Iris recognition techniques have come a long way since the preliminary proposal by Daugman. There are several techniques which mainly focus on improving the performance of IRIS recognition system either with the help of improved classifier or the feature set. However we have proved that the performance of IRIS recognition to a large extend depends upon the inter dependability and separab...
Paper Information
Authors Dr. V. V. Satyanarayana Tallapragada, Dr. E. G. Rajan
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 29

The usage of already available software agents plays a vital role in the process of development of application specific software. This reuse also leads to software development cost benefits as well as may ensure the timely delivery. This paperlay down an idea that for reusing reactive multi-agents systems two factors are to be considered i.e. (i) abstract description of agent in applicat...
Paper Information
Authors Deepti Aggarwal,Aarti Singh
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 12

Gait analysis is very significant for early diagnosis of gait diseases and treatment assessment. Gait analysis is used to assess, plan and to treat the individuals with conditions affecting their ability to walk. In recent years, doctors gain more clarity and exact disease assessment by means of machine learning technologies and this has gained much application of gait analysis. The pati...
Paper Information
Authors A. Athisakthi, Dr.M.Pushparani
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 25

Day by day, wireless networking technology and mobile computing devices are becoming more popular for their mobility as well as great functionality. Now it is an extremely growing demand to process mobile transactions in mobile databases that allow mobile users to access and operate data anytime and anywhere, irrespective of their physical positions. Information is shared among multiple ...
Paper Information
Authors Dr. Md. Anisur Rahman
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 21

Real-time database must maintain the Temporal Consistency of the data which cannot be achieved with the conventional concurrency control techniques as they focus only on the consistency of the data. Different protocols exhibit good performance on different situations. But a single technique is inadequate to meet the demand of real-time database. To improve the concurrency control techniq...
Paper Information
Authors Dr. Md. Anisur Rahman, Md. Sahadat Hossain
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

Frequent itemset mining plays an important role in association rule mining. The Apriori & FP-growth algorithms are the most famous algorithms which have their own shortcomings such as space complexity of the former and time complexity of the latter. Many existing algorithms are almost improved based on the two algorithms and one such is APFT [11], which combines the Apriori algorithm [1]...
Paper Information
Authors Dr. Sujatha Dandu, B.L.Deekshatulu, Priti Chandra
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 16

Thesis is devoted to network with WiMAX. It is claimed that WiMAX provides a perfect opportunity for an alternative network development. Discussion is based on five main aspects of WiMAX network implementation. Establishment and development of Base Stations (BS), Access Service Network Gateway (ASNG), and Connectivity Service Network (CSN), Base Station Controllers (BSC) and an Analogous...
Paper Information
Authors Dr. Sheik Subani A.F
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 37

It is very important for us to rescue from fatal accidents caused by fire. Recently in Bangladesh more than two hundred garment workers have deceased at Tajrin Fashion Industry. In this work we have performed the edge detection for Robot on the eve of edge identification to save the worker while they will be locked at emergency situations where human interaction will be failed. We have t...
Paper Information
Authors Md. Rabiul Hasan
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 19

In this paper, we investigate a comprehensive study on a simulated cooperative wireless communication system with implementation of code division multiple access (CDMA) technique under Decode-and-Forward (DAF) and Amplify-and- Forward (AAF) relaying protocols. The system under investigation incorporates two digital modulations (BPSK and QPSK) with five major types of signal combining sch...
Paper Information
Authors Muntasir Ahmed, Md. Anwar Hossain, A F M Zainul Abadin, Purno Mohon Ghosh
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 33

In the past few year’s privacy over websites have received significant amount of attention all around the world. Privacy policy in websites describes the collection of information and its use by the website. Users consult websites privacy policy to know what information is collected by the website and how this information can be used by the website. This paper is concern...
Paper Information
Authors Dr. Sami Alhomod, Mohd Mudasir Shafi
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 26