Volume 10, Number 1

Prime Cordial Labeling in Context of Ringsum of Graphs

Introduction The graphs considered here are finite, connected, undirected and simple. The vertex set and edge set of a graph G are denoted by V (G) and E(G) respectively. For various graph theoretic notations and terminology we follow Gross and Yellen3. A dynamic survey of graph labeling is published and updated every year by Gallian2. The concept of Sundaram et …

Read More »

Comparative Evaluation of WOFOST and CERES-Rice Models in Simulating Yield of Rice Cultivars at Navsari

Introduction Crop Simulation model is a computer model used to simulate reality it can be used to simulate crop growth, development and estimate yield of crop as a function of weather condition and management practices. Before using any model, it needs proper calibration and validation. Once model is properly validated, it can be used for various application viz., predicting growth, …

Read More »

Privacy Preservation and Data Security on Internet Using Mutual Ssl

Introduction In the current , the technologies have advanced so much that most of the people prefer using the internet as a medium to transfer data from one  person  to another person across the world. There are many possible ways to transmit data using the internet: via e-mails, chats, etc. The data transition is made very simple, fast and accurate …

Read More »

Age Estimation Using OLPP Features

Introduction Security is a property which measures the degree of resisting some harmful attack on any vulnerable entity. The entity can represent anything that exists in the nature. It can represent some human being, object, company, country, etc. All these are associated with security in order to achieve their goals and objectives. Any entity can be vulnerable to any kind …

Read More »

Comparative Analysis of Clustering Techniques for Various Models of Node Deployment Strategies

Introduction With the rise of technology, there has emerged a need for automating the jobs of humans. From finding out where the car is parked to a car that can drive by itself, we find ourselves in a situation where we are more and more dependent on technology. Wireless sensors are a kind of sensor that have their own computing …

Read More »

A Comparative Review on Different Methods of Face Recognition

Introduction Security is a major concern in day to day life. Biometrics systems are providing an aid to solve this problem. Among the various biometrics available, face recognition is a well-accepted biometric software application capable of identifying faces and verifying faces from a given set of database. Face recognition can be used from anything like a frame from a video …

Read More »

Prediction of Bike Sharing Demand

Introduction Bike sharing systems are innovative ways of renting bicycles for use without the onus of ownership . A pay  per use system,  the bike  sharing model is either  works in two modes: users  can get  a membership  for cheaper rates  or   they can  pay for the bicycles  on an ad-hoc basis. The  users of bike sharing systems can pick …

Read More »

Ambulance Tracking System Using Restful Api

Introduction Ambulance Tracking System, a new and a great experience in the world of hospital. This is a web based application which helps the user to find the nearby ambulance and the nearby hospital based on their location. It helps the user to book the ambulance or call it to the place of emergency so that the patient can be …

Read More »

Churn Analysis in Telecommunication Using Logistic Regression

Introduction There are a number of telecommunication networks that are available and we have the luxury to choose the one we want based on our requirements. The increased number of telecoms are a challenge to the telecom companies and many companies are facing huge revenue losses , to keep the customers many companies invest a huge revenue in the beginning …

Read More »

Performance Investigation of Antivirus – A Comparative Analysis

Introduction The explosion with World Wide Web is always prone to the interaction of unknown threat which can ruin the computer. Antivirus software plays an active role towards the prevention of hidden threats in web which can affect the computer. The infection can be of different types such as Droppers, Trojans, root-kits, worms, viruses, and so on. Antivirus is security …

Read More »

Improved fair Scheduling Algorithm for Hadoop Clustering

 Introduction to Hadoop Hadoop is a distributed framework for large amount of data. It is a solution for big data which deals with complexities of high volume, velocity and wide variety of data. Hadoop has a set of open source projects to provide common services. Hadoop is fundamentally infrastructure and software for storing and processing large amount of data which …

Read More »

Predictive Analytics – The Cognitive Analysis

Introduction Predictive Analytics is a division of data mining that deals with the analysis of existing data to perceive the concealed trends, patterns and the relationship between these to predict the future probabilities and patterns [1]. It incorporates concepts of statistics, data mining and machine learning that analyses the historic and existing data to predict future events [2]. The notable …

Read More »

