Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
Natural calamities such as floods are a severe menace, causing huge socio-environmental threats. Remote sensing technologies have proven to be a boon in precisely mapping the spatiotemporal effects and spread of floods, allowing remedial measures to be implemented on time. This paper aims to demarcate the extent of flooded areas in the study area by the application of remote sensing techniques that involve combining temporal images acquired during the flood (crisis images) with images acquired before the flood (archive images). In disaster mapping applications, the image that is acquired before the event takes place is referred to as the archive image, while the image that is acquired at the time of the event is referred to as the crisis image. The research objectives were achieved through the analysis of freely available Sentinel-1A data to delineate the extent of flooded areas in the European Space Agency's-Sentinel Applications Platform (ESA-SNAP) environment. Multi-looking, radiometric calibration, and range doppler terrain correction (geometric) were applied to the temporal images for better visualization and distinction and for projecting the pixels onto the proper map system. Later, the archive and crisis images were overlaid to form a Red Green Blue (RGB) composite that showed the extent and spread of floods in north Bihar, where each color represented areas of different significance. Further, the flood map was overlaid onto the Google Earth optical layer for better visualization and comparison. The work demonstrated the applicability and use of remote sensing and GIS technology to quickly gain insight into the spatial and temporal distribution of floods in a given region and could be used as a precursor for efficient flood management and relief measures.
The optimal cost of blasting is a major factor in the surface mining industry and must be addressed properly. The project will include the variability of components of blast design, such as change in azimuth of the holes intended for blasting to reduce explosive consumption and have a major role in controlling ground vibrations; pattern of holes (diameter of holes); electric and non-electric initiation; toe burden analysis; type of explosive used (slurry and ANFO); and adopting an efficient design by mathematical cost analysis using O-Pitblast software. The damage to temporary structures in surface mining that are located within close proximity of blasting faces is a serious problem and has to be countered using an alternating blast design in correspondence to the permissible Post-Production Verification (PPV) that a structure can withstand. The estimation of the PPV graph using seismographic data of the face must comply with different ground vibration equations to check whether the predicted model of blasting is up to safety norms and the demarking of the blasting zone.
Blockchain has been used in non-financial applications since it was first introduced with Bitcoin. Bitcoin uses peer-topeer technology to operate without a central authority or banks; the management of transactions and the issuance of bitcoins is carried out collectively by the network. Bitcoin is open source; its design is public, no one owns or controls bitcoin, and anyone can participate. In blockchain technology, no intermediaries are used to establish a decentralized system. Based on literature reviews, this paper discusses blockchain technology concepts, mechanisms, applications, opportunities, and other relevant solutions for real-world problems. Blockchain concepts are discussed in this paper using healthcare, education, and logistics examples. Finally, it will discuss the various blockchains, their permissions, architectures, and emerging features.
The primary goals of this paper is to contribute a useful method and present the advantages of Google Remote Procedure Calls (gRPC) for real-time two-way data transfer as well as to improve the security of microservices that use gRPC. The communication between two or more services is one of the key difficulties in splitting a monolithic application into microservices. When it utilizes gRPC to transmit in real-time, it responds quickly and with greater security. The gRPC protocol is now supported by application load balancing.
The issue of dependability and exception handling is very important, and it is best to address the dependability of software at the very early stage or beginning of the development life cycle. The Object-Oriented Design (OOD) phase works as a base. The object-oriented approach is used to represent the problem domain and clearly understand the design. This paper defines dependability and exception handling that must be addressed during the design phase. Dependability can be achieved through the proper placement or management of design characteristics and the establishment of relationships between them and to develop an exception-handling model that provides a distinct and transparent separation between a component's regular activity and its exceptional action.