Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this article, we consider the problem of jammingaware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization probl...
Paper Information
Authors Dr. M. Karunakar Reddy, S. Nageswara Rao
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

Given a Graph G (V, E), We Consider the problem of deciding whether G is Hamiltonian, that is- whether or Not there is a simple cycle in E spanning all vertices in V. [1] However to Verify that the given cycle is Hamiltonian by checking whether it is permutation of the vertices of V and whether each of the consecutives edges along the cycle actually exists in the Graph. This Verification...
Paper Information
Authors Narendra Pratap Singh, Ramu Agrawal, Indra Kumar Paliwal
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 17

The growing need have handwritten Marathi character recognition in Indian offices such as passport, railways etc has made it vital area of a research. Similar shape characters are more prone to misclassification. In this paper a novel method is provided to recognize handwritten Marathi characters based on their features extraction and adaptive smoothing technique. Feature selections meth...
Paper Information
Authors Dr. Archana P.Jane, Prof.Mukesh.A.Pund
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

The Bayesian classifier is a fundamental classification technique. We also consider different concepts regarding Dimensionality Reduction techniques for retrieving lossless data. In this paper, we proposed a new architecture for pre-processing the data. Here we improved our Bayesian classifier to produce more accurate models with skewed distributions, data sets with missing information, ...
Paper Information
Authors Dr. K.Venkat Nagarjuna,P.V Subba Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 61 to 66

In this document, we study the result of multi hop relaying on the throughput of the downstream channel in cellular networks. In particular, we contrast the throughput of the multi hop method through that of the conventional cellular system, representing the feasible throughput development by the multi hop relaying under transitive transmission considerations. We moreover propose a hybri...
Paper Information
Authors A.Veerabhadra Reddy, Dr. D. Sreenivasa Rao
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

Email Classifiers based on Bayesian theorem have been very effective in Spam filtering due to their strong categorization ability and high precision. This paper proposes an algorithm for email classification based on Bayesian theorem. The purpose is to automatically classify mails into predefined categories. The algorithm assigns an incoming mail to its appropriate category by checking i...
Paper Information
Authors Dr. Denil Vira, Pradeep Raja, Shidharth Gada
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 60

Mediated class relations and method calls as a confounding factor on coupling and cohesion metrics to assess the fault proneness of object oriented software is evaluated and proposed new cohesion and coupling metrics labeled as mediated cohesion (MCH) and mediated coupling (MCO) proposed. These measures differ from the majority of established metrics in two respects: they reflect the deg...
Paper Information
Authors Amjan.Shaik, Dr.C.R.K.Reddy, Dr. A.Damodaram
Read Journal Click Here
Read Paper Click Here
Page No. 49 to 55

Software engineering is an engineering approach for software development. In order to develop large software several phases has to be followed by the developer to achieve good quality software; cost effectively. System Design is the most important activity in software development which reflects reusability. System Design specifies what a new or modified system is going to do. To achieve ...
Paper Information
Authors Dr. CH.V.M.K.Hari, K S V Krishna Srikanth, N S S S Girish Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 38

Competition in component market and short time to market the software components forces the organization to develop and launch the components in an iterative manner. Components are launched in various versions. All gathered requirements cannot be implemented in initial version. So requirements need to be prioritized and implemented in subsequent versions. Similarly defects in one version...
Paper Information
Authors Dr. P K Suri, Sandeep Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 47

Clustering technique is one of the most important and basic tool for data mining. Cluster algorithms have the ability to detect clusters with irregular boundaries, minimum spanning tree-based clustering algorithms have been widely used in practice. In such clustering algorithms, the search for nearest objects in the construction of minimum spanning trees is the main source of computation...
Paper Information
Authors Dr. P.Sampurnima, J Srinivas, Harikrishna
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 32