Algorithm

Sort By:
Page 50 of 50 - About 500 essays
  • Decent Essays

    ABSTRACT Internet of things (IoT) is rapidly increasing technology with day by day. IoT is the network of physical objects or things which is embedded with electronics components, software or languages like python, Microcontroller, PLC etc. sensors like temperature, humidity, smoke sensor and gas lekage or stepper motor, and network connectivity, which enables these objects to collect and exchange the data. In this a system which will automatically monitor the industrial applications and generatethe

    • 1598 Words
    • 7 Pages
    Decent Essays
  • Better Essays

    Chapter 1 of James MacCormick’s book, Nine Algorithms That Changed The Future, provides an overview of what an algorithm is and introduces the reader of the algorithms that will be discussed throughout the book. An algorithm is a precise recipe that specifies the exact sequence of steps required to solve a problem (MacCormick, 3). Algorithm requires a sequence of steps that contain the instructions on what to do. One of the key elements of an algorithm is to have a set of rules in order to perform

    • 1227 Words
    • 5 Pages
    Better Essays
  • Best Essays

    EXPLORING GENERATIVE ALGORITHMS IN AN ADAPTABLE DESIGN OF A PUBLIC SQUARE ABSTRACT 1. What did you do? 2. Why did you do it? What question were you trying to answer? 3. How did you do it? State methods. 4. What did you learn? State major results. 5. Why does it matter? Point out at least one significant implication. CONTENTS Abstract 1 Introduction 1 Aims 1 Objectives 1 Research 1 Changing weather 1 Generative algorithms 1 Adaptable architecture 2 Public Squares, destination vs. pathway 2

    • 2848 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Data Security in Cloud Computing using RSA Algorithm Abstract: In cloud computing, data security is the major issue. Security in single cloud is less popular than in multicloud due to its ability to reduce security risks. In this paper, we describe a new architecture for security of data storage in multicloud. We use two mechanisms-data encryption and file splitting. When user upload a file ,it is encrypted using AES encryption algorithm. Then that encrypted file is divided into equal parts according

    • 1321 Words
    • 6 Pages
    Good Essays
  • Good Essays

    A LITERATURE STUDY OF ROBUST COLOR IMAGE WATERMARKING ALGORITHM PANKAJ SONI 1, VANDANA TRIPATI2, RITESH PANDEY3 1. Dept of ECE, ME student, G.N.C.S.G.I., JABALPUR, M.P., INDIA, 2-Dept of ECE, Asst. Prof., G.N.C.S.G.I., JABALPUR, M.P., INDIA, 2-Dept of ECE, Asst. Prof., G.N.C.S.G.I., JABALPUR, M.P., INDIA, ABSTRACT: Digital Watermarking is a technology which is used to identify the owner, distributor of a given image. In recent years, digital watermarking plays a vital role in providing the appropriate

    • 2052 Words
    • 9 Pages
    Good Essays
  • Decent Essays

    Efficient Subgraph Mining Algorithm on Big Data Sumit Rajendra Surwase (Author) dept. of Computer Engineering Sardar Patel Institute of Technology, Andheri(west) line 3-Mumbai, India sumitsurwase77@gmail.com Prof. Jyoti Ramteke (Author) dept. of Computer Engineering Sardar Patel Institute of Technology, Andheri(west) Mumbai, India jyoti_ramteke@spit.ac.in Abstract— Frequent subgraph mining (FSM) is a crucial task for explorative information analysis on graph information. Over the years

    • 2112 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    Privacy and the IoT: Navigating Policy Issues - Opening Remarks of FTC Chairwoman Edith Ramirez[10], “Today, I would like to focus on three key challenges that, in my view, the IoT poses to consumer privacy: (1) ubiquitous data collection; (2) the potential for unexpected uses of consumer data that could have adverse consequences; and (3) heightened security risks. These risks to privacy and security undermine consumer trust. And that trust is as important to the widespread consumer adoption of

    • 985 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    C RYPTOGRAPHY T ECHNIQUES The cloud service providers should address the still open cloud security problems in order to encourage users to use this technology. The most important concerns are confidentiality, integrity and availability. In a complex and non-transparent system like cloud computing, it is difficult for a user to even determine what kind of security measures are implemented in the cloud. This section presents Cryptography, as one of the security measure that can be implemented. Cryptography

    • 859 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    the data centers. The energy consumption cost of this environment has been steadily increasing which is a major concern. Different allocation policies are used to match virtual machines to physical hosts in a cloud environment. Using minimization algorithm and CPU voltage scaling we can deploy high performance computing services and minimizing carbon emissions, energy consumption. This paper explains about seven allocation policies and their affects on energy consumption and CPU load on overall energy

    • 886 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Framework to enhance security of data in private cloud using multiple algorithms in AWS CHAPTER 1: INTRODUCTION 1.1 Introduction of Cloud Computing “In recent 10 years, Internet has been developing very quickly. The cost of storage, the power consumed by computer and hardware is increasing. The storage space in data center can’t meet our needs and the system and service of original internet can’t solve above questions, so we need new solutions. At the same time, large enterprises have to

    • 1817 Words
    • 8 Pages
    Decent Essays