The Agriculture is the about 70% of the population depends on agriculture. Agricultures (Weeds) a... more The Agriculture is the about 70% of the population depends on agriculture. Agricultures (Weeds) are among the main factors that could harm crop yields. With advances in electronics and information technologies, machine vision combined with image processing techniques has become a promising tool for accurate real-time detection of weeds and crops in the field, providing valuable detection information for specific sites. Weed management this review summarized advances in weed detection using machine vision from the ground. And image processing techniques. Specifically, the four procedures, that is, preprocessing, segmentation, feature extraction and sorting, for weed detection were presented in detail. To separate the vegetation from the background land, different color indices and grading approaches such as color index based, threshold based and learning-based ones were developed. The difficulty in detecting weeds lies in discriminating between crops and weeds that often have similar properties. Generally, four categories of characteristics, i.e. biological morphology, Spectral features, visual textures and spatial contexts, were used for the task, which are discussed in this revision. Application of newly developed machine learning-based and deep learning-based mainstream applications. Approaches to weed detection were also presented. Finally, the challenges and solutions provided by researchers to detection of weeds in the field, including occlusion and overlapping of leaves, variable and different lighting conditionsgrowth stages, discussed the plant's growth.
This paper is an attempt to investigate the Teachers and Students perception on the usage of Onli... more This paper is an attempt to investigate the Teachers and Students perception on the usage of Online Educational resources during the pandemic situation. Covid-19 virus affected almost all the countries and caused chaos among the people. Social distancing and wearing a mask has become a necessity. Teaching and learning can't be halted, especially for those who are looking for acquiring jobs or getting admission in best universities. In Traditional system, Face to Face interaction between Teachers can understand the expression of a student and analyze student's level of understanding. Covid-19 has entirely changed the existing system and forced teachers and students to switch on to Online Education. Usage of Information Communication Technology (ICT) tools has been there since many years, tools such as Computers, Audio System, Smart Boards, Over Head Projectors, LCD Projectors etc., are in place which helped the teacher to explain a lesson or topic in a effective manner. It is said "Picture Speaks Louder than Words", i.e., manual based teaching methodology has its own limitations, it is difficult to estimate whether student has gained exact knowledge or not, due to this reason, handmade charts were used which played its role to some extent. In the due course of time, we have been viewing advancement in technology and everyone started using various types of electronic devices and are getting connected with the network. Usage of Mobiles, Tablets, Laptops, etc., has become a necessity. Today teachers are utilizing virtual class rooms, taking classes from home. In this paper we try to identify various resources, techniques and methods which can help online learning activity more interactive and effective. We try to analyze the merits and demerits of online teaching and learning.
Nowadays location based mostly services area unit quickly turning into common. several services t... more Nowadays location based mostly services area unit quickly turning into common. several services that area unit supported user"s location can even use the user"s location history or their spatial-temporal place of origin. It uses GPS technology. international Positioning System (GPS) could be a satellite-based navigation system created of a network of various satellites. Malicious users could slug their spatial-temporal place of origin while not a rigorously designed security system for users to prove their past locations. associate degree word form STAMP stands for abstraction Temporal place of origin Assurance with Mutual Proofs. essentially STAMP is meant for ad-hoc mobile users generating location proofs for every different in a very distributed setting. thus it will simply accommodate trustworthy mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the situation proofs and protects user"s privacy. A semi-trusted certification Authority is employed to distribute cryptologic keys in addition as guard users against collusion by lightweight entropy based mostly trust analysis approach. STAMP is affordable in terms of procedure and storage resources. This protocol is meant to maximise user"s namelessness and site privacy. Here users area unit given the management over the situation graininess of their standard atmosphere proofs. STAMP is collusion resistant. associate degree entropy-based trust model is projected to notice users reciprocally generating pretend proofs for every different.
Nowadays location based mostly services area unit quickly turning into common. several services t... more Nowadays location based mostly services area unit quickly turning into common. several services that area unit supported user’s location can even use the user’s location history or their spatial-temporal place of origin. It uses GPS technology. international Positioning System (GPS) could be a satellite-based navigation system created of a network of various satellites. Malicious users could slug their spatial-temporal place of origin while not a rigorously designed security system for users to prove their past locations. associate degree word form STAMP stands for abstraction Temporal place of origin Assurance with Mutual Proofs. essentially STAMP is meant for ad-hoc mobile users generating location proofs for every different in a very distributed setting. thus it will simply accommodate trustworthy mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the situation proofs and protects user’s privacy. A semi-trusted certification Authority...
International Journal for Recent Development in Science & Technology, 2020
Network Security & Cryptography is a concept to protect network and data transmission over wirele... more Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with its principles. Cryptographic systems with ciphers are described. The cryptographic models and algorithms are outlined.
