Big data security and privacy issues in SMEs

1Reena Singh 1Department of CSE, Suresh Gyan Vihar University Jaipur Raj. India Abstract: In all economies, especially in developing and transition economies, there is now a consensus among state policy makers, development economists as well as international development partners that small and medium enterprises (SMEs) are a potent driving force for their industrial growth and

Improved Security of Neural Cryptography Using Don’t-Trust-My-Partner and Error Prediction

Robert Kozma University of memphis Abstract:-Neural cryptography deals with the problem of key exchange using the mutual learning concept between two neural networks. The two networks will exchange their outputs (in bits) so that the key between the two communicating parties is eventually represented in the final learned weights and the two networks are said

Magnitude reduction of stator current in BLDC Motor Using Hall-Stator Current Control Strategy

pp.23-27 Hitesh Choyal¹, R.K Gupta² 1 M.Tech Scholar, Suresh Gyan Vihar School of Engineering and Technology Jaipur, Rajasthan, India,hchoyal1991@gmail.com 2Electrical Engineering Department, Suresh Gyan Vihar School of Engineering and Technology Jaipur, Rajasthan, India, rkg90000@gmail.com ABSTRACT– In the current past, variable speed drives have grown in many applications as automobile industries, domestic appliances etc. The electronics

ADOPTION OF IMPROVED TECHNIQUES FOR WATER MANAGEMENT IN BUILDINGS

pp 6‐10 GAUTAM ASWANI1*, PBL CHAURASIA2, PN MATHUR3 1Research Scholar, Department of Civil Engineering, Suresh Gyan Vihar University, Jaipur. 2Professor, Centre of Excellence, Solar Energy Research and Utilisation, Suresh Gyan Vihar University, Jaipur. 3Associate Professor, Department of Civil, Suresh Gyan Vihar University, Jaipur. *Corresponding Author, Email: aswani.gautam@yahoo.com Abstract : Less than 1% of fresh water

Microstrip Patch Antenna with Circular Slot for Wireless Applications

pp.20-23 Nilesh Bhagat1, Paresh Jain2 1M. Tech Scholar, ECE Department, Suresh Gyan Vihar University, Jaipur, Rajasthan. nileshbhagat42@gmail.com1 2Asst. Professor, Ph. D (P), ECE Department, Suresh Gyan Vihar University, Jaipur, Rajasthan. jp.jpri@gmail.com2 Abstract: In this paper we have designed a CPW feed microstrip antenna at resonant frequency of 2.4Ghz. This type of microstrip antennas are of

Rotation attack analysis of Non Blind Multiplicative Watermarking using 2D-DWT

1Rohit Chhabra, 2R R Sinha 1Rohitengineer14@gmail.com, 2drsinhacs@gmail.com, Associate Professor, Department of Computer Engineering, Suresh Gyan vihar university, Jaipur,Rajasthan India Abstract: This paper deals with the digital ownership management with the help of Digital watermarking. For inserting any ownership information in any form inside the image or any media like audio video etc, we need a

Implementation of Neural Network Model For Cancer Detection Based On Back Propagation With The Help of Python Based Hardware Description Language

1Pankaj kumar Sharma, 2Mr. Ravishanker Sharma 1Mtech. Research scholar(VLSI),Suresh Gyan vihar university,jaipur(Raj)India 2Associate Professor(CS dept). Suresh Gyan vihar university,jaipur(Raj)India Abstract—conventionally the design method of Artificial Neural Networks using VHDL and implement in FPGA is done. VHDL is a programming language that has been designed and optimized for describing the behavior of digital systems. Back propagation

Leading Security Threats and Issues in Cloud Computing

pp.10-15 Sapan Gupta1, Premalata Sati2 1 Asst Prof, Suresh Gyan Vihar University, Jaipur, India er.sapangupta@gmail.com 08premasati@gmail.com Abstract— In order to move with the advancement and provide world class services to the clients it has become mandatory to adopt latest technologies and bringing a positive revolution in the business corporate. Today business demands are deployed over

A Decision Support System For Handwritten Numerals Using Majority Voting

pp.5-9 Deepak Gupta1, Ravindra Kumar2 1. M.Tech Scholars, Shridhar University, Pilani 2. Asst. Professor, Shridhar University, Pilani Abstract Feature extraction is an important step of pattern recognition. This study uses profile based feature extraction and uses Simple Profile (with cropping and without cropping image samples), Contour based feature extraction for recognizing handwritten numerals. The features