Computer Applications
30,952 Followers
Recent papers in Computer Applications
Decision tree classification techniques are currently gaining increasing impact especially in the light of the ongoing growth of data mining services. A central challenge for the decision tree classification is the identification of split... more
Unsolicited commercial email or "spam" flood mailboxes, causing frustration, wasting bandwidth, and exposing minors to unsuitable content. This paper uses intelligent gatekeepers to interact with spam messages and system referenced in... more
In this paper, a resource management technique is proposed to handle the request of Virtual Machines (VM’s) as per the need of users, consisting of resources (mips, vm image size, network bandwidth, number of cpu’s) containing cloudlets... more
An approach for improving quality and performance of collaborative filtering-based recommender systems is proposed in this paper. A slight change on similarity metric is proposed. To obtain more accurate similarity measurement between two... more
Graphics Processing Units (GPUs) were developed for graphics processing and it was not highly-parallel. But to overcome this problem developed General Purpose Computing on GPU, this is known as GPGPU.Boyer-Moore exact string matching... more
Finding meaningful information among the billions of information resources on the Web is a difficult task due to growing popularity of the Internet. The future of World Wide Web (WWW) is the Semantic Web, where ontologies are used to... more
Information security in the banking sector is heavily controlled as banks store and manage their clients' private information. Information security has always been the responsibility of the information technology (IT) department in... more
Artificial intelligence with Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.... more
The most critical and important aspect of disaster recovery is to protect the data from application fail over, natural disasters and infrastructure failures. Taking frequent backups of the huge volumes of data and storing it is also an... more
Feature detection is the initial step in any image analysis procedure and is essential for the performance of computer vision applications like stereo vision, object recognition, object tracking systems. Research concerning the detection... more
Bisthiourea Zinc Acetate (BTZA) a semi organic material has been synthesized by slow evaporation method using water as a solvent. The solubility studies have been carried out in aqueous solution in the temperature range 25 ˚C – 45 ˚C.... more
Vertex coloring is a graph coloring technique which has a wide application area to provide solution for many real world problems. The high computational complexity of graph coloring algorithm led the development of exact heuristic... more
introduced in 2003, is a techniques used for hidden communication between two covert parties. It is an art of hidden communication. It also relates to the areas like network protocols and security for practical data hiding in... more
Teenage alcohol addiction poses a major problem to the wellbeing of the individual as well as the society. Prevention of this requires identifying the factors causing this addiction. The existing systems mainly rely on decision trees and... more
Multilayer perceptrons (MLPs) are widely used for pattern classification and regression problems. Backpropagation (BP) algorithm is known technique in the training of multilayer perceptrons. However for its optimum training convergence,... more
It is impossible to capture all of the semantics of real world information and to model it in a perfect way. Uncertain information being lacking information, individual interpretation of knowledge is taken into account. Most widely used... more
Agricultural land in Denpasar city from year to year is always decreasing. Based on data from the years 2011-2014, agricultural land decreased significantly with percentage 58.6%. The decline in agricultural land affects agricultural... more
In this paper a new intelligent identification method of uncertainty bound utilizes an adaptive neurofuzzy inference system (ANFIS) in a feedback scheme is proposed. The proposed ANFIS feedback structure performs better in determining the... more
In this study, an educational tool has been presented to teach fuzzy logic controller (FLC) and classical controllers to undergraduate and graduate level students, so that students could establish a thorough understanding and be able to... more
Web usage mining aims to discover interesting user access patterns from web logs. Web usage mining has become very critical for effective web site management, creating adaptive web sites, business and support services, personalization and... more
This project provides better surveillance for our country by using Internet of things. It is a Rover type device which is useful in high risky boundary regions and the lands where human cannot enter. In this project, the motion of the... more
The study of frog is important since the chemical compound in their skin extracts peptides with antimicrobial activity becomes a valuable tool for pharmacology and biochemistry research. Instead of depending on physically observation... more
