Notice Board: Call for Paper Vol. 8 Issue 10      Submission Start Date: September 30, 2021      Acceptence Notification Start: October 12, 2021      Submission End: October 18, 2021      Final MenuScript Due: October 22, 2021      Publication Date: October 31, 2021






Volume 4 Issue 4

Author Name
Taskeen Mansoori, Pankaj Kawadkar
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 4
Abstract
Information order is an essential branch of information mining and there are distinctive techniques for its usage. Neural network are one of the most ideal courses for grouping in machine learning. Structure and weights of neural network are most critical in their exactness. As of late, because of the deformities in inclination based hunt algorithms in neural network preparing algorithms, meta-heuristic algorithms have been of enthusiasm for analysts. During the time spent preparing weights of a neural network, a particular engineering is normally utilized for the network with a settled number of concealed layers and settled number of neurons in every layer. In this way, overhauling the neural network structure prompts to an advancement issue. Result shows that the modified SOM algorithm shows better result in comparison of Kant’s algorithm. The exiting two algorithms not controlled the level weight of class and loss some data during the grouping of class. The modified S
PaperID
2017/04/IJMERT/4/218

Author Name
Krishna Chauhan, neha Shrivastava, Surendra Vishwakarma
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 4
Abstract
The growth of IT based enterprises for the forthcoming generation depends on cloud computing technology. The accessibility and manageability of cloud computing infrastructure managed large database and huge amount of server for the processing of data. The processing and storage of data faced a problem of data integrity during the process of data storage and data retrieval. For maintain a data integrity and data security cloud computing adopt the process of third party auditor (TPA). The third party auditor maintains the communication between cloud service provider and user. Users only interact with TPA and TPA provides the access privilege for user.Now a day’s various authors used the cryptography technique for the process of security and data integrity. The cryptography technique provides public and private cryptography technique for the processing of data.
PaperID
2017/04/IJMERT/4/219

Author Name
Suprgya Verma, Jay Mungi
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 4
Abstract
Recent empirical studies have shown clear evidence that wireless links are not independent and that the packet receptions on adjacent wireless links are correlated. This finding contradicts the widely held link-independence assumption in the calculation of the core metric, i.e., the expected number of transmissions to the candidate forwarder set, in opportunistic routing (OR). The inappropriate assumption may cause serious estimation errors in the forwarder set selection, which further leads to underutilized diversity benefits or extra scheduling costs. we propose a novel link-correlation-aware OR scheme, which significantly improves the performance by exploiting the diverse low correlated forwarding links basis on various matrices such as link energy no of hope etc. We evaluate the design in ns2-network simulation tool by varying no of nodes. Target of our work is develop a algorithm to find better correlated link.
PaperID
2017/04/IJMERT/4/227



Notice Board :

Call for Paper
Vol. 8 Issue 10

Submission Start Date:
September 30, 2021

Acceptence Notification Start:
October 12, 2021

Submission End:
October 18, 2021

Final MenuScript Due:
October 22, 2021

Publication Date:
October 31, 2021