G: Interdisciplinary

G: Interdisciplinary (62)

GJCST: G

The digital mammographic images are affected by several types of noises which require filters to denoise the noise level. This will help the medical practitioner to enhance the image quality of the mammograms and helps them in giving accurate diagnosis. There are so many works on image denoising technique but there are not much which gives emphasis on the mammographic images. . In applic...
Paper Information
Authors Swapnil Tamrakar,Abha Choubey,Siddhartha Choubey
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

To makes transparent and effective the government works, to increase government efficiency, accountability and to improve the service delivery and participating the public in all aspects of government activities e-Governance is obligatory. Bangladesh e-Government Index is very low as compared SAARC countries. Bangladesh has many challenges for the implementation of e-Government system in...
Paper Information
Authors Shahnewaz Liton, Md. Ahsan Habib
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 28

Voice Over Internet Protocol (VOIP) is a rapidlygrowing Internet service for telephone communication. However, while it offers a number of cost advantages over traditional telephone service, it can pose a security threat, especially when used over public networks. In the absence of sufficient security, users of public networks are open to threats such as identity theft, man-in-the-middle...
Paper Information
Authors Md. Shahidul Islm, Md. Mahbub Rahman
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 42

Wireless Sensor Network (WSN) is a network composed of distributed autonomous devices using sensors. Sensor nodes send their collected data to a determined node called Sink. The sink processes data and performs appropriate actions. Nodes using routing protocol determine a path for sending data to sink. Congestion occurs when too many sources are sending too much of data for network to ha...
Paper Information
Authors Md. Ahsanul Hoque, Nazrul Islam, Sajjad Waheed, Abu Sayed Siddique
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 38

Anomaly detection systems are extensively used security tools to detect cyber-threats and attack activities in computer systems and networks. In this paper, we present Text Mining-Based Anomaly Detection (TMAD) model. We discuss n-gram text categorization and focus our attention on a main contribution of method TF-IDF (Term frequency, inverse document frequency), which enhance the perfor...
Paper Information
Authors Mohsen Kakavand, Norwati Mustapha,Aida Mustapha, Mohd Taufik Abdullah
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 31

The association of different wireless communication technologies on the way to advanced wireless networks had better face with the developing systems resource utilization and user authentication. Mobility management is vital to omnipresent computing which can be established by location management and distinctive of the mobility management modules. In this work the new protocol is propose...
Paper Information
Authors B. Jaiganesh
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 22

Building high performance computer systems requires an understanding of the behaviour of systems and what makes them fast or slow. In addition to our file system performance analysis, we have a number of projects in measuring, evaluating, and understanding system performances. The conventional methodology for system performance measurement, which relies primarily on throughput-sensitive ...
Paper Information
Authors Olawuyi J.O., Fagbohunmi S.G., Olawuyi O.M., Mgbole F.
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 15

This study explores the relation between cognition and videogame Player Character. It uses the procedural rhetoric as its main approach, understanding the activity of playing through its inner processes. The relation playercharacter- game often appears described in terms of representation and identification. We however suggest that some concepts by Bruno Latour – such as...
Paper Information
Authors Carlos Baum, Cleci Maraschin
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 19

The present paper reports on the development of an intelligent virtual grader for assessing apple quality using machine vision. The heart of the proposed virtual grader was executed in the form of K-Nearest Neighbor (K-NN) classifier designed on the architecture of Euclidean distance metric. KNN classifier is executed for this particular application due to its robustness to the noisy env...
Paper Information
Authors Ajay Pal Singh Chuahan, Amar Partap Singh Pharwaha
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 12

Mobility Prediction of a Moving Node and Network Delay is an important performance characteristic of a wireless network. The Data delivery Delay of a network specifies how long it takes for a data to travel across the network from one node or endpoint to another. It is typically measured in multiples or fractions of seconds. The work presented here belongs to domain of data mining cum wi...
Paper Information
Authors K.Nithiya, A.Vinoth Kannan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Page 2 of 5