This paper introduces the concept of data colonization which means naturally ordered sub-sequences are grouped together to become a data colony so that any type of searching technique could be applied to any ordered sub-sequence independently.
This paper based on the study in an engineering college is an attempt to demonstrate and encourage the application of QFD for planning and improvement of quality to gain competitive edge by satisfying student needs.
Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security.
There was a model created which allows to forecast turbidity of water pretreated through a specific technological system and the basis of which are information coming out from monitoring of physicochemical parameters of water drawn from the reservoir as well as from monitoring process parameters of water treatment systemabstract should summarize the content of the paper.
Key words: water treatment, water turbidity, technological system, artificial neural network
 Pawełek J.
However,when representing user profiles,many models have utilized only knowledge from either global knowledge base or a user local information This paper work contribute in improving the accuracy of information gather to personalize the user profile by combining the knowledge base and user local instance repository with 2D ontology mining method is introduced: Specificity and Exhaustivity.
In this paper we survey some technical aspects of current content-based image retrieval systems and described the image segmentation in image processing and the features like neuro fuzzy technique, color histogram, texture, and shape for accurate and effective Content Based Image Retrieval System after doing the deep study of related works.
Key words: Content-Based Image Retrieval (CBIR), Neuro Fuzzy, Color Histogram, Texture, HSV Color and Wavelet decomposition, Image Segmentation
 Ying Liua , Dengsheng Zhanga, Guojun Lua, Wei-Ying Mab, "A survey of content-based image retrieval with high-level semantics", The journal of the Pattern Recognition society, Pattern Recognition 40 (2007) 262–282.
 Gonzalez, R.C., Woods, R.E., Digital Image Processing, 2nd Ed, Prentice-Hall of India Pvt.
This paper analyze the performance of security algorithms, namely, AES, DES, BLOWFISH, RSA and MD5 on single system and cloud network for different inputs.
This paper shows uniqueness in each technology and compares with others to show the need for hybrid system (Neuro fuzzy).It gives an insight of different concepts how they are utilized in various fields to yield optimized solution.
Key words: Fuzzy Set, Fuzzy Logic, Fuzzy Rules, Neural Networks, Neural Network Architecture, Learning Methods, Neuro-Fuzzy System
A cross-layer based secure routing mechanism is proposed in this paper which includes passing of the information from physical layer and MAC layer to the network layer.
The role of supply chain management and the concerned risk has been explained at various steps in this paper.
Key words: Supply Chain, Analytical Hierarchy Process, Supply Chain Risks, Supply Chain Risk Management
In this paper, we present algorithms that return the top results for a query, ranked according to an IR-style ranking function, while operating on top of a source with a Boolean query interface with no ranking capabilities (or a ranking capability of no interest to the end user).
In this paper effort has been made to assess degree of corrosion of reinforcement in the gallery of one of the projects in Himalayan region using Half Cell Potentiometer which is a technique, used for assessment of the durability of reinforced concrete and helps in diagnosing reinforcement corrosion
Key words: Corrosion, galleries, half cell potentiometer, reinforcement, rebar.
 ASTM C 876-91 (Reapproved 1999), "StandardTest Method for Half-cell Potentials of UncoatedReinforcing Steel in Concrete," Annual Book ofASTM Standards, 03.02 (2006), 11-16.
 Clemena, G.
This paper describes the needs that demand continued development of DTH, and explains some background on who is involved and what is currently happening in bringing DTH world.
Key words: Advantages, DTH, Players in DTH, Recent developments
 "Bharti Airtel launches DTH service".
The paper focuses on a new appearance model based on Mean Riemannian Covariance (MRC) patches extracted from tracks of a particular individual to capturing from a distance even at low resolution without active co-operation of subjects, has motivated us to use it for re-identification in the computer surveillance network.
Key words: Re-identification, Riemannian manifold, Human detection, Gait, Phase of motion
 Rabiner, L.R., 1989.