21–40 of
60 results.
-
Ardhian Agung Yulianto
While a data warehouse is designed to support the decision-making function, the most time-consuming partis the Extract Transform Load (ETL) process. Case in Academic Data Warehouse, when data source c...
-
Sourish Dhar
•
Sudipta Roy
Scientific documents and magazines involve large number of mathematical expressions and formulas alongwith text. The continuous growth of such documents necessitates the requirement of developing spec...
-
Asep Kurnia Hidayat
•
El Akbar, R. Reza
•
Ai Sri Kosnayani
An expression of conflict in the field. To overcome this problem is a regulation of several parameters,including regulation of planting schedules and reduction of land area. The model of the irrigatio...
-
Lalit Moha Satapathy
•
Samir Kumar Bastia
•
Nihar Mohanty
Now-a-days, automation in home is becoming more popular. It always remains important to consideraccuracy and speed in a said job. This paper is addressing an Arduino Mega micro-controller based Home B...
-
Alycia Sebastian
•
K. Siva Sankar
With technology advancement people have started using different type of memory devices for storing dataand keeping it secure has become concern in today's world. Universal Serial Bus (USB) flash drive...
-
Arif- Ul- Islam
•
Shamim H. Ripon
•
Nuruddin Qaisar Bhuiyan
Women of all over the world suffer from a common cancer, named Cervical cancer. Cervical cancer cellsgrow slowly at the cervix. This cancer can be avoided if it is recognized and handled in its first ...
-
Sarah N. Abdulwahid
The delivered effort in this manuscript is grounded on NS-2 (The Network Simulator 2) to implement thecongestion control process of classic TCP (Transmission Control Protocol), with new congestion con...
-
Alaa Abid Muslam Abid Ali
•
Mohammed Iqbal Dohan
•
Saif Khalid Musluh
One of the very efficient and resource conservative image processing methodology is with the help of bilateralfilters. This technique filters the image without the help of edge smoothing but it does e...
-
Hasan Ali Gamal Al-Kaf
•
Nayef Abdulwahab Alduais
•
Musaed Al-Subari
The implantation of a genetic algorithm (GA) in quantitating components of interest in near infraredspectroscopic analysis could improve the predictive ability of a regression model. Thus, this study ...
-
Sengathir Janakiraman
Prompt and reliable data dissemination among the vehicular nodes of the network is indispensable as itsmobility rate and limited coverage characteristics introduce the possibility of frequent topology...
-
A. Aranganathan
•
C. D. Suriyakala
Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topologyin which the nodes can move anywhere, may join or leave the network through multi-hop communicatio...
-
Nitin Arora
•
Alaknanda Ashok
•
Shamik Tiwari
Images are an important part of daily life. The huge repository of digitally existing images cannot be easilycontrolled by any individual. Extensive scanning of the image database is very much essenti...
-
Srinivasa R. K.
•
A.R2, Hemantha Kumar
The growing interest over the mobile based communication has attracted the Long-Term Evolution (LTE)technique which facilitates higher data transmission rates to its dynamic users. The LTE-based netwo...
-
G. Shine Let
•
G. Josemin Bala
•
W. Magdalene
Scarce wireless resources, lead to development of cognitive radio network as a solution to unlicensed userscommunication in the licensed frequency band. In response to the behavior of licensed users c...
-
M. Sheshikala
•
D. Rajeswara Rao
•
Md Ali Kadampur
Complete data. Many of the real world data is Uncertain, for example, Demographic data, Sensor networksdata, GIS data etc.,. Handling such data is a challenge for knowledge discovery particularly in c...
-
R. Buli Babu
•
G. Snehal
•
Aditya Satya Kiran
Data mining can be used to detect model crime problems. This paper is about the importance of datamining about its techniques and how we can easily solve the crime. Crime data will be stored in crimin...
-
Prabhat Kumar Sahu
•
Binod Kumar Pattanayak
The modern electronic age consists of many new approaches for the communication among the humancivilizations and the AD HOC network is one of the successful self-configuring and infrastructure-lesscom...
-
Yegireddi Ramesh
•
Kiran Kumar Reddi
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network res...
-
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embeddedsystem in order to automatically control of multi appliances depend on the temperature value. T...
-
C. K. Shyamala
•
Anand K. Rajagopalan
Automatic identification systems represent a wide classification of devices used primarily in commercialsettings for inventory/logistics control. Familiar examples of such devices are bar codes, magne...