Comparative Study of Security Algorithms IJTSRD
At present, through internet lots of confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used through which the original data can be able to convert into encrypted […]
Train Tracker using GPS System IJTSRD
Now a days, Travelling from train is a important part of the each and every person and it is fastest way to travel in the city. But, as the need of the train is increases the train accidents and violation is also increasing day by day. This research paper presents a solution for passengers to […]
Peer To Peer File Transfer with Torrent IJTSRD
Peer to peer data transfer received a lot of attention in recent years. A peer-to-peer network allows users to communicate or send data over a network without any server. A peer is any computer client or user. So that it called Peer-to-peer (P2P) networking as there is no server, all data transfer process is going […]
The Overview of Bayes Classification Methods IJTSRD
The Bayes methods are popular in classification because they are optimal. To apply Bayes methods, it is required that prior probabilities and distribution of patterns for class should be known. The pattern is assigned to highest posterior probability class. The three main methods under Bayes classifier are Byes theorem, the Naive Bayes classifier and Bayesian […]
Touchless Touchscreen IJTSRD
It was the physical contact screens which at first made extraordinary furore. Gone are the days when you require to tinker with the physical contact screens and culminate scratching up. Touch screen shows are pervasive ecumenical. Frequent physically contacting a touchscreen show with a pointing contrivance, for example, a finger can establish the steady de-refinement […]