: Compression is one of the most important techniques in data management, which is usually used to improve the query efficiency in database. However, there are some restrictions on...
: As the internet applications are growing rapidly, the intrusions to the networking system are also becoming high. In such a scenario, it is necessary to provide security to the n...
Sannasi Ganapathy, Pandi Vijayakumar, Yogesh Palan...
: This work is a study of binary data, especially binary images sources of information widely used. In general, comparing two binary images that represent the same content is not a...
Nouhoun Kane, Khalid Aznag, Ahmed El Oirrak, Moham...
: In this paper, Mahalanobis Distance (MD) has been proposed as a measure to classify the sentiment expressed in a review document as either positive or negative. A new method for ...
: The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attack...
: In the present era, the data mining techniques are widely and deeply useful as decision support systems in the fields of health care systems. The proposed research is an interdis...
: Cloud computing is a subscription-based service where we can obtain networked storage space and computer resources. Since access to cloud is through internet, data stored in clou...
: Desktop grid is an exciting discipline for high throughput applications but due to inherent resource volatility, desktop grids are not feasible for short lived applications that ...
Mohammed Khan, Syed Irfan Hyder, Ghayas Uddin Ahme...
: Digital watermarking is a robust method that allows a person to attach hidden data into the digital audio, video, or image signals and documents. In this paper, we propose a wate...
: Software maintenance is a major source of expense in software projects. A proper evolution process is a critical ingredient in the cost-efficient development of high-quality soft...