SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
                            & TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 3, Issue 3, October - December (2012), pp. 282-290
                                                                                 IJCET
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2012): 3.9580 (Calculated by GISI)                     ©IAEME
www.jifactor.com




           ANOMALOUS SYMMETRY SUCCESSION FOR SEEK OUT A
                  FLANKING KIN IN A SET OF LINKS
                                    Rahul Jassal1, Chaman Singh2
                                          1
                                         Assistant Professor,
                          Department of Computer Science and Application
                     Punjab University Regional Centre Hoshiarpur, Punjab, India,
                                Email:-rahulatssgpurchsp@gmail.com

                                     2
                                     Assistant Professor and Head
                                Department of Computer Application,
                             Govt. P.G. College Chamba, H.P. University,
                              Chamba, Himachal Pradesh, India 176310,
                                 Email:-chaman83mca@gmail.co.in

     ABSTRACT

     The paper illustrates a post calculated stratum which works on a representation of 2-D points
     to determine the next neighboring element with the lowest traverse value. Weight Short
     Algorithm traverses the whole matrix in an odd promenade and works out on traversed data
     in knowing the closest kin without sending the load of number of hopes or joined kin to next
     neighboring element as it is with case of distance vector routing. This all is done under
     umbrella of constraint that the existence of next node can be determined on same
     columns/rows in a matrix or may be locate the element at sloping position, if still not found,
     some row or column shifts is performed as per algorithm such that no repetition of the same
     pair should occur.

     Keywords: Distance Vector Routing, Dual Networks, Mobility, Pretext Knowledge, Weight
     Short Algorithm,

I.          INTRODUCTION

              Analytic data available on internet either reveals eighty percent of data [1] is in the
     form of unstructured and bogging its presence in the form of blogs, surveys, Wikipedia’s.
     Data on internet can be shared using wired or wireless or Dual Networks [3]. Many of times
     we come across situations of forwarding the received data to next user in dual networks [5]
     i.e. forcing to increase one more imitate of the document and it keep on adding and definitely
     a big risk to normalized databases. Proper analysis of data helps anyone from ignored risks
                                                   282
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
                                                         October December

and uniformed decisions, some times user cannot connects with each other due to NAT
devices and Firewalls [4]. Analytic study helps in converging the bulk into meaningful
information and that’s why many of the companies are looking for analytic vendors to come
up with products that blend unstructured analytics. And the conversion into actionable
intelligence is called “unstructured data analytics”. Structured data analytics [1] uses business
intelligence tools for querying and reporting whereas unstructured data analytics utilizes text
                               g
processing and keyword searches (to locate documents in servers). Unstructured analytics has
evolved over time, moving towards next generation techniques like video and audio analytics.
The data available on net categorize in structured or unstructured way as




                                      Figure 1:-Categorization of Data

All organizations are aware that a considerable amount of technical and business information
and knowledge resides in both the structured data bases and in unstructured repositories [2].
Simply enabling independent searches of these does not produce the most value. Valuable
                                                                           most
conclusions are represented in reports that were developed from investigating structured data
and these are lost from view when searching only databases. Together, they provide the facts
and the conclusions. When the searches are combined, they produce a plethora of
                                                      combined,
information, Usability, Security and workflows as like in dual networks [7][8]are important
design consideration to achieve clear, quick access to multiple disparate information sources
like local and private networks . The initial efforts of management of data beyond the
                                           initial
workgroups concentrated on the shared structures data, such as well logs and seismic data.
Interpretation results, [6] such as horizons, picks and faults were shared next. Recognizing
that project speed and quality would increase by sharing data, efforts were made to define
                            ality
massive multidisciplinary data models. These persist today and stand alongside the active
project data stores. Most of these large scale repositories are used to store the raw incoming
information that is feeding the interpretation systems.
     mation
At the same time, document management systems were growing they started on the business
side and migrated toward the scientific and technical by storing reports of interpretation. Over
time, emails and the documents located on shared and personnel computer disks began to
hold larger and larger volumes of important information.
These repositories are becoming the new targets for mining valuable information in an
organization. There are good reasons to include the unstructured information in an enterprise
                                          include
data management solution. These files contain interpretations, descriptions and decisions.
The structured data stores contain mostly raw primary data such as well logs and seismic
traces. One could say that the unstructured data stores hold the intellectual capital and the
                               he
structured data stores hold the valuable basic factual data. So integrating these two
information sources into the Enterprises data management strategy makes a lot of sense. We
can also apply pretext grids [10] on data for facilitating online education purpose.
              y
                                              283
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

1.1 Extracting information from unstructured data stores
        Increasingly capable technical solutions are enabling access to these attractive
knowledge stores. Systems can access the email and documents. Systems can extract
patterned information out of them, such as zip codes, addresses and telephone numbers.
Search engines that operate in a Google-Like manner have been implemented and are
enabling delivery to the desktop hundreds if not thousands of documents. Just indexing the
documents and files can be a daunting task and is frequently a road back to success in these
projects
1.1.1 Text Analytics Process

                       Information
                         Retrieval                                  Collect and retrieve information from
                                                                    internal and external sources

                                            Transformin
   Analytics
                                               g Text
                          Text                                     Content cleaning
                        Analytics
                        Process
                                                                   removing duplicates

                                                                Selecting attributes discovering patterns
           Reporting                 Delivery




                                Figure 2:- Text Analytical Process

Where Reporting deals with different mechanisms foe notifying results like dashboards, alerts
etc and delivery lies in steps to augment existing data & store enriched information.
What goes routers side?
Distance vector routing algorithm uses a router algorithm [9] in which the router periodically
sends routing updates to all kin by broadcasting their entire route tables. Some sort of time
gaps called periodic updates is maintained before next transmission. And this time gaps
varies from varied companies as ranges 10 seconds for AppleTalk’s RTMP and 90 seconds
for Cisco IGRP. So frequent data updating and their broad cast leads to congestion and CPU
overload. So how this all communication is possible, the simplest is to air out the updates to
the broadcast address on an IP like 255.255.255.255, the neighboring kin with same mask or
routing protocol will hear the broadcast.

The Figure 3 is a pictorial representation of points on a LAN which is either wired or wireless
and the second one carries processed data depicting a of the axes and the position of nodes on
the matrix, Consider four routers joined in a network like In this network we have 4 routers
A, B, C, and D




                                                          284
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME



                                   From Via Via Via Via
                                   A    A   B   C   D
                                   To A
                                   To B           3
                                   To C                 23
                                   To D


                             Figure 3:- Local Area Networks Representation
We shall mark the current time (or iteration) in the algorithm with T, and shall begin (at time
0, or T=0) by creating distance matrices for each router to its immediate neighbors. As we
build the routing tables below, the shortest path is highlighted in the boxes.

From Via Via Via Via              From     Via Via Via Via            From Via Via Via Via
B     A  B    C  D                C         A   B  C   D              D    A   B    C  D
To A 3                            To A     23                         To A
To B                              To B         2                      To B
To C         2                    To C                                To C         5
To D                              To D                         5      To D

                                  Figure 4:- Distance Matrices
Rather as describes above sending the information from one node to another in distance
vector routing, the following diagram shows the presence of routers in a matrix and
determining the presence of next kin with the help of weightshort algorithm and dynamically
locating the router with an walk and as soon as we visit the router closest to former a
procedure call sends the information to next level and reaches a stage of calculated stratum
carrying the router details in a matrix.
Pictorial Representation of neighboring element in 3-D




        Figure 5:- Density of Data                        Figure 6:- Representation of Data
The paper presents a data structure that helps us in locating a next neighboring element while
adopting a technique that either we can find the next kin if we have a walk towards column side or
row side or diagonally but while traversing, the rules we must kept in our mind is that no repetitions

                                                 285
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
  6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

  should occur in forming pairs. Figure: -5 describe density of the data in three of axis, the first pie
  describes the region with probability of existence of data is most and decreasing respectively for axis
  (x, z) and (y, z).Figure 6 is pictorial representation of data in all axis, the operations that can be applied on one
  segment can be applied on last 2 segments.
  Actually, what we are doing is traversing each cell of matrix in symmetry where first walk visits the cell (1, 1),
  next walk carries cell like (2,1), (2,2),(1,2) and the next contains (3,1),(3,2),(3,3),(2,3),(1,3) and so-on. And the
  walks increasing its path elements in odd pattern like (1, 3, 5, 7, 9….) and it goes high as we increase the size of
  the matrix or data grows. Walks help us in visiting each of the cells in the matrix but determining the relation
  between former and the new element is only done through checks like:-
  1).Checking existence of the next element in the same row.
  2). Checking existence of the next element in same column.
  3). Checking existence diagonally left or diagonally right.
  By going through checks these things must be kept in mind that while creating a pair no repetition of the same
  pair should occur. In Continuation to search for neighbor element we have to walk on data structure which
  should have moves like listed below for figure 2.
  *(1, 1)
   (2, 1), (2, 2), (1, 2)
   (3, 1), (3, 2), (3, 3), (2, 3), (1, 3)
   (4, 1), (4, 2), (4, 3), (4, 4), (3, 4), (2, 4), (1, 4) and So-on. For a data structure with moves as above mentioned
  the following techniques works. Suppose ‘n’ is the number of cells in a cube,Then the calculation x= √݊ ,y=
  2(x)-1 ,y1=y-2, y2=y1-2, y3=y2-2 and so-on
  So the data structure inside this cube is growing its cells size in odd symmetry like {y1, y2, y3,yn} for instance,
  suppose we are with total no of cells=49
  x=√49, x=7,y=2(7)-1, y=13,y1=y-2, y1=13-2, y1=11
  y2=y1-2, y2=11-2, y2=9 and so-on.
  And we are with results like {13, 11, 9, 7, 5, 3, 1} in decreasing order or counter clock wise {1, 3, 5, 7, 9, 11,
  13} whose first value 1 represents first cell with data in (1,1) position next element 3 defines 3cells with
  corresponding data in three positions like (2, 1), (2, 2), (1, 2) and we are with symmetry defined above*.The
  following algorithm describes the search for the next neighbor position in x-y axis and can be implemented for
  left y-z, z-x axis.

II.        WIGHT SHORT ALGORITHM
      NeighbourPosition (row col, new, temp, nextval, llist)
      {
      Consider any axis and move the pointer from left to right in row direction and step down to column
      when value of the both the x, y becomes same i.e. (2, 2), (3, 3) so-on and with tautology .
      “row=column+1”
      //row, col is used for row and column pointers
      //j is a set containing values {1, 3, 5, 7, 9, 11, 13} as discussed above.
      //new, temp and nextval are temporary location just used for storing and determine relationships.
      //llist is the structure storing the data available on first router.
      //First Half
      Struct llist
      {
      int hop;// path determination
      int destination;//flag variable
      struct llist *ptr;
      }
      count=0;
      for (row=1,j=1; row<=x; row++,j+2)
      {
      for (col=1;col<=row; col++)
      {
      ++count;
      temp=cube [row, col];
      //Checking existence of the next element in //the same row.