International Journal of Scientific Research in Engineering and Management (IJSREM), 2021
Recommender systems are changing from novelties used by a few
E-Business sites, to serious busine... more Recommender systems are changing from novelties used by a few E-Business sites, to serious business tools that are re-shaping the world of E-Business. Many of the largest commerce Web sites are already using recommender systems to help their customers find items to purchase. A recommender system learns from a customer and recommends items that he or she will find most valuable from among the available items. In this paper, we present an explanation of how recommender systems help E-Business sites increase sales and purchase among customers, and analyze few sites that use recommender systems including several sites that use more than one recommender system. Based on the examples, we create a classification of recommender systems, including the interfaces they present to customers, the technologies used to create the recommendations, and the inputs they need from customers. We conclude with ideas for new applications of recommender systems to E-Business.
Nowadays location based mostly services area unit quickly turning into common. several services t... more Nowadays location based mostly services area unit quickly turning into common. several services that area unit supported user"s location can even use the user"s location history or their spatial-temporal place of origin. It uses GPS technology. international Positioning System (GPS) could be a satellite-based navigation system created of a network of various satellites. Malicious users could slug their spatial-temporal place of origin while not a rigorously designed security system for users to prove their past locations. associate degree word form STAMP stands for abstraction Temporal place of origin Assurance with Mutual Proofs. essentially STAMP is meant for ad-hoc mobile users generating location proofs for every different in a very distributed setting. thus it will simply accommodate trustworthy mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the situation proofs and protects user"s privacy. A semi-trusted certification Authority is employed to distribute cryptologic keys in addition as guard users against collusion by light-weight entropy based mostly trust analysis approach. STAMP is affordable in terms of procedure and storage resources. This protocol is meant to maximise user"s namelessness and site privacy. Here users area unit given the management over the situation graininess of their standard atmosphere proofs. STAMP is collusion resistant. associate degree entropy-based trust model is projected to notice users reciprocally generating pretend proofs for every different.
The Agriculture is the about 70% of the population depends on agriculture. Agricultures (Weeds) a... more The Agriculture is the about 70% of the population depends on agriculture. Agricultures (Weeds) are among the main factors that could harm crop yields. With advances in electronics and information technologies, machine vision combined with image processing techniques has become a promising tool for accurate real-time detection of weeds and crops in the field, providing valuable detection information for specific sites. Weed management this review summarized advances in weed detection using machine vision from the ground. And image processing techniques. Specifically, the four procedures, that is, preprocessing, segmentation, feature extraction and sorting, for weed detection were presented in detail. To separate the vegetation from the background land, different color indices and grading approaches such as color index based, threshold based and learning-based ones were developed. The difficulty in detecting weeds lies in discriminating between crops and weeds that often have similar properties. Generally, four categories of characteristics, i.e. biological morphology, Spectral features, visual textures and spatial contexts, were used for the task, which are discussed in this revision. Application of newly developed machine learning-based and deep learning-based mainstream applications. Approaches to weed detection were also presented. Finally, the challenges and solutions provided by researchers to detection of weeds in the field, including occlusion and overlapping of leaves, variable and different lighting conditionsgrowth stages, discussed the plant's growth.
This paper is an attempt to investigate the Teachers and Students perception on the usage of Onli... more This paper is an attempt to investigate the Teachers and Students perception on the usage of Online Educational resources during the pandemic situation. Covid-19 virus affected almost all the countries and caused chaos among the people. Social distancing and wearing a mask has become a necessity. Teaching and learning can't be halted, especially for those who are looking for acquiring jobs or getting admission in best universities. In Traditional system, Face to Face interaction between Teachers can understand the expression of a student and analyze student's level of understanding. Covid-19 has entirely changed the existing system and forced teachers and students to switch on to Online Education. Usage of Information Communication Technology (ICT) tools has been there since many years, tools such as Computers, Audio System, Smart Boards, Over Head Projectors, LCD Projectors etc., are in place which helped the teacher to explain a lesson or topic in a effective manner. It is said "Picture Speaks Louder than Words", i.e., manual based teaching methodology has its own limitations, it is difficult to estimate whether student has gained exact knowledge or not, due to this reason, handmade charts were used which played its role to some extent. In the due course of time, we have been viewing advancement in technology and everyone started using various types of electronic devices and are getting connected with the network. Usage of Mobiles, Tablets, Laptops, etc., has become a necessity. Today teachers are utilizing virtual class rooms, taking classes from home. In this paper we try to identify various resources, techniques and methods which can help online learning activity more interactive and effective. We try to analyze the merits and demerits of online teaching and learning.
