Most of the E-Learning applications perform poorly in motivating employees to learn. To solve this problem, we need to examine what workplace e-learning requires and how workplace e-learning systems should be developed in line with those requirements. We investigated the problem by identifying the fundamental elements of the workplace learning environment including the learner, organizat...
Paper Information
Authors Dr. R. Mahammad Shafi, Dr. B. Kavitha
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 28

This paper discusses various multicast routing protocols which are proposed in the recent past each having its own unique characteristic, with a motive of providing a complete understanding of these multicast routing protocols and present the scope of future research in this field. Further, the paper specifically discusses the current development in the development of mesh based and hybr...
Paper Information
Authors Dr. P.Prasanna Murali Krishna, Dr.M.V.Subramanyam Dr. K.Satya Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 22

Automated road lane detection is the crucial part of vision-based driver assistance system of intelligent vehicles. This driver assistance system reduces the road accidents, enhances safety and improves the traffic conditions. In this paper, we present an algorithm for detecting marks of road lane and road boundary with a view to the smart navigation of intelligent vehicles. Initially, i...
Paper Information
Authors Dr. Anik Saha, Dipanjan Das Roy, Tauhidul Alam, Kaushik Deb
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Computer networks have experienced an explosive growth over the past few years and with that growth have come severe congestion problems. Congestion must be prevented in order to maintain good network performance. In this paper, we proposed a cluster based framework to control congestion over network using mobile agent. The cluster implementation involves the designing of a server which ...
Paper Information
Authors Dr. P.K. Suri, Sumit Mittal
Read Journal Click Here
Read Paper Click Here
Page No. 49 to 53

Cryptanalysis of ciphertext by using evolutionary algorithm has gained so much interest in recent years. In this paper we have used a Genetic algorithm with improved crossover operator (Ring Crossover) for cryptanalysis of SDES. There so many attacks in cryptography. The cipher text attack only is considered here and several keys are generated in the different run of the genetic algorith...
Paper Information
Authors Dr. Lavkush Sharma, B.K Pathak, R. G. Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 55 to 59

Mobile adhoc network (MANET) is a temporary network setup for a specific purpose without help of any preexisting infrastructure. The nodes in MANET are empowered to exchange packet using a radio channel. The nodes not in direct reach of each other uses their intermediate nodes to forward packets. (MANET) environment of MANET makes it vulnerable to various network attacks. A common type o...
Paper Information
Authors Er. Gurjeet Singh
Read Journal Click Here
Read Paper Click Here
Page No. 61 to 67

We already know that Structured Query Language (SQL) is a very powerful tool. It handles data, which is crisp and precise in nature.but it is unable to satisfy the needs for data which is uncertain, imprecise, inapplicable and vague in nature.The goal of this work is to use Fuzzy techniques i.e linguistic expressions and degrees of truth whose result are presented in this paper. For this...
Paper Information
Authors Dr. Amit Garg, Dr. Rahul Rishi
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 45

Data mining is sorting through data to identify patterns and establish relationships.Data mining parameters include: Regression - In statistics, regression analysis includes any techniques for modeling and analyzing several variables, when the focus is on the relationship between a dependent variable and one or more independent variables. Sequence or path analysis - looking for patterns ...
Paper Information
Authors Mr. Aws Saad Shawkat,H K Sawant
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 41

Image retrieval is fast growing research oriented area now days. As information retrieval plays a major role in transmitting knowledge both in the forms of text and images, image retrieval got a major focus. In this paper we integrated the Histogram Intersection measure method to compare the query image with database images; by this approach we can measure over-all similarity between ima...
Paper Information
Authors Neelima Sadineni, Davarapalli Anandam, Venkata Ramesh Pokala , Pasupuletu Rajesh, Kolakaluri Srinivasa Rao
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 35

Quality of Service (QoS) is the ability to guarantee a certain level of performance to a data flow ie., guaranteeing required bit rate, delay, etc. IEEE 802.11 a/b/g networks do not provide QoS differentiation among multimedia traffic. QoS provisioning is one of the essential features in IEEE 802.11e. It uses Enhanced Distributed Channel Access (EDCA) which is a contention-based channel ...
Paper Information
Authors Dr. Ms.V.R.Azhaguramyaa , Prof.S.J.K.Jagadeesh Kumar , P.Parthasarathi
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 27