<?xml version='1.0' encoding='UTF-8'?><rss version='2.0'><channel><title>Volume 1 Number 6 (September 2015)</title>
		<link>http://ijaems.com/</link>
		<description>Open Access international Journal to publish research paper</description>
		<language>en-us</language>
		<date>September 2015</date><item>
		<title>Different Attacks in the Network: A Review</title>
		<description>Network security is protection of the files which can be stored information in network against hacking, misuse. Network security involves the authorization or access to data which is controlled by the network administrator. Users are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Today anyone person can become a hacker which downloading tools from the internet. Nowadays security is becoming vital in case of networking because everyday a new kind of attack is generated which leads to compromise our network and have security in network is decreasing because