C: Software & Data Engineering

C: Software & Data Engineering (217)

GJCST: C

ECG signals in measurements are contaminated by noises including power line interference. In recent years, adaptive filters with different approaches have been investigated to remove power line interference in ECG.In this paper, an adaptive filter is proposed to cancel power line interference in ECG signals. The proposed algorithm is experimented with MIT-BIH ECG signals data base. The a...
Paper Information
Authors Duong Trong Luong, Nguyen Duc Thuan, Dang Huy Hoang
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 14

In present day applications the approach of data mining and associated privacy preservation plays a significant role for ensuring optimal mining function. The approach of privacy preserving data mining (PPDM) emphasizes on ensuring security of private information of the participants. On the contrary majority of present mining applications employ the vertically partitioned data for mining...
Paper Information
Authors S KumaraSwamy,Manjula S H, K R Venugopal,L M Patnaik
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

Dynamic Permutations
Published In: GJCST Part: C: Software & Data Engineering Volume: 15 Issue: 1
The confidentiality, integrity and authentication of anelectronic documentare necessary in many application systems. The security of confidentiality, integrity and authentication of an electronic document are based on nonlinear functions, in which there is no directrelationship between the inputs and the outputs. This means that the inputs cannot be extracted from the outputs. Indeed, al...
Paper Information
Authors Dr. Saleh N. Abdullah,, Dr. Sharaf A. Alhomdy
Read Journal Click Here
Read Paper Click Here
Page No. 26 to 29

As far as Learning Management System is concerned, it offers an integrated platform for educational materials, distribution and management of learning as well as accessibility by a range of users in cluding teachers, learners and content makerses pecially for distance learning. Usability evaluation is considered as one approach to assess the efficiency of e-Learning systems. It is used t...
Paper Information
Authors Thuseethan, S., Achchuthan, S., Kuhanesan, S.
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 24

Now a day’s digital world data in computers has great significance and this data is extremely critical in perspective for upcoming position and learn irrespective of different fields. Therefore we the assessment of such data is vital and imperative task. Computer forensic analysis a lot of data there in the digital campaign is study to extract data and computers consist ...
Paper Information
Authors P. Jyothi, S. Murali Krishna
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Big Data have gained enormous attention in recent years. Analyzing big data is very common requirement today and such requirements become nightmare when analyzing of bulk data source such as twitter twits are done, it is really a big challenge to analyze the bulk amount of twits to get relevance and different patterns of information on timely manner.This paper will explore the concept of...
Paper Information
Authors Abdul Ghaffar Shoro, Tariq Rahim Soomro
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 14

Arabic content on the Internet and other digital media is increasing exponentially, and the number of Arab users of these media has multiplied by more than 20 over the past five years. There is a real need to save allocated space for this content as well as allowing more efficient usage, searching, and retrieving information operations on this content. Using techniques borrowed from othe...
Paper Information
Authors Arafat Awajan, Enas Abu Jrai
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

In this paper we present automated text classification in text mining that is gaining greater relevance in various fields every day. Text mining primarily focuses on developing text classification systems able to automatically classify huge volume of documents, comprising of unstructured and semi structured data. The process of retrieval, classification and summarization simplifies extra...
Paper Information
Authors Venkata Ramana.A, Dr.E.Kesavulu Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 34

Service composition in service oriented architecture is an important activity. In regard to achieve the quality of service and secured activities from the web service compositions, they need to be verified about their impact towards fault proneness before deploying that service composition. Henceforth, here in this paper, we devised a novel statistical approach to assess the service comp...
Paper Information
Authors Sujatha Varadi, G Appa Rao
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 17

Big data is an evolving term that describes any voluminous amount of structured, semistructured and unstructured data that has the potential to be mined for information.Today’s world produces a large amount of data from various sources, records and from different fields termed as “BIG DATA”. Such huge data is to be analyzed, and filtered usin...
Paper Information
Authors K.Sandeep, K.Kondaiah, A.Vineetha, Ch.Monica
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 12