Este documento parece ser um contrato ou protocolo de mudança, identificado por um número de contrato e protocolo de mudança. Fornece detalhes sobre um acordo entre partes relacionado a um contrato ou mudança contratual.
The document provides instructions for making bread in 7 steps: mixing and kneading the dough, doing an initial fermentation, kneading again and letting it rest, a second fermentation, baking the bread in the oven at 230C and lowering to 200C, and finally cooling the bread completely before slicing. Key steps include mixing flour, yeast, salt and water; kneading the dough for 15-20 minutes until smooth; and letting the dough rise until doubled in size before shaping and baking the loaf.
Software Architecture Evaluation of Unmanned Aerial Vehicles Fuzzy Based Cont...Editor IJCATR
In this survey paper we discuss the recent techniques for software architecture evaluation methods for Unmanned Aerial
Vehicle (UAV) systems that use fuzzy control methodology. We discuss the current methodologies and evaluation approaches,
identify their limitations, and discuss the open research issues. These issues include methods used to evaluate the level of risk,
communications latency, availability, sensor performance, automation, and human interaction.
Location Provider with Privacy Using Localized Server and GPS Editor IJCATR
Maps are an essential part of any handheld device and use constantly used for navigation and other resources by application for providing location based data which can be used for customized examination outcomes, however these data are conservatively stowed on a L.B.S Server which are susceptible to attacks and misuse as these data’s are not usually have any significant security so these data’s can be sold or misused by some other parties. We try to eliminate the problem as well as provided added functionality to the conventional maps by providing a customizable map which has the added functionality of offline use mode in addition to the online mode
Este documento presenta un plan de estudios de 3 semanas para un libro, asignando lecturas de capítulos específicos y quices para cada semana, así como preguntas adicionales y lecturas complementarias opcionales.
A Review on Comparison of the Geographic Routing Protocols in MANETEditor IJCATR
In Mobile ad-hoc networks (MANET) with high number of nodes and high mobility the routing of packets is a difficult task. In this
paper, we are reviewing different geographic routing protocols as geographic routing are efficient for highly mobile nodes and made the
communication scalable. Different protocols compared are The Distance Routing Effect Algorithm (DREAM), Location Aided Routing (LAR)
Calculation, Greedy Perimeter Stateless Routing(GPSR) as of late new convention comes which is exceedingly proficient is the Adaptive position
update (APU) strategy and further the improved APU strategy and on the basis of performance metrics the protocols are compared and reveals that
the Improved APU strategy gives the high packet delivery ratio, lower delay and low energy consumption
Strategic Management of Intellectual Property: R&D Investment Appraisal Using...Editor IJCATR
Company executives are under increasing pressure to proactively evaluate the benefits of the huge amounts of
investment into intellectual property (IP). The main goal of this paper is to propose a Dynamic Bayesian Network
as a tool for modeling the forecast of the distribution of Research and Development (R&D) investment efficiency
towards the strategic management of IP. Dynamic Bayesian Network provides a framework for handling the
uncertainties and impression in the qualitative and quantitative data that impact the effectiveness and efficiency
of investments on R&D. This paper specifies the process of creating the graphical representation using impactful
variables, specifying numerical link between the variables and drawing inference from the network
This document lists various foods including cereals, biscuits, bread, cake, rice, toast, macaroni, spaghetti, pizza, sandwich, and popcorn. Flour is also mentioned.
The document provides instructions for making bread in 7 steps: mixing and kneading the dough, doing an initial fermentation, kneading again and letting it rest, a second fermentation, baking the bread in the oven at 230C and lowering to 200C, and finally cooling the bread completely before slicing. Key steps include mixing flour, yeast, salt and water; kneading the dough for 15-20 minutes until smooth; and letting the dough rise until doubled in size before shaping and baking the loaf.
