Stock market predictions are one of the challenging tasks for financial investors across the globe. This challenge is due to the uncertainty and volatility of the stock prices in the market. Due to technology and globalization of business and financial markets it is important to predict the stock prices more quickly and accurately. Last few years there has been much improvement in the fi...
Paper Information
Authors Dr. K.K.Sureshkumar, Dr.N.M.Elango
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 25

The failure of some national projects AXES to expected results. According to experts one of the reasons is the lack of adequate theoretical apparatus for generating high-branching processes, unjustified detraction of opportunities enumerative models representative of AXES, which have their own laws paralleling computing, can not be reduced to algorithmic rules. This fact determines the n...
Paper Information
Authors Dr. Nabeel Zanoon, Ibrahim Al-Turani, Dr. Eugene Titenko
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from thre...
Paper Information
Authors N.Sasirekha, Dr.M.Hemalatha
Read Journal Click Here
Read Paper Click Here
Page No. 53 to 58

Data on genome structural and functional features for various organisms are being accumulated and analyzed in laboratories all over the world. The data are stored and analyzed on a large variety of expert systems. The public access to most of these data offers to scientists around the world an unprecedented chance to data mine and explores in depth this extraordinary information reposito...
Paper Information
Authors Dr. P. V. S. Lakshmi Jagaamba, Prof. M.S. Prasadbabu, Prof. Allam Apparao
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 52

Smart cards have been used for many different purposes over the last two decades, from simple prepaid credit counter cards used in parking meters, to high security identity cards intended for national ID programs. This has increased data privacy and security requirements. Data protection and authentication is now demanded for performing Electronic payment and allow secure multi-level acc...
Paper Information
Authors Dr. Jayabhaskar Muthukuru , Prof. Bachala Sathyanarayana
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 12

Purpose: This research evaluates the digital watermarking technology further for hide/retrieved data into the BMP file by manipulating the contents their pixel value using least significant bits (LSB) approach. Methodology: Various experiments have been applied on the pixel value of the BMP file to hide/store the maximum data. With a condition the size and the quality of the BMP file wil...
Paper Information
Authors Dr. Tripat Deep Singh Dua
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 45

In this paper we discuss some of the architectural principles which are useful to support the continuous media applications in a microkernel environment. In particular, we discuss i) the principle of upcall-driven application structuring whereby communications events are system rather than application initiated, ii) the principle of split-level system structuring whereby, key system .fun...
Paper Information
Authors Dr.L.V.Reddy ,J.Durga
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

Transaction database is a collection of transactions along with the related time stamps. These transactions are defined using some prototypes. They are called as the Transitional patterns that denote the vibrant nature of the frequent patterns in the database. The considerable high points for the transaction database are the timestamps also called as time durations. They are the points t...
Paper Information
Authors P.Shyamala , D.Sujatha
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 28

In this research we will focus the details of the IT System and business process requirements of IT Package need to be installed at Data Centers. This research details the project requirements, which are to be met by the applications and interfaces required within Data Center between different hardware and software systems. The objective of this research includes the design and developme...
Paper Information
Authors Dr. Utkarsh Seetha, Rajesh Kumar Rolen, Hitesh Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

The self organising maps are gaining popularity as they help in organizing the haphazard data in topological maps. They conserve space in storing, help in pattern identification, matching, recognition, data mining etc. The Neural Networks designed by Hopfield is applied in this paper to organize the returns produced by seven exchange rates by the competitive Kohonen algorithm. Our analys...
Paper Information
Authors Ravindran Ramasamy , Krishnan Rengganathan
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 27

Page 70 of 70