際際滷shows by User: IOSRjournaljce / http://www.slideshare.net/images/logo.gif 際際滷shows by User: IOSRjournaljce / Mon, 03 Jul 2017 06:55:37 GMT 際際滷Share feed for 際際滷shows by User: IOSRjournaljce 3D Visualizations of Land Cover Maps /slideshow/3d-visualizations-of-land-cover-maps/77453800 o1901047377-170703065537
Land Cover maps supply information about the physical material at the surface of the Earth (i.e. grass, trees, bare ground, asphalt, water, etc.). Usually they are 2D representations so to present variability of land covers about latitude and longitude or other type of earth coordinates. Possibility to link this variability to the terrain elevation is very useful because it permits to investigate probable correlations between the type of physical material at the surface and the relief. This paper is aimed to describe the approach to be followed to obtain 3D visualizations of land cover maps in GIS (Geographic Information System) environment. Particularly Corine Land Cover vector files concerning Campania Region (Italy) are considered: transformed raster files are overlapped to DEM (Digital Elevation Model) with adequate resolution and 3D visualizations of them are obtained using GIS tool. The resulting models are discussed in terms of their possible use to support scientific studies on Campania Land Cover. ]]>

Land Cover maps supply information about the physical material at the surface of the Earth (i.e. grass, trees, bare ground, asphalt, water, etc.). Usually they are 2D representations so to present variability of land covers about latitude and longitude or other type of earth coordinates. Possibility to link this variability to the terrain elevation is very useful because it permits to investigate probable correlations between the type of physical material at the surface and the relief. This paper is aimed to describe the approach to be followed to obtain 3D visualizations of land cover maps in GIS (Geographic Information System) environment. Particularly Corine Land Cover vector files concerning Campania Region (Italy) are considered: transformed raster files are overlapped to DEM (Digital Elevation Model) with adequate resolution and 3D visualizations of them are obtained using GIS tool. The resulting models are discussed in terms of their possible use to support scientific studies on Campania Land Cover. ]]>
Mon, 03 Jul 2017 06:55:37 GMT /slideshow/3d-visualizations-of-land-cover-maps/77453800 IOSRjournaljce@slideshare.net(IOSRjournaljce) 3D Visualizations of Land Cover Maps IOSRjournaljce Land Cover maps supply information about the physical material at the surface of the Earth (i.e. grass, trees, bare ground, asphalt, water, etc.). Usually they are 2D representations so to present variability of land covers about latitude and longitude or other type of earth coordinates. Possibility to link this variability to the terrain elevation is very useful because it permits to investigate probable correlations between the type of physical material at the surface and the relief. This paper is aimed to describe the approach to be followed to obtain 3D visualizations of land cover maps in GIS (Geographic Information System) environment. Particularly Corine Land Cover vector files concerning Campania Region (Italy) are considered: transformed raster files are overlapped to DEM (Digital Elevation Model) with adequate resolution and 3D visualizations of them are obtained using GIS tool. The resulting models are discussed in terms of their possible use to support scientific studies on Campania Land Cover. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/o1901047377-170703065537-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Land Cover maps supply information about the physical material at the surface of the Earth (i.e. grass, trees, bare ground, asphalt, water, etc.). Usually they are 2D representations so to present variability of land covers about latitude and longitude or other type of earth coordinates. Possibility to link this variability to the terrain elevation is very useful because it permits to investigate probable correlations between the type of physical material at the surface and the relief. This paper is aimed to describe the approach to be followed to obtain 3D visualizations of land cover maps in GIS (Geographic Information System) environment. Particularly Corine Land Cover vector files concerning Campania Region (Italy) are considered: transformed raster files are overlapped to DEM (Digital Elevation Model) with adequate resolution and 3D visualizations of them are obtained using GIS tool. The resulting models are discussed in terms of their possible use to support scientific studies on Campania Land Cover.
3D Visualizations of Land Cover Maps from IOSRjournaljce
]]>
96 5 https://cdn.slidesharecdn.com/ss_thumbnails/o1901047377-170703065537-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Comparison between Cisco ACI and VMWARE NSX /IOSRjournaljce/comparison-between-cisco-aci-and-vmware-nsx n1901047072-170703065533
Software-Defined Networking(SDN) allows you to have a logical image of the components in the data center, also you could arrange the components logically and use them according to the software application needs. This paper gives an overview about the architectural features of Ciscos Application Centric Infrastructure (ACI) and Vmwares NSX and also compares both the architectures and their benefit]]>

Software-Defined Networking(SDN) allows you to have a logical image of the components in the data center, also you could arrange the components logically and use them according to the software application needs. This paper gives an overview about the architectural features of Ciscos Application Centric Infrastructure (ACI) and Vmwares NSX and also compares both the architectures and their benefit]]>
Mon, 03 Jul 2017 06:55:33 GMT /IOSRjournaljce/comparison-between-cisco-aci-and-vmware-nsx IOSRjournaljce@slideshare.net(IOSRjournaljce) Comparison between Cisco ACI and VMWARE NSX IOSRjournaljce Software-Defined Networking(SDN) allows you to have a logical image of the components in the data center, also you could arrange the components logically and use them according to the software application needs. This paper gives an overview about the architectural features of Ciscos Application Centric Infrastructure (ACI) and Vmwares NSX and also compares both the architectures and their benefit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/n1901047072-170703065533-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Software-Defined Networking(SDN) allows you to have a logical image of the components in the data center, also you could arrange the components logically and use them according to the software application needs. This paper gives an overview about the architectural features of Ciscos Application Centric Infrastructure (ACI) and Vmwares NSX and also compares both the architectures and their benefit
Comparison between Cisco ACI and VMWARE NSX from IOSRjournaljce
]]>
226 4 https://cdn.slidesharecdn.com/ss_thumbnails/n1901047072-170703065533-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Students Skills Evaluation Techniques using Data Mining. /slideshow/students-skills-evaluation-techniques-using-data-mining/77453797 m1901046669-170703065531
Technological Advancement is the mainstay of the Indian economy. Software Development is a primary factor which offers many sources of employment across the state. The major role of Software Company is to provide qualitized product by Managerial Decisions. To improve the Software Quality and Maintenance, Organization concentrates the Programmers ability and restricts the Placement with various kinds of audiences such as Written test, Personal Interview, Technical Round, Group Discussion etc. Accordingly, Programmers has to be formed. So Higher Educational institutes have to amend the students Performance as their expectations. The students Programming Skill is analyzed with the help of Decision making and Knowledge Discovery in Data Mining Techniques. In this example, the actual data are collected from Private College, which holds data about academic performance for pupils. This report suggests a method to judge their accomplishments through the utilization of data mining methods and specifies the means to identify their skills and assist them to improve their Knowledge by predicting Training Programs.]]>

