Design and development of asterisk based computer services accessing framewor...ijcsity
We are today living in ag
e where technology continues to bring about one magical transformation after
another into our lives. Especially computers and internet that constitute the cardinal components of the
present day technology have so penetrated into our live that they today ma
ke up an indispensable part of
life. In this paper, we present an Asterisk based framework that is designed particularly to the benefit of the
visually challenged people. These people find it difficult to use the conventional computer access devices
like t
he keyboard, the mouse or the monitor as these devices require a good hand
-
eye co
-
ordination. Our
framework is designed to take DTMF input from the user that serve as commands for execution of different
operations on the computer and provide output in the
form of voice using speech synthesis. Additionally,
our framework provides the benefit of customizing it as per user needs as it is based on the open source
platform Asterisk.
Design and development of asterisk based computer services accessing framewor...ijcsity
We are today living in ag
e where technology continues to bring about one magical transformation after
another into our lives. Especially computers and internet that constitute the cardinal components of the
present day technology have so penetrated into our live that they today ma
ke up an indispensable part of
life. In this paper, we present an Asterisk based framework that is designed particularly to the benefit of the
visually challenged people. These people find it difficult to use the conventional computer access devices
like t
he keyboard, the mouse or the monitor as these devices require a good hand
-
eye co
-
ordination. Our
framework is designed to take DTMF input from the user that serve as commands for execution of different
operations on the computer and provide output in the
form of voice using speech synthesis. Additionally,
our framework provides the benefit of customizing it as per user needs as it is based on the open source
platform Asterisk.
Diseño y construcción de una máquina serigráfica automatizadaRaúl Cordova
Diseño y construcción de una máquina serigráfica automatizada realizada con microcontrolador MEGA 2560, processing. Por accionamiento electro neumático. Motor paso a paso y sensores de posicionamiento (encoder, sensor infrarrojo).
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed
through recursive modulo
-
2 substitution using mutated character code generation for online wireless
communication of data/information.
Both sender and receive
r get synchronized based on their final output
.
The length of the key depends on the number of input and output neurons. Coordinated matching weight
vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i
s
the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of
chromosomes.
At first
mutated character code table
based encryption strategy get perform on plain text.
.
Then the intermediate cipher text is yet again encry
pted through recursive positional modulo
-
2 substitution
technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to
form the final cipher text through chaining and cascaded xoring of neuro genetic key with the
identical
length intermediate cipher text block.
Receiver will perform same symmetric operation to get back the plain
text using identical key
ONLINE FUZZY-LOGIC KNOWLEDGE WAREHOUSING AND MINING MODEL FOR THE DIAGNOSIS A...ijcsity
The need for a reliable and efficient way of storing and mining data about people living with HIV/AIDs with the intent to monitor the health status for effective therapy is on the increase. This paper presents a model of a web-based system for knowledge warehousing and mining of diagnosis and therapy of HIV/AIDs using Fuzzy Logic and data mining approach. A model was developed, using the predictive modeling technique, for predicting HIV/AIDs and monitoring of patient health status. The fuzzy inference
rule and a decision support system based on cognitive filtering was employed to determine the possible course of action to be taken. A case study of some data of PLWH was used and the result obtained shows that the developed system is efficient. The system uses XAMP on Windows OS platform. The system was tested and evaluated with satisfactory results
Este presente trabajo realizado durante la capacitación virtual docente MODULO IV, Por la Universidad Cayetano Heredia.
Tutor: Solís Palomino, Edward
Autor: Prof. Pedro Natividad H.
Diseño y construcción de una máquina serigráfica automatizadaRaúl Cordova
Diseño y construcción de una máquina serigráfica automatizada realizada con microcontrolador MEGA 2560, processing. Por accionamiento electro neumático. Motor paso a paso y sensores de posicionamiento (encoder, sensor infrarrojo).
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed
through recursive modulo
-
2 substitution using mutated character code generation for online wireless
communication of data/information.
Both sender and receive
r get synchronized based on their final output
.
The length of the key depends on the number of input and output neurons. Coordinated matching weight
vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i
s
the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of
chromosomes.
At first
mutated character code table
based encryption strategy get perform on plain text.
.
Then the intermediate cipher text is yet again encry
pted through recursive positional modulo
-
2 substitution
technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to
form the final cipher text through chaining and cascaded xoring of neuro genetic key with the
identical
length intermediate cipher text block.
Receiver will perform same symmetric operation to get back the plain
text using identical key
ONLINE FUZZY-LOGIC KNOWLEDGE WAREHOUSING AND MINING MODEL FOR THE DIAGNOSIS A...ijcsity
The need for a reliable and efficient way of storing and mining data about people living with HIV/AIDs with the intent to monitor the health status for effective therapy is on the increase. This paper presents a model of a web-based system for knowledge warehousing and mining of diagnosis and therapy of HIV/AIDs using Fuzzy Logic and data mining approach. A model was developed, using the predictive modeling technique, for predicting HIV/AIDs and monitoring of patient health status. The fuzzy inference
rule and a decision support system based on cognitive filtering was employed to determine the possible course of action to be taken. A case study of some data of PLWH was used and the result obtained shows that the developed system is efficient. The system uses XAMP on Windows OS platform. The system was tested and evaluated with satisfactory results
Este presente trabajo realizado durante la capacitación virtual docente MODULO IV, Por la Universidad Cayetano Heredia.
Tutor: Solís Palomino, Edward
Autor: Prof. Pedro Natividad H.
2. CONFRONTO DELLE VENDITE
Fatturato nel 1° semestre dello scorso anno: 500.000€
Fatturato nel 1° semestre del corrente anno: 600.000€
Incremento percentuale
12%
C O M P U T E R S H O P 2
3. DISTRIBUZIONE VENDITE 1° SEMESTRE
VENDITE (€)
Nord 200000
Sud 220000
Centro 180000
C O M P U T E R S H O P 3