Introduction Semantic web is the future development of World Wide Web (WWW). The information stored by WWW is intended for human use. The contents in the WebPages are left to the user to read and understand also to make connections between information stored in the WebPages. Semantic web allows the user computer to draw the required connections between information in …
Read More »admincom
Hybrid Approach for Load Balancing in Cloud Computing
Introduction Cloud computing comes throughout focus development of grid computing, virtualization as well as web technologies. Cloud computing is usually the world wide web based computing That presents infrastructure as service (IaaS), platform as service (PaaS), software as Service (SaaS). Throughout SaaS, software application form is usually created shown through the cloud provider. PaaS a good application development platform for …
Read More »Scheduling Strategies in Hadoop: A Survey
Introduction Cloud computing[1] is an emerging technology which enables convenient, on-demand access to a shared pool of configurable computing resources, such as servers, networking, applications and services. These shared resources can be rapidly deployed and re-deployed with minimal human intervention to meet resource requirements. The resources can be rapidly changed to match the immediate needs of the workload in minutes …
Read More »Advantages and Challeging in E Agriculture
Introduction E-Agriculture is an emerging field focusing on the enhancement of agricultural and rural development through improved information and communication processes. More specifically, e-Agriculture involves the conceptualization, design, development, evaluation and application of innovative ways to use information and communication technologies (IT) in the rural domain, with a primary focus on agriculture. E-Agriculture is a relatively new term and we …
Read More »High Level Security Trust Zones for Private Clouds
Introduction Cloud computing enables a new business model that supports on-demand, pay-for-use, and economies-of-scale IT services over the Internet. The Internet cloud works as a service factory built around virtualized data centers.1 Cloud platforms are dynamically built through virtualization with provisioned hardware, software, networks, and datasets. The idea is to migrate desktop computing to a service-oriented platform using virtual server …
Read More »Text Based Image Compression Using Hexadecimal Conversion
Introduction Image processing applications are drastically increasing over the years. Storage and transmission of digital image has become more of a necessity than luxury these days, hence the importance of Image compression. Image security has become most important aspect while transmission, exchanging and storage of an image. Most of compressions techniques are based on properties of inter pixel redundancy, pixel …
Read More »The Moderating Effect of Knowledge Stocks Capability on the Relationship Between Business Process Reengineering Factors and Organizational Performance Services Firms
Introduction The intensive competition in the globalized business world has forced business institutions to make changes their operation processes beyond local competition to global competitiveness. In same manner, according to Goksoy, Ozsoy and Vayvay (2012) if a firm wants to survive in today’s hypercompetitive environment it needs to bring in moderate change every year and undergo a major change almost …
Read More »Context Driving Speed Limit Alert, Synchronized Monitoring System
Introduction The Context Driving Speed Limit Alert system (CDSLA) has developed by the integration of GPS and GIS for collecting En route traffic data from a probe vehicle. This system has been further integrated with the engine management system of a vehicle to provide time-tagged data on GPS position and actual speed, distance travelled, acceleration, fuel consumption, engine performance, and …
Read More »A Comparison on Different Image Completion Methods
Introduction This paper addresses about, image inpainting or disocclusion and geometric image rearrangement. In image inpainting a special case is texture synthesis constrained by boundary matching with a seed texture. Here an image U is given where a few pixels or a whole region Ω is missing, we wish to recover the lacking information in the best possible way. To …
Read More »Simulate and Model MANETs Environment with AOMDV Routing Protocol
Introduction Mobile Ad hoc network (MANET) is a collection of wireless mobile nodes that can be set up anywhere, anytime and connected via wireless link without using an existing of any fixed infrastructure. MANET is formed dynamically by an autonomous system of mobile nodes. These nodes are wirelessly connected. It represents a dynamic distributed system of arbitrarily moving wireless devices. …
Read More »Performance Evaluation in Web Architectures
