Handwritten Signature Verification System using Sobel Operator and KNN Classifier ijtsrd
Signature is one of the most widely accepted personal attributes for identity verification. Signature verification is a scheme to verify cheque for bank security. So, this system is proposed as the off line handwritten signature verification system for the bank cheque image processing. In any offline signature verification system, feature extraction stage is the most […]
Designing Security Assessment of Client Server System using Attack Tree Modeling ijtsrd
Information security has grown as a prominent issue in our digital life. The network security is becoming more significant as the volume of data being exchanged over net increases day by day. Attack trees AT technique play an important role to investigate the threat analysis problem to known cyber attacks for risk assessment. The technique […]
Risk Assessment Model and its Integration into an Established Test Process ijtsrd
In industry, testing has to be performed under severe pressure due to limited resources. Risk based testing which uses risks to guide the test process is applied to allocate resources and to reduce product risks. Risk assessment, i.e., risk identi cation, analysis and evaluation, determines the signi cance of the risk values assigned to tests […]
Fuzzy Based Algorithm for Cloud Resource Management and Task Scheduling ijtsrd
This paper presents a Fuzzy Logic based approach to manage VM status and VM configuration within the cloud environment. The aim of the approach is to serve task requests efficiently with minimal use of resource and power. The proposed technique uses Fuzzy based approach to calculate the VM’s status and VMs configurations, depending upon the […]
Performance Analysis between H.323 and SIP over VoIP ijtsrd
There are a number of protocols that may be employed in order to provide the Voice over IP VoIP communication services. In VoIP system, H.323 and Session Initiation Protocol SIP are the two major standards. Both of these signaling protocols provide mechanisms for multimedia teleconferencing services. Although the two protocols architecture is quite similar, they […]