Quicksort is well-know algorithm used for sorting, making O(n log n) comparisons to sort a dataset of n items. Being a divide-and-conquer algorithm, it is easily modified to use parallel computing. The aim of this paper is to evaluate the performance of parallel quicksort algorithm and compare it with theoretical performance analysis. To achieve this we implement a tool to do both sequen...
Paper Information
Authors Dr. Abdulrahman Hamed Almutairi, Abdulrahman Helal Alruwaili, Dr. Abdullatif Alabdullatif
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

The Global Hospital Information Systems market is forecast to grow at a Compound Annual Growth Rate of 10% from 2010-2017. Healthcare organizations globally recognize the importance of investing in information technologies. The HIS systems are large computerized data bases intended primarily for communication, store health and administrative information. It is evident that the use of HIS...
Paper Information
Authors Dr. Syed Murtuza Hussain Bakshi, Shakeel.M
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Cloud computing has changed the way people think of using resources. Especially, the IaaS (Infrastructure as a Service) allows users to make use of unlimited resources in pay per use fashion. Virtualization is the technology based on which the cloud service providers are able to provide or share computational resources and data centers to users. Though this approach is practical, it thro...
Paper Information
Authors Dr. Ashiquee Rasool Mohammad, Syeda Farhath Begum, Dr. Kahalid Mohiuddin
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

Royal Bengal Tiger is one of the penetrating threaten animal in Bangladesh forest at Sundarbans. In this work we have had concentrate to establish a robust Knowledgebase for Royal Bengal Tiger. We improve our previous work to achieve efficiency on knowledgebase representation. We have categorized the tigers from others animal from collected data by using Support Vector Machines(SVM) .Man...
Paper Information
Authors Dr. Md.Sarwar Kamal, Sonia Farhana Nimmy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Human identification by gait has created a great deal of interest in computer vision community due to its advantage of inconspicuous recognition at a relatively far distance. Biometric systems are becoming increasingly important, since they provide more reliable and efficient means of identity verification. Biometric gait Analysis (i.e. recognizing people from the way they walk) is one o...
Paper Information
Authors Dr. M.Pushparani, D.Sasikala
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 10

Component Based Software Engineering (CBSE) approach is based on the idea to develop software systems by selecting appropriate components and then to assemble them with a well-defined software architecture. (CBSE) offers developers the twin benefits of reduced software life cycles, shorter development times , saving cost and less effort as compare to build own component. However the succ...
Paper Information
Authors Dr. Zahid Javed, Ahsan Raza Sattar, Muhammad Shakeel Faridi
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 31

This paper proposes text mining of clinical practices to extract decision-making steps. These steps should be formed in- logical functions capable of branching on different plan set on some deciding variables. The probable action sequence will be notified on the data of patient given to the conditions of clinical guideline and this will also give critical conditions that need immediate a...
Paper Information
Authors Dr. Prof. Mayura Kinikar
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 8

The detected of spam messages in terms that better having a spam email in the inbox than a ham message in the junk, has been investigated recently. The main contribution of the paper consists in comparing three antispam filters used more nowadays, and will find that which is filter is of the future. By using filters we will also create some patterns as the result of training with differe...
Paper Information
Authors Dr. Elma Zanaj, Bledi Shkurti
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Reliable transport protocol like TCP has served well the wired Internet where the packet losses are mainly due to congestion, but is not ready for Mobile IP wired-cum-wireless environments where the significant packet losses are due to bit errors and handoffs. In this paper, we have investigated the performance of TCP among the various TCP variants. We have observed both TCP senders (New...
Paper Information
Authors Dr. Md. Asif Nashiry, Shauli Sarmin Sumi, Subrata Kumar Das, Md. Kamrul Islam
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 53

Clustering is an unsupervised classification that is the partitioning of a data set in a set of meaningful subsets. Each object in dataset shares some common property- often proximity according to some defined distance measure. Among various types of clustering techniques, K-Means is one of the most popular algorithms. The objective of K-means algorithm is to make the distances of object...
Paper Information
Authors Dr. Ritu yadav, Anuradha Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 45