Skip to main content
Linked Data involves web to create typed links between different sources of data. Source data may vary in location, size, subject-matter and how congruously it is structured. Links produced from this data create equality and define... more
    • by 
    •   5  
      Linked DataOntology EngineeringLinked Open DataComputer Science And Engineering
This paper addresses the subconscious mind and its fascinating effects on a human’s life without their realization. The subconscious and its phenomenon can be considered a significant source to understand the secrets to the power this... more
    • by 
    •   4  
      Engineering and Computer ScienceComputer Science And EngineeringComputer Sciences and EngineeringComputer Science and Engineering
This is an era of technology; we are surrounded with the technology. Now a day’s people become smarter they want to operate each and everything’s with his smart phone/laptop/pc without going anywhere, it happens due to IOT devices.... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Health care is one of the speedy growing areas. The Health care system contains large amount of medical data which should be mined from data warehouse. The mined data from data warehouse helps in finding the important information.... more
    • by  and +1
    •   3  
      Engineering and Computer ScienceComputer Science And EngineeringComputer Science and Engineering
The identity or verification of humans primarily based on their thermal information isn't always an easy mission to perform, but thermal face biometrics can make contributions to that undertaking. Face reputation is an interesting and a... more
    • by 
    •   4  
      Engineering and Computer ScienceComputer Science And EngineeringComputer Sciences and EngineeringComputer Science and Engineering
Day by day the number of vehicles is increasing very fast as the demand is increasing. So, the details of the vehicles are very important to maintain for the government of a country. Information like ownership, insurance, emission, road... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Anonymization techniques are enforced to provide privacy protection for the data published on cloud. These techniques include various algorithms to generalize or suppress the data. Top Down Specification in k anonymity is the best... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Time series is a scientific process of determining an ordered sequence of values of a variable within equally spaced time intervals. Mostly this is applied when looking at technical data and its influences on the neighboring surroundings.... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The Public Distribution System in India is the largest retail system in the world. Major problem in this system are the inefficiency in the targeting of beneficiaries, improve weighing machines used an illegal selling of goods. Automated... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
In today's world women safety is one of the most important issues to be addressed in our country. When a women needs urgent help at the time of harassment or molestation, proper reachability is not present for them. Apart from being aware... more
    • by 
    •   10  
      MathematicsInformation TechnologyTechnologyNeural Networks
    • by 
    •   7  
      EngineeringComputer Science and EngeneeringEngineering and Computer ScienceComputer Science And Engineering
Augmented Reality is the presentation of objects superimposed on the real world view of the environment. It is an innovative technology that allows multidimensional viewing and understanding of concepts. This paper aims to use this... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
This paper focuses on proposing a system for centralization of the IT infrastructure by building upon the concept of Diskless Booting. The client stations are configured to boot over an existing network using the Network Boot. The Client... more
    • by  and +1
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Illumination invariance remains the most researched, yet the most challenging aspect of automatic face recognition. In this paper we investigate the discriminative power of colour-based invariants in the presence of large illumination... more
    • by 
    •   93  
      EngineeringElectrical EngineeringElectronic EngineeringComputer Science
The primary goal of this thesis is to simulate the causes of human face ageing and to detect skin illnesses. This project combines the capabilities of a Deep Learning model, notably EfficientDet, with the capabilities of a machine... more
    • by 
    •   5  
      Engineering and Computer ScienceComputer Science And EngineeringElectronic Engineering and Computer ScienceComputer Science and Engineering
Blockchain Technology has gotten a great deal of consideration from both industry and the scholarly world due to its decentralized, persistency, namelessness and auditability properties. In this review, utilization of Blockchain... more
    • by  and +1
    •   9  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Cloud computing associate the computing and storage resources controlled by different operating systems to make available services such as large-scaled data storage and high performance computing to users. The benefits of low-cost,... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Data warehouse is used to provide effective results from multidimensional data analysis. The accuracy and correctness of these results depend on the quality of the data. To improve data quality, data must be properly extracted,... more
    • by 
    •   9  
      Data WarehouseUMLData cleaningEngineering and Computer Science
Peter Linz
    • by 
    • Computer Science And Engineering
Digitalization of money transfer is a must in the present situation of banking operations. Clients have a variety of ways to carry out transactions, such as credit, wiring money, and so forth. However, depositing cash requires the... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Heart attack is most common disease that engulfs the patient’s precious life. This disease attacks a man so in a flash that it barely gets treated. Many systems that detect heart attack came into the picture but they do have many flaws.... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
GPS is in actuality the main answer for outdoor positioning, no unmistakable arrangement has so far risen for indoor positioning notwithstanding the business hugeness. Along these lines, the principal point is to grow ongoing indoor... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The film industry is not only the center of Entertainment but also a huge source of employment and business. Well, famous actors and directors can ensure the publicity of a movie but can’t promise a good IMDB score. We have collected the... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
International Journal of Computer Science and Technology (IJCST) is devoted to fields of Computer Science and Technology. The IJCST is a open access peer-reviewed scientific journal published in electronic form as well as print form. The... more
    • by 
    •   13  
      Robotics (Computer Science)Computer Science EducationOntology (Computer Science)Wireless Networks (Computer Science)
