INTRODUCTION Least Squares Regression (LSR) is a widely-used statistical analysis technique. It has been adapted to many real-world situations. LSR earns its place as a fundamental tool due to its effectiveness for data analysis as well as its completeness in statistics theory. Many variants have been developed, including weighted LSR [1], partial LSR [2], and other extensions (for example, ridge …
Read More »Kamran Khan
Search Engine Selection Approach In Metasearch Using Past Queries
INTRODUCTION Search Engines are widely used for information retrieval, two types of search engines exist. General-purpose search engines aim at providing the capability to search all pages on the Web. Special-purpose search engines, on the other hand, focus on documents in confined domains such as documents in an organization or in a specific subject area [11]. But any single search …
Read More »Fifth Generation Technology (Nano Technology)
Introduction 5G Technology stands for 5th Generation Mobile technology. 5G mobile technology has changed the means to use cell phones within very high bandwidth. User never experienced ever before such a high value technology. Nowadays mobile users have much knowledge of the cell phone technology. The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future. The …
Read More »A Review Study: Automated Risk Identification Tool For Software Development Process
INTRODUCTION The risk management is all about managing the risks which occur. Many concepts of software risk management are there but the most important from them are risk index (can be categorised as high level risk, medium level risk and low level risk), risk assessment (it involves the accurate understanding of the current system and it’s all other features like …
Read More »Pattern Detection With Improved Preprocessing In Web Log
Introduction The Web is a huge, explosive, diverse, dynamic and mostly unstructured data repository, which supplies incredible amount of information, and also raises the complexity of how to deal with the information from the different perspectives of view, users, web service providers, business analysts. The users want to have the effective search tools to find relevant information easily and precisely. …
Read More »A Lightweight Approach Multiplexing Resource Allocation Scheme by Virtualization based on Time Series in SOC
INTRODUCTION Cloud computing has emerged as a compelling paradigm for deploying distributed services. Resource allocation problem in Cloud systems emphasizes how to harness the multi-attribute resources by multiplexing operating systems. With virtual machine (VM) technology [1], we are able to multiplex several operating systems on the same hardware and allow task execution over its VM substrates without performance interference. Fine-grained …
Read More »Selecting the optimal location of wireless communication network Stations
Introduction The wireless Mobile communications plays a crucial rule in human lives. It helps to communicate and exchange information regardless of looking for the distance between the communicated persons. Technology was developed in an explosive manner so that it attracts users to change their equipment and start using new services. current systems were concentrated more on user’s expectations and needs …
Read More »Encryption of Images and Signals Using Wavelet Transform and Permutation Algorithm
INTRODUCTION Image encryption techniques are extensively used to overcome the problem of secure transmission for both images and text over the electronic media by using the conventional cryptographic algorithms. But the problem is that it cannot be used in case of huge amount of data and high resolution images[1,2] Partial or selective encryption is the technique of securing the confidentiality …
Read More »Decentralized Self-Adaptation Mechanism for Service Based Applications in Cloud using Spectral Clustering
INTRODUCTION Self-adaptation, as a concept, has been around for many years, in several domains like biology, chemistry, logistics, economics etc. Self-adaptivity in computer-based systems is relatively newer. Some of the first references to self-adaptive software systems are from [41], [35], [34] and [31] (where they are referred to, as autonomic systems). By self-adaptivity in software systems, we mean software that …
Read More »Root to Fruit (1): An Evolutionary Study of Sorting Problem
Why should do evolutionary study? Computer science is the science of people ideology. Invention of computers has changed the life of human being alike the invention of wheel. The birth, evolution and development of computer science theories condense the scientists’ method of thinking and research, which is more valuable than the any specific knowledge. Indeed, Philosopher George Santanya stated that …
Read More »Mining Frequent Itemsetset Using Assosiation Rule
INTRODUNCTION The mining of association rules is performed in two stages: The discovery of frequency sets of items from the data and the generation of association rules from frequency item set. The first stage is computationally intensive And the second stage has the drawback of possible generating thousands of rules, thus making the analysis of the results has to perform …
Read More »Knowledge Models, current Knowledge Acquisition Techniques and Developments
Introduction The Possible ways of representing the knowledge while acquiring knowledge from experts are termed as Knowledge Models. The process of knowledge acquisition includes elicitation, collection, analysis, modelling and validation of knowledge. Hence the knowledge which has been acquired should focus on essential knowledge. And it should capture tacit knowledge. It should allow the knowledge to be collated from different …
Read More »Study and Analysis of Efficient AES Multi-Layer Key
Heart Disease Prediction System Using Data Mining Techniques
Introduction Data mining has already established as a novel field for exploring hidden patterns in the huge datasets. Medical science is another field where large amount of data is generated using different clinical reports and other patient symptoms. Data mining can also be used heavily for the same purpose in medical datasets also. These explored hidden patterns in medical datasets …
Read More »Pruning Process Influences on Recognition Rate of Skeletal Shapes
