Introduction This paper is motivated to introduce some experiences related to analysis & synthesis of artificial neural networks (ANN) and to offer rather simple but effective approache in solving practical problems with ANN. Besides, this paper points out implementation of algorithm based on stochastic search (SS) i.e. Stochastic Direct Search (SDS). Basics of SDS were launched the same time (70-th …
Read More »admincom
Comparative Evaluation of WOFOST and CERES-Rice Models in Simulating Yield of Rice Cultivars at Navsari
Introduction Crop Simulation model is a computer model used to simulate reality it can be used to simulate crop growth, development and estimate yield of crop as a function of weather condition and management practices. Before using any model, it needs proper calibration and validation. Once model is properly validated, it can be used for various application viz., predicting growth, …
Read More »Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET
Introduction In MANET, various attacks are possible at different layers. Among them some attacks are possible because of malicious and/or selfish behavior of nodes [1]. At network layer, behavior of malevolent joins like they are claiming itself having a best path (attracting to source node by claiming maximum destination sequence number, minimum hop count etc). Thus sender node may select …
Read More »Optimized Image Mosaicing with Moment Invariants and SIFT Features
Introduction Image mosaicing generally contains image pre-processing, image registration and image mosaic [3].The aim of pre=processing is to simplify the difficulties of image registration to make some replication change and transformation od coordinates on original image. The core problem of image registration is to find out a space variation and register the coordinate points of overlapping parts between images. The …
Read More »Workload Consolidation using Task Scheduling Strategy Based on Genetic Algorithm in Cloud Computing
Introduction As information and communication technology (ICT) grows gradually, need for computational resources have also increased than before. Investing in huge amount of IT assets may not be a good alternative for many industries. Answer to this issue is Cloud computing where computing resources are rented rather than owned. Combining the features of grid, cluster and utility computing mingled with …
Read More »Improving E-Learning Support and Infrastructure in Different Districts of Jammu and Kashmir
Introduction In today’s life scenario technology is so advance you can be taught something anywhere, anytime by way of E-learning. Some corporations have monetary crisis, they don’t effort gigantic no of trainers in order that they use e-studying which is fascinating and get monetary savings, trainee also enjoys. In schooling sector more than a few universities provides degree through e-learning. …
Read More »Convergence In Future Wireless Network Technology
Introduction Communication networks have become a key economic and social infrastructure in many counties in the world. The telecommunication network infrastructure is crucial to the national and international exchange of goods and services, and acts as a main catalyst in changing economic interrelationships through rapid technological change and the proliferation of a range of new services. With the development of …
Read More »An insight into IPAddressing
Introduction World Wide Web, www connects all e-resources together where clients and server can use and give such services. Whenever any service or resource is demanded the client should first able to locate the server carrying the resources. After resource has been found out the particular directory or server disk has to be checked to get the location of the …
Read More »Access Control and Encryption of Sensitive Data Using i-Se4GE Algorithm
Introduction Transferring of Text/Audio/Video through an application by using cryptography is the software aimed at providing a high level of security to the sensitive data for organizations, since they face issue in using the existing system in which they cannot send all three media files. The aim is all about security and making the sensitive data secured. There is an …
Read More »Optimal Allocation of Stratified Sampling Design Using Gradient Projection Method
Introduction One of the areas of statistics that is most commonly used in all fields of scientific investigation is that of stratified sampling. In order to achieve greater precision of the estimate it is desirable to decrease the heterogeneity of the population units. This is achieved by a technique known as stratification, in which the entire population is divided into …
Read More »Copy Move Image Forgery Detection Using SIFT
Introduction In today’s digital world the important and convenient source of information is the digital image. Due to their ease of acquisition and storage they convey information in the fastest means. In the court of law the images can be used as proof or evidence. Digital images are having large applications ranging from military to medical and from art piece …
Read More »Detection of Powdery Mildew Disease of Beans in India : A Review
Introduction Pulse production has been stagnant in Asian countries leading to steady decline in per capita availability over the past 50 years. In India 13.00 – 15.00 million metric tons (mmt) of peas and pulses produced which is about 25% of the global production. India is the largest producer as well as major importer of peas/pulses in the World. Pulse …
Read More »Formulation of A Prediction Index with the Help of WEKA Tool for Guiding the Stock Market Investors.
