Classification and Detection of Vehicles using Deep Learning
The vehicle classification and detecting its license plate are important tasks in intelligent security and transportation systems. The traditional methods of vehicle classification and detection are highly complex which provides coarse grained results due to suffering from limited viewpoints. Because of the latest achievements of Deep Learning, it was successfully applied to image classification and […]
Workflow in Treatment Process IJTSRD
This paper presents an overview of treatment processes. In order to discuss the workflow in a treatment process, treatment activities must be defined and analyzed. This paper describes the number of treatment activities which will be considered for defining the Treatment process. Dr. Sumagna Patnaik | Dr. Towheed Sulatna “Workflow in Treatment Process” Published in […]
Authentication through Claims-Based Authentication IJTSRD
Thinking as far as claims and issuers is an effective reflection that backs better approaches for securing your application. Claims have an understanding with the issuer and allow the claims of the user to be accepted only if the claims are issued by a trusted issuer. Authentication and authorization is explicit in CBAC as compared […]
A Systematic Literature Review of Frequent Pattern Mining Techniques IJTSRD
Mining of frequent items from a voluminous storage of data is the most favorite topic over the years. Frequent pattern mining has a wide range of real world applications; market basket analysis is one of them. In this paper, we present an overview of modern frequent pattern mining techniques using data mining algorithms. Frequent pattern […]
Conceptual Design for Real-time Monitoring and Control System for critical assets using JAVA Classes: Case Study of Public Building and Oil & Gas Pipeline security IJTSRD
Critical public assets such as oil and gas pipelines, public buildings, power plants, nuclear plants, public water utility etc needs to be monitored in real time so as to ensure their availability, dependability, safety and security. In this paper, we examined the basic components and architecture of real-time system, which includes real-time control, data acquisition […]