674 research outputs found
Emerging Trends in Safety Issues in Cloud - The Potentials of Threat Model
For tomorrow�s computing, Cloud computing has designed the unrealistic and infrastructural basis. The complete computing infrastructure is quickly affecting cloud based architecture. Via Internet, the resources and services of cloud computing are offered and also these services and resources are offered from data centers located globally. By providing resources that are virtual through the internet, cloud computing controls its consumers. With a continuous matter for Open Systems and internet, Security has always concerned. It really suffers whenever we are discussing about security on cloud. The lack of safety is the only hindrance in general implementation of cloud computing. The flexibility and benefits, if security is not robust and consistent, that cloud computing has to offer, will have slight rationality. There are many security problems that are enclosed in cloud computing such as security of data, and investigation of the utilization by the cloud computing merchants. For the consumers and service providers, the prosperous in cloud computing includes lots of security challenges. The objective of this paper is to recognize the most insecure threats of security in cloud computing which will further enables both end users and retailers to know about the key security threats that are linked with cloud computing. It also includes finding of advantages and problems in cloud computing with respect to availability of data, its cost and security of data
Analyzing Contours of Freedom of Press
Freedom of the press and restrictions which could be imposed on the press have always been a volatile subject. Supreme Court in literally every decade has tried to restrict this freedom by judicial pronouncement, by which they have tried tracing the contours of freedom of the press. Recently, the Supreme Court in the Sahara real estate v. Securities exchange board took a giant leap by developing the principle ‘Postponement of Publication’ by extending a 50-year-old doctrine of ‘Prior Restraint. The Supreme Court is not only the guardian of fundamental rights but also a balancing wheel between the rights. Freedom of expression is one of the most cherished values of a free democratic society. It includes the right to receive information and ideas of all kinds from different sources. In essence, the freedom of expression embodies the right to know. Freedom of expression is not an absolute principle under our Constitution. Further, it may also happen one right to freedom of expression may hinder another right like the right to a fair trial. At present, the system which is followed is the ‘open justice system ‘which permits fair and accurate reports of court proceedings to be published except in cases of in-camera proceedings. The media has a right to know what is happening in courts and to disseminate the information to the public which enhances the public confidence in the transparency of court proceedings
Multi-Network Feature Fusion Facial Emotion Recognition using Nonparametric Method with Augmentation
Facial expression emotion identification and prediction is one of the most difficult problems in computer science. Pre-processing and feature extraction are crucial components of the more conventional methods. For the purpose of emotion identification and prediction using 2D facial expressions, this study targets the Face Expression Recognition dataset and shows the real implementation or assessment of learning algorithms such as various CNNs. Due to its vast potential in areas like artificial intelligence, emotion detection from facial expressions has become an essential requirement. Many efforts have been done on the subject since it is both a challenging and fascinating challenge in computer vision. The focus of this study is on using a convolutional neural network supplemented with data to build a facial emotion recognition system. This method may use face images to identify seven fundamental emotions, including anger, contempt, fear, happiness, neutrality, sadness, and surprise. As well as improving upon the validation accuracy of current models, a convolutional neural network that takes use of data augmentation, feature fusion, and the NCA feature selection approach may assist solve some of their drawbacks. Researchers in this area are focused on improving computer predictions by creating methods to read and codify facial expressions. With deep learning's striking success, many architectures within the framework are being used to further the method's efficacy. We highlight the contributions dealt with, the architecture and databases used, and demonstrate the development by contrasting the offered approaches and the outcomes produced. The purpose of this study is to aid and direct future researchers in the subject by reviewing relevant recent studies and offering suggestions on how to further the field. An innovative feature-based transfer learning technique is created using the pre-trained networks MobileNetV2 and DenseNet-201. The suggested system's recognition rate is 75.31%, which is a significant improvement over the results of the prior feature fusion study
Numerical Simulation and Design of Low PAPR FBMC Communication System for 5G Applications
Unlike SC-FDMA (Single-Carrier Frequency Division Multiple Access), merging only DFT (Discrete Fourier Transform) addition with FBMC-OQAM (filter group multi-carrier with offset quadrature amplitude modulation) only cuts the marginal PAPR. (Peak-to-average power ratio). To take advantage of the single carrier effect of DFT extension, special conditions for the coefficients of the IQ (in-phase and quadrature phase) channels of every single subcarrier ought to be met. As a beginning point, we first originate this form, which we call the ITSM (Identical Time-Shifted Multi-Carrier) condition. Then, depending on this condition, we put forward a new FBMC for low PAPR. The foremost features of the offered way out are summarized as: First, to additionally raise the PAPR reduction, we created four candidate versions of the FBMC waveform for DFT spreading out and ITSM conditions and carefully chosen one with the least peak power. Even with various candidate generations, unlike the traditional SI (Side information) based PAPR reduction scheme, the focal computational fragments (such as DFT and IDFT) are shared and need only be executed one time. Therefore, matched to the prior DFT-expanded FBMC, the overhead in complexity is small, and the recommended pattern can realize a PAPR reduction comparable to SC-FDMA. Second, in the projected pattern each one pass on only two bits of SI from a block of FBMC-OQAM symbols. And so, the SI overhead is meaningfully lesser than a conventional SI-based scheme such as SLM (Selective Mapping) or PTS (Partial Transmission Sequence).The whole work is executed using MATLAB software. The PAPR of FBMC system has been significantly reduced after the application of proposed algorithm. PAPR was reduced by 25 % after the use of DFT spreading and ITSM conditioning
- …