26 research outputs found

    A new parking guidance system for outdoor environment

    Get PDF
    At the off hazard which you are any other motive force then it's miles highly difficult to choose the separation even as stopping the automobile. Reverse indicating that allows you to forestall sensor circuit tackles this problem the separation with the help of 3 LED's. we can without a great deal of a stretch mastermind this framework at the posterior of the car. This framework works with 12V rechargeable battery. this newsletter discloses you how to define opposite preventing sensor. we can likewise utilize the identical concept in IR Water level Detector Circuit too. The separation in the center of vehicle and snag is comprehended through the gathering of LED's (D5 to D7)

    An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication

    Get PDF
    Authentication means acknowledging a user’s identity. It is the way of associating a request with a set of identity. The identification provided is an authorized user’s information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system

    An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication

    Get PDF
    Authentication means acknowledging a user’s identity. It is the way of associating a request with a set of identity. The identification provided is an authorized user’s information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system

    A secured data hiding using affine transformation in video steganography

    Get PDF
    Network security is the most essential aspect of information technology among today’s emerging digital technologies which demands secured communication of information. In this digital network, it is essential to secure the data from intruders and unauthorized receivers. Steganography plays a vital role in secure transmission of data. This paper proposes a steganography method to hide data using affine transformation technique. The secret data are embedded in the coefficients of integer wavelet transform of the video frames. While embedding, the pixel values are distributed using affine transformation. The proposed method has been tested on many input data and the performance is evaluated both quantitatively and qualitatively. The results indicate the enhanced capability of the proposed method that can ensure imperceptible distortions with minimum computational cost in terms of PSNR factor over the existing methods

    An experimental research on GPS based boundary intruding boat monitoring system

    Get PDF
    Boundary detection and alert system is a straightforward and effective idea, which utilizes Internet of Things technology. By utilizing this framework border monitoring is 100% protected and secure. It naturally alarms the intruder when the vehicle goes over the specific range in borders. This is finished by a sensor called Global positioning system (GPS). It detects the current position of the vehicle and switch on the caution framework naturally. In this anticipate, no need of manual operations like on time and off time setting. GPS and IoT are the fundamental segments of the task. The resistances of the alert system changes as per the distance between the current position of the vehicle and the border get decreased or increased

    Implementing critical machine learning (ML) approaches for generating robust discriminative neuroimaging representations using structural equation model (SEM)

    Get PDF
    Critical ML or CML is a critical approach development of the standard ML (SML) procedure. Conventional ML (ML) is being used in radiology departments where complex neuroimages are discriminated using ML technology. Radiologists and researchers found that sole decision by the ML algorithms is not accurate enough to implement the treatment procedure. Thus, an intelligent decision is required further by the radiologists after evaluating the ML outcomes. The current research is based on the critical ML, where radiologists’ critical thinking ability, IQ (intelligence quotient), and experience in radiology have been examined to understand how these factors affect the accuracy of neuroimaging discrimination. A primary quantitative survey has been carried out, and the data were analysed in IBM SPSS. The results showed that experience in works has a positive impact on neuroimaging discrimination accuracy. IQ and trained ML are also responsible for improving the accuracy as well. Thus, radiologists with more experience in that field are able to improve the discriminative and diagnostic capability of CML.Campus At

    Investigation and Evaluation of Embedded Controller Nodes of the Robotic Arm for Industrial Automation

    Get PDF
    Robotic arm is widely used for industrial automation. Most programming methods used today involve some degree of programming knowledge or involve creating an entire three dimensional workspace to virtually program the robotic arm. The two major key drawbacks preventing from a more widespread use of robotic arm is the cost involved and the difficulty in programming the arm as per the unique requirements of the job at hand. To address these two limitations, this research work aims at reducing the cost of the industrial arm by using multiple low cost embedded processors working in a coordinated and distributed fashion. Also, this work implements a master -slave based control system for real time control andprogramming of the robotic arm. This proposed master-slave control system is analogous to lead by nose programming method and overcomes the mentioned limitations

    Vehicle traffic differentiation and scheduling in sensor network using Ns2

    Get PDF
    In this paper, the obligatory QoS administration stream parameters are characterized for every kind of activity as per now is the right time criticality and deferral affectability. The IEEE 802.15.4 is broadly utilized cutting edge standard convention as a part of numerous applications using remote sensor systems (WSNs) particularly in vehicular sensor systems (VSNs).In this paper, different planning calculations, for example, first in first out(FIFO), Priority line, Weighted Round Robin (WRR) and Deficit Weighted Round Robin(DWRR) are coordinated in consistence with IEEE 802.15.4 to enhance the throughput, upgrade the transmission capacity use rate and perform quick preparing and conveyance for dire information activity, we isolate the standard movement into different sorts of information on the premise of various QoS prerequisites. The required QoS administration stream parameters are characterized for every kind of movement as indicated by now is the ideal time criticality and postponement affectability

    Developing fish feeder system using Raspberry Pi

    Get PDF
    The Fish owners of the pet fish are usually distressed when they are away from home environment because they could not feed the fish on time. Both reasons, food starvation and overfeeding risk the health of fish and leads to poor water quality in indoor fish tanks. Thus monitoring the fish feeder is of great importance which can be very beneficial for the fish owners. This work is aimed to design a fish feeder system using microcontroller and Raspberry Pi based web application to relax the distressed fish owners in feeding their fish on time. This system is designed to overcome the problem of fish dying due to fish feeder malfunction. With this design, the fish owner can monitor the fish tank for correct functioning of the fish feeder. Also, the user can set schedules for feeding the fish through the web application
    corecore