In mobile ad hoc networks, nodes can move freely and link/node failures occur frequently. This leads to frequent network partitions, which may significantly degrade the performance of data access in ad hoc networks. When the network partition occurs, mobile nodes in one network are not able to access data hosted by nodes in other networks. In mobile ad hoc network, some nodes may selfish...
Paper Information
Authors S.J.K. Jagadeesh Kumar, R.Saraswathi, R.Raja
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 65

The word ‘Job’ term as a regular activity performed in exchange for payment is considered as one of the most important activities for many families worldwide .Evaluation is necessary when more than one opportunity come to an To fulfill their desired goal, it is the ‘evaluation’ which assesses among the factors. In addition, it...
Paper Information
Authors Tanjim Mahmud, Kazi Namirur Rahman, Dr.Mohammad Shahadat Hossain
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 44

Data mining and knowledge discovery is an active research work and getting popular by the day because it can be applied in different type of data like web click streams, sensor networks, stock exchange data and time-series data and so on. Data streams are not devoid of research problems. This is attributed to non-stop data arrival in numerous, swift, varying with time, erratic and unrest...
Paper Information
Authors V.Sidda Reddy, Dr.T.V.Rao, Dr.A.Govardhan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

Day by day data is increasing due to effectively computerization, implementation, and digitization in various sectors i.e. science, research, industry, business and many other areas. Data mining is the process of extracting valuable and useful information from this very large database. Association rule is a concept in which buyer usually by a specific combination of different products to...
Paper Information
Authors N.K. Sharma, Dr. R.C. Jain
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 37

Routing means to select path in a network and forward a packet through the network to another device on different network. Routing protocols play a vital role in computer network infrastructures. In this research comparison of various routing protocols is made. It been seen that OSPF and EIGRP are the protocols mostly used nowadays. On comparison, EIGRP is considered as the best routing ...
Paper Information
Authors Aditi Chadha, Anuj K. Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 44

Human Skin Detection
Published In: GJCST Part: F: Graphics & Vision Volume: 13 Issue: 3
Skin-color modeling is a crucial task for several applications of computer vision. Problems such as face detection in video are more likely to be solved if an efficient skin-color model is constructed. Most potential applications of skin-color model require robustness to significant variations in races, differing lighting conditions, textures and other factors. Given the fact that a skin...
Paper Information
Authors Md. Zargis Talukder, Avizit Basak, Dr. Muhammad Shoyaib
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 37

Cloud computing is an internet based computing which provides different users an opportunity to store their data in the cloud. While data outsourcing relieves the owner of the burden of the local data storage and maintenance but as they have no longer physical possession of outsourced data makes data integrity protection a very challenging task. This paper explores the secure cryptograph...
Paper Information
Authors Jaspreet Kaur, Jasmeet Singh
Read Journal Click Here
Read Paper Click Here
Page No. 43 to 46

Cloud computing is an amazing technology where users can remotely store their data into the cloud to enjoy high quality application and services. Cloud being the most vulnerable next generation architecture consist of two major design elements i.e. the Cloud Service Provider(CSP) and the Client. Even though the cloud computing is promising and efficient, there are many challenges for dat...
Paper Information
Authors Sanjoli Singla, Jasmeet Singh
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 14

Network management systems are a necessary part of every production network. Nowadays management is always scrutinizes every dollar spent on hardware and software. The costs of these systems need be justified in the same manner that infrastructure and data center upgrades need to be justified. Network management systems not only are cost affective but also benefits the network management...
Paper Information
Authors Steven Thomason
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 39

Security of data transmitted through internet has posed a number of challenges. Data transmitted can be in the form of text, pictures, audio and video clips. In this paper a study has been carried out to find the relationship between the complexities of various Indian languages and its relation to text data security through an intelligent method of converting the text data before transmi...
Paper Information
Authors Devasish Pal, Padiga Raghavendra, Dr A Vinaya Babu
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 42