Understanding human motions can be posed as a pattern recognition problem. In order to convey visual messages to a receiver, a human expresses motion patterns. Loosely called gestures, these patterns are variable but distinct and have an associated meaning. The Pattern recognition by any computer or machine can be implemented via various methods such as Hidden Harkov Models, Linear Progr...
Paper Information
Authors Mahesh Sharma, Er.Rama Chawla
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 22

Rainbow tables reduce the difficulty in brute force cracking a single password by creating a large pre-generated data set of hashes from nearly every possible password Rainbow Tables. This method, known as the Faster Time-Memory Trade-Off Technique, is based on research by Martin Hellman & Ronald Rivest done in the early 1980’s on the performance trade-offs between proce...
Paper Information
Authors Meetika Malhotra, Bhushan Dua
Read Journal Click Here
Read Paper Click Here
Page No. 45 to 48

Serialization is a process of converting an object into a stream of data so that it can be easily transmittable over the network or can be continued in a persistent storage location. This storage location can be a physical file, database or Network Stream. This paper concludes some the work that is going on in the field of Object Serialization. This paper presents Object Serialization Te...
Paper Information
Authors Surbhi, Rama Chawla
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 49

A model clone is a set of similar or identical fragments in a model of the system. Understanding and Identifying model clones are important aspects in software evolution. During the Evolution of the Software product Cloning is often a strategic means for the same. Clone detection techniques play an important role in software evolution research where attributes of the same code entity are...
Paper Information
Authors Yachna Arora, Er. Sarita Choudhary
Read Journal Click Here
Read Paper Click Here
Page No. 50 to 53

The capacity of controlling various electrical and electronics devices in a wireless and remote fashion has provided a great convenience to many people in life. Through a wireless distant control system, people can do remote operation without directly accessing the host of home appliances like fan, lamp, TV, washing machines and others. Pocket switch is one of these types of system which...
Paper Information
Authors Md. Hafizur Rahman, Jinia Afrin
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 44

Face detection is very important nowadays because of increasing demand of security in society. It has become inseparable part of machine vision, biometric researches, pattern recognition and video surveillance. In this paper, we propose to detect face from image with varying lighting condition and complex background. This method relies on a two step process. First, we detect human skin r...
Paper Information
Authors Md. Hafizur Rahman, Jinia Afrin
Read Journal Click Here
Read Paper Click Here
Page No. 45 to 50

Grid computing, one of the most trendy phrase used in IT, is emerging vastly distributed computational paradigm. A computational grid provides a collaborative environment of the hefty number of resources capable to do high computing performance to reach the common goal. Grid computing can be called as super virtual computer, it ensemble large scale geographically distributed heterogeneou...
Paper Information
Authors K.Sathish, Dr.A. Rama Mohan Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 31

Security in Hybrid Cloud
Published In: GJCST Part: B: Cloud & Distributed Volume: 13 Issue: 2
As the cloud computing is spreading around the world, need of inter cloud communication is becoming a growing in the organizations. It is causing the researchers to focus on first, making it possible to communicate between two or more clouds and second security of communication is to considered up to utmost level. With emergence of cloud computing, the term "Hybrid Topology" or "Hybrid D...
Paper Information
Authors Anukrati Dubey, Gunjita Shrivastava, Sandeep Sahu
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

This paper explores the potential of WSN in the area of agriculture in India. Aiming at the sugarcane crop, a multi-parameter monitoring system is designed based on low-power ZigBee wireless communication technology for system automation and monitoring. Real time data is collected by wireless sensor nodes and transmitted to base station using zigbee. Data is received, saved and displayed...
Paper Information
Authors Anjum Awasthi, S.R.N Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 28

To analysis the speed of sending message in Healthcare standard 7 with the use of back propagation in neural network. Various algorithms are define in back propagation in neural network we can use back propagation algorithm for sending message purpose. Genetic Algorithm are used to extract information and send these information with this algorithm appears to be fastest method for trainin...
Paper Information
Authors Kanika Sharma, Hardeep Singh Kang
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 20