Volume-8 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
Keywords: RFID, Smart Tags, RFID Reader, Transponder, Antenna, Middleware, Traceability.
[1] A Soppera & T Burbridge, "Wireless Identification — Privacy and Security", BT Technology Journal, Vol.23, No.4, pp.54 -64,
(2005).
[2] Bitkom, "RFID: Technology, Systems and Applications", RFID Journal, Whitepaper, http://www.rfidjournal.com, (2005).
[3] Cardullo MW & William LP, "Transponder Apparatus and System", US 3713148, (Published May 21, 1970, Issued Jan 23, 1973).
[4] ISECOM, "Hacking Exposed Linux: Linux Security Secrets & Solutions", (3/ed.), p.298, McGraw-Hill Osborne Media, (2008).
[5] Juels A., Molnar D., Wagner D., "Security and Privacy Issues in E-passports", SecureComm 2005, 1st Intl. Conf. on Security &
Privacy for Emerging Areas in Communications Networks, pp.74-88, (2005).
[6] Lahiri S., "RFID System", RFID Sourcebook, p.9, (2006).
[7] O'Connor, Mary Catherine, RFID Journal LLC, http://www.rfidjournal.com, (Published: March 18, 2009).
[8] Radiant Waves: Total RFID Solutions, Web: http://www.radiantwave.com/rfid_how.htm, (Accessed on: 30-09-2012).
[9] Sen D, Sen P & Das AM, "RFID for Energy and Utility Industries", PennWell, pp.1-48, (2009).
[10] Southall M, Javick P, Lichtenberg J, & Cusack BA, "Radio Frequency Identification: Transforming the Dynamics of Supply and
Demand in Publishing", Publishing Research Quarterly, Vol.26, No.1, pp.1-10, (2010).
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Artificial Neural Network, Back-propagation Neural Network, Bangla Sign Language, Gestures Recognition, Sign language Recognition.
[1] Stephan Liwicki, Mark Everingham, "Automatic Recognition of Finger spelled Words in British Sign Language," in Proc. IEEE
Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 50-57, Miami, FL, USA, June, 2009.
[2] T. Takahashi, F. Kishino, "Gesture coding based in experiments with a hand gesture interface device," ACM SIGCHI Bulletin, Vo l.
23, pp. 67-73, 1991.
[3] K. Murakami, H. Taguchi, "Gesture recognition using recurrent neural networks," in Proceedings of the Conference on Human
Factors and Computing Systems, pp. 237-242,1991.
[4] J. Kramer, L. J. Leifer, "A "talking glove‟ for nonverbal deaf individuals," Technical Report No. CDR 19900312, Center for De sign
Research, Stanford University, U.S.A., 1990.
[5] J. Kramer, "The TalkingGlove (RTM): hand-gesture-to-speech using an instrumented glove and a tree-structured neural classifying
vector quantizer," Ph.D. Thesis, Department of Mechanical Engineering, Stanford University, U.S.A., 1996.
[6] S. Begum, M. Hasanuzzaman, "Computer Vision-based Bangladeshi Sign Language Recognition System" The 12th International
Conference of Computers and Information Technology (ICCIT) '09, Bangladesh.
[7] H. Zabiri, N. Mazuki, "A Black-Box Approach in Modeling Valve Stiction," International Journal of Mathematical, Physical and
Engineering Sciences 4:1 2010, 2010.
[8] Principe, J., "Neural Networks and Adaptive Systems", John Wiley and Sons, NY, 1999.
[9] A. Sozen, E. Arcaklioglu, "Solar potential in Turkey," Applied Ener gy, 80(1), pp. 35–45, 2004.
[10] V. O. Oladokun, A. T.Adebanjo, O. E. Charles-Owaba, "Predicting Students‟ Academic Performance using Artificial Neural
Network: A Case Study of an Engineering Course," The Pacific Journal of Science and Technology, vol. 9, no. 1, 2008.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Cloud Computing: Overview & CurrentResearch Challenges |
| Country | : | India |
| Authors | : | Mohsin Nazir |
| : | 10.9790/0661/0811422 ![]() |
|
Keywords: Cloud Architecture, Cloud Computing, Software as a Service (SaaS), Platform as a Service (PaaS),Infrastructure as a Service (IaaS), Mobile Cloud Computing (MCC).
[1] A Platform Computing Whitepaper. ―Enterprise Cloud Computing: Transforming IT.‖ Platform Computing, pp6, 2010.
[2] B.P. Rimal, Choi Eunmi, I. Lumb, ―A Taxonomy and Survey of Cloud Computing Systems‖, Intl. Joint Conference on INC, IMS
and IDC, 2009, pp. 44-51,Seoul, Aug, 2009. DOI: 10.1109/NCM.2009.218
[3] B. R. Kandukuri, R. Paturi V, A. Rakshit, ―Cloud Security Issues‖, In Proceedings of IEEE International Conference on Services
Computing, pp. 517-520, 2009.
[4] Cloud Computing. Wikipdia. Available at http://en.wikipedia.org/wiki/Cloud_computing
[5] Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, ―Ensuring Data Storage Security in Cloud Computing,‖ 17th International
workshop on Quality of Service, USA, pp.1-9, July 13-15, 2009, ISBN: 978-1-4244-3875-4
[6] C. Weinhardt, A. Anandasivam, B. Blau, and J. Stosser.―Business Models in the Service World.‖IT Professional, vol. 11, pp. 28-33,
2009.
[7] Daniel Oliveira and Eduardo Ogasawara. Article: Is Cloud Computing the Solution for Brazilian Researchers?. International Journal
of Computer Applications 6(8):19–23, September 2010.
[8] D. Oliveira, F. Baião, and M. Mattoso, 2010, "Towards Taxonomy for Cloud Computing from an e-Science Perspective", Cloud
Computing: Principles, Systems and Applications (to be published), Heidelberg: Springer-Verlag.
[9] Dr. Gurdev Singh, ShanuSood, Amit Sharma, ―CM- Measurement Facets for Cloud Performance‖, IJCA, , Lecturer, Computer
science & Engineering, Eternal University, Baru Sahib (India), Volume 23 No.3, June 2011.
[10] Ertaul, L. and Singhal, S. 2009. Security Challenges in Cloud Computing. California State University, East Bay. Academic paper
http://www.mcs.csueastbay.edu/~lertaul/Cloud%20Security%20CamREADY.pdf