                                                          286
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

    //Row Check
    //temp= (a, b)
    //nextval= (a, b+1) if element exists
    temp->nextval(neighbor)
    llist(a,b)<-llist(a,b+1);//data shifted to next higher node on row check
    // Checking existence of the next element in //same column.
    //Column Check:-
    temp= (a, b)
    nextval= (a+1, b)//if element exists
    temp->nextval(neighbor)
    llist(a+1,b)<-llist(a,b);//data shifted to next higher node on column check
    //Checking existence diagonally left or //diagonally right.
    //Diagonal Check
    //Left Diagonal Check
    temp= (a, b)
    nextval may be at (a+1, b-1).//if element exists
    temp->nextval (neighbor)
    //Right diagonal Check
    temp= (a, b)
    nextval may be at (a+1, b+1)//if element exists
    temp->nextval (neighbor)
    }
    //Last Half
    If (count<j)
    {new=j-count)}
    for (left=1, left<=new; left++)
    cube [row-1, row]
    //Checking existence of the next element in //the same row.
    //Row Check
    //temp= (a, b)
    //nextval= (a, b+1) if element exists
    temp->nextval (neighbor)
    // Checking existence of the next element in //same column.
    //Column Check:-
    temp= (a, b)
    nextval= (a+1, b)//if element exists
    temp->nextval(neighbor)
    //Checking existence diagonally left or //diagonally right.
    //Diagonal Check
    //Left Diagonal Check
    temp= (a, b)
    nextval may be at (a+1,b-1).//if element exists
    temp->nextval(neighbor)
    llist(a+1,b-1)<-llist(a,b);//data shifted to next higher node on diagonal left check
    //Right diagonal Check
                               Figure 7:- Weight Short Algorithm
    temp= (a, b)
    nextval may be at (a+1, b+1)//if element exists
    temp->nextval(neighbor)
    llist(a+1,b+1)<-llist(a,b);//data shifted to next higher node on diagonal right check
    }
    }

                          Figure 7:- Weight Short Algorithm

                                                   287
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
   6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME


   The algorithm is divided in two halves, the first half describing the cases like
   For traversing up to (3, 3) the first half bring values like
   (1, 1)
   (2, 1), (2, 2)
   (3, 1), (3, 2), (3, 3)
   Rather we are in need of
   (1, 1)
   (2, 1), (2, 2), (1, 2)*
   (3, 1), (3, 2), (3, 3), (2, 3)*, (1, 3)*
   So second half of the algorithm helps us in determine left marked columns.
   Note: - this might be the case if at positions we don’t find any element either on the row,
   column or towards its left diagonal or right diagonal then in that case the particular position is
   just simply added to penultimate element.

                                                                   Start



                                                        Promenade starts at cells
                                                         (1,1),(2,1),(2,2).cell(mxn)




               llist(a,b)<-llist(a,b+1);//data                    Is temp
              shifted to next higher node         ROW             reaches
                                                                                       YES
                       on row check                                 mxn
                                                  NO

                                                                     NO

            llist(a+1,b)<-llist(a,b);//data shifted to next     COLUMN
                   higher node on column check


                                 llist(a+1,b-1)<-                            Display the timing for visiting the
                                                           DIAGONAL                        routes
                            llist(a,b);//data shifted
                             to next higher node

                                                                                             Stop
                     Figure 8:- Flow Chart for Weight Short Algorithm

III.       CONCLUSION
           The theory or computational logic helps one in designing games, or help user in
   determining next neighboring element in finite passes and one can work on logic and with
   better time complexity and one can work upon the new ways for keeping records in user
   defined structures illustrates a post calculated stratum which works on a representation of 2-D

                                                        288
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

points to. Paper determines the next neighboring element with the lowest traverse value.
Weight Short Algorithm traverses the whole matrix in an odd promenade and works out on
traversed data in knowing the closest kin without sending the load of number of hopes or
joined kin to next neighboring element as it is with case of distance vector routing. This all is
done under umbrella of constraint that the existence of next node can be determined on same
columns/rows in a matrix or may be locate the element at sloping position, if still not found,
Some row or column shifts as per algorithm such that no repetition of the same pair should
occur.

REFERENCES
[1]. Structure, Models and Meaning: Is "unstructured" data merely unmodeled? Intelligent
      Enterprise, March 1, 2005.
         th
[2]. 14 PNEC Conference “The challenges of Structured and Unstructured Data” 2010.
[3]. K.L.Bansal, Chaman Singh, “Dual Stack Implementation of Mobile IPv6 Software
      Architecture”, Foundation of Computer Science IJCA- Volume 25, No 9, July 2011.
[4]. K.L.Bansal, Chaman Singh, “NAT Traversal and Detection on Dual Stack Implementation
      of Mobile IPv6”, Foundation of Computer Science IJCA- Volume 29, No 7, September
      2011.
[5]. Chaman Singh, S Kumar, S Kumar, K.L.Bansal,” Design and Implementation of Mobile
      IPv6 Data Communication in Dual Networks”, IJCSI -Volume 1, Issue 9, Page N0. 182-
      190, January 2012.
[6]. Ledion Bitincka, Archana Ganapathi, Stephen Sorkin and Steve Zhang. “Optimizing Data
      Analysis with a Semi-structured Time Series Database”,
[7]. Chaman Singh, K.L.Bansal,”NAT Traversal Capability and Keep-Alive Functionality with
      IPSec in IKEv2 Implementation”, IJCSCN -Volume 2, Issue 1, Page N0. 99-110, February
      2012.
[8]. Chaman Singh, K.L.Bansal,” Linux Based Implementation and Performance Measurements
      of Dual Stack Mobile IPv6”, IJCSCN -Volume 2, Issue 2, Page N0. 240-255, April 2012.
[9]. “A more Efficient Distance Vector Routing”, Zhengyu Xu,Sa Dai Computer Engineering
      Department School of Engineering University of California.
[10]. Rahul Jassal, Chaman Singh “Pretext Knowledge Grids on Unstructured Data for
      Facilitating Online Education” IOSR Journal of Computer Engineering ISBN: 2278-
      8727Volume 5, Issue 5 (Sep-Oct. 2012), Page No. 22-27.

AUTHORS PROFILE



                            Rahul Jassal is working as Assistant Professor in Department of
                            Computer Science & Application, Panjab University Regional
                            Centre, Hoshiarpur, India. He received Master of Computer
                            Application in year 2007 and clear the UGC-NET examination for
                            subject “Computer Science & Application in the same year. He is
                            with the post from last 5 years.




