896 research outputs found

    A Noval Method for Data Auditing and Integrity Checking in Public Cloud

    Get PDF
    Data plays a huge role in today’s era. All business requires to deal with lot of business. So data has to be secured correctly. In this paper we aim to design a system to help to protect the data in the cloud. The public cloud is used in which the users stores the data and the data is secured by using the cryptographic method. Every customer wants to store the data and access or process the data from the cloud, but the major setback is security issues. In this paper we present a novel algorithm which helps the data to be accessed securely from the cloud

    Echoes of Discrimination: Unravelling Racial Dynamics in Kiran Desai’s 'The Inheritance of Loss'

    Get PDF
    Kiran Desai's "The Inheritance of Loss" is set in both India and the United States, and it examines the effects of colonialism on its protagonists. It explores identity, privilege, and the far-reaching effects of prejudice to provide insight on the individual and social ramifications of this ubiquitous problem. Desai's story provides a thorough and nuanced analysis of the ways in which prejudice may damage one's psyche

    Artificial Intelligence in Pharma

    Get PDF
    This paper aims to provide a better understanding of the possible applications of Artificial Intelligence (AI) in the field of Pharmacy. Artificial intelligence basically involves complex information processing. It enables machines to carry out certain functions which were originally done by human and which required human intellect. Over the past few years, the use of artificial intelligence in the pharma has grown unimaginably and is now able to revolutionize the way drugs are discovered and handled. AI is capable of impacting the field of pharmacy at multiple levels. Pharmacy and medical education, drug development, personalization of drug therapy, drug safety, rational drug use, manufacture and formulation of dosage forms are areas of impact by AI. The fact that AI can displace humans at their own tasks is a matter of concern. Although there are ethical concerns regarding the implementation of AI in healthcare, it can be assured that no machine or system can replace many of the humanitarian duties

    Semantic Web-based Turmeric Expert System using IWD Algorithm

    Get PDF
    Semantic web is a structured way of re-usable data representation that can be used for inferring new knowledge. It provides a common data format for data representation. And it also provides semantics through structured information. Agriculture involves a vast variety of unstructured information. Normally agricultural experts, with their vast experience, provide critical advice in their farming activity. Machine learning algorithms acquire knowledge in the same manner as that of a human expert acquires knowledge with experience. In the present paper, an expert advisory system is simulated using machine learning algorithm for providing expert advice to the end users. A critical study is conducted for understanding the semantic web stack and an attempt has been made to design and develop an expert system namely, "Semantic Web-based Turmeric Expert System using IWD Algorithm". The proposed system has two modules namely, expert advice module and information system module. The Advisory system takes certain details from the end users, regarding their crop and provides the suitable advice. In the present paper, only yield assessment module was considered. Yield estimation system uses Intelligent Water Drops (IWD) algorithm to estimate the yield for each crop variety. Information system provides information about Turmeric crop varieties, parts, pests, pesticides, symptoms and diseases. Protégé is used to develop Ontology. JENA framework is used to retrieve information from Ontology. SWRL rules are implemented to infer rules from the data

    Artificial Intelligence in Pharma

    Get PDF
    This paper aims to provide a better understanding of the possible applications of Artificial Intelligence (AI) in the field of Pharmacy. Artificial intelligence basically involves complex information processing. It enables machines to carry out certain functions which were originally done by human and which required human intellect. Over the past few years, the use of artificial intelligence in the pharma has grown unimaginably and is now able to revolutionize the way drugs are discovered and handled. AI is capable of impacting the field of pharmacy at multiple levels. Pharmacy and medical education, drug development, personalization of drug therapy, drug safety, rational drug use, manufacture and formulation of dosage forms are areas of impact by AI. The fact that AI can displace humans at their own tasks is a matter of concern. Although there are ethical concerns regarding the implementation of AI in healthcare, it can be assured that no machine or system can replace many of the humanitarian duties

    Indian Fake Currency Detection using Image Processing: A Review

    Get PDF
    Paper currency identification is one of the image processing techniques i.e. clothed to recognize currency of different countries. The paper currencies of different countries are collectively rises ever more. However, the main intention of most of the standard currency recognition systems and machines is on recognizing fake currencies. The features are extracted by using image processing toolbox in MATLAB and preprocessed by reducing the data size in captured image. The expose pluck out is discharged by considering HSV (Hue Saturation Value). The chief is neural network classifier and the next step is recognition. MATLAB is used to evolve this program. The new source of paper currency recognition is pattern recognition. But for currency recognition, converter system is an image processing method which is used to identify currency and transfer it into the other currencies as the users need. The need of currency recognition and converters is accurately to recognize the currencies and transfer the currency immediately into the other currency. This application uses the computing energy in differentiation among different kinds of currencies are differentiated with their suitable class using power computing. Fake note at present plays a key topic for the researchers. The recognition system is composed of two parts. First is the captured image and the second is recognition. Forged currencies recognition is the main aim of the standard paper currency identification system. The most mandatory system is currency identification system and it should be very accurate. The performance of different methods are surveyed to refine the exactness of currency recognition system

    Analysis of Big Data Processing Using HDM Framework

    Get PDF
    MapReduce and Spark have been introduced to ease the task of developing big data programs and applications. However, the jobs in these frameworks are roughly defined and packaged as executable jars without any functionality being exposed or described. This means that deployed jobs are not natively composable and reusable for subsequent development. Besides, it also hampers the ability for applying optimizations on the data flow of job sequences and pipelines. The Hierarchically Distributed Data Matrix (HDM) which is a functional, strongly-typed data representation for writing composable big data applications. Along with HDM, a runtime framework is provided to support the execution, integration and management of HDM applications on distributed infrastructures. Based on the functional data dependency graph of HDM, multiple optimizations are applied to improve the performance of executing HDM jobs. The experimental results show that our optimizations can achieve improvements between 10% to 30% of the Job-Completion-Time and clustering time for different types of applications when compared

    Multi-Authority Access Control Mechanisms in Cloud: A Review

    Get PDF
    Cloud computing is a computing technology or information technology architecture used by organization or individuals. It launches data storage and interactive paradigm with some advantages like on-demand self-services, ubiquitous network access. Due to popularity of cloud services, security and privacy becomes major issue. This paper addresses study of privacy preservation issues and also provides an idea to how to overcome the issues. Also it provides a brief survey on various Robust Access Privilege Control mechanism used for providing privacy in cloud storage

    Fake Currency Detection using Image Processing

    Get PDF
    In recent years, a lot of illegal counterfeiting rings manufacture and sell fake coins and at the same time fake note currency is printed as well, which have caused great loss and damage to the society. Thus it is imperative to be able to detect fake currency. We propose a new approach to detect fake Indian notes using their images. A currency image is represented in the dissimilarity space, which is a vector space constructed by comparing the image with a set of prototypes. Each dimension measures the dissimilarity between the image under consideration and a prototype. In order to obtain the dissimilarity between two images, the local key points on each image are detected and described. Based on the characteristics of the currency, the matched key points between the two images can be identified in an efficient manner. A post processing procedure is further proposed to remove mismatched key points. Due to the limited number of fake currency in real life, SVM is conducted for fake currency detection, so only genuine currency are needed to train the classifier
    • …
    corecore