Learn More
— Data Mining can be defined as an activity that extracts some new nontrivial information contained in large databases. Traditional data mining techniques have focused largely on detecting the statistical correlations between the items that are more frequent in the transaction databases. Also termed as frequent itemset mining , these techniques were based(More)
Content based image retrieval CBIR has been one of the most important research area in the field of computer science. There were many CBIR techniques have been proposed in the last decade. In this paper we propose a CBIR method which is modified form of color averaging technique. In previous color averaging techniques e.g. row mean, column mean ,forward(More)
— Digital images are noisy due to environmental disturbances. To ensure image quality, image processing of noise reduction is a very important step before analysis or using images. Data sets collected by image sensors are generally contaminated by noise. Imperfect instruments, problems with the data acquisition process, and interfering natural phenomena can(More)
— In this current era of software development, a large number of life cycle models are available for the systematic development of computer software and projects. SDLC models give a theoretical guide line regarding development of the software. SDLC models are very important for developing the software in a systematic manner such that it will be delivered(More)
Interesting change has come in Natural Language Processing (NLP) has seen in both research direction and methodology in the past several years. Increased work in computational linguistics tended to focus on purely symbolic methods. Now various work is shifting toward hybrid methods that combine new empirical corpus-based methods, including the use of(More)
In many areas of commerce, government, academia, and hospitals, large collections of digital images are being created. Many of these collections are the product of digitization of existing analogue photographs, diagram, drawings, paintings, and prints. Usually these collections were merely searched by means of textual annotations. This huge digital image(More)
In early frameworks, at the season of data transmission between two armed force stations, it can be hacked by terrorists, spies and foes. Cryptography is an imperative framework utilized for this reason. There are different sorts of calculations accessible for encryption and unscrambling of information i.e. Decryption and new calculations or algorithms are(More)
  • 1