INTRODUCTION Now a day’s for web development mainly used CWA, DWA and SOA. However business stakeholders believe in DWA and SOA for his business application. Distributed web-applications play major role to improve web application through quality attributes. Along with the great demand of web applications in the era of pervasive and ubiquitous computing, a number of issues related to quality …
Read More »Security Measures of WSN Networks by Avoiding Message Replay Attacks
Introduction A wireless sensor network is a collection of nodes organized into a cooperative network. Wireless networks based upon IEEE 802.11 standards can now provide bandwidth approaching those of wired networks [4]. At the same time, the IEEE has noticed the low expense and high capabilities that sensor networks offer. The organization has defined the IEEE 802.15 standard for personal …
Read More »Simulation Study to Observe the Effects of Increasing Each of The Network Size and the Network Area Size on MANET’s Routing Protocols
Introduction MANET usually refers to the autonomous system without any centralized management. The expression ‘Ad Hoc’ means that this type of networks can take different forms. Because its quick and easiest deloyment, this type of network is feasible to be used in search, military, rescue operation, sensor networks and meeting rooms [Jogendra Kumar, 2012][Gurleen kaur wailed, 2013]. MANET can also be …
Read More »A Systematic Literature Survey on Various Techniques for Software Fault Proneness
INTRODUCTION Fault prone modules prediction is an important area in the software engineering. Constraints and the complexity of software are increasing day by day. Due to which it is very difficult to produce software without faults. Risk management also can be done by the early identification of the fault prone software modules. First of all it is must to know …
Read More »GPS Based Surveying for Mapping of Canal Alignment in GIS Environment – A Case Study of a Branch Canal of Alimineti Madhava Reddy project, Nalgonda District, Andhra Pradesh, India.
Introduction The Govt. of Andhra Pradesh has proposed and implementing many irrigation projects across the state as a major activity. Many new canals and sub canals / distributaries are proposed to construct under the command areas of these new and existing projects. Mapping of canal alignments from a specific location, linked to a river, reservoir or a major canal with …
Read More »Background Construction of Video Frames in Video Surveillance System Using Pixel Frequency Accumulation
Introduction Moving object detection in real time is a challenging task in visual surveillance systems. It often acts as an initial step for further processing such as classification of the detected moving object. In order to perform more sophisticated operations such as classification[1]. Visual surveillance is one of the major research topics and has two major steps: detection and recognition …
Read More »A Review on Shot Boundary Detection
Introduction The increased availability and usage of online digital video has created a need for automatic video content analysis techniques. Detection of shot boundaries is an early and quite important processing step in video analysis, especially for indexing and effective retrieval applications [1]. Video shot boundary detection algorithms have to challenge the difficulty of finding shot boundaries in the presence …
Read More »A Comparative Study of two major Search Engines: Google and Yahoo
INTRODUCTION WWW plays a vital role in day to day life of people. A large amount of information is available on the web. The friendly user interface and adequate features of the WWW attract the users to access the web. Web holds text documents as well as multimedia information like images, videos, sounds, graphics etc. Internet has become the most …
Read More »A Novel Approach to Deal with Keyloggers
Introduction Keyloggers are software programs that monitor user input data to gather information concerning these data and are often used with malicious intent. Data collected by Keyloggers usually contain personal and financial information such as bank account user name and password, email or text messages and etc.[1] Increased use of personal computers for financial and e-commerce transactions has fueled the …
Read More »Multi-module Singular Value Decomposition for Face Recognition
INTRODUCTION In recent years, computer vision research has witnessed a growing interest in subspace analysis techniques. And the important problem is how to extract the valid discriminator features for face recognition. The Karhunen-Loève Transform(KLT) and Principal Component Analysis are examples of eigen vector-based reduction and features extraction. A maximum a posteriori (MAP) matching rule using a Bayesian similarity measure derived …
Read More »The Relation between E-Commerce and AIS in Medium Scale Organizations
Introduction The breakthrough of e-commerce has created an international open market that does not have any kind of geographical constraints. With the start of the twenty first century in cooperation with the IT revolution and the wide use of computers and internet in most fields, the use of the internet as a medium for the execution of the e-commerce operations …
Read More »