Skip to main content
Feature Reduction is a kind of dimensionality reduction of feature space. There are a number of approaches are used to identify the significant features but they are not using the weighing approach. The weighing approach is quite useful... more
With the fast progress of MIMO technology and its growing applications in the mobile ad hoc networks, it is important to develop a technique to enable more efficient MIMO implemented mobile ad hoc network. The simple, yet powerful concept... more
Analysis of diseases integrating multi-factors increases the complexity of the problem and therefore, development of frameworks for the analysis of diseases is an issue that is currently a topic of intense research. Due to the... more
Face recognition has been largely used in biometric field as a security measure at air ports, passport verif ication, criminals ' list verification, visa processing, and so on. Various literature studies suggested different... more
Cloud computing is the dynamic delivery of information technology resources and capabilities as a service over the Internet. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are... more
Multimedia communication is the new age of communication. The image communication is one of most popular multimedia communication. This type of communication always faces problem of security. The communication breaching rate is rising... more
Face recognition has been largely used in biometric field as a security measure at air ports, passport verification, criminals' list verification, visa processing, and so on. Various literature studies suggested different approaches... more
Abstract–In Cellular networks, number of users increase in an exponential manner. As a result of this exponential growth of users, overloading of the system takes place. Besides this, unacceptable delays and high computational cost create... more
The study was conducted to examine the impact of on-the- job training on employee performance by using a questionnaire for collecting responses from the sample to check the above relation through SPSS 16. Data reduction technique was used... more
This study aims to develop and design an on-line hotel reservation and management system for the College of International Tourism and Hospitality Management of the Lyceum of the Philippines University, Batangas Campus. It presents... more
In this paper we give an overview of some routing protocols which can improve the efficiency and scalability of wireless sensor networks. The Wireless Sensor Network (WSN) is a network consisting of ten to thousand small nodes with... more
Linguistic competence, communicative competence, and interactional competence have had profound impact on second language teaching, learning, and testing. Although a significant number of studies have been conducted on these three... more
Multimedia communication is the new age of communication. The image communication is one of most popular multimedia communication. This type of communication always faces problem of security. The communication breaching rate is rising... more
Computer-aided diagnosis (CAD) can be used as a decision support system by physicians in the diagnosis and treatmentof disordered speech especially those who specialize in neurophysiology diseases. Parkinson's disease (PD) is... more
Internet usage is rapidly increasing in every field of life. Internet coverage is wide either it is textile, pharmaceutical or education sectors. In every sectors where internet envisions are exist, there objects must be connected with... more
This paper proposes a new hybrid swarm intelligence algorithm that encompasses the feature of three major swarm algorithms. It combines the fast convergence of the Cuckoo Search (CS), the dynamic root change of the Firefly Algorithm (FA),... more
Currently there is an increasing interest in data mining and educational systems, making educational data mining as a new growing research community. Higher education, throughout the world is delivered through universities, colleges... more
Linguistic competence, communicative competence, and interactional competence have had a profound impact on second language teaching, learning, and testing. Although a substantial number of studies have been conducted on these three... more
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service... more
This paper proposes a hybrid ANFIS (Adaptive Neuro-Fuzzy Inference System) controller with DMRAC (Direct Model Reference Adaptive Control) and mathematical modeling of the kinematic and dynamic solutions. The controller was hybrid with a... more
Mobile communication emergence has brought a whole palette of new possibilities in information sharing not only for individual development but also for national growth. New mobile information devices such as Personal Digital Assistants,... more
Linguistic competence, communicative competence, and interactional competence have had a profound impact on second language teaching, learning, and testing. Although a substantial number of studies have been conducted on these three... more
The business activities of traditional industrial companies have commonly focused on products and product-related services. Digital pioneers have evolved their offerings into product-service systems that are networked, intelligent,... more
Collaborative filtering is a popular approach in recommender Systems that helps users in identifying the items they may like in a wagon of items. Finding similarity among users with the available item ratings so as to predict rating(s)... more
Facebook occupies an important part of people's time and life due to the recent developments in the field of communication technologies (CT). This paper aims at investigating the Facebook impact (FI) on undergraduate students at... more
The deployment of Information Communication Technology in the Road sector has contributed positively towards achieving the national goal of ICT for infrastructure development. However, the deployment of ICT software for Road... more
In 21st century learning, students use educational technologies to apply knowledge to new situations, analyse information, collaborate, solve problems, and make decisions. Utilising emerging technologies, to provide expanded learning... more
ECG is a bio-medical signal which records the electrical activity of the heart versus time. They are important for diagnostic and research purposes of the human heart. In this paper we discuss a method of feature extraction which is an... more
This paper attempts to discover ransomware exposing the lack of cyber-security. It intends to elicit attention with regards to ransomware, a newly emerged cyber threat and to help organizations; IT practitioners understand the need for... more
In recent times, small and medium-sized enterprises (SMEs) have become a familiar form of business organization. They have a significant contribution on economic development creating significant number of jobs around the world. Elo (2005)... more
In this era of communication network, we can access any website or contact any person with the help of internet or telephone anywhere in the world without knowing where the website is hosted and without knowing where the person is... more
The growing availability of mobile devices across developing countries and coupled with increase awareness of mobile learning as well as the use of mobile devices for laboratory practical warrant the exploration of its wider application... more
The speed control of Induction motor is done using the advance AI Technique methods. In this System the vector control scheme in the stator flux oriented reference frame is used for controlling the variable speed Induction motor. For this... more
In present scenario Network Management System of Next Generation SDH is not performing Offline reporting, offline analysis of alarms, offline performance management and Configurations of network like real time. Any offline configuration... more
In this paper we have studied and implement the color image steganography using LSB, DFT and DWT. First we have studied the various literatures of LSB, DFT and DWT and then implemented one system in which we can do steganography using... more
Recently Content based image retrieval (CBIR) is an active research. This paper proposes a technique to retrieve images based on color feature and evaluate the retrieval system performance. In this retrieval system Euclidean distance and... more
This paper attempts to discover ransomware exposing the lack of cyber-security. It intends to elicit attention with regards to ransomware, a newly emerged cyber threat and to help organizations; IT practitioners understand the need for... more
Linguistic competence, communicative competence, and interactional competence have had a profound impact on second language teaching, learning, and testing. Although a substantial number of studies have been conducted on these three... more
The importance of the prioritization in commercial software development has been analyzed by many researchers. The gathered requirements are required to be put into an order of some priority. In other words we can say that there is a need... more