The Binet formula for Pell sequence is viewed as a function of complex variable. In this paper the study of attracting and repelling fixed points of Pell sequence is presented with the complex dynamics resulting in the escape time images.... more
The healthcare environment is generally perceived as being information rich yet knowledge poor. The healthcare industry collects huge amounts of healthcare data which, unfortunately, are not―mined‖ to discover hidden information. However,... more
Phishing is a novel kind of website/network attack which makes a deceitful attempt and influences the amenities or information security instead of stealing personal, financial and transactional data, etc. To preclude users or network from... more
To be able to control devices by voice has always intrigued mankind. Today after intense research, Speech Recognition System, have made a niche for themselves and can be seen in many walks of life. The accuracy of Speech Recognition... more
Security of the consumer’s data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security... more
In the present paper the authors have introduced a new symmetric key cryptographic method called Bit Level Encryption Standard(BLES) which is based on bit exchanging or bit reshuffling method. The authors have introduced a completely new... more
Dimensionality refers to number of terms in a web page. While classifying web pages high dimensionality of web pages causes problem. The main objective of reducing dimensionality of web pages is improving the performance of classifier.... more
The rapid spread of 3G wireless network and wireless technologies, are applied in many areas, the education is the interesting approach for using this technique, so the benefit of modern technology can be used in mobile learning. This... more
Vehicular Ad-hoc Network (VANET) are an emerging technology with vehicle. As a subset of Mobile Ad-hoc Network (MANET) application, VANET is considered to be a new phase of technology to the Intelligent Transportation System (ITS). VANET... more
Maintainability of the software is one of the key quality while evaluating software product. Of the overall software development cost, major stake is employed at the maintenance phase. Maintenance time of software is always greater than... more
For many decades researchers in the domain of NLP (Natural Language Processing) and its applications like Machine Translation, Text Mining, Question Answering, Information Extraction and Information retrieval etc. have been posed with a... more
The recent advances and the convergence of micro electro-mechanical systems technology, integrated circuit technologies, microprocessor hardware and nano technology, wireless communications, Ad-hoc networking routing protocols,... more
The UMES School of Business and Technology in collaboration with the Center for Student Technology Certification and Training has initiated an innovative three-prong program that uses the IC3 test to evaluate the information and digital... more
Segmentation is a process of converting inhomogeneous data into homogeneous data. There are many segmentation techniques available inthe literature. Among these techniques, finite Gaussian Mixture Model using EM algorithm is one mostly... more
Segmentation of a word into basic characters or strokes is an essential and necessary step for character recognition in many handwritten word recognition systems. The one of the major difficulties in character segmentation is the... more
Conversion from paper-based medical records to electronic Health Records provides significant benefits to healthcare. However, there are some challenges perceived by healthcare providers when implementing Electronic Health Records. This... more
Information and communication technology is the major tool to improve the quality of education. Indian Government invested huge amount for ICT to improve the education sector. Also, various ICT trainings are given to the school teachers... more
Automatic identification of male and female from facial image allows many useful applications in biometrics, surveillance, and human-computer interaction. This paper presents a robust face feature descriptor for gender classification from... more
This paper introduces hybridization of particle swarm optimization (PSO) with genetic algorithm (GA) denoted as PSO+GA provides an efficient approach which is used to solve non linear chaotic datasets. The proposed algorithm employed in... more
The growing complexity of real-world problems has motivated computer scientists to search for efficient problemsolving methods. Divide and conquer techniques are one way to solve large and difficult problems. Division of large work into... more
The increased need of content based image retrieval technique can be found in a number of different domains such as Data Mining, Education, Medical Imaging, Crime Prevention, Weather forecasting, Remote Sensing and Management of Earth... more
Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a... more
Nowadays, people deal with a huge amount of data, especially while they are surfing on internet. So, this makes the topic of automatic summarization is very important and in the forefront. In this paper, a review for text summarization... more