Voice conversion is a process of transforming the parameters of a source voice to those of a target voice. It…
Authentication is the most common and essential Service of Information Security. User authentication protocol plays a vital role in payment…
MapReduce is one among the famous processing model for huge scale information (Big Data) processing in distributed computing. Since there…
The Virtual Design Advisor (VDA) has addressed the problem of optimizing the performance of Database Management System (DBMS) instances running…
The purpose of this paper is to present an efficient technique for the adjustment of the transmissibility of a SDOF…
Context representation and maximize power efficiency in mobile sensing applications require continuous data achievement and construal on more mobile sensor…
In wireless ad hoc network packets are loosed due to two conditions one is due to the disturbance in the…
Resist intruders and security related issue we must able to detects the intruder’s image. In this scenario set of images…
Resource discovery is a fundamental problem ingrid systems. A P2P network is a distributed system with the attributes of dynamicity…
Social networks hosted by a website are graphs of people where edges connect friends. Friendship represents shared interest or trust.…