A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sankar, R.
- Brain-Computer Interface Communication Device for Handicapped Person
Authors
1 Department of MCA, S. A. Engineering College, IN
Source
Programmable Device Circuits and Systems, Vol 11, No 5 (2019), Pagination: 73-76Abstract
BCI (Brain-Computer Interfaces) encodes brain to allow for direct communication between persons brain and external devices. It records brain responses to stimuli and identify whether the present stimuli was relevant or irrelevant to intent of subject. Thus, implemented approach by presenting to subject a virtual keyboard such that parts of the keyboard flash for long time. Focus on a particular symbol on a keyboard and count its flashes. Used machine learning algorithms, constructed a classifier that could reliably identify to choice a subject. Also studied the resulting interfaces in terms of rate of information sending and receiving.
Keywords
BCI, Stimuli, Implemented, Flashes, Constructed, Resulting, Information.- Analytical Methods for Developing Security Big Data Issue: Facebook Security
Authors
1 Department of Master of Computer Applications, S. A. Engineering College, IN
Source
Programmable Device Circuits and Systems, Vol 11, No 5 (2019), Pagination: 84-88Abstract
Big data is nothing but a data in large numbers that can be analyzed computationally to divulge patterns and associate them to relate protocols of humans and their interactions. This research paper is based on the implementation of security system to Facebook. Some languages like c, c + +, visual basic front end, Oracle back end have been used. The process involves by notifying users through pop-up alert regarding the registration of their networks in cloud security model, which enables them to perform actions. The design issues for the security and privacy of Facebook have been also discussed. This Paper help users by giving personal security to their Facebook account. Hence, this research paper effectively performs on user security as well as development of big data security issue. We highlighted some models to mitigate these security conflicts.