As a basic and important term in the interaction design, usability is an overall rating of the degree of use in the human computer interaction, which guarantees the realization of interaction. Usability test is a necessary process in the human computer interface design. It is a process of through systematically collecting the usability data of interface and assessing and improving the da...
Paper Information
Authors Najmeh Ghasemifard, Mahboubeh Shamsi, Abol Reza Rasouli Kenari, Vahid Ahmadi
Read Journal Click Here
Read Paper Click Here
Page No. 16 to 24

Big Data have gained enormous attention in recent years. Analyzing big data is very common requirement today and such requirements become nightmare when analyzing of bulk data source such as twitter twits are done, it is really a big challenge to analyze the bulk amount of twits to get relevance and different patterns of information on timely manner.This paper will explore the concept of...
Paper Information
Authors Abdul Ghaffar Shoro, Tariq Rahim Soomro
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 14

Arabic content on the Internet and other digital media is increasing exponentially, and the number of Arab users of these media has multiplied by more than 20 over the past five years. There is a real need to save allocated space for this content as well as allowing more efficient usage, searching, and retrieving information operations on this content. Using techniques borrowed from othe...
Paper Information
Authors Arafat Awajan, Enas Abu Jrai
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Voice Over Internet Protocol (VOIP) is a rapidlygrowing Internet service for telephone communication. However, while it offers a number of cost advantages over traditional telephone service, it can pose a security threat, especially when used over public networks. In the absence of sufficient security, users of public networks are open to threats such as identity theft, man-in-the-middle...
Paper Information
Authors Md. Shahidul Islm, Md. Mahbub Rahman
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 42

In this paper we present automated text classification in text mining that is gaining greater relevance in various fields every day. Text mining primarily focuses on developing text classification systems able to automatically classify huge volume of documents, comprising of unstructured and semi structured data. The process of retrieval, classification and summarization simplifies extra...
Paper Information
Authors Venkata Ramana.A, Dr.E.Kesavulu Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 34

Wireless Sensor Network (WSN) is a network composed of distributed autonomous devices using sensors. Sensor nodes send their collected data to a determined node called Sink. The sink processes data and performs appropriate actions. Nodes using routing protocol determine a path for sending data to sink. Congestion occurs when too many sources are sending too much of data for network to ha...
Paper Information
Authors Md. Ahsanul Hoque, Nazrul Islam, Sajjad Waheed, Abu Sayed Siddique
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 38

Future world is moving towards cloud computing. In a word cloud computing can be defined as remote access computing resources through the Internet. It provides a lot of services at a very low cost. It can improve an organization’s performance by minimizing its cost. It also helps to maximize their revenue with fewer resources. It is becoming popular among organizations a...
Paper Information
Authors Sajjad Waheed, Nazrul Islam, Barnaly Paul Chaity, Saddam Hossain Bhuiyan
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 36

Service composition in service oriented architecture is an important activity. In regard to achieve the quality of service and secured activities from the web service compositions, they need to be verified about their impact towards fault proneness before deploying that service composition. Henceforth, here in this paper, we devised a novel statistical approach to assess the service comp...
Paper Information
Authors Sujatha Varadi, G Appa Rao
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 17

Anomaly detection systems are extensively used security tools to detect cyber-threats and attack activities in computer systems and networks. In this paper, we present Text Mining-Based Anomaly Detection (TMAD) model. We discuss n-gram text categorization and focus our attention on a main contribution of method TF-IDF (Term frequency, inverse document frequency), which enhance the perfor...
Paper Information
Authors Mohsen Kakavand, Norwati Mustapha,Aida Mustapha, Mohd Taufik Abdullah
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 31

An Image fusion is the development of amalgamating two or more image of common characteristic to form a single image which acquires all the essential features of original image. Nowadays lots of work is going to be done on the field of image fusion and also used in various application such as medical imaging and multi spectra sensor image fusing etc. For fusing the image various techniqu...
Paper Information
Authors Vinay Sahu, Dinesh Sahu
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 28