This paper a survey of artificial neural network on various welding technology and also discusses the result based on analysis. The role of optimization techniques in concerned domain with experimental analysis is explained. Refer ences-Parikshik dutta, Dilip Kumar pratihar do modelling of TIF welding process using conventional regression analysis and… (More)
This paper presents various approaches and analysis made on infinity with this a new approach towards infinity is presented in this paper. Various curious question about infinity is covered. The impa streams is very special and here an attempt is made to define infinity that will make our vision more specific towards infinity .
Computer viruses are very typical problem for society and this problem is quite typical to solve. There are various reasons due to which this special problem is not getting solved completely .In this paper we will open problems regarding the concerned domain .
In this paper a survey study is made on various issues of mobile malicious codes. Spreading pattern of different mobile viruses is discussed to make a collective analysis of concerned problem and various approaches are also discussed to solve those problems.
Our approach is tried to achieve high accuracy in Student Information System (SIS) in restricted domain. The restriction leads to the question domains and extract answers. NLP queries get handled and get traversed under the various phases under SIS system for answer retrieval in appropriate defined manner. User query profiling, inference rules and framing… (More)
Computer viruses are serious threat for society. There are various procedures that are used for solving this problem. Our purpose here to make a collective look on various pat computer virus detection and mitigation .
Computer viruses are serious threat for society. Computer virus get spread in wired and wireless networks and create various types of threats. For Tackling the problem of malicious activiti propagation modes of viruses in network so that this analysis may lead to design the defensive tool against these attacks.
This paper presents various aspects of mathematical approaches that are used to make analysis of computer viruses. The theory of functions ,logics and the automata theory helps to understand the replicati viruses with this methodology leads to various detection strategies .
Immune system is one of the essential system that is responsible for one's existence. The greatest example of immune system is created by nature itself. Our purpose in this paper is to make study immune system and to converge this study towards computer viruses detection.