JACOTECH
R&D
Increasing technology space has pressurized the orgainsational enviroment to safegraurd its network from outside as well as inside attack. Any malicious intrusion can dragdown a highly reputed organisation to the floors of defamation and... more
SVM and ISVM are the most prominent technique for excellent learning and classification in the field of machine learning such as face detection and recognition, handwriting automatic identification and automatic text categorization, video... more
Increasing technology space has pressurized the orgainsational enviroment to safegraurd its network from outside as well as inside attack. Any malicious intrusion can dragdown a highly reputed organisation to the floors of defamation and... more
Classification technique is useful to categorize data into classes from the current dataset on the basis of a training set of data containing observations (or instances) whose category membership is known. The decision Tree classification... more
Image segmentation is the first step in image analysis and pattern recognition. It is a critical and essential component of image analysis system, is one of the most difficult tasks in image processing, and determines the quality of the... more
A very basic problem in reliability modeling is to obtain information about the form of the population from which the sample is drawn. Goodness of fit test is employed on different real data sets to determine how well the observed sample... more
The Cloud computing is the way of using a network of remote servers hosted on the Internet to store, process and manage data, rather than on to the local server. Security is the most important concern in the cloud computing because the... more
SVM and ISVM are the most prominent technique for excellent learning and classification in the field of machine learning such as face detection and recognition, handwriting automatic identification and automatic text categorization, video... more
A web service is defined as a software system designed to support interoperable machine-to-machine interaction over a network. Put in another way, Web services provide a framework for system integration, independent of programming... more
In this paper we use cyclic group 3 Z and its regular representation to produce a couple of linear error-correcting codes. We also discuss their duals.
Image fusion is one of the important embranchments of data fusion. Its purpose is to synthesis multi-image information in one scene to one image which is more suitable to human vision and computer vision or more adapt to further image... more
Cloud computing Environment provides the platform to share computing resources and provide different services like SaaS, PaaS and IaaS that will used by organization as private, public or Hybrid. Cloud computing basically known as... more
In this paper we use cyclic group 3 Z and its regular representation to produce a couple of linear error-correcting codes. We also discuss their duals.
Attackers are using the malicious websites to launch the cyber attacks against the client's user applications which is one of the growing threat to the internet community. The growing threat to spread the internet attacks through... more
Recently, Vehicular ad hoc network (VANET) can offer various services and benefits to VANET users and thus deserves deployment effort. Intelligent Transportation Systems (ITS) are aimed at addressing critical issues like passenger safety... more