Matt Swarbrick

Matt Swarbrick
1,170
Articles Published

Matt holds a BA and MA certificate from Cambridge, and is an subject-matter expert in Business and Management. Matt also writes about subjects like Finance, Economics and Computing/ICT.

Articles by Matt Swarbrick

Factor Language Model Programming

Essay. Published: 22 June 2018

Language Model Language model helps a speech recognizer figure out how likely a word sequence is, independent of acoustics. There is a linguistic and statistical approach to calculate the probability…

Face Recognition Using PCA Algorithm

Essay. Published: 22 June 2018

Bollini Lokesh, Abhishek Nallamothu, Mr.S.Planiappan   ABSTRACT Day by day technology is changing and way of securing and automation is also trending. Facial recognition (or face recognition) is …

Content Based Image Retrieval System Project

Essay. Published: 22 June 2018

An Efficient Content-based Image Retrieval System Integrating Wavelet-based Image Sub-blocks with Dominant Colors and Texture Analysis ABSTRACT Multimedia information retrieval is a part of computer …

Cancer Prediction Using Data Mining

Essay. Published: 22 June 2018

Cancer Disease Prediction from Horoscope of a Person Using Data Mining D. JAGADEESWARAN Abstract This paper deals with finding out the possibilities of affliction a person from cancer disease i.e. …

Tracks Covering in Penetration Testing

Essay. Published: 22 June 2018

Er. Ramesh Narwal Er. Gaurav Gupta   Abstract After completing attack, covering tracks is the next step in penetration testing. In tracks covering after completing attack we will return to each ex…

User Level Rootkit: Computer Security Systems

Essay. Published: 22 June 2018

Hamid Tarmazdi Sohaib Irshad   1 Introduction Let us have a look at the definition of the word. The word has two components, root and kit. Root is usually a UNIX/Linux term that is used for admini…

Comparative Analysis of Rank Techniques

Essay. Published: 22 June 2018

Abstract There is paramount web data available in the form of web pages on the World Wide Web (WWW). So whenever a user makes a query, a lot of search results having different web links corresponding…

Reachability Queries and Data Mining

Essay. Published: 22 June 2018

EVALUATING PATH QUERIES OVER FREQUENTLY UPDATED ROUTE COLLECTION…

Principal Component Analysis for Numerals

Essay. Published: 22 June 2018

In this paper we have proposed principal component analysis (PCA) for feature extraction and used Probabilistic Neural Network (PNN) based model for classification and recognition of off-line handwritten numerals of telugu script…

Development of Interactive Science Learning Material

Essay. Published: 22 June 2018

Firoz Hasan   Project Objective Tab-Based Interactive Science Laboratory for school’s Students. The objective of this project is to use create an interactive science laboratory on the tab for th…

Algorithm to Prevent Obstacle Collision

Essay. Published: 22 June 2018

Description: In this paper, we develop an algorithm to prevent collision with obstacles autonomous mobile robot based on visual observation of obstacles. The input to the algorithm is fed a sequence …

ACM ICPC Regional Problem

Essay. Published: 22 June 2018

Siti Nazihah Binti Sarpin (L) Nurul Aini Binti Mohd Hisan Table of Contents (Jump to) Introduction Problem Description Problem Statistics Problem Details ACM ICPC Regional Problem Reaso…

Data Anonymization in Cloud Computing

Essay. Published: 22 June 2018

Data Anonymization Approach For Privacy Preserving In Cloud Saranya M   Abstract—Private data such as electronic health records and banking transactions must be shared within the cloud …

Characteristics and Advantages of Database Approach

Essay. Published: 22 June 2018

Describe the main characteristics of the database approach and contrast it with the file-based approach. Analyze the key issues and application of databases within organizational environments….

Ebook Security With Adobe Adapt DRM

Essay. Published: 22 June 2018

Abstract EBooks can be secured in various ways dependant on device or format. The report focuses on the encryption method used by Adobe in their Adept DRM used to secure EPUB and PDF formats. The re…

Circuit Switching Versus Packet Switching

Essay. Published: 21 June 2018

Nurhazimah Binti Mohd Za’ba Nursyafikah Binti Farakkasi  Nursyahirah Binti Mohd Sanusi  Nur Hidayu Binti Salleh Nur Syafiqah Binti Zulkiflee Nurul Ain Binti Mohd Nassir Adabi ABSTRACT The purpo…

Sources of Finance for Business: Pros and Cons

Essay. Published: 15 June 2018

Sources of Finance Finance is essential for a business’s, development and expansion. Finance is the core factor for most businesses and therefore it is crucial for businesses tomanage and maintain …

Does Pecking Order Hypothesis Explain Capital Structure

Essay. Published: 9 May 2018

THE PECKING ORDER HYPOTHESIS Determining the optimum capital structure which an organisation should have is a major financial decision, and the importance of decisions regarding capital structure have…

Estimation of Optimal Hedge Ratios – Strategies

Essay. Published: 9 May 2018

Naïve or one-to-one hedge assumes that futures and cash prices move closely together. In this traditional view of hedging, the holding of both the initial spot asset and the futures contract used to …

Algorithm for Robot Navigation Without Collisions

Essay. Published: 19 April 2018

ALGORITHM FOR ROBOT NAVIGATION AT ENVIRONMENT WITHOUT COLLISION   ALGORITHM REPRESENTATION FOR NAVIGATION OF MOBILE ROBOT WITHOUT OBSTACLE COLLISON Mobile robot It is a kind of robot that has the ab…