Kakoli Rao

  • Citations Per Year
Learn More
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. HTTP is not only used for communication purpose, it is also used for file/data transfer, chatting, etc. The HTTPS protocol to guarantee privacy and security in(More)
Sensor description represented through semantic technologies in heterogeneous sensor network is a better interoperability mechanism. Through semantic annotation, it is possible to provide context awareness information from sensor networks. This will useful to improve to extract knowledge from sensor data streams and discover new sensor capabilities. We(More)
In data mining, association rule mining is very strong and limited by the huge amount of delivered rules, because of these so many problems facing to implementation. To overcome these drawbacks, several methods were proposed in the literature such as item sets concise, redundancy reduction, and post processing. Based on statistical information by using(More)
Abstrac: The proposed system has addressed issues that are imperative to Grid computing environments by introducing job migration algorithms. The proposed algorithms differ within the manner load balancing is disbursed and is shown to be cost effective in minimizing the response time on Grid environments. The algorithm is enhanced for large-scale systems to(More)
Cloud computing is a new computational paradigm that offers an innovative business model for organization to adopt IT without upfront investments. Despite the potential gain achieved from the cloud computing. It is clearly one of today„s most enticing technology area due, at least in part, to its costefficiency and flexibility. Cloud computing moves the(More)
Image retrieval and related operations are always a 'hotspot' in the information era. Content-based image retrieval (CBIR) is a vastly developing area in the multimedia technology domain. To enhance security, we apply watermarking technique into the retrieval system and propose an approach for JEPG image retrieval. The proposed image retrieval(More)
A Characteristic of the crisp clustering technique is that the boundary between clusters is fully defined. However, in many real-time situations, the boundaries between clusters cannot be clearly identified. Some patterns may belong to more than one cluster. In such cases, the fuzzy clustering method provides a better and more useful method to classify(More)
  • 1