The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wireless ad-hoc network can be made to perform better via a range of approaches. One such approach is network coding, which involves broadcasting of encoded packets and therefore can substantially enhance network capacity whilst preserving the quality of service. The use of routing algorithms that are aware of network coding can help to strengthen the benefits of this approach. In order to gain...
Heterogeneous Mobile Adhoc Network still encounters problem in dedicated services with robust link establishment. The reasons are not only conventional factor e.g. energy consumption, excessive bandwidth utilization, dynamic topology but also unconventional factor e.g. protocol differences. To a large extent, the evolution of Delay Tolerant Network has been successful in addressing the routing issues...
In this paper, we answers an iceberg query with minimum execution time by devising a new specialized index position algorithm. The iceberg queries are mainly intended to compute small outputs from large databases and or data warehouses provided on the user thresholds. The aggregate values are useful in computing knowledge which is delightful in taking part of the important decisions by an industry...
Software reuse is the process of creating new applications using existing software components. Software reuse is a very effective strategy for software industry to develop high quality software. To use software reusable components from the reuse repository, the selection of proper retrieval technique is very essential. The selection of best component or optimal selection from retrieved components...
In this work we propose a new pattern matching algorithm based on the principle of the text segmentation by slicing the text in to three segments. The idea is to perform preprocessing of pattern strings before beginning to search for the pattern in the text so as to achieve substantial speed up in the search process as against to other existing algorithms which either preprocess text or pattern or...
Privacy Preserving plays a vital role; in designing various security-related data mining applications. Protecting sensitive information in data mining has become an important issue. Data distortion or data perturbation is a critical component, widely used to protect sensitive data. Many approaches try to preserve privacy by adding noise or by matrix decomposition methods. In this paper we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.