Latest Articles - Volume 10 No. 4

  • Data Mining using Neural Networks

    MAZIN OMAR KHAIRO

    [ View:    Abstract ] [ HTML Full Text]

    While the current IT plethora is replicating enormous data and it need to have tremendous
    processing power by the servers to maintain this valuable data and storages. Therefore in order
    to provide ease to data storage Erasure coding exhibits much success in the area of data mining
    as it can reduce the space and bandwidth overheads of redundancy in fault-tolerance delivery
    systems, so the exploration of erasure coding in concurrency with the metadata will be appreciable;
    Research also on the other side of the coin shows as few have analyzed the understanding of
    consistent hashing too will proved productive for certain related issues and also the neural
    networks can be used for maintaining and exploring new data sciences in order to provide
    encouraging frameworks in managing infinite volumes of data we have at our disposal. In this
    work, we prove the visualization of simulated annealing in order to render solution at global
    maxima and provide provision of improvements to the specified framework or model. We also
    analyzed and state the disconfirmation about the fact that write-back caches and neural networks
    are never incompatible

    Hide Abstract

    Views    PDF Download PDF Downloads: 1
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • Intrusion Detection and Prevention System using ACL

    A. HYILS SHARON MAGDALENE

    [ View:    Abstract ] [ HTML Full Text]

    It is widely recognized that the threat to enterprises from insider activities is increasing and
    that significant costs are being incurred. The multi-faceted dimensions of insider threat and
    compromising actions have resulted in a diverse experience and understanding of what insider
    threats are and how to detect or prevent them. The purpose of this research is to investigate the
    potential for near real-time detection of insider threat activities within a large enterprise environment
    using monitoring tools centred on the information infrastructure. As inside threat activities are not
    confined solely to cyber-based threats, the research will explore the potential for harnessing a
    variety of threat indicators buried in a different enterprise operations connected or interfacing with
    the information infrastructure, while enabling human analysts to make informed decisions efficiently
    and effectively.

    Hide Abstract

    Views    PDF Download PDF Downloads: 1
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • History & Future of Design Education: Importance of Design Education learning in India

    JUNEESH K KURIACHAN

    [ View:    Abstract ] [ HTML Full Text]

    This article recounts research-in-progress which attempts to account for a paradigm
    shift in Indian design education. The research also explores features that need to be rooted and
    nurtured in the foundation year of design education to be suitable for the realities of life in 21st century
    India. This foundation year has had diverse titles including “Design Fundamentals” or “Basic Design”.
    The foundation year began at the Bauhaus and evolved after 1945 at the Hochschule für Gestaltung,
    Ulm and the Academy of Art and Design Basel (HGK Basel). In its emergent period design was
    concentrated on discrete products including industrial goods, textiles, ceramics, architecture and
    graphic design. Today, however, to be pertinent to concurrent society, designers need to work on
    convoluted issues that are interdisciplinary and much comprehensive in scope. 21st century design
    education needs to be able to apply design and develop strategies to solve actual issues and not
    just look at “good form”. There is also a visible shift from client-driven projects towards a more
    reflective “issue-based” design education that strives for more socially inclusive, locally/glocally/
    globally relevant solutions: a move from “human-centric design” to “life-centric design”. The research
    to date incorporate an overview of the history of design education in India from its European origins
    and a literature scrutiny of both formal (books, papers, and reports) and informal sources (blogs and
    emails) to justify and reinforce the argument for change. Identification of central issues to contemporary
    design education is based in-depth interviews and emphasize group discussions. The interviews
    and discussions were with design educators and professional designers who interact with design
    students as mentors or share a common con-cern for design education. Deliberations on design
    and insights into future directions were congregated from confer-ence and seminar recordings. The
    complications of the Indian people, both nationally and locally, within the mesh of cultural diversity
    with eco-nomic discrepancy-ncluding health, transportation, housing, agricultural support, safe
    water provision, to mention some of the many sectors—are areas which offer potential for the
    designer to make a contribution in finding panacea to the wide range of problems facing India. It is
    important for designers to comprehend the complexity of issues at stake as well as being aware of
    “intangibles” like values, social responsibilities, empa-thy, humility, and local/global relevance. When
    design education includes political, social, economic and eco-logical discourses in a collaborative,
    inter/multidisciplinary way perhaps then design can participate actively in nation building.

    Hide Abstract

    Views    PDF Download PDF Downloads: 1
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • Second Derivative Free Eighteenth Order Convergent Method for Solving Non-Linear Equations

    V.B. Kumar Vatti1, Ramadevi Sri2 and M.S.Kumar Mylapalli2

    [ View:    Abstract ] [ HTML Full Text]

    In this paper, the Eighteenth Order Convergent Method (EOCM) developed by Vatti et.al is considered and this method is further studied without the presence of second derivative. It is shown that this method has same efficiency index as that of EOCM. Several numerical examples are given to illustrate the efficiency and performance of the new method.

    AMS Subject Classification: 41A25, 65K05, 65H05.

    Hide Abstract

    Views    PDF Download PDF Downloads: 11
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • Fibonacci Cordial Labeling of Some Special Graphs

    A. H. Rokad

    [ View:    Abstract ] [ HTML Full Text]

    An injective function g:V(G)→{F0,F1,F2,...,Fn+1},where Fjis the jth Fibonacci number(j=0,1,...,n+1), is said to be Fibonacci cordial labeling if the induced functiong∗: E(G) →{0,1}defined by g ∗(xy)=(f(x)+f(y)) (mod2) satisfies the condition |eg(1)−eg(0)|≤1. A graph having Fibonacci cordial labeling is called Fibonacci cordialgraph. In this paper, i inspect the existence of Fibonacci Cordial Labeling of DS(Pn),DS(DFn),EdgeduplicationinK1, n,Jointsum ofGl(n),DFn⊕K1,nand ring sum of star graph with cycle with one chord and cycle with two chords respectively.

    Hide Abstract

    Views    PDF Download PDF Downloads: 11
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone