Computing

Computing

 

Collections in this community

Recent Submissions

  • Eswaraprasad, Ramkumar; Vengidusamy, Shanmugam (International Journal of Computer Science and Electronics Engineering, 2015)
    This paper presents a semi supervised clustering technique with incremental and decremented affinity propagation (ID-AP) that structures labeled exemplars into the AP algorithm and a new method for actively selecting ...
  • Sivakumar, Subitha; Venkataraman, Sivakumar; Gombiro, Cross (International Journal for Innovative Research in Science and Technology, 2015-03)
    Entire world is revolving towards digital space as a result of the Internet and other emerging web technologies are helping the society to reach the universe. ICT and e-learning are growing radically fast and have captured ...
  • Shanmugasundaram, S.; Chidambaram, D. (2014)
    Finest Trail Setup Technique in Hive computing & virtualization Ambience[1] proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple dynamic obstacles. The navigator consists of an ...
  • Samson-Zulu, Bonolo Elizabeth; Nkomo, William (2014-07-06)
    Despite low levels of interest in programming by learners and perceptions that programming is difficult, it should be noted that programming’s importance has not diminished and should form core curricula of undergraduate ...
  • Ranjan, Abhiskek,; Venu Madhav, Kuthadi; Rajalakshmi, Selvaraj; Tshilidzi, Marwala (2013-11-27)
    The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule ...
  • Vivekananth, P (International Journal of Emerging Trends & Technology in Computer Science, 2012)
    Data mining (also called knowledge discovery in databases) represents the process of extracting interesting and previously unknown knowledge (patterns) from data. By applying artificial intelligence together with ...
  • Shanmugasundaram, Suresh; Chidambaram, Divyapreya (Society of Digital Information and Wireless Communications, 2012)
    We propose a novel face recognition using Dual Tree Complex Wavelet Transform (DTCWT), which is used to extract features from face images. The Complex Wavelet Transform is a tool that uses a dual tree of wavelet filters ...
  • Batlegang, Billy (Journal of Information Systems and Communication, 2012)
    How has Information Technology (IT) impacted lives, especially of students studying in higher institutions of learning in Botswana? Are IT users aware of the concept and application of Green Computing? The aim of this ...
  • Shanmugasundaram, Suresh; Chidambaram, Divyapreya (Society of Digital Information and Wireless Communications,, 2011)
    Negotiations in Cloud, Optimal path planning, Cloud Service orchestration Finest Trail Setup Technique in Cloud Ambience[1] proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple ...
  • Suryavanshi, Manjunath; Akiwate, Bahubali; Gurav, Mallappa (International Journal of Emerging Trends and Technology in computer Science, 2013-12)
    As the Internet services spread all over the world, many kinds of security threats are increasing. Therefore, existing Intrusion Detection Systems (IDS) facing very serious issue for the Internet users for their day to ...
  • Rajeswari, Chandrasekaran,N.C. (International Journal of Future Computer and Communication, 2012-10)
    The wireless communication involves a client server communication i.e. the client needs to send a request for performing a process; it can perform only after the response of the server. Large number of request will ...
  • Nammalwar, C.; Chandrasekaran, R. (International Journal of Future Computer and Communication, 2012-10)
    Mobility, mobile technology and mobile computing are few buzz words in all the fields. This makes human beings life easy and goes for anywhere, anytime working conditions. In educational field Networking and mobile computing ...
  • Ranjan, A.; Selvaraj, R. (2012-01)
    In this research to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against Multihop wireless ad hoc networks. When ...
  • Srivaramangai,P.; Srinivasan,R. (2011-10)
    Grid computing is an interconnected computer system, where machines share resources that are highly heterogeneous. Reliability is the probability that a process will successfully perform its prescribed task without any ...
  • Srinivasan R, Srivaramangai.P (World Congress on Engineering, 2012-07-04)
    The cloud computing offers dynamically scalable resources provided as a service over the Internet. It promises the drop in capital expenditure. But practically speaking if this is to become reality there are still some ...