Skip to main content
News archiving becomes a formidable task due to the perpetual generation of news. Archives play a vital role in crafting personalized news programs. Adhering patches of information, crafting the story and shaping up a news script defines... more
    • by 
    •   5  
      OntologyMachine LearningNatural Language GenerationPersonalization
In today’s digital world, image edge detection is widely used in all over the globe. Digital image edge detection is used to detect the sharp changes in brightness of the images and the edge of a digital image. There are many classical... more
    • by 
    •   6  
      DWTThresholdingPSNRImage Edge Detection Algorithms - Sobel
Service-oriented architectures are widely considered to be the determining trend in software engineering. Vendors of software products want to benefit by migrating to cloud environments. However, when transforming an existing software... more
    • by 
    •   6  
      Software EngineeringRequirements EngineeringReengineeringSoftware as a Service (SaaS)
A new kind of comfort and confidence has been created by location based services in the mind of mobile and internet users by providing automotive help in many areas like tracking, navigation, gaming and information fetching about a... more
    • by 
    •   5  
      GPS ApplicationsLogisticsNavigationLBS
At present, cloud computing extremely popular subject, which allows a service provider to provide seamless service/information over internet. Therefore, it eliminates the necessity for maintaining expensive computing resources. Testing... more
    • by 
    •   4  
      Software TestingCloud ComputingCase ManagementIjcet Iaeme
In this system we propose a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of... more
    • by 
    •   7  
      MetadataAuditingData SharingAida
Computing is changing frequently to serve the user’s needs for security and reducing a dependency which leads researcher to develop newer technologies. Cloud computing is one of those technologies which successfully delivers the service... more
    • by 
    •   8  
      Cloud ComputingCloud Computing SecurityActive ObjectsActive storage
This paper addresses the problem of partitioning a graph and particular the use of the genetic algorithms for graph partitioning. It is a NP hard problem. The solution of a graph (circuit) partitioning problem is global optimum. In this... more
    • by 
    •   5  
      Genetic AlgorithmMutationCrossover InterferenceNet list
In this paper, a new adaptive weight algorithm is developed for the removal of salt and pepper noise particularly in satellite images. Satellite images are corrupted when acquired by a defective sensor or when transmitted through a faulty... more
    • by 
    •   3  
      Salt and Pepper NoisePeak Signal to Noise Ratio (PSNR)Ijcet Iaeme
In today’s age the major problem is related to the predicting user’s web page request. In the past few years the markov model is used for this problem. The effective web mining techniques like Clustering, Association rule mining and... more
    • by 
    •   6  
      Hybrid Systems ModellingFuzzy ClusteringAssociation Rules Mininghidden Markov model
This article describes in detail how to detect the effects of climate change through hybrid technology and give the solutions. In today's environment, climate change [1] is emerging as the biggest problem threatening the world. This study... more
    • by 
    •   5  
      SensorCloud ComputingIOTWireless Sensor Network
In this paper, a similarity measure for images based on values from their respective Fourier Transforms is proposed for image registration. The approach uses image content to generate signatures and is not based on image annotation and... more
    • by 
    •   2  
      Feature ExtractionIjcet Iaeme
As mobile devices grow in popularity and presents in everyday life, it’s often involved in digital crimes and investigation as well. But rapid evolution of new form of online communication known as social networking has become a medium... more
    • by 
    •   4  
      Personal Information ManagementMobile DeviceThe Usual SuspectsIjcet Iaeme
With the substantial growth in volume and complexity of data used in the digital world large organizations need to handle a variety of unstructured data. Traditionally relational database systems have been used to store, process and... more
    • by 
    •   6  
      RDBMSMongodbNoSQL DatabasesNo-Sql Databases
In information field we have huge amount of data available that need to be turned into useful information. So we used Data reduction and its techniques. A process in which amount of data is minimized and that minimized data are stored in... more
    • by 
    •   5  
      Data ReductionNSL KDDData Reduction TechniquesIaeme Publication
Nowadays, analytics is playing a key role in any field. Analytics is used in our day to day life. People don’t want to purchase even without analytics. Before few months IPL (Indian Premier League for Cricket) auction was taking placed.... more
    • by 
    •   4  
      AnalyticsData AnalyticsSports analyticsIjcet Iaeme
Cloud computing is a concept of modern and smart computing world. People buy high configuration computer system for their use but a little amount of the total capacity is used by them. So, computing power and money both becomes waste. The... more
    • by 
    •   4  
      Cloud ComputingSecurity in Cloud ComputingServerless AuthenticationIjcet Iaeme
