[PDF][PDF] Query Bound Application Offloading: Approach Towards Increase Performance of Big Data Computing

NJR Salunkhe, J Naveen - J. Emerg. Technol. Innov. Res, 2016 - researchgate.net
An offloading framework is used to offload source code among server and it's clients. Source
code mainly distributed to I/O node and data node. The offloading mechanism assigns I/O …

[PDF][PDF] Pseudocode to source code translation

V Parekh, D Nilesh - Intl. J. Emerging Technologies and …, 2016 - researchgate.net
In the field of software engineering most programming languages have certain
idiosyncrasies. Due to this, beginner programmers or programmers who are learning a new …

An application of porters stemming algorithm for text mining in healthcare

AR Kulkarni, SD Mundhe - International Journal of Management …, 2019 - indianjournals.com
Text mining has diverse applications in variety of fields where manual analysis and
generating effective knowledge discovery from information is not possible because of huge …

[PDF][PDF] Security issues and challenges in cloud computing

M Dayalan, S Mohammad - SSRN Electronic Journal - researchgate.net
Cloud computing are the modern way of staring data and other important resources the
company wants to retrieve safely and conveniently. It offers an innovative way of investment …

Data mining technique applied to DNA sequencing

R Jamuna - International Journal in IT & Engineering, 2016 - indianjournals.com
CpG islands (CGIs) play a vital role in genome analysis as genomic markers. Identification of
the CpG pair has contributed not only to the prediction of promoters but also to the …

ICT in Education Sector and its Impacts

A Trehan, R Trehan - International Journal of Management, IT …, 2019 - indianjournals.com
A rapid evolution process is being observed worldwide in the need for information facilities
in the term of quantity, quality and access to information. The process of information and …

AI-Based Secure Wireless Communication Technologies and Cyber Threats for IoT Networks

U Haider, B Nawaal, IU Khan… - Cyber Security for Next …, 2024 - taylorfrancis.com
Artificial intelligence (AI) has proven to be the fate changer for this world. It has created a
huge potential for progress. All integrated technologies are moving toward automation and …

[PDF][PDF] Text analysis for author identification using machine learning

S Amidwar, S Baxi, K Rao, S Kale - Journal of Emerging …, 2017 - researchgate.net
This India is the home to thousands of languages due to its diversity and culture. Usually
while referring to literatures, we cannot make out whether we are referring to the original one …

[PDF][PDF] A Survey Paper on Facial Expression Recognition System

MB Patel, DL Agrawal - Journal of Emerging Technologies and …, 2016 - researchgate.net
Facial expression recognition has many potential applications which have attracted the
attention of researchers in the last d ecade. Feature extraction is one important step in …

Security and Intelligent Management: Survey

Z Abbas, AQ Shahzad, MY Ayub… - Cyber Security for Next …, 2024 - taylorfrancis.com
In the modern world, the concern of cyber security and privacy is in the limelight. Also,
technological advancement has led to an increase in complexity of interconnected systems …