Security Concerns in Cloud Computing IJTSRD
Cloud computing is a revolutionary way of storing and accessing data with five essential characteristics, three service models, and four deployment models. Businesses have realized the tremendous potentiality and benefits of cloud computing and have accepted the technology, but still a small amount of scepticism hovers around. In defiance of its potential characteristics, the organizations […]
Automatic Detection of Bike-Riders Without Helmet IJTSRD
The paper proposes an approach for automatic detection of bike-riders without helmet using surveillance videos in real time. The proposed approach first detects bike riders from surveillance video using cross correlation analysis. Then it determines whether bike-rider is using a helmet or not using kurtosis features and knn classifier. The system has given an average […]
Memory Management in Operating System IJTSRD
In the recent era of computing, applications an operating system cannot survive without efficient memory management, especially if an application has to be under Surve load for an undefined long time. Resources must be utilized efficiently to enhance performance. This paper describes about the memory management in an operating system and it will demonstrate basic […]
System Model for Processing on Multi-Format of Dataset IJTSRD
The problem associated with Big Data is having following feature are called 3V features: volume: large amount of data, velocity: data processing rate and variety: collection of structured data, semi-structured data, and unstructured data, the three V’ of data that has arrived in unprecedented ways. In the Present years there are many sources of data […]
Detection and Rectification of Distorted Fingerprints IJTSRD
One of the open come outs in fingerprint confirmation is the lack of robustness against image quality degradation. Poor-quality images result in specious and missing features, thus degrading the performance of the overall system. Therefore, it is very important for a fingerprint acknowledgement system to estimate the quality and validity of the captured fingerprint images. […]