Introduction Many decision-making problems involve a process that takes in several stages (multistage process) in such a way that at each stage, the process is dependent on the strategy choosen. Such type of problems are called Dynamic Programming Problems (D.P.P). Thus it is concerned with the theory of multistage decision process, i.e the process in which a sequence of interrelated …
Read More »Kamran Khan
Living of Student in the Internet Age
Introduction College Students’ Internet Use College students are a unique population. Occupying a middle ground between childhood and adulthood, between work and leisure, college students have been at the forefront of social change since the end of World War II. They were among the first in the U.S. to use the Internet for communication, recreation and file sharing, and the …
Read More »Mining Intelligent E-Voting Data: A Framework
Introduction Extracting knowledge through the mining of raw data has been of major interest for researchers, system developers, business managers and the corporate world as a whole (Sumathi & Sivanandam, 2006). The reason for this is not farfetched, data mining helps in the production of knowledge and the discovery of new patterns to describe the data. This implies hidden or …
Read More »The EVAS Model: Solving E-Voting Problems in Nigeria
Introduction Electioneering is the process used by most countries of the world to select their desired leaders minor or major. The accuracy of the voting process cannot be therefore overemphasized. So far the age long offline method of voting – using paper, has been hunted by spells of corruption and rigging. This fact has not dispelled its use as against …
Read More »Distributed Remote Architectures CORBA
Introduction Transport Layer makes the connection between JVM’s. All connections are stream-based network connections that use TCP/IP. Even if two JVM’s are running on the same physical computer, they connect through their host computer’s TCP/IP network protocol stack. Scheme 1 Click here to View scheme Naming Remote Objects Now you’ll find the answer to that question. Clients find remote services …
Read More »Detection and Classification of EEG Waves
Introduction Electroencephalograph represents complex irregular signals that may provide information about underlying neural activities in the brain. Since the human brain generates a small yet measurable amount electrical signal the degree of activity is measurable. The brain waves recorded from the scalp have a very small amplitude of approximately 100ìV. The frequencies of these brain waves range from 0.5 to …
Read More »A Knowledge-Based Visual Analytics Query System
Introduction Knowledge-based visual analytics (KBVA) is an approach that allows people to conduct visual analytics and design in a way that result in a knowledge base, which can be used to make informative decisions. KBVA supports the decision maker by using knowledge-based systems artificial intelligence tools and visual analytics facilities to work in a narrow domain to provide intelligent decisions …
Read More »Use of XML in HL7
Introduction Healthcare organizations and particularly hospitals are changing their operating philosophies to become profitable, enterprise-like organizations. There is need for the multimedia data transfer mechanisms for the healthcare systems today. Large amount of medical data is stored in various BLOBs (BLOB – Binary Large OBject), like diagnostic images in DICOM or JPG format, Microsoft Word files or scanned documents¹. To …
Read More »Network Intrusion Detection Using Correlation Functional Dependency
Introduction Anderson, in 1980 [1], defined an intrusion attempt or a threat to be the potential possibility of a deliberate unauthorized attempt to access information, or manipulate information, or render a system unreliable or unusable. Since then, several techniques for detecting intrusions have been studied. Despite encrypting, attacks still occur and first layer of defense can still be penetrated. Intrusion …
Read More »SOA-RTDBS: A Service Oriented Architecture (SOA) Supporting Real Time Database Systems
Introduction As data complexity is growing the need for a uniform, efficient, and persistent way to store data is becoming increasingly important. Using a Real-time Database System (RTDBS) as a tightly integrated part of SOA system has the potential to solve many of the problems that application designers have to consider with respect to data management, SOA system can reduce …
Read More »Appraise the Recitation of Intrusion Detection System at Training Time
Introduction There should be no question that one of the most pervasive technology trends in modern computing is an increasing reliance on network connectivity and inter-host communication. Along with the tremendous opportunities for information and resource sharing that this entails comes a heightened need for information security, as computing resources are both more vulnerable and more heavily depended upon than …
Read More »Review of FAT Data Structure of FAT32 File System
Introduction The FAT (File Allocation Table) file system was developed in the late 1970s and early 1980s and was the file system supported by the Microsoft® MS-DOS® operating system.1 It was the primary file system for various operating systems including DR-DOS, FreeDOS, MS-DOS, OS/2 (v1.1) and Microsoft Windows (upto Windows Me). FAT was originally developed for floppy disk drives less than …
Read More »Secure Data Aggregation Using Mobile Agents in Wireless Sensor Networks
