The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is critical to be able to visualize what is going on in Scientific research center project, as in this type of center, there is a large volume, variety, velocity of data. This type of large data is not handling by traditional project monitoring system OASIS (On-line Access to project Information System). Hence required modified version of OASIS monitoring system that can manage a huge amount of...
Most of the commercial optical character recognition (OCR) software are designed to recognize the documents which are used in business. The accuracy of an OCR software is high to recognize the documents which are finely printed and fine quality written documents. However, this accuracy decreases drastically when dealing with the documents found in most of the libraries, especially manuscripts. With...
Revolutionary expansion of Internet and online services has enabled hospital and popular companies to publish data for research. Publishing data contains confidential information which needs to be protected. To meet this privacy concern, direct identity of related User is neglected while publishing. Although these measures are not enough, as confidential information can be derived from released data...
Opinion Mining (also known as “Sentiment Analysis”) is an area of text classification which continuously gives its contribution in research field. The main objective of Opinion mining is Sentiment Classification i.e. to classify the opinion into positive or negative classes. SentiWordNet is an opinion lexicon derived from the WordNet database where each term is associated with some numerical scores...
In the Computer System we have basically three types of Resources; they are Software, Hardware and Data. Data is the most important resource of computer system, because whatever computing we are doing is just because of data. Data Science deals with large amount of data to infer knowledge from the data sets to rationalize the information to achieve business values. Traditionally information was in...
Mobile ad hoc network is a collection of mobile nodes deployed with temporary intentions. Every Mobile node is capable for automatically configure network and creation of link with neighbor node for establishment of communication. Routing protocols are used to discover proper route from source to destination and provide support for establishment of communication. AODV routing protocol is a reactive...
Software effort estimation is a complicated task being carried out by software developers as very little information is available to them in the early phases of software development. The information collected about various attributes of software needs to be subjective, which otherwise can lead to uncertainty. Inaccurate software effort estimation can be disastrous as both underestimation and overestimation...
This paper proposed a Clustering approach based routing protocol for VANETs. The proposed algorithm is a distributed clustering algorithm together with OLSR Routing protocol, which possesses excellent Data dissemination rate, where Data dissemination is defined by throughput of protocol. In addition, the algorithm is also perform excellent in terms of End to End delay and exhibits a reasonable overhead...
The paper demonstrates a new configuration of level shifters for low power application which is a 45nm CMOS technology and simulated in cadence tool. Conventional level shifter is being designed utilizing the six transistors, eight transistors and ten transistors. The parameters being calculated for the circuit designed are average power dissipation, average noise and leakage voltage. This type of...
Cloud computing is the growing technology. Each organization wants to connect to the cloud computing environment. But some of them resist connecting due to security issues. Various security factors had been raised, some also lead to include third party auditor for solving security issues. Another major factor in concern is the Trust on the cloud service provider's i.e., the level to which an organization...
Wireless networks are playing important role for development and ease of use of human society. It also gets a lot of attention from research community towards the betterment of applications. A wide range of applications make it very popular and backbone of technology system i.e. GSM, Bluetooth, Wi-Fi etc. In order to categorization of applications, this network gives a unique range for monitoring...
With over 200 million customers online to the world-wide web, electronic commerce now account owed for a developing percentage of world trade. The internet business model, which provides accessibility directly to suppliers and new stages of efficiency with much less assets and minimum overheads, is being eagerly investigated by means of important organizations. The development in electronic commerce...
Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less time complexity as well as security of data, security is the big issue during transmission of data. Data integrity is one of the major parameter to ensure the security. There are many algorithms or methods have been developed for maintain the integrity of data during transmission...
The Lyrical part of a song is a rich source of datasets containing words that are helpful in analysis and classification of sentiments generated from it Sentimental analysis is not mere a social analytics but it is a field of study in which whole perception of individuals are automated to find the underlying details of the subject. The goal of this experiment is doing a linguistic analysis of Lyrics...
Extracting high utility objects can be defined as invention of itemsets with high utility just like profit. Producing many numbers of itemsets is the main drawback in most of the algorithm for high utility mining which not only degrades the performance in terms of execution time but also increases the memory usage. In cases where, database contains long transactions or long high utility itemsets plenty...
In large databases where continuous increase in the volume and detail of data captured by organizations [1] and accessed by different users and at different access levels, need to incorporate the security and transparency during the different kinds of information extraction according to role based access levels. Therefore in this paper an efficient data model for improving the privacy as well as transparency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.