Abstract: In this paper we are presenting our work on the Indoor positioning of the users / Shopper using a Bluetooth network of low energy i.e. BLE (Bluetooth Low Energy) beacons deployed in large landmark our Main Objective is to determine which path is Shortest...
Abstract: This paper provides a review on the IDMA (Interleave Division Multiple Access) technology inwirelesscommunication system based on Interleaver. In thispaper, IDMA technique is proposed in multipath rician fading channel and compared with MIMO. IDMA is a...
Abstract: Nowadays many people are using online financial transactions. This transaction needs to be secure. A rapid growth in E-Commerce market is seen in recent time throughout the world. With the ever-increasing use of online shopping, Debit or Credit card fraud...
Abstract: Unmanned aerial vehicles have become cheaper because many control functions can be implemented in software rather than having to depend on expensive hardware . This even allows multiple UAVs to be used for a single application. In this case, the UAVs must...
Abstract: In this paper we are presenting our work on the Indoor positioning of the users / Shopper using a Bluetooth network of low energy i.e. BLE (Bluetooth Low Energy) beacons deployed in large landmark our Main Objective is to determine which path is Shortest...
Abstract: Solar radiation one of the most important application in solar energy research so many research papers introduce to analyse the influence it. The great importance of Global Solar Radiation (GSR), the number of radiation stations are very less when compared...
Abstract: A database is only as functional as query interface allows it to be. If a user is not capable to communicate to the database what user wishes from it, even the richest data store provides petite or no value. Writing well-structured queries, in languages...
Abstract: Abstract: Question and Answer (Q&A) frameworks assume an imperative part in our day by day life for data and information sharing. Clients post inquiries and pick inquiries to reply in the framework. Because of the quickly developing client populace and...
Abstract: Internet is the network of networks and is also called ‘internetwork’. Border Gateway Protocol (BGP) is the protocol of the internet. It is a standardised Exterior Gateway Protocol. It manages how packets are routed across the internet through the exchange...
Abstract: User authentication is one of the important issues for illegal access, especially to computer systems. Alphanumeric passwords can easily be hijacked later by some malicious user. A possible remedy against such a scenario is to use Keystroke Dynamics....