A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Leena, C.
- An Enhanced Speech Based Vmail for Visually Impaired People
Authors
1 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
Source
Wireless Communication, Vol 8, No 1 (2016), Pagination: 1-5Abstract
In today's reality correspondence has turned out to be so natural because of coordination of correspondence innovations with web. However the outwardly tested individuals discover it extremely hard to use this innovation in view of the way that utilizing them requires visual observation. Voice message building design blinds individuals to get to email and other interactive media elements of working framework (tunes, text).Also in versatile application SMS can be perused by framework itself. Presently a days the headway made in PC innovation opened stages for outwardly weakened individuals over the world. This paper goes for adding to an email framework that wills even an innocent outwardly impeded individual to utilize the administrations for correspondence without past preparing. This building design will likewise diminish subjective burden taken by heedless to recall and sort characters utilizing console. This framework can be utilized by any ordinary individual likewise for instance the person who is not ready to peruse. The framework is totally taking into account intelligent voice reaction which will make it easy to understand and proficient to utilize.Keywords
IVR, Mouse Click Event, Screen Reader, Voice Mail.- Timeserving Direction-Finding Algorithm with Regard to Inform Node Choice in Cellular Sensor Communities
Authors
1 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
2 Department of ECE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
3 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
Source
Wireless Communication, Vol 7, No 10 (2015), Pagination: 317-323Abstract
Energy cost savings optimisation becomes on the list of important worries inside Wireless Sensor System (WSS) routing method style, simply because that most sensor nodes are equipped with your restricted non rechargeable battery power. With this document, we concentrate on reducing electricity consumption along with exploiting system life span regarding files communicate with One-Dimensional (1-D) Line System. Pursuing the basic principle associated with opportunistic routing idea, multihop communicate selection to optimise your system electricity efficiency is done in line with the dissimilarities involving sensor nodes, when it comes to both their own distance to sink and the left over electricity of each one additional. Specifically, a power Conserving by way of Timeserving Direction-finding (TDF) Algorithm is built to make sure minimum strength charge through files communicate along with defend your nodes using relatively low left over electricity. Considerable simulations along with genuine testbed final results show that this proposed option TDF may significantly increase the system effectiveness in electricity saving along with wireless online connectivity which have a practical additional recent Wireless Sensor routing systems
Keywords
One-Dimensional (1-D) Line System, Timeserving Direction-Finding Routing, Communicate Node, Wireless Sensor System (WSS).- Secure Information Distribution in Cloud Computing
Authors
1 Department of CSE, V.R.S College of Engineering and Technology, Arasur, Villupuram, IN
Source
Wireless Communication, Vol 6, No 9 (2014), Pagination: 330-334Abstract
Cloud computing would be the supply involving computing services online. It allow persons and also corporations to utilize software and also equipment which are handled by simply 3 rd parties on distant destinations. Though the end user can't discuss sensitive info inside untrusted cloud as a result of lack of safety measures problems. With this document we offer safety measures towards the end user by the ways of encryption and also decryption. When the end user uploads the actual document, technique critical will be made by simply CP-ABE approach. This particular technique critical will be provided for highly regarded end user email no .. The person utilizes this critical pertaining to decryption in order to track one more critical, that may acquire particular document. A different factor in this document acquire and also publish charge involving sole end user and also collection could be represented as information.
Keywords
Wireless Circle, Facts Discussing, Cloud Research.- An Efficient Dynamic Cluster Head Table Design for Time Minimization using BVLI's Data Structures
Authors
1 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
Source
Wireless Communication, Vol 5, No 3 (2013), Pagination: 102-109Abstract
IP lookup affects the speed of an incoming packet and the time required to determine which output port the packet should be sent to; hence, it plays an important role in the design of cluster-tables. In this paper, we propose a new data structure, called a BVLI – Binary Value Level based Index Data Structure for use in designing dynamic cluster-tables for reduce the time minimization process for searching the availability of next cluster head in the cluster table and retrieve the particular cluster network information quickly during the communication among the systems in the wireless networks. One key feature of our data structure is that each node can store only one Level in the cluster head table, which reduces the number of memory accesses. When performing lookup, the structure can search more prefixes in one node and may find the longest matching prefix in an internal node rather than on a leaf. Moreover, when updating the cluster head-table, it does not need to reconstruct the table. As a by-product, the proposed data structure minimizes the time required for dynamic cluster head table operations, including lookup, insertion, deletion, and also reduces the number of memory accesses. We report the results of experiments conducted to compare the proposed data structure with other structures using MATLAB.Keywords
BVLI, Cluster, Lookup, Unique ID.- Object Driven-Darkness Recognition along with Elimination
Authors
1 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
2 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
Source
Digital Image Processing, Vol 7, No 8 (2015), Pagination: 257-263Abstract
We propose system attributes regarding urban high resolution color remote sensing images, when I put forward the object oriented shadow detection in addition to removal method inside the method, shadow has are generally recognized into bank account through aesthetic segmentation, and then, according for the statistical provides of the images, suspected shadows are generally extracted. Furthermore, a series of dark objects that will can be mistaken regarding shadows are usually ruled out according to object properties as well s spatial relationship between objects. For shadow removal, inner–outer summarize report collection. (IOSRC) matching is used. First, your IOSRCs are consumed in respect to the boundary lines associated with shadows. Shadow removal is actually then performed according towards homogeneous sections attained in the course of IOSRC similarity matching. Experiments show which the new technique can accurately detect shadows via urban high-resolution remote sensing images and also can correctly restore shadows having a rate of over 85%.Keywords
HSV, HCV, YIQ, Brightness, Saturation.- File System Organization Paradigm Using Meta Aware Data
Authors
1 Department of CSE, V.R.S. College of Engineering and Technology, Arasur, Villupuram, IN
Source
Data Mining and Knowledge Engineering, Vol 6, No 9 (2014), Pagination: 360-366Abstract
Hierarchical directory-tree Corporation can be used within active process; tend not to meet the scalability and efficiency needs and progressively more complicated metadata inquiries. This specific paper offers any fresh decentralized semantic-aware metadata corporation, termed Smart Store, that uses semantics regarding files' metadata in order to judiciously mixture related data files directly into semantic-aware communities by employing info retrieval resources. The key idea of Smart Store would be to control the particular seek extent of an complicated metadata question to your solitary or a nominal amount of semantically related communities and prevent or perhaps relieve brute-force seek from the overall process. This decentralized design and style regarding Smart Store may enhance process scalability and lessen question latency intended for complicated inquiries (including array and top-k queries). In addition, it's also good in order to constructing semantic-aware caching, and typical filename-based point question. We now have applied any prototype regarding Smart Store and an extensive experiment based on real-world traces display which Smart Store drastically enhances process scalability and decreases question latency in excess of database methods. Towards very best in our information, this can be an initial review within the enactment regarding complicated inquiries within large-scale file methods.Keywords
File Methods, Metadata Operations, Scalability, and Functionality Assessment.- Real time Human Health Monitoring and Alert System for Cardiac Patients Using GSM and GPS
Authors
1 Department of EEE, Ponjesly College of Engineering, Nagercoil, IN