Search engines rank web pages according to different conditions. Some of them use publication time, some use last time of update, some checks the currency of the content of the web page. In this paper, a new algorithm is proposed which will work on the time of the web page, temporal information of the content and forms a binary tree to rank among web pages. ...
Paper Information
Authors Kashfia Sailunaz, Sabiha Firdaus, Ahmed Shoeb Al Hasan
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 7

This article discusses the architecture design of DMA controller on high performance GPS receiver based on RTEMS. We achieve the optimal integration of DMA IP and navigation baseband system. We designed the hardware architecture of DMA IP and make full use of hardware performance with the idea of multiplexing. We use register and FIFO buffer to achieve read-write control. And we design t...
Paper Information
Authors Abdulraqeb Alnabihi , Prof. Liu Yijun
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 42

Web-Commerce applications are now an indispensable aspect of businesses around the world. More businesses are now migrating from outdated applications to a new type of combined ebusiness designs. With such large volumes of applications that need to be put online, there is now a dire need for measurable and quantifiable metrics that can help in gauging the quality of these websites. The d...
Paper Information
Authors Qasim Zia
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 31

A MANET is considered as self administrating network in which nodes are free to come and join to communicate with various nodes. A network which has a lot of advantages for its characteristics also has disadvantage of being attacked by some malicious node. Since MANET requires that each node should posses a unique, distinct identity, Sybil attack is one of the major threat to MANET. A Sy...
Paper Information
Authors Gaurav Jain, Kalpana Jain, Rajdeep S. Shaktawat
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

A central processing unit (CPU), also referred to as a central processor unit, is the hardware within a computer that carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system. The term has been in use in the computer industry at least since the early 1960s.The form, design, and implementation of CPUs have ...
Paper Information
Authors Abdulraqeb Abdullah Saeed Abdo, Liu Yijun
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 32

A novel approach has been presented to compute the probabilities of unsuccessful handovers based number of free channels available in the target AP and number of free channels available plus based on the mobility of mobile device. The number of free channels in the AP is 16 and the mobility of the mobile device in the 8 different directions is considered. The directions of movement are 0...
Paper Information
Authors Subrahmanyam, K.Chennakesava Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Day to day Social network information growth pursues an exponential pattern, and Present DB management systems cannot manage efficiently such a huge volume of data. It is essential to employ a “big data” solution for Social network problems. One of the most important problems in Social network is finding User likeness (ULi). Current methods for finding ULi ar...
Paper Information
Authors D. Ravikiran, Dr. S.V.N Srinivasu
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 36

A major problems in the operation of laptop computers is overheating since it can affect the performance and stability, sometimes leading to system crash and hardware fatality. The objective of this work was to study the thermal behavior inside a laptop computer and to test the effectiveness of aproposed cooling method to overcome overheating problem. The proposed cooling system containe...
Paper Information
Authors Mohammed A. Bou-Rabee , Shaharin A. Sulaiman ,Wan M. S. W. Mazlan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

Clustering is a technique in data mining which divides given data set into small clusters based on their similarity. K-means clustering algorithm is a popular, unsupervised and iterative clustering algorithm which divides given dataset into k clusters. But there are some drawbacks of traditional k-means clustering algorithm such as it takes more time to run as it has to calculate distanc...
Paper Information
Authors Juhi Katara, Naveen Choudhary
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

The earlier defect prediction and fault removal can play a vital role in ensuring software reliability and quality of service. In this paper Hybrid Evolutionary computing based Neural Network (HENN) based software defect prediction model has been developed. For HENN an adaptive genetic algorithm (A-GA) has been developed that alleviates the key existing limitations like local minima and ...
Paper Information
Authors Racharla Suresh Kumar, Prof. Bachala Sathyanarayana
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 38