Software Architecture Evaluation of Unmanned Aerial Vehicles Fuzzy Based Cont...Editor IJCATR
In this survey paper we discuss the recent techniques for software architecture evaluation methods for Unmanned Aerial
Vehicle (UAV) systems that use fuzzy control methodology. We discuss the current methodologies and evaluation approaches,
identify their limitations, and discuss the open research issues. These issues include methods used to evaluate the level of risk,
communications latency, availability, sensor performance, automation, and human interaction.
Location Provider with Privacy Using Localized Server and GPS Editor IJCATR
Maps are an essential part of any handheld device and use constantly used for navigation and other resources by application for providing location based data which can be used for customized examination outcomes, however these data are conservatively stowed on a L.B.S Server which are susceptible to attacks and misuse as these data’s are not usually have any significant security so these data’s can be sold or misused by some other parties. We try to eliminate the problem as well as provided added functionality to the conventional maps by providing a customizable map which has the added functionality of offline use mode in addition to the online mode
Este documento presenta un plan de estudios de 3 semanas para un libro, asignando lecturas de capítulos específicos y quices para cada semana, así como preguntas adicionales y lecturas complementarias opcionales.
A Review on Comparison of the Geographic Routing Protocols in MANETEditor IJCATR
In Mobile ad-hoc networks (MANET) with high number of nodes and high mobility the routing of packets is a difficult task. In this
paper, we are reviewing different geographic routing protocols as geographic routing are efficient for highly mobile nodes and made the
communication scalable. Different protocols compared are The Distance Routing Effect Algorithm (DREAM), Location Aided Routing (LAR)
Calculation, Greedy Perimeter Stateless Routing(GPSR) as of late new convention comes which is exceedingly proficient is the Adaptive position
update (APU) strategy and further the improved APU strategy and on the basis of performance metrics the protocols are compared and reveals that
the Improved APU strategy gives the high packet delivery ratio, lower delay and low energy consumption
Strategic Management of Intellectual Property: R&D Investment Appraisal Using...Editor IJCATR
Company executives are under increasing pressure to proactively evaluate the benefits of the huge amounts of
investment into intellectual property (IP). The main goal of this paper is to propose a Dynamic Bayesian Network
as a tool for modeling the forecast of the distribution of Research and Development (R&D) investment efficiency
towards the strategic management of IP. Dynamic Bayesian Network provides a framework for handling the
uncertainties and impression in the qualitative and quantitative data that impact the effectiveness and efficiency
of investments on R&D. This paper specifies the process of creating the graphical representation using impactful
variables, specifying numerical link between the variables and drawing inference from the network
This document lists various foods including cereals, biscuits, bread, cake, rice, toast, macaroni, spaghetti, pizza, sandwich, and popcorn. Flour is also mentioned.
Knowledge Management in the Cloud: Benefits and RisksEditor IJCATR
The success of organizations largely depends on continual investment in learning and acquiring new knowledge that creates
new businesses and improve existing performance. So, using Knowledge management must result in better achieving, or even
exceeding, organizations objectives. The purpose of knowledge management must not be to just become more knowledgeable, but to
be able to create, transfer and apply knowledge with the purpose of better achieving objectives. As new technologies and paradigms
emerge, businesses have to make new efforts to properly get aligned with them, especially in knowledge management area. Today the
Cloud Computing paradigm is becoming more and more popular, due to the vast decrease in time, cost and effort for meeting software
development needs. It also provides a great means for gathering and redistributing knowledge. In this paper, we will discuss the
benefits and risks of using cloud computing in knowledge management systems.
Intrusion Detection System Using Self Organizing Map AlgorithmsEditor IJCATR
With the rapid expansion of computer usage and computer network the security of the computer system has became very
important. Every day new kind of attacks are being faced by industries. Many methods have been proposed for the development of
intrusion detection system using artificial intelligence technique. In this paper we will have a look at an algorithm based on neural
networks that are suitable for Intrusion Detection Systems (IDS). The name of this algorithm is "Self Organizing Maps" (SOM). So
far, many different methods have been used to build a detector that Wide variety of different ways in the covers. Among the methods
used to detect attacks in intrusion detection is done, In this paper we investigate the Self-Organizing Map method.