Introduction Wireless sensor networks constitute an emerging technology that has received significant attention from the research community. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Sensor networks are typically self-organizing adhoc systems that consist of many small, low-cost devices.In addition to …
Read More »Development and Implementation of Mobile Augmented Reality Systems Application (Live Streaming Through Mobile)
Introduction The recent convergence of the Internet and mobile radio has also accelerated the demand for “Internet in the pocket” on light, low-cost terminals, as well as for wireless technologies like GSM/GPRS[1][2], UMTS, Wi-Fi and WiBro that boost data throughput and reduce cost per bit. Mobile networks are now going multimedia, potentially leading to an explosion in throughput from a …
Read More »Static Analysis and Run-Time Coupling Metrics
Introduction Using object level run time metrics to study coupling between objects” basically tells us how to identify objects from the same class that exhibit non uniform coupling behavior when measures dynamically. Coupling was first introduced in the context of the structural development techniques. Coupling is defined as, “the measure of the strength of association established by a connection from …
Read More »Video Indexing and Retrieval – Applications and Challenges
Introduction Video information plays a central role in multimedia database systems [1]. The amount of video information stored in archives worldwide is very huge. Conservative estimates state that there are more than 6 million hours of video already stored and this number grow at a rate of about 10 percent a year. Projections estimate that by the end of 2010, …
Read More »VPN and IPSEC Server With IDS
Introduction A virtual private network (VPN) links 2 computers through an underlying local or wide-area network, while encapsulating the data and keeping it private. Imagine a pipe within a pipe, and you will have the concept. Even though the outer pipe contains the Before encapsulation,the packets are encrypted so the data is unreadable to outsiders.Packets are separated and returned to …
Read More »Handwritten Libretto Recognition Using Multilayer and Cluster Neural Network
Introduction Character recognition is becoming more and more important in the modern world. It helps humans ease their jobs and solve more complex problems. An example is handwritten character recognition. Handwritten digit recognition is a system widely used in the United States. This system is developed for zip code or postal code recognition that can be employed in mail sorting. …
Read More »Effectiveness of Software Testing Techniques on a Measurement Scale
Introduction Software Testing is the process of executing a program with the intent of finding errors1,2. Testing is focused only on finding faults.3 advocates that the primary goal of testing should be to measure the dependability of tested software. Effective software testing will contribute to the delivery of reliable and quality oriented product, more satisfied user, lower maintenance and more …
Read More »Fiber Bragg Grating (FBG) is Used as Modeling and Simulation for Temperature Sensor
Introduction The refractive index and grating period are the important properties of Fiber Bragg Grating.so we will study the effect of refractive index of FBG and grating period in sensor application.A FBG is a periodic perturbation of refractive index along the fiber length which is formed by exposure of the core to an ultraviolet light.The first FBG demonstrated by Hill …
Read More »Packet Loss Detection Using CPR and WCPR in Diverse Platforms
Introduction Here the two methods TCP-WCPR old and TCP CPR is compared. In this paper we proposed and evaluated the performance of TCP-CPR, a variant of TCP that is specifically designed to handle constant rearranging of packets (both data and acknowledgment packets). Our results show that TCP-CPR is able to achieve high throughput when packets are rearranged and yet is …
Read More »Subanta Pada Analyzer for Sanskrit
Introduction Sanskrit ,an ancient language in India, is known as the language with strong computational grammar associated with it hence an efficient language for computer processing1,2. People with good background of the language , grammar and programming concept will be able to explore its computational aspect, which is a rare combination2. Though the work is being carried out at IIIT …
Read More »Analysis of AES Hardware and Software Implementation
Introduction Initially the AES algorithm was believed of much more security and of no weakness in the ideas of most people. However, recently cryptanalysts have also obtained some breaking methods on the AES. This paper first analyzes the AES algorithm and point out the weakness of linearity existing in the design of S-box and key schedule from the standpoint of …
Read More »A Metrics Suite for Measuring Class Interaction at Run Time Through DCM
Introduction It has been widely recognized that an important component of process improvement is the ability to measure the quality of process. Even if the central role of software development plays in the delivery and application of the software, managers are increasingly focusing on process improvement in the software development area. This emphasis has had two effects. The first is …
Read More »Contrast Enhancement in Gray-Scale Images Using Background Approximation by Blocks and Morphological Operations
