Posts

Group Signature Entanglement in E-voting System

Image
Group Signature Entanglement in E-voting System Online Voting System Project Application Group Signature Entanglement in E-voting System Xuet al. [4] proposed a scheme which supports anonymity of the voters in the e-voting system by applying the concept of blinding and grouping signature. This scheme seems to be easier than the other quantum signature schemes because i t d o e s not involve entanglement. In t h e e-voting system, the message has to be signed by the manager of the office. However, the content of the message d o e s not h a v e to be readable by any person other than the owner of the message (blind signature scheme). Also, Xu’s paper uses the grouping signature to provide anonymity of voters in the e-voting system, whereas the voter information, such as location information, has to be secure and non-readable by any person. Some e-voting systems could be applied in different branches and offices in different locations, so signing the mess

Propagation Modeling in Large-Scale Cooperative Multi-Hop Ad Hoc Networks

Image
Online Movie Ticket Booking Project App Propagation Modeling in Large-Scale Cooperative Multi-Hop Ad Hoc Networks In this paper, a strip-shaped multi-hop ad hoc network is analyzed using a spatial Poisson pointprocess (PPP) and stochastic geometry. The decode-and-forwardprotocol is considered for transmission overthe multi-hop network where cooperative communications is employed at each hop. An analytical expressionfor the probability density function of the received power at an arbitrary node is derived, given a set of nodestransmits in the previous hop, which is further used to characterize the coverage performance of the network.The received power at a node becomes a doubly stochastic process owing to random path loss and a Rayleighfading channel. The notions of one-hop success probability and coverage range are analyzed for variousnetwork parameters. An algorithm for conserving energy is also proposed by considering PPP thinning andits performance in term

A Survey on Women Safety Device Using IoT

Image
Women Safety And Security App A Survey on Women Safety Device Using IoT ln the present day scenes women safety isconsidered to be the major problem in both urbanand rur al areas. I t is quite difficult to change themind-set o f the entire society, but we can provideseveral security devices f or the women who are facingsexual harassment, acid attacks, molestation, etc. Forproviding the security, various smart devices andapplications were developed. Many smart devicesand applications are also available in the market; but,it doesn’t provide an effective solution. Experts fromvarious field discovered women’s safety device whichworks in both manually and automatically. Thisarticle examines various women safety relatedtechniques. The drawbacks and opportunities inwomen’s safety devices are also discussed. https://codeshoppy.com/shop/product/women-security-app/ Internet o f things (IoT) is influenced with human life in both knowingly as well as unkno

Efficient Garbage Collection Policy and Block Management Method for NAND Flash Memory

Image
Garbage Management System Project Efficient Garbage Collection Policy and Block Management Method for NAND Flash Memory For flash memories, blocks with saved data must be erased before new data can be written in them again. Research on garbage collection has been actively carried out for the efficient performance. Brief review of existing garbage collection and block management methods are as follows. A. Greedy Method The Greedy algorithm performs garbage collection by selecting blocks that have the highest number of invalid pages [3]. Because no separate operations are necessary, this method offers such advantages as fast performance and a smaller number of valid pages that must be copied to new blocks. However, it has a weak point for wear leveling, since the block erase count is not considered. B. Cost-Benefit Method The Cost-Benefit algorithm pursues the equal use of blocks by considering the block allocation time in addition to the Greedy algorithm [4].

Epsilon-Tube Filtering: Reduction ofHigh-Amplitude Motion Artifacts FromImpedance Plethysmography Signal

Image
Food Wastage Reduction Management Android App Epsilon-Tube Filtering: Reduction of High-Amplitude Motion Artifacts From Impedance Plethysmography Signal The impedance plethysmography (IP) has long been used to monitor respiration. The IP signal is also suitable for portable monitoring of respiration due to its simplicity. However, this signal is very susceptible to motion artifact (MA). As a re- sult, MA reduction is an indispensable part of portable acquisition of the IP signal. Often, the amplitude of the MA is much larger than the amplitude of the respiratory component in the IP signal. This study proposes a novel filtering method to remove the high- amplitude MA’s from the IP signal. The proposed method combines the idea of ε -tube loss function and an autoregressive exogenous model to estimate the MA while leaving the periodic respiratory component of the IP signal intact. Also, a regularization method is used to find the best filter coefficients that

A Review on Video Based Vehicle Detection, Recognition and Tracking

Image
On Road Vehicle Breakdown Assistance Finder Project  A Review on Video Based Vehicle Detection, Recognition and Tracking Motion Based Models: Motion based methods extract moving vehicles based on motion from background. Motion based methods includ es Temporal frame differencing and Back ground subtrac tion . A . Frame differencing: Frame differencing is least complex and quickest method. Pixel wise difference is figured between two back to back frames. Moving foreground regions are determined using a threshold value [4]. The detection can be improved using three cons ecutive frames. Dual inter frame subtraction followed bitwi se AND is performed to extract the moving object [3]. B. Background subtraction: Foreground objects are separated by computing pixel wise distinction betwe en the present image and the static background image [7]. The information about the

Implementing a course in Education - Best International School in Kumbakonam

https://singleplatform.doodlekit.com/blog/entry/7807803/implementing-an-course-in-educational-writing-best-school-in-kumbakonam https://singleplatform.doodlekit.com/blog/entry/7807725/exploring-the-training-path-students-in-best-school-in-kumbakonam https://singleplatform.doodlekit.com/blog/entry/7807644/research-on-the-education-for-the-physical-education-teacher http://inforary.mystrikingly.com/blog/course-based-on-teachers-educate-to-cbse-students http://inforary.mystrikingly.com/blog/perspective-of-teachers-in-international-school-students-development http://inforary.mystrikingly.com/blog/physical-education-teacher-in-matriculation-school http://inforary.mystrikingly.com/blog/teaching-an-online-cbse-school-courses