                                              289
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

                         Chaman Singh (B.Sc., MCA, NET, Ph.D.) Has received the Master
                         of Computer Application Degree in 2007 and completed Ph.D. in
                         Computer Science 2012 from Department of Computer Science
                         H.P.University Shimla, India. He also qualified UGC NET 2006.
                         Have more than 4 years of Working Experience in Teaching,
                         Guidance for PGDCA, MCA, BCA students, Software Development
                         (Programming) and Networks. Published number of National and
                         International Papers in like IJCA, IJCSI, IJCSCN, IJCSE, IOSR etc




                                          290

Más contenido relacionado

La actualidad más candente

A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance
A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance
A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance IJECEIAES
 
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...ijcsit
 
Big Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewBig Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewIRJET Journal
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachAIRCC Publishing Corporation
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudeSAT Journals
 
A CLUSTERING TECHNIQUE FOR EMAIL CONTENT MINING
A CLUSTERING TECHNIQUE FOR EMAIL CONTENT MININGA CLUSTERING TECHNIQUE FOR EMAIL CONTENT MINING
A CLUSTERING TECHNIQUE FOR EMAIL CONTENT MININGijcsit
 
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...IDES Editor
 
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming DataIRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming DataIRJET Journal
 
EFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASES
EFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASESEFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASES
EFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASESIJCSEIT Journal
 
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Mumbai Academisc
 
Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)Raghavendra Pokuri
 
Cloak-Reduce Load Balancing Strategy for Mapreduce
Cloak-Reduce Load Balancing Strategy for MapreduceCloak-Reduce Load Balancing Strategy for Mapreduce
Cloak-Reduce Load Balancing Strategy for MapreduceAIRCC Publishing Corporation
 
Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data IJECEIAES
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...IJECEIAES
 
Patent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsPatent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsiaemedu
 
Patent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsPatent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsIAEME Publication
 
Managing Big data using Hadoop Map Reduce in Telecom Domain
Managing Big data using Hadoop Map Reduce in Telecom DomainManaging Big data using Hadoop Map Reduce in Telecom Domain
Managing Big data using Hadoop Map Reduce in Telecom DomainAM Publications
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
 

La actualidad más candente (20)

A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance
A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance
A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance
 
G1803054653
G1803054653G1803054653
G1803054653
 
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
 
Big Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewBig Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A Review
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
 
A CLUSTERING TECHNIQUE FOR EMAIL CONTENT MINING
A CLUSTERING TECHNIQUE FOR EMAIL CONTENT MININGA CLUSTERING TECHNIQUE FOR EMAIL CONTENT MINING
A CLUSTERING TECHNIQUE FOR EMAIL CONTENT MINING
 
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
 
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming DataIRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
 
EFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASES
EFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASESEFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASES
EFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASES
 
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
 
Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)
 
Cloak-Reduce Load Balancing Strategy for Mapreduce
Cloak-Reduce Load Balancing Strategy for MapreduceCloak-Reduce Load Balancing Strategy for Mapreduce
Cloak-Reduce Load Balancing Strategy for Mapreduce
 
Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
 
Patent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsPatent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovators
 
Patent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsPatent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovators
 
Managing Big data using Hadoop Map Reduce in Telecom Domain
Managing Big data using Hadoop Map Reduce in Telecom DomainManaging Big data using Hadoop Map Reduce in Telecom Domain
Managing Big data using Hadoop Map Reduce in Telecom Domain
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
 

Destacado

Automatic gear transmission in two wheelers using embedded system
Automatic gear transmission in two wheelers using embedded systemAutomatic gear transmission in two wheelers using embedded system
Automatic gear transmission in two wheelers using embedded systemiaemedu
 
Studies on the effects of oxidation and its repression in mag welding process
Studies on the effects of oxidation and its repression in mag welding processStudies on the effects of oxidation and its repression in mag welding process
Studies on the effects of oxidation and its repression in mag welding processiaemedu
 
Surface reconstruction and display from range
Surface reconstruction and display from rangeSurface reconstruction and display from range
Surface reconstruction and display from rangeiaemedu
 
Development of economized shaking platforms for seismic testing of scaled models
Development of economized shaking platforms for seismic testing of scaled modelsDevelopment of economized shaking platforms for seismic testing of scaled models
Development of economized shaking platforms for seismic testing of scaled modelsiaemedu
 
An overview of experimental investigation of near dry electrical discharge ma...
An overview of experimental investigation of near dry electrical discharge ma...An overview of experimental investigation of near dry electrical discharge ma...
An overview of experimental investigation of near dry electrical discharge ma...iaemedu
 
Modeling ion sensitive field effect transistors for biosensor applications
Modeling ion sensitive field effect transistors for biosensor applicationsModeling ion sensitive field effect transistors for biosensor applications
Modeling ion sensitive field effect transistors for biosensor applicationsiaemedu
 
Evaluation of the saharan aerosol impact on solar radiation over the tamanras...
Evaluation of the saharan aerosol impact on solar radiation over the tamanras...Evaluation of the saharan aerosol impact on solar radiation over the tamanras...
Evaluation of the saharan aerosol impact on solar radiation over the tamanras...iaemedu
 
Study of various compliant micromechanism
Study of various compliant micromechanismStudy of various compliant micromechanism
Study of various compliant micromechanismiaemedu
 
Flexural safety cost of optimized reinforced concrete slabs
Flexural safety cost of optimized reinforced concrete slabsFlexural safety cost of optimized reinforced concrete slabs
Flexural safety cost of optimized reinforced concrete slabsiaemedu
 
An overview of experimental investigation of near dry electrical discharge ma...
An overview of experimental investigation of near dry electrical discharge ma...An overview of experimental investigation of near dry electrical discharge ma...
An overview of experimental investigation of near dry electrical discharge ma...iaemedu
 
Quality factor of seismic coda waves in garhwal
Quality factor of seismic coda waves in garhwalQuality factor of seismic coda waves in garhwal
Quality factor of seismic coda waves in garhwaliaemedu
 
Current state of the art pos tagging for indian language
Current state of the art pos tagging for indian languageCurrent state of the art pos tagging for indian language
Current state of the art pos tagging for indian languageiaemedu
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksiaemedu
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Model for prediction of temperature distribution
Model for prediction of temperature distributionModel for prediction of temperature distribution
Model for prediction of temperature distributioniaemedu
 
