To promote advanced low fees high quality education among the people of India within their reach and to promote continuous research program in all areas of Science & Technology. ...
Paper Information
Authors U. V. S. Seshavatharam
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 22

Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a combat zone. The intrusion detection is defined as machinery for a WSN to detect the subsistence of unfortunate, incorrect, or anomalous moving attackers. For this purpose, it is a fundamental issue to differentiate the WSN parameters such as node density ...
Paper Information
Authors Srinivasaraju Dantuluri, P Poturaju
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 20

The electrocardiogram ECG signal plays an important role in the primary diagnosis, prognosis and survival analysis of heart diseases. The ECG signal contains an important amount of information that can be exploited in different manners. However, during its acquisition it is often contaminated with different sources of noise making difficult its interpretation. In this paper, a new approa...
Paper Information
Authors S.A.Taouli, F.Bereksi-Reguig
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 24

The main aim of work is to develop morlet wavelet using Munich and Cambridge filters, for audio compression and most psycho-acoustic models for coding applications use a uniform -equal bandwidth, spectral decomposition for compression. In this paper we present a new design of a psycho-acoustic model for audio coding following the model used in the standard MPEG-1 audio layer 3. This arch...
Paper Information
Authors S.China Venkateswarlu, V.Sridhar, A.Subba Rami Reddy, K.Satya Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 31

Technologies have always played a significant role in the development of human civilization. The contemporary information and communication technologies are also expected to play a similar role. These technologies facilitate of connectivity and cost-effectiveness are such characteristics of ICTs that help individual raise its political, economic and social capabilities. However, ICTs als...
Paper Information
Authors Muhammad Zubair Khan, Dr. Amanullah Khan Miankhel, Dr. Allah Nawaz
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

This documentation describes the implementation of Bayesian Network on Hiroshima Nagasaki atomic bomb survivor data, using “R” software. Bayesian networks, a state-of-the art representation of probabilistic knowledge by a graphical diagram, has emerged in recent years as essential for pattern recognition and classification in the healthcare field. Unlike some...
Paper Information
Authors Sagar Baviskar, Dinesh Lokhande, Anand Biyani, Akash Kabra
Read Journal Click Here
Read Paper Click Here
Page No. 51 to 57

Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the...
Paper Information
Authors Stuti Goel, Arun Rana, Manpreet Kaur
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 14

Rapid growth of software industry leads to need of new technologies. Software effort estimation is one of the areas that need more concentration. Exact estimation is always a challenging task. Effort Estimation techniques are broadly classified into algorithmic and non-algorithmic techniques. An algorithmic model provides a mathematical equation for estimation which is based upon the ana...
Paper Information
Authors Harwinder Kaur, Dalwinder Singh Salaria
Read Journal Click Here
Read Paper Click Here
Page No. 45 to 50

Schedulers are applications responsible for job management including resource allocation for a specific job, splitting them to ensure parallel task execution, data management, event correlation, and service-level management capabilities. When Grids allotted a number of jobs, such applications have to consider the overhead time, cost regarding to and from Grid resources, job transmission ...
Paper Information
Authors Radha.B, Dr.V.Sumathy
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 20

The study examined the relationship between the use of video technology and teacher trainees’ self-appraisal for progressive professional perfectibility.Two null hypotheses were formulated to guide the study.The quasi-experiment involved 100 third year students of the Faculty of Education, Cross River University of Technology engaged in microteaching.Data was obtained th...
Paper Information
Authors Ekpo-Eloma, E. O,Arikpo, A., Catherine N. Ebuta
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 28