Notice Board :

Call for Paper
Vol. 5 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 30, 2018

Publication Date:
June 04, 2018
                         Notice Board: Call for PaperVol. 5 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 30, 2018      Publication Date: June 04, 2018




Volume II Issue VII

Author Name
Deepti Gupta, Er. Jitendra Dangra
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 7
Abstract
Text Mining has become an important research area. Text mining is the process of extracting useful information or knowledge or patterns from the unstructured text .Automatic text mining is the discovery by computer of new, previously unknown information, by automatically extracting information from a usually large amount of different unstructured textual resources. Advantages of automatic text mining approach over the manual and semi-automatic approach are increases effectiveness and savings in terms of expert labour power, and straightforward portability to different domains. In this paper, a Survey of Automatic Text Mining techniques and applications and challenges in text mining have been presented.
PaperID
2015/IJTRM/7/2015/5459

Author Name
Tushar Mahale, Mr. Jitendra Dangra
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 7
Abstract
Cloud computing is a globalised concept and there are not any borders among the cloud. Computers used to process and store user knowledge may be settled any place on the world, depending on the supply of needed capacities within the international computer networks used for cloud computing. The information may be stored remotely within the cloud by the users and may be accessed using thin clients as and when needed. one of the main issue in cloud these days is Performance for outsourced storage is probably going to be lower than local storage and different major issue is knowledge security in cloud computing. Storage of data within the cloud may be risky because of use of internet by cloud primarily based services which suggests less management over the stored data. One amongst the main concern in cloud is however will we grab all the advantages of the cloud whereas maintaining quick accessing knowledge and security controls over the organizations assets.
PaperID
2015/IJTRM/7/2015/5468

Author Name
Rohit Rai, Prof. Ratnesh Dubey, Dr. Vineet Richhariya
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 7
Abstract
Digital image libraries and other multimedia databases have been dramatically expanded in recent years. Semantic gap that between the visual features and human semantics has become very important area of research known as content based image retrieval (CBIR). In order to effectively and precisely retrieve the desired images from a large image database, the development of a content-based image retrieval (CBIR) system has become an important research issue. The need for improving the retrieval accuracy of image retrieval systems and narrowing down the semantic gap is high in view of the fast growing need of image retrieval. In this paper we review, a user-oriented technique for CBIR method based on low level visual features and gravitational search algorithm (GSA). Before applying the visuality features we have divided the images into kxk blocks and a block wise comparison has been done.
PaperID
2015/IJTRM/7/2015/5480

Author Name
Shraddha Gupta, Dharmendra Sharma
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 7
Abstract
Ad hoc is wireless, in dependable infrastructure dynamic and self organize network create among different mobile host. Network generally exists in a Disaster recoveries, military activities emergency operation .Routing protocol have a major role in mobile network, which are affected from different attacks. Ad hoc on demand distance vector (AODV) routing protocol is suitable for routing protocol. Black hole attack is a serious hazard, in this attack a malicious node add spoof route and advertise shortest path to destination node and absorbs all data packet in it. In this paper, we have surveyed and compare the existing solution to black hole attack on AODV protocol and their demerit.
PaperID
2015/IJTRM/7/2015/5486