• No results found

[PDF] Top 20 IJCSMC, Vol. 4, Issue. 5, May 2015, pg.92 – 98 RESEARCH ARTICLE A Study on Object Classification Approaches

Has 10000 "IJCSMC, Vol. 4, Issue. 5, May 2015, pg.92 – 98 RESEARCH ARTICLE A Study on Object Classification Approaches" found on our website. Below are the top 20 most common "IJCSMC, Vol. 4, Issue. 5, May 2015, pg.92 – 98 RESEARCH ARTICLE A Study on Object Classification Approaches".

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.92 – 98 RESEARCH ARTICLE A Study on Object Classification Approaches

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.92 – 98 RESEARCH ARTICLE A Study on Object Classification Approaches

... the object is defined using decision tree ...the object class is done. This classification process is here defined under the formation of attribute level division and the value level decision making ... See full document

7

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.728 – 735 RESEARCH ARTICLE The Study of Network Security with Its Penetrating Attacks and Possible Security Mechanisms

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.728 – 735 RESEARCH ARTICLE The Study of Network Security with Its Penetrating Attacks and Possible Security Mechanisms

... According to a Cyber Security Watch survey insiders were found to be the cause in 21 percent of security breaches, and a further 21 percent may have been due to the actions of insiders. More than half of ... See full document

8

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.192 – 197 RESEARCH ARTICLE A Study on Image Fusion Techniques for Medical Image Enhancement

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.192 – 197 RESEARCH ARTICLE A Study on Image Fusion Techniques for Medical Image Enhancement

... Medical Image processing is one of the critical image processing application area that is requires more accuracy than any other image processing approach. The major applications of medical image processing are to detect ... See full document

6

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.166 – 174 RESEARCH ARTICLE A Study on Facial Feature Extraction and Facial Recognition Approaches

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.166 – 174 RESEARCH ARTICLE A Study on Facial Feature Extraction and Facial Recognition Approaches

... Arun Ross, Anil Jain [2] proposed Multibiometric system which seeks to alleviate some of drawbacks of single biometric system by providing multiple evidences of the same identity. These systems help to achieve an ... See full document

9

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.158 – 165 RESEARCH ARTICLE A Study on Retinal Disease Classification and Filteration Approaches

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.158 – 165 RESEARCH ARTICLE A Study on Retinal Disease Classification and Filteration Approaches

... MARYAM MUBBASHAR performed a work," Automated System for Macula Detection in Digital Retinal Images". This paper presents an automated system for the localization and detection of macula in digital retinal ... See full document

8

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.792 – 796 RESEARCH ARTICLE A Comparative Review of Cluster-Based Energy Efficient Routing Protocols in WSN

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.792 – 796 RESEARCH ARTICLE A Comparative Review of Cluster-Based Energy Efficient Routing Protocols in WSN

... Abstract— A wireless sensor network extends our capability to explore, monitor and control the physical world. The sensor networks have evolved over a period of time. Routing is a vital technology in WSN. There are many ... See full document

5

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1087 – 1093 REVIEW ARTICLE A Review of Predictive Models on Diagnosis and Treatment of Malaria Fever

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1087 – 1093 REVIEW ARTICLE A Review of Predictive Models on Diagnosis and Treatment of Malaria Fever

... [18]. Research Motivations: Malaria and dengue remain to be the most vital cause of morbidity and mortality in India and in many other tropical countries with complete 2 to 3 million new cases arising every year, ... See full document

7

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.349 – 357 RESEARCH ARTICLE A Research on Privacy Preserving Data Mining Using Heuristic Approach

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.349 – 357 RESEARCH ARTICLE A Research on Privacy Preserving Data Mining Using Heuristic Approach

... This study mainly focus on the task of minimizing the impact on the source database by reducing the number of removed items from the source database with only one scan of the ...definition 5 is framed by us ... See full document

9

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.401 – 406 RESEARCH ARTICLE A Gaussian Feature Adaptive Integrated PCA-ICA Approach for Facial Recognition

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.401 – 406 RESEARCH ARTICLE A Gaussian Feature Adaptive Integrated PCA-ICA Approach for Facial Recognition

... subspace approximation method. Author provided the work in the form of study to generate the approximated pattern over the faical image. Author analyze the recognition based on the diverse set of the recognition ... See full document

6

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.736 – 740 RESEARCH ARTICLE An Improved Random Forest Algorithm for Prediction of Protein-Protein Interaction

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.736 – 740 RESEARCH ARTICLE An Improved Random Forest Algorithm for Prediction of Protein-Protein Interaction

