Notice Board :





Volume VI Issue IV

Author Name
A L D Cerain, Armour
Year Of Publication
2014
Volume and Issue
Volume 6 Issue 4
Abstract
A new algorithm based on neural networks for solving sorting problems is presented in this paper. The proposed algorithm uses O(n2) processing elements called binary neuron where n is the unsorted elements. It requires two and only two steps, while the conventional parallel sorting algorithm using O(n) processors proposed by Leighton needs the computation time O(1og n) [ 13. A set of simulation results substantiates the proposed algorithm. The hardware system based on the proposed parallel algorithm is also presented in this paper.
PaperID
2014/EUSRM/4/2014/7498

Author Name
P S Moreno
Year Of Publication
2014
Volume and Issue
Volume 6 Issue 4
Abstract
First the paper introduces the concept of a "graduate certification" that has been in place for nearly five years at Rensselaer At Hartford. Graduate certificate programs have a selective focus and require that a student successfully complete four graduate-level courses in a specij-ic area. The specific course curriculumfor the Computer Network Communications certificate is presented. Although the certificate is limited to just four graduate courses, we believe that the "content" includes a fair balance of traditional and innovative computer networking courses. The paper identifies the objectives of each course. Our intent is to provide solid graduate education - with an eye on diversity in computer network solutions. The program is not tied to any vendor specijk solutions; rather the students are asked to use their fundamental knowledge of networking to evaluate several choices. The paper looks at the evolution of the computer network communications certificate. Feedb
PaperID
2014/EUSRM/4/2014/7515

Author Name
T Ankleshwaria, J S Dhobi
Year Of Publication
2014
Volume and Issue
Volume 6 Issue 4
Abstract
Today as we are living in the era of information explosion, it has become very important to find out useful information from large massive data. Also advances in internet, communication and hardware technology has lead to an increase in the capability of storing personal data of individuals. Massive amount of data streams are generated from different applications like medical, shopping record, network traffic, etc. Sharing such data is very important asset to business decision making but the fear is that once the personal data is leaked it can be misused for a variety of purposes. Hence some amount of privacy preserving needs to be done on the data before it is released to others. Traditional methods of privacy preserving data mining (PPDM) are designed for static data sets which makes it unsuitable for dynamic data streams. In this paper an efficient and effective data perturbation method is proposed that aims to protect privacy of sensitive attribute and obtaining data
PaperID
2014/EUSRM/4/2014/7538

Author Name
S C Weerasinghe
Year Of Publication
2014
Volume and Issue
Volume 6 Issue 4
Abstract
Mail spam is one of the major menace for the internet. To stop spam filtering is required in this paper we give an overview of MLA(Machine Level Application) for spam filtering and evaluation and comparison of different filtering methods and also discuss the use of various approaches in commercial and noncommercial anti-spam software solutions.
PaperID
2014/EUSRM/4/2014/7559