admincom

An Aproach of Design and Training of Artificial Neural Networks by Applying Stochastic Search Method

Introduction This paper is motivated to introduce some experiences related to analysis & synthesis of artificial neural networks (ANN) and to offer rather simple but effective approache in solving practical problems with ANN. Besides, this paper points out implementation of algorithm based on stochastic search (SS) i.e. Stochastic Direct Search (SDS). Basics of SDS were launched the same time (70-th …

Read More »

Comparative Evaluation of WOFOST and CERES-Rice Models in Simulating Yield of Rice Cultivars at Navsari

Introduction Crop Simulation model is a computer model used to simulate reality it can be used to simulate crop growth, development and estimate yield of crop as a function of weather condition and management practices. Before using any model, it needs proper calibration and validation. Once model is properly validated, it can be used for various application viz., predicting growth, …

Read More »

Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET

Introduction In MANET, various attacks are possible at different layers. Among them some attacks are possible because of malicious and/or selfish behavior of nodes [1]. At network layer, behavior of malevolent joins like they are claiming itself having a best path (attracting to source node by claiming maximum destination sequence number, minimum hop count etc). Thus sender node may select …

Read More »

Optimized Image Mosaicing with Moment Invariants and SIFT Features

Introduction Image mosaicing generally contains image pre-processing, image registration and image mosaic [3].The aim of pre=processing is to simplify the difficulties of image registration to make some replication change and transformation od coordinates on original image. The core problem of image registration is to find out a space variation and register the coordinate points of overlapping parts between images. The …

Read More »

Workload Consolidation using Task Scheduling Strategy Based on Genetic Algorithm in Cloud Computing

Introduction As information and communication technology (ICT) grows gradually, need for computational resources have also increased than before. Investing in huge amount of IT assets may not be a good alternative for many industries. Answer to this issue is Cloud computing where computing resources are rented rather than owned. Combining the features of grid, cluster and utility computing mingled with …

Read More »

Improving E-Learning Support and Infrastructure in Different Districts of Jammu and Kashmir

Introduction In today’s life scenario technology is so advance you can be taught something anywhere, anytime by way of E-learning. Some corporations have monetary crisis, they don’t effort gigantic no of trainers in order that they use e-studying which is fascinating and get monetary savings, trainee also enjoys. In schooling sector more than a few universities provides degree through e-learning. …

Read More »

Convergence In Future Wireless Network Technology

Introduction Communication networks have become a key economic and social infrastructure in many counties in the world. The telecommunication network infrastructure is crucial to the national and international exchange of goods and services, and acts as a main catalyst in changing economic interrelationships through rapid technological change and the proliferation of a range of new services. With the development of …

Read More »

An insight into IPAddressing

Introduction World Wide Web, www connects all e-resources together where clients and server can use and give such services. Whenever any service or resource is demanded the client should first able to locate the server carrying the resources. After resource has been found out the particular directory or server disk has to be checked to get the location of the …

Read More »

Access Control and Encryption of Sensitive Data Using i-Se4GE Algorithm

Introduction Transferring of Text/Audio/Video through an application by using cryptography is the software aimed at providing a high level of security to the sensitive data for organizations, since they face issue in using the existing system in which they cannot send all three media files. The aim is all about security and making the sensitive data secured. There is an …

Read More »

Optimal Allocation of Stratified Sampling Design Using Gradient Projection Method

Introduction  One of the areas of statistics that is most commonly used in all fields of scientific investigation is that of stratified sampling. In order to achieve greater precision of the estimate it is desirable to decrease the heterogeneity of the population units. This is achieved by a technique known as stratification, in which the entire population is divided into …

Read More »

Copy Move Image Forgery Detection Using SIFT

Introduction In today’s digital world the important and convenient source of information is the digital image. Due to their ease of acquisition and storage they convey information in the fastest means. In the court of law the images can be used as proof or evidence. Digital images are having large applications ranging from military to medical and from art piece …

Read More »

Detection of Powdery Mildew Disease of Beans in India : A Review

Introduction Pulse production has been stagnant in Asian countries leading to steady decline in per capita availability over the past 50 years. In India 13.00 – 15.00 million metric tons (mmt) of peas and pulses produced which is about 25% of the global production. India is the largest producer as well as major importer of peas/pulses in the World. Pulse …

Read More »

Formulation of A Prediction Index with the Help of WEKA Tool for Guiding the Stock Market Investors.