... machine-learning approaches with domain-based models for protein interaction prediction and their feasibility are ...this study, we developed a domain-based predictor based on Random Forest (RF) algorithm ... See full document

5

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.534 – 544 RESEARCH ARTICLE A Generalized Process of Reverse Engineering in Software Protection & Security

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.534 – 544 RESEARCH ARTICLE A Generalized Process of Reverse Engineering in Software Protection & Security

... detail study and simple logical mechanism behind each protection schemas, tools of trade , case studies illustrating the how crackers breaks these protection schemas like serial fishing, Bypassing of check also ... See full document

11

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1017 – 1024 REVIEW ARTICLE A Review: Speech Recognition with Deep Learning Methods

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1017 – 1024 REVIEW ARTICLE A Review: Speech Recognition with Deep Learning Methods

... comparative study of different technique is done as per ...identify research topics and applications which are at the forefront of this exciting and challenging ... See full document

8

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.250 – 263 RESEARCH ARTICLE A Research on Ensembles Method for One Class Classification Using Convex Hull Polytope Model

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.250 – 263 RESEARCH ARTICLE A Research on Ensembles Method for One Class Classification Using Convex Hull Polytope Model

... the study of OCC problems, Availability of Training Data: Learning with positive data only (or with a limited amount of negative samples) or learning with positive and unlabelled data, Methodology Used: Algorithms ... See full document

14

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.80 – 86 RESEARCH ARTICLE A Comparative Analysis of Clustering Techniques using Genetic Algorithm

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.80 – 86 RESEARCH ARTICLE A Comparative Analysis of Clustering Techniques using Genetic Algorithm

... Clustering is one of the major task of data mining where the similarity patterns or similar objects a grouped by truncating the outliers. In this paper a survey has been taken on clustering technique with Genetic ... See full document

7

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.491 – 495 REVIEW ARTICLE A REVIEW ON CLASSIFICATION TECHNIQUES OVER AGRICULTURAL DATA

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.491 – 495 REVIEW ARTICLE A REVIEW ON CLASSIFICATION TECHNIQUES OVER AGRICULTURAL DATA

... This paper is an attempt to provide on over view of some previous researches and studies of data mining and data mining technique in agriculture. Crop prediction model in agricultural mining is to estimate agricultural ... See full document

5

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.424 – 431 RESEARCH ARTICLE A Proposed Security Framework for VoIP

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.424 – 431 RESEARCH ARTICLE A Proposed Security Framework for VoIP

... In Year 2011, Alireza Heravi evaluated the users’ awareness and attitudes towards privacy and security issues in VoIP communications. For this reason, an on-line questionnaire was designed to collect information, and to ... See full document

8

IJCSMC, Vol. 4, Issue. 4, April 2015, pg.395 – 400 RESEARCH ARTICLE A Study on Cancer Perpetuation using the Classification Algorithms

IJCSMC, Vol. 4, Issue. 4, April 2015, pg.395 – 400 RESEARCH ARTICLE A Study on Cancer Perpetuation using the Classification Algorithms

... important research in data mining techniques. In the present work, classification techniques such as CART, Random Forest, LMT, and Naive Bayesian are ... See full document

6

IJCSMC, Vol. 4, Issue. 4, April 2015, pg.500 – 507 RESEARCH ARTICLE A FAST RE-ROUTE METHOD

IJCSMC, Vol. 4, Issue. 4, April 2015, pg.500 – 507 RESEARCH ARTICLE A FAST RE-ROUTE METHOD

... to study the impact of the different protection techniques on the traffic by considering the traffic matrix of the studied ...measurement study of all the factors that, on a single router, influence the ... See full document

8

IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966 – 971 RESEARCH ARTICLE A STUDY ON CLOUD STORAGE

IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966 – 971 RESEARCH ARTICLE A STUDY ON CLOUD STORAGE

... Pressently Ms M.Lakshmi Neelima is working as an Asst.Prof in CSE.Dept, GPREC, Kurnool. She has done M.Tech(CSE) from JNT University, Anantapur, 2012, AP, India. She has total teaching experience of2.5 years. She has two ... See full document

6

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.71 – 79 RESEARCH ARTICLE A Novel Approach to Detect Black Hole and Worm Hole Attacks in MANETs

IJCSMC, Vol. 4, Issue. 5, May 2015, pg.71 – 79 RESEARCH ARTICLE A Novel Approach to Detect Black Hole and Worm Hole Attacks in MANETs

... In [9], Mahajan et al. proposed some proposals to detect worm hole attacks like: 1) The abrupt decrease in the path lengths can be used as a possible symptom of the worm hole attack. 2) With the available advertised path ... See full document

9

Show all 10000 documents...