Today the present world mostly depends on exchange of information i.e. transfer of data from one person to another person which is also known as distributary system. The data is sent from the distributor to the user are confidential so the data is distributed only between the distributor and the trusted third parties. The data sent by the distributor must be secured, confidential and mus...
Paper Information
Authors Sandilya Pemmaraju, V. Sushma, Dr. K.V.Daya.Sagar
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 15

Air pollution is one of environmental issues that cannot be ignored. The heavy transportation and urbanization result in the air pollutants concentrated in certain areas. Inhaling pollutants for a long time causes damages in human health. Traditional air quality monitoring methods, such as building air quality monitoring stations, are typically expensive. In addition, monitoring stations...
Paper Information
Authors D.Yaswanth, B.Bhanu Satwik
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 26

There is always a possibility of errors to happen into the system when we transmit data over a data link or a network which may affect the integrity of the system leading into a compromised transmission, according to this The performance of the system can be estimated by bit error rate AS (BER)provides an ideal way to achieved such transmission. In this paper we present a graphical user ...
Paper Information
Authors Ahmed Alahdal, Dr.G. N. Shinde
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 19

The present paper reports on the development of an intelligent virtual grader for assessing apple quality using machine vision. The heart of the proposed virtual grader was executed in the form of K-Nearest Neighbor (K-NN) classifier designed on the architecture of Euclidean distance metric. KNN classifier is executed for this particular application due to its robustness to the noisy env...
Paper Information
Authors Ajay Pal Singh Chuahan, Amar Partap Singh Pharwaha
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 12

Large amount of data is embedded in media and spread in the internet. This data can be replaced easily with the help of some software. Digital watermarking is a very useful technology in today’s world, to prevent illegal copying of data. Digital watermarking can be applied to all forms of multimedia. ...
Paper Information
Authors B. Sai Sindhush, R.V Keshava Rao, Dr. R. Bulli Babu
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 3

Insider attacks formed the biggest threaten against database management systems. There are many mechanisms have been developed to detect and prevent the insider attacks called Detection of Malicious Activities in Database Systems DEMIDS. The DEMIDS consider as one of the last defenses mechanism of the database security system. There are many mechanisms that have been developed to detect ...
Paper Information
Authors Chitanlapudi Sai Charan,Varada Bharat Srinivas, Dr. K.V.Daya Sagar
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Mobility Prediction of a Moving Node and Network Delay is an important performance characteristic of a wireless network. The Data delivery Delay of a network specifies how long it takes for a data to travel across the network from one node or endpoint to another. It is typically measured in multiples or fractions of seconds. The work presented here belongs to domain of data mining cum wi...
Paper Information
Authors K.Nithiya, A.Vinoth Kannan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Recent times, Storing data over the cloud has become more common for the reason that the data could be accessed globally .The data being stored on the cloud could involve confidential data, that needs security. The confidential data that is stored on the cloud through the database could be anything like username, email, password etc. This paper presents the idea/implementation of an Enha...
Paper Information
Authors VenkatSampath Raja Gogineni , K.Raghava Rao
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 12

This study presents a new approach for predicting fault proneness in object classes. A new metric called weighted coupling between objects or wcbo, measures a new unit called weighted coupling between objects. The approach then ranks each class of the object based on its fault proneness using the HITS algorithm that measures hub and authority weights in link analysis. The proposed metric...
Paper Information
Authors SAIDULU A
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 39

Abstract- The rapid growth in the usage of the internet had led to many serious security issues in the network. The intrusion detection system (IDS) is one of the sophisticated defensive systems used to detect the malicious activities happening in the network services across the world.Hence, more advanced IDS are been developed in past few years. To improve the performance of the IDS, th...
Paper Information
Authors V. Jyothsna, V. V. Rama Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 43 to 50