Skip to main content
    • by 
— Agriculture is a significant part of a developing country like India, and agricultural intervention is essential in rural livelihood. As per the statistical measurement, 65% of the Indian economy is dependent on agriculture and... more
    • by 
In the present study Diabetics is one of the critical diseases which can fall at any group of age and gender. The major causes lead to diabetics is mostly inheritance, in a proper healthy lifestyle, Irregular food habits, stress, and no... more
    • by 
Internet of Things (IoT) is an emerging technology that is drastically improving with many new enhancements in medical and health domains. IoT Health wearable devices are taking new challenges by upgrading with innovative technology and... more
    • by 
Internet of Things (IoT) is playing a dynamic role in day to day human lives. It is an integrated platform relates with physical sensor components, wireless device networks, cloud based databases and application monitoring systems.... more
    • by  and +1
According to the norms of the Indian government, Aadhaar provides singlesource identity verification across the country for the residents. Currently, Aadhaar services are inadequate in our country. Even now, more than 30% of our Indian... more
    • by 
    • by 
    •   2  
      EconomicsPolitical and Economic Development
Nowadays preparing an effective model for face recognition is difficult task. Face is a critical and complex multidimensional visual model. However in this Article, we present a method for face recognition based on Hidden Markov Model... more
    • by 
    • Image Processing
The main objective of this paper is to give high performance gain in order to achieve high throughput with less delay. In communication networks, buffers are used to accommodate short term packet bursts so as to less packet drops and to... more
    • by 
Unlike competing online Infringement solutions, Infringement is copy-paste elimination software. Infringement is the illegal use of another person's words or ideas without permission. It's a dishonest thing to do. Copyscape is an... more
    • by  and +3
    • Computer Science
This work makes two significant contributions to the current status of viticulture technology studies. We start with a detailed look at the history and current state of computer vision, image processing, and machine learning applications... more
    • by  and +3
    • Machine Learning
Nowadays, digitalization in the healthcare organizations places great emphasis on technological advances in clinical healthcare providers. Traditional methods for measuring and evaluating outcomes for patients in forecasting and... more
    • by  and +3
    • Computer Science
In order to share the initial data and the secret keys that will be used to encrypt the data, a secure protocol is presented in this research for spontaneous wireless ad hoc networks that leverages a hybrid symmetric/asymmetric scheme and... more
    • by  and +3
    • Computer Engineering
Power and other computing resources can be stored and processed in cloud computing environments. Depending on the features of the clients' devices, video streams, whether they are live or on-demand, often need to be transcoded or... more
    • by  and +2
    •   2  
      Computer ScienceComputer Engineering
Cloud computing technology provides new opportunities for start-up,outsourcing individuals and corporations in health care outsourcing data and processing. The use of modern information technology can significantly improve the healthcare... more
    • by 
Searching keywords in databases is complex task than search in files. Information Retrieval (IR) process search keywords from text files and it is very important that queering keyword to the relational databases. Generally to retrieve... more
    • by 
In recent years, Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required.... more
    • by 
    • Cryptography
When conducting searches in biomedical databases like PubMed, users are often presented with a high number of results, only a small fraction of which are actually relevant. Some solutions to the problem of too much information include... more
    • by  and +3
    • Computer Science
Cloud computing technology provides new opportunities for start-up,outsourcing individuals and corporations in health care outsourcing data and processing. The use of modern information technology can significantly improve the healthcare... more
    • by 
Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of microdata. Even though an attacker may gaining sensitive... more
    • by