Knowledge management strategies in higher
Knowledge management strategies in higherKnowledge management strategies in higher
Knowledge management strategies in higheriaemedu
 
Sale of over the counter otc drugs via post
Sale of over the counter otc drugs via postSale of over the counter otc drugs via post
Sale of over the counter otc drugs via postiaemedu
 
Execution of organisational strategies a new paradigm in shaping
Execution of organisational strategies a new paradigm in shapingExecution of organisational strategies a new paradigm in shaping
Execution of organisational strategies a new paradigm in shapingiaemedu
 
Governance of fuzzy systems to predict driver perception of service quality
Governance of fuzzy systems to predict driver perception of service qualityGovernance of fuzzy systems to predict driver perception of service quality
Governance of fuzzy systems to predict driver perception of service qualityiaemedu
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Destacado (20)

Automatic gear transmission in two wheelers using embedded system
Automatic gear transmission in two wheelers using embedded systemAutomatic gear transmission in two wheelers using embedded system
Automatic gear transmission in two wheelers using embedded system
 
Studies on the effects of oxidation and its repression in mag welding process
Studies on the effects of oxidation and its repression in mag welding processStudies on the effects of oxidation and its repression in mag welding process
Studies on the effects of oxidation and its repression in mag welding process
 
Surface reconstruction and display from range
Surface reconstruction and display from rangeSurface reconstruction and display from range
Surface reconstruction and display from range
 
Development of economized shaking platforms for seismic testing of scaled models
Development of economized shaking platforms for seismic testing of scaled modelsDevelopment of economized shaking platforms for seismic testing of scaled models
Development of economized shaking platforms for seismic testing of scaled models
 
An overview of experimental investigation of near dry electrical discharge ma...
An overview of experimental investigation of near dry electrical discharge ma...An overview of experimental investigation of near dry electrical discharge ma...
An overview of experimental investigation of near dry electrical discharge ma...
 
Modeling ion sensitive field effect transistors for biosensor applications
Modeling ion sensitive field effect transistors for biosensor applicationsModeling ion sensitive field effect transistors for biosensor applications
Modeling ion sensitive field effect transistors for biosensor applications
 
Evaluation of the saharan aerosol impact on solar radiation over the tamanras...
Evaluation of the saharan aerosol impact on solar radiation over the tamanras...Evaluation of the saharan aerosol impact on solar radiation over the tamanras...
Evaluation of the saharan aerosol impact on solar radiation over the tamanras...
 
Study of various compliant micromechanism
Study of various compliant micromechanismStudy of various compliant micromechanism
Study of various compliant micromechanism
 
Flexural safety cost of optimized reinforced concrete slabs
Flexural safety cost of optimized reinforced concrete slabsFlexural safety cost of optimized reinforced concrete slabs
Flexural safety cost of optimized reinforced concrete slabs
 
An overview of experimental investigation of near dry electrical discharge ma...
An overview of experimental investigation of near dry electrical discharge ma...An overview of experimental investigation of near dry electrical discharge ma...
An overview of experimental investigation of near dry electrical discharge ma...
 
Quality factor of seismic coda waves in garhwal
Quality factor of seismic coda waves in garhwalQuality factor of seismic coda waves in garhwal
Quality factor of seismic coda waves in garhwal
 
Current state of the art pos tagging for indian language
Current state of the art pos tagging for indian languageCurrent state of the art pos tagging for indian language
Current state of the art pos tagging for indian language
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networks
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Model for prediction of temperature distribution
Model for prediction of temperature distributionModel for prediction of temperature distribution
Model for prediction of temperature distribution
 
Knowledge management strategies in higher
Knowledge management strategies in higherKnowledge management strategies in higher
Knowledge management strategies in higher
 
Sale of over the counter otc drugs via post
Sale of over the counter otc drugs via postSale of over the counter otc drugs via post
Sale of over the counter otc drugs via post
 
Execution of organisational strategies a new paradigm in shaping
Execution of organisational strategies a new paradigm in shapingExecution of organisational strategies a new paradigm in shaping
Execution of organisational strategies a new paradigm in shaping
 
Governance of fuzzy systems to predict driver perception of service quality
Governance of fuzzy systems to predict driver perception of service qualityGovernance of fuzzy systems to predict driver perception of service quality
Governance of fuzzy systems to predict driver perception of service quality
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Similar a Anomalous symmetry succession for seek out

IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET Journal
 
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET Journal
 
Semantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningSemantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningEditor IJCATR
 
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICSA STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICSijistjournal
 
IRJET- Automated Document Summarization and Classification using Deep Lear...
IRJET- 	  Automated Document Summarization and Classification using Deep Lear...IRJET- 	  Automated Document Summarization and Classification using Deep Lear...
IRJET- Automated Document Summarization and Classification using Deep Lear...IRJET Journal
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...IRJET Journal
 
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...IRJET Journal
 
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...IRJET Journal
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismIRJET Journal
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...IAEME Publication
 
IRJET- Offline Transcription using AI
IRJET-  	  Offline Transcription using AIIRJET-  	  Offline Transcription using AI
IRJET- Offline Transcription using AIIRJET Journal
 
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmParametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmIAEME Publication
 
Granularity analysis of classification and estimation for complex datasets wi...
Granularity analysis of classification and estimation for complex datasets wi...Granularity analysis of classification and estimation for complex datasets wi...
Granularity analysis of classification and estimation for complex datasets wi...IJECEIAES
 
Peer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Peer-to-Peer Data Sharing and Deduplication using Genetic AlgorithmPeer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Peer-to-Peer Data Sharing and Deduplication using Genetic AlgorithmIRJET Journal
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and ChallengesA Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challengesijcisjournal
 

Similar a Anomalous symmetry succession for seek out (20)

IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
 
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
 
Semantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningSemantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data Mining
 
[IJCT-V3I2P32] Authors: Amarbir Singh, Palwinder Singh
[IJCT-V3I2P32] Authors: Amarbir Singh, Palwinder Singh[IJCT-V3I2P32] Authors: Amarbir Singh, Palwinder Singh
[IJCT-V3I2P32] Authors: Amarbir Singh, Palwinder Singh
 
