Application of Fuzzy Rule-Based Classifier to CBIR in comparison with other classifiers Abstract? A great deal of research is being done in different aspects of Content-Based Image Retrieval (CBIR). Image classification is one of the most important tasks that must be dealt with in image DB as an intermediate stage prior to further image retrieval….
Applications of graph theory in computer science an overview Abstract?AbstractThe field of mathematics plays vital role in various fields. One of the important areas in mathematics is graph theory which is used in structural models. This structural arrangements of various objects or technologies lead to new inventions and modifications in the existing environment for enhancement…
Approximate String Matching Algorithms: A Brief Survey and Comparison/strong> Abstract?Abstract Many database applications require similarity based retrieval on stored text and/or multimedia objects. This is an area of increasing research interest in the sectors of database, data mining, information retrieval and knowledge discovery. This paper presents a brief survey on the existing approximate string matching…
AppShell: Making Data Protection Practical for Lost or Stolen Android Devices Abstract? In this android application is based on application manager to manage the sensitive private application like (Facebook, what Sapp, twitter, etc.,). This application is a collection of applications for manage the security and privacy of that sensitive application. This application has one password…
Apriori Versions Based on MapReduce for Mining Frequent Patterns on Big Data Abstract– Pattern mining is one of the most important tasks to extract meaningful and useful information from raw data. This task aims to extract item-sets that represent any type of homogeneity and regularity in data. Although many efficient algorithms have been developed in…
Architecture of a Reusable BIST Engine for Detection and Autocorrection of Memory Failures and for IO Debug, Validation, Link Training, and Power Optimization on 14-nm SoC Abstract? The CPGC reusable BIST engine introduced an optional hardware repair engine that works in conjunction with software to provide autorepair technology. This repair capability has been adopted by…
Area and Energy-Efficient Complementary Dual-Modular Redundancy Dynamic Memory for Space Applications Abstract– In the first place, the limited size and power budgets of space-bound systems often contradict the requirements for reliable circuit operation within high-radiation environments. Here the smallest solution for soft-error tolerant embedded memory yet to be presented. In addition, complementary dual-modular redundancy (CDMR)…
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks Abstract? Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel through the creation of a safe interoperable wireless communications network that includes cars, buses, traffic signals, cell phones, and other devices. However, VANETs are vulnerable to security threats…
ASRQ: Automatic Segment Repeat Request for IEEE 802.15.4-Based WBAN Abstract– In the first place, wireless body area network (WBAN), In addition, Mobile Computing high data reliability and long operating time are important requirements. Mobile Computing retransmission process of the default Automatic Repeat reQuest (ARQ) mechanism in IEEE 802.15.4 is a suitable method to ensure the…
Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks Abstract? The resource allocation and management issues related to heterogeneous wireless systems made up of several radio access technologies (RATs) that collectively provide a unified wireless network to a diverse set of users through co-ordination managed by a centralized global resource controller (GRC). We…
Assessing the Suitability of King Topologies for Interconnection Networks Abstract? In the late years many different interconnection networks have been used with two main tendencies. One is characterized by the use of high- degree routers with long wires while the other uses routers of much smaller degree. The latter rely on two- dimensional mesh and…
Asthma Pattern Identification via Continuous Diaphragm Motion Monitoring Abstract? Ultrasound imaging has been widely used in bio-medical imaging diagnosis for a long history because of its merits: no radiation, high penetration depth, and real-time imaging capability. In this paper, we propose an ultrasound-based system that monitors respiratory status of asthma subjects via detecting of diaphragm…