oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Search Results: 1 - 10 of 1606 matches for " Sukhpreet Kaur? "
All listed articles are free for downloading (OA Articles)
Page 1 /1606
Display every page Item
Study on Various Web Mining Functionalities using Web Log Files
Supinder Singh,Sukhpreet Kaur
International Journal of Computer Science and Mobile Computing , 2013,
Abstract: As the size of web increases along with number of users, it is very much essential for the websiteowners to better understand their customers so that they can provide better service, and also enhance thequality of the website. To achieve this they depend on the web access log files. The web access log files can bemined to extract interesting pattern so that the user behavior can be understood. This paper presents anoverview of web usage mining and also provides a survey of functionalities that are associated with web logfiles used for web usage mining.
Study on Various Glass Defect Using Glass Edge Detection Methods
Sumeet Singh Tiwana,Sukhpreet Kaur
International Journal of Computer Science and Mobile Computing , 2013,
Abstract: Glass defects are a major reason for poor quality and of embarrassment for manufacturers. It is atedious process to manually inspect very large size glasses. The manual inspection process is slow, time consumingand prone to human error. Automatic inspection systems using image processing can overcomemany of these disadvantages and offer manufacturers an opportunity to significantly improve quality andreduce costs. In this paper we review various glass defects and the possible automated solutions using imageprocessing techniques for defect detection.
Role of medicine information in pharmaceutical industry
Sukhpreet,Tiwari P
Indian Journal of Pharmaceutical Sciences , 2006,
Abstract: Medicine information is the provision of unbiased, evidence-based and critically evaluated information about medicines. Medicine information pharmacists have a wide spectrum of activities, i.e., answering enquiries, proactive provision of information, adverse drug reaction reporting, provision of a medicine helpline for public, support for drug and therapeutic committees and training and education. Apart from these usual responsibilities, medicine information pharmacist now provides information to drug discovery and development departments in the pharmaceutical industry. This article illustrates various roles of medicine information in the pharmaceutical industry.
Image Compression Using Color Correlation & Image Decomposition
Sukhpreet Singh,Balwinder Singh
International Journal of Computer Technology and Applications , 2012,
Abstract: Digital images contain large amount of information that need evolving effective techniques for storing and transmitting the ever increasing volumes of data. Image compression addresses the problem by reducing the amount of data required to represent a digital image. The uncompressed image data requires a large storage capacity and transmission bandwidth. The purpose of the image compression algorithm is to reduce the amount of data required to represents the image with less degradation in the visual quality and without any information loss. In a monochrome image, the neighboring pixels are more correlated. The discrete cosine transform (DCT) and wavelet transform are commonly used to reduce the redundancy between the pixels and for energy compaction. The JPEG standard uses the DCT and the JPEG2000 standard uses the wavelet Inter Color Correlation Based Enhanced Color In a color image, correlation exists between the neighboring pixels of each color channel and as well as between the color channels But pixels beyond the neighbor matrix will not match so we will introduce a new method that is based on the image byte streaming and color correlation
Treatment and monitoring costs in rheumatoid arthritis: Preliminary results from an Indian setting
Sukhpreet,Agarwal V,Tiwari Pramil
Indian Journal of Pharmaceutical Sciences , 2007,
Abstract: The aims of this study were to determine the total cost of drug treatment in patients of rheumatoid arthritis, to estimate the costs of management of gastrointestinal side effects of non-steroidal antiinflammatory drugs and to estimate the cost of monitoring the side-effects of disease modifying antirheumatic drugs. The original prescription of the patients was used to calculate the direct cost of treatment. For calculating the indirect cost, the patients were interviewed. The cost of monitoring the side-effects was also calculated from the patient records. The study was carried in out patient department of a government teaching hospital. A total of 96 patients were recruited in this study between August-November 2003. The average total cost of drug treatment was found to be Rs.999±76 per month. The average monthly direct cost of rheumatoid arthritis was estimated to be Rs. 623±31. The average indirect cost was found to be Rs.368±62 per month. The average iatrogenic cost factor value was found to be 1.78. The average monthly cost of monitoring side-effects in patients prescribed with disease modifying antirheumatic drugs was Rs. 57 per patient. The study provides preliminary results for costs of drug treatment and monitoring in patients suffering from rheumatoid arthritis.
