This paper suggests an efficient image segmentation algorithm in 3 steps for grayscale images. First step is the segmentation as homogenous region on image. And, second step is me...
In view of students' individual difference in the learning process, in this paper we propose a personalized learning system, to which intelligent Agent technique and case-bas...
Automatic speech recognition by machine is one of the most efficient methods for man-machine communications. Because speech waveform is nonlinear and variant. Speech recognition r...
Hrudaya K. Tripathy, B. K. Tripathy, Pradip K. Das
Lack of time and capital for software testing is an oft encountered problem in most organizations. The plethora of possible test cases for each software component makes software t...
Sunitha Ramanujam, Hany F. El Yamany, Miriam A. M....
The Personal Portal is generally used as a communication mean and serves as an entrance to users where they can acquire interested information on the network. We have several prob...
Many prominent applications in wireless sensor networks require collected information has to be routed to end nodes in an efficient manner. In general, Connected Dominating Set (C...
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
Affective computing systems are software systems that take in account the emotional state of the user during their operation. Recently it is increasingly accepted that combining e...
The paper discusses the innovative patterns such as subtraction, multiplication, division, task unification and attribute dependency change for evaluating the software architectur...
Multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and m...