Machine Learning Algorithms and Applications: A Review
This paper will discuss about Machine Learning technology, its algorithms and its applications. In the new era of automations, business intelligence and the growing datacenters capacity, machine learning is a key component. Through literature review this paper demonstrates this new field and its characteristics. Different algorithms exist for various types of works, making it possible for average business to use the one that suits its needs the best. Machine Learning has come to stay for many years, providing added value to data and predictive mechanisms that will make our world a better place.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Performance Analysis of Stochastic Gradient Descent - based Algorithms for Time Series Sequence Modeling
In many modern computer applications such as Market Analysis, Critical Care, Speech Recognition, Physical Plant Monitoring, Sleep Stage Classification, Biological Population Tracking, data is captured over the course of time, constituting a Time-Series. Time-Series data often contain temporal information dependencies that cause two otherwise identical points of time to belong to different classes or predict different behavior. This inherent characteristic increases the difficulty of processing such data. Deep Machine Learning (DML) techniques possess the inherent ability for analyzing and making predictions about such data. By its nature, DML requires extensive provision of resources key amongst which is the model computation time. Several optimization algorithms have been invented in the recent past and compare differently in terms of their resource needs. The most popular class of optimization algorithms is based on the classical stochastic gradient descent (SGD) algorithm due to its ability to converge within reasonable time bounds. This paper is part of a larger project investigating optimization procedures for deep learning tasks based on the SGD. Specifically, we report on the comparative performance capabilities of the most popular SGD based algorithms for task of Time Series prediction namely. From our analysis of the six of these algorithms, we noted that ADAMAX is most appropriate for online learning while RMSPROP is the least affected by over-fitting for long training cycles.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Review of Regression Testing on Object-Oriented Programs
The purpose of regression testing is to ensure that bug fixes and new functionality introduced in a new version of a software do not adversely affect the correct functionality inherited from the previous version. Regression testing is an expensive and frequently executed maintenance process used to revalidate modified software. It is costly but crucial problem in software development. The paper try to do the survey of current research on regression testing and current practice in industry and also try to find out whether there are gaps between them.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Approaching towards Architectures for quantum computers
In last few decades computer scientist has started taking interest in the quantum computing in order to resolve some of the problems in the recognizable classical computers. Relevant efforts have been put into the practice for two instructions: the basic assumptions behind the quantum mechanics has a residential affect, on the other hand a series of project has been used to show the series of implementation of all these algorithms. This will move the quantum from area of assumptions’ to the actual level. The relationship between these two areas is generally the feasible algorithms for quantum, which settle down their model of quantum circuit.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A comparative study of various color image segmentation methods
This paper has presented a review on different image segmentation techniques. The image segmentation; segments a given image into separate regions and objects. It is widely used in various vision applications like face detections, motion detection etc. The overall objective of this paper is to review various techniques of image segmentation. The short comings of image segmentation techniques will also be evaluated. This paper ends up with the analytical solution to overcome the problems of the existing techniques.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Handwritten digit recognition using neural network
Handwritten digit recognition is challenging problem researchers had been research into this area for so long especially in the recent years. There are many fields concern with numbers e.g. checks in banks or recognizing numbers in car plates, the subject of digit recognition appears. The main objective is to recognize digits in different applications. E.g. different users had their own handwriting styles where the main challenge falls to let computer system understand these different styles and recognize them as standard writing. Neural network can be proving as an effective tool to solve such problem. Neural network uses various algorithms for learning and classification; such as Back Propagation Algorithm, feed forward etc.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Nephele: Dynamic Allocation and Parallel Execution Security Model in Cloud Computing
In present year ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IAAS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data and making it easy for customers to access these. However, the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud. Consequently, the allocated compute resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and cost. In this project the data processing framework to explicitly exploit the dynamic resource allocation offered by today’s IAAS clouds for both, task scheduling and execution is constructed. Particular tasks of a processing job can be assigned to different types of virtual machines which are automatically instantiated and terminated during the job execution.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Responsive Web Design
This paper presents the concept of Responsive Web Design and Development for Web Applications meant to be present on screens of different resolution like desktop, tablets and mobile phones. It brings into light some of the features of Web Application and Native Applications and how the difference between them is narrowing down. A brief look into the traditional form of web designing is also mentioned in order to understand its drawbacks. It also focuses on the concepts of Media Queries and Twitter Bootstrap, a new front end framework. It overall brings into limelight the new perspective of Web Development so as to make it more flexible and efficient.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A comparative study of AES, Blowfish, Two fish and serpent cryptography algorithms
This paper provides a performance comparison between four of the most common symmetric key cryptography algorithms: AES(Rijndael), Blowfish, Twofish and Serpent. The comparison has been conducted by running four encryption algorithms to process different sizes of data blocks with any extension of files to evaluate the algorithm's encryption/decryption speed. Simulation has been conducted using java language
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Ant-based Routing Schemes for Mobile Ad hoc Networks
An ad-hoc network is a collection of mobile nodes, which communicate over radio. These networks have an important advantage; they do not require any existing infrastructure or central administration. Therefore, mobile ad-hoc networks are suitable for temporary communication links. This flexibility, however, comes at a price: communication is difficult to organize due to frequent topology changes. Routing in such networks can be viewed as a distributed optimization problem. A new class of algorithms, inspired by swarm intelligence, is currently being developed that can potentially solve numerous problems of modern communications networks. These algorithms rely on the interaction of a multitude of simultaneously interacting agents. A survey of few such algorithms for ad hoc networks is presented here.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]