ACCENTS
期刊
会议
图书
作者:... Kailash Patidar , Rishi Kushwah , Sudeesh Chouhan
来源:[J].International Journal of Advanced Technology and Engineering Exploration (IJATEE), 2017, Vol.4 (30)ACCENTS
摘要:In the current age there is need of data security in every field. This paper deals with text data security. In this area there are several research works have already been done and some in progress. But, there is still the need of data security is required in this field. The aims...
作者:... Kailash Patidar , Rishi Kushwah , Sudeesh Chouhan
来源:[J].International Journal of Advanced Technology and Engineering Exploration (IJATEE), 2017, Vol.4 (31)ACCENTS
摘要:Data security is very important aspects in different areas of communication. This paper deals with text data encryption as maximum of the data communication is basically depends on text data. In this framework first the text data is loaded in the framework. Then it is partitioned...
作者:... Kailash Patidar , Sudeesh Chouhan , Rishi Kushwah
来源:[J].International Journal of Advanced Technology and Engineering Exploration (IJATEE), 2018, Vol.5 (40)ACCENTS
摘要:The software quality estimation is important to predict the credibility of any programs. This paper explores the quality estimation techniques, factors for the considering attributes and fault estimation methods. Previous literatures are considered and there methods have been dis...
作者:... Kailash Patidar , Sudeesh Chouhan , Rishi Kushwah
来源:[J].International Journal of Advanced Technology and Engineering Exploration (IJATEE), 2018, Vol.5 (41)ACCENTS
摘要:In this paper software metric estimation has been established through object oriented parameters measures and quality estimation techniques. First the dataset has been prepared based on the object oriented programming. The four object oriented parameters have been considered for ...
作者:... ni Sikarwar , Kailash Patidar , Rishi Kushwah
来源:[J].International Journal of Advanced Technology and Engineering Exploration (IJATEE), 2018, Vol.5 (4)ACCENTS
摘要:In this paper a survey and analysis based on topic based data classification has been presented. It includes the topic based data orientation, data categorization, document clustering, etc. This study provides the analytical way to analyze the methods previously published and pro...
作者:Abhishek Dipak Shroff , Kailash Patidar , Rishi Kushwah
来源:[J].International Journal of Advanced Technology and Engineering Exploration (IJATEE), 2018, Vol.5 (44)ACCENTS
摘要:There are different methods have been presented for the noise reduction. It is essential in proper formation and retrieval of images. This paper explores the methods previously proposed. There are several research work is in progress in the process of denoising. Still there are l...
作者:... Manoj Kumar Yadav , Narendra Sharma , Rishi Kushwah
来源:[J].ACCENTS Transactions on Information Security (TIS), 2018, Vol.3 (9)ACCENTS
摘要:In this paper AES and blowfish algorithm for video encryption based on random process of password generation have been applied for efficient encryption and decryption process. The data is processed in the form of video file but the file is not processed directly for the encryptio...
作者:... Manoj Kumar Yadav , Narendra Sharma , Rishi Kushwah
来源:[J].ACCENTS Transactions on Information Security (TIS), 2018, Vol.3 (9)ACCENTS
摘要:Information security is essential in all field of information correspondence as it is vital so that any unapproved access of information can be anticipated. There are few approaches to secure the information in which cryptography and steganography is the fundamental. Information ...
作者:... ni Sikarwar , Kailash Patidar , Rishi Kushwah
来源:[J].International Journal of Advanced Technology and Engineering Exploration (IJATEE), 2018, Vol.5 (45)ACCENTS
摘要:In this paper a hybrid algorithm for text data categorization has been proposed. There are four different classifiers of filtrations have been used. First classifier is numeric classifier (NC). NC is used for the numeric value classification and removal. Second classifier is sepa...
作者:... Kailash Patidar , Rishi Kushwah , Gaurav Kumar Saxena
来源:[J].ACCENTS Transactions on Information Security (TIS), 2018, Vol.3 (9)ACCENTS
摘要:The need of data security is increasing day by day as the requirement of communication industry and other aspects of communication. This paper aim is to highlights and elaborates the methods used in image security. It also explores the way of applying the algorithms and the probl...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×