-
Security Evaluation of Adversarial Applications
Ashwini Karde ; Ruksar Inamdar; Pooja Sable
Computer Engineering
Year: 2016, Volume:2, Issue : 10
Pages: 325 - 327
Security Evaluation system is used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering. The system is used to control physical access for high-security facilities The existing system in which data can be control by humans to execute their operation. In Adversarial Applications it prevents unauthorized person to gain access in account, system use the secure key for authentication purpose, also it only uploads the text file which are not harmful file for user account. The system scans the file and if it is harmful prevent it from uploading and send the report to system. In spam Filtering it converts all bad words into the good words. Reported results show that the system can provide a more secure platform for adversarial environments.
Read More...
-
To Implement Convolution in Image Processing
Prof. N. Mishra ; Ms. Mayuri Telrandhe; Ms. Priyanka Padole; Ms. Payal Thakare
Electronics and Telecommunication
Year: 2016, Volume:2, Issue : 10
Pages: 328 - 331
Edge detection is one of the most frequently used techniques in digital image processing. An Edge in an image is a significant local change in the image intensity, usually associated with a discontinuity in either the image intensity. Edges detection is a problem of fundamental importance in object extraction as it reduces image data and detects the object which is required [8] [9]. Edges identify object boundaries and are detected through changes in gray level above a particular threshold. Operators that are sensitive to the change in gray levels can be used as edge detectors. The edge detection is mainly applicable in case of data transmission; in that case the detected edge data reduce the amount of data to be transmitted. Sobel operator is one of the most commonly used detection methods and returns edges at points where the gradient of image intensity is maximum. Locations whose gradient value exceeds or greater some threshold are declared edge locations [5]. Prewitt method finds edges using the Prewitt approximation to the derivative and returns edges at those points where gradient of image intensity is maximum or greater. Prewitt operator does not place any emphasis on pixels that are closer to the centre of the masks. The Canny edge detector is considered as the standard methodology of edge detection and it finds edges by looking for local maxima of the gradient of Image [7]. But the advantage of sobel edge detector is that it requires less time and it can be use in most applications where detailing is not required.
Read More...
-
A Study on Impact of Digital Marketing in Customer Purchase Decision in Trichy
P. Ranjith ; Mrs. K. R. Mahalaxmi
MBA
Year: 2016, Volume:2, Issue : 10
Pages: 332 - 338
The aim of the study is to examine the implication of digital marketing in consumer purchase decision and to find out that the consumers are aware of digital marketing and the digital channels influence in their purchase decision. The study is carried out through survey from50 respondents. The results of the survey are analyzed using chi square test. The findings revealed that customers are aware of digital marketing and they prefer to by electronic and shopping goods through digital channels in their purchase behaviour. The study is performed in a particular geographical area and this may be considered as a limitation to judge the purchase decisions of all customers of various regions. As the world moving towards digital era, the digital channels plays vital role in increase of sales of any firm’s products. So the present study made an attempt to reveal the impact of digital marketing on customer purchase decision.
Read More...
-
PLC based Automation for Pre-Treatment of Casted Material
Vinaykumar Vadakoppu ; Suraj Kulkarni; Mahesh Hundare; G.A Bhalerao
Electronics and Telecommunication
Year: 2016, Volume:2, Issue : 10
Pages: 339 - 342
This paper presents an automation of Pre-Treatment of casted material using a Programmable Logic Controller. The main idea is to automate the procedure of lifting and immersing the metal jobs in different fluids for the pre-treatment process. The proposed system has more advantages over the manual in terms of manpower and efficiency. The system is mechanized with the Delta DVP14SS series programmable logic controller. Field sensors such as the limit switches are used for providing the input to the controller. The relays and contactors are used at the output to energize the two axis movement based overhead crane. A ladder diagram is designed to control the whole system by executing the logic. This experimentation has been completed through different trials and the cycle time is measured. The results show that the system reduces the human effort as compared with traditional manual system. The system can be further made more interactive by integrating it with human machine interface or HMI and counter for counting the total jobs processed by the system.
Read More...
-
Comparative Studies of Micro Wave Oven and Tray Drying on Beetroot
L.Nageswara Rao ; D.Kamalakar; P.Rohinikumar
Chemical Engineering
Year: 2016, Volume:2, Issue : 10
Pages: 343 - 347
In the present work, an attempt has been made to study the effect of inlet air temperature on the drying characteristics of beetroot pieces in microwave oven drying system. The results were compared with samples of beetroot dried in a tray dryer and microwave oven drying at the same temperatures. The inlet air temperatures selected were 65°C, 70oC, 75°C and 80°C. Moisture content was measured at 10 minutes interval. It was also observed that the beetroot samples obtained from the microwave oven system had lower final moisture content than those obtained from the tray dryer system.
Read More...
-
Cloud Computing: A Survey on Service Providers
Veerawali Behal ; Rydhm Beri
Computer Application
Year: 2016, Volume:2, Issue : 10
Pages: 348 - 351
This paper describes cloud computing which is a computing environment for the next generation of the Internet. The paper discusses clouds, cloud storage and service providers on the basis of different parameters such as pricing, maximum storage limit, security of data etc. This paper also discusses the advantages and disadvantages of cloud computing.
Read More...
-
Digital Shoes to Guide Blind People with Measurement of Calorie Burning
P. Nivetha ; A. Karthik; S. Rajaiyyappan; R. Ranjitha
Electronics & Communication Engineering
Year: 2016, Volume:2, Issue : 10
Pages: 352 - 354
In order to calculate the walking distance there is a need of a device. The distance is displayed in meter as well as kilometer in mobile phone using Bluetooth technology. The calorie burned while walking is based on the weight and amount of time he/she walks. We are also going to display the calorie burned every day in the mobile. Here we attached a force sensitive resistor (FSR) in sole of the shoe. When a person walks, he/she used to press his/her foot in the land. The FSR senses it and starts counting the steps which is also displayed in the mobile. It is not only great for health monitoring, but also used to guide blind people. The proposed system is that it utilizes an embedded vision system of three simple IR sensors and brings together all reflective signals in order to codify an obstacle through PIC microcontroller. It is a simple, cheap, friendly user; smart blind guidance system is designed and implemented to improve the mobility of both blind and visually impaired people in a specific area.
Read More...