sitemap | contact us
      
 
  Book Series
  Journals
  Book Proposal Form
 
  Using Published Material
  Rights and Permissions
  Examination Copies
   
   
  List of Publishers
  Bargains
   
   
  Services
   
   
  About Narosa
  History
  Mission
  Group Companies
  Our Strength
  Alliances
   
   
   
 
 
JUET Research Journal of Science and Technology
Volume 4 Number 1

ISSN: 2321-6026
Publication Year: January 2017
Pages: 1 - 89


Interpolatory quartic X-splinematching a smooth function at equidistant knots
- Alka Shrivastava
Contact: alkashri0987654321@gmail.com

Abstract: Interpolatory Quartic X-splines are studied. The Quartic X-splinesas c2–continuous piecewise quartic polynomials in which third derivative is allowed to possess jump discontinuity and it is controlled by that of fourth derivative at each internal knot.Quartic X-splines are the generalization of conventional quartic splines. The unique existence of a quartic x-spline satisfying function values at mesh points (joints) of the mesh intervals has been established. Convergence properties of these interpolatory splines have also been studied. We have a significant result, because here without any constraints on number of mesh intervals we have unique existence of a quartic X-spline for a wide range of parameters ai. given by (2.17) and (2.18). 

A Study to Analyse the Future of Nosql Databases in Big Data and Cloud Computing
- Naveen Tewari
Contact: navtewari@gmail.com

Abstract: This paper will analyze the future of NoSQL databases in BigData and Cloud Computing. As cloud computing in not a new term in today’s world, we all are aware of the fact that now much worried issue is big amount of unstructured data used in cloud. Due to this the IT-technologies nowadays concern with the so called BigData.
NoSQL has been introduced to overcome this issue and lots of IT-giants are working in NoSQL databases to tackle the BigData issue. We hereby analyze the scope and concern of BigData and also figure out that how these issues are solved by NoSQL.

Personal Micro Credit : A Driving Force for Development of Udham Singh Nagar (Uttarakhand)
- Rakesh Kumar Yadav, Gurpreet Singh and R. K. Kushwaha
Contact
: rkyadav@iftmuniversity.ac.in; ravindra_78600@yahoo.co.in

Abstract: India is a quick creating nation and there is a more prominent need to cross over any barrier between the rich and the poor for the adjusted development. According to study of Microfinance it is found that more individuals are benefiting casual advance and in the wake of profiting Microfinance the expectation for everyday comforts of the borrower is not progressed. Microfinance is an assuming a huge part in the inspire of the borrower. The idea of small scale credit is known more by its approach than by financial breaking points to the measure of advances. The fundamental goal of this paper is to dive into the respondents’ inclination for the formal and the casual wellsprings of back. To break down the level of effect of the microfinance benefits on the lives of the respondents and to discover the pay impact because of the entrance to microloan. Keeping in mind the end goal to accomplish the points, both essential and auxiliary wellsprings of information were utilized. The essential information was gathered through organized poll. In this review, the examination configuration will be Descriptive Research Design.
 
An Intelligent Technique for Cancer Detection
- Suryakant
Contact
: suryak111@gmail.com

Abstract: Breast cancer disease has turned into a noteworthy reason for death among ladies. To lessen Breast cancer deaths the best path is to recognize it prior. Early finding requires right and solid analysis strategy that will permits doctors to recognize favourable breast tumours from dangerous ones. In this way, to locate an exact and compelling determination technique is essential. This paper shows a framework which distinguishes the tumour by adapting clustering techniques. For this it utilize Adaptive Resonance Neural Network (ARNN), an exceptional instance of unsupervised learning.
 
Effects of Test-Suite Minimization on Fault Localization
- Pragya Agarwal, Chandrashekhar Patel and Abhay Saxena
Contact
: pragyaagarwal30@gmail.com; shekharrockin1988@gmail.com; abhaysaxena2009@gmail.com

Abstract: Regression testing checks both the modified sectionsand other sections of the source code that are influenced by the change. Our traditionally approach regarding the regression testing was to re-run all test suite or test a sub-set of existing test cases. To work upon all the test cases by running them again in the existing test suites, seems to be very expensive and time consuming. Researchers have proposed various methods for reducing the cost of rerunning the entire test suites–prioritizing test cases, reduction of test suites, and selection of test cases. To maintain the quality of software, early fault localization is necessary. Different fault localization methods have been used by many researchers.
In this paper we have minimized test suites randomly based on less execution time but cover faults. To show the effects of test suite minimization on fault localization we used Siemens programs and applied four fault localization methods on minimized test suites. From this experiment it is clear that minimized test suites affect the fault localization because there is a change in suspiciousness score of four fault localization methods.

Survey on Support Vector Machine (SVM) and their Application in Technical Diagnostics
- Mayank Arya Chandra and S S Bedi
Contact
: mchandra100@gmail.com; er.bedi@yahoo.com

Abstract: SVM is not a new term, all literature have this word. Nowadays, this word often used in computer science. The main goal of this paper is to introduce briefly the different SVM techniques and its applications in the field of classification domain. it is a powerful mathematical model for classification computation so it is used in various field since its comes out. SVM give a best result in solving linear separable problems on small training data set but data may be nonlinear. For solving a non linear data, a new mathematical function is introduced that’s known as kernel function. Kernal function gives a new direction for SVM based classification. For improving the accuracy as well as performance of SVM, we must aware of how a kernel function should be selected and what the different approaches for parameter selection are. Key feature of the SVM is kernel function as well as kernel parameter. This paper reviews the different computational model of SVM a nd key feature of SVM system development furthermore provides a description on their classification accuracy.
 
Face Detection System using DCT and SOM
- Deepak Kumar Jain and Sumarga Kumar Sah Tyagi
Contact
: deepak.juet@cripac.ia.ac.cn; sumarga@ict.ac.cn

Abstract: Recognition of face is more critical problem inhumans daily life. Automatic recognition of humans is challenging problem which has received much concentration during the present era due to its different applications in different fields. Now-a-days face recognition is one of the problem, presently there is no techniques that give perfect result for all situations and different applications that face recognition may encounter. This process is most useful in different area such as security, surveillance, criminal identity etc.
 
Secured Image Compression using Artificial Neural Network
- Priyali Verma, Amit Mishra, Ashutosh Kumar Singh and Hemdutt Joshi
Contact
: priyaliverma20@yahoo.co.in, amitutk@gmail.com

Abstract: In this paper, an image compression along with encryption scheme is proposed in order to ensure efficient and secure transmission. Compression removes redundant and irrelevant information from images. A compressed image requires lesser storage space, lesser bandwidth and can be transmitted with higher data rate than original image. Compression and reconstruction of image has been done using artificial neural network (ANN). On the other hand, to protect information from unauthorized access, image encryption is performed in which target image is covered by one or more insignificant images before transmission. At the receiver, independent component analysis (ICA) is used to separate the target image from mixture. Thus, the proposed scheme combines the concept of ANN and ICA for efficient compression and secured transmission respectively. It is also compared with conventional DCT based secure image compression and shows better performance in terms of complexity. The importance of proposed scheme can be found in real time multimedia applications.

Prev Issue

Next Issue



CLICK HERE


Group
| Companies | Mission | Strength | Values | History | Contact us
© Narosa Publishing House