Owing to a large number of applications periodic pattern mining has been extensively studied for over a decade. Periodic pattern is a pattern that repeats itself with a specific period in a give sequence. Periodic patterns can be mined from datasets like biological sequences, continuous and discrete time series data, spatiotemporal data and social networks. Periodic patterns are classifi...
Paper Information
Authors G.N.V.G. Sirisha, M. Shashi, G.V. Padma Raju
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 28

To improve highway transport security, VANET (Vehicular Ad Hoc Network) is used which is a developing technology incorporating ad hoc network, cellular technology and wireless LAN. VANETs are different from other type ad hoc networks by their cross network constructions, node association features and new application setups. The approach of an effective routing protocol for VANETs is vita...
Paper Information
Authors Ahmed Shoeb Al Hasan, Md. Hasan Tareque, Fatema Tuz Zohra
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 28

Component-Based Software Engineering (CBSE) is increasingly being accepted worldwide for software development, in most of the industries. Software reliability is defined as the probability that a software system operates with no failure within a specified time on specified operating conditions. Software component reliability and failure intensity are two important parameters that Estimat...
Paper Information
Authors Dr. P.K. Suri, Er. Karambir
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 17

In the last few years UAVs systems have become relevant for many military applications including non military security work such as surveillance of pipelines. An autonomous UAVis often preferred for those missions that are dull, dirty or dangerous for manned aircraft. It has the ability to hover and it has free band GPS direction and tilt sensors for smooth navigation. There is no person...
Paper Information
Authors Mannika Garg, Abdul Wahid Ansari, Sushabhan Choudhury, Rajesh Singh, Ruchin Garg
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 20

Security is an essential feature of Information Communication Technology (ICT). Information has to be encrypted at the transmitter side to maintain secrecy and decrypted at the receiver side to retrieve the original information for secure data transmission over insecure computer data communication networks. This paper analyzes the performance metrics of blowfish algorithm with and withou...
Paper Information
Authors V. Kumara Swamy, Dr. Prabhu Benakop
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

The Transmission Control Protocol (TCP) is the dominating end-to-end protocol on the internet today but still it faces congestion problems in some cases. To overcome congestion problems, several congestion control and avoiding mechanisms namely: Tahoe, Reno, Vegas, and Sack etc. all with different features and advantages but with maximal throughput as main objective, which are termed as ...
Paper Information
Authors A F M Zainul Abadin, Md. Anwar Hossain, Muntasir Ahmed, Purno Mohon Ghosh
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 61

Need of more sophisticated methods to handle color images becomes higher due to the usage, size and volume of images. To retrieve and index the color images there must be a proper and efficient indexing and classification method to reduce the processing time, false indexing and increase the efficiency of classification and grouping.We propose a new probabilistic model for the classificat...
Paper Information
Authors V. Padmanabhan, Dr. M.Prabakaran
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 38

The diversity and applicability of data mining are increasing day to day so need to extract hidden patterns from massive data. The paper states the problem of attribute bias. Decision tree technique based on information of attribute is biased toward multi value attributes which have more but insignificant information content. Attributes that have additional values can be lessimportant fo...
Paper Information
Authors Dharm Singh, Naveen Choudhary, Jully Samota
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Social networking sites like Facebook are not just an element of passing time but a platform for learning as well. The goal of this paper is to show the effectiveness of a Facebook application named “Wishdom” to teach English language based on cloud platform. This application tries to introduce English language in an authentic and communicative manner to the ...
Paper Information
Authors Md. Mahmudul Hasan, Mahmuda Akhter
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 55

Algorithms for concurrent data structure have gained attention in recent years as multi-core processors have become ubiquitous. Several features of shared-memory multiprocessors make concurrent data structures significantly more difficult to design and to verify as correct than their sequential counterparts. The primary source of this additional difficulty is concurrency. This paper prov...
Paper Information
Authors Ms. Ranjeet Kaur, Dr. Pushpa Rani Suri
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9