Most of Microsoft word documents were transfer or shared via internet by using e-mail or any electronic way. This facility is exploited to send any embedded secret data anywhere. In This paper an efficient method was proposed to hide any text massage with in Microsoft word documents.The initial idea of this method is to exploit the addition three spaces on end of paragraph using for hidd...
Paper Information
Authors Dr. Jassam .T. Sarsoh, Kadhem. M. Hashem, Hayder I. Hendi
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 42

The task of relevance search is to find relevant items to some given queries, which can be viewed either as an information retrieval problem or as a semi-supervised learning problem. In order to combine both of their advantages, we develop a new relevance search method using label diffusion on bipartite graphs. And we propose a heat diffusion-based algorithm, namely bipartite label diffu...
Paper Information
Authors Dr. Zhang Liang, Ren Lixiao
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 38

Iris-based biometric authentication is gaining importance in recent times. Iris biometric processing however, is a complex process and computationally very expensive. In the overall processing of iris biometric in an iris-based biometric authentication system, feature selection is an important task. In feature selection, we ex-tract iris features, which are ultimately used in matching. S...
Paper Information
Authors Dr. Pooja garg, Anshu Parashar
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 32

Nowadays computers education is necessary in every sector whether it is public or private. General applications like Word processor, Spread sheet, Presentations and email usage is demanded during hiring someone. Under development countries like Pakistan where literacy rate is already low, facing these challenges to produce a quality computer professional. Students have to pay huge amount...
Paper Information
Authors Dr. Muhammad Haris Abid, Zahid Javed, Shahbaz Shoukat, Muhammad Sohaib Ashraf, Muhammad Zia Qammar
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 40

The development of data-mining applications such as classification and clustering has shown the need for machine learning algorithms to be applied to large scale data. The article gives an overview of some of the most popular machine learning methods (Gaussian and Nearest Mean) and of their applicability to the problem of spam e-mail filtering. The aim of this paper is to compare and inv...
Paper Information
Authors Dr. Upasna Attri, Harpreet Kaur
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 32

In this paper we have discussed the problem of routing in telecommunication networks and the salient characteristics of some of the most popular routing schemes. In particular, we have discussed the characteristics of adaptive and multipath routing solutions versus static and single-path strategies. ...
Paper Information
Authors Dr. Jatinder singh
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 23

Wimax networks are increasingly deployed for commercial use because of its high bandwidth. This has necessitated application level changes in QoS provisioning techniques. In this paper, we propose an efficient method at the application layer of the wimax architecture. The video stream is partitioned at the application layer into I, P and B frames. Frames corrupted at receiver are detecte...
Paper Information
Authors Dr. V.R.Azhaguramyaa, S.J.K.Jagadeesh Kumar, M.Venkateshwaran
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 36

Study and Analysis of Ant System
Published In: GJCST Part: G: Interdisciplinary Volume: 12 Issue: 10
Alot of species of ants have a trail-laying/trailfollowing behavior when foraging. While moving, individual ants deposit on the ground a volatile chemical substance called pheromone, forming in this way pheromone trails. Ants can smell pheromone and, when choosing their way, they tend to choose, in probability, the paths marked by stronger pheromone concentrations. In this way they creat...
Paper Information
Authors Dr. Jatinder singh, Pawandeep Chahal
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 21

The concept of an e-government system is to provide access to government services anywhere at any time over open networks. This leads to issues of security and privacy in the management of the information systems. Ensuring security of e-government applications and infrastructures is crucial to maintain trust among various departments to store, process and exchange information over the e-...
Paper Information
Authors Dr. P.V.S.S.Gangadhar, Sirigiri Pavani, Dr.R.N.Behera
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 32

The rise of economic globalization and evolution of information technology, financial data are being generated and accumulated at an extraordinary speed. As a result, there has been a critical need for automated approaches to effective and efficient utilization of massive amount of financial data to support companies and individuals in strategic planning and investment decision-making. T...
Paper Information
Authors Dr. Mehzabin Shaikh, Prof. Mrs. Gyankamal J. Chhajed
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 18