Botho University: Recent submissions

  • Simon, Chirambira (2013-02-20)
    Learning is a fundamental aspect of life, any living organism that fails to learn and adapt to the rules of survival in the current environment risks facing the challenge of extinction as the laws of nature demands survival ...
  • Rajesh Subramanian, Aarthi Nagappan, Ivy Rose Mathew; Subramanian, Rajesh; Nagappan, Aarthi; Mathew, Ivy Rose (International Journal for Cross-Disciplinary Subjects in Education, 2012-12)
    There seems to be a growing concern about the skill set needed in university graduates which is a factor inhibiting numerous students from acquiring proper employment. This has drawn the attention of employers and ...
  • Ranjan, Abhiskek,; Venu Madhav, Kuthadi; Rajalakshmi, Selvaraj; Tshilidzi, Marwala (2013-11-27)
    The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule ...
  • Vivekananth, P (International Journal of Emerging Trends & Technology in Computer Science, 2012)
    Data mining (also called knowledge discovery in databases) represents the process of extracting interesting and previously unknown knowledge (patterns) from data. By applying artificial intelligence together with ...
  • Shanmugasundaram, Suresh; Chidambaram, Divyapreya (Society of Digital Information and Wireless Communications, 2012)
    We propose a novel face recognition using Dual Tree Complex Wavelet Transform (DTCWT), which is used to extract features from face images. The Complex Wavelet Transform is a tool that uses a dual tree of wavelet filters ...
  • Batlegang, Billy (Journal of Information Systems and Communication, 2012)
    How has Information Technology (IT) impacted lives, especially of students studying in higher institutions of learning in Botswana? Are IT users aware of the concept and application of Green Computing? The aim of this ...
  • Shanmugasundaram, Suresh; Chidambaram, Divyapreya (Society of Digital Information and Wireless Communications,, 2011)
    Negotiations in Cloud, Optimal path planning, Cloud Service orchestration Finest Trail Setup Technique in Cloud Ambience[1] proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple ...
  • Radhakrishnan, Sridevi; Gudo, Faith (The Society of Digital Information and Wireless Communication., 2012)
    The Botho College Software engineering curriculum has been running for quite some time now since 1997 up to date. Over the years we have seen considerable discrepancies or inconsistencies with regards to the results ...
  • Suryavanshi, Manjunath; Akiwate, Bahubali; Gurav, Mallappa (International Journal of Emerging Trends and Technology in computer Science, 2013-12)
    As the Internet services spread all over the world, many kinds of security threats are increasing. Therefore, existing Intrusion Detection Systems (IDS) facing very serious issue for the Internet users for their day to ...
  • Rajeswari, Chandrasekaran,N.C. (International Journal of Future Computer and Communication, 2012-10)
    The wireless communication involves a client server communication i.e. the client needs to send a request for performing a process; it can perform only after the response of the server. Large number of request will ...
  • Nammalwar, C.; Chandrasekaran, R. (International Journal of Future Computer and Communication, 2012-10)
    Mobility, mobile technology and mobile computing are few buzz words in all the fields. This makes human beings life easy and goes for anywhere, anytime working conditions. In educational field Networking and mobile computing ...
  • Ranjan, A.; Selvaraj, R. (2012-01)
    In this research to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against Multihop wireless ad hoc networks. When ...
  • Venkataraman, Sivakumar; Alagappan, Annamalai (2011)
    Teaching methodology has a greater impact on the way students learn from teachers and tutors. However traditional class rooms are meant for rote learning, hence, there exists some challenges in promoting “in-depth learning” ...
  • Nagappan, Aarthi; Rajesh, Subramanian (2011)
    Knowledge is a gift that is transferrable from one person to another. Everyone has it and can transfer it thus making impact on other people’s lives. In this paper the authors have come up with an innovative approach of ...
  • Srivaramangai,P.; Srinivasan,R. (2011-10)
    Grid computing is an interconnected computer system, where machines share resources that are highly heterogeneous. Reliability is the probability that a process will successfully perform its prescribed task without any ...
  • Srinivasan R, Srivaramangai.P (World Congress on Engineering, 2012-07-04)
    The cloud computing offers dynamically scalable resources provided as a service over the Internet. It promises the drop in capital expenditure. But practically speaking if this is to become reality there are still some ...
  • Oluka, Silas (Botho University, 2014,03,22)

Search BU Repository

Browse

My Account