Introduction Skeletons can be viewed as a compact shape representation in that each shape can be completely reconstructed from its skeleton. However, the usefulness of a skeletal representation is strongly limited by its instability. Skeletons suffer from contour noise in that small contour deformation may lead to large structural changes in the skeleton. A large number of skeleton computation and …
Read More »A Survey on Radio Frequency Identification (RFID)
Introduction Radio frequency identification uses a semiconductor (micro-chip) in a tag or label to transmit stored data when the tag or label is exposed to radio waves of the correct frequency. RFID tags, or simply “tags”, are small transponders that respond to queries from a reader by wirelessly transmitting a serial number or similar identifier. They are heavily used to …
Read More »Automatic Railway Gate Control Using Microcontroller
Introduction Railway safety is a crucial aspect of rail operation over the world. Railways being the cheapest mode of transportation are preferred over all the other means. When we read newspaper, we come across many railway accidents occurring at unmanned railway crossings. This is mainly due to the carelessness in manual operations or lack of workers. And also the collision …
Read More »New Method for Image Features Extracting Based on Enhanced Chain Code
Introduction Image features are useful extractable attributes of images. Examples of image features are the histogram and the symmetry of a region of interest. Histograms are considered a low-level feature, while geometric descriptors as symmetry or orientation of regions of interest provide examples of high-level features. Some features, such as histograms and texture features, are statistical in nature, while others, …
Read More »Providing a Method Based on the Path Indexes in Optimizing XML Queries
Introduction XML documents have a tree structure called DOM. On the other hand, languages, which are used to respond queries, have a textual structure. Therefore, this structure conversion is necessary. In continuance, because of not requiring to be related to a special language, we define a structure called Tree Pattern Query. Fortunately, all query languages in XML are simply convertible …
Read More »Applications and Trends in Data Mining
Introduction Data mining is the process of extraction of interesting (nontrivial, implicit, previously unknown and potentially useful) patterns or knowledge from huge amount of data. It is the set of activities used to find new, hidden or unexpected patterns in data of unusual patterns in data. Data Mining is the exploration and analysis of large sets, in order to discover …
Read More »Biometric Technology Based on Hand Vein
Introduction Blood loaded with oxygen comes into the hands through the arteries, and then again towards the heart through the veins. The oxygen depleted blood is not the same as the absorption filter arterial it absorbs light at wavelengths near infrared (about 760 microns). When the hand is illuminated with infrared light, the vein appears black. It is recorded as …
Read More »Control Algorithm to the Semantic Data Security in Computer Networks
Introduction We will discuss here the right of the user to access the data that will keep the data confidential for various reasons, such as: Plans things personal and private, and the campaign, military information, or government plans if there is not an effective way to ensure data security, it may be the user and unauthorized access to the data …
Read More »A Methodology in Mobile Networks for Global Roaming
Introduction The next-generation mobile network will be an integrated global system that provides Heterogeneous services across network providers, network backbones, and geographical regions Global roaming is a basic service of the future mobile networks, where terminal mobility, personal mobility, and service provider portability must be supported. In a wireless network, a node (mobile-phone) will be present in a region and …
Read More »The Multi-Agents Immune System for Network Intrusions Detection (MAISID)
Introduction Networks safety and the intrusion detection systems are the subject of several works; first models goes back to1984, they are focused on statistical analysis, expert system, and classification rules (IDES5,13, Nides3,13, MIDAS8, National Institute of Telecommunications and Information Technology and Communication INTTIC, Senia street, elm’naouar, Oran Algéria. DIDS15, NADIR9, ADAM4). These models are already based on the attacks indexed …
Read More »Robots Considered Harmful
Cloud for Education: the Challenges of Current Reign
Adding TCP-Variants to NS-2
Analytical Study for Optimal Time Parameter in Cellular Communication Data Analysis
Search Engine: A Review
Digital Vector Map Watermarking: Applications, Techniques and Attacks
Parallel Mining Association Rules in Calculation Grids
An Efficient Edge Detection Method Based on Bit-Plane Slicing for Bacterial Images
Comparative Study and Performance Analysis of DSDV, OLSR, AODV, DSR And MAODV Routing Protocols in Manets
Role of Information and Communication Technology in Education
Dangers of Internet to Society and Practical Avoidance
Effect of the Neuron Coding by Gaussian Receptive Fields on Enhancing the Performance of Spiking Neural Network for an Automatic Lipreading System
Edge Enhancement in Indoor Digital Images
Introduction Digital image processing is the use of computer algorithms to perform image processing on digital images. Edge enhancement plays a vital role in Digital image processing. Edge enhancement is a pre-processing technique for all images. It is planned to perform automatic edge enhancement in indoor digital images. Indoor images can be generated by using Digital camera. The characteristics of …
Read More »Composite and Mutual Link Prediction using SVM in Social Networks
Introduction A social networking service is an online service, platform, or site that target to facilitating the building of social networks or social relations between people who, for example, share importance’s, activities, backgrounds, or real-life communications. A social network service consists of a representation of each user, his/her social links, and a variety of new services. This is used to …
Read More »