Skip to main content
Increasing technology space has pressurized the orgainsational enviroment to safegraurd its network from outside as well as inside attack. Any malicious intrusion can dragdown a highly reputed organisation to the floors of defamation and... more
    • by 
    •   5  
      Computer ScienceInformation SecurityComputer EngineeringComputer Networks
SVM and ISVM are the most prominent technique for excellent learning and classification in the field of machine learning such as face detection and recognition, handwriting automatic identification and automatic text categorization, video... more
    • by 
    • by 
Increasing technology space has pressurized the orgainsational enviroment to safegraurd its network from outside as well as inside attack. Any malicious intrusion can dragdown a highly reputed organisation to the floors of defamation and... more
    • by 
    •   5  
      Computer ScienceInformation SecurityComputer EngineeringComputer Networks
Classification technique is useful to categorize data into classes from the current dataset on the basis of a training set of data containing observations (or instances) whose category membership is known. The decision Tree classification... more
    • by 
Image segmentation is the first step in image analysis and pattern recognition. It is a critical and essential component of image analysis system, is one of the most difficult tasks in image processing, and determines the quality of the... more
    • by 
A very basic problem in reliability modeling is to obtain information about the form of the population from which the sample is drawn. Goodness of fit test is employed on different real data sets to determine how well the observed sample... more
    • by 
The Cloud computing is the way of using a network of remote servers hosted on the Internet to store, process and manage data, rather than on to the local server. Security is the most important concern in the cloud computing because the... more
    • by 
SVM and ISVM are the most prominent technique for excellent learning and classification in the field of machine learning such as face detection and recognition, handwriting automatic identification and automatic text categorization, video... more
    • by 
    • by 
    •   10  
      Computer ScienceBiomedical EngineeringImage ProcessingTissue Engineering
    • by 
A web service is defined as a software system designed to support interoperable machine-to-machine interaction over a network. Put in another way, Web services provide a framework for system integration, independent of programming... more
    • by 
    • by 
In this paper we use cyclic group 3 Z and its regular representation to produce a couple of linear error-correcting codes. We also discuss their duals.
    • by 
Image fusion is one of the important embranchments of data fusion. Its purpose is to synthesis multi-image information in one scene to one image which is more suitable to human vision and computer vision or more adapt to further image... more
    • by 
    •   3  
      Computer ScienceImage ProcessingImage fusion
Cloud computing Environment provides the platform to share computing resources and provide different services like SaaS, PaaS and IaaS that will used by organization as private, public or Hybrid. Cloud computing basically known as... more
    • by 
In this paper we use cyclic group 3 Z and its regular representation to produce a couple of linear error-correcting codes. We also discuss their duals.
    • by 
Attackers are using the malicious websites to launch the cyber attacks against the client's user applications which is one of the growing threat to the internet community. The growing threat to spread the internet attacks through... more
    • by 
    • by 
    •   3  
      Computer ScienceOperations ResearchSwarm Intelligence
Recently, Vehicular ad hoc network (VANET) can offer various services and benefits to VANET users and thus deserves deployment effort. Intelligent Transportation Systems (ITS) are aimed at addressing critical issues like passenger safety... more
    • by