An approach is proposed that can be used to make these arch adaptive according to each user’s need using ontology .Our approach is distinct because it allows each user to perform more fine-grained search by capturing changes of each user’s preferences without any user effort. Such a method is not performed in typical search engines. ...
Paper Information
Authors Dr. V S Dhaka, Aditi Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 21

This paper presents a specific and innovative implementation of cultural algorithm, which attempts to solve the assignment problem using a simplified computational procedure, which in our view is considered to be efficient than genetic algorithm. It consists of a population component almost identical to that of the genetic algorithm and, in addition, a knowledge component called the beli...
Paper Information
Authors Dr. V.Balachandran, Kaliyaperumal Karthikeyan, A. Namachivayam
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 27

Service Oriented Applications have the ability to change their constituent services dynamically. This implies that they have the ability to change both, their functionality and their Quality of Service attributes dynamically. We present a Cloud-based-Multi-Agent System (Clobmas) that uses multiple double auctions, to enable applications to self-adapt, based on their Quality of Service re...
Paper Information
Authors L. Venkateswara Reddy, C.Rajeev
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 19

Over past few years, the concept of NLPP and their related results based on generalized invexity has become one of the prominent and important areas of classical optimization. This paper presents a brief review on such problems and their respective results in game theory, continuous time programming, multivariable optimization, composite programming etc. ...
Paper Information
Authors L. V. Reddy, B. Satyanarayana, D. Devanandam
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 16

Voice Over Internet Protocol (VOIP) is a rapidlygrowing Internet service for telephone communication. However, while it offers a number of cost advantages over traditional telephone service, it can pose a security threat, especially when used over public networks. In the absence of sufficient security, users of public networks are open to threats such as identity theft, man-in-the-middle...
Paper Information
Authors Md. Shahidul Islm
Read Journal Click Here
Read Paper Click Here
Page No. 53 to 56

Image Compression has become extremely important today with the continuous development of internet, remote sensing and satellite communication techniques. In general, single Wavelet is not suitable for all types of images. This paper proposes a novel approach for dynamic selection of suitable wavelet and effective Image Compression. Dynamic selection of suitable wavelet for different typ...
Paper Information
Authors Mr. P. Sreenivasulu, Dr. K. Anitha Sheela
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 18

This paper presents an overview of visual recognition of Bengali Sign Language. In this paper we learn and detect a sequence of sign words and recognize the sign language that are understandable to the deaf and hearing impaired people to help normal people understand the meaning of these words. The research discusses the characteristics of the human sign languages, the requirements and d...
Paper Information
Authors Md. Abdur Rahim
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Component Based Development relies on already existing components to develop the system. It offers various advantages as increase in productivity, reduced development effort and time. The biggest challenge is to select the appropriate component from number of alternatives based on the quality parameters. In this paper COTS component selection is reduced to a multi criteria decision probl...
Paper Information
Authors Kulbir Kaur, Harshpreet Singh
Read Journal Click Here
Read Paper Click Here
Page No. 53 to 58

COTS based development is becoming a popular software development approach for building large organizational software using existing developed components. COTS based approach provides pre-developed components either as in house or commercial off the shelf components, which reduces effort and cost for developing the software. There are potential challenges, risks and complexities in using...
Paper Information
Authors Palak Arora, Harshpreet Singh
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 45

SQL Injection attacks are the most common attacks on the web applications. Statistical analysis says that so many web sites which interact with the database are prone to SQL Injection/XSS attacks. Different kinds of vulnerability detection system and attack detection systems exist, there is no efficient system for detecting these kinds of attacks. SQL Injection attacks are possible due t...
Paper Information
Authors Venkatramulu Sunkari, Dr. C.V Guru Rao
Read Journal Click Here
Read Paper Click Here
Page No. 77 to 82