Introduction Stock Prediction is an extremely difficult task as the stock prices are based on a variety of factors. Fundamental analysis and technical analysis are the two mechanisms that help to take decisions regarding stocks. Machine learning techniques are gaining popularity for stock price prediction. Through various experiments conducted it is feasible to test the machine learning techniques and select …

Read More »

Improving WLAN Quality of Services (Qos) Using Opnet

Introduction As the technology is improving so are the demands of end users and their applications increasing. A wide variety of new applications are being invented daily.  High bandwidth internet connectivity has become a basic requirement to the success of almost all of these areas. Wireless Local Area Networks (WLANs) has become one of the most promising and successful technology …

Read More »

Analysis of the Effect of Cell Phone Radiation on The Human Brain Using Electroencephalogram

Introduction The rapid evolution of the cell phone technology has resulted in a drastic increase in cell phone usage globally with an estimated 4.77 billion subscribers in 2017. The radio frequency (RF) used for communication by cell phone can penetrate through semi-solid substances, like living tissue to an effective distance proportional to its power density. According to Adey [1], biophysical …

Read More »

Testing of Multithreaded Code Under Deterministic and Predictable Environment

Introduction Multithreading is the ability of an operating system to run programs concurrently that are divided into sub parts or threads. It is similar to multitasking but instead of running on multiple processes concurrently, multithreading allows multiple threads in a process to run at the same time. Threads are more basic and smaller unit of instruction. Hence multithreading can occur …

Read More »

An Introduction to Data Mining Applied to Health-Oriented Databases

Introduction The rationale behind Data Mining (DM) is that it provides methods and systems that can automatically find general meanings based on vast and complex, data. The DM Systems (DMSs) usually ignore the number of parameters and it is not always possible to come up with generalizations even when data are available. Figure 1: DM Cycle  Click here to View figure …

Read More »

Discovering Spatio-temporal Patterns of Themes in Social Media

Introduction Social Networks have become very popular in recent years because of the increasing proliferation and affordability of internet enabled devices such as personal computers, mobile devices and other more recent hardware innovations such as internet tablets. Social network sites vary greatly in their features and user base. Beyond users and friends, some have photo-sharing or video-sharing capabilities; others have …

Read More »

Load Balancing the Network Traffic in the Nth Mode of IP Tables

Introduction One of the main issues in the development of network applications is the load balancing. For instance, a social networking site requires so many servers in different areas to fetch the results in order to generate web page. Therefore, it is necessary to balance the load.  Load balancing is the ability of the router to distribute the client’s request …

Read More »

Application of Multi-Angle Imaging Spectro Radiometer in Agricultural in Middle Gujarat for Wheat Crop

Introduction The multi-angle imaging Spectro Radiometer (MISR) is innovative instrument that uses simultaneous multi-angular measurements to obtain angular reflectance information for retrieval of geophysical parameters Diner et al. (1991).MISR provides near-concurrent multiple view of a surface at several viewing geometries with spatial resolution of 275 m and 1.1 km. Considering the satellite level evaluations of the TOA BRF signal data …

Read More »

Fdi (Foreign Direct Investment) in India ; the Major Monetary Source for Economic Development With Special Emphasis on Computer Sector

Introduction Since the time in memorable there are various countries, some of which were developed earlier by way of achieving the finances and technologies, while there are a number of countries which are called under developed and developing countries. Due to the lack of advanced technology monetary resources are suffering from low per capita income and are regarded as poor …

Read More »

Moodle (Electronic Learning System) Community

Introduction Some educational centers are using e-learning to enhance their traditional learning system while other have created alternative model based on virtual learning and are using learning’s a new learning method[1].The term “e-learning” has many definitions, a definition by Rosenberg, “the first and most important feature of learning’s that it takes place in a networked environment”. This means that computer …

Read More »

Study and Analysis of Multilingual Handwritten Characters Recognition using SVM Classifier

Intoduction Multilingual Handwritten Characters Recognition While processing handwritten characters if a document contains more than one handwritten language characters to recognize then it refers as Multilingual Handwritten Characters Recognition[11]. Like here in the figure 1.1 we have taken Hindi and English as an input language characters and in figure 1.2 the Multilingual Handwritten Characters Recognition process is shown. Figure 1 …

Read More »

Text Localization and Extraction From Still Images Using Fast Bounding Box Algorithm

Intoduction Digital Image Processing Digital image processing is rapidly expanding its root in very field and is an important emerging research area. It is developing gradually with the growing applications in Information Technology and computer science engineering. The term digital image processing usually deals with alteration of digital images with the help of digital computer. Signals and systems include image …

Read More »

Identification of Abnormal Masses in Digital Mammogram Using Statistical Decision Making