Nowadays location based mostly services area unit quickly turning into common. several services t... more Nowadays location based mostly services area unit quickly turning into common. several services that area unit supported user"s location can even use the user"s location history or their spatial-temporal place of origin. It uses GPS technology. international Positioning System (GPS) could be a satellite-based navigation system created of a network of various satellites. Malicious users could slug their spatial-temporal place of origin while not a rigorously designed security system for users to prove their past locations. associate degree word form STAMP stands for abstraction Temporal place of origin Assurance with Mutual Proofs. essentially STAMP is meant for ad-hoc mobile users generating location proofs for every different in a very distributed setting. thus it will simply accommodate trustworthy mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the situation proofs and protects user"s privacy. A semi-trusted certification Authority is employed to distribute cryptologic keys in addition as guard users against collusion by lightweight entropy based mostly trust analysis approach. STAMP is affordable in terms of procedure and storage resources. This protocol is meant to maximise user"s namelessness and site privacy. Here users area unit given the management over the situation graininess of their standard atmosphere proofs. STAMP is collusion resistant. associate degree entropy-based trust model is projected to notice users reciprocally generating pretend proofs for every different.
Nowadays location based mostly services area unit quickly turning into common. several services t... more Nowadays location based mostly services area unit quickly turning into common. several services that area unit supported user’s location can even use the user’s location history or their spatial-temporal place of origin. It uses GPS technology. international Positioning System (GPS) could be a satellite-based navigation system created of a network of various satellites. Malicious users could slug their spatial-temporal place of origin while not a rigorously designed security system for users to prove their past locations. associate degree word form STAMP stands for abstraction Temporal place of origin Assurance with Mutual Proofs. essentially STAMP is meant for ad-hoc mobile users generating location proofs for every different in a very distributed setting. thus it will simply accommodate trustworthy mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the situation proofs and protects user’s privacy. A semi-trusted certification Authority...
International Journal for Recent Development in Science & Technology, 2020
Network Security & Cryptography is a concept to protect network and data transmission over wirele... more Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with its principles. Cryptographic systems with ciphers are described. The cryptographic models and algorithms are outlined.
International Journal of Scientific Research in Engineering and Management (IJSREM), 2021
Recommender systems are changing from novelties used by a few
E-Business sites, to serious busine... more Recommender systems are changing from novelties used by a few E-Business sites, to serious business tools that are re-shaping the world of E-Business. Many of the largest commerce Web sites are already using recommender systems to help their customers find items to purchase. A recommender system learns from a customer and recommends items that he or she will find most valuable from among the available items. In this paper, we present an explanation of how recommender systems help E-Business sites increase sales and purchase among customers, and analyze few sites that use recommender systems including several sites that use more than one recommender system. Based on the examples, we create a classification of recommender systems, including the interfaces they present to customers, the technologies used to create the recommendations, and the inputs they need from customers. We conclude with ideas for new applications of recommender systems to E-Business.
Nowadays location based mostly services area unit quickly turning into common. several services t... more Nowadays location based mostly services area unit quickly turning into common. several services that area unit supported user"s location can even use the user"s location history or their spatial-temporal place of origin. It uses GPS technology. international Positioning System (GPS) could be a satellite-based navigation system created of a network of various satellites. Malicious users could slug their spatial-temporal place of origin while not a rigorously designed security system for users to prove their past locations. associate degree word form STAMP stands for abstraction Temporal place of origin Assurance with Mutual Proofs. essentially STAMP is meant for ad-hoc mobile users generating location proofs for every different in a very distributed setting. thus it will simply accommodate trustworthy mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the situation proofs and protects user"s privacy. A semi-trusted certification Authority is employed to distribute cryptologic keys in addition as guard users against collusion by light-weight entropy based mostly trust analysis approach. STAMP is affordable in terms of procedure and storage resources. This protocol is meant to maximise user"s namelessness and site privacy. Here users area unit given the management over the situation graininess of their standard atmosphere proofs. STAMP is collusion resistant. associate degree entropy-based trust model is projected to notice users reciprocally generating pretend proofs for every different.
Uploads
Papers by V. Madhukar
E-Business sites, to serious business tools that are re-shaping the
world of E-Business. Many of the largest commerce Web sites are
already using recommender systems to help their customers find
items to purchase. A recommender system learns from a customer
and recommends items that he or she will find most valuable from
among the available items. In this paper, we present an explanation
of how recommender systems help E-Business sites increase sales
and purchase among customers, and analyze few sites that use
recommender systems including several sites that use more than
one recommender system. Based on the examples, we create a
classification of recommender systems, including the interfaces
they present to customers, the technologies used to create the
recommendations, and the inputs they need from customers. We
conclude with ideas for new applications of recommender systems
to E-Business.
E-Business sites, to serious business tools that are re-shaping the
world of E-Business. Many of the largest commerce Web sites are
already using recommender systems to help their customers find
items to purchase. A recommender system learns from a customer
and recommends items that he or she will find most valuable from
among the available items. In this paper, we present an explanation
of how recommender systems help E-Business sites increase sales
and purchase among customers, and analyze few sites that use
recommender systems including several sites that use more than
one recommender system. Based on the examples, we create a
classification of recommender systems, including the interfaces
they present to customers, the technologies used to create the
recommendations, and the inputs they need from customers. We
conclude with ideas for new applications of recommender systems
to E-Business.