Z-Dijkstra’s Algorithm to solve Shortest Path Problem in a Z-Graph

Introduction In graph theory, the Shortest Path Problem (SPP) is one of the most famous problems studied and being studied by researchers. The SPP is the problem of finding a path between two vertices (or nodes) in a digraph such that the sum of the weights of its constituent edges is minimized. Thus the core problem is to find the shortest path from a source vertex S to a single …

Read More »

Comparative Study of Routing Protocols in MANET

Introduction MANET (Mobile Ad hoc Network) is collection of  mobile nodes which having the Autonomous Self -configuring network.In MANET, the nodes can flow freely and at any time it can connect to different nodes. Mobile nodes having the bandwidth restricted,dynamic topologies, Energy limited operation, variable infrastructure & capacity links. Routing protocol performs an essential function in any network [1]. Routing …

Read More »

Evaluation of Object Utilization Through Statistical Model in Software Development Process

Introduction Statistical method test is an important step in developing and maintaining any application software and embedded software before implementation. Although, different statistical method is used to enhance the performance through the past decades. Moreover, the final objective of statistical method has been remained standard over the years. In any software system implementation, objects determine the size and time to …

Read More »

A Novel Blind Digital Watermarking Based on SVD and Extreme Learning Machine

Introduction With the invention and expansion of internet, data in digital form is distributed and copied easily worldwide. But with the distribution, protection or security of data is equally important. Watermarking is an emerging technique for the security of data. Watermarking is the process that embeds data called a watermark, tag or label into a multimedia object such that watermark …

Read More »

Comparison of Viola-Jones and Kanade-Lucas-Tomasi Face Detection Algorithms

Introduction Face detection is a computer technology that identifies human faces in digital pictures. Face detection may also refer to the mental process by which humans locate visual scenes in real life. Face detection is a particular case of class-object detection. In class-object detection, the main task is to look for the sizes and locations of all objects in a …

Read More »

Eighteenth Order Convergent Method for Solving Non-Linear Equations

Introduction We consider finding the zero’s of a nonlinear equation f(x)=0          (1) Where f: D c R→R is a scalar function on an open interval D and f(x) may be algebraic, transcendental or combined of both. The most widely used algorithm for solving (1.1) by the use of value of the function and its derivative is the well known …

Read More »

Virtual Reality Treatments for Specific Phobias: A Review

Introduction Virtual Reality provides a level of machine and human interaction in which the users become a part of the three-dimensional virtual world. These virtual worlds provide a means of total immersion thus providing a sense of presence for the participant which provides a great leap in comparison to the traditional computer graphics. The participant is subjected to a computer-designed …

Read More »

RFID Security Issues in IoT: A Comparative Study

Introduction Basic IoT Concept and the Widespread of IoT The Internet of Things(IoT) is a concept that came into being in 1999. It consists of a variety of objects that are interconnected and that can communicate with each other by sending and receiving relevant data. With the size of devices getting smaller and smaller, the Internet of Thing has been …

Read More »

Fuzzy Logic based Stock Value Prediction using Fundamental Analysis

Introduction Recently there is lots of technical work have been updated in the research area of prediction1. Stock prediction is the field where stock price is considered as the means of profit. In this business money is input as well as output. According to the Ben Graham, the investment operation is nothing but to maintain surety of the stock as …

Read More »

Phoneme Segmentation of Tamil Speech Signals Using Spectral Transition Measure

Introduction In Natural Languages, speech is considered as the sequential link of phonemes. The automatic segmentation of speech using only the phoneme sequence is an important task, especially if manually pre-segmented sentences are not available for training. The availability of segmented speech databases is useful for many purposes, mainly for the training of phoneme-based speech recognizers[1]. Such an automatic segmentation …

Read More »

Noise Removal and Filtering Techniques Used in Medical Images

Introduction Noise is caused due to various sources which include many external causes in transmission system and environmental factors which includes noise like Gaussian, Poisson , Blurred , Speckle and salt-and-pepper noise. Noise removing method has become an important factor in medical imaging applications and the most commonly used filters are Median filter, Gaussian filter, Weiner filter which gives the …

Read More »

Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks

Introduction Wireless local area networks (WLAN) present unique and global way of networking with mobile nodes. WLAN were based on IEEE standards 802.11 a,b,g standards [1]. But, in most of the configurations of WLAN, only the last link is connected with access point thereby acting as wireless. Access point itself may be considered as bottleneck because of its limited range. …

Read More »