With the substantial growth in volume and complexity of data used in the digital world large organizations need to handle a variety of unstructured data. Traditionally relational database systems have been used to store, process and... more
    • by 
    •   7  
      RDBMSMongodbNoSQL DatabasesNo-Sql Databases
There are millions of websites in the world now but it has been observed since very long time that Web Security has been one of most important areas of research whether be it either analysis or detection and later developing to mitigation... more
    • by 
    •   5  
      Web ApplicationsCyber WorldSOAP web servicesCyber Attacks
With the continues development of the computer network, information has been exchange in different format like text, image, audio and videos. In today’s scenarios security is playing a vital role in networking. Securing all these types of... more
    • by 
    •   5  
      EncryptionNetworkingSecurity Analysis and ValuationHybrid Cryptosystem
With the substantial growth in volume and complexity of data used in the digital world large organizations need to handle a variety of unstructured data. Traditionally relational database systems have been used to store, process and... more
    • by 
    •   7  
      RDBMSMongodbNoSQL DatabasesNo-Sql Databases
The study investigates the current impact of Electronic Data Interchange (EDI) adoption in shipping, logistics sea freight forwarding industry and in customs. It is found that the level of adoption of EDI applications in shipping... more
    • by 
    •   5  
      RIch Internet ApplicationsElectronic Data Interchange (EDI)Ego documentsUNCITRAL arbitration
At present, tags are extensively used to describe the images, so that utilizing these tags for image retrieval system is today’s need. So, our system incorporates image similarity graph with image-tag bipartite graph using visual features... more
    • by 
    •   5  
      Content-Based Image RetrievalGrapheneImage AnnotationContent-Based Indexing
With the continues development of the computer network, information has been exchange in dif erent format like text, image, audio and videos. In today’s scenarios security is playing a vital role in networking. Securing all these types of... more
    • by 
    •   5  
      EncryptionNetworkingCryptographic EngineeringHybrid Cryptosystem
Rootkit is one of the primary concerns of network communication systems, which is related to the security and privacy of Internet users. The worldliness of malicious software (malware) used to breakdown the computer security has increased... more
    • by 
    •   5  
      Network SecurityVirtual Machinescloud MonitoringRootkit
Diabetes mellitus is a common disease caused by a set of metabolic ailments where the sugar stages over drawn-out period is very high. It touches diverse organs of the human body which therefore harm a huge number of the body's system, in... more
    • by 
    •   8  
      Machine LearningMedicineLogistic RegressionSupport vector machine
Biometric Systems Now a Days are playing a vital role in the whole word. Biometric Identification is been carried out in all the industrics, Institutions and in all the concerns wherr we are in need of the security and heavy monitoring.... more
    • by 
    •   5  
      AuthenticationABMidentification of personsIjcet Iaeme
Agriculture is the backbone of Indian economy. About 50% of Indian population depending on agriculture sector to meet their day-to-day expenses. The current irrigation system practiced in India is sprinkler water irrigation, tank water... more
    • by 
    •   5  
      Soil Moisture SensorsBluetooth moduleArduino UnoIoT Security
The Cyber risk landscape is developing rapidly in multitude areas. Report to cyber attacks dominates the headlines. It is seemingly becoming more frequent and more sophisticated than ever. Businesses across the wide spectrum of industries... more
    • by 
    •   4  
      Cyber InsuranceCyber AttackCyber RiskIjcet Iaeme
Big Data has become a research hotspot in academia and industry, and it is affecting people's daily life, work habits and ways of thinking. However, at present, big data faces many security risks in the process of collection, storage and... more
    • by 
    •   4  
      Privacy and data protectionBig Data SecurityBig data analysisIjcet Iaeme
OLTP applications, in the current times, require support for ACID transactions and concurrency. But these properties each come with their trade-off. NewSQL systems have emerged as the solution to this conundrum, by overhauling the... more
    • by 
    •   4  
      Concurrency ControlOLTPNewSQLIjcet Iaeme
Computational Musicology is new and emerging field of Data Mining. Raga is the most aspect of Indian Classical Music. It consists of unique set of notes (swara) and Pakad that correspond to a specific pitch. North Indian Classical Music... more
    • by 
    •   3  
      North Indian Classical MusicSwarajIjcet Iaeme
With the substantial growth in volume and complexity of data used in the digital world large organizations need to handle a variety of unstructured data. Traditionally relational database systems have been used to store, process and... more
    • by 
    •   7  
      RDBMSMongodbNoSQL DatabasesNo-Sql Databases
RFID is only one of numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, magnetic inks, optical character recognition, voice recognition, touch memory, smart cards, biometrics etc. Auto ID... more
    • by 
    •   5  
      MiddlewareTagalogRadio WavesRFID Reader
