Abstract: Information collection strategies are extremely becoming challenging factor in the field of remote sensor systems for secure data sharing. In managing the settings of the remote sensor systems have been extensively vital issue, for example, target following...
Abstract: In this paper, a varied range of XOR circuits are designed in which 6T XOR is proposed using CNTFET Technology are designed using MOSFET in 32nm Technology length. Then, they are simulated using HSPICE and the performance parameters of adders such as...
Abstract: In this paper, a varied range of adder circuits are designed in which half adder cmos, full adder cmos and RCA cmos are included, are designed using MOSFET in 32nm Technology length. Then, they are simulated using HSPICE and the performance parameters of...
Abstract: Information and Communication Technology (ICT) in agriculture is a wide platform which offers solution to many areas in agriculture and rural development. The growing technology in agriculture has led to a marvellous development of application to foster and...
Abstract: Cloud computing is the long dreamed vision of computing as a utility. Besides all the benefits of the cloud computing security of the stored data need to be considered while storing sensitive data on cloud. Cloud users cannot rely only on cloud service...
Abstract: We explained here the real-time commercial detection in recorded Television (TV) program. TV commercials have become an inescapable part of modern life, significantly influencing our work habits and other aspects of life. The commercial can be interpreted as...
Abstract: The new technologies characterizing the internet of Things permit realizing real sensible environments ready to offer advanced services to the users. Recently, these sensible environments also are being exploited to renovate the users’ interest on the...
Abstract: Data sharing is an critical functionality in cloud storage. In this article, we display a way to securely, efficiently, and flexibly share information with others in cloud storage. Deduplication may be a storage saving technique that has been adopted...
Abstract: A precise measure of corporate operating performance play critical role for achieving development during turbulent financial markets. This study proposes a reliable and sophisticated prediction architecture that incorporates risk metrics, dimensionality...
Abstract: Drunk person identification is carried out using thermal infrared images. Two different methods for identifying drunk person face. The features used in first method are simply the pixel values of specific points on the face. It is proved that cluster of a...