ESWAR出版社
期刊
会议
图书
作者:Supriya Gupta , Dr. Lalitsen Sharma
来源:[J].International Journal of Advanced Networking and Applications, 2010, Vol.1 (5)ESWAR出版社
摘要:Most of the applications now -a-days are developed web based. The applications of public access are highly exposed to security threats. The increasing number of web based attacks which result in loss of data and unauthorized access to application has drawn the attention of o...
作者:Niky Baruah , Arun Kumar Baruah
来源:[J].International Journal of Advanced Networking and Applications, 2012, Vol.3 (4)ESWAR出版社
摘要:A traffic control problem at an intersection can be efficiently modeled as a graph. Cut-set of a graph can be used to study the most efficient route or the traffic control system to direct the traffic flow to its maximum capacity using the minimum number of edges. Let G = (V, E) ...
作者:D.Asha Devi , M.Suresh Babu , V.L.Pavani ...
来源:[J].International Journal of Advanced Networking and Applications, 2009, Vol.1 (1)ESWAR出版社
摘要:Ubiquitous and pervasive computing (UPC) is a popular paradigm whose purpose is to emerge computers into the real world, to serve humans where the ubiquitous network is the underneath infrastructure. In order to provide ubiquitous services (u-Service) which deliver useful informa...
作者:Neeraj Prakash Srivastava , Dr R. K. Srivastava
来源:[J].International Journal of Advanced Networking and Applications, 2014, Vol.5 (6)ESWAR出版社
摘要:We present in this paper as an introduction to soft computing techniques for fault tolerant systems and the terminology with different ways of achieving fault tolerance. The paper focuses on the problem of fault tolerance using soft computing techniques. The fundamentals of soft ...
作者:J.Ashok , P.Satish , Y.Raju
来源:[J].International Journal of Advanced Networking and Applications, 2010, Vol.2 (1)ESWAR出版社
摘要:Several multi-pass algorithms have been proposed for Association Rule Mining from static repositories. However, such algorithms are incapable of online processing of transaction streams. In this paper we introduce an efficient single-pass algorithm for mining association rules, g...
作者:A.P.Nirmala , Dr. R. Sridaran
来源:[J].International Journal of Advanced Networking and Applications, 2012, Vol.3 (6)ESWAR出版社
摘要:Cloud Computing is an emerging paradigm in the advanced network arena that facilitates the users to access shared computing resources through internet-on-demand. Cloud Computing has been widely used since it brings tremendous improvements in business. Cloud users are expected to ...
作者:B.Santhosh Kumar , K.V.Rukmani
来源:[J].International Journal of Advanced Networking and Applications, 2010, Vol.1 (6)ESWAR出版社
摘要:Web Usage Mining is the application of data mining techniques to discover interesting usage patterns from Web data, in order to understand and better serve the needs of Web-based applications. Usage data captures the identity or origin of Web users along with their browsing behav...
作者:S.V.S. GANGA DEVI
来源:[J].International Journal of Advanced Networking and Applications, 2013, Vol.5 (3)ESWAR出版社
摘要:Fuzzy Decision Trees (FDT’s) are one of the most popular choices for learning and reasoning from dataset. They have undergone a number of alterations to language and measurement uncertainties. However, they are poor in classification accuracy. In this paper, Neuro -fuzzy dec...
作者:J.ASHOK , DR.E.G.RAJAN
来源:[J].International Journal of Advanced Networking and Applications, 2011, Vol.2 (4)ESWAR出版社
摘要:Handwriting has continued to persist as a means of communication and recording information in day-to-day life even with the introduction of new technologies. Given its ubiquity in human transactions, machine recognition of handwriting has practical significance, as in reading han...
作者:A.R.Rishivarman , B.Parthasarathy , M.Thiagarajan
来源:[J].International Journal of Advanced Networking and Applications, 2010, Vol.1 (5)ESWAR出版社
摘要:Elliptic curve calculation was not introduced to cryptography until 1985. Compared with RSA, the advantage of elliptic curve cryptography lies in its ensuring the same security while the length of key of elliptic curve cryptography is much less than RSA cryptography and its lesse...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×