Global Journals, MA, US×
Hello, how can we assist you?

Genetic Algorithms are among the most efficient search-based techniques to automatically generate unit test cases today. The search is guided by a fitness function which evaluates how close an individual is to satisfy a given coverage goal. There exists several coverage criteria but the default criterion today is branch coverage. Nevertheless achieving high or full branch coverage does n...
Paper Information
Authors Ina Papadhopulli , Elinda Meu00c3u00a7e
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 15

While cloud computing has moved to the forefront of strategic IT initiatives in recent years, only a few articles have focused on the basic fundamentals, and none have been written with the practitioner in mind. This article presents a basic, yet comprehensive discussion on what cloud computing is, and how it works. The article identifies and describes the core concepts that an IT manage...
Paper Information
Authors Harvey Hyman
Read Journal Click Here
Read Paper Click Here
Page No. 10 to 16

Smart government is a model of evolution of egovernment, e-government in general is government public services on the Internet through Web portals applications (Life Events & Business Episodes), smart government and its applications come to complement what has been built and invest in cross closer to citizen on the one hand, the direct and simultaneous interaction with data deployed in s...
Paper Information
Authors Dr. Yasser Elmalik Ahmed Seleman
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 18

This paper gives an insight in the scope of Big Data in the field of Geoscience and which scripting language is acceptable for Big Data.Big Data transforms traditional information to customary conviction of how data should be aggregated, processed, analysed and stored. Big data is rudimentary transfiguring world of science. The large volume of data is posing a great menace on scientists....
Paper Information
Authors Saloni Jain
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

Identification of the mobile ad hoc network node in a secure, reliable communication is a very important factor. It will be a node in the service of reconciliation and node behaviour leads to uncertainty. It is always challenge to manage node security and resource due to the complexity of high mobility and resource constraints. Trust based security provides light-weight security computin...
Paper Information
Authors K. Sridevi, Dr. M. Sridhar
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 14

The Wireless Sensor Network (WSN) is a collection of no. of mobile nodes which communicate through wireless channel without any existing network infrastructure. Because the resource constrained nature of WSN a data packet routing requires multiple hops to exchange data across the network. In order to facilitate communication within the network, a secure energy efficient routing protocol ...
Paper Information
Authors Jai Prakash Prasad, Dr. Suresh Chandra Mohan
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 25

On-chip communication, modular, scalable packet-switched micro-network of interconnects, generally known as Network-on-Chip (NoC) architecture can be designed as regular or application-specific (irregular) network topologies. Application specific custom network topologies are advantageous in terms of optimized design according to given performance metrics and regular network topologies a...
Paper Information
Authors Samta Jain, Vaishali Sodani, Naveen Choudhary
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Face recognition with less information availability in terms of the number of image samples is a challenging task. A simple and efficient method for face recognition is proposed in this paper, to address small sample size problem and rotation variation of input images. The robert`s operator is used as edge detection method to elicit borders to crop the facial part and then all cropped im...
Paper Information
Authors Jagadeesh H S, Suresh Babu K, K B Raja
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 27

Mobile cloud computing comprises of cloud computing, mobile computing and wireless network. Providing secure and convenience for the mobile users to access multiple cloud computing services is essential. This paper furnish an effective way of providing the authentication for the mobile users to access multiple cloud computing services. The proposed scheme outfit a secure and expediency f...
Paper Information
Authors Kavitha K K, Avinash B
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

The high pace rise in online as well as offline multimedia unannotated data and associated mining applications have demanded certain efficient mining algorithm. Multiple instance learning (MIL) has emerged as one of the most effective solutions for huge unannotated data mining. Still, it requires enhancement in instance selection to enable optimal mining and classification of huge multim...
Paper Information
Authors Girisha GS, Dr. K. Udaya Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 28

Account

It's optional to login for reading/publishing articles.

Please wait, authorizing ...
Not a member? Sign up now
×
Loading...