Analysis on Images & Image Processing
Published In: GJCST Part: F: Graphics & Vision Volume: 12 Issue: 15
This paper deals with the analysis on images and image processing. It explains the types of images, operations performed on it, types of image formats and image processing principles, techniques, algorithms, compression methods and examples. ...
Paper Information
Authors Dr. B.Priyanka, D.Pramodh Krishna
Read Journal Click Here
Read Paper Click Here
Page No. 43 to 46

Wireless sensor networks (WSNs) are innovative large-scale wireless networks that consist of distributed, lowpower, small-size devices using sensors to cooperatively collect information through infrastructure less ad-hoc wireless network. These small devices used in wireless sensor nodes are called sensor nodes. They are envisioned to play an important role in a wide variety of areas ran...
Paper Information
Authors Dr. Mukesh Kansari, Mrs.Shikha Pandey
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 29

One of the most recent techniques employed to estimate an optimal threshold of a gray level image for segmentation is ultrafuzzy measures. In this paper, we introduce relative fuzzy membership degree (RFMD) taking spatial correlation among the pixels in the image into account. We also propose a novel thresholding technique by combining two-dimensional histogram, which was determined by u...
Paper Information
Authors Dr. CH.V.Narayana, E. Sreenivasa Reddy, M. Seetharama Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 42

Texton is a extensively applied approach for texture analysis. This technique shows a strong dependence on certain number of parameters. Unfortunately, each variation of values of any parameter may affect the texture characterization performance. Moreover, micro structure texton is unable to extract texture features which also have a negative effect on the classification task. This paper...
Paper Information
Authors Dr. P.Chandra Sekhar Reddy, B.Eswara Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 32

The proliferation of XML based web services in the IT industry not only gives rise to opportunities but challenges too. Namely the challenges of security and a standard way of maintaining it across domains and organisational boundaries. OASIS, W3C and other organisations have done some great work in bringing about this synergy. What I look in this paper are some of the more popular stand...
Paper Information
Authors Dr. Sudeep Mukherjee, Dr. Rizwan Beg
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 23

In this research we will focus the details of the IT System and business process requirements of IT Package need to be installed at Disaster Recovery Center. This research provide details of the project requirements, which are to be met by the applications and interfaces required within Disaster Recover Center between different hardware and software systems. The objective of this researc...
Paper Information
Authors Rajesh Kumar Rolen
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 21

Your Texture analysis is one of the most important techniques used in the analysis and interpretation of images, consisting of repetition or quasi repetition of some fundamental image elements. The present paper derived Fuzzy Triangular Greylevel Pattern (FTGP) to overcome the disadvantages of LBP and other local approaches. The FTGP is a 2 x 2 matrix that is derived from a 3 x 3 neighbo...
Paper Information
Authors U Ravi Babu, Dr. V Vijaya Kumar, J Sasi Kiran
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

Security in Database Systems
Published In: GJCST Part: E: Network, Web & Security Volume: 12 Issue: 17
The paper focuses on security issues that are associated with the database system that are often used by many firms in their operations. The rapid development and proliferation of Information technology has offered many opportunities for integrated business operations. It has enabled business enhances their efficiency and effectiveness in operations such as customer care, sales, human re...
Paper Information
Authors Dr. Abdulrahman Hamed Almutairi, Abdulrahman Helal Alruwaili
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 13

802.11 standards based WLAN is one very successful technology in commerce. Huge number of WLAN has been deployed across the world. It’s very worthwhile to investigate link characteristics of WLAN and its effects to upper layers, especially TCP protocol which is used by numerous network applications. The 802.11 standard is firstly introduced in this section. ...
Paper Information
Authors Dr. Gagandeep Singh Barar, Dr. G.N. Singh
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 8

Cloud computing is an emerging technology and it is purely based on internet and its environment. It provides different services to users such as Software-as-a-Service (SaaS), PaaS, IaaS, Storage-as-a-service (SaaS). Using Storage-as-a-Service, users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud. In order to achiev...
Paper Information
Authors Ms. B.Tejaswi, Dr.L.V.Reddy, Ms. M.Leelavathi
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23