Introduction Stock Prediction is an extremely difficult task as the stock prices are based on a variety of factors. Fundamental analysis and technical analysis are the two mechanisms that help to take decisions regarding stocks. Machine learning techniques are gaining popularity for stock price prediction. Through various experiments conducted it is feasible to test the machine learning techniques and select …
Read More »Improving WLAN Quality of Services (Qos) Using Opnet
Introduction As the technology is improving so are the demands of end users and their applications increasing. A wide variety of new applications are being invented daily. High bandwidth internet connectivity has become a basic requirement to the success of almost all of these areas. Wireless Local Area Networks (WLANs) has become one of the most promising and successful technology …
Read More »Analysis of the Effect of Cell Phone Radiation on The Human Brain Using Electroencephalogram
Introduction The rapid evolution of the cell phone technology has resulted in a drastic increase in cell phone usage globally with an estimated 4.77 billion subscribers in 2017. The radio frequency (RF) used for communication by cell phone can penetrate through semi-solid substances, like living tissue to an effective distance proportional to its power density. According to Adey [1], biophysical …
Read More »Testing of Multithreaded Code Under Deterministic and Predictable Environment
Introduction Multithreading is the ability of an operating system to run programs concurrently that are divided into sub parts or threads. It is similar to multitasking but instead of running on multiple processes concurrently, multithreading allows multiple threads in a process to run at the same time. Threads are more basic and smaller unit of instruction. Hence multithreading can occur …
Read More »An Introduction to Data Mining Applied to Health-Oriented Databases
Introduction The rationale behind Data Mining (DM) is that it provides methods and systems that can automatically find general meanings based on vast and complex, data. The DM Systems (DMSs) usually ignore the number of parameters and it is not always possible to come up with generalizations even when data are available. Figure 1: DM Cycle Click here to View figure …
Read More »Discovering Spatio-temporal Patterns of Themes in Social Media
Introduction Social Networks have become very popular in recent years because of the increasing proliferation and affordability of internet enabled devices such as personal computers, mobile devices and other more recent hardware innovations such as internet tablets. Social network sites vary greatly in their features and user base. Beyond users and friends, some have photo-sharing or video-sharing capabilities; others have …
Read More »Load Balancing the Network Traffic in the Nth Mode of IP Tables
Introduction One of the main issues in the development of network applications is the load balancing. For instance, a social networking site requires so many servers in different areas to fetch the results in order to generate web page. Therefore, it is necessary to balance the load. Load balancing is the ability of the router to distribute the client’s request …
Read More »Application of Multi-Angle Imaging Spectro Radiometer in Agricultural in Middle Gujarat for Wheat Crop
Introduction The multi-angle imaging Spectro Radiometer (MISR) is innovative instrument that uses simultaneous multi-angular measurements to obtain angular reflectance information for retrieval of geophysical parameters Diner et al. (1991).MISR provides near-concurrent multiple view of a surface at several viewing geometries with spatial resolution of 275 m and 1.1 km. Considering the satellite level evaluations of the TOA BRF signal data …
Read More »Fdi (Foreign Direct Investment) in India ; the Major Monetary Source for Economic Development With Special Emphasis on Computer Sector
Introduction Since the time in memorable there are various countries, some of which were developed earlier by way of achieving the finances and technologies, while there are a number of countries which are called under developed and developing countries. Due to the lack of advanced technology monetary resources are suffering from low per capita income and are regarded as poor …
Read More »Moodle (Electronic Learning System) Community
Introduction Some educational centers are using e-learning to enhance their traditional learning system while other have created alternative model based on virtual learning and are using learning’s a new learning method[1].The term “e-learning” has many definitions, a definition by Rosenberg, “the first and most important feature of learning’s that it takes place in a networked environment”. This means that computer …
Read More »Study and Analysis of Multilingual Handwritten Characters Recognition using SVM Classifier
Intoduction Multilingual Handwritten Characters Recognition While processing handwritten characters if a document contains more than one handwritten language characters to recognize then it refers as Multilingual Handwritten Characters Recognition[11]. Like here in the figure 1.1 we have taken Hindi and English as an input language characters and in figure 1.2 the Multilingual Handwritten Characters Recognition process is shown. Figure 1 …
Read More »Text Localization and Extraction From Still Images Using Fast Bounding Box Algorithm
Intoduction Digital Image Processing Digital image processing is rapidly expanding its root in very field and is an important emerging research area. It is developing gradually with the growing applications in Information Technology and computer science engineering. The term digital image processing usually deals with alteration of digital images with the help of digital computer. Signals and systems include image …