Technological Advancement is the mainstay of the Indian economy. Software Development is a primary factor which offers many sources of employment across the state. The major role of Software Company is to provide qualitized product by Managerial Decisions. To improve the Software Quality and Maintenance, Organization concentrates the Programmers ability and restricts the Placement with various kinds of audiences such as Written test, Personal Interview, Technical Round, Group Discussion etc. Accordingly, Programmers has to be formed. So Higher Educational institutes have to amend the students Performance as their expectations. The students Programming Skill is analyzed with the help of Decision making and Knowledge Discovery in Data Mining Techniques. In this example, the actual data are collected from Private College, which holds data about academic performance for pupils. This report suggests a method to judge their accomplishments through the utilization of data mining methods and specifies the means to identify their skills and assist them to improve their Knowledge by predicting Training Programs.]]>
Mon, 03 Jul 2017 06:55:31 GMT /slideshow/students-skills-evaluation-techniques-using-data-mining/77453797 IOSRjournaljce@slideshare.net(IOSRjournaljce) Students Skills Evaluation Techniques using Data Mining. IOSRjournaljce Technological Advancement is the mainstay of the Indian economy. Software Development is a primary factor which offers many sources of employment across the state. The major role of Software Company is to provide qualitized product by Managerial Decisions. To improve the Software Quality and Maintenance, Organization concentrates the Programmers ability and restricts the Placement with various kinds of audiences such as Written test, Personal Interview, Technical Round, Group Discussion etc. Accordingly, Programmers has to be formed. So Higher Educational institutes have to amend the students Performance as their expectations. The students Programming Skill is analyzed with the help of Decision making and Knowledge Discovery in Data Mining Techniques. In this example, the actual data are collected from Private College, which holds data about academic performance for pupils. This report suggests a method to judge their accomplishments through the utilization of data mining methods and specifies the means to identify their skills and assist them to improve their Knowledge by predicting Training Programs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/m1901046669-170703065531-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Technological Advancement is the mainstay of the Indian economy. Software Development is a primary factor which offers many sources of employment across the state. The major role of Software Company is to provide qualitized product by Managerial Decisions. To improve the Software Quality and Maintenance, Organization concentrates the Programmers ability and restricts the Placement with various kinds of audiences such as Written test, Personal Interview, Technical Round, Group Discussion etc. Accordingly, Programmers has to be formed. So Higher Educational institutes have to amend the students Performance as their expectations. The students Programming Skill is analyzed with the help of Decision making and Knowledge Discovery in Data Mining Techniques. In this example, the actual data are collected from Private College, which holds data about academic performance for pupils. This report suggests a method to judge their accomplishments through the utilization of data mining methods and specifies the means to identify their skills and assist them to improve their Knowledge by predicting Training Programs.
Students Skills Evaluation Techniques using Data Mining. from IOSRjournaljce
]]>
134 6 https://cdn.slidesharecdn.com/ss_thumbnails/m1901046669-170703065531-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Classification Techniques: A Review /slideshow/classification-techniques-a-review/77453796 l1901046165-170703065527
Data mining is a process to extract information from a huge amount of data and transform it into an understandable structure. Data mining provides the number of tasks to extract data from large databases such as Classification, Clustering, Regression, Association rule mining. This paper provides the concept of Classification. Classification is an important data mining technique based on machine learning which is used to classify the each item on the bases of features of the item with respect to the predefined set of classes or groups. This paper summarises various techniques that are implemented for the classification such as k-NN, Decision Tree, Na誰ve Bayes, SVM, ANN and RF. The techniques are analyzed and compared on the basis of their advantages and disadvantages]]>

Data mining is a process to extract information from a huge amount of data and transform it into an understandable structure. Data mining provides the number of tasks to extract data from large databases such as Classification, Clustering, Regression, Association rule mining. This paper provides the concept of Classification. Classification is an important data mining technique based on machine learning which is used to classify the each item on the bases of features of the item with respect to the predefined set of classes or groups. This paper summarises various techniques that are implemented for the classification such as k-NN, Decision Tree, Na誰ve Bayes, SVM, ANN and RF. The techniques are analyzed and compared on the basis of their advantages and disadvantages]]>
Mon, 03 Jul 2017 06:55:27 GMT /slideshow/classification-techniques-a-review/77453796 IOSRjournaljce@slideshare.net(IOSRjournaljce) Classification Techniques: A Review IOSRjournaljce Data mining is a process to extract information from a huge amount of data and transform it into an understandable structure. Data mining provides the number of tasks to extract data from large databases such as Classification, Clustering, Regression, Association rule mining. This paper provides the concept of Classification. Classification is an important data mining technique based on machine learning which is used to classify the each item on the bases of features of the item with respect to the predefined set of classes or groups. This paper summarises various techniques that are implemented for the classification such as k-NN, Decision Tree, Na誰ve Bayes, SVM, ANN and RF. The techniques are analyzed and compared on the basis of their advantages and disadvantages <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/l1901046165-170703065527-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data mining is a process to extract information from a huge amount of data and transform it into an understandable structure. Data mining provides the number of tasks to extract data from large databases such as Classification, Clustering, Regression, Association rule mining. This paper provides the concept of Classification. Classification is an important data mining technique based on machine learning which is used to classify the each item on the bases of features of the item with respect to the predefined set of classes or groups. This paper summarises various techniques that are implemented for the classification such as k-NN, Decision Tree, Na誰ve Bayes, SVM, ANN and RF. The techniques are analyzed and compared on the basis of their advantages and disadvantages
Classification Techniques: A Review from IOSRjournaljce
]]>
222 4 https://cdn.slidesharecdn.com/ss_thumbnails/l1901046165-170703065527-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing /slideshow/analyzing-the-difference-of-cluster-grid-utility-cloud-computing/77453794 k1901045560-170703065524
: Virtualization and cloud computing is creating a fundamental change in computer architecture, software and tools development, in the way we store, distribute and consume information. In the recent era of autonomic computing it comes the importance and need of basic concepts of having and sharing various hardware and software and other resources & applications that can manage themself with high level of human guidance. Virtualization or Autonomic computing is not a new to the world, but it developed rapidly with Cloud computing. In this paper there give an overview of various types of computing. There will be discussion on Cluster, Grid computing, Utility & Cloud Computing. Analysis architecture, differences between them, characteristics , its working, advantages and disadvantages]]>

: Virtualization and cloud computing is creating a fundamental change in computer architecture, software and tools development, in the way we store, distribute and consume information. In the recent era of autonomic computing it comes the importance and need of basic concepts of having and sharing various hardware and software and other resources & applications that can manage themself with high level of human guidance. Virtualization or Autonomic computing is not a new to the world, but it developed rapidly with Cloud computing. In this paper there give an overview of various types of computing. There will be discussion on Cluster, Grid computing, Utility & Cloud Computing. Analysis architecture, differences between them, characteristics , its working, advantages and disadvantages]]>
Mon, 03 Jul 2017 06:55:24 GMT /slideshow/analyzing-the-difference-of-cluster-grid-utility-cloud-computing/77453794 IOSRjournaljce@slideshare.net(IOSRjournaljce) Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing IOSRjournaljce : Virtualization and cloud computing is creating a fundamental change in computer architecture, software and tools development, in the way we store, distribute and consume information. In the recent era of autonomic computing it comes the importance and need of basic concepts of having and sharing various hardware and software and other resources & applications that can manage themself with high level of human guidance. Virtualization or Autonomic computing is not a new to the world, but it developed rapidly with Cloud computing. In this paper there give an overview of various types of computing. There will be discussion on Cluster, Grid computing, Utility & Cloud Computing. Analysis architecture, differences between them, characteristics , its working, advantages and disadvantages <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/k1901045560-170703065524-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> : Virtualization and cloud computing is creating a fundamental change in computer architecture, software and tools development, in the way we store, distribute and consume information. In the recent era of autonomic computing it comes the importance and need of basic concepts of having and sharing various hardware and software and other resources &amp; applications that can manage themself with high level of human guidance. Virtualization or Autonomic computing is not a new to the world, but it developed rapidly with Cloud computing. In this paper there give an overview of various types of computing. There will be discussion on Cluster, Grid computing, Utility &amp; Cloud Computing. Analysis architecture, differences between them, characteristics , its working, advantages and disadvantages
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing from IOSRjournaljce
]]>
1326 2 https://cdn.slidesharecdn.com/ss_thumbnails/k1901045560-170703065524-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Architecture of Cloud Computing /slideshow/architecture-of-cloud-computing/77453788 i1901044549-170703065515
: Cloud processing is turning into an inexorably mainstream endeavor demonstrate in which figuring assets are made accessible on-request to the client as required. The one of a kind incentivized offer of distributed computing makes new chances to adjust IT and business objectives. Distributed computing utilizes the web advancements for conveyance of IT-Enabled abilities 'as an administration' to any required clients i.e. through distributed computing we can get to anything that we need from anyplace to any PC without agonizing over anything like about their stockpiling, cost, administration etc. In this paper, I give a far-reaching study on the inspiration variables of receiving distributed computing, audit the few cloud sending and administration models. It additionally investigates certain advantages of distributed computing over customary IT benefit environment-including versatility, adaptability, decreased capital and higher asset usage are considered as appropriation explanations behind distributed computing environment. I additionally incorporate security, protection, and web reliance and accessibility as shirking issues. The later incorporates vertical versatility as specialized test in cloud environment.]]>