Introduction The word ‘Cancer’ is viewed with great fear and apprehension due to absence of curative medicine for perfect cure. Documentary evidences suggested the fight against cancer started 5,000 years back with Ayurvedic School of medicine. Charaka [1] and Sushrutasanhitas [2] two well-known ayurvedic classics described cancer as inflammatory or non-inflammatory swelling. According to the modern medical point of view …

Read More »

Analysis of Pattern Identification Using Graph Database for Fraud Detection

Introduction In the same way as any wrongdoing aversion technique, the way to minimizing the danger of fraud lies in understanding why it happens; in recognizing business territories that is at danger and actualizing methods tending to powerless regions. Fighting fraud danger ought to along these lines be a two dimensional methodology. To begin with, guaranteeing that the open doors …

Read More »

Congestion Avoidance in Packet Networks using Network Simulator-3 (NS-3)

Introduction In packet networks the problem of congestion can be explained as when too many packets try to access the same router buffer as a result of which some amount of packets being dropped. One more definition of congestion is that when user sends data into the network at a rate higher than allowed by the networking resources. Congestion can …

Read More »

Development of Online Student Course Registration System

Introduction System may be defined as a layered structure that depicts how programs involved would interrelate and communicate. In computers, System may also include actual programs, programming interfaces and tools for managing the larger system. The term system may be used differently in different contexts, but more or less the concept remains the same. Online student course registration system combines …

Read More »

Storage and Computation on Big Data: A Comparative study

Introduction As data been increased in everyday life, computing the data and keeping the data secure is one of the important parameters. Over the years, disk storage capacity has improved from 40 MB to 3TB, while disk transfer rate has also been improved from 800 KB/s to 600 MB/s. Here we are indexing two computation algorithms (SaLSa, SSPL) on data …

Read More »

A Study on Usage of E-Commerce Through Cell Phones by College Students

Introduction “The Only Thing That Is Constant Is Change”- Heraclitus Electronic commerce or E-commerce consists primarily of the distributing, buying, selling, marketing, and servicing of products or services over electronic systems such as the Internet and other computer networks. In the broad meaning electronic commerce is a means of conducting business using one of many electronic methods, usually involving internet, …

Read More »

Operational Monitoring System OMS with WSN (Wireless Sensor Network), RFID, GPS and CCTV in Agriculture

Introduction Recently, an innovations in information communication technology have been increasing the convergence between different industries. The fact of convergence and act and integration of IT with agricultural technology is expected to be an area that could increase the added value and productivity of agriculture by applying the ubiquitous technology to the agricultural sector which is a primary industry. To …

Read More »

A Review on Text-Independent Speaker Verification Techniques in Realistic World

Introduction Speaker verification (SV) is the task of validating the claimed identity of a person from his/her voice. It is binary classifications problem in which we are distinguish between a true speaker and an imposter [1]. The Speaker Verification system works in two phases. The first phase – the Training Phase or the Enrollment Phase approximates the speaker to a …

Read More »

ICT tool – Development of Calculator for Design of Solar Dryer

Introduction Henry David said “Men Have Become the Tools of Their Tools.” In this era all the developing technology begin from calculation influenced by the ICT-tool. Today energy is main problem, by utilizing sun light energy problem can be minimize. Sun drying is still the most common method used to preserve agricultural products in most tropical and subtropical countries. However, …

Read More »

Applications of Energy Aware Routing Protocols in WSN

Introduction Advances in sensor technology, low-power electronics, and low-power radio frequency (RF) design have enabled the development of small, relatively inexpensive and low-power sensors, called micro sensors that can be connected via a wireless network. These wireless micro sensor networks represent a new paradigm for extracting data from the environment and enable the reliable monitoring of a variety of environments …

Read More »

Constructing well-organized Wireless Sensor Networks with Low-level Identification

Introduction In most distributed systems, naming of nodes for low-level communication leverages topological location (such as node addresses) and is independent of any application. Typically, higher-level, location-independent naming and communication is built upon these low-level communication primitives using one or more levels of (possibly distributed) binding services that map higher-level names to topological names and sometimes consider application-specific requirements. An …

Read More »

Neuro-Fuzzy Based First Responder for Image Forgery Identification

Introduction Image forgery Image forgery is to manipulate the content of an image in such a way that either it hide an important part of the image or represents wrong information. Image forgery is very common of digital crimes carried out. The most familiar targets of these forgeries are photographs, legal or administrative documents and financial documents line checks. Nowadays …

Read More »

