Image segmentation is critical for many computer vision and information retrieval systems, and has received significant attention from industry and academia over last three decades. Despite notable advances in the area, there is no standard technique for selecting a segmentation algorithm to use in a particular application, nor even is there an agreed upon means of comparing the performa...
Paper Information
Authors E. Venkateswara Reddy, Dr. E.S.Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 28

Information technology plays an important role in every field of life. Implementation and acceptance of IT always remain an important topic for researchers, engineers and practitioners. This study explores IT adoption factors influencing SMEs performance in developing countries. Relative advantages, complexity, ease of use, trialabiliy, observability were found frequently used factors to...
Paper Information
Authors Shreehan Shahid, Irfan Anjum Manarvi
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

The broad objective of the research paper is to evaluate and compare the performance of two protocol stacks (IPv4 and IPv6) in OMNeT++ in terms of various parameters that have to be analyzed when the data is being transmitted from one client to another or to a server over a wired network. In this we have designed wired networks on basis of IPv4 and IPv6 protocols in OMNeT++, which is a n...
Paper Information
Authors Savita Shiwani, G.N. Purohit
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 40

Cloud computing provides highly scalable services for the purpose of online usage as daily premises. A key thing in cloud services is that users keeps processing in the unknown fashion where they are not aware of machines working on which are not operating by them. After all with the new technology they are adopted to now users’ scares of their data which was uploaded in...
Paper Information
Authors J Venkata Subbarayudu, Shaik Jakeer Hussain
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 31

Service-oriented architecture (SOA) paradigm for the purpose of large-scale applications offers meaningful cost savings by rework existing services. However, the high oddity of client appeal and the allocated character of the access may depreciate service response time and chance. Static cloning of components in database for placing load spikes need efficient resource planning and also u...
Paper Information
Authors Sreedevi Pogula, M. Ganesh Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 56

A promising option to raising busty interchange in system communication could be Optical Burst Switched (OBS) networks among scalable and support routing effective. The routing schemes with disputation resolution got much interest, because the OBS network is buffer less in character. Because the deflection steering can use limited optical buffering or actually no buffering thus the choic...
Paper Information
Authors Venkata Rao Tavanam, Venkateswarlu.D.S, Karuna Sagar Dasari
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 20

From his very first novels, CamiloCasteloBranco sought to establish secure codes which, though appearing to subvert implicit rules, were in fact meant to safeguard the legitimacy of his narrative discourse while at the same time giving the impression of engaging readers in light conversation. Thus, the opposition at play between what is true and what appears to be true, as well as betwee...
Paper Information
Authors Maria De Fatimamarinho
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 17

The increase in huge amount of data is seen clearly in present days because of requirement for storing more information. To extract certain data from this large database is a very difficult task, including text processing, information retrieval, text mining, pattern recognition and DNA sequencing. So we need concurrent events and high performance computing models for extracting the data....
Paper Information
Authors Chinta Someswara Rao, K Butchi Raju, Dr. S. Viswanadha Raju
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 41

The weakest link in any security plan or implementation is a human. The weak links include everyone from the hourly paid end user to the owner of the company. Even many of today’s security professionals may not have the time or ability to perform their current duties and keep up with an ever-growing number of threats. If someone is not aware of a threat then they are goi...
Paper Information
Authors Steven Thomason
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

Websites are the mean of exploring the information from the internet and have a significance role in the field of internet. Usability also plays an important role in the exploration of the websites. The objective of this paper is to highlight the usability issues in the Bangladesh universities websites and giving the suggestions about the usability of the websites regarding its fulfillme...
Paper Information
Authors Muhammad Shahid Khan, Muhammad Abid Khan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5