: Cloud processing is turning into an inexorably mainstream endeavor demonstrate in which figuring assets are made accessible on-request to the client as required. The one of a kind incentivized offer of distributed computing makes new chances to adjust IT and business objectives. Distributed computing utilizes the web advancements for conveyance of IT-Enabled abilities 'as an administration' to any required clients i.e. through distributed computing we can get to anything that we need from anyplace to any PC without agonizing over anything like about their stockpiling, cost, administration etc. In this paper, I give a far-reaching study on the inspiration variables of receiving distributed computing, audit the few cloud sending and administration models. It additionally investigates certain advantages of distributed computing over customary IT benefit environment-including versatility, adaptability, decreased capital and higher asset usage are considered as appropriation explanations behind distributed computing environment. I additionally incorporate security, protection, and web reliance and accessibility as shirking issues. The later incorporates vertical versatility as specialized test in cloud environment.]]>
Mon, 03 Jul 2017 06:55:15 GMT /slideshow/architecture-of-cloud-computing/77453788 IOSRjournaljce@slideshare.net(IOSRjournaljce) Architecture of Cloud Computing IOSRjournaljce : Cloud processing is turning into an inexorably mainstream endeavor demonstrate in which figuring assets are made accessible on-request to the client as required. The one of a kind incentivized offer of distributed computing makes new chances to adjust IT and business objectives. Distributed computing utilizes the web advancements for conveyance of IT-Enabled abilities 'as an administration' to any required clients i.e. through distributed computing we can get to anything that we need from anyplace to any PC without agonizing over anything like about their stockpiling, cost, administration etc. In this paper, I give a far-reaching study on the inspiration variables of receiving distributed computing, audit the few cloud sending and administration models. It additionally investigates certain advantages of distributed computing over customary IT benefit environment-including versatility, adaptability, decreased capital and higher asset usage are considered as appropriation explanations behind distributed computing environment. I additionally incorporate security, protection, and web reliance and accessibility as shirking issues. The later incorporates vertical versatility as specialized test in cloud environment. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/i1901044549-170703065515-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> : Cloud processing is turning into an inexorably mainstream endeavor demonstrate in which figuring assets are made accessible on-request to the client as required. The one of a kind incentivized offer of distributed computing makes new chances to adjust IT and business objectives. Distributed computing utilizes the web advancements for conveyance of IT-Enabled abilities &#39;as an administration&#39; to any required clients i.e. through distributed computing we can get to anything that we need from anyplace to any PC without agonizing over anything like about their stockpiling, cost, administration etc. In this paper, I give a far-reaching study on the inspiration variables of receiving distributed computing, audit the few cloud sending and administration models. It additionally investigates certain advantages of distributed computing over customary IT benefit environment-including versatility, adaptability, decreased capital and higher asset usage are considered as appropriation explanations behind distributed computing environment. I additionally incorporate security, protection, and web reliance and accessibility as shirking issues. The later incorporates vertical versatility as specialized test in cloud environment.
Architecture of Cloud Computing from IOSRjournaljce
]]>
92 2 https://cdn.slidesharecdn.com/ss_thumbnails/i1901044549-170703065515-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Experimental Study of Diabetes Disease Prediction System Using Classification Techniques /slideshow/an-experimental-study-of-diabetes-disease-prediction-system-using-classification-techniques/77453787 h1901043944-170703065513
Data mining means to the process of collecting, searching through, and analyzing a large amount of data in a database. Classification in one of the well-known data mining techniques for analyzing the performance of Naive Bayes, Random Forest, and Na誰ve Bayes tree (NB-Tree) classifier during the classification to improve precision, recall, f-measure, and accuracy. These three algorithms, of Naive Bayes, Random Forest, and NB-Tree are useful and efficient, has been tested in the medical dataset for diabetes disease and solving classification problem in data mining. In this paper, we compare the three different algorithms, and results indicate the Naive Bayes algorithms are able to achieve high accuracy rate along with minimum error rate when compared to other algorithms.]]>

Data mining means to the process of collecting, searching through, and analyzing a large amount of data in a database. Classification in one of the well-known data mining techniques for analyzing the performance of Naive Bayes, Random Forest, and Na誰ve Bayes tree (NB-Tree) classifier during the classification to improve precision, recall, f-measure, and accuracy. These three algorithms, of Naive Bayes, Random Forest, and NB-Tree are useful and efficient, has been tested in the medical dataset for diabetes disease and solving classification problem in data mining. In this paper, we compare the three different algorithms, and results indicate the Naive Bayes algorithms are able to achieve high accuracy rate along with minimum error rate when compared to other algorithms.]]>
Mon, 03 Jul 2017 06:55:13 GMT /slideshow/an-experimental-study-of-diabetes-disease-prediction-system-using-classification-techniques/77453787 IOSRjournaljce@slideshare.net(IOSRjournaljce) An Experimental Study of Diabetes Disease Prediction System Using Classification Techniques IOSRjournaljce Data mining means to the process of collecting, searching through, and analyzing a large amount of data in a database. Classification in one of the well-known data mining techniques for analyzing the performance of Naive Bayes, Random Forest, and Na誰ve Bayes tree (NB-Tree) classifier during the classification to improve precision, recall, f-measure, and accuracy. These three algorithms, of Naive Bayes, Random Forest, and NB-Tree are useful and efficient, has been tested in the medical dataset for diabetes disease and solving classification problem in data mining. In this paper, we compare the three different algorithms, and results indicate the Naive Bayes algorithms are able to achieve high accuracy rate along with minimum error rate when compared to other algorithms. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/h1901043944-170703065513-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data mining means to the process of collecting, searching through, and analyzing a large amount of data in a database. Classification in one of the well-known data mining techniques for analyzing the performance of Naive Bayes, Random Forest, and Na誰ve Bayes tree (NB-Tree) classifier during the classification to improve precision, recall, f-measure, and accuracy. These three algorithms, of Naive Bayes, Random Forest, and NB-Tree are useful and efficient, has been tested in the medical dataset for diabetes disease and solving classification problem in data mining. In this paper, we compare the three different algorithms, and results indicate the Naive Bayes algorithms are able to achieve high accuracy rate along with minimum error rate when compared to other algorithms.
An Experimental Study of Diabetes Disease Prediction System Using Classification Techniques from IOSRjournaljce
]]>
458 6 https://cdn.slidesharecdn.com/ss_thumbnails/h1901043944-170703065513-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Candidate Ranking and Evaluation System based on Digital Footprints /slideshow/candidate-ranking-and-evaluation-system-based-on-digital-footprints/77453785 g1901043538-170703065510
Digital resume provides insights about a candidate to the organization. This paper proposes a system where digital resumes of candidates are generated by extracting data from social networking sites like Facebook, Twitter and LinkedIn. Data which is relevant to recruitment is obtained from unstructured data using Data Mining algorithms. Candidates are evaluated based on their digital resumes and ranked accordingly. Ranking is done based on the requirements specified by an organization for a key position. The key aspects of this paper are a) Specification and design of system. b) Generation of digital Resume. c) Ranking of candidates. According to the ranking provided by this system, Recruiters can shortlist candidates for interviews. Thus, it revolutionizes the traditional recruitment process.]]>

