The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-5 Published (Acceptance Ratio=27.27%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-1 Issue-4 (August 2013)
    Title: Video Summarization and Classification Preserving Dynamic Content 
    Authors: Channaveer Patil, Gouri Patil and Durgesh Shastri
    Abstract: In recent years, digital video is rapidly becoming important for education, entertainment, and a host of multimedia applications. With the increasing size of video collections, technology is needed to effectively browse a video in a short time without losing any important contents. This work attempts to classify and tag videos based on the content of the video. For instance if a video comprises of several scenes out of which few scenes are from news and few are from sports then while playing the video, the system should display the type of the scene being played. This will be done by first manually tagging set of video frames by user as knowledge base and matching the played video features with the knowledge based using support vector machine. The project will deliver a Tagged video. This will basically be a video with appropriate XML Meta data. When the video is played, Meta data is extracted and tag of the frames is identified. These tags are overlaid over the present video. Firstly we store different videos in our video library. Training module loads one video at a time, extracts frames. It compares one frame with the previous one and detects motion. Frames with significant motion differences are separated as key frame. RGB and HSV components from the frames are extracted using CBVR [Content Based Video Retrieval] technique and their mean and standard deviation is separated as statistics. Audio of the frame is extracted and segmented based on key frame occurrence. FFT is applied on audio with normalized 1024 points. Audio and video features are combined to get a feature vector representing a frame. User tags the frame suitably. Now user inputs a Video for playing. Frame is extracted from the video and motion detection is run. Key frame is extracted and Audio is segmented .Audio and Video Features are also extracted. Now these Features are classified against the knowledge base using Decision Support System like SVM Classifiers. Appropriate Tag is overlaid over the video.
    Click Here to Download Pdf
    Title: Classification and Retrieval of Web Information based on semantic hierarchical -approach using focused web crawlers
    Authors: Anjit Raja R. and Sundareswaran P.
    Abstract: This paper proposes a conceptual framework for organizing and classifying the web based informations. The efficiency of the proposed concepts is demonstrated with the help of Classification experiments. Classification experiments reveal that the DSL technique of training works efficiently when categorization is based on keywords. One major problem that Topic-Focused Web Crawling faces is efficiency – visiting the relevant pages while visiting as few irrelevant pages as possible. This issue is addressed in this paper. We use example documents arranged taxonomically from within existing Web directories to create term based, fine-grained topic models from relatively small document sets. Lexical similarity is then used to judge the closeness of link features within visited pages to the terms within the topic model to visit the links expected to yield pages closest to the topic. The CPTR technique, on the other hand, shows very high accuracy; when the classification is based on the contents of the document. Both these techniques lend a semantic dimension to classification. The hierarchical interface for Document Retrieval enables retrieval of the target documents by gradually restricting the scope of search at each level of hierarchy. We use three types of text classifiers linear SVM, Naive Bayesian, and cosine Similarity to rate relevancy. The evaluation was inconclusive and the SVM performed slightly better than the other classifiers in our methods of crawling and Document Retrieval.
    Click Here to Download Pdf
    Title: Comparative Analysis of Different Scheduling Algorithm in WiMAX 
    Authors: Umakant Ahirwar and Deepak Bhatnagar
    Abstract:Worldwide Interoperability for Microwave Access (Wi-MAX) networks were expected to be the main Broadband Wireless Access(BWA) technology that provided several services such as data, voice, and video services including different classes of Quality of Services (QoS), which in turn were defined by IEEE 802.16 standard. Scheduling in WiMAX became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users; this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, we present a simulation study to measure the performance of several scheduling algorithms in WiMAX, which were Strict Priority algorithm, Round-Robin (RR), Weighted Round Robin (WRR), Weighted Fair Queuing (WFQ Algorithm).]
    Click Here to Download Pdf
    Title: Network Optimization using Genetic Algorithms 
    Authors: Atul Ghalyan, Ram Kumar and Dr. Munish Gandhi
    Abstract:Modern day communication including mobile and computer networks works intelligently. Different methods have been devised from time to time to make them more responsive, workable, and above all intelligent. Genetic Algorithms is one of them to improve the network based on evolutionary principle ‘Survival of the fittest’. Finding the solution to different problems is still a major task in computer science while some are polynomial, and still some are computationally unsolvable. In this paper we tried to select the optimal solution from available feasible solution on distance between different nodes of a network based on distance and congestion.
    Click Here to Download Pdf
    Title: Wireless Security (Analyze and Compare of Security Architecture) 
    Authors: Mini Chitra
    Abstract:Wireless Security provides a secure transfer of information over a distance without the use of electrical conductors or wires. In this chapter we have to deal the analyse and compare of various security architecture of mobile broadband technologies used in wireless security, that involves Wi-Fi, UMTs, WiMAX and FLASH-OFDM.
    Click Here to Download Pdf

    QR Code

    IJMCS