Read More »Identification of Abnormal Masses in Digital Mammogram Using Statistical Decision Making
Introduction The word ‘Cancer’ is viewed with great fear and apprehension due to absence of curative medicine for perfect cure. Documentary evidences suggested the fight against cancer started 5,000 years back with Ayurvedic School of medicine. Charaka [1] and Sushrutasanhitas [2] two well-known ayurvedic classics described cancer as inflammatory or non-inflammatory swelling. According to the modern medical point of view …
Read More »Analysis of Pattern Identification Using Graph Database for Fraud Detection
Introduction In the same way as any wrongdoing aversion technique, the way to minimizing the danger of fraud lies in understanding why it happens; in recognizing business territories that is at danger and actualizing methods tending to powerless regions. Fighting fraud danger ought to along these lines be a two dimensional methodology. To begin with, guaranteeing that the open doors …
Read More »Congestion Avoidance in Packet Networks using Network Simulator-3 (NS-3)
Introduction In packet networks the problem of congestion can be explained as when too many packets try to access the same router buffer as a result of which some amount of packets being dropped. One more definition of congestion is that when user sends data into the network at a rate higher than allowed by the networking resources. Congestion can …
Read More »Development of Online Student Course Registration System
Introduction System may be defined as a layered structure that depicts how programs involved would interrelate and communicate. In computers, System may also include actual programs, programming interfaces and tools for managing the larger system. The term system may be used differently in different contexts, but more or less the concept remains the same. Online student course registration system combines …
Read More »Storage and Computation on Big Data: A Comparative study
Introduction As data been increased in everyday life, computing the data and keeping the data secure is one of the important parameters. Over the years, disk storage capacity has improved from 40 MB to 3TB, while disk transfer rate has also been improved from 800 KB/s to 600 MB/s. Here we are indexing two computation algorithms (SaLSa, SSPL) on data …
Read More »A Study on Usage of E-Commerce Through Cell Phones by College Students
Introduction “The Only Thing That Is Constant Is Change”- Heraclitus Electronic commerce or E-commerce consists primarily of the distributing, buying, selling, marketing, and servicing of products or services over electronic systems such as the Internet and other computer networks. In the broad meaning electronic commerce is a means of conducting business using one of many electronic methods, usually involving internet, …
Read More »Operational Monitoring System OMS with WSN (Wireless Sensor Network), RFID, GPS and CCTV in Agriculture
Introduction Recently, an innovations in information communication technology have been increasing the convergence between different industries. The fact of convergence and act and integration of IT with agricultural technology is expected to be an area that could increase the added value and productivity of agriculture by applying the ubiquitous technology to the agricultural sector which is a primary industry. To …
Read More »A Review on Text-Independent Speaker Verification Techniques in Realistic World
Introduction Speaker verification (SV) is the task of validating the claimed identity of a person from his/her voice. It is binary classifications problem in which we are distinguish between a true speaker and an imposter [1]. The Speaker Verification system works in two phases. The first phase – the Training Phase or the Enrollment Phase approximates the speaker to a …
Read More »ICT tool – Development of Calculator for Design of Solar Dryer
Introduction Henry David said “Men Have Become the Tools of Their Tools.” In this era all the developing technology begin from calculation influenced by the ICT-tool. Today energy is main problem, by utilizing sun light energy problem can be minimize. Sun drying is still the most common method used to preserve agricultural products in most tropical and subtropical countries. However, …
Read More »Applications of Energy Aware Routing Protocols in WSN
Introduction Advances in sensor technology, low-power electronics, and low-power radio frequency (RF) design have enabled the development of small, relatively inexpensive and low-power sensors, called micro sensors that can be connected via a wireless network. These wireless micro sensor networks represent a new paradigm for extracting data from the environment and enable the reliable monitoring of a variety of environments …
Read More »Constructing well-organized Wireless Sensor Networks with Low-level Identification
Introduction In most distributed systems, naming of nodes for low-level communication leverages topological location (such as node addresses) and is independent of any application. Typically, higher-level, location-independent naming and communication is built upon these low-level communication primitives using one or more levels of (possibly distributed) binding services that map higher-level names to topological names and sometimes consider application-specific requirements. An …
Read More »Neuro-Fuzzy Based First Responder for Image Forgery Identification
Introduction Image forgery Image forgery is to manipulate the content of an image in such a way that either it hide an important part of the image or represents wrong information. Image forgery is very common of digital crimes carried out. The most familiar targets of these forgeries are photographs, legal or administrative documents and financial documents line checks. Nowadays …
Read More »Digital Image Watermarking – An Overview