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICSA STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
 
IRJET- Automated Document Summarization and Classification using Deep Lear...
IRJET- 	  Automated Document Summarization and Classification using Deep Lear...IRJET- 	  Automated Document Summarization and Classification using Deep Lear...
IRJET- Automated Document Summarization and Classification using Deep Lear...
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
 
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
 
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
 
IRJET- Offline Transcription using AI
IRJET-  	  Offline Transcription using AIIRJET-  	  Offline Transcription using AI
IRJET- Offline Transcription using AI
 
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmParametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithm
 
[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
 
Granularity analysis of classification and estimation for complex datasets wi...
Granularity analysis of classification and estimation for complex datasets wi...Granularity analysis of classification and estimation for complex datasets wi...
Granularity analysis of classification and estimation for complex datasets wi...
 
Peer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Peer-to-Peer Data Sharing and Deduplication using Genetic AlgorithmPeer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Peer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
 
Ck34520526
Ck34520526Ck34520526
Ck34520526
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and ChallengesA Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challenges
 

Más de iaemedu

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationiaemedu
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reorderingiaemedu
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanismiaemedu
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cmaiaemedu
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presenceiaemedu
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineeringiaemedu
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacementiaemedu
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approachiaemedu
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentiaemedu
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationiaemedu
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyiaemedu
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 
A comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueA comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueiaemedu
 

Más de iaemedu (20)

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow application
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reordering
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanism
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cma
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presence
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineering
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacement
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approach
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environment
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow application
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classify
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 
A comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueA comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining technique
 

