Notice Board: Call for Paper Vol. 8 Issue 10      Submission Start Date: September 30, 2021      Acceptence Notification Start: October 12, 2021      Submission End: October 18, 2021      Final MenuScript Due: October 22, 2021      Publication Date: October 31, 2021






Volume 2 Issue 1

Author Name
Rahul Gupta , Sandhya Gawhade , L. K. Vishwamitra
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 1
Abstract
The software quality faced a major problem of software bugs and error estimation. For the estimation of error and bugs used various data mining technique. In the series of data mining technique used clustering and classification technique. In this paper presents a survey of software quality analysis using clustering technique. Software is of high quality and highly reliable if it is error-free. Software is error-free if there is no bug present in it or it is free from bugs. Bugs are very hard to find. Software Engineering tasks are Programming, Testing, Bug Detection, Debugging and Maintenance. Data Mining Techniques are applied on software engineering tasks. Data mining techniques are used to mine software engineering data and extract the meaningful and useful information. Techniques used for mining software engineering data are matching, clustering, classification etc.
PaperID
2015/01/IJMERT/01/101

Author Name
SHIVAM KAUSHAL, LK VISHWAMITRA
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 1
Abstract
Image enhancement is an important task in image processing, use of wavelet transform improves the quality of an image and reduces distortion level. Image enhancement is an important step for any complicated algorithms, in computer vision and image processing. Denoising is necessary and the initial step to be taken prior to the image data is analyzed. It is essential to apply an efficient enhancement technique, to compensate such data corruption. The effort of image enhancement is to improve an image that is cleaner than its distortion observation. In this paper we proposed a hybrid method for image enhancement for improvement of image analysis. The process of raw image gets the high component value of noise in environment. For the reduction of these noise used wavelet domain method. The wavelet method is well recognized method for voice noise reduction. In wavelet method the local noise component value are not considered. Then after the enhancement process noise are still remain in raw
PaperID
2015/01/IJMERT/01/102

Author Name
BHUSHAN PAWAR, RAJENDRA PATEL
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 1
Abstract
Traffic vehicle classification is important role in transportation and security surveillance in current scenario of huge traffic in roadways transportation. Due to rapid change of feature content of traffic motor are major issues in classification. The traffic image classification is improved by various authors using different model of classifier. The efficiency of classifier model depends on feature extraction process of traffic image. For the feature extraction process various authors used a different technique such as Gabor feature extraction, histogram and many more method on extraction process for classification. In this paper we used Gabor feature extraction. Cascading technique improved the efficiency of classifier in multiple stages. In this proposed cascaded classifier for traffic image classification. Experimental result shows better result in compression of support vector machine technique.
PaperID
2015/01/IJMERT/01/103

Author Name
AKHAND PRATAP SINGH, SUNIL GUPTA
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 1
Abstract
Computer networks are use in communication between any two computer. It help to freedom to save our time and time and freedom to do any work with distributed environment. An Administrator always to check to either his system is secure or not. For this purpose we use vulnerability scanner, a vulnerability scanner find out any weakness on any computer. This may harm our computers or steal our important data. To ensure varieties of scanner tools are available in now a days. From the testing and information gathering it makes conclusions and reports the vulnerabilities it found in the network. If the scanner misses some vulnerabilities and the administrator of the network makes the conclusion that the network is secure enough the impact can be severe on the organisation or company. This paper is trying to find out to what extent a vulnerability scanner can be trust. The purpose of this is to provide an overview of the application of penetration testing to secure systems administration. As
PaperID
2015/01/IJMERT/01/104



Notice Board :

Call for Paper
Vol. 8 Issue 10

Submission Start Date:
September 30, 2021

Acceptence Notification Start:
October 12, 2021

Submission End:
October 18, 2021

Final MenuScript Due:
October 22, 2021

Publication Date:
October 31, 2021