Matt holds a BA and MA certificate from Cambridge, and is an subject-matter expert in Business and Management. Matt also writes about subjects like Finance, Economics and Computing/ICT.
Email protocol governs the interactions between email clients and servers. An Email protocol is a standard method which is used at each end of a communication channel either server side or client sid…
Data cleaning is needed in process of combining heterogeneous data sources with relation or tables in databases. Data cleaning or data cleansing or data scrubbing is defined as removing and detecting…
Overbooking becomes feasible because user applications tend to overestimate their resources and requirements, that tends to utilize only a fraction of the allocated resources. Overbooking has to be carefully planned in order not to impact application performance. Resource utilization and Data centres utilization can be used in this overbooking scheduler. Data send can send from sources to destination via node….
M.Renuga Devi, G.Seetha lakshmi, M.Sarmila
Abstract—One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own priva…
Prof. J P Agrawal Saurabh Sharma Siddharth Gupta
ABSTRACT
Acoustics has come up as a new vulnerability in the field of information security. The RSA encryption algorithm, although h very hard to br…
KISHORE KUMAR K
GAYATHRI N
RAJESH KUMAR V T
Abstract
This paper aims at proposing a system that reduces the power loss and power theft due to illegal activities. This frame…
Introduction
Multimedia is a term that collectively describes a variety of media content available in various forms of text, speech, audio, still images, video, animation, graphics, 3D models and …
Jignesh C Doshi
Bhushan Trivedi
ABSTRACT
Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any …
Muneer Ahmad Dar
Javed Parvez
Abstract—The increasing number of mobile operating systems that operates the small hand held devices called the Smartphone, has become integral part of our lives. Th…
Green Networking
Abstract:
Saving of excessive energy consumption is becoming a key concern in networking, because of theprobable economical benefits. These concerns, usually argued to as “green ne…
METHODOLOGY
INTRODUCTION
In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is em…
MR. RUSHABH D. DOSHI, MR. GIRISH H MULCHANDANI
Abstract: Metadata Extraction is one of the predominant research fields in information retrieval. Metadata is used to references information resource…
Secure Group Communication ensures forward secrecy and backward secrecy of the data. It is the responsibility of the Group Center (GC) to disallow new members to have access to previous data called b…
Cyber security is about protecting your computer-based equipment and information from unintended or unauthorised access, change, theft or destruction HM Governement (2015), you can manage the risks b…
Abstract:
Alzheimer’s disease (AD) is the general type of dementia that affects the elderly population globally. An accurate and early diagnosis of Alzheimer is crucial for the treatment of patient…
Jaspreet Singh
Abstract
Mutation testing was introduced in 1970’s in the field of software testing as a process of testing the test suites by intentionally seeding errors i.e. mutation operators,…
A Key Management & Establishment Scheme in Heterogeneous Wireless Sensor Networks (HWSN)
Premamayudu B, Venkata rao K, and Suresh Varma P
Abstract: Key management is the one of the fundamen…
Skew Detection of Devanagari Script Using Pixels of Axes-Parallel Rectangle and Linear Regression
Trupti A. Jundale
Ravindra S. Hegadi
Abstract—Skew detection and correction of handwritten dat…
Building an Efficient Database Driven Reverse Mapping Dictionary
ABSTRACT
With the enormous availability of words in usage it is always being a challenge to find the meaning. Even the versatile speak…
Anjan Thapaliya
Abstract
AJAX stands for Asynchronous JavaScript and XML. It is a web technology that evolved in early 2000 and uses a mix of technology like JavaScript and XML. This paper discusse…