A support organization called Triangle Amputee Support provides assistance to amputees. The group likely offers peer support and resources to help individuals cope with limb loss and navigate daily challenges. Triangle Amputee Support appears dedicated to improving the lives and independence of amputees in the local community.
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...Editor IJCATR
Processing packets across Mobile Ad hoc Network, Topology control minimize interference among node in a network, increase the network capacity and extend lifetime of the network. Emerging research in mobile ad hoc networks (MANETs) says, there is a growing requirement of quality of service (QoS) in terms of delay. In order to resolve the delay problem, it is essential to consider topology control in delay constrained environment with energy efficient. In this paper, we discuss reduced delay and minimum distributed topology control algorithm for mobile ad hoc networks. In this proposed system, we study on the delay-constrained topology control problem, and take into account delay and energy efficiency. Simulation results are presented demonstrating the effectiveness of this new technique as compared to other approaches to topology control.
A web-based working memory (WM) test system is a management system website that allows students to test their ability
and skills in remembering visual patterns. It also enables you to record and store the data for individuals. The system is developed
using HTML, PHP and MySQL as a database system to manage and store the data. The system targets several users: children and
adults who suffer from attention deficit or learning problems. The main objectives for developing the website are to educate the
community on the benefits of performing the working memory test of the activity of the brain and improvements in social skills and improving poor academic and professional performance, especially in maths and reading comprehension. This study implements a set of tasks, testing 59 adults aged 18-24 years of age at King Abdul-Aziz University for testing and measuring WM and cognitive
abilities. Results showed tests depended on the age entry by the user. The implications of the test results will help people know their WM level before ascertaining the appropriate suggestions, and to make the test suit our society.
The document outlines the daily schedule and activities for a pre-K class during the first week of school from August 24-28, 2009. Each day includes greetings, breakfast, morning meeting, bathroom breaks, outdoor time, lunch, story time, quiet time, guided discovery activities, and dismissal. The schedule introduces the children to classroom routines and rules while providing time for socialization, learning names, basic academic concepts like counting and patterns, guided play with materials, and outdoor physical activities.
Enhanced Detection System for Trust Aware P2P Communication NetworksEditor IJCATR
Botnet is a number of computers that have been set up to forward transmissions to other computers unknowingly to the user
of the system and it is most significant to detect the botnets. However, peer-to-peer (P2P) structured botnets are very difficult to detect
because, it doesn’t have any centralized server. In this paper, we deliver an infrastructure of P2P that will improve the trust of the peers
and its data. In order to identify the botnets we provide a technique called data provenance integrity. It will ensure the correct origin or
source of information and prevents opponents from using host resources. A reputation based trust model is used for selecting the
trusted peer. In this model, each peer has a reputation value which is calculated based on its past activity. Here a hash table is used for
efficient file searching and data stored in it is based on the reputation value.
Pozuel del Campo is a village located in northwest Teruel, Aragon, Spain, near the border of Guadalajara province. It has approximately 107 residents and sits at 1,128 meters above sea level. The village contains the 18th century Church of San Miguel, the 18th century Santo Domingo de Silos hermitage, and a 20th century Carmen hermitage. Major festivals are held in the village during the second week of August and September 29th in honor of San Miguel.
Duplicate Code Detection using Control StatementsEditor IJCATR
Code clone detection is an important area of research as reusability is a key factor in software evolution. Duplicate code
degrades the design and structure of software and software qualities like readability, changeability, maintainability. Code clone
increases the maintenance cost as incorrect changes in copied code may lead to more errors. In this paper we address structural code
similarity detection and propose new methods to detect structural clones using structure of control statements. By structure we mean
order of control statements used in the source code. We have considered two orders of control structures: (i) Sequence of control
statements as it appears (ii) Execution flow of control statements.
