T. Senthil Kumaran
ACS College of Engineering

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Achievement of a Radio Monitor Station Management Data Framework Sarfaraz Ahmed; T. Senthil Kumaran
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp53-55

Abstract

A radio monitor station (RMS) gathers the radio flag data of a substantial scope of recurrence for the administration. The framework is completely fledged with essential and propelled functionalities and now in charge of a common of radio transmission capacity use. To address the difficulties of huge dynamic information, we have built up an area particular management data framework (MDF) for the radio monitor stations. The framework outline and usage are depicted in the paper. A calculation is furnished to work with the radio transmission models for count of the radio flag scopeday by day RMS management in practice.
Cloud Deployment Methods In Guarantee of Protection and Confidentiality Constraints Sarfaraz Ahmed; T. Senthil Kumaran
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp101-103

Abstract

Despite of the few advantages of moving venture basic resources for the Cloud, there are difficulties particularly identified with protection and confidentiality. It is essential that Cloud Users comprehend their protection and confidentiality needs, in view of their particular setting and select cloud demonstrate best fit to bolster these requirements. The writing gives works that emphasis on examining protection and confidentiality issues for cloud frameworks however such works don't give a methodological way to deal with evoke security and security necessities neither one of the methods to choose cloud arrangement models in light of fulfillment of these prerequisites by Cloud Service Providers. This work progresses the present cutting edge towards this bearing. Specifically, we consider necessities designing ideas to inspire and investigate protection and confidentiality prerequisites and their related instruments utilizing a calculated structure and an efficient procedure. The work presents confirmation as proof for fulfilling the protection and confidentiality necessities regarding culmination and reportable of security occurrence through review. This enables point of view cloud clients to characterize their affirmation prerequisites so that proper cloud models can be chosen for a given setting.
Interaction With ATM for Blind Sarfaraz Ahmed; T. Senthil Kumaran
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp549-551

Abstract

A talking ATM may be a kind of Asynchronous Transfer Mode (ATM) that gives perceptible directions so that persons United Nations agency will not scan associate degree ATM screen can severally use the machine. All perceptible data is delivered in private through an earpiece jack on the face of the device or an on an individual basis hooked up a telephone. Information provided to the client either through pre-recorded sound files or via text-to-speech synthesis A user plugs a conventional telephone receiver into the jack, hear directions and also the user can respond to voice. In spite of everything, the small print is given press OK button for confirmation. There's associate degree perceptible orientation for initial time users, and perceptible data describing the placement of options like the OK button, deposit slot, and card slot. During this application is principally developed for the blind individuals. The blind people cannot see the keyboard and also the screen for the system. They enter the input details through voice. The voice to text converter can convert into text and method additional way. The system offers the instruction regarding the system usage through voice.