Maharshi Dayanand University, Rohtak

Displaying 1-8 of 8 results

  • White Papers // Feb 2013

    Study and Analysis of Predictive Data Mining Approaches for Clinical Dataset

    Data Mining is an assortment of effective tool set to perform the statistical analysis on an immense dataset and to retrieve the valuable information from the dataset. In this paper, the authors have carried out an analytical survey on predictive data mining approaches on clinical dataset. The clinical dataset processing...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Sep 2012

    High Speed Efficient Data Transmission in MPLS Ring Network

    MPLS Transport Profile is gaining importance as it becomes a dominant solution for a converged transport network. In a high speed network, any disturbance over the network cause heavy data loss, when data is transferring a topology like bus or ring. The chance of data loss increases more in same...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Jul 2012

    A Data Mining Framework for Prevention and Detection of Financial Statement Fraud

    Financial statement fraud has reached the epidemic proportion globally. Recently, financial statement fraud has dominated the corporate news causing debacle at number of companies worldwide. In the wake of failure of many organisations, there is a dire need of prevention and detection of financial statement fraud. Prevention of financial statement...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // May 2012

    An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques

    Now-a-days, the vital parts of the business programs are the data warehouses and the data mining techniques. Especially these are vital in the Radio Frequency IDentification (RFID) application which brings a revolution in business programs. Manufacturing, the logistics distribution and various stages of supply chains, retail store and quality management...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Nov 2011

    Analysis of Various Image Steganography Techniques Based Upon PSNR Metric

    Every common person uses internet directly or indirectly in some spheres of his life. They mainly use the internet for information sharing. Also, information sharing has the primary importance in the field of Military Services, Medical Services, Mobile Services, and Investigation Agencies etc. The main hurdle in the path of...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Oct 2011

    A Novel Approach For Image Steganography In Spatial Do- Main Using Last Two Bits of Pixel Value

    In this paper, a new method for insertion of message in an image is proposed. The authors have used last two bits of pixel for insertion and retrieval of message. This method is an improvement over earlier methods like Least Significant Bit (LSB) method, 6th and 7th bit method and...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // May 2011

    Impact of Node Mobility on Route Lifetime Distribution in Manets Using Qualnet Simulator

    The impact of mobility on link and route lifetimes in ad-hoc networks is of major importance for the design of efficient MAC and network layer protocols. In this paper, the authors' present data gathered from a simulated network of 20 test users and analyze it with regard to link and...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // May 2011

    A New - Knot Model for Component Based Software Development

    Component Based Software Engineering (CBSE) is a process that emphasizes the design and construction of computer based systems using reusable software components. The component is a unit, which is almost independent and may be replaced or changed without affecting the environment. This property motivates the programmer to design and develop...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // May 2011

    A New - Knot Model for Component Based Software Development

    Component Based Software Engineering (CBSE) is a process that emphasizes the design and construction of computer based systems using reusable software components. The component is a unit, which is almost independent and may be replaced or changed without affecting the environment. This property motivates the programmer to design and develop...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Jul 2012

    A Data Mining Framework for Prevention and Detection of Financial Statement Fraud

    Financial statement fraud has reached the epidemic proportion globally. Recently, financial statement fraud has dominated the corporate news causing debacle at number of companies worldwide. In the wake of failure of many organisations, there is a dire need of prevention and detection of financial statement fraud. Prevention of financial statement...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Feb 2013

    Study and Analysis of Predictive Data Mining Approaches for Clinical Dataset

    Data Mining is an assortment of effective tool set to perform the statistical analysis on an immense dataset and to retrieve the valuable information from the dataset. In this paper, the authors have carried out an analytical survey on predictive data mining approaches on clinical dataset. The clinical dataset processing...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Oct 2011

    A Novel Approach For Image Steganography In Spatial Do- Main Using Last Two Bits of Pixel Value

    In this paper, a new method for insertion of message in an image is proposed. The authors have used last two bits of pixel for insertion and retrieval of message. This method is an improvement over earlier methods like Least Significant Bit (LSB) method, 6th and 7th bit method and...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Nov 2011

    Analysis of Various Image Steganography Techniques Based Upon PSNR Metric

    Every common person uses internet directly or indirectly in some spheres of his life. They mainly use the internet for information sharing. Also, information sharing has the primary importance in the field of Military Services, Medical Services, Mobile Services, and Investigation Agencies etc. The main hurdle in the path of...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // May 2011

    Impact of Node Mobility on Route Lifetime Distribution in Manets Using Qualnet Simulator

    The impact of mobility on link and route lifetimes in ad-hoc networks is of major importance for the design of efficient MAC and network layer protocols. In this paper, the authors' present data gathered from a simulated network of 20 test users and analyze it with regard to link and...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // Sep 2012

    High Speed Efficient Data Transmission in MPLS Ring Network

    MPLS Transport Profile is gaining importance as it becomes a dominant solution for a converged transport network. In a high speed network, any disturbance over the network cause heavy data loss, when data is transferring a topology like bus or ring. The chance of data loss increases more in same...

    Provided By Maharshi Dayanand University, Rohtak

  • White Papers // May 2012

    An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques

    Now-a-days, the vital parts of the business programs are the data warehouses and the data mining techniques. Especially these are vital in the Radio Frequency IDentification (RFID) application which brings a revolution in business programs. Manufacturing, the logistics distribution and various stages of supply chains, retail store and quality management...

    Provided By Maharshi Dayanand University, Rohtak