A large section of World Wide Web is full of Documents, content; Data, Big data, unformatted data, formatted data, unstructured and unorganized data and we need information infrastructure, which is useful and easily accessible as an when... more
    • by 
    •   3  
      Engineering and Computer ScienceComputer Science And EngineeringComputer Science and Engineering
Cloud computing is a field which has been fast growing over the last few years. The fact that cloud can provide both computation and storage at low rates makes it popular among corporations and IT industries. This also makes it a very... more
    • by 
    •   5  
      Engineering and Computer ScienceComputer Science And EngineeringComputer Science EngineeringCOMPUTER SCIENCE & ENGINEERING
The age of computer advancement has caused a revolutionary change in the corporate sector. From on-campus working hours to remote work from home scenarios, from meetings in a conference room to meeting online in a virtual environment,... more
    • by 
    •   8  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
    • by 
    •   6  
      EngineeringEngineering and Computer ScienceComputer Science And EngineeringComputer Sciences and Engineering
The building industry, especially construction materials’ production, is a major user of the world’s resources and together with energy production one of the most important sources of the CO2 production. Among building materials, concrete... more
    • by 
    •   3  
      Engineering and Computer ScienceComputer Science And EngineeringComputer Science and Engineering
Internet of Things (IoT) plays a important role in connecting the over all environmental things to the network and it is easy to access those un-internet things from any remote location. It’s unavoidable for the people to update with the... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
— Nowadays, the usage of e-commerce is growing day by day, so online users are also rising. Every user spends their most of the time on e-commerce websites and their behavior is different from one another. E-commerce has become very... more
    • by  and +1
    •   10  
      Hidden Markov ModelsClusteringhidden Markov modelEngineering and Computer Science
In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the... more
    • by 
    •   13  
      Information VisualizationIntrusion Detection SystemsIntrusion Detectionnew techniques in 3D visualization in GIS, 3D visualization techniques in planetory science,etc.
Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from... more
    • by 
    •   93  
      EngineeringElectrical EngineeringElectronic EngineeringComputer Science
    • by 
    •   7  
      EngineeringComputer Science and EngeneeringEngineering and Computer ScienceComputer Science And Engineering
In today's world cloud computing is widely used in many it industries. Cloud computing is an emerging model of business computing. Cloud computing which is based on internet has the most powerful architecture of computation. Because of... more
    • by 
    •   3  
      Engineering and Computer ScienceComputer Science And EngineeringComputer Science and Engineering
In the present study, we have obtained Bianchi type VI anisotropic model of the universe filled with a bulk viscous stress in the presence of variable gravitational and cosmological constants. Here we have assumed the cosmological term in... more
    • by 
    •   3  
      Engineering and Computer ScienceComputer Science And EngineeringComputer Science and Engineering
The usage of mobile phones in today's world is more than ever. Mobile phones are everywhere and the mobile technology is growing at an exponential rate. The capabilities of a mobile phone have made it provide us services that make human... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
In the modern world, people receive various bills through post, sms, emails etc. They use cards, e-wallets and net banking to pay them in online. This manual process can be automated if the user wishes to pay selective or each bill he/she... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Evolution in the field of web technology has made an enormous amount of data available in the web for the internet users. These internet users give their useful feedback, comments, suggestion or opinion for the available product or... more
    • by 
    •   10  
      Information TechnologyComputer EngineeringInformation and TechnologyEngineering and Computer Science
During forensic examination, analysis of unallocated space of seized storage media is essential to extract the previously deleted or overwritten files when the file system metadata is missing or corrupted. The process of recovering files... more
    • by 
    •   7  
      Digital ForensicsData RecoveryEngineering and Computer ScienceComputer Science And Engineering
Software testing is used to test the developed system to find the errors and defects in the software. To find the errors and defects in the software system test cases are generated. Test cases generation based on three parts i.e. coding,... more
    • by 
    •   5  
      Computer ScienceOntology (Computer Science)Wireless Networks (Computer Science)Cse
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed, public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block is linked... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
To improve the corrosion resistant properties of carbon steel usually cladding process is used. It is a process of depositing a thick layer of corrosion resistant material over carbon steel plate. Most of the engineering applications... more
    • by 
    • Computer Science And Engineering
    • by 
    •   7  
      EngineeringComputer Science and EngeneeringEngineering and Computer ScienceComputer Science And Engineering
Online networks have many threats regarding security. The threats are targeting agency networks, private networks or other networks via gaining access to or changing essential information. Less secure networks deliver authorization to the... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The increasing popularity of micro-blogging sites like Twitter, which facilitates users to exchange short messages (tweets) is an impetus for data analytics tasks for business development. Twitter has a huge amount of data. Twitter’s API... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Over the recent years, several smart applications like RFID?s, sensor networks, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications in which highly constrained... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Shelter is a basic necessity of life. Every human in all categories are entitled to securing a desired accommodation with an ease, in this advent of advancement in technology. Currently, the process of securing accommodations/houses in... more
    • by  and +1
    •   16  
      EngineeringMathematicsComputer ScienceAlgorithms
Due to the rapid growth in networks communication security issue are being a challenging task. In this project deep analysis is to be made in the cyber security using proxy re-encryption and cipher text crypto system. Various algorithm... more
    • by 
    • Computer Science And Engineering
    • by 
    •   6  
      EngineeringEngineering and Computer ScienceComputer Science And EngineeringElectronic Engineering and Computer Science