42 research outputs found

    A Survey of Digital Watermarking Techniques and its Applications

    Full text link
    Digital media is the need of a people now a day as the alternate of paper media.As the technology grown up digital media required protection while transferring through internet or others mediums.Watermarking techniques have been developed to fulfill this requirement.This paper aims to provide a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today world.Comment: 4 Page

    Data Mining Concepts - A survey paper

    Get PDF
    Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysi

    Viral Marketing in Social Network Using Data Mining

    Get PDF
    Data mining is a process of analyzing data from different perspectives and summarizing it into useful information .The proposed work focus on clustering application which is "Collaborative Data mining "which mines different subgroups from some networks in the form of graph such as a social network. In this work using social network, two type of clusters are developed using data mining algorithms, one having strong tie and other having a weak tie between members and then the cluster with strong tie is used for discovering the highly influential node for viral advertising using target marketing to increase the profit with less advertising expense

    Integration of Cloud Computing and Artificial Intelligence in Driverless Car Using High Performance Behavioural Cloning

    Get PDF
    Research on autonomous vehicle system has risen in the past couple of years. It has posed challenges to the researchers to develop an understanding about the real time scenarios. Deep Learning has demonstrated its extraordinary computational potential by transcending its abilities into more complex areas, where pattern matching, image recognition and behavioral cloning plays a vital role. The system consists of Image Processing and analyzing of the training data into behavioral cloning of the vehicle in a simulated environment. A control algorithm responsible for consolidating the sub systems calculations of the correct steering angle is used to keep the vehicle within the lane markings of the road. The solution proposed requires a better data collection and data interpretation. Addition of cloud computing fastens the data calculation and hence improves the performance of the system

    A Review Paper Based on Content-Based Image Retrieval

    Get PDF
    The quantity and complexity of digital image data is rapidly expanding. The user does not meet the demands of traditional information recovery technology, so an efficient system for content-based image collection must be developed. The image recovery from material becomes a source of reliable and rapid recovery. In this paper, characteristics such as color correlogram, texture, form, edge density are compared. For understanding and acquiring much better knowledge on a specific subject, literature surveys are most relevant. In this paper, we discuss some technical aspects of the current image recovery systems based on content

    An optimized Load Balancing Technique for Virtual Machine Migration in Cloud Computing

    Get PDF
    Cloud computing (CC) is a service that uses subscription storage & computing power. Load balancing in distributed systems is one of the most critical pieces. CC has been a very interesting and important area of research because CC is one of the best systems that stores data with reduced costs and can be viewed over the internet at all times. Load balance facilitates maintaining high user retention & resource utilization by ensuring that each computing resource is correctly and properly distributed. This paper describes cloud-based load balancing systems. CC is virtualization of hardware like storage, computing, and security by virtual machines (VM). The live relocation of these machines provides many advantages, including high availability, hardware repair, fault tolerance, or workload balancing. In addition to various VM migration facilities, during the migration process, it is subject to significant security risks which the industry hesitates to accept. In this paper we have discussed CC besides this we also emphasize various existing load balancing algorithms, advantages& also we describe the PSO optimization technique

    Various electroanalytical methods for the determination of uranium in different matrices

    Get PDF
    AbstractUranium is a toxic material hence numerous body systems such as the kidney, brain, liver, and heart can be affected by uranium exposure. The main effect is kidney toxicity. Uranium is a naturally occurring element found in low levels in all rock, soil, and water. All uranium isotopes may also cause radiation hazards, thus without any doubt an analysis of such materials in the surrounding environment is very important. The presented review is a summarization of all electroanalytical techniques for the determination of uranium and its compounds in various matrices. Totally 43 different methods are found in our literature survey. Out of these three are polarographic, 25 potentiometry, five capillary electrophoresis and 28 voltametric methods are available in the literature. Interferences of different ions and applications in different matrices are also given for each method

    Feasibility analysis of design for remanufacturing in bearing using hybrid fuzzy-topsis and taguchi optimization

    Get PDF
    The tremendous advancement in technology, productivity and improved standard of living has come at the cost of environmental deterioration, increased energy and raw material consumption. In this regard, remanufacturing is viable option to reduce energy usage, carbon footprint and raw material usage. In this manuscript, using computational intelligence techniques we try to determine the feasibility of remanufacturing in case of roller bearings. We collected used N308 bearings from 5 different Indian cities. Using Fuzzy-TOPSIS, we found that the roundness, surface roughness and weight play a vital role in design for remanufacturing of roller bearings. Change in diameter, change in thickness and change in width showed minimal influence.  We also used Taguchi analysis to reassess the problem. The roundness of inner and outer race was found to be the most influential parameters in deciding the selection of bearing for remanufacturing. The results suggest the bearing designer to design the bearing in such a way that roundness of both races will be taken cared while manufacturing a bearing. However, using Taguchi the weight of the rollers was found to be of least influence. Overall, the predictions of Taguchi analysis were found to be similar to Fuzzy-TOPSIS analysis

    Secured & High Resolution Watermarking Technique

    Get PDF
    the watermarking is a method of embedding some king of hidden authentication information with cover image so that it can be identified later. There are many methods available which uses some kind of signal or the binary images, however sometimes it is difficult to defend that the recovered signal/image is same embedded watermarked image because there is always a possibility to get similar patterns form non watermarked images, hence in this paper we presents a secure watermark technique which is capable to embed 8 bit image. The experimental results shows that the technique is not only time efficient but also immune to different attacks
    corecore