An ad hoc network is characterized by the fact that there is no fixed topology due to the mobility of nodes, interference, multipath propagation and path loss. Execution of applications in such kind of networks typically consists of a number of successive phases such as network reprogramming, localization, power monitoring, and parameter updates. Termination detection of a phase is there...
Paper Information
Authors Dr. Subrata Kumar Das, Md. Asif Nashiry, Md. Alam Hossain
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 12

Assessing the quality of external software before integrating it in to the project development is very challenging now days. As IT industry is moving towards newly evolving tool named SaaS(Software as a Service) , the risk of integrating the external software to the project development has been increased. Presently integration of external software is going on, but they use the trad ition...
Paper Information
Authors Dr. Bora Rama Rao
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 32

Dynamic price discrimination adjusts prices based on the option value of future sales, which varies with time and units available. This paper surveys the theoretical literature on dynamic price discrimination, and confronts the theories with new data from airline pricing behavior, Consider a multiple booking class airline-seat inventory control problem that relates to either a single fli...
Paper Information
Authors Praveen kulkarni, Nagabhushan.S.V, Dr.G.N.Srinivasan
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 45

This paper presents a new algorithm Artificial Neural Network and Seeded Region Growing (ANN-SRG) to segment cloud patches of different types. This method used Seeded Region Growing (SRG) as segmentation algorithm, and Artificial Neural Network (ANN) Cloud classification as preprocessing algorithm. It can be trained to respond favorably to cloud types of interest, and SRG method is no lo...
Paper Information
Authors Dr. Yu Liu, Du-Gang Xi, Xue-Gong Liu, Chun-xiang Shi, Kai Zhang
Read Journal Click Here
Read Paper Click Here
Page No. 69 to 76

facial expression recognition is limited to six basic expression and several combination.The expression are classified into emotion categories rather than another technique..It is difficult task to show all facial expressions because in everyday life six basic expression occur so frequently.Emotion is often communicated by small changes in one or two facial features,on the other hand the...
Paper Information
Authors Dr. Geeranjali Sharma, H K Sawant
Read Journal Click Here
Read Paper Click Here
Page No. 63 to 67

The process of finding sequential rules is an indispensable in frequent sequence mining. Generally, in sequence mining algorithms, suitable methodologies like a bottom–up approach will be used for creating large sequences from tiny patterns. This paper proposed on an algorithm that uses a hybrid two-way (bottom-up and top-down) approach for mining maximal length sequence...
Paper Information
Authors Anurag Choubey, Dr. Ravindra Patel, Dr. J.L. Rana
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 61

The best elucidations to software development problems are regularly touted as object-oriented processes. The popularity of object-oriented design metrics is essential in software engineering for measuring the software complexity, estimating size, quality and project efforts. There are various approaches through which we can find the software cost estimation and predicates on various kin...
Paper Information
Authors Dr. Sanjay Kumar Dubey, Amit Sharma, Prof. (Dr.) Ajay Rana
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 56

In this paper, our work is devoted to systematic study of actions theories by using a logical formalism based on a first order language increased by operators whose main is to facilitate the representation of causal and temporal relationships between actions and their effects as well as causal and temporal relationships between actions and events. In Allen and Mc-Dermottâ€â„...
Paper Information
Authors Dr. Fatiha Mamache
Read Journal Click Here
Read Paper Click Here
Page No. 77 to 85

A small WSN is a collection of micro-sensors. Sensors send or receive data to a sink node, which collect and processes it. The Tree-Routing (TR) protocol was initially designed for such network. TR uses strict parent-child links for data forwarding. Hence, it saves bandwidth and energy by preventing network from flooding path search messages. For a large network TR shows large hop-count ...
Paper Information
Authors Dr. Sharad, Shailendra Mishra, A. K. Sharma, D. S. Chauhan
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 52

As organizations become aware of the strategic importance of e-commerce they will also become aware of the need of quality Web sites. In early years the World Wide Web was originally designed to present information to Web surfers using simple sites that consists of hyper linked text. But, Modern Web applications run large-scale software applications for e-commerce, information distributi...
Paper Information
Authors Dr. B. Narayana Babu, C.S. Ramanathan
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 25