Skip to main content
Intrusion Detection Systems (IDS) are playing a critical role in present day data security systems, wherein there are so many intrusion detection techniques contributing to the purpose partially or fully. In particular, Ant Colony... more
    • by 
Background /Objectives: In today's world, finding a feasible solution for combinatorial problems becoming a crucial task. The main objective of this paper is to analyze and comprehend different nature based algorithms enabling to find... more
    • by 
    • Computer Science
This paper presents a novel data mining approach for fault diagnosis of turbine-generator units. The proposed rough set theory based approach generates the diagnosis rules from inconsistent and redundant information using genetic... more
    • by 
The Open Source Cluster Application Resources (OSCAR) is a fully integrated cluster software stack designed for building, and maintaining a Linux Beowulf cluster. As OSCAR has become a popular tool for building the cost effective HPC... more
    • by 
    •   6  
      Failure AnalysisLinux ClusterFailure PredictionHigh performance computer
The demand for an efficient fault tolerance system has led to the development of complex monitoring infrastructure, which in turn has created an overwhelming task of data and event management. The increasing level of details at the... more
    • by 
    •   5  
      MathematicsHigh Performance ComputingLevel Of Detail (LOD)Cluster Computing
    • by 
The concept of steganography is used in the paper to transmit the data secretly and safely from one user toanother as it hides the data behind image. In this sender encrypt data using AES algorithm, hides encrypteddata in image using LSB... more
    • by 
Purpose To validate the predictive power for determining breast cancer risk of an automated breast density measurement system with full-fi eld digital mammography (FFDM). Materials and methods Two hundred cancers and 200 controls were... more
    • by 
    • Medicine
A medicinal services framework incredibly upgrades the patient social insurance records which are putaway in the cloud server. Accessible encryption conspire is utilized which improves the inquiry system.Conjunctive watchword look... more
    • by 
The materialization of mobile equipment with fast Internet connectivity and geo-tagged capabilities has led to a revolution in personalized position-based services where clients are enabled to admittance information about points of... more
    • by 
Cloud applications that offer data management services are emerging. Such clouds support caching of data in order toprovide quality query services. The users can query the cloud data, paying the price for the infrastructure they use.... more
    • by 
Abstract: A novel a novel price demand model designed for a cloud cache and a dynamic pricing scheme for queries executed in the cloud cache is presented in this paper. It also defined an appropriate price-demand model and we formulate... more
    • by 
Abstract: An approach for resilient multipath routing with independent directed acyclic graphs is presented in this paper and developed polynomial time algorithms to construct node independent and link independent DAGs using all possible... more
    • by 
Abstract:- Now a days XML is becoming a standard in data representation and data exchanging. Due to its simplicity and lightweight most of the real time applications adopted XML as a DB to store the frequently updating enterprise data,... more
    • by 
Abstract: An approach for resilient multipath routing with independent directed acyclic graphs is presented in this paper and developed polynomial time algorithms to construct node independent and link independent DAGs using all possible... more
    • by 
An increasing number of databases have become web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. For the... more
    • by 
- Data mining manages the way toward finding data from data. With the wide accessibility of data there are different applications and requirements for data mining. Data can be of any sort specifically message, pictures, recordings and... more
    • by 
Abstract— A medicinal services framework incredibly upgrades the patient social insurance records which are put away in the cloud server. Accessible encryption conspire is utilized which improves the inquiry system. Conjunctive watchword... more
    • by 
Abstract: Presently , Smartphones are generally utilized asa part of every day life. Individuals utilize them to storeexceedingly imperative information including email, secretkey, money related records points of interest like chargecard... more
    • by 
With the surge in the development of various applications in the field of Computer Vision and Digital Image Processing, a significant amount of medical pictures are being produced. Thus, the patient-specific scan pictures represent the... more
    • by