Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cloud computing is a large scale and heterogeneous distributed systems which are utilized to store and access the data easily. The clients are requesting and receive their resources as per the requirements. The number of users and services are increasing tremendously day by day. Thus, the resource management in the cloud is a challenging task. Hence, they required some automated strategies for dynamic...
Social interactions can be inferred on the web using the mailing list and home page links. It also represents the social lives of the individuals, collaborations, communities and relationship. Social networking groups are becoming increasingly important due to the volume and activities. Thus, the structure of the network, connectivity, movement of members from one group to another and change of interest...
Business source outlining is the most essential systems which is used across many organizations and across various functional areas like finance, organisations performance, risk, decision making, and automation. The ERP systems have changed the traditional methods of providing information in the organizations gradually. The organizations with the ERP systems installed can easily reduce the organization...
Digital signature confirmation conspire gives secure correspondence between two clients. A legitimate advanced mark gives a beneficiary motivation to trust that the message was made by a known sender, with the end goal that the sender can't deny having sent the message (confirmation and non-renouncement) and that the message was not adjusted in travel (integrity). The center of this paper is to talk...
The new advent of digitized has lead to rise of volume, velocity and variety of data by passing every hour. In reality, most of the data were stored on Cloud for managing the storage system. Most of the organizations were moving their data into the Cloud. Thus, Cloud Computing will play a vital role in today's world. Cloud Computing provides remote access to the Client on the basis of Pay-What-Use...
Semantic similarity is an essential part for question answering, it is used various fields such as Artificial Intelligence, Natural Language Processing, information retrieval, Document Retrieval and Automatic evaluations. This paper mainly focuses on similarity measure based on the posted query, and finding the appropriate meaning between the words. Accessing an accurate answer from the web document...
Now a day's commercial marketing growth is improved by customer segmentation model. Literatures use the data mining technology to review the customer segmentation and sound effectives. Stages of CRM have been used in most of the cases. Based on RFM, demographic and LTV data the paper is prepared using the data mining tools for the new customer segmentation. Customer segmentation has been done by RFM...
Research related to information, retrieval on web has come a long way in influencing today's techniques to extract data. Application of big data with e-learning has been creating a huge impact in education system. In current trends social media plays a vital role with respect to e-learning system. The effective usage of information totally lies with the way the learners and the learned utilize these...
Learning management systems are becoming widespread technology adopted at educational systems. Moodle system is used to record the user experience in e-learning environment. In Moodle system, the user experience is recorded and must be studied and analyzed to provide the optimal solution to meet pedagogical requirements of both students and teachers in all areas. In Moodle Learning management systems...
In this modern era, storing and transmitting information is by far done as a digital object. But the greatest disadvantage in digital data transmission is the fact that innumerable copies of the digital file can be made and is susceptible to be misused. This leads to the worldwide problem of copyright protection, copy protection and content authentication. Various Steganographic techniques and algorithms...
The learning of morphological components in a natural language by means of segmentation of words to identify the prime chores of stems and affixes lead to effective morphological analysis. Morphological segmentation is an important step in the analysis of natural languages to identify its intricate properties. Remarkable approaches been used in order to construct an effective morphological segmentation...
Digital signature authentication scheme provides secure communication between two users. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). The focus Synopsis of this paper is to discuss...
There has been unprecedented growth of spatial data encountered in different application domains and their analysis has become more important and practically relevant. Clustering is one of the important tasks in spatial data mining and its issues have been extensively studied. In this paper, we propose a new hybrid approach for data clustering. Initially the proposed approach exploits spatial fuzzy...
Cloud terminology is one the most used and utilized resource or computing in today's modern world. Almost all the computing capabilities are adopted and the applications are deployed into cloud for ease of access and for the concept of pay as per use. Again under these scenarios performance and scheduling the resources will be a challenging task as the user's demand and request. Therefore it is better...
To analyze enormous datasets, collection of algorithms, associated systems and perform necessary processing on massive data structures there is obligation for a novel trend, which is framed by Big Data. Architecture of Big Data varies across compound machines and clusters with unique purpose sub systems. The data produced from several sources requires analysis and organization with meager amounts...
Aspect Oriented Software Development is gaining wide attention because of its key feature modularization. Aspect Oriented paradigm supports the separation of concerns that are scattered over the system which helps in achieving modularity. Aspect Oriented Software Development encompasses software engineering abstractions and complexity at new and different dimensions. So Aspect Oriented Software Development...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.