Sciweavers

IAJIT
2016
46views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Mahalanobis distance-the ultimate measure for sentiment analysis
: In this paper, Mahalanobis Distance (MD) has been proposed as a measure to classify the sentiment expressed in a review document as either positive or negative. A new method for ...
Valarmathi Balasubramanian, Srinivasa Gupta Nagara...
IAJIT
2016
40views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Secure verification technique for defending IP spoofing attacks
: The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attack...
Alwar Rengarajan, Rajendran Sugumar, Chinnappan Ja...
118
Voted
IAJIT
2016
61views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Data mining perspective: prognosis of life style on hypertension and diabetes
: In the present era, the data mining techniques are widely and deeply useful as decision support systems in the fields of health care systems. The proposed research is an interdis...
Abdullah A. Aljumah, Mohammad Khubeb Siddiqui
134
Voted
IAJIT
2016
49views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Performance comparison of neuro-fuzzy cloud intrusion detection systems
: Cloud computing is a subscription-based service where we can obtain networked storage space and computer resources. Since access to cloud is through internet, data stored in clou...
Sivakami Raja, Saravanan Ramaiah
IAJIT
2016
53views Biometrics» more  IAJIT 2016»
9 years 12 months ago
A group based fault tolerant scheduling mechanism to improve the application turnaround time on desktop grids
: Desktop grid is an exciting discipline for high throughput applications but due to inherent resource volatility, desktop grids are not feasible for short lived applications that ...
Mohammed Khan, Syed Irfan Hyder, Ghayas Uddin Ahme...
IAJIT
2016
44views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Enhancing the optimal robust watermarking algorithm to high payload
: Digital watermarking is a robust method that allows a person to attach hidden data into the digital audio, video, or image signals and documents. In this paper, we propose a wate...
Satish Todmal, Suhas Patil
IAJIT
2016
54views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Empirical evaluation of syntactic and semantic defects introduced by refactoring support
: Software maintenance is a major source of expense in software projects. A proper evolution process is a critical ingredient in the cost-efficient development of high-quality soft...
Wafa Basit, Fakhar Lodhi, Usman Bhatti
93
Voted
IAJIT
2016
45views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Dynamic group recommendation with modified collaborative filtering and temporal factor
Abstract: Group recommendation, which provides a group of users with information items, has become increasingly important in both the workspace and people’s social activities. Be...
Jinpeng Chen, Yu Liu, Deyi Li
102
Voted
IAJIT
2016
55views Biometrics» more  IAJIT 2016»
9 years 12 months ago
The effect of horizontal database table partitioning on query performance
----------------------------------------------------------------------------------------------------------------------------------The need for achieving optimal performance for da...
Salam Matalqa, Suleiman Mustafa
106
Voted
IAJIT
2016
39views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Word sense disambiguation for arabic text categorization
: In this paper, we present two contributions for Arabic Word Sense Disambiguation. In the first one, we propose to use both two external resources AWN and WN based on Term to Term...
Meryeme Hadni, Saïd El Alaoui Ouatik, Abdelmo...