Information and Technology
27,816 Followers
Recent papers in Information and Technology
This is an era of technology; we are surrounded with the technology. Now a day’s people become smarter they want to operate each and everything’s with his smart phone/laptop/pc without going anywhere, it happens due to IOT devices.... more
informação e tecnologia, design da informação, e-saúde O objetivo deste trabalho é investigar aspectos cognitivos de Design da Informação que devem ser considerados no projeto e concepção de ambientes digitais e-Saúde, levando em... more
Day by day the number of vehicles is increasing very fast as the demand is increasing. So, the details of the vehicles are very important to maintain for the government of a country. Information like ownership, insurance, emission, road... more
Anonymization techniques are enforced to provide privacy protection for the data published on cloud. These techniques include various algorithms to generalize or suppress the data. Top Down Specification in k anonymity is the best... more
Review of Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence, Kate Crawford (Yale University Press: 2021).
Time series is a scientific process of determining an ordered sequence of values of a variable within equally spaced time intervals. Mostly this is applied when looking at technical data and its influences on the neighboring surroundings.... more
The Public Distribution System in India is the largest retail system in the world. Major problem in this system are the inefficiency in the targeting of beneficiaries, improve weighing machines used an illegal selling of goods. Automated... more
Augmented Reality is the presentation of objects superimposed on the real world view of the environment. It is an innovative technology that allows multidimensional viewing and understanding of concepts. This paper aims to use this... more
To provide the security mainly authentication and authorisation is given to the system. For that purpose mostly textual passwords are being used. Now day’s graphical passwords are also available. The password schemes those are being used... more
Illumination invariance remains the most researched, yet the most challenging aspect of automatic face recognition. In this paper we investigate the discriminative power of colour-based invariants in the presence of large illumination... more
The world is changing rapidly, so is academics. E-learning has altered the area of academics and education. ICT enabled learning has given ideal services to students by providing any type of content on demand which is proportional to the... more
The machine learning algorithms are capable of managing multi-dimensional data under the dynamic environment. Despite its so many vital features, there are some challenges to overcome. The machine learning algorithms still requires some... more
Nowadays, delivery is mainly done by humans which includes a lot of manual work. The existing way is good but lacks faster deliveries. In the present context the deliveries are not possible 24*7 by humans, especially in the case of... more
Cloud computing associate the computing and storage resources controlled by different operating systems to make available services such as large-scaled data storage and high performance computing to users. The benefits of low-cost,... more
Every individual human might have completely different faces; however, their expressions tell us the same story and it notably plays a significant role in extraction of an individual’s emotions and behavior. Music is the purest form of... more
In this Research paper, we have discussed a proposed system that can be a visionary eye for a blind person. A common goal in computer vision research is to build machines that can replicate the human vision system. For example, to... more
With the explosive growth in the number of communication users and the huge demand for data from users, Limited low-frequency resources have been far from being satisfied by users. The combination of Massive MIMO technology and... more
Digitalization of money transfer is a must in the present situation of banking operations. Clients have a variety of ways to carry out transactions, such as credit, wiring money, and so forth. However, depositing cash requires the... more
Heart attack is most common disease that engulfs the patient’s precious life. This disease attacks a man so in a flash that it barely gets treated. Many systems that detect heart attack came into the picture but they do have many flaws.... more
GPS is in actuality the main answer for outdoor positioning, no unmistakable arrangement has so far risen for indoor positioning notwithstanding the business hugeness. Along these lines, the principal point is to grow ongoing indoor... more
The film industry is not only the center of Entertainment but also a huge source of employment and business. Well, famous actors and directors can ensure the publicity of a movie but can’t promise a good IMDB score. We have collected the... more
Virtual Personal Assistant (VPA) is one of the most successful results of Artificial Intelligence, which has given a new way for the human to have its work done from a machine. This paper gives a brief survey on the methodologies and... more
The age of computer advancement has caused a revolutionary change in the corporate sector. From on-campus working hours to remote work from home scenarios, from meetings in a conference room to meeting online in a virtual environment,... more
Internet of Things (IoT) plays a important role in connecting the over all environmental things to the network and it is easy to access those un-internet things from any remote location. It’s unavoidable for the people to update with the... more
5G aren't just about significantly improving network connectivity. It's a next-generation mobile network that promises to be a game changer in the way we live. The true breakthrough of 5G is the capacity of up to 1,000 5G connected... more
Autonomous mobile robots have been used to carry out different tasks without continuous human guidance. To achieve the tasks, they must be able to navigate and avoid different kinds of obstacles that faced them. Navigation means that the... more
A vast fraction of the population of India considers agriculture as its primary occupation. The production of crops plays an important role in our country. Bad quality crop production is often due to either excessive use of fertilizer or... more
The Open Management Group Data Distribution Service ( OMG DDS ) is a standard for publish-subscribe data distribution systems which is emerging as a specification for data exchange. It is a type of Message Oriented Middleware ( MOM ) that... more
The usage of mobile phones in today's world is more than ever. Mobile phones are everywhere and the mobile technology is growing at an exponential rate. The capabilities of a mobile phone have made it provide us services that make human... more
In the modern world, people receive various bills through post, sms, emails etc. They use cards, e-wallets and net banking to pay them in online. This manual process can be automated if the user wishes to pay selective or each bill he/she... more
Evolution in the field of web technology has made an enormous amount of data available in the web for the internet users. These internet users give their useful feedback, comments, suggestion or opinion for the available product or... more
With technological advancements many small to large, simple to complex activities are automated. Growth of Artificial Intelligent techniques has eased the way we would look to solve the real-world problems. One such area which has... more
https://www.ijert.org/traffic-signal-management-using-machine-learning-algorithm https://www.ijert.org/research/traffic-signal-management-using-machine-learning-algorithm-IJERTV9IS060198.pdf Traffic clog is one of the significant issues... more
In this paper, we propose a detailed approach to create a Bone age assessment model. Bone age assessment is a common medical practice in the assessment of child development, who are less than 18 years of age. In this proposed model, the... more
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed, public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block is linked... more
The present work dealt with the thermal assessments of the ground-coupled heat pump heat exchangers utilized in the field of geothermal energy source. A model was performed to predict the overall thermal resistance of a single vertical... more
Stock Market plays a vital role in the economy of every nation. Having a transparent market may boost the confidence of not only stock brokers but also that of investors. One of the major problems that make investors to shy away from the... more
The machine learning algorithms are capable of managing multi-dimensional data under the dynamic environment. Despite its so many vital features, there are some challenges to overcome. The machine learning algorithms still requires some... more
From the day internet came into existence, the era of social networking sprouted. In the beginning, no one may have thought internet would be a host of numerous amazing services like the social networking. Today we can say that online... more
Wireless Sensor Network (WSN) has delivered the accessibility of small, tiny and low cost sensor nodes which are capable to sense various kinds of physical and environmental conditions, data processing, wireless communication and data... more
Online networks have many threats regarding security. The threats are targeting agency networks, private networks or other networks via gaining access to or changing essential information. Less secure networks deliver authorization to the... more
The increasing popularity of micro-blogging sites like Twitter, which facilitates users to exchange short messages (tweets) is an impetus for data analytics tasks for business development. Twitter has a huge amount of data. Twitter’s API... more
Over the recent years, several smart applications like RFID?s, sensor networks, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications in which highly constrained... more
In current scenario, to store data securely on online is a tedious task as a result proper security over the network. Cryptography is a technique that masks the data over the channel of communication. Hiding the data to outsiders is an... more