Photo-oxygenation of trans anethole (1), the main constituent of anise essential oil, using tetraphenylporphyrine (TPP) as a singlet oxygen sensitizer in chloroform gave 4-methoxybenzaldehyde (p-anisaldhyde) (2), 2-(4-methoxyphenyl)propan-2-ol (3) as well as erythro and threo 1-(4-methoxyphenyl)propane-1,2-diol (4a, 4b). The structures of the photo-oxygenation products were elucidated by spectral means.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Editor IJCATR
This document summarizes a research paper on a complexity-reduced antenna selection technique for MIMO systems to achieve high channel capacity. The technique aims to select a subset of antennas to use for transmission in order to reduce the number of required RF modules and associated costs, compared to using all antennas. It proposes a suboptimal selection method that incrementally selects antennas to maximize channel capacity, starting with the antenna that offers the highest capacity. Simulation results show that channel capacity increases as more antennas are selected. The technique can help improve performance of MIMO systems while reducing implementation costs compared to using all transmit antennas.
Security improvements Zone Routing Protocol in Mobile Ad Hoc NetworkEditor IJCATR
This document summarizes a research paper that analyzes improvements to the Zone Routing Protocol (ZRP) for secure routing in mobile ad hoc networks. ZRP is a hybrid routing protocol that uses proactive routing within zones and reactive routing between zones. The paper reviews a previous protocol called Secure ZRP Protocol 1 (SZRP1) that adds security features like public key certification, digital signatures, and secure neighbor discovery to ZRP. It also describes the simulation environment and performance metrics like packet delivery fraction and routing overhead that were used to evaluate SZRP1 compared to the original ZRP protocol.
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
Generally, the botnet is one of the most dangerous threats in the network. It has number attackers in the network. The
attacker consists of DDOS attack, remote attack, etc., Bots perform perform repetitive tasks automatically or on a schedule over the
internet, tasks that would be too mundane or time-consuming for an actual person. But the botnets have stealthy behavior as they are
very difficult to identify. These botnets have to be identified and the internet have to be protected. Also the the activity of botnets must
be prevented to provide the users, a reliable service. The past of botnet detection has a transaction process which is not secure. A
efficient stastical data classifier is required to train the botent preventions system. To provide the above features clustering based
analysis is done. our approach can detect and profile various P2P applications rather than identifying a specific P2P application.
Anomaly based detection technique is used to obtain this goal.
A Novel Document Image Binarization For Optical Character RecognitionEditor IJCATR
This paper presents a technique for document image binarization that segments the foreground text accurately from poorly
degraded document images. The proposed technique is based on the
Segmentation of text from poorly degraded document images and
it is a very demanding job due to the high variation between the background and the foreground of the document. This paper pr
oposes
a novel document image binarization technique that segments t
he texts by using adaptive image contrast. It is a combination of the
local image contrast and the local image gradient that is efficient to overcome variations in text and background caused by d
ifferent
types degradation effects. In the proposed technique
, first an adaptive contrast map is constructed for a degraded input document
image. The contrast map is then binarized by global thresholding and pooled with Canny’s edge map detection to identify the t
ext
stroke edge pixels. By applying Segmentation the
text is further segmented by a local thresholding method that. The proposed method
is simple, strong, and requires minimum parameter tuning
Knowledge Management in the Cloud: Benefits and RisksEditor IJCATR
The success of organizations largely depends on continual investment in learning and acquiring new knowledge that creates
new businesses and improve existing performance. So, using Knowledge management must result in better achieving, or even
exceeding, organizations objectives. The purpose of knowledge management must not be to just become more knowledgeable, but to
be able to create, transfer and apply knowledge with the purpose of better achieving objectives. As new technologies and paradigms
emerge, businesses have to make new efforts to properly get aligned with them, especially in knowledge management area. Today the
Cloud Computing paradigm is becoming more and more popular, due to the vast decrease in time, cost and effort for meeting software
development needs. It also provides a great means for gathering and redistributing knowledge. In this paper, we will discuss the
benefits and risks of using cloud computing in knowledge management systems.
