: Mobile agents offer flexibility which is evident in distributed computing environments. However, agent systems are subject to failures that result from bad communication, breakdo...
: Similarity of text documents is important to analyze and extract useful information from text documents and generation of the appropriate data. Several cases of lexical matching ...
: Compression is one of the most important techniques in data management, which is usually used to improve the query efficiency in database. However, there are some restrictions on...
: As the internet applications are growing rapidly, the intrusions to the networking system are also becoming high. In such a scenario, it is necessary to provide security to the n...
Sannasi Ganapathy, Pandi Vijayakumar, Yogesh Palan...
: This work is a study of binary data, especially binary images sources of information widely used. In general, comparing two binary images that represent the same content is not a...
Nouhoun Kane, Khalid Aznag, Ahmed El Oirrak, Moham...
: In this paper, Mahalanobis Distance (MD) has been proposed as a measure to classify the sentiment expressed in a review document as either positive or negative. A new method for ...
: The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attack...
: In the present era, the data mining techniques are widely and deeply useful as decision support systems in the fields of health care systems. The proposed research is an interdis...
: Cloud computing is a subscription-based service where we can obtain networked storage space and computer resources. Since access to cloud is through internet, data stored in clou...
: Desktop grid is an exciting discipline for high throughput applications but due to inherent resource volatility, desktop grids are not feasible for short lived applications that ...
Mohammed Khan, Syed Irfan Hyder, Ghayas Uddin Ahme...