In this informative age, we find many documents are available in digital forms which need classification of the text. For solving this major problem present researchers focused on machine learning techniques: a general inductive process automatically builds a classifier by learning, from a set of pre classified documents, the characteristics of the categories. The main benefit of the pre...
Paper Information
Authors Durga Bhavani Dasari, Dr. Venu Gopala Rao. K
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 46

The research in the domain of knowledge representation and reasoning has always concentrated on the methods that give a good description in the domain where they are able to be used to construct intelligent applications. Description Logics are a family of languages of knowledge representation which can be used to represent knowledge of a field of applications by clear, formal and structu...
Paper Information
Authors Dr. F. Mamache
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 35

In the Secure voice call, the human voice shall be digitized by the Android APIs and the VOIP packets will travel over the SIP layer. The digitization process also includes the encryption phase wherein secure call technique is used in order to generate unique keys every time a call handshake is done. During the Secure Call key exchange, the caller party sends a Secure Call hello packet. ...
Paper Information
Authors Dr. Saruchi Kukkar
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 21

In the last years, face recognition has become a popular area of research in computer vision, it is typically used in network security systems and access control systems but it is also useful in other multimedia information processing areas. Performance of the face verification system depends on many conditions. One of the most problematic is varying illumination condition. In this paper...
Paper Information
Authors Dr. S.Anila, Dr.N.Devarajan
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 18

Image segmentation is a fundamental task in image analysis responsible for partitioning an image into multiple sub-regions based on a desired feature. Active contours have been widely used as attractive image segmentation methods because they always produce sub-regions with continuous boundaries, while the kernel-based edge detection methods, e.g. Sobel edge detectors, often produce disc...
Paper Information
Authors D. Baswaraj, Dr. A. Govardhan, Dr. P. Premchand
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 12

In the data stream model the data arrive at high speed so that the algorithms used for mining the data streams must process them in very strict constraints of space and time. This raises new issues that need to be considered when developing association rule mining algorithms for data streams. So it is important to study the existing stream mining algorithms to open up the challenges and ...
Paper Information
Authors Mr. Pramod S. and O.P Vyas
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 30

The aim of this study is the analysis and presentation of some ideas on performance testing in Cloud Computing. Performance is an important factor in testing a web application. Performance testing in cloud computing is different from that of traditional applications. Our research methodology in this article includes an overview of existing works on testing performance in Cloud Computing,...
Paper Information
Authors Dr. Eljona Proko, Ilia Ninka
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 14

Wireless Intrusion Detection System (IDS) performance metrics are used to measure the ability of a wireless IDS to perform a particular task and to fit within the performance constraints. These metrics measure and evaluate the parameters that impact the performance of a wireless IDS. Wireless IDS analyze wireless specific traffic including scanning for external users trying to connect to...
Paper Information
Authors Mr. Rupinder Singh, Dr. Jatinder Singh
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

Privacy and itegrity of packets on wireless adhoc netwoks should be expected by the algorithmic mechanisms. This privacy and integrity is very much is to be mandated by regulations. In tardition the security is only based on cryptographic techniques which is not so much secure and leads to unsecure and unauthenticated information. As the packets of information is to be routed on networks...
Paper Information
Authors Dr. Kuldeep Kherwal, Ramesh Kait, Dr.C. Nelson Kennedy Babu
Read Journal Click Here
Read Paper Click Here
Page No. 63 to 67

One of major problems in the wireless sensor networks is the barrier coverage problem. This problem deals with the ability to minimizing the probability of undetected penetration through the barrier (sensor network). The reliability and fault tolerance problems are very important for long strip barrier coverage sensor networks. Also, another design challenge in sensor networks is to save...
Paper Information
Authors Dr, Majid Masoudi Nezhad, Mohammad Kherandish, Mohammad Mosleh
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 62