Music Recommendation Based on Facial Expression

Music Recommendation Based on Facial Expression Mrudula K, Harsh R Jain, Amogha R Chandra, Jayanth Bhansali B.E, Computer Science & Engineering, B.N.M Institute of Technology, Bangalore   Abstract – This paper describes various methods for music recommendation based on facial expressions. Multiple music applications suggest music based on a user’s music history. But there has been some research going on for music recommendation using facial […]

Read Me

A Survey on Driver Drowsiness Detection Techniques

A Survey on Driver Drowsiness Detection Techniques  Reshma J1, Aishwarya B2, Farheen Khanam Z M2, G Sai Vennela2, Lekhana A V2 1Associate Professor, Department of Computer Science & Engineering, B N M Institute of Technology, Bangalore, India 2Student, Department of Computer Science & Engineering, B N M Institute of Technology, Bangalore, India   Abstract— The developments in technology over the years bring the support to […]

Read Me

Impact of Anomalous Propagation on Communication Signals In Librivelle – Gabon Troposphere 

Impact of Anomalous Propagation on Communication Signals In Librivelle – Gabon Troposphere  Braimoh A. Ikharo1, Okpo U. Okereke2 and Jibril D. Jiya3 1Department of Electrical and Computer Engineering , Edo University Iyamho, Edo State, Nigeria 2Department of Computer and Communications Engineer , Abubakar Tafawa Balewa University, Bauchi, Nigeria 3Department of Mechatronic and System Engineering, Abubakar Tafawa Balewa University, Bauchi, Nigeria Abstract: Radio ducting is a […]

Read Me

DigiMop – A Home Automation Tool

DigiMop – A Home Automation Tool Sagar Gupta, Vikram Kamath, and Suhas More, Dhanashri Kanade Department of Computer Science and Engineering, K.C College of Engineering, India   Abstract: The research aims to create a automated home cleaner thus helping people reduce their labour intense work such as sweeping and mopping floor The objective of this project is to design and implement a vacuum robot prototype […]

Read Me

Performance Comparison of Different Sorting Algorithms

Performance Comparison of Different Sorting Algorithms Abstract— Sorting is the basic operation in most of the applications of computer science. Sorting means to arrange data in particular order inside computer. In this paper we have discussed performance of different sorting algorithms with their advantages and disadvantages. This paper also represents the application areas for different sorting algorithms. Main goal of this paper is to compare the […]

Read Me

Security Analysis of OpenStack Keystone

Security Analysis of OpenStack Keystone Abstract – OpenStack is one of the most used cloud management software today. OpenStack is a free and open-source software platform for cloud computing, mostly deployed as an infrastructure-as-a-service (IaaS). We have selected OpenStack as one of the underlying infrastructure service layer tool because OpenStack allows us to modify our cloud to fit into custom infrastructures that may be necessary […]

Read Me

Abnormality Detection of Sensors in IOT Controllers using Fuzzy Approach for Smart Home

Abnormality Detection of Sensors in IOT Controllers using Fuzzy Approach for Smart Home Abstract— Smart home innovation is developing quickly as an energizing new worldview. An extensive variety of perspectives that incorporates security, energy sparing, ventilation, shrewd kitchen is canvassed in this paper. The greater part of the above is executed with the assistance of keen gadgets, for example, remote control, security alerts, sensors and […]

Read Me

Improved Object Detection Algorithm using Ant Colony Optimization and Deep Belief Networks Based Image Segmentaion

Improved Object Detection Algorithm using Ant Colony Optimization and Deep Belief Networks Based Image Segmentaion. Abstract— Object detection is a very important application of image processing. It is of vital importance for object dynamic surveillance and other applications. So far, object detection has been widely researched. It shows an efficient coarse object locating method based on a saliency mechanism. The method could avoid an exhaustive […]

Read Me

Hybrid Technique to Prevent Multiplicative RFID Attacks using Hybrid Distance Bounding (DB) Protocols and Secure Positioning Protocols

Hybrid Technique to Prevent Multiplicative RFID Attacks using Hybrid Distance Bounding (DB) Protocols and Secure Positioning Protocols Abstract— Security concerns inhibit the fast adaption of RFID technology for many applications. the security and privacy in radio frequency identification (RFID) system are one of the main obstacles to be solved. therefore this thesis work has proposed the hybrid technique to prevent multiplicative RFID attacks using hybrid distance bounding […]

Read Me

Providing Banking Loan to Customers Based on J48 Classifier Algorithm Combined with Neural Networks

Providing Banking Loan to Customers Based on J48 Classifier Algorithm Combined with Neural  Networks Abstract: Data mining is the transformation of large sizes of information into expressive patterns and rules. It is approximately describing the former and calculating the near future by means of information analysis. Data mining is really a multi-disciplinary area which combines, equipment understanding, data, database engineering and synthetic intelligence. The full […]

Read Me

GET OUR MONTHLY NEWSLETTER