Semantic Textual Similarity (STS) calculates the degree of semantic equivalence between two textual snippets, even though they do not share common words. The textual snippets are words, phrases, sentences, paragraphs or documents. In... more
    • by 
    •   5  
      SemanticsLexical SemanticsSyntactic ChangeSemantic Textual Similarity
Vehicular ad hoc network (IEEE 802.11e) is dynamic network where independent identity node helps each other to forward the message. But some time node may not be interested in forwarding the message. Thus it is essential to give node some... more
    • by 
    •   4  
      Load BalancingChoice Based Credit SystemCoalitional Game TheoryIjcet Iaeme
Eclipse Modeling Framework (EMF) designed especially for models. Eclipse is a platform for building integrated development environments (IDEs) for Java and C programming, websites and other applications. EMF may use for reducing... more
    • by 
    •   4  
      Working ClassesObject DetectionEclipse Modeling Framework (EMF)Ijcet Iaeme
Smart city is a prominent concept and it is being used in entire world with various contexts. Smart cities provide technological services, cost effective services and optimized services for the stakeholders. Smart solutions can solve the... more
    • by 
    •   6  
      Internet of ThingsSmart CityBig Data AnalyticsSmart car parking system
It is the ability to examine/write information among specific executions of an utility and between requests. A way to make sure facts persistency for an utility is to apply database software to save records. Large websites and... more
    • by 
    •   6  
      Performance Evaluation (Computer Science)OracleDBMSMicrosoft Access
In this paper we discuss about a brief overview of TCP SYN Flood attack which is a type of denial of services attack. Most of the research papers discuss only about theoretical aspect. Main idea of this paper is to use attacker tools for... more
    • by 
    •   3  
      DosenSYN-floodingIjcet Iaeme
Computer programming is the worldwide language of our earth and a basic literacy in the digital age. There is no doubt that knowledge computer programming at a youthful age is helpful for all students at least in their daily life. The... more
    • by 
    •   3  
      Education SectorComputer ProgrammingIjcet Iaeme
Cloud Computing allows users to modify number of resources in real time thus focusing on computing as a utility that can be access over the Internet. We saw various phases starting from Centralized Bulky systems to Distributed Networks... more
    • by 
    •   5  
      Cloud ComputingCapacity PlanningPay As You GoCapacity Management
Wireless Sensor Networks have been growing in many areas like healthcare, surveillance, disaster sensing, agriculture, defence, weather forecasting, smart home and manufacturing. A sensor network is a sensor node that is connected... more
    • by 
    •   7  
      VirtualizationCloud ComputingVirtual SensorsPhysical Sensors
In information field we have huge amount of data available that need to be turned into useful information. So we used Data reduction and its techniques. A process in which amount of data is minimized and that minimized data are stored in... more
    • by 
    •   4  
      Data ReductionNSL KDDData Reduction TechniquesIjcet Iaeme
Image enhancement has been an area of active research for decades. Most of the studies are aimed at improving the quality of image for better visualization. Contrast Limited Adaptive Histogram Equalization (CLAHE) is a technique to... more
    • by 
    •   3  
      Image EnhancementClassical histogram equalizationIjcet Iaeme
Electronic Commerce (E-commerce) is the conduct of business activities using electronic data transmission technologies such as those used in the Internet and World Wide Web (WWW). There are different aspects of doing Ecommerce such as... more
    • by 
    •   5  
      E-CommerceAdvantagesEMOTIONAL BRANDINGElectronic Commerce
Water management has become one of the major concerns in many countries. Researchers have proposed different criteria and methodologies for identification of suitable dam sites. Based on our literature review, we have identified three... more
    • by 
    •   5  
      Geo-spatial analysis with GIS and GPSHydrological modellingArid and Semiarid RegionsMulti-Criteria Spatial Analysis
Engineering Industries (EI), Product Lifecycle Management (PLM) and Engineering Change Management project with the objective of reengineering several business processes and enabling the processes within PLM... more
    • by 
    •   5  
      Energy SystemsEngineering Change ManagementPLM, Product Lifecycle ManagementComputer Aided Design / Manufacturing / Engineering (CAD-CAM-CAE)  Product Data Management / Product Lifecycle Management (PDM/PLM)  Lean Production (Kaizen, 5S, Six sigma) Rapid Prototyping / Manufacturing (3D printing)
Anonymous credential systems provide a mechanism for the users to authenticate themselves anonymously. Since the transactions are inherently anonymous, some users try to misbehave by taking advantage of their anonymity. So there is a... more
    • by 
    •   6  
      Initiatory ArtSecure Hash AlgorithmSecure Socket Layer (SSL)Certification Authority(CA)
The incumbent trend in process industry is to use ICT enabled wired process control systems. Distributed control system, Supervisory control and data acquisition systems with wireless open loop control systems are commonly used to... more
    • by 
    •   5  
      ICT in EducationStructural AnalysisInitial Environmental ExaminationDiagraphies