Intrusion Detection System Using Self Organizing Map AlgorithmsEditor IJCATR
With the rapid expansion of computer usage and computer network the security of the computer system has became very
important. Every day new kind of attacks are being faced by industries. Many methods have been proposed for the development of
intrusion detection system using artificial intelligence technique. In this paper we will have a look at an algorithm based on neural
networks that are suitable for Intrusion Detection Systems (IDS). The name of this algorithm is "Self Organizing Maps" (SOM). So
far, many different methods have been used to build a detector that Wide variety of different ways in the covers. Among the methods
used to detect attacks in intrusion detection is done, In this paper we investigate the Self-Organizing Map method.
A support organization called Triangle Amputee Support provides assistance to amputees. The group likely offers peer support and resources to help individuals cope with limb loss and navigate daily challenges. Triangle Amputee Support appears dedicated to improving the lives and independence of amputees in the local community.
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...Editor IJCATR
Processing packets across Mobile Ad hoc Network, Topology control minimize interference among node in a network, increase the network capacity and extend lifetime of the network. Emerging research in mobile ad hoc networks (MANETs) says, there is a growing requirement of quality of service (QoS) in terms of delay. In order to resolve the delay problem, it is essential to consider topology control in delay constrained environment with energy efficient. In this paper, we discuss reduced delay and minimum distributed topology control algorithm for mobile ad hoc networks. In this proposed system, we study on the delay-constrained topology control problem, and take into account delay and energy efficiency. Simulation results are presented demonstrating the effectiveness of this new technique as compared to other approaches to topology control.
A web-based working memory (WM) test system is a management system website that allows students to test their ability
and skills in remembering visual patterns. It also enables you to record and store the data for individuals. The system is developed
using HTML, PHP and MySQL as a database system to manage and store the data. The system targets several users: children and
adults who suffer from attention deficit or learning problems. The main objectives for developing the website are to educate the
community on the benefits of performing the working memory test of the activity of the brain and improvements in social skills and improving poor academic and professional performance, especially in maths and reading comprehension. This study implements a set of tasks, testing 59 adults aged 18-24 years of age at King Abdul-Aziz University for testing and measuring WM and cognitive
abilities. Results showed tests depended on the age entry by the user. The implications of the test results will help people know their WM level before ascertaining the appropriate suggestions, and to make the test suit our society.
The document outlines the daily schedule and activities for a pre-K class during the first week of school from August 24-28, 2009. Each day includes greetings, breakfast, morning meeting, bathroom breaks, outdoor time, lunch, story time, quiet time, guided discovery activities, and dismissal. The schedule introduces the children to classroom routines and rules while providing time for socialization, learning names, basic academic concepts like counting and patterns, guided play with materials, and outdoor physical activities.
Enhanced Detection System for Trust Aware P2P Communication NetworksEditor IJCATR
Botnet is a number of computers that have been set up to forward transmissions to other computers unknowingly to the user
of the system and it is most significant to detect the botnets. However, peer-to-peer (P2P) structured botnets are very difficult to detect
because, it doesn’t have any centralized server. In this paper, we deliver an infrastructure of P2P that will improve the trust of the peers
and its data. In order to identify the botnets we provide a technique called data provenance integrity. It will ensure the correct origin or
source of information and prevents opponents from using host resources. A reputation based trust model is used for selecting the
trusted peer. In this model, each peer has a reputation value which is calculated based on its past activity. Here a hash table is used for
efficient file searching and data stored in it is based on the reputation value.
Pozuel del Campo is a village located in northwest Teruel, Aragon, Spain, near the border of Guadalajara province. It has approximately 107 residents and sits at 1,128 meters above sea level. The village contains the 18th century Church of San Miguel, the 18th century Santo Domingo de Silos hermitage, and a 20th century Carmen hermitage. Major festivals are held in the village during the second week of August and September 29th in honor of San Miguel.