Introduction In recent years, digitization plays a big role in human life as numerous applications in field of engineering, healthcare, communication, documentation and many more. Here, multimedia content like image and video is major content. Therefore, authentication, information security and other various issues are raised with multimedia sources and content. Digital data can be stored efficiently and with a very …
Read More »Eigen Values Matrix for Recognition English Letters
Introduction Recognition process is an important task because it performed daily by human in the life and because of its important applications in various fields. The human eye can differentiate between letters even if they are largely similar in shape . Different fonts of alphabets and their Sizes cause a major effort in the process of discrimination . The big …
Read More »Graph Construction Based on Data Base of Movie Objects
New Method for Solving Data Centric Protocol SPIN
Approach to Solving K-Sat Problem Based on Reduction Thereof to the Covering Problem
Introduction SAT-problem is important in systems of evidence automatic verification, where formula is a set of clauses, which mean disjunction of a certain amount of literals – variables Х and X–. This problem has a great importance upon determination of satisfiability of CIRCUIT-SAT schemes (circuit-satisfiability problem) and in pattern recognition problems. The international annual conference (The International Conference on Theory and …
Read More »Semantic Web: XML and RDF Roles
Introduction Semantic web is the future development of World Wide Web (WWW). The information stored by WWW is intended for human use. The contents in the WebPages are left to the user to read and understand also to make connections between information stored in the WebPages. Semantic web allows the user computer to draw the required connections between information in …
Read More »Hybrid Approach for Load Balancing in Cloud Computing
Introduction Cloud computing comes throughout focus development of grid computing, virtualization as well as web technologies. Cloud computing is usually the world wide web based computing That presents infrastructure as service (IaaS), platform as service (PaaS), software as Service (SaaS). Throughout SaaS, software application form is usually created shown through the cloud provider. PaaS a good application development platform for …
Read More »Scheduling Strategies in Hadoop: A Survey
Introduction Cloud computing[1] is an emerging technology which enables convenient, on-demand access to a shared pool of configurable computing resources, such as servers, networking, applications and services. These shared resources can be rapidly deployed and re-deployed with minimal human intervention to meet resource requirements. The resources can be rapidly changed to match the immediate needs of the workload in minutes …
Read More »Advantages and Challeging in E Agriculture
Introduction E-Agriculture is an emerging field focusing on the enhancement of agricultural and rural development through improved information and communication processes. More specifically, e-Agriculture involves the conceptualization, design, development, evaluation and application of innovative ways to use information and communication technologies (IT) in the rural domain, with a primary focus on agriculture. E-Agriculture is a relatively new term and we …
Read More »High Level Security Trust Zones for Private Clouds
Introduction Cloud computing enables a new business model that supports on-demand, pay-for-use, and economies-of-scale IT services over the Internet. The Internet cloud works as a service factory built around virtualized data centers.1 Cloud platforms are dynamically built through virtualization with provisioned hardware, software, networks, and datasets. The idea is to migrate desktop computing to a service-oriented platform using virtual server …
Read More »Text Based Image Compression Using Hexadecimal Conversion
Introduction Image processing applications are drastically increasing over the years. Storage and transmission of digital image has become more of a necessity than luxury these days, hence the importance of Image compression. Image security has become most important aspect while transmission, exchanging and storage of an image. Most of compressions techniques are based on properties of inter pixel redundancy, pixel …
Read More »The Moderating Effect of Knowledge Stocks Capability on the Relationship Between Business Process Reengineering Factors and Organizational Performance Services Firms
Introduction The intensive competition in the globalized business world has forced business institutions to make changes their operation processes beyond local competition to global competitiveness. In same manner, according to Goksoy, Ozsoy and Vayvay (2012) if a firm wants to survive in today’s hypercompetitive environment it needs to bring in moderate change every year and undergo a major change almost …
Read More »Context Driving Speed Limit Alert, Synchronized Monitoring System
Introduction The Context Driving Speed Limit Alert system (CDSLA) has developed by the integration of GPS and GIS for collecting En route traffic data from a probe vehicle. This system has been further integrated with the engine management system of a vehicle to provide time-tagged data on GPS position and actual speed, distance travelled, acceleration, fuel consumption, engine performance, and …
Read More »A Comparison on Different Image Completion Methods
Introduction This paper addresses about, image inpainting or disocclusion and geometric image rearrangement. In image inpainting a special case is texture synthesis constrained by boundary matching with a seed texture. Here an image U is given where a few pixels or a whole region Ω is missing, we wish to recover the lacking information in the best possible way. To …
Read More »