4 research outputs found

    A Compressive Survey on New Technique Towards Successful Document Research Using Key Phrase Annotations Together with Querying Benefit

    Get PDF
    Generally it can be challenging to find out the particular pertinent data inside unstructured wording paperwork. This kind of information is still suffocated within unstructured wording and terminology. Annotations by means of Characteristic name-value frames tend to be more significant for retrieval of this sort of documents. This system proposes a novel, different, alternative approach for document retrieval which includes annotations identification. This system identifies the values of structured attributes by reading, analyzing and parsing the uploaded documents. This system proposes an approach for efficient document retrieval using effective methods. The main use of this system is that when users of author perform query based search, they could get minimum and distinct accurate results where it could be easy for retr ieval data from the database. By using these techniques two techniques, workload of system can reduce by large amount. And it also, given the fact the effic iency of searching annotation document will be faster because of using the query-based searching technique or content value searching

    Sixth Sense Technology Based Pointer Interface System

    Get PDF
    As computers became more common in society, promoting natural human to computer interaction (HCI) will have a positive influence on their use. Hence, there has been growing interest in the development of new approaches and technologies for bridging the human–computer barrier. A Real Time Vision Based Pointer interface system is a new vision-based interface, which is sufficiently fast and effective to substitute a computer mouse. System is able to reduce hardware impact and also increases range of usage of physical word objects instead of digital word objects like mouse. The aim of a system is to bring HCI to a level where interactions with computers will be as natural as an interaction between humans. DOI: 10.17762/ijritcc2321-8169.150315

    Secure Authentication Model using Grid based Graphical Images with Three Way Validation

    Get PDF
    The most common computer authentication method is to use text usernames and passwords which have various drawbacks. For example users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. This paper provides additional layer of security to normal textual password by using graphical password for authenticating the user. As graphical passwords are vulnerable to shoulder surfing attack so we will send one-time generated password to users and even send credentials to users authorized email-id. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP)

    DESIGN AND IMPLEMENTATION OF 8-BIT VEDIC MULTIPLIER

    No full text
    Today's technology has raised demand for fast and real time signal processing operation. Multiplication is one of the most important arithmetic operations. In this paper, we have proposed design of vedic multiplier using Urdhva Tiryagbhyam sutra in Xilinx ISE. This design takes lesser time for operation than currently available multipliers .It encompasses wide era of image processing and digital signal processing in much efficient way with increase in speed and thus leading to higher performance ratin
    corecore