Implementation of Combinatorial Algorithms using Optimization Techniques IJTSRD
In theoretical computer science, combinatorial optimization problems are about finding an optimal item from a finite set of objects. Combinatorial optimization is the process of searching for maxima or minima of an unbiased function whose domain is a discrete and large configuration space. It often involves determining the way to efficiently allocate resources used to […]
A Survey on Feature Extraction Technique in Image Processing IJTSRD
Image processing is a method to convert an image into digital form and perform some operations on it. It is a type of signal dispensation in which input is image, video frame or photograph and output may be image or characteristics associated with that image. Image processing basically include the nthree steps as importing the […]
An Augmented Implementation of Ad hoc On-Demand Distance Vector (AODV) Routing for Internet of Things (IoT) IJTSRD
IoT has grown from the convergence of wireless technologies, micro-electro mechanical systems, micro-services and the Internet. The convergence has improved tear down the silo walls between operational technology and information technology, consenting amorphous machine-generated data to be evaluated for insights that will enterprise developments. Designing of routing protocols for the Internet of things is an […]
A Model for Encryption of a Text Phrase using Genetic Algorithm IJTSRD
In any organization it is an essential task to protect the data from unauthorized users. Information Systems hardware, software, networks, and data resources need to be protected and secured to ensure quality, performance, and integrity. Security management deals with the accuracy, integrity, and safety of information resources. When effective security measures are in place, they […]
Document Management System IJTSRD
Document management has been an important component of organizations and institutes where mass work-forces are there. Storage, maintenance, updating and retrieval of documents becomes difficult as the amount of data gets larger with time. The data when stored in a digital format lacks authenticity and thereby compromising security at a large scale. Thus, as a […]