Digital resume provides insights about a candidate to the organization. This paper proposes a system where digital resumes of candidates are generated by extracting data from social networking sites like Facebook, Twitter and LinkedIn. Data which is relevant to recruitment is obtained from unstructured data using Data Mining algorithms. Candidates are evaluated based on their digital resumes and ranked accordingly. Ranking is done based on the requirements specified by an organization for a key position. The key aspects of this paper are a) Specification and design of system. b) Generation of digital Resume. c) Ranking of candidates. According to the ranking provided by this system, Recruiters can shortlist candidates for interviews. Thus, it revolutionizes the traditional recruitment process.]]>
Mon, 03 Jul 2017 06:55:10 GMT /slideshow/candidate-ranking-and-evaluation-system-based-on-digital-footprints/77453785 IOSRjournaljce@slideshare.net(IOSRjournaljce) Candidate Ranking and Evaluation System based on Digital Footprints IOSRjournaljce Digital resume provides insights about a candidate to the organization. This paper proposes a system where digital resumes of candidates are generated by extracting data from social networking sites like Facebook, Twitter and LinkedIn. Data which is relevant to recruitment is obtained from unstructured data using Data Mining algorithms. Candidates are evaluated based on their digital resumes and ranked accordingly. Ranking is done based on the requirements specified by an organization for a key position. The key aspects of this paper are a) Specification and design of system. b) Generation of digital Resume. c) Ranking of candidates. According to the ranking provided by this system, Recruiters can shortlist candidates for interviews. Thus, it revolutionizes the traditional recruitment process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/g1901043538-170703065510-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Digital resume provides insights about a candidate to the organization. This paper proposes a system where digital resumes of candidates are generated by extracting data from social networking sites like Facebook, Twitter and LinkedIn. Data which is relevant to recruitment is obtained from unstructured data using Data Mining algorithms. Candidates are evaluated based on their digital resumes and ranked accordingly. Ranking is done based on the requirements specified by an organization for a key position. The key aspects of this paper are a) Specification and design of system. b) Generation of digital Resume. c) Ranking of candidates. According to the ranking provided by this system, Recruiters can shortlist candidates for interviews. Thus, it revolutionizes the traditional recruitment process.
Candidate Ranking and Evaluation System based on Digital Footprints from IOSRjournaljce
]]>
121 3 https://cdn.slidesharecdn.com/ss_thumbnails/g1901043538-170703065510-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE methods based Texture Features and Fuzzy Logic based Hybrid Kernel Support Vector Machine Classifier /slideshow/multi-class-cervical-cancer-classification-by-using-erstcm-emsd-cfe-methods-based-texture-features-and-fuzzy-logic-based-hybrid-kernel-support-vector-machine-classifier/77453783 f1901042334-170703065506
Cervical cancer is the highest rate of incidence after breast cancer, gastric cancer, colorectal cancer, thyroid cancer among all malignant that occurs to females ; also it is the most prevalent cancer among female genital cancers. Manual cervical cancer diagnosis methods are costly and sometimes result inaccurate diagnosis caused by human error but machine assisted classification system can reduce financial costs and increase screening accuracy. In this research article, we have developed multi class cervical classification system by using Pap Smear Images according to the WHO descriptive Classification of Cervical Histology. Then, this system classifies the cell of the Pap Smear image into anyone of five types of the classes of normal cell, mild dysplasia, moderate dysplasia, severe dysplasia and carcinoma in situ (CIS) by using individual and Combining individual feature extraction method with the classification technique. In this paper three Feature Extraction methods were used: From that three, two were individual feature extraction method namely Enriched Rough Set Texton Co-Occurrence Matrix (ERSTCM) and Enriched Micro Structure Descriptor (EMSD) and the remained one was combining individual feature extraction method namely concatenated feature extraction method (CFE). The CFE method represents all the individual feature extraction methods of ERSTCM & EMSD features are combining together to one feature to assess their joint performance. Then these three feature extraction methods are tested over Fuzzy Logic based Hybrid Kernel Support Vector Machine (FL-HKSVM) Classifier. This Examination was conducted over a set of single cervical cell based pap smear images. The dataset contains five classes of images, with a total of 952 images. The distribution of number of images per class is not uniform. Then the performance was evaluated in both the individual and combining individual feature extraction method with the classification techniques by using the statistical parameters of sensitivity, specificity & accuracy. Hence the resultant values of the statistical parameters described in individual feature extraction method with the classification technique, proposed EMSD+FLHKSVM Classifier had given the better results than the other ERSTCM+FLHKSVM Classifier and combining individual feature extraction method with the classification technique described, proposed CFE+FLHKSVM Classifier had given the better results than other EMSD+FLHKSVM & ERSTCM+FLHKSVM classifiers.]]>

Cervical cancer is the highest rate of incidence after breast cancer, gastric cancer, colorectal cancer, thyroid cancer among all malignant that occurs to females ; also it is the most prevalent cancer among female genital cancers. Manual cervical cancer diagnosis methods are costly and sometimes result inaccurate diagnosis caused by human error but machine assisted classification system can reduce financial costs and increase screening accuracy. In this research article, we have developed multi class cervical classification system by using Pap Smear Images according to the WHO descriptive Classification of Cervical Histology. Then, this system classifies the cell of the Pap Smear image into anyone of five types of the classes of normal cell, mild dysplasia, moderate dysplasia, severe dysplasia and carcinoma in situ (CIS) by using individual and Combining individual feature extraction method with the classification technique. In this paper three Feature Extraction methods were used: From that three, two were individual feature extraction method namely Enriched Rough Set Texton Co-Occurrence Matrix (ERSTCM) and Enriched Micro Structure Descriptor (EMSD) and the remained one was combining individual feature extraction method namely concatenated feature extraction method (CFE). The CFE method represents all the individual feature extraction methods of ERSTCM & EMSD features are combining together to one feature to assess their joint performance. Then these three feature extraction methods are tested over Fuzzy Logic based Hybrid Kernel Support Vector Machine (FL-HKSVM) Classifier. This Examination was conducted over a set of single cervical cell based pap smear images. The dataset contains five classes of images, with a total of 952 images. The distribution of number of images per class is not uniform. Then the performance was evaluated in both the individual and combining individual feature extraction method with the classification techniques by using the statistical parameters of sensitivity, specificity & accuracy. Hence the resultant values of the statistical parameters described in individual feature extraction method with the classification technique, proposed EMSD+FLHKSVM Classifier had given the better results than the other ERSTCM+FLHKSVM Classifier and combining individual feature extraction method with the classification technique described, proposed CFE+FLHKSVM Classifier had given the better results than other EMSD+FLHKSVM & ERSTCM+FLHKSVM classifiers.]]>
Mon, 03 Jul 2017 06:55:06 GMT /slideshow/multi-class-cervical-cancer-classification-by-using-erstcm-emsd-cfe-methods-based-texture-features-and-fuzzy-logic-based-hybrid-kernel-support-vector-machine-classifier/77453783 IOSRjournaljce@slideshare.net(IOSRjournaljce) Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE methods based Texture Features and Fuzzy Logic based Hybrid Kernel Support Vector Machine Classifier IOSRjournaljce Cervical cancer is the highest rate of incidence after breast cancer, gastric cancer, colorectal cancer, thyroid cancer among all malignant that occurs to females ; also it is the most prevalent cancer among female genital cancers. Manual cervical cancer diagnosis methods are costly and sometimes result inaccurate diagnosis caused by human error but machine assisted classification system can reduce financial costs and increase screening accuracy. In this research article, we have developed multi class cervical classification system by using Pap Smear Images according to the WHO descriptive Classification of Cervical Histology. Then, this system classifies the cell of the Pap Smear image into anyone of five types of the classes of normal cell, mild dysplasia, moderate dysplasia, severe dysplasia and carcinoma in situ (CIS) by using individual and Combining individual feature extraction method with the classification technique. In this paper three Feature Extraction methods were used: From that three, two were individual feature extraction method namely Enriched Rough Set Texton Co-Occurrence Matrix (ERSTCM) and Enriched Micro Structure Descriptor (EMSD) and the remained one was combining individual feature extraction method namely concatenated feature extraction method (CFE). The CFE method represents all the individual feature extraction methods of ERSTCM & EMSD features are combining together to one feature to assess their joint performance. Then these three feature extraction methods are tested over Fuzzy Logic based Hybrid Kernel Support Vector Machine (FL-HKSVM) Classifier. This Examination was conducted over a set of single cervical cell based pap smear images. The dataset contains five classes of images, with a total of 952 images. The distribution of number of images per class is not uniform. Then the performance was evaluated in both the individual and combining individual feature extraction method with the classification techniques by using the statistical parameters of sensitivity, specificity & accuracy. Hence the resultant values of the statistical parameters described in individual feature extraction method with the classification technique, proposed EMSD+FLHKSVM Classifier had given the better results than the other ERSTCM+FLHKSVM Classifier and combining individual feature extraction method with the classification technique described, proposed CFE+FLHKSVM Classifier had given the better results than other EMSD+FLHKSVM & ERSTCM+FLHKSVM classifiers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/f1901042334-170703065506-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cervical cancer is the highest rate of incidence after breast cancer, gastric cancer, colorectal cancer, thyroid cancer among all malignant that occurs to females ; also it is the most prevalent cancer among female genital cancers. Manual cervical cancer diagnosis methods are costly and sometimes result inaccurate diagnosis caused by human error but machine assisted classification system can reduce financial costs and increase screening accuracy. In this research article, we have developed multi class cervical classification system by using Pap Smear Images according to the WHO descriptive Classification of Cervical Histology. Then, this system classifies the cell of the Pap Smear image into anyone of five types of the classes of normal cell, mild dysplasia, moderate dysplasia, severe dysplasia and carcinoma in situ (CIS) by using individual and Combining individual feature extraction method with the classification technique. In this paper three Feature Extraction methods were used: From that three, two were individual feature extraction method namely Enriched Rough Set Texton Co-Occurrence Matrix (ERSTCM) and Enriched Micro Structure Descriptor (EMSD) and the remained one was combining individual feature extraction method namely concatenated feature extraction method (CFE). The CFE method represents all the individual feature extraction methods of ERSTCM &amp; EMSD features are combining together to one feature to assess their joint performance. Then these three feature extraction methods are tested over Fuzzy Logic based Hybrid Kernel Support Vector Machine (FL-HKSVM) Classifier. This Examination was conducted over a set of single cervical cell based pap smear images. The dataset contains five classes of images, with a total of 952 images. The distribution of number of images per class is not uniform. Then the performance was evaluated in both the individual and combining individual feature extraction method with the classification techniques by using the statistical parameters of sensitivity, specificity &amp; accuracy. Hence the resultant values of the statistical parameters described in individual feature extraction method with the classification technique, proposed EMSD+FLHKSVM Classifier had given the better results than the other ERSTCM+FLHKSVM Classifier and combining individual feature extraction method with the classification technique described, proposed CFE+FLHKSVM Classifier had given the better results than other EMSD+FLHKSVM &amp; ERSTCM+FLHKSVM classifiers.
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE methods based Texture Features and Fuzzy Logic based Hybrid Kernel Support Vector Machine Classifier from IOSRjournaljce
]]>
123 4 https://cdn.slidesharecdn.com/ss_thumbnails/f1901042334-170703065506-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Systematic Methodology for Accurate Test Packet Generation and Fault Localization /IOSRjournaljce/the-systematic-methodology-for-accurate-test-packet-generation-and-fault-localization e1901041622-170703065459
As we probably aware now a days networks are broadly dispersed so administrators relies on upon different devices, for example, pings and follow course to troubleshoot the issue in network. So we proposed a robotized and orderly approach for testing and troubleshooting network called "Automatic Test Packet Generation"(ATPG). ATPG first peruses switch arrangement and produces a gadget free model. The model is utilized to produce least number of test packets to cover each connection in a network and every control in network. ATPG is equipped for researching both useful and execution issues. Test packets are sent at customary interims and separate strategy is utilized to confine flaws. The working of few disconnected devices which automatically create test packets are additionally given, yet ATPG goes past the prior work in static (checking liveness and fault localization).]]>