Digital Image Watermarking – An Overview

Introduction In recent years, digitization plays a big role in human life as numerous applications in field of engineering, healthcare, communication, documentation and many more. Here, multimedia content like image and video is major content. Therefore, authentication, information security and other various issues are raised with multimedia sources and content. Digital data can be stored efficiently and with a very …

Read More »

Eigen Values Matrix for Recognition English Letters

Introduction Recognition process is an important task because it performed daily by human in the life and because of its important applications in various fields. The human eye can differentiate between letters even if they are largely similar in shape . Different fonts of alphabets and their Sizes cause a major effort in the process of discrimination . The big …

Read More »

Approach to Solving K-Sat Problem Based on Reduction Thereof to the Covering Problem

Introduction SAT-problem is important in systems of evidence automatic verification, where formula is a set of clauses, which mean disjunction of a certain amount of literals – variables Х and X–. This problem has a great importance upon determination of satisfiability of CIRCUIT-SAT schemes (circuit-satisfiability problem) and in pattern recognition problems. The international annual conference (The International Conference on Theory and …

Read More »

Semantic Web: XML and RDF Roles

Introduction Semantic web is the future development of World Wide Web (WWW). The information stored by WWW is intended for human use. The contents in the WebPages are left to the user to read and understand also to make connections between information stored in the WebPages. Semantic web allows the user computer to draw the required connections between information in …

Read More »

Hybrid Approach for Load Balancing in Cloud Computing

Introduction Cloud computing comes throughout focus development  of  grid computing, virtualization  as well as   web  technologies. Cloud computing  is usually   the   world wide web  based computing  That   presents  infrastructure  as  service  (IaaS), platform  as service  (PaaS),  software  as Service (SaaS).  Throughout SaaS, software application form   is usually   created   shown   through the cloud provider.    PaaS a good   application development platform  for …

Read More »

Scheduling Strategies in Hadoop: A Survey

Introduction Cloud computing[1] is an emerging technology which enables convenient, on-demand access to a shared pool of configurable computing resources, such as servers, networking, applications and services. These shared resources can be rapidly deployed and re-deployed with minimal human intervention to meet resource requirements. The resources can be rapidly changed to match the immediate needs of the workload in minutes …

Read More »

Advantages and Challeging in E Agriculture

Introduction E-Agriculture is an emerging field focusing on the enhancement of agricultural and rural development through improved information and communication processes. More specifically, e-Agriculture involves the conceptualization, design, development, evaluation and application of innovative ways to use information and communication technologies (IT) in the rural domain, with a primary focus on agriculture. E-Agriculture is a relatively new term and we …

Read More »

High Level Security Trust Zones for Private Clouds

Introduction Cloud computing enables a new business model that supports on-demand, pay-for-use, and econ­omies-of-scale IT services over the Internet. The Internet cloud works as a service factory built around virtual­ized data centers.1 Cloud platforms are dynamically built through virtualization with provisioned hardware, software, networks, and datasets. The idea is to migrate desktop computing to a service-oriented platform using virtual server …

Read More »

Text Based Image Compression Using Hexadecimal Conversion

Introduction Image processing applications are drastically increasing over the years. Storage and transmission of digital image has become more of a necessity than luxury these days, hence the importance of Image compression. Image security has become most important aspect while transmission, exchanging and storage of an image. Most of compressions techniques are based on properties of inter pixel redundancy, pixel …

Read More »

The Moderating Effect of Knowledge Stocks Capability ‎ on the Relationship Between Business Process Reengineering Factors and Organizational Performance Services Firms

Introduction The intensive competition in the globalized business world has forced business institutions to make changes their operation processes beyond local competition to global competitiveness. In same manner, according to Goksoy, Ozsoy and Vayvay (2012) if a firm wants to survive in today’s hypercompetitive environment it needs to bring in moderate change every year and undergo a major change almost …

Read More »

Context Driving Speed Limit Alert, Synchronized Monitoring System

Introduction The Context Driving Speed Limit Alert system (CDSLA) has developed by the integration of GPS and GIS for collecting En route traffic data from a probe vehicle. This system has been further integrated with the engine management system of a vehicle to provide time-tagged data on GPS position and actual speed, distance travelled, acceleration, fuel consumption, engine performance, and …

Read More »

A Comparison on Different Image Completion Methods

Introduction This paper addresses about, image inpainting or disocclusion and geometric image rearrangement. In image inpainting a special case is texture synthesis constrained by boundary matching with a seed texture. Here an image U is given where a few pixels or a whole region Ω is missing, we wish to recover the lacking information in the best possible way. To …

Read More »