We investigate the impacts mining operations have on established Wired/Wireless Local Area Networks (WLANs) in mining environments in the Western Region of Ghana. Mining activities have certain immutable negative impacts on the topography of the land with consequent effects on LAN Networks. Notable are undulating landscape with pronounced physical obstructions, LAN infrastructural reloca...
Paper Information
Authors Emmanuel Effah, Christian Kwaku Amuzuvi
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 52

This paper mainly focuses on the personalization of the search engine based on data mining technique, such that user preferences are taken into consideration. Clickthrough data is applied on the user profile to mine the user preferences in order to extract the features to know in which users are really interested. The basic idea behind the concept is to construct the content and location...
Paper Information
Authors Niranjan Kumar, S G Raghavendra Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 25

Cluster analysis method is one of the main analytical methods in data mining; this method of clustering algorithm will influence the clustering results directly. This paper proposes an Advanced Clustering Algorithm in order to solve this question, requiring a simple data structure to store some information [1] in every iteration, which is to be used in the next iteration. The Advanced Cl...
Paper Information
Authors Aman Toor
Read Journal Click Here
Read Paper Click Here
Page No. 71 to 74

The wireless sensor networks (WSNs) has been grown immensely in the past few decades. Researcher had proposed a number of routing protocols for WSN. WSN has two type of architecture layered and cluster architecture. We classify various clustering approaches based on different criterion in section [3]. Hierarchical Clustering protocols discussed in section [4] have extensively been used t...
Paper Information
Authors Neha Saini, Jasmeet singh
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 39

Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwo...
Paper Information
Authors Akanksha Gupta, Anuj K. Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 31

More and more companies are adopting Agile methods as a flexible way to introduce new software products. An important part of any software project is testing. Agile testing may have similar aims as traditional software testing, but the structure of the team is different, testers need to support quality infusion through entire team. Test automation and selection of test tool can help proj...
Paper Information
Authors P.Rajasekhar, Dr. R. Mahammad Shafi
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 10

Image compression demands high speed architectures for transformation and encoding process. Medical image compression demands lossless compression schemes and faster architectures. A trade-off between speed and area decides the complexity of image compression algorithms. In this work, a high speed DWT architecture and pipelined SPIHT architecture is designed, modeled and implemented on F...
Paper Information
Authors T.Vijayakumar, S. Ramachandran
Read Journal Click Here
Read Paper Click Here
Page No. 40 to 52

Surveillance systems are commonly used for security and monitoring. The need to automate these systems is well understood. To address this issue we introduce the Graph theoretic approach based Crowd Behavior Analysis and Classification System (GCBACS). The crowd behavior is observed based on the motion trajectories of the personnel in the crowd. Optical flow methods are used to obtain th...
Paper Information
Authors Najmuzzama Zerdi, Dr. Subhash S Kulkarni, Dr.V .D. Mytri, Kashyap D Dhruve
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 33

A network is defined to be a congested networkif the load on the network exceeds the capacity of the network. The traditional congestion control technique of slow-start and AIMD was adopted when the aim was more on the stability of the Internet. But as more and more time critical applications such as multimedia applications are being used, we need alternate technique that reduces the dra...
Paper Information
Authors Abhay Kumar 1, Smriti Agrawal 2, A. Gowardhan 3
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 22

Detection of Optic disc (OD) in a fundus image is a foremost important step in the process of screening the diabetic retinopathy [1,4,18]. Hard Exudates detection algorithms usually find lot of false positives since the intensity and color distribution of OD will much resemble that of a Hard Exudates region [15,16]. So, most of the Exudates detection algorithms will miss classify the pix...
Paper Information
Authors G.Ferdic Mashak Ponnaiah, Dr.S.Santhosh Baboo
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23