Wireless local area network (WLAN) provides robust high quality service at a low cost and is a an essential part of everyday web browsing, file exchange, texting, e-mailing and to access live audio/video streams at homes, in public places such parks and airports, and in private places such as offices, enterprise environments, retail stores, and hotels. The adoption of the technology is a...
Paper Information
Authors Macha Sarada, Dr. Avula Damodaram
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

We face a business need of discovering a pattern in locations of a great number of points in a high-dimensional space. We assume that there should be a certain structure, so that in some locations the points are close while in other locations the points are more dispersed. Our goal is to group the close points together. The process of grouping close objects is known under the name of clu...
Paper Information
Authors Victor Sadikov, Oliver Rutishauser,
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 36

Computer systems and their interconnections using networks have im-proved the dependence of both the organizations as well as the individuals on the stored information. This interconnection, in turn, has led to a heightened awareness of the need for data security and the protection of data and re- sources from electronic frauds, electronic eavesdropping, and networkbased attacks. Consequ...
Paper Information
Authors Narendra Panwar
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 33

The Mobile Ad hoc Networks playing critical role in network aided communication requirements. The features such as ad hoc and open architecture based connectivity and node mobility are elevating the mobile ad hoc networks as much as feasible to deploy and use. The direct communication between any of two nodes in this network is possible if target node is in the range of source node. If n...
Paper Information
Authors SK. Nagula Meera, D. Srinivasa Kumar, D. Srinivasa Rao
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 40

This paper introduces a bottom-up update mechanism together with a non-recursive initial update procedure that reduces the required extra memory space and computational overhead. A new type of tree is defined based on a different geometrical interpretation of Complete Binary Trees. The new approach paves the way for a special and practical initialization of the tree, which is a prerequis...
Paper Information
Authors Mevlut Bulut
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 19

A statistical tool which can be used in various applications ranging from medical science to agricultural science is support vector machines. The proposed methodology used is support vector machine and it isused to classify a raster map. The dataset used herein is of Gujarat state agriculture map. The proposed approach is used to classify raster map into groups based on crop coverage of ...
Paper Information
Authors Tarun Rao
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 10

This paper studies the challenges in the current intrusion detection system and comparatively analyzes the active and passive response systems. The paper studies the existing IDS and their usefulness in detecting and preventing attacks in any type of network and control traffic with the performance of the system to be improved. The study also evaluates the emerging avenues in Intrusion D...
Paper Information
Authors Vivek Kumar, Gagan Deep Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 10

The delivery of education has improved over time by using the IT enabled services, especially in the higher education institutes. The role of the IT enabled services to disseminate effective teaching has increased over time and still improving with a great pace with emerging needs of the students and the teachers. This research paper is focused to identify and investigate the quality of ...
Paper Information
Authors Romana Aziz, Basit Shahzad
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 24

The main task of a MAC protocol is to prevent simultaneous transmissions or resolve transmission collisions of data packets while providing energy efficiency, low channel access delays and fairness among the nodes in a network [1]. The Aloha protocol is a fully decentralized medium access control protocol. This protocol was introduced to improve the utilization of the shared medium by sy...
Paper Information
Authors Mst. Rubina Aktar
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 13

Software developing process has been improving day by day. The development process can be affected through different ways like changing the development environment, strategies and upcoming technologies. In order to save valuable times and to speed up the process, we can guide programmer during the development time through providing relevant recommendations. There are some strategies that...
Paper Information
Authors Ziaur Rahman, Md. Abir Hosain, Md. Badrul Alam Miah, Md. Hadifur Rahman
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 34