Active contours are widely used in image segmentation. To cope with missing or misleading features in image frames taken in contexts such as spatial and surveillance, researchers have commence various ways to model the preceding of shapes and use the prior to constrict active contours. However, the shape prior is frequently learnt from a large set of annotated data, which is not constant...
Paper Information
Authors D. Baswaraj, Dr. A. Govardhan, Dr. P. Premchand
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 22

Cloud computing is the process of providing the virtualized services over the internet. The space in the web commonly known as Cloud has been monitored by service provider. In a real time scenario, a user registers for a particular service and shares his data as well as access credential policies with CSP (cloud service provider). Though cloud computing has got major flexibility in data ...
Paper Information
Authors Kethan Harish Yekula, Dr. Y.Venkateswarlu, Suneel Kumar Badugu
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 28

Cloud computing is an internet based computing where virtual shared servers provide software, infrastructure, platform and other resources to customers on a pay-as-you-use basis. In one of the services offered by cloud viz. Storage as a Service, users outsource their data to cloud without having direct possession or control on it. Storage of large data in cloud reduces costs and maintena...
Paper Information
Authors Jaspreet Kaur, Jasmeet Singh
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

The improvements in Internet technologies and growing demands on online multimedia businesses have made digital copyrighting as a major challenge for businesses that are associated with online content distribution via diverse business models including pay-per-view, subscription, trading, etc. Copyright protection and the evidence for rightful ownership are major issues associated with th...
Paper Information
Authors D. Kannan, Dr. M. Gobi
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 27

Mobile Ad hoc Network (MANET) is a network comprises of mobile nodes connected without any centralized administration. Each node in the network has the ability to share a large number of objects with other nodes. The nodes are connected with other nodes to forward a message to other nodes until the search for node that desire meets. This paper represents a new replication method to recov...
Paper Information
Authors Tanu Chawla, Dr. Mukesh Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 10 to 16

In computer science and mathematics; we can formulate a procedure for sorting unordered array or a file. Such procedure is always governed by an algorithm; which is called as Sorting Algorithm. Sorting is generally understood to be the process of rearranging a given set of objects in a specific order. The purpose of sorting is to facilitate the later search for members of the sorted set....
Paper Information
Authors R.Srinivas
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 31

One of the major important aspects of wireless sensor networks (WSNs) is their capability to collect and process huge amounts of information in parallel with the help of small, power limited devices enabling their use in observation, target detection and various other monitoring applications. Recently, new ideas have been proposed to develop cognitive WSNs (CWSNs) to enhance awareness ab...
Paper Information
Authors K.Katyayini, S.V. Ramanamurthy
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 29

Service-Oriented Architecture (SOA) provides a flexible framework for service composition. Using standard-based protocols (such as SOAP and WSDL).There are several constraints meant for selecting the right and appropriate service to be designed as reconfigurable dynamic web services. Those constraints leverage to the following factors availability, response time, failure handling and sup...
Paper Information
Authors M N Sahulamid, M Regina Bagam
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 24

Software reliability engineering techniques focus on development and maintenance of software systems. This paper presents a improved component model. The model is used to estimate the reliability of software systems and the usage ration of each component. A component impact analysis which helps in focusing of testing is presented .The proposed method exhibits considerable improvement whe...
Paper Information
Authors K.Venkata Subba Reddy, Dr. B. Raveendra Babu
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 27

With a specific end goal to realize versatile multipath steering, we present the notion of free regulated non-cyclic charts (IDAG’s) in this paper. Join autonomous (hub free) DAG’s fulfil the property that any way from a source to the root on one DAG’s is connection disjoint (hub disjoint) with any way from the source to the root on the ...
Paper Information
Authors Macha Prasanth, L. Naresh Babu
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23