The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Customer churn prediction in Telecom industry is one of the most prominent research topics in recent years. It consists of detecting customers who are likely to cancel a subscription to a service. Recently, the mobile telecommunication market has changed from a rapidly growing market into a state of saturation and fierce competition. The focus of telecommunication companies has therefore shifted from...
This paper present experiment done with mapping of Algorithmic structure pattern with implementation pattern. Selection of implementation patterns and data structures needs to consider parallel platform for which they are developed and they also affects the performance of program. The experiment results supports need of Adaptive patterns for parallel programming to develop software's runs on different...
MANET (Mobile Ad-hoc Network) is a web or network of mobile nodes which communicates with everyone with no any ant access point. Deafness is a major problem in this network. When nodes are communicating with everyone at that time when one node is busy with another node, the node waiting from communicating with the nodes among them, don't have receive slot, this situation is called deafness. In general,...
Data mining is a very challenging task. It is an important subject in terms of privacy or confidentiality. Discrimination is the act of making a distinction between different things. Discrimination is the act of treating someone differently or unfairly based upon some characteristic. Discrimination can be seen in various places. For example, workplace, school etc. but, everyone has the right to be...
With the advent Internet in the 1990s to the present day facilities of ubiquitous computing, the Internet has changed the computing world in a drastic way. It has traveled from the concept of parallel computing to distributed computing to grid computing and recently to cloud computing. Anatomy of Cloud Computing is discussed in detail. Essential features of cloud services which are useful for the...
Patch antenna is basically used for wireless communication systems. Design a several shapes of micro-strip patch antenna has been done. The proposed micro-strip patch antenna works in frequency of 1.5 GHZ. FR4 lossy as a dielectric substrate with relative permittivity εr is 4.3 and thickness of 1.6mm. Various shapes of micro-strip patch antenna (Rectangular, Circular, and Triangular) with feeding...
Data mining automates the finding predictive records procedure in big databases. Clustering is a most famous method in data mining and is an important methodology that is performed based on the similarity principle. The segregation of a big database is a stimulating and task of time consuming. It concludes two different stages: first, feature extraction maps all documents or record to a point in the...
A fault model is a constructing model of something that could go wrong in the construction or operation of a piece of device. From the model, the designer or user can then predict the consequences of this particular fault. Fault models can be used in close to all branches of engineering. Reliability is a natural characteristic of a system's health, and can be used in circumstances, monitoring &...
Nowdays the need of efficient and effective retrieval of images from a large database is significantly increased. CBIR is one of the important technique which is used to retrieving images on the basis of features such as color, texture and shape. A high configuration system is required to perform multiple operations as image retrieval includes vector extraction, enrollment and verification. Normally...
In MANET the best research area is Quality of Service Routing, since most of the new discovered network services require Quality of Service (QoS) specialized functionalities but those can not be provided by current routing protocols which all are QoS unaware. Currently data routing based on QoS is the most required domain in this era. It is mandatory for higher Quality of service, the mobile adhoc...
Internet of Things (IoT) has given an opportunity to build powerful laboratory environment using wireless technology, LAN technology and sensor devices. This works aims to establish a basic prototype design of a simple and expandable IoT to be used in an intelligent laboratory. The reading of various sensors from multiple labs is directly uploaded to the server storage on cloud from where other collaborating...
Mobile ad hoc networks operate without any fixed infrastructure and centralized administration. It is an autonomous system of wirelessly connected mobile nodes having the capability to operate as host and router as well. The dynamic nature of ad hoc network increases the topology designing challenges. Security is an important and essential requirement in Mobile Ad-hoc Networks (MANET). MANETs are...
Outliers are the set of observations which are different from the other observations. Outliers are generally treated as abnormality, anomaly, deviation etc. in any data. Outlier detection is one of the major task in various data mining application like pattern detection, anomaly detection etc. If outliers are not detected in data, it generates deformity in data and also provides incorrect results...
In digital signal processing the speed of the processor is dependent on the processing speed of a multiplier used in it, which affects total processing of a circuit. Hence, when a normal multipliers are used they consumes most of the power also gives rise to a delay. So to overcome this problems the high speed digital multiplier used nowadays. This paper introduced a low power booth multiplier, which...
Cloud Computing, what many are saying is future of computing in both technical and social aspects. It defines the path ahead in the world of computer science. The idea of centralizing and storing our data in various data centers overviewed by others is nothing new but it is taken from many popular approaches, one of which is grid computing. This idea is up from around twentieth century. It offers...
Security threats have been a major concern as a result of emergence of technology in every aspect including internet market, computational and communication technologies. To solve this issue effective mechanism of “cryptography” is used to ensure integrity, privacy, availability, authentication, computability, identification and accuracy. Cryptology methods like PKC and SKC are used of data recovery...
The only source of energy for nodes in Mobile Ad-hoc Network (MANET) is battery and hence they have very limited life time. A node performs various tasks such as sending a data packet, receiving a packet from any other node, forwarding a packet to some other node and sometimes packet dropping. Due to these, excessive energy is utilized, which result in energy depletion problem and thereby affect the...
Scalable image search based on similarity matching has been an active topic in recent years. Currently use of web has been increased significantly for information recovery and it is challenging to extract the relevance information in less time. For this the State-of-the-art methods usually use hashing approaches to embed high-dimensional image features into given Hamming space, where result search...
Software cost estimation is the measurement of the effort and resource required to develop a software system for a particular defined time period. From the last few years, many software cost estimation models have been proposed for the estimation of effort and development time. The cost of the software can be estimated easily in the mid of project development. But with further study, we found that...
Ubiquitous devices are becoming a part of people's day-to-day life. Smart devices not only aid to people's life but also are becoming a crucial part of physically challenged and aged people. The need for safe and independent mobility for the elderly and physical challenged people is of prime concern. The paper deals with creation of a Smart Wheel-Chair (SWC) that mainly focuses on the mentioned issue...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.