Anomalous symmetry succession for seek out

  • 1. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 3, Issue 3, October - December (2012), pp. 282-290 IJCET © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2012): 3.9580 (Calculated by GISI) ©IAEME www.jifactor.com ANOMALOUS SYMMETRY SUCCESSION FOR SEEK OUT A FLANKING KIN IN A SET OF LINKS Rahul Jassal1, Chaman Singh2 1 Assistant Professor, Department of Computer Science and Application Punjab University Regional Centre Hoshiarpur, Punjab, India, Email:-rahulatssgpurchsp@gmail.com 2 Assistant Professor and Head Department of Computer Application, Govt. P.G. College Chamba, H.P. University, Chamba, Himachal Pradesh, India 176310, Email:-chaman83mca@gmail.co.in ABSTRACT The paper illustrates a post calculated stratum which works on a representation of 2-D points to determine the next neighboring element with the lowest traverse value. Weight Short Algorithm traverses the whole matrix in an odd promenade and works out on traversed data in knowing the closest kin without sending the load of number of hopes or joined kin to next neighboring element as it is with case of distance vector routing. This all is done under umbrella of constraint that the existence of next node can be determined on same columns/rows in a matrix or may be locate the element at sloping position, if still not found, some row or column shifts is performed as per algorithm such that no repetition of the same pair should occur. Keywords: Distance Vector Routing, Dual Networks, Mobility, Pretext Knowledge, Weight Short Algorithm, I. INTRODUCTION Analytic data available on internet either reveals eighty percent of data [1] is in the form of unstructured and bogging its presence in the form of blogs, surveys, Wikipedia’s. Data on internet can be shared using wired or wireless or Dual Networks [3]. Many of times we come across situations of forwarding the received data to next user in dual networks [5] i.e. forcing to increase one more imitate of the document and it keep on adding and definitely a big risk to normalized databases. Proper analysis of data helps anyone from ignored risks 282
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME October December and uniformed decisions, some times user cannot connects with each other due to NAT devices and Firewalls [4]. Analytic study helps in converging the bulk into meaningful information and that’s why many of the companies are looking for analytic vendors to come up with products that blend unstructured analytics. And the conversion into actionable intelligence is called “unstructured data analytics”. Structured data analytics [1] uses business intelligence tools for querying and reporting whereas unstructured data analytics utilizes text g processing and keyword searches (to locate documents in servers). Unstructured analytics has evolved over time, moving towards next generation techniques like video and audio analytics. The data available on net categorize in structured or unstructured way as Figure 1:-Categorization of Data All organizations are aware that a considerable amount of technical and business information and knowledge resides in both the structured data bases and in unstructured repositories [2]. Simply enabling independent searches of these does not produce the most value. Valuable most conclusions are represented in reports that were developed from investigating structured data and these are lost from view when searching only databases. Together, they provide the facts and the conclusions. When the searches are combined, they produce a plethora of combined, information, Usability, Security and workflows as like in dual networks [7][8]are important design consideration to achieve clear, quick access to multiple disparate information sources like local and private networks . The initial efforts of management of data beyond the initial workgroups concentrated on the shared structures data, such as well logs and seismic data. Interpretation results, [6] such as horizons, picks and faults were shared next. Recognizing that project speed and quality would increase by sharing data, efforts were made to define ality massive multidisciplinary data models. These persist today and stand alongside the active project data stores. Most of these large scale repositories are used to store the raw incoming information that is feeding the interpretation systems. mation At the same time, document management systems were growing they started on the business side and migrated toward the scientific and technical by storing reports of interpretation. Over time, emails and the documents located on shared and personnel computer disks began to hold larger and larger volumes of important information. These repositories are becoming the new targets for mining valuable information in an organization. There are good reasons to include the unstructured information in an enterprise include data management solution. These files contain interpretations, descriptions and decisions. The structured data stores contain mostly raw primary data such as well logs and seismic traces. One could say that the unstructured data stores hold the intellectual capital and the he structured data stores hold the valuable basic factual data. So integrating these two information sources into the Enterprises data management strategy makes a lot of sense. We can also apply pretext grids [10] on data for facilitating online education purpose. y 283
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME 1.1 Extracting information from unstructured data stores Increasingly capable technical solutions are enabling access to these attractive knowledge stores. Systems can access the email and documents. Systems can extract patterned information out of them, such as zip codes, addresses and telephone numbers. Search engines that operate in a Google-Like manner have been implemented and are enabling delivery to the desktop hundreds if not thousands of documents. Just indexing the documents and files can be a daunting task and is frequently a road back to success in these projects 1.1.1 Text Analytics Process Information Retrieval Collect and retrieve information from internal and external sources Transformin Analytics g Text Text Content cleaning Analytics Process removing duplicates Selecting attributes discovering patterns Reporting Delivery Figure 2:- Text Analytical Process Where Reporting deals with different mechanisms foe notifying results like dashboards, alerts etc and delivery lies in steps to augment existing data & store enriched information. What goes routers side? Distance vector routing algorithm uses a router algorithm [9] in which the router periodically sends routing updates to all kin by broadcasting their entire route tables. Some sort of time gaps called periodic updates is maintained before next transmission. And this time gaps varies from varied companies as ranges 10 seconds for AppleTalk’s RTMP and 90 seconds for Cisco IGRP. So frequent data updating and their broad cast leads to congestion and CPU overload. So how this all communication is possible, the simplest is to air out the updates to the broadcast address on an IP like 255.255.255.255, the neighboring kin with same mask or routing protocol will hear the broadcast. The Figure 3 is a pictorial representation of points on a LAN which is either wired or wireless and the second one carries processed data depicting a of the axes and the position of nodes on the matrix, Consider four routers joined in a network like In this network we have 4 routers A, B, C, and D 284
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME From Via Via Via Via A A B C D To A To B 3 To C 23 To D Figure 3:- Local Area Networks Representation We shall mark the current time (or iteration) in the algorithm with T, and shall begin (at time 0, or T=0) by creating distance matrices for each router to its immediate neighbors. As we build the routing tables below, the shortest path is highlighted in the boxes. From Via Via Via Via From Via Via Via Via From Via Via Via Via B A B C D C A B C D D A B C D To A 3 To A 23 To A To B To B 2 To B To C 2 To C To C 5 To D To D 5 To D Figure 4:- Distance Matrices Rather as describes above sending the information from one node to another in distance vector routing, the following diagram shows the presence of routers in a matrix and determining the presence of next kin with the help of weightshort algorithm and dynamically locating the router with an walk and as soon as we visit the router closest to former a procedure call sends the information to next level and reaches a stage of calculated stratum carrying the router details in a matrix. Pictorial Representation of neighboring element in 3-D Figure 5:- Density of Data Figure 6:- Representation of Data The paper presents a data structure that helps us in locating a next neighboring element while adopting a technique that either we can find the next kin if we have a walk towards column side or row side or diagonally but while traversing, the rules we must kept in our mind is that no repetitions 285
