We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Data gathering in the real world environment becomes the most complex process where the multiple sensors and devices are exists. This enormous number of sensors and devices gathers the large number of data‟s parallely which leads to complex event processing system. Latency is the biggest problem in the handling of complex event processing system which is(More)
Data mining is an interdisciplinary subfield of computer science. The web services business activity developed by the OASIS (Organization for the Advancement of Structured Information Standards) groups. The framework developed had an initiator, a coordinator, and more than one participant. But with increased number of participants and unlimited number of(More)
As we know that, the process of hiding information behind any one of the multimedia elements is called steganography. It is used in many areas where the security risk is very high. The normal encryption and decryption mechanisms will improve the security but anyone can break the security by analyzing the secret information. Where in steganography the hacker(More)
Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines. Gtalk and Skype are frequently used for this purpose, which is a third party. So, we are utilizing their environment for conferencing. We are in need of a(More)
  • 1