Duplicate Code Detection using Control StatementsEditor IJCATR
Code clone detection is an important area of research as reusability is a key factor in software evolution. Duplicate code
degrades the design and structure of software and software qualities like readability, changeability, maintainability. Code clone
increases the maintenance cost as incorrect changes in copied code may lead to more errors. In this paper we address structural code
similarity detection and propose new methods to detect structural clones using structure of control statements. By structure we mean
order of control statements used in the source code. We have considered two orders of control structures: (i) Sequence of control
statements as it appears (ii) Execution flow of control statements.
Photo-oxygenation of trans anethole (1), the main constituent of anise essential oil, using tetraphenylporphyrine (TPP) as a singlet oxygen sensitizer in chloroform gave 4-methoxybenzaldehyde (p-anisaldhyde) (2), 2-(4-methoxyphenyl)propan-2-ol (3) as well as erythro and threo 1-(4-methoxyphenyl)propane-1,2-diol (4a, 4b). The structures of the photo-oxygenation products were elucidated by spectral means.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Editor IJCATR
This document summarizes a research paper on a complexity-reduced antenna selection technique for MIMO systems to achieve high channel capacity. The technique aims to select a subset of antennas to use for transmission in order to reduce the number of required RF modules and associated costs, compared to using all antennas. It proposes a suboptimal selection method that incrementally selects antennas to maximize channel capacity, starting with the antenna that offers the highest capacity. Simulation results show that channel capacity increases as more antennas are selected. The technique can help improve performance of MIMO systems while reducing implementation costs compared to using all transmit antennas.
Security improvements Zone Routing Protocol in Mobile Ad Hoc NetworkEditor IJCATR
This document summarizes a research paper that analyzes improvements to the Zone Routing Protocol (ZRP) for secure routing in mobile ad hoc networks. ZRP is a hybrid routing protocol that uses proactive routing within zones and reactive routing between zones. The paper reviews a previous protocol called Secure ZRP Protocol 1 (SZRP1) that adds security features like public key certification, digital signatures, and secure neighbor discovery to ZRP. It also describes the simulation environment and performance metrics like packet delivery fraction and routing overhead that were used to evaluate SZRP1 compared to the original ZRP protocol.
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
Generally, the botnet is one of the most dangerous threats in the network. It has number attackers in the network. The
attacker consists of DDOS attack, remote attack, etc., Bots perform perform repetitive tasks automatically or on a schedule over the
internet, tasks that would be too mundane or time-consuming for an actual person. But the botnets have stealthy behavior as they are
very difficult to identify. These botnets have to be identified and the internet have to be protected. Also the the activity of botnets must
be prevented to provide the users, a reliable service. The past of botnet detection has a transaction process which is not secure. A
efficient stastical data classifier is required to train the botent preventions system. To provide the above features clustering based
analysis is done. our approach can detect and profile various P2P applications rather than identifying a specific P2P application.
Anomaly based detection technique is used to obtain this goal.
A Novel Document Image Binarization For Optical Character RecognitionEditor IJCATR
This paper presents a technique for document image binarization that segments the foreground text accurately from poorly
degraded document images. The proposed technique is based on the
Segmentation of text from poorly degraded document images and
it is a very demanding job due to the high variation between the background and the foreground of the document. This paper pr
oposes
a novel document image binarization technique that segments t
he texts by using adaptive image contrast. It is a combination of the
local image contrast and the local image gradient that is efficient to overcome variations in text and background caused by d
ifferent
types degradation effects. In the proposed technique
, first an adaptive contrast map is constructed for a degraded input document
image. The contrast map is then binarized by global thresholding and pooled with Canny’s edge map detection to identify the t
ext
stroke edge pixels. By applying Segmentation the
text is further segmented by a local thresholding method that. The proposed method
is simple, strong, and requires minimum parameter tuning