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME should occur in forming pairs. Figure: -5 describe density of the data in three of axis, the first pie describes the region with probability of existence of data is most and decreasing respectively for axis (x, z) and (y, z).Figure 6 is pictorial representation of data in all axis, the operations that can be applied on one segment can be applied on last 2 segments. Actually, what we are doing is traversing each cell of matrix in symmetry where first walk visits the cell (1, 1), next walk carries cell like (2,1), (2,2),(1,2) and the next contains (3,1),(3,2),(3,3),(2,3),(1,3) and so-on. And the walks increasing its path elements in odd pattern like (1, 3, 5, 7, 9….) and it goes high as we increase the size of the matrix or data grows. Walks help us in visiting each of the cells in the matrix but determining the relation between former and the new element is only done through checks like:- 1).Checking existence of the next element in the same row. 2). Checking existence of the next element in same column. 3). Checking existence diagonally left or diagonally right. By going through checks these things must be kept in mind that while creating a pair no repetition of the same pair should occur. In Continuation to search for neighbor element we have to walk on data structure which should have moves like listed below for figure 2. *(1, 1) (2, 1), (2, 2), (1, 2) (3, 1), (3, 2), (3, 3), (2, 3), (1, 3) (4, 1), (4, 2), (4, 3), (4, 4), (3, 4), (2, 4), (1, 4) and So-on. For a data structure with moves as above mentioned the following techniques works. Suppose ‘n’ is the number of cells in a cube,Then the calculation x= √݊ ,y= 2(x)-1 ,y1=y-2, y2=y1-2, y3=y2-2 and so-on So the data structure inside this cube is growing its cells size in odd symmetry like {y1, y2, y3,yn} for instance, suppose we are with total no of cells=49 x=√49, x=7,y=2(7)-1, y=13,y1=y-2, y1=13-2, y1=11 y2=y1-2, y2=11-2, y2=9 and so-on. And we are with results like {13, 11, 9, 7, 5, 3, 1} in decreasing order or counter clock wise {1, 3, 5, 7, 9, 11, 13} whose first value 1 represents first cell with data in (1,1) position next element 3 defines 3cells with corresponding data in three positions like (2, 1), (2, 2), (1, 2) and we are with symmetry defined above*.The following algorithm describes the search for the next neighbor position in x-y axis and can be implemented for left y-z, z-x axis. II. WIGHT SHORT ALGORITHM NeighbourPosition (row col, new, temp, nextval, llist) { Consider any axis and move the pointer from left to right in row direction and step down to column when value of the both the x, y becomes same i.e. (2, 2), (3, 3) so-on and with tautology . “row=column+1” //row, col is used for row and column pointers //j is a set containing values {1, 3, 5, 7, 9, 11, 13} as discussed above. //new, temp and nextval are temporary location just used for storing and determine relationships. //llist is the structure storing the data available on first router. //First Half Struct llist { int hop;// path determination int destination;//flag variable struct llist *ptr; } count=0; for (row=1,j=1; row<=x; row++,j+2) { for (col=1;col<=row; col++) { ++count; temp=cube [row, col]; //Checking existence of the next element in //the same row. 286
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME //Row Check //temp= (a, b) //nextval= (a, b+1) if element exists temp->nextval(neighbor) llist(a,b)<-llist(a,b+1);//data shifted to next higher node on row check // Checking existence of the next element in //same column. //Column Check:- temp= (a, b) nextval= (a+1, b)//if element exists temp->nextval(neighbor) llist(a+1,b)<-llist(a,b);//data shifted to next higher node on column check //Checking existence diagonally left or //diagonally right. //Diagonal Check //Left Diagonal Check temp= (a, b) nextval may be at (a+1, b-1).//if element exists temp->nextval (neighbor) //Right diagonal Check temp= (a, b) nextval may be at (a+1, b+1)//if element exists temp->nextval (neighbor) } //Last Half If (count<j) {new=j-count)} for (left=1, left<=new; left++) cube [row-1, row] //Checking existence of the next element in //the same row. //Row Check //temp= (a, b) //nextval= (a, b+1) if element exists temp->nextval (neighbor) // Checking existence of the next element in //same column. //Column Check:- temp= (a, b) nextval= (a+1, b)//if element exists temp->nextval(neighbor) //Checking existence diagonally left or //diagonally right. //Diagonal Check //Left Diagonal Check temp= (a, b) nextval may be at (a+1,b-1).//if element exists temp->nextval(neighbor) llist(a+1,b-1)<-llist(a,b);//data shifted to next higher node on diagonal left check //Right diagonal Check Figure 7:- Weight Short Algorithm temp= (a, b) nextval may be at (a+1, b+1)//if element exists temp->nextval(neighbor) llist(a+1,b+1)<-llist(a,b);//data shifted to next higher node on diagonal right check } } Figure 7:- Weight Short Algorithm 287
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME The algorithm is divided in two halves, the first half describing the cases like For traversing up to (3, 3) the first half bring values like (1, 1) (2, 1), (2, 2) (3, 1), (3, 2), (3, 3) Rather we are in need of (1, 1) (2, 1), (2, 2), (1, 2)* (3, 1), (3, 2), (3, 3), (2, 3)*, (1, 3)* So second half of the algorithm helps us in determine left marked columns. Note: - this might be the case if at positions we don’t find any element either on the row, column or towards its left diagonal or right diagonal then in that case the particular position is just simply added to penultimate element. Start Promenade starts at cells (1,1),(2,1),(2,2).cell(mxn) llist(a,b)<-llist(a,b+1);//data Is temp shifted to next higher node ROW reaches YES on row check mxn NO NO llist(a+1,b)<-llist(a,b);//data shifted to next COLUMN higher node on column check llist(a+1,b-1)<- Display the timing for visiting the DIAGONAL routes llist(a,b);//data shifted to next higher node Stop Figure 8:- Flow Chart for Weight Short Algorithm III. CONCLUSION The theory or computational logic helps one in designing games, or help user in determining next neighboring element in finite passes and one can work on logic and with better time complexity and one can work upon the new ways for keeping records in user defined structures illustrates a post calculated stratum which works on a representation of 2-D 288
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME points to. Paper determines the next neighboring element with the lowest traverse value. Weight Short Algorithm traverses the whole matrix in an odd promenade and works out on traversed data in knowing the closest kin without sending the load of number of hopes or joined kin to next neighboring element as it is with case of distance vector routing. This all is done under umbrella of constraint that the existence of next node can be determined on same columns/rows in a matrix or may be locate the element at sloping position, if still not found, Some row or column shifts as per algorithm such that no repetition of the same pair should occur. REFERENCES [1]. Structure, Models and Meaning: Is "unstructured" data merely unmodeled? Intelligent Enterprise, March 1, 2005. th [2]. 14 PNEC Conference “The challenges of Structured and Unstructured Data” 2010. [3]. K.L.Bansal, Chaman Singh, “Dual Stack Implementation of Mobile IPv6 Software Architecture”, Foundation of Computer Science IJCA- Volume 25, No 9, July 2011. [4]. K.L.Bansal, Chaman Singh, “NAT Traversal and Detection on Dual Stack Implementation of Mobile IPv6”, Foundation of Computer Science IJCA- Volume 29, No 7, September 2011. [5]. Chaman Singh, S Kumar, S Kumar, K.L.Bansal,” Design and Implementation of Mobile IPv6 Data Communication in Dual Networks”, IJCSI -Volume 1, Issue 9, Page N0. 182- 190, January 2012. [6]. Ledion Bitincka, Archana Ganapathi, Stephen Sorkin and Steve Zhang. “Optimizing Data Analysis with a Semi-structured Time Series Database”, [7]. Chaman Singh, K.L.Bansal,”NAT Traversal Capability and Keep-Alive Functionality with IPSec in IKEv2 Implementation”, IJCSCN -Volume 2, Issue 1, Page N0. 99-110, February 2012. [8]. Chaman Singh, K.L.Bansal,” Linux Based Implementation and Performance Measurements of Dual Stack Mobile IPv6”, IJCSCN -Volume 2, Issue 2, Page N0. 240-255, April 2012. [9]. “A more Efficient Distance Vector Routing”, Zhengyu Xu,Sa Dai Computer Engineering Department School of Engineering University of California. [10]. Rahul Jassal, Chaman Singh “Pretext Knowledge Grids on Unstructured Data for Facilitating Online Education” IOSR Journal of Computer Engineering ISBN: 2278- 8727Volume 5, Issue 5 (Sep-Oct. 2012), Page No. 22-27. AUTHORS PROFILE Rahul Jassal is working as Assistant Professor in Department of Computer Science & Application, Panjab University Regional Centre, Hoshiarpur, India. He received Master of Computer Application in year 2007 and clear the UGC-NET examination for subject “Computer Science & Application in the same year. He is with the post from last 5 years. 289
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Chaman Singh (B.Sc., MCA, NET, Ph.D.) Has received the Master of Computer Application Degree in 2007 and completed Ph.D. in Computer Science 2012 from Department of Computer Science H.P.University Shimla, India. He also qualified UGC NET 2006. Have more than 4 years of Working Experience in Teaching, Guidance for PGDCA, MCA, BCA students, Software Development (Programming) and Networks. Published number of National and International Papers in like IJCA, IJCSI, IJCSCN, IJCSE, IOSR etc 290