Performance Comparison of Different Sorting Algorithms

Performance Comparison of Different Sorting Algorithms Abstract— Sorting is the basic operation in most of the applications of computer science. Sorting means to arrange data in particular order inside computer. In this paper we have discussed performance of different sorting algorithms with their advantages and disadvantages. This paper also represents the application areas for different sorting algorithms. Main goal of this paper is to compare the […]

Read Me

Security Analysis of OpenStack Keystone

Security Analysis of OpenStack Keystone Abstract – OpenStack is one of the most used cloud management software today. OpenStack is a free and open-source software platform for cloud computing, mostly deployed as an infrastructure-as-a-service (IaaS). We have selected OpenStack as one of the underlying infrastructure service layer tool because OpenStack allows us to modify our cloud to fit into custom infrastructures that may be necessary […]

Read Me

Providing Banking Loan to Customers Based on J48 Classifier Algorithm Combined with Neural Networks

Providing Banking Loan to Customers Based on J48 Classifier Algorithm Combined with Neural  Networks Abstract: Data mining is the transformation of large sizes of information into expressive patterns and rules. It is approximately describing the former and calculating the near future by means of information analysis. Data mining is really a multi-disciplinary area which combines, equipment understanding, data, database engineering and synthetic intelligence. The full […]

Read Me

Security Estimation Model: Fault Perspective

Security Estimation Model: Fault Perspective Abstract- The issue of security is essential for secure software. Measuring security of software system at design phase may help software developers to improve the security of software system. A security estimation model for object oriented design fault perspective has been developed in this paper. The proposed model correlates the Object Oriented Design constructs with Fault and Security. The security […]

Read Me

PAPR Reduction using DFT Spreading with FEC for OFDM Systems

PAPR Reduction using DFT Spreading with FEC for OFDM Systems Abstract: The next generation of mobile communication is based on OFDM technology. It is an efficient method of data transmission for high speed communication system. Orthogonal frequency division multiplexing (OFDM) systems have been proposed in the recent past years for providing high spectral efficiency, less vulnerability to echoes, low implementation complexity and resistance to non linear […]

Read Me

Twitter Text Objectionable Content Detection using Domain Based Probability and Correlation Model

Twitter Text Objectionable Content Detection using Domain Based Probability and Correlation Model Abstract— Text mining technique is used to detect the required patterns from the text documents. The nature of text document is an unstructured format where the data is represented in an unstructured manner. The text mining can be used for information retrieval, information extraction, search, classification, and categorization. In this context, an application of […]

Read Me

A Novel Hybrid Method for Generating Association Rules for Stock Market Data

A Novel Hybrid Method for Generating Association Rules for Stock Market Data Abstract – The aim of the current research is to extract the knowledge from stock market data to help investors make more profit. We have used NSE (National Stock Exchange) historical data for six years. We have also pre-processed stock market data. We have used hybrid method which consists of two widely used algorithms […]

Read Me

Empowering Educational Institutes Using Data Warehouse

Empowering Educational Institutes Using Data Warehouse. Abstract-The need to access data is a very common requirement now a days, be it a non-profit organization or full-fledged business organization. Decision makers have always needed data to make informed and accurate decisions. Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouse can provide the […]

Read Me

An Investigation on Mobility Influence on MAC Protocols of Wireless Sensor Networks

An Investigation on Mobility Influence on MAC Protocols of Wireless Sensor Networks Abstract— The collection of sensor nodes, which form a dynamic and arbitrary network by connecting on a wireless medium is called wireless sensor networks. This definition implicitly describes that links may appear or disappear at any time because of node mobility & other factors. The communication is completely dependent on the nodes (source […]

Read Me

Recent Developments and Reviews in Sentimental Analysis for Big Data

Recent Developments and Reviews in Sentimental Analysis for Big Data Abstract- with the increasing need for understanding customer behavior and need for better buyer-seller relationships more than ever sentiment analysis has become one of the major tool in today’s time. The growing data and the need for faster computation efficient and more reliable processes of SA (sentiment analysis) are preferred and are in great demand.SA […]

Read Me