Sciweavers

IAJIT
2016
49views Biometrics» more  IAJIT 2016»
8 years 29 days ago
Implementation of image processing system using handover technique with map reduce based on big data in the cloud environment
: Cloud computing is the one of the emerging techniques to process the big data. Cloud computing is also, known as service on demand. Large set or large volume of data is known as ...
Mehraj Ali, John Kumar
IAJIT
2016
58views Biometrics» more  IAJIT 2016»
8 years 29 days ago
Optimization of position finding step of PCM-oMaRS algorithm with statistical information
: The PCM- oMaRS algorithm guarantees the maximal reduction steps of the computation of the exact median in distributed datasets and proved that we can compute the exact median eff...
Ammar Balouch
IAJIT
2016
47views Biometrics» more  IAJIT 2016»
8 years 29 days ago
Analyzing learning concepts in intelligent tutoring systems
: The information that is increasing and changing rapidly at the present day, and the usage of computers in educational and instructional processes has become inevitable. With the ...
Korhan Günel, Refet Polat, Mehmet Kurt
IAJIT
2016
63views Biometrics» more  IAJIT 2016»
8 years 29 days ago
Integrated replication checkpoint fault tolerance approach of mobile agents IRCFT
: Mobile agents offer flexibility which is evident in distributed computing environments. However, agent systems are subject to failures that result from bad communication, breakdo...
Suzanne Sweiti, Amal Dweik
IAJIT
2016
49views Biometrics» more  IAJIT 2016»
8 years 29 days ago
Texts semantic similarity detection based graph approach
: Similarity of text documents is important to analyze and extract useful information from text documents and generation of the appropriate data. Several cases of lexical matching ...
Majid Mohebbi, Alireza Talebpour
IAJIT
2016
79views Biometrics» more  IAJIT 2016»
8 years 29 days ago
VParC: a compression scheme for numeric data in column-oriented databases
: Compression is one of the most important techniques in data management, which is usually used to improve the query efficiency in database. However, there are some restrictions on...
Ke Yan, Hong Zhu, Kevin Lü
IAJIT
2016
46views Biometrics» more  IAJIT 2016»
8 years 29 days ago
An intelligent CRF based feature selection for effective intrusion detection
: As the internet applications are growing rapidly, the intrusions to the networking system are also becoming high. In such a scenario, it is necessary to provide security to the n...
Sannasi Ganapathy, Pandi Vijayakumar, Yogesh Palan...
IAJIT
2016
48views Biometrics» more  IAJIT 2016»
8 years 29 days ago
Binary data comparison using similarity indices and principal components analysis
: This work is a study of binary data, especially binary images sources of information widely used. In general, comparing two binary images that represent the same content is not a...
Nouhoun Kane, Khalid Aznag, Ahmed El Oirrak, Moham...
IAJIT
2016
46views Biometrics» more  IAJIT 2016»
8 years 29 days ago
Mahalanobis distance-the ultimate measure for sentiment analysis
: In this paper, Mahalanobis Distance (MD) has been proposed as a measure to classify the sentiment expressed in a review document as either positive or negative. A new method for ...
Valarmathi Balasubramanian, Srinivasa Gupta Nagara...
IAJIT
2016
40views Biometrics» more  IAJIT 2016»
8 years 29 days ago
Secure verification technique for defending IP spoofing attacks
: The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attack...
Alwar Rengarajan, Rajendran Sugumar, Chinnappan Ja...