As we probably aware now a days networks are broadly dispersed so administrators relies on upon different devices, for example, pings and follow course to troubleshoot the issue in network. So we proposed a robotized and orderly approach for testing and troubleshooting network called "Automatic Test Packet Generation"(ATPG). ATPG first peruses switch arrangement and produces a gadget free model. The model is utilized to produce least number of test packets to cover each connection in a network and every control in network. ATPG is equipped for researching both useful and execution issues. Test packets are sent at customary interims and separate strategy is utilized to confine flaws. The working of few disconnected devices which automatically create test packets are additionally given, yet ATPG goes past the prior work in static (checking liveness and fault localization).]]>
Mon, 03 Jul 2017 06:54:59 GMT /IOSRjournaljce/the-systematic-methodology-for-accurate-test-packet-generation-and-fault-localization IOSRjournaljce@slideshare.net(IOSRjournaljce) The Systematic Methodology for Accurate Test Packet Generation and Fault Localization IOSRjournaljce As we probably aware now a days networks are broadly dispersed so administrators relies on upon different devices, for example, pings and follow course to troubleshoot the issue in network. So we proposed a robotized and orderly approach for testing and troubleshooting network called "Automatic Test Packet Generation"(ATPG). ATPG first peruses switch arrangement and produces a gadget free model. The model is utilized to produce least number of test packets to cover each connection in a network and every control in network. ATPG is equipped for researching both useful and execution issues. Test packets are sent at customary interims and separate strategy is utilized to confine flaws. The working of few disconnected devices which automatically create test packets are additionally given, yet ATPG goes past the prior work in static (checking liveness and fault localization). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/e1901041622-170703065459-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As we probably aware now a days networks are broadly dispersed so administrators relies on upon different devices, for example, pings and follow course to troubleshoot the issue in network. So we proposed a robotized and orderly approach for testing and troubleshooting network called &quot;Automatic Test Packet Generation&quot;(ATPG). ATPG first peruses switch arrangement and produces a gadget free model. The model is utilized to produce least number of test packets to cover each connection in a network and every control in network. ATPG is equipped for researching both useful and execution issues. Test packets are sent at customary interims and separate strategy is utilized to confine flaws. The working of few disconnected devices which automatically create test packets are additionally given, yet ATPG goes past the prior work in static (checking liveness and fault localization).
The Systematic Methodology for Accurate Test Packet Generation and Fault Localization from IOSRjournaljce
]]>
29 2 https://cdn.slidesharecdn.com/ss_thumbnails/e1901041622-170703065459-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System /slideshow/the-use-of-knn-and-bees-algorithm-for-big-data-intrusion-detection-system/77453776 c1901040812-170703065453
Big data problem in intrusion detection system is mainly due to the large volume of the data. The dimension of the original data is 41. Some of the feature of original data are unnecessary. In this process, the volume of data has expanded into hundreds and thousands of gigabytes(GB) of information. The dimension span of data and volume can be reduced and the system is enhanced by using K-NN and BA. The reduction ratio of KDD datasets and processing speed is very slow so the data has been reduced for extracting features by Bees Algorithm (AB) and use K-nearest neighbors as classification (KNN). So, the KDD99 datasets applied in the experiments with significant features. The results have gave higher detection and accuracy rate as well as reduced false positive rate. Keywords: Big Data; Intru]]>

Big data problem in intrusion detection system is mainly due to the large volume of the data. The dimension of the original data is 41. Some of the feature of original data are unnecessary. In this process, the volume of data has expanded into hundreds and thousands of gigabytes(GB) of information. The dimension span of data and volume can be reduced and the system is enhanced by using K-NN and BA. The reduction ratio of KDD datasets and processing speed is very slow so the data has been reduced for extracting features by Bees Algorithm (AB) and use K-nearest neighbors as classification (KNN). So, the KDD99 datasets applied in the experiments with significant features. The results have gave higher detection and accuracy rate as well as reduced false positive rate. Keywords: Big Data; Intru]]>
Mon, 03 Jul 2017 06:54:53 GMT /slideshow/the-use-of-knn-and-bees-algorithm-for-big-data-intrusion-detection-system/77453776 IOSRjournaljce@slideshare.net(IOSRjournaljce) The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System IOSRjournaljce Big data problem in intrusion detection system is mainly due to the large volume of the data. The dimension of the original data is 41. Some of the feature of original data are unnecessary. In this process, the volume of data has expanded into hundreds and thousands of gigabytes(GB) of information. The dimension span of data and volume can be reduced and the system is enhanced by using K-NN and BA. The reduction ratio of KDD datasets and processing speed is very slow so the data has been reduced for extracting features by Bees Algorithm (AB) and use K-nearest neighbors as classification (KNN). So, the KDD99 datasets applied in the experiments with significant features. The results have gave higher detection and accuracy rate as well as reduced false positive rate. Keywords: Big Data; Intru <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/c1901040812-170703065453-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Big data problem in intrusion detection system is mainly due to the large volume of the data. The dimension of the original data is 41. Some of the feature of original data are unnecessary. In this process, the volume of data has expanded into hundreds and thousands of gigabytes(GB) of information. The dimension span of data and volume can be reduced and the system is enhanced by using K-NN and BA. The reduction ratio of KDD datasets and processing speed is very slow so the data has been reduced for extracting features by Bees Algorithm (AB) and use K-nearest neighbors as classification (KNN). So, the KDD99 datasets applied in the experiments with significant features. The results have gave higher detection and accuracy rate as well as reduced false positive rate. Keywords: Big Data; Intru
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System from IOSRjournaljce
]]>
51 2 https://cdn.slidesharecdn.com/ss_thumbnails/c1901040812-170703065453-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Study and analysis of E-Governance Information Security (InfoSec) in Indian Context /slideshow/study-and-analysis-of-egovernance-information-security-infosec-in-indian-context/77453771 b1901040407-170703065444
The purpose of the study is to explore and find a research gap in E-Governance Information Security (InfoSec) domain in Indian Context. The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review. The study outcomes clearly depict the requirement of research in the field of InfoSec in e-governance domain in a country like India.]]>

