Applications of graph theory in computer science an overview Abstract?AbstractThe field of mathematics plays vital role in various fields. One of the important areas in mathematics is graph theory which is used in structural models. This structural arrangements of various objects or technologies lead to new inventions and modifications in the existing environment for enhancement…
Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile Devices Abstract?Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile Devices. The rapid proliferation of personal wearable as well as embedded devices point to the emergence of networks of unprecedented size and complexity in the near future. Unfortunately, traditional network…
Applying Network Coding to Peer-to-Peer File Sharing Abstract?Network coding is a promising enhancement of routing to improve network throughput and provide high reliability. It allows a node to generate output messages by encoding its received messages. Peer-to-peer networks are a perfect place to apply network coding due to two reasons: the topology of a peer-to-peer…
Applying Network Coding to Peer-to-Peer File Sharing Abstract? Applying Network Coding to Peer-to-Peer File Sharing. Network coding is a promising enhancement of routing to improve network throughput and provide high reliability. It allows a node to generate output messages by encoding its received messages. Peer-to-peer networks area perfect place to apply network coding due to…
Applying Network Coding to Peer?to-Peer File Sharing Abstract?Network coding is a promising enhancement of routing to improve network throughput and provide high reliability. It allows a node to generate output messages by encoding its received messages. Peer-to-peer networks are a perfect place to apply network coding due to two reasons: the topology of a…
Applying ontology using patrol intrusion detection system for wireless sensor network Abstract?A wireless sensor network (WSN) typically consists of a large number of resource constrained sensor nodes. Wireless sensor networks are developed for deployment at locations without infrastructure support which may provide a solution to many applications. < Final Year Projects > WSNs are…
Approximate DCT Image Compression using Inexact Computing Abstract-This paper proposes a new framework for digital image processing; it relies on inexact computing to address some of the challenges associated with the discrete cosine transform (DCT) compression. The proposed framework has three levels of processing; the first level uses approximate DCT for image compressing to eliminate…
Approximate Radix-8 Booth Multipliers for Low-Power and High-Performance Operation Abstract?The Booth multiplier has been widely used for high performance signed multiplication by encoding and thereby reducing the number of partial products. A multiplier using the radix-4 (or modified Booth) algorithm is very efficient due to the ease of partial product generation, whereas the radix-8 Booth…
Approximate String Matching Algorithms: A Brief Survey and Comparison/strong> Abstract?Abstract Many database applications require similarity based retrieval on stored text and/or multimedia objects. This is an area of increasing research interest in the sectors of database, data mining, information retrieval and knowledge discovery. This paper presents a brief survey on the existing approximate string matching…
AppShell: Making Data Protection Practical for Lost or Stolen Android Devices Abstract? In this android application is based on application manager to manage the sensitive private application like (Facebook, what Sapp, twitter, etc.,). This application is a collection of applications for manage the security and privacy of that sensitive application. This application has one password…
Apriori Versions Based on MapReduce for Mining Frequent Patterns on Big Data Abstract– Pattern mining is one of the most important tasks to extract meaningful and useful information from raw data. This task aims to extract item-sets that represent any type of homogeneity and regularity in data. Although many efficient algorithms have been developed in…
Arabic Text Categorization : a Comparative Study Of Different Representation Modes Abstract?The quantity of accessible information on Internet is phenomenal, and its categorization remains one of the most important problems. A lot of work is currently, focused on English rightly since; it s the dominant language of the web. However, a need arises for the…