The existing wavelet-based image resolution enhancement techniques have many assumptions, such as limitation of the way to generate low-resolution images and the selection of wavelet functions, which limits their applications in different fields. This paper initially identifies the factors that effectively affect the performance of these techniques and quantitatively evaluates the impact...
Paper Information
Authors Wasnaa Witwit , Yitian Zhao , Karl Jenkins, Yifan Zhao
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 20

WBASN is an effective solution that has been proposed in terms of improving the solutions and there are varied benefits that have been achieved from the usage of WBASN solutions in communication, healthcare domain. From the review of stats on rising number of wireless devices and solutions that are coming up which is embraced by the people as wearable devices, implants for medical diagno...
Paper Information
Authors V.T. Venkateswarlu, Dr. P. V. Naganjaneyulu, Dr. D.N.Rao
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 30

Opinion mining and sentiment analysis methods has become a prerogative models in terms of gaining insights from the huge volume of data that is being generated from vivid sources. There are vivid range of data that is being generated from varied sources. If such veracity and variety of data can be explored in terms of evaluating the opinion mining process, it could help the target groups...
Paper Information
Authors K.Venkata Rama Rao
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 28

Cloud computing has become a revolutionary development that has changed the dynamics of business for the organizations and in IT infrastructure management. While in one dimension, it has improved the scope of access, reliability, performance and operational efficiency, in the other dimension, it has created a paradigm shift in the way IT systems are managed in an organizational environme...
Paper Information
Authors P.Sowjanya
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 44

Wireless Sensor network routing protocols are prone to various attacks as these protocols mainly provide the function of routing data towards the sink. LEACH is a one of the routing protocol used for clustered implementation of wireless sensor network with Received Signal Strength based dynamic selection of Cluster Heads. But, as with other routing protocols, LEACH is also prone to HELLO...
Paper Information
Authors Rupinder Singh, Dr. Jatinder Singh, Dr. Ravinder Singh
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 40

Police say alcohol, drugs and speed are the three major factors that cause collisions, we thought that it would be insightful to analyze the collision data to ensure the correctness of this conclusion; and also to get further information like what age groups were involved, in what areas have accidents occurred, what were the reasons behind collisions, etc. These experiences can possibly ...
Paper Information
Authors Manik Katyal, Parag Chhadva, Shubhra Wahi, Jongwook Woo
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

In this study, a contemporary method of scheduling algorithm has been proposed for working on scheduling of varying size data-frames transmission in CR based wireless networks. The objective of the proposed model is to achieve maximum throughput, and also reduction of loss of dataframes in the transmission. Some of the key elements that are considered in the development of the model are ...
Paper Information
Authors N Shribala, Dr. P.Srihari, Dr. B. C. Jinaga
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

In the paper created a new encryption algorithms GOST28147–89–IDEA8–4 and GOST28147–89–RFWKIDEA8– 4 based on networks IDEA8–4 and RFWKIDEA8–4, with the use the round function of the encryption algorithm GOST 28147–89. The block length of...
Paper Information
Authors Gulom Tuychiev
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 36

Text mining, also known as Intelligent Text Analysis is an important research area. It is very difficult to focus on the most appropriate information due to the high dimensionality of data. Feature Extraction is one of the important techniques in data reduction to discover the most important features. Proce- ssing massive amount of data stored in a unstructured form is a challenging task...
Paper Information
Authors Ramya R S, Venugopal K R, Iyengar S S, Patnaik L M
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 20

Various image retrieval methods are derived using local features, and among them the local binary pattern (LBP) approach is very famous. The basic disadvantage of these methods is they completely fail in representing features derived from large or macro structures or regions, which are very much essential to represent natural images. To address this multi block LBP are proposed in the li...
Paper Information
Authors V Vijaya Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 36