in which the unusual patterns are detected so that both hidden and useful data images can only be stored in large database. It involves two different approaches for image matching. This research presents a drug identification, registration, detection and matching, Text, color and shape extraction of the image with image mining concept to identify the legal and illegal pills with more accuracy. Initially, the preprocessing process is carried out using novel interpolation algorithm. The main aim of this interpolation algorithm is to reduce the artifacts, blurring and jagged edges introduced during up-sampling. Then the registration process is proposed with two modules they are, feature extraction and corner detection. In feature extraction the noisy high frequency edges are discarded and relevant high frequency edges are selected. The corner detection approach detects the high frequency pixels in the intersection points. Through the overall performance gets improved. There is a need of segregate the dataset into groups based on the query image's size, shape, color, text, etc. That process of segregating required information is called as feature extraction. The feature extraction is done using Geometrical Gradient feature transformation. Finally, color and shape feature extraction were performed using color histogram and geometrical gradient vector. Simulation results shows that the proposed techniques provide accurate retrieval results both in terms of time and accuracy when compared to conventional approaches.Keywords
Image Mining, Feature Extraction, Image Matching, Pill Images, Image Retrieval.- Perspective View on Software Quality Prediction Systems
Authors
1 Department of Computer Applications, Kongunadu Arts and Science College, IN