Results for 'Pavithra Shailesh'

Order:
  1. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Recurrent Neural Network Based Speech emotion detection using Deep Learning.P. Pavithra - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):65-77.
    In modern days, person-computer communication systems have gradually penetrated our lives. One of the crucial technologies in person-computer communication systems, Speech Emotion Recognition (SER) technology, permits machines to correctly recognize emotions and greater understand users' intent and human-computer interlinkage. The main objective of the SER is to improve the human-machine interface. It is also used to observe a person's psychological condition by lie detectors. Automatic Speech Emotion Recognition(SER) is vital in the person-computer interface, but SER has challenges for accurate recognition. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Automatic Attendance Monitoring System.P. Padma Rekha, V. Narendhiran, D. Amudhan, S. Ramya & N. Pavithra - 2016 - International Journal for Science and Advance Research in Technology 2 (2):23-25.
    The attendance is taken in every organization. Traditional approach for attendance is, professor calls student name & record attendance. For each lecture this is wastage of time. To avoid these losses, we are about to use automatic process which is based on image processing. In this project approach, we are using face detection & face recognition system. The first phase is pre-processing where the face detection is processed through the step image processing. It includes the face detection and face recognition (...)
    Download  
     
    Export citation  
     
    Bookmark