Introduction Image enhancement techniques can improve the characteristics or quality of an image, such that the resulting image is better than the original, when compared against a specific criterion. Current research in image enhancement covers such wide topics as algorithms based on the human visual system, histograms with hue preservation, JPEG-based enhancement for the visually impaired and histogram modification techniques. …
Read More »Optimized Equilibrium Attention of Impure and Pure Agents Between High Concentrated Particles and Low Concentrated Particles in Reverse Osmosis Using the Principles of Genetic Algorithm
Introduction Water is another name of life for any living beings. We always crave for safe and healthy drinking water. With the volume of pollution increases day by day, the need and importance to purify the water is also increases with the passage of time. Many scientific experiments are being conducted on a regular basis, but still the cost effective …
Read More »Soft Computing in Bioinformatics: Methodologies and Applications
Introduction Application of soft computing becomes relevant for solving some Bioinformatics and molecular biology problems. Protein classification leads to identification and proper functional assignment of uncharacterized proteins with a final goal towards finding homologies and drug discovery. Again, structure based ligand design is one of the crucial steps in rational drug discovery, where a small molecule is designed by targeting …
Read More »Software Prefetching Using Jump Pointers in Linked Data Structures
Introduction The linked data structures or the LDS traversal often takes place in loops or recursion. There occurs a problem with LDS traversal called as Pointer-chasing problem which takes place if the data is not found in the cache. This problem occurs because LDS consists of the chains of loads which are data dependent on each other and form the …
Read More »Issues of Service Oriented Architecture – A Survey
Introduction In today’s competitive scenario where business demand changes very frequently, the expectation from technology is raised to level where we are expecting the business processes are developed in such a manner that they can adapt the frequent changes without affecting the overall organization business architecture. Thus the need to assume business processes as a smart services that can be …
Read More »Leaf Recognition for Plant Classification Using GLCM and PCA Methods
Introduction Leaf recognition is a pattern recognition task performed specifically on leaves. It can be described as classifying a leaf either “known” or “unknown”, after comparing it with stored known leaves. It is also desirable to have a system that has the ability of learning to recognize unknown leaves. Computational models of leaf recognition must address several difficult problems. This …
Read More »Implementation of VRML, STL File Parser with Passive Stereo Vision
Introduction Modeling softwares like I-DEAS, PRO-E, CATIA etc, are an integrated package of mechanical engineering, mainly used in the CAD/CAM application. These softwares were designed to facilitate a concurrent engineering approach to mechanical engineering product design, 3D modeling, analysis and manufacturing applications. The 3D models generated using these softwares contains huge details thereby leading to a heavy file size including …
Read More »Development of Digital Spectral Library and Classification of Rice Crop Using Compressed ASTER L1 B Satellite Data
Introduction Multispectral Image Processing (MIP) is a collection of techniques for the manipulation of high-density and multi-date, multi-stage, multi-polarized, multi-direction and multi-spectral satellite images by computers. MIP is an application of DIP (Digital Image Processing) having a great potential to identify specific plant species in vegetation covered area. It is widely used in crop protection, estimation of physiology and detection …
Read More »Software Quality Measurement: A Revisit
Introduction During the past decades, computer plays a significant role in every field of our modern society and the computer software is affecting the human being in every aspect of life. Due to our society’s increasing dependence on software, the size and complexity of computer software has grown at a very high peak. Dependency and requirements on computer software increases …
Read More »JPEG Compression Steganography
Introduction The past decade has witnessed a surge of research activity in multimedia information hiding, targeting applications such as steganography,1 digital rights management, and document authentication. Numerous works are available in the literature related with the Image Steganography. We propose a framework for hiding large volumes of data in images while incurring minimal perceptual degradation. The embedded data can be recovered …
Read More »Identities Involving I-Function
An SCDFT Aspect of Renormalized Phonon- Induced HTSC in Doped HTSCD Mg1-Xalxb2
Introduction The modern scientific and technological revolution is responsible for increasing interest and impetus in search for high phase transition temperature (Tc) superconductivity (HTSC) in diboride (HTSCD)1 pure MgB2 and doped MgB2 with different cationic dopants so as to be SC at even higher temperature than MgB2. The amount of nanometer sized precipitates and grain boundaries be found in the …
Read More »Emerging Information Communication Technologies to Modernize College Libraries
Introduction As we are aware a huge amount of information is being published every second through various applications of information technologies in several medium. Throughout history, a number of technological advances have had great impact on society. These advances either provided a capability which was previously unknown or provided great improvement in efficiency of an activity. For example the invention …
