The development of 802.16 standards for Broadband Wireless Access technologies was motivated by the rapidly growing need for high-speed, ubiquitous and cost-effective access. The limitations of conventional Broadband wireless access have been overcome with the scalable features of WiMAX. The aim of this paper is to analyse all compulsory features of the WiMAX OFDM physical layer specifie...
Paper Information
Authors Ruby Verma, Pankaj Garg
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 13

Data mining provides tools to convert a large amount of knowledge data which is user relevant. But this process could return individual’s sensitive information compromising their privacy rights. So, based on different approaches, many privacy protection mechanism incorporated data mining techniques were developed. A widely used micro data protection concept is k-anonymit...
Paper Information
Authors J.Paranthaman, Dr. T Aruldoss Albert Victoire
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

Image retrieval system is an effective and efficient tool for managing large image databases. A content based image retrieval system allows the user to present a query image in order to retrieve images stored in the database according to their similarity to the query image .In this paper content based image retrieval method is used as diagnosis aid in medical fields. The main objectives ...
Paper Information
Authors Ekta Rajput, Hardeep Singh kang
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 15

Online Social Networks (OSNs) are inherently designed to enable people to share personal and public information and make social connections with others. These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. While OSNs allow users to restrict access to shared data, they currently...
Paper Information
Authors P. Amrutha, R. Sathiyaraj
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

The paper focuses on the design and synthesis of hardware chip for Spatio and Viterbi encoding and decoding techniques. Both techniques are used for digital data encoding and decoding in transmitter and receiver respectively. These techniques are used for error control coding found in convolution codes. Spatio coding is also used to eliminate crosstalk among interconnect wires, thereby r...
Paper Information
Authors Pooja Nagwal, Adesh Kumar, Dhirendra Singh Gangwar
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

Cost estimation is one of the most challenging tasks in project management. It is to accurately estimate needed resources and required schedules for software development projects. The software estimation process includes estimating the size of the software product to be produced, estimating the effort required, developing preliminary project schedules, and finally, estimating overall cos...
Paper Information
Authors Dr. N. Balaji, N.Shivakumar, V.Vignaraj Ananth
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Test-driven development (TDD) is a software development process that relies on the repetition of a very short development cycle: first the developer writes a failing automated test case that defines a desired improvement or new function, and then produces code to pass that test and finally refractors the new code to acceptable standards. TDD is a good approach for the development of the ...
Paper Information
Authors Muhammad Shahid Khan, Naveed Khan, Muhammad Abid Khan, Muhammad Ahmed Javed
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 3

In-Process testing metrics has been used from some years and its usage is frequently increasing. There are different metrics for software testing i.e. to measure testing progress, Mean time between arrival of error, density of errors, fixation of errors, failure rate, test execution Productivity, cost of defects, Test efficiency and efficiency checking and so on. But all these metrics ar...
Paper Information
Authors Muhammad Shahid Khan, Naveed Khan, Muhammad Abid Khan, Muhammad Ahmed Javed
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

Human analyze different sight in daily life images to perceive their environment. More than 99% of the activity of human brain is involved in processing images from the visual cortex. A visual image is rich in information and can save thousand words. Many real world images are acquired with low contrast and unsuitable for human eyes to read, such as industrial and medical X-ray images. I...
Paper Information
Authors Priyanka Saini, Adesh Kumar, Neha Singh, Dr. Anil Kumar Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 26

Cancelable biometric key generation is vital in biometric systems to protect sensitive information of users. A novel technique called Reciprocated Magnitude and Complex Conjugate- Phase (RMCCP) transform is proposed. This proposed method comprises of different components for the development of new method. It is tested with the multiple aspects such as cancelability, irrevocability and se...
Paper Information
Authors K.Kanagalakshmi, Dr. E.Chandra
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 11