A New 8T SRAM Circuit with Low Leakage and High Data Stability Idle Mode at 70nm Technology

Introduction It has always been a great challenge to fabricate a circuit using transistors. To design a big circuit the size of transistor is becoming small [1]. SRAM utilizes minimum sized transistors to fulfill the requirement of high packing density. SRAM is facing severe difficulties after scaling the dimensions of transistor, such as degraded data stability and increased power consumption …

Read More »

Security with Respect to MANET (Mobile Ad-hoc Network) and IoT (Internet of Things)

Introduction Now six billions people around the world access internet by any of field area network like 2G, 3G, 4G, LTE, wifi, Wimax, Mobile Broadband, wired, etc.. They use the FAN for browsing the web, sending and receiving emails, accessing multimedia content, playing games, social networking and other tasks, so more peoples come to in connect to share global information …

Read More »

Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET

Introduction In MANET, various attacks are possible at different layers. Among them some attacks are possible because of malicious and/or selfish behavior of nodes [1]. At network layer, behavior of malevolent joins like they are claiming itself having a best path (attracting to source node by claiming maximum destination sequence number, minimum hop count etc). Thus sender node may select …

Read More »

Optimized Image Mosaicing with Moment Invariants and SIFT Features

Introduction Image mosaicing generally contains image pre-processing, image registration and image mosaic [3].The aim of pre=processing is to simplify the difficulties of image registration to make some replication change and transformation od coordinates on original image. The core problem of image registration is to find out a space variation and register the coordinate points of overlapping parts between images. The …

Read More »

Workload Consolidation using Task Scheduling Strategy Based on Genetic Algorithm in Cloud Computing

Introduction As information and communication technology (ICT) grows gradually, need for computational resources have also increased than before. Investing in huge amount of IT assets may not be a good alternative for many industries. Answer to this issue is Cloud computing where computing resources are rented rather than owned. Combining the features of grid, cluster and utility computing mingled with …

Read More »

Improving E-Learning Support and Infrastructure in Different Districts of Jammu and Kashmir

Introduction In today’s life scenario technology is so advance you can be taught something anywhere, anytime by way of E-learning. Some corporations have monetary crisis, they don’t effort gigantic no of trainers in order that they use e-studying which is fascinating and get monetary savings, trainee also enjoys. In schooling sector more than a few universities provides degree through e-learning. …

Read More »

Convergence In Future Wireless Network Technology

Introduction Communication networks have become a key economic and social infrastructure in many counties in the world. The telecommunication network infrastructure is crucial to the national and international exchange of goods and services, and acts as a main catalyst in changing economic interrelationships through rapid technological change and the proliferation of a range of new services. With the development of …

Read More »

An insight into IPAddressing

Introduction World Wide Web, www connects all e-resources together where clients and server can use and give such services. Whenever any service or resource is demanded the client should first able to locate the server carrying the resources. After resource has been found out the particular directory or server disk has to be checked to get the location of the …

Read More »

Access Control and Encryption of Sensitive Data Using i-Se4GE Algorithm

Introduction Transferring of Text/Audio/Video through an application by using cryptography is the software aimed at providing a high level of security to the sensitive data for organizations, since they face issue in using the existing system in which they cannot send all three media files. The aim is all about security and making the sensitive data secured. There is an …

Read More »

An Integer solution in Intuitionistic Transportation Problem with Application in Agriculture

Introduction Transportation problem is a spectial kind of linear programming problem in which goods are transported from a set of source to the set of destination subject to the supply and demands of the source and destinations. Hitchcock (1941) firstly introduced the Transportation Problem and after that it presented by Koopmans (1947). The first mathematical formulation of fuzziness was pioneered …

Read More »

Optimal Allocation of Stratified Sampling Design Using Gradient Projection Method

Introduction  One of the areas of statistics that is most commonly used in all fields of scientific investigation is that of stratified sampling. In order to achieve greater precision of the estimate it is desirable to decrease the heterogeneity of the population units. This is achieved by a technique known as stratification, in which the entire population is divided into …

Read More »

Training Neural Network Elements Created From Long Shot Term Memory

Introduction An artificial neuron (ANe) is a simplified model of biological neurons (BNe) characteristic of the kind of relatively higher levels of development of life. The artificial neural network (ANN) is structured from the ANe’s. Since the method for creating term structure depends on the type of network ie. classification networks. We discuss the two types of networks according to …

Read More »