Read More »Analyzing Service Integration Between UMTS and WLAN Network
Introduction The vision of the ubiquitous telecommunication network that allows subscribers using any device to access any services at anytime is not so far from reality. Two dominant wireless networks of the future, UMTS and WLAN, are being merged. 3GPP (Third Generation Partnership Project) has partly defined architecture for accessing 3G services from WLAN access network but it has not …
Read More »CFD Analysis of Slot Jet Impingement Cooling on Concave Surface
Introduction CFD has now become an integral part of the engineering design and analysis2-3. Engineers can make use of the CFD tools to simulate fluid flow and heat transfer phenomena in a design and predict the system performance before manufacturing. The advantages of CFD are numerous, namely, fewer iterations to the final design, shorter time to launch the product, fewer …
Read More »Identifying a Generic N-Tier Architecture Framework for Web-Based Applications
Introduction N-tier is a client-server architecture in which the presentation, the application processing, and the data management are logically separate process. Tier Architecture is the simplest, single tier on single user, and is the equivalent of running an application on a personal computer. The entire required components to run the application are located within it. The tier architectures have been …
Read More »Application of SPSS Software in Preparing Correlation Matrix
Introduction The tremendous increase in industrial activity during the last few decades and the release of obnoxious industrial wastes into the environment, have been of considerable concern in recent years from the point of view of environmental pollution. Paper mills are generating large quantity of effluents as a consequence of pulping and bleaching processes. During this pulping process a large …
Read More »Data Allocation in a Mobile Computing Network with Minimized Response Time and Communication Cost
Introduction Recently, the number of mobile users has increased explosively worldwide, owing to the technological advances of mobile devices and wireless data networking. Mobile users can access a great deal of information though wireless communications such as mobile phones in mobile computing systems. Mobile communications are influencing our everyday lives tremendously from both economic and social perspective. One of the …
Read More »Shape Optimization of Pedestals Using Artificial Neural Network
Introduction Th main objective of shape optimization is to find the shape which is optimal in the sense that it minimizes a certain objective function while satisfying the given constraints. Shape optimization is complex in the sense that the shapes are continuously changing during the optimization process. Careful consideration has to be paid to describe the changing boundary shape, to …
Read More »Overview of the Artificial Neural Networks and Fuzzy Logic Applications in Operational Hydrological Forecasting Systems
Introduction Artificial neural networks are widely used as an effective approach for handling non-linear and noisy data, especially in situations where the physical processes relationships are not fully understood and they are also particularly well suited to modelling complex systems on a real-time basis. Fuzzy logic is a generalisation of Boolean logic implementing the concept of partial truth or uncertainty, …
Read More »A New Green Approach to 2,3–Dihydro-1H-1,5 –Benzodiazepines
Introduction Benzodiazepines are very important compounds because of their pharmacological properties.1 Despite their importance from a pharmacological point of view, comparatively few methods for the preparation of 1,5- benzodiazepines have been reported. These include condensation reaction of o-phenylenediamines with α,β-unsaturated carbonyl compounds or ketones in the presence of BF3–OEt2, NaBH4, polyphosphoric acid, SiO2, MgO and POCl3.2-6 Unfortunately, many of these processes …
Read More »Hiding the Text Into 24-Bit BMP Images Using XOR Operation With the Use of MSB
Introduction Hiding the text into the digital media are used because of secrete communication between the two parties. This process is different from cryptography. Since cryptography is used to change the information into unreadable form. So, the third parties are understood that the information in unreadable form is sending from one party to another party. But, in Hiding the text …
Read More »Modularizing the Cross Cutting Concerns Through Aspect-Oriented Programming
Introduction The design and evolution of programming languages is one of the most important areas of computer science. People sought to formalize methods for constructing correct, efficient and easily modified programs. Languages have continued to evolve in order to support their ever increasing usage and support new requirements. The history is full of with examples of improvements in our approach …
Read More »Rule-Based Metadata Extraction for Heterogeneous References
Introduction Metadata is, most generally, data that describes other data to enhance their usefulness in content explanation. Metadata extraction is a special case of information extraction. It occurs when an algorithm automatically extracts metadata from a resource’s content.9 Building tools for automatic metadata extraction and representation significantly improve the amount of metadata available, the quality of metadata extracted, and the efficiency …
Read More »