Providing Security in Data Aggregation using RSA algorithm
Sukhpreet Singh,Er. Kumar Saurabh
International Journal of Computers & Technology , 2012,
Abstract: The RSA algorithm proposed by Rivest, Adi Shamir and Leonard Adleman is cryptography technique. The current problem with wireless sensor network is how to protect the security of the sensor data. RSA algoritm is used as a digital signature authentication in the field of security, basically works on deciding encryption variable. In this also the basic concept is to decide a description variable and then decide the description variable using same encryption variable. It is a secure and fast cryptographic system. The major effort will be applied on the RSA encryption technique in order to make node authenticated as well as to secure data while dealing with aggregation.
Advances in Intrusion Detection System for WLAN  [PDF]
Ravneet Kaur
Advances in Internet of Things (AIT) , 2011, DOI: 10.4236/ait.2011.13007
Abstract: A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. Cross layer based technique help to make decision based on two layer physical layer where we compute RSS value and on MAC layer where one compute RTS-CTS time taken. This will reduce the positive false rate.They detect attempts and active misuse either by legitimate users of the information systems or by external. The paper has higlighted the advances in intrusion detection in wireless local area network.
Role of Cross Layer Based Intrusion Detection System for Wireless Domain  [PDF]
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2012, DOI: 10.4236/ijcns.2012.52010
Abstract: Wireless mesh networks are very common both for organizations and individuals. Many laptops, computers have wireless cards pre-installed for buyer. However a wireless networking has many security issues. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. They detect attempts and active misuse either by legitimate users of the information systems or by external. The present paper deals with cross layer based intrusion detection system for wireless domain—a critical anlaysis. The present paper deals with role of cross layer based intrusion detection system for wireless domain.
REVIEW OF DATABASE AND PROMINENT PROGRAMMES
Dr. Vinod Kumar,Gagandeep Raheja,Sukhpreet Singh
International Journal of Computers & Technology , 2013,
Abstract: Databases and database systems have become an essential component of everyday life in modern society. In the course of a day, most of us encounter several activities that involve some interaction with a database. For example, if we go to the bank to deposit or withdraw funds, if we make a hotel or airline reservation, if we access a computerized library catalog to search for a bibliographic item, or if we buy some item such as a book, toy, or computer- form on internet vendor through it Web page, there might be chances that our activities will involve someone or some computer program accessing a database, even purchasing items from a supermarket nowadays in many cases involves an automatic update of the database that keeps the inventory of supermarket items. So in this paper we will talk about how to manage the different type of data involved in any form in the database.
CRITICAL STUDY ON DATABASE AND PROMINENT PROGRAMMES
Dr. Vinod Kumar,Gagandeep Raheja,Sukhpreet Singh
International Journal of Computers & Technology , 2013,
Abstract: The people who work with computers, the programmers, analysts, and operators who seem to live by rules of their own and seldom leave their own environment, tend to be very cynical towards the stories of electronic brains. This attitude will appear hardly surprising when one eventually learns that the computer is a very simple device and is as far removed from an electronic brain as a bicycle from a spaceship. Programmers in particular are the people most aware that computers are no substitute for the human brain; in fact, the preparation of work to be run on a computer can be one of the most mind-bending exercises encountered in everyday life. Databases and database systems have become an essential component of everyday life in modern society. In the course of a day, most of us encounter several activities that involve some interaction with a database. So in this paper we will talk about how to manage the different type of data involved in any form in the database.
Page 1 /1606
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.