This paper provides an effective design of computing technique of a distributed bioinformatics computing system for analysis of DNA sequences using OPTSDNA algorithm. This system could be used for disease detection, criminal forensic analysis, gene prediction, genetic system and protein analysis. Different types of distributed algorithms for the search and identification for DNA segments...
Paper Information
Authors Dr. Mohammad Ibrahim Khan, Dr. Kaushik Deb, Chotan Sheel
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 12

In present scenario, choosing the routing protocol is vital task in mobile ad-hoc networks. These type of networks is collection of nodes which are connected dynamically and situated without using any infrastructure. There are various types of routing protocols have been implemented such as OLSR, DSR, DYMO, AODV, DSDV, BATMAN etc. These are implemented in specific simulation environments...
Paper Information
Authors Trapti Jain, Savita Shiwani
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 10

Climate and rainfall are highly non-linear and complicated phenomena, which require classical, modern and detailed models to obtain accurate prediction. In order to attain precise forecast, a modern method termed fuzzy time series that belongs to the first order and time-variant method was used to analyse rainfall since it has become an attractive alternative to traditional and non-param...
Paper Information
Authors T.O.Olatayo, A.I. Taiwo
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

This paper is largely devoted for building a novel approach which is able to explain biological phenomena like splicing, promoter gene identification, disease and disorder identification, and to acquire and exploit biological data. This paper also presents an overview on the artificial neural network based computational intelligence technique to infer and analyze biological information f...
Paper Information
Authors Jyotsana Pandey, Dr. Bipin Kumar Tripathi
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

Support vector machines have been used as a classification method in various domains including and not restricted to species distribution and land cover detection. Support vector machines offer many key advantages like its capacity to handle huge feature spaces and its flexibility in selecting a similarity function. In this paper the support vector machine classification method is applie...
Paper Information
Authors Tarun Rao , T.V.Rajinikanth
Read Journal Click Here
Read Paper Click Here
Page No. 71 to 76

Today, because of the vulnerability of standard authentication system, law-breaking has accumulated within the past few years. Identity authentication that relies on biometric feature like face, iris, voice, hand pure mathematics, handwriting, retina, fingerprints will considerably decrease the fraud. so that they square measure being replaced by identity verification mechanisms. Among b...
Paper Information
Authors P. Sreenivasa Moorthy
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 18

Supervised learning techniques require large number of labeled examples to build a classifier which is often difficult and expensive to collect.Unsupervised learning techniques, even though do not require labeled examples often form clusters regardless of the intended purpose or context. The authors proposes a semi supervised learning framework that leverages the large number of unlabele...
Paper Information
Authors Vijaya Geeta Dharmavaram, Shashi Mogalla
Read Journal Click Here
Read Paper Click Here
Page No. 61 to 70

Conference Rating
Published In: GJCST Part: E: Network, Web & Security Volume: 14 Issue: 1
ConfRate is a website designed to gather tweets regarding various conferences occurring around the corners of world and applying an algorithm to rate them on the sentimental analysis of tweets. When we talk of technolog stack implementation, ConfRate uses Twython; a python based twitter API which connects to twitter on oauth (open authentication) and offers functionality like twitter sea...
Paper Information
Authors Ankur Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Statistical N-gram language modeling is used in many domains like spelling and syntactic verification, speech recognition, machine translation, character recognition and like others. This paper describes a system for sentence structure verification based on Ngram modeling of Bangla. An experimental corpus containing one million word tokens was used to train the system. The corpus was a p...
Paper Information
Authors Nur Hossain Khan, Md. Farukuzzaman Khan, Md. Mojahidul Islam, Md. Habibur Rahman, Bappa Sarker
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Visually impaired or blind people faced tremendous challenges daily in accessing the information while on the move or during communicating with the world around them. They had to depend on their sighted colleagues, friends, relatives, or the people on the road to help them with locating places. Our Location Based Information System is such a location based application that works as an au...
Paper Information
Authors M. Chowdhury, T. Alam, P.P.Purohit, S.A.Fahim
Read Journal Click Here
Read Paper Click Here
Page No. 56 to 59