Matt holds a BA and MA certificate from Cambridge, and is an subject-matter expert in Business and Management. Matt also writes about subjects like Finance, Economics and Computing/ICT.
K.Thendral, Dr.S.Chitrakala, S.P.Surendernath
ABSTRACT:
Mining social emotions deals with a new aspect for categorizing the document based on the emotions such as happy, sad, sympathy, etc., the…
Industrial wireless infrastructure goes beyond a hand full of WSN in the field sending back information to a localised host system, the broader picture of a truly industrial wireless infrastructure e…
Performance Optimization of Benchmark Functions using VTS-ABC Algorithm
Twinkle Gupta and Dharmender Kumar
Abstract– A new variant based on tournament selection called VTS-ABC algorithm is p…
Monika Kalotra
Dr. Kuljit Kaur
Abstract: To improve the quality of software system, there is a need to eliminate or reduce the rework. Software reuse is one of the solution proposed for it. Soft…
Nachiket D. More
Abstract
GENOME is term used for genetic material of organism. It is used to encode DNA of organisms, or RNA of various kinds of viruses. Ii contains both coding and non coding parts…
Rajnarayan Sharma, Ravi Antil, Jonish
Abstract— in this paper we focus on the dynamic power dissipation during the Write operation in CMOS SRAM cell. The charging and discharging of bit lines co…
Increasing Time Efficiency of Insertion Sort for the Worst Case Scenario
Surabhi Patel, Moirangthem Dennis Singh
Abstract. Insertion sort gives us a time complexity of O(n) for the best case. In…
Kamred Udham Singh
Abstract
In the era of information security, Steganography is a most secure method, used for concealing existence of secret data in any digital cover object such as image, audio,…
GPU-Accelerated Impact Maximization in Large-Scale Professional Networks
Dr. M. Rajasekhara, Babu B. V. Arunragavan
Abstract
Impact Maximization means to discover the top-K fascinating people to e…
N.Rajanikumar, Dr.A.Suresh babu, Mr.G.Murali
Abstract: Big data can help at the e commerce data. The big-picture problems, the economic indicator many investors, business fortunate and judges ar…
Mobile computing with WirelessLAN And its modes Ad hoc network with challenges
Pallavi D. Dudhe, Prof. P. L. Ramteke
Abstract – In this paper, we summarized Mobile computing with WirelessL…
Alamin Hussain
Key words: fuzzy logic, XNA, AI, racing game
ABSTRACT
Fuzzy Logic has many opinions and understanding from people to people. In its simplest understanding Fuzzy Logic outputs truth(s…
Chris Avgerinos
Introduction
A fundamental change has been occurring for the last fifteen years in the way people write computer programs. Scripting languages such as Perl and Tcl replaced the syst…
CHAPTER 3
SYSTEM REQUIREMENTS
The system requirements usually specify the needs of the system to accomplish the project successfully and the requirements can be classified as software and hardware re…
Case study of the Nigerian Police Force
OYEKUNLE OYEBOLA COMFORT
Abstract
The aim of this project and implementation is to develop interactive online crime management system which is easily acce…
Abstract— nowadays, security of valuable and secret assets is very important for large organisation companies. Due to limitation of human resources and man power we need an efficient and reliable s…
Secure Message Transmission to the Publisher
Vivek Sharma
INTRODUCTION
The major mechanism regarding to the Publish-Subscribe based system are security, confidentiality, scalability and authenti…
M. Mayilvaganan T.Sivaranjani
Abstract:
Diabetes mellitus is incredible growing and seems to be emerging as a main public health problem for our country.The prevalence of diabetes is rapidly incre…
Adopting MapReduce and Hummingbird for Information Retrieval in dedicated cloud Environment
Dr. Piyush Gupta
Chandelkar Kashinath K.
Abstract:
Data collected in section 3 indicated …