Arabic language differs from other languages in some features such as right-to-left writing, unfamiliar letters and sounds, using one of the letter’s forms depending on the letter’s position in a word, and attaching a diacritical mark to a letter to show how it is pronounced. It is important to provide a new transcription that follows Arabic direction an...
Paper Information
Authors Ahmed MOSA, Katsuhiko KAKEHI
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 45

Privacy is a critical issue when the patient message storage or processing to the medical services. Digital Image processing is the quick emerging area of medical science. The improvement of image processing was given by the technology improvement like digital visualizing, computer processor and large storage devices. Image processing allowed to compute the image in multidimensional with...
Paper Information
Authors Dr. Santhosh Baboo, V R Sasikumar
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 23

Cloud computing is a global established system. Quantum computing is hypothetical model which is still in tentative analysis. Cloud system has some weakness in security, processing, backup and vicinity. Somehow quantum computing illustrates some revolutionary solution to overcome cloud weakness. Most researchers are optimistic in quantum computing that it will improve cloud system. It is...
Paper Information
Authors Mijanur Rahaman, Md. Masudul Islam
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 26

Data clustering is a well known technique for fuzzy model identification or fuzzy modelling for apprehending the system behavior in the form of fuzzy if-then rules based on experimental data. Fuzzy c- Means (FCM) clustering and subtractive clustering (SC) are efficient techniques for fuzzy rule extraction in fuzzy modeling of Adaptive Neuro-fuzzy Inference System (ANFIS). In this paper w...
Paper Information
Authors Sharifa Rajab, Vinod Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 48

Recently, the Rijndael algorithm has been uniform by the National Institute of Standards and Technology (NIST) as the Advanced Encryption Standard (AES). This makes AES a vital and necessary data-protection mechanism for federal agencies in the US and other countries. In AES, rotation occurs in key expansion, ciphering, and deciphering. Rotation is vital for confusion and diffusion, whic...
Paper Information
Authors Dr. Mohamed Abd Elhamid Ibrahim. Moustafa Mousa El Bahtity
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 45

In Multimodal biometrics system two or more biometric attributes are combined which makes it far more secure than unimodal system as it nullifies all the vulnerabilities of it. But with the prompt ontogenesis of information technology, even the biometric data is not secure. There is one such technique that is implemented to secure the biometric data from inadvertent or deliberate attacks...
Paper Information
Authors Shashi Choudhary, Naveen Choudhary
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

In the Research paper I explained about working Google Web indexing, crawling and ranking algorithms. On every new day Google and other search Engines are changing their way to index and rank website. It explains the way to get ranks your website with safest way and keep your business moving towards top positions. The paper provides in-depth analysis of all big hits of Google by updates ...
Paper Information
Authors Muhammad Zahid Iqbal
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 32

To meet the requirement of an efficient software defect prediction,in this paper an evolutionary computing based neural network learning scheme has been developed that alleviates the existing Artificial Neural Network (ANN) limitations such as local minima and convergence issues. To achieve optimal software defect prediction, in this paper, Adaptive-Genetic Algorithm (A-GA) based ANN lea...
Paper Information
Authors Racharla Suresh Kumar, Prof. Bachala Sathyanarayana
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 32

In the last decade, Networks-on-Chips became the leading edge technology due to the growing requirements of electronic systems. Basically, NoC is an advancement of bus interconnect technology. The challenge is to interconnect existing components such as processors, controllers, and memory arrays in such a way that there is an optimal utilization of communication resources necessitating o...
Paper Information
Authors Vaishali Maheshwari, Dr. Naveen Choudhary
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 28

Wireless Sensor Network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions. Wireless sensors networks (WSNs) can operate in harsh environments in which actual monitoring by human being are risky, inefficient and sometimes infeasible. This is the main advantages of WSN. In most of the cas...
Paper Information
Authors Sunita Gupta, Dr. K.C. Roy
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23