Learn More
The vast amount of hidden data in huge databases has created tremendous interests in the field of data mining. This paper discusses the data analytical tools and data mining techniques to analyze the medical data as well as spatial data. Spatial data mining includes discovery of interesting and useful patterns from spatial databases by grouping the objects(More)
Voice over Internet protocol (VoIP) is a new way of communicating. It is a technology that allows users to make telephone calls over an IP network. This paper will describe Voice over Internet Protocol (VoIP) to a level that allows discussion of security issues and concerns. Business concerns of implementing VoIP, components of a VoIP system, and relevant(More)
With the continuous availability of massive experimental medical data has given impetus to a large effort in developing mathematical, statistical and computational intelligent techniques to infer models from medical databases. Feature selection has been an active research area in pattern recognition, statistics, and data mining communities. However, there(More)
In software development industry the steps towards corrective actions for successful software development process comes too late resulting in ineffectiveness, late delivery, over budget and poor quality with reduced capabilities. An early estimation towards software post-release quality can be a useful remedy to maximize the business result by shortening(More)
In today's world, an organization generates more information in a week than most people can read in a lifetime. It is humanly impossible to study, decipher, and interpret all that data to find useful information. By applying data mining techniques people can work on the extraction of hidden, historical and previously unknown large databases. In this(More)
Mobile ad-hoc network (MANET) is a self-deliberate data network, where all nodes behave like host or router. MANET is a collection of number of mobile nodes or devices that randomly generate a temporary network. Security is the fundamental requirement in MANET due to its behavior of changing topology, open medium and lack of centralized authentication. This(More)