Data clustering became increasingly important in the field of computational statistics and data mining. Many algorithms have been developed in the literature for clustering where k-means clustering and hierarchical clustering are two well-known algorithms to partition the numerical data into groups. Due to the disadvantages of both categories of algorithms, ...Download Now
In JPEG (DCT based) compresses image data by representing the original image with a small number of transform coefficients. It exploits the fact that for typical images a large amount of signal energy is concentrated in a small number of coefficients. The goal of DCT transform coding is to minimize ...Download Now
Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because, deployed in open and unprotected environment. For these cases, it is necessary to use some mechanism of intrusion detection. Besides preventing the intruder from causing damages ...Download Now
The Internet is used extensively for important services such as banking, business, medicine, education, research, stock trades, weather forecasting etc. Most of these services must be processed in a timely manner. However these services are delayed, degraded and sometimes completely disrupted because of unavailability of internet. The inherent vulnerabilities of ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?