1,086 research outputs found

    Audio and Video based Steganography for Data Hiding- A Review

    Get PDF
    Security is most essential issue in advanced correspondence. Information security implies defensive computerized security measures that are connected to forestall unapproved access to PCs, immense databases and online information it is likewise shields information from defilement. Security is most vital issue in computerized correspondence. Cryptography and steganography are two prominent techniques accessible to give security. Steganography centers around concealing data such that the message is imperceptible for pariahs and just appears to the sender and expected beneficiary. It is valuable instrument that permits secret transmission of data again and again interchanges channel. Steganography is a method which is utilized to conceal the message and keep the identification of shrouded message. Different present day methods of steganography are: a) Video Steganography b)Audio Steganography Audio Video steganography is a cutting edge steganography of concealing data in a way that the undesirable individuals may not get to the data

    Audio and Video based Steganography for Data Hiding

    Get PDF
    Security is most essential issue in advanced correspondence. Information security implies defensive computerized security measures that are connected to forestall unapproved access to PCs, immense databases and online information it is likewise shields information from defilement. Security is most vital issue in computerized correspondence. Cryptography and steganography are two prominent techniques accessible to give security. Steganography centers around concealing data such that the message is imperceptible for pariahs and just appears to the sender and expected beneficiary. It is valuable instrument that permits secret transmission of data again and again interchanges channel. Steganography is a method which is utilized to conceal the message and keep the identification of shrouded message. Different present day methods of steganography are: a) Video Steganography b) Audio Steganography Audio Video steganography is a cutting edge steganography of concealing data in a way that the undesirable individuals may not get to the data

    A Review on OFDMA and MU-MIMO MAC Protocols for upcoming IEEE Standard 802.11ax

    Get PDF
    IEEE introduced a new standard IEEE 802.11ax for the next generation WLANs.As we know,the current throughput is very low because of the current Media Access Control(MAC) in present wireless area networks.So,the concept of Orthogonal Frequency Multiple Access(OFDMA) to facilitate multi user access is introduced.The main challenges of adopting OFDMA areoverhead reduction and synchronization.To meet these challenges this paper revised an OFDMA based OMAX protocol.And due to various various bandwidth consuming applications and devices today’s WLANs have become stressed and low at throughput.To handle this problem MU MIMO is used to improve the performance of WLANs.This paper surveys uplink/downlink mutli user MAC protocols for MIMO enabled devices.It also identifies the key requirements of MAC protocol design

    Review on Colour Image Denoising using Wavelet Soft Thresholding Technique

    Get PDF
    In this modern age of communication the image and video is important as Visual information transmitted in the form of digital images, but after the transmission image is often ruined with noise. Therefore the received image needs to be processing before it can be used for further applications. Image denoising implicates the manipulation of the image data to produce a high quality of image without any noise. Most of the work which had done in color scale image is by filter domain approach, but we think that the transform domain approach give great result in the field of color image denoising.. This paper reviews the several types of noise which corrupted the color image and also the existing denoising algorithms based on wavelet threshodling technique. DOI: 10.17762/ijritcc2321-8169.15039

    Smart Power Monitoring System on Solar

    Get PDF
    The design and development of a Smart Power monitoring device has reported in this paper. System has been designed that can be used to monitor electrical appliances such as voltage, current and power of solar panel. The system consists of a smart sensing unit that detects and controls the energy deliver and it used for daily activities by following different tariff rates. A developed prototype has been extensively tested and experimental results have compared with conventional measuring devices. This work has been designed to implement smart power monitoring and control system through IOT using cloud data storage.In this system we are collecting the energy data from the solar panel and pass it to the microcontroller device. The device will pass this collected data via RS232 to the GSM sender.Here two GSM devices are used, that is sender and receiver.The PHP will perform some operation on the received data and stored it in database

    Energy Efficiency Comparative Analysis of Different Routing Protocol In MANET for Healthcare Environment

    Get PDF
    Now a day ad hoc mobile networks have several routing protocols, but every protocol has its own advantages and limitations therefore our main aim is to meet maximum performance using advance algorithm. Some are good in a small network; some are suitable in large networks, and some give better performance in location or global networks. Today advance and innovative applications for health care environments which are based on a wireless network are being developed in the commercial sectors. In our research work ECHERP framework gives a better performance as compared to other routing protocol. Designing WSN with this architecture in mind will enable designers to balance the energy dissipation and optimize the energy consumption among all network constituents because energy is one of the most crucial factor and sustain the network lifetime for the intended application. By categorizing the overall WSN system into sub region, components of each region were extracted in terms of their dominant factors, followed by a mathematical formula as a total energy cost function in terms of their constituents. As in our base paper three protocols are used which are DSR, DSDV and AODV and out of these DSR has best parameters on comparing diverse parameters has maximum remaining energy. But in our research a new protocol ECHERP is integrated in NS2 and then we compared these four protocols and we found that ECHERP have optimized values of parameters

    A Review on Multilingual Text to Speech Synthesis by Syllabifying the Words of Devanagari and Roman

    Get PDF
    Speech synthesis is process of spoken language as an input text and converted into speech waveforms. This paper describes the text to speech system for Devanagari scripted language and Roman Language. There are many earliest TTS systems are available but for Devanagari and Roman scripts are not available

    Two Dimensional CFD Analysis on Different Rocket Nozzles

    Get PDF
    The reduction of Earth-to-orbit launch costs in conjunction with an increase in launcher reliability and operational Efficiency is the key demands on future space transportation systems, like single-stage-to-orbit vehicles (SSTO). The realization of these vehicles strongly depends on the performance of the engines, which should deliver high performance with low system complexity. Performance data for rocket engines are practically always lower than the theoretically attainable values because of imperfections in the mixing, combustion, and expansion of the propellants. The main part of the project addresses different nozzle concepts with improvements in performance as compared to conventional nozzles achieved by Different Mach numbers, thus, by minimizing losses caused by over- or under expansion. The design of different nozzle shapes and flow simulation is done in gambit and fluent software’s respectively for various parameter

    Patient based factors influencing drug compliance among hypertensive patients in a tertiary care hospital in Mysore

    Get PDF
    Background: Hypertension is deemed as the tip of the iceberg due to the mortality and morbidity associated with it. A major factor accounting for inadequate treatment of hypertension is poor compliance.Methods: Morisky 8-Item Medication Adherence Questionnaire was used for a cross sectional study. The term compliance is defined as the extent to which the patient’s behaviour coincides with the clinical prescription, implying that the patient defaults by not following the advice of the health care providerResults: Mean age of the participants was 59.2yrs (S.D. 10.37 yrs). Compliance was found to be good 71.3% of respondents, medium in 20.4% and poor in 8.3%.52.8% had one or two other ailments (diabetes, asthma etc.).Conclusions: Patient’s medication compliance is a multifactor behaviour in which the role of patient’s attitude is very important. Patients related factors known to affect compliance were equally distributed among good, medium and poorly compliant participant
    • …
    corecore