The purpose of the study is to explore and find a research gap in E-Governance Information Security (InfoSec) domain in Indian Context. The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review. The study outcomes clearly depict the requirement of research in the field of InfoSec in e-governance domain in a country like India.]]>
Mon, 03 Jul 2017 06:54:44 GMT /slideshow/study-and-analysis-of-egovernance-information-security-infosec-in-indian-context/77453771 IOSRjournaljce@slideshare.net(IOSRjournaljce) Study and analysis of E-Governance Information Security (InfoSec) in Indian Context IOSRjournaljce The purpose of the study is to explore and find a research gap in E-Governance Information Security (InfoSec) domain in Indian Context. The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review. The study outcomes clearly depict the requirement of research in the field of InfoSec in e-governance domain in a country like India. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/b1901040407-170703065444-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The purpose of the study is to explore and find a research gap in E-Governance Information Security (InfoSec) domain in Indian Context. The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review. The study outcomes clearly depict the requirement of research in the field of InfoSec in e-governance domain in a country like India.
Study and analysis of E-Governance Information Security (InfoSec) in Indian Context from IOSRjournaljce
]]>
63 2 https://cdn.slidesharecdn.com/ss_thumbnails/b1901040407-170703065444-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An E-Governance Web Security Survey /slideshow/an-egovernance-web-security-survey/77453768 a1901040103-170703065435
The purpose of the study is to explore web security status of the E-Governance websites and web applications. The central theme of the paper is to study and analyze the security vulnerabilities in the technologies utilized for E-Governance website and web application development. The study was conducted in the State of Gujarat,India. The data related to web development technologies, vulnerabilities affecting those technologies, vulnerability severity, and vulnerability type were gathered from 26 E-Governance website/Web application for detail analysis. The outcome of the study depicts the relationship between technology vis-a-vis vulnerability type and vulnerability severity.]]>

The purpose of the study is to explore web security status of the E-Governance websites and web applications. The central theme of the paper is to study and analyze the security vulnerabilities in the technologies utilized for E-Governance website and web application development. The study was conducted in the State of Gujarat,India. The data related to web development technologies, vulnerabilities affecting those technologies, vulnerability severity, and vulnerability type were gathered from 26 E-Governance website/Web application for detail analysis. The outcome of the study depicts the relationship between technology vis-a-vis vulnerability type and vulnerability severity.]]>
Mon, 03 Jul 2017 06:54:35 GMT /slideshow/an-egovernance-web-security-survey/77453768 IOSRjournaljce@slideshare.net(IOSRjournaljce) An E-Governance Web Security Survey IOSRjournaljce The purpose of the study is to explore web security status of the E-Governance websites and web applications. The central theme of the paper is to study and analyze the security vulnerabilities in the technologies utilized for E-Governance website and web application development. The study was conducted in the State of Gujarat,India. The data related to web development technologies, vulnerabilities affecting those technologies, vulnerability severity, and vulnerability type were gathered from 26 E-Governance website/Web application for detail analysis. The outcome of the study depicts the relationship between technology vis-a-vis vulnerability type and vulnerability severity. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/a1901040103-170703065435-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The purpose of the study is to explore web security status of the E-Governance websites and web applications. The central theme of the paper is to study and analyze the security vulnerabilities in the technologies utilized for E-Governance website and web application development. The study was conducted in the State of Gujarat,India. The data related to web development technologies, vulnerabilities affecting those technologies, vulnerability severity, and vulnerability type were gathered from 26 E-Governance website/Web application for detail analysis. The outcome of the study depicts the relationship between technology vis-a-vis vulnerability type and vulnerability severity.
An E-Governance Web Security Survey from IOSRjournaljce
]]>
57 6 https://cdn.slidesharecdn.com/ss_thumbnails/a1901040103-170703065435-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions /slideshow/exploring-3dvirtual-learning-environments-with-adaptive-repetitions/77453545 j1901036771-170703064353
: In spatial tasks, the use of cognitive aids reduce mental load and therefore being appealing to trainers and trainees. However, these aids can act as shortcuts and prevents the trainees from active exploration which is necessary to perform the task independently in non-supervised environment. In this paper we used adaptive repetition as control strategy to explore the 3D- Virtual Learning environments. The proposed approach enables the trainee to get the benefits of cognitive support while at the same time he is actively involved in the learning process. Experimental results show the effectiveness of the proposed approach]]>

: In spatial tasks, the use of cognitive aids reduce mental load and therefore being appealing to trainers and trainees. However, these aids can act as shortcuts and prevents the trainees from active exploration which is necessary to perform the task independently in non-supervised environment. In this paper we used adaptive repetition as control strategy to explore the 3D- Virtual Learning environments. The proposed approach enables the trainee to get the benefits of cognitive support while at the same time he is actively involved in the learning process. Experimental results show the effectiveness of the proposed approach]]>
Mon, 03 Jul 2017 06:43:53 GMT /slideshow/exploring-3dvirtual-learning-environments-with-adaptive-repetitions/77453545 IOSRjournaljce@slideshare.net(IOSRjournaljce) Exploring 3D-Virtual Learning Environments with Adaptive Repetitions IOSRjournaljce : In spatial tasks, the use of cognitive aids reduce mental load and therefore being appealing to trainers and trainees. However, these aids can act as shortcuts and prevents the trainees from active exploration which is necessary to perform the task independently in non-supervised environment. In this paper we used adaptive repetition as control strategy to explore the 3D- Virtual Learning environments. The proposed approach enables the trainee to get the benefits of cognitive support while at the same time he is actively involved in the learning process. Experimental results show the effectiveness of the proposed approach <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/j1901036771-170703064353-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> : In spatial tasks, the use of cognitive aids reduce mental load and therefore being appealing to trainers and trainees. However, these aids can act as shortcuts and prevents the trainees from active exploration which is necessary to perform the task independently in non-supervised environment. In this paper we used adaptive repetition as control strategy to explore the 3D- Virtual Learning environments. The proposed approach enables the trainee to get the benefits of cognitive support while at the same time he is actively involved in the learning process. Experimental results show the effectiveness of the proposed approach
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions from IOSRjournaljce
]]>
36 4 https://cdn.slidesharecdn.com/ss_thumbnails/j1901036771-170703064353-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Human Face Detection Systemin ANew Algorithm /slideshow/human-face-detection-systemin-anew-algorithm/77453542 i1901036166-170703064350
Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts. In addition, Gray level has been used to detect the area which contains a skin, after that anotherlevel used to erase the area that does not contain skin. The system which proposed applied on many photos and passed with great accuracy of detecting faces and it has a good efficient especially to separate the area that does not contain skin or face from the area which contain face and skin. It has been agreed and approved that the accuracy of the proposed system is 98% in human face detection. ]]>

Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts. In addition, Gray level has been used to detect the area which contains a skin, after that anotherlevel used to erase the area that does not contain skin. The system which proposed applied on many photos and passed with great accuracy of detecting faces and it has a good efficient especially to separate the area that does not contain skin or face from the area which contain face and skin. It has been agreed and approved that the accuracy of the proposed system is 98% in human face detection. ]]>
Mon, 03 Jul 2017 06:43:50 GMT /slideshow/human-face-detection-systemin-anew-algorithm/77453542 IOSRjournaljce@slideshare.net(IOSRjournaljce) Human Face Detection Systemin ANew Algorithm IOSRjournaljce Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts. In addition, Gray level has been used to detect the area which contains a skin, after that anotherlevel used to erase the area that does not contain skin. The system which proposed applied on many photos and passed with great accuracy of detecting faces and it has a good efficient especially to separate the area that does not contain skin or face from the area which contain face and skin. It has been agreed and approved that the accuracy of the proposed system is 98% in human face detection. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/i1901036166-170703064350-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts. In addition, Gray level has been used to detect the area which contains a skin, after that anotherlevel used to erase the area that does not contain skin. The system which proposed applied on many photos and passed with great accuracy of detecting faces and it has a good efficient especially to separate the area that does not contain skin or face from the area which contain face and skin. It has been agreed and approved that the accuracy of the proposed system is 98% in human face detection.
Human Face Detection Systemin ANew Algorithm from IOSRjournaljce
]]>
70 2 https://cdn.slidesharecdn.com/ss_thumbnails/i1901036166-170703064350-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Color Noise Cases /IOSRjournaljce/value-based-decision-control-preferences-portfolio-allocation-winer-and-color-noise-cases h1901035360-170703064346
The paper presents an innovative approach to mathematical modeling of complex systems humandynamical process. The approach is based on the theory of measurement and utility theory and permits inclusion of human preferences in the objective function. The objective utility function is constructed by recurrent stochastic procedure which represents machine learning based on the human preferences. The approach is demonstrated by two case studies, portfolio allocation with Wiener process and portfolio allocation in the case of financial process with colored noise. The presented formulations could serve as foundation of development of decision support tools for design of management/control. This value-oriented modeling leads to the development of preferences-based decision support in machine learning environment and control/management value based design.]]>

The paper presents an innovative approach to mathematical modeling of complex systems humandynamical process. The approach is based on the theory of measurement and utility theory and permits inclusion of human preferences in the objective function. The objective utility function is constructed by recurrent stochastic procedure which represents machine learning based on the human preferences. The approach is demonstrated by two case studies, portfolio allocation with Wiener process and portfolio allocation in the case of financial process with colored noise. The presented formulations could serve as foundation of development of decision support tools for design of management/control. This value-oriented modeling leads to the development of preferences-based decision support in machine learning environment and control/management value based design.]]>
Mon, 03 Jul 2017 06:43:46 GMT /IOSRjournaljce/value-based-decision-control-preferences-portfolio-allocation-winer-and-color-noise-cases IOSRjournaljce@slideshare.net(IOSRjournaljce) Value Based Decision Control: Preferences Portfolio Allocation, Winer and Color Noise Cases IOSRjournaljce The paper presents an innovative approach to mathematical modeling of complex systems humandynamical process. The approach is based on the theory of measurement and utility theory and permits inclusion of human preferences in the objective function. The objective utility function is constructed by recurrent stochastic procedure which represents machine learning based on the human preferences. The approach is demonstrated by two case studies, portfolio allocation with Wiener process and portfolio allocation in the case of financial process with colored noise. The presented formulations could serve as foundation of development of decision support tools for design of management/control. This value-oriented modeling leads to the development of preferences-based decision support in machine learning environment and control/management value based design. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/h1901035360-170703064346-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The paper presents an innovative approach to mathematical modeling of complex systems humandynamical process. The approach is based on the theory of measurement and utility theory and permits inclusion of human preferences in the objective function. The objective utility function is constructed by recurrent stochastic procedure which represents machine learning based on the human preferences. The approach is demonstrated by two case studies, portfolio allocation with Wiener process and portfolio allocation in the case of financial process with colored noise. The presented formulations could serve as foundation of development of decision support tools for design of management/control. This value-oriented modeling leads to the development of preferences-based decision support in machine learning environment and control/management value based design.
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Color Noise Cases from IOSRjournaljce
]]>
170 7 https://cdn.slidesharecdn.com/ss_thumbnails/h1901035360-170703064346-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Assessment of the Approaches Used in Indigenous Software Products Development in Nigeria /slideshow/assessment-of-the-approaches-used-in-indigenous-software-products-development-in-nigeria/77453537 g1901034252-170703064341
Acceptability of indigenous software is always low in most of the African countries especially in Nigeria. This paper then study and presents the results on the assessment of the approaches used in indigenous software development products. The study involved ICT firms that specialized in software development and educational institutions who were part of major stakeholders as well as users of software packages. The primary tool for data collection was questionnaire, which was used to elicit information from software developers on the various approaches adopted in their operations. This was also complemented with information from secondary sources. The identified approaches were measured on a five-point Likert scale rating of 5 to 1 to determine their relative strength index (RSI) in the factors. The result revealed the various approaches adopted for software development had significant difference of chi (45)1699.06 at p 0.001 with spiral (6.02), agile (5.86), prototyping (5.67), object oriented (5.48), rotational unified process (5.32), computer and incremental case (4.50), waterfall (3.66) and integrated (1.98) were the commonly adopted approaches used for software development. Similarly, the approaches adopted by software development firms were correlated and returned a significant difference of (Z = 1699.06, p 0.001). The result implies that these approaches had a great impact on the domestic use of software products and perhaps is the most important driver of software industry growth for emerging technologies.]]>

Acceptability of indigenous software is always low in most of the African countries especially in Nigeria. This paper then study and presents the results on the assessment of the approaches used in indigenous software development products. The study involved ICT firms that specialized in software development and educational institutions who were part of major stakeholders as well as users of software packages. The primary tool for data collection was questionnaire, which was used to elicit information from software developers on the various approaches adopted in their operations. This was also complemented with information from secondary sources. The identified approaches were measured on a five-point Likert scale rating of 5 to 1 to determine their relative strength index (RSI) in the factors. The result revealed the various approaches adopted for software development had significant difference of chi (45)1699.06 at p 0.001 with spiral (6.02), agile (5.86), prototyping (5.67), object oriented (5.48), rotational unified process (5.32), computer and incremental case (4.50), waterfall (3.66) and integrated (1.98) were the commonly adopted approaches used for software development. Similarly, the approaches adopted by software development firms were correlated and returned a significant difference of (Z = 1699.06, p 0.001). The result implies that these approaches had a great impact on the domestic use of software products and perhaps is the most important driver of software industry growth for emerging technologies.]]>
Mon, 03 Jul 2017 06:43:41 GMT /slideshow/assessment-of-the-approaches-used-in-indigenous-software-products-development-in-nigeria/77453537 IOSRjournaljce@slideshare.net(IOSRjournaljce) Assessment of the Approaches Used in Indigenous Software Products Development in Nigeria IOSRjournaljce Acceptability of indigenous software is always low in most of the African countries especially in Nigeria. This paper then study and presents the results on the assessment of the approaches used in indigenous software development products. The study involved ICT firms that specialized in software development and educational institutions who were part of major stakeholders as well as users of software packages. The primary tool for data collection was questionnaire, which was used to elicit information from software developers on the various approaches adopted in their operations. This was also complemented with information from secondary sources. The identified approaches were measured on a five-point Likert scale rating of 5 to 1 to determine their relative strength index (RSI) in the factors. The result revealed the various approaches adopted for software development had significant difference of chi (45)1699.06 at p 0.001 with spiral (6.02), agile (5.86), prototyping (5.67), object oriented (5.48), rotational unified process (5.32), computer and incremental case (4.50), waterfall (3.66) and integrated (1.98) were the commonly adopted approaches used for software development. Similarly, the approaches adopted by software development firms were correlated and returned a significant difference of (Z = 1699.06, p 0.001). The result implies that these approaches had a great impact on the domestic use of software products and perhaps is the most important driver of software industry growth for emerging technologies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/g1901034252-170703064341-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Acceptability of indigenous software is always low in most of the African countries especially in Nigeria. This paper then study and presents the results on the assessment of the approaches used in indigenous software development products. The study involved ICT firms that specialized in software development and educational institutions who were part of major stakeholders as well as users of software packages. The primary tool for data collection was questionnaire, which was used to elicit information from software developers on the various approaches adopted in their operations. This was also complemented with information from secondary sources. The identified approaches were measured on a five-point Likert scale rating of 5 to 1 to determine their relative strength index (RSI) in the factors. The result revealed the various approaches adopted for software development had significant difference of chi (45)1699.06 at p 0.001 with spiral (6.02), agile (5.86), prototyping (5.67), object oriented (5.48), rotational unified process (5.32), computer and incremental case (4.50), waterfall (3.66) and integrated (1.98) were the commonly adopted approaches used for software development. Similarly, the approaches adopted by software development firms were correlated and returned a significant difference of (Z = 1699.06, p 0.001). The result implies that these approaches had a great impact on the domestic use of software products and perhaps is the most important driver of software industry growth for emerging technologies.
Assessment of the Approaches Used in Indigenous Software Products Development in Nigeria from IOSRjournaljce
]]>
160 4 https://cdn.slidesharecdn.com/ss_thumbnails/g1901034252-170703064341-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynamically Generated Aggregate Key /slideshow/secure-data-sharing-and-search-in-cloud-based-data-using-authoritywise-dynamically-generated-aggregate-key/77453535 f1901033741-170703064338
The Data sharing is an important functionality in cloud storage. We describe new public key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. Ensuring the security of cloud computing is second major factor and dealing with because of service availability failure the single cloud providers demonstrated less famous failure and possibility malicious insiders in the single cloud. A movement towards Multi-Clouds, In other words Inter-Clouds or Cloud-Of-Clouds as emerged recently. This works aim to reduce security risk and better flexibility and efficiency to the user. Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability.]]>

The Data sharing is an important functionality in cloud storage. We describe new public key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. Ensuring the security of cloud computing is second major factor and dealing with because of service availability failure the single cloud providers demonstrated less famous failure and possibility malicious insiders in the single cloud. A movement towards Multi-Clouds, In other words Inter-Clouds or Cloud-Of-Clouds as emerged recently. This works aim to reduce security risk and better flexibility and efficiency to the user. Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability.]]>
Mon, 03 Jul 2017 06:43:38 GMT /slideshow/secure-data-sharing-and-search-in-cloud-based-data-using-authoritywise-dynamically-generated-aggregate-key/77453535 IOSRjournaljce@slideshare.net(IOSRjournaljce) Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynamically Generated Aggregate Key IOSRjournaljce The Data sharing is an important functionality in cloud storage. We describe new public key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. Ensuring the security of cloud computing is second major factor and dealing with because of service availability failure the single cloud providers demonstrated less famous failure and possibility malicious insiders in the single cloud. A movement towards Multi-Clouds, In other words Inter-Clouds or Cloud-Of-Clouds as emerged recently. This works aim to reduce security risk and better flexibility and efficiency to the user. Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/f1901033741-170703064338-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Data sharing is an important functionality in cloud storage. We describe new public key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. Ensuring the security of cloud computing is second major factor and dealing with because of service availability failure the single cloud providers demonstrated less famous failure and possibility malicious insiders in the single cloud. A movement towards Multi-Clouds, In other words Inter-Clouds or Cloud-Of-Clouds as emerged recently. This works aim to reduce security risk and better flexibility and efficiency to the user. Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability.
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynamically Generated Aggregate Key from IOSRjournaljce
]]>
82 4 https://cdn.slidesharecdn.com/ss_thumbnails/f1901033741-170703064338-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Panorama Technique for 3D Animation movie, Design and Evaluating /slideshow/panorama-technique-for-3d-animation-movie-design-and-evaluating/77453534 e1901033136-170703064335
This paper presents an applied approach for Panorama 3D movies enhanced with visual sound effects. The case study that considered is IIPS@UOIT. Many selected S/W have been used to introduce the 3D Movie. 3D Animation is a modern technology in the field of the world of filmmaking and is considered the core of multimedia, where the vast majority of movies such as Hollywood movies that we see today, it was using 3D technology. Where this technique is used in all the magazines, such as medical experiments, engineering, astronomy, planets and stars, to prove scientific theories, history, geography, etc., where they are building models or scenes or characters simulates reality and the movement of the viewer to the heart of the event. A three-dimensional film was made to (IIPS @ UOITC) to give it a future vision and published in the global sites such as YouTube, Facebook and Google earth. By using many specialized 3d software and cinematic tricks, with a focusing on movement, characters, lighting, cameras and final render.]]>

This paper presents an applied approach for Panorama 3D movies enhanced with visual sound effects. The case study that considered is IIPS@UOIT. Many selected S/W have been used to introduce the 3D Movie. 3D Animation is a modern technology in the field of the world of filmmaking and is considered the core of multimedia, where the vast majority of movies such as Hollywood movies that we see today, it was using 3D technology. Where this technique is used in all the magazines, such as medical experiments, engineering, astronomy, planets and stars, to prove scientific theories, history, geography, etc., where they are building models or scenes or characters simulates reality and the movement of the viewer to the heart of the event. A three-dimensional film was made to (IIPS @ UOITC) to give it a future vision and published in the global sites such as YouTube, Facebook and Google earth. By using many specialized 3d software and cinematic tricks, with a focusing on movement, characters, lighting, cameras and final render.]]>
Mon, 03 Jul 2017 06:43:35 GMT /slideshow/panorama-technique-for-3d-animation-movie-design-and-evaluating/77453534 IOSRjournaljce@slideshare.net(IOSRjournaljce) Panorama Technique for 3D Animation movie, Design and Evaluating IOSRjournaljce This paper presents an applied approach for Panorama 3D movies enhanced with visual sound effects. The case study that considered is IIPS@UOIT. Many selected S/W have been used to introduce the 3D Movie. 3D Animation is a modern technology in the field of the world of filmmaking and is considered the core of multimedia, where the vast majority of movies such as Hollywood movies that we see today, it was using 3D technology. Where this technique is used in all the magazines, such as medical experiments, engineering, astronomy, planets and stars, to prove scientific theories, history, geography, etc., where they are building models or scenes or characters simulates reality and the movement of the viewer to the heart of the event. A three-dimensional film was made to (IIPS @ UOITC) to give it a future vision and published in the global sites such as YouTube, Facebook and Google earth. By using many specialized 3d software and cinematic tricks, with a focusing on movement, characters, lighting, cameras and final render. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/e1901033136-170703064335-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper presents an applied approach for Panorama 3D movies enhanced with visual sound effects. The case study that considered is IIPS@UOIT. Many selected S/W have been used to introduce the 3D Movie. 3D Animation is a modern technology in the field of the world of filmmaking and is considered the core of multimedia, where the vast majority of movies such as Hollywood movies that we see today, it was using 3D technology. Where this technique is used in all the magazines, such as medical experiments, engineering, astronomy, planets and stars, to prove scientific theories, history, geography, etc., where they are building models or scenes or characters simulates reality and the movement of the viewer to the heart of the event. A three-dimensional film was made to (IIPS @ UOITC) to give it a future vision and published in the global sites such as YouTube, Facebook and Google earth. By using many specialized 3d software and cinematic tricks, with a focusing on movement, characters, lighting, cameras and final render.
Panorama Technique for 3D Animation movie, Design and Evaluating from IOSRjournaljce
]]>
98 7 https://cdn.slidesharecdn.com/ss_thumbnails/e1901033136-170703064335-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Density Driven Image Coding for Tumor Detection in mri Image /slideshow/density-driven-image-coding-for-tumor-detection-in-mri-image/77453530 d1901032430-170703064329
The significant of multi spectral band resolution is explored towards selection of feature coefficients based on its energy density. Toward the feature representiaon in transformed domain, multi wavelet transformations were used for finer spectral representation. However, due to a large feature count these features are not optimal under low resource computing system. In the recognition units, running with low resources a new coding approach of feature selection, considering the band spectral density is developed. The effective selection of feature element, based on its spectral density achieve two objective of pattern recognition, the feature coefficient representiaon is minimized, hence leading to lower resource requirement, and dominant feature representation, resulting in higher retrieval performance.]]>

The significant of multi spectral band resolution is explored towards selection of feature coefficients based on its energy density. Toward the feature representiaon in transformed domain, multi wavelet transformations were used for finer spectral representation. However, due to a large feature count these features are not optimal under low resource computing system. In the recognition units, running with low resources a new coding approach of feature selection, considering the band spectral density is developed. The effective selection of feature element, based on its spectral density achieve two objective of pattern recognition, the feature coefficient representiaon is minimized, hence leading to lower resource requirement, and dominant feature representation, resulting in higher retrieval performance.]]>
Mon, 03 Jul 2017 06:43:29 GMT /slideshow/density-driven-image-coding-for-tumor-detection-in-mri-image/77453530 IOSRjournaljce@slideshare.net(IOSRjournaljce) Density Driven Image Coding for Tumor Detection in mri Image IOSRjournaljce The significant of multi spectral band resolution is explored towards selection of feature coefficients based on its energy density. Toward the feature representiaon in transformed domain, multi wavelet transformations were used for finer spectral representation. However, due to a large feature count these features are not optimal under low resource computing system. In the recognition units, running with low resources a new coding approach of feature selection, considering the band spectral density is developed. The effective selection of feature element, based on its spectral density achieve two objective of pattern recognition, the feature coefficient representiaon is minimized, hence leading to lower resource requirement, and dominant feature representation, resulting in higher retrieval performance. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/d1901032430-170703064329-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The significant of multi spectral band resolution is explored towards selection of feature coefficients based on its energy density. Toward the feature representiaon in transformed domain, multi wavelet transformations were used for finer spectral representation. However, due to a large feature count these features are not optimal under low resource computing system. In the recognition units, running with low resources a new coding approach of feature selection, considering the band spectral density is developed. The effective selection of feature element, based on its spectral density achieve two objective of pattern recognition, the feature coefficient representiaon is minimized, hence leading to lower resource requirement, and dominant feature representation, resulting in higher retrieval performance.
Density Driven Image Coding for Tumor Detection in mri Image from IOSRjournaljce
]]>
67 2 https://cdn.slidesharecdn.com/ss_thumbnails/d1901032430-170703064329-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/o1901047377-170703065537-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/3d-visualizations-of-land-cover-maps/77453800 3D Visualizations of L... https://cdn.slidesharecdn.com/ss_thumbnails/n1901047072-170703065533-thumbnail.jpg?width=320&height=320&fit=bounds IOSRjournaljce/comparison-between-cisco-aci-and-vmware-nsx Comparison between Cis... https://cdn.slidesharecdn.com/ss_thumbnails/m1901046669-170703065531-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/students-skills-evaluation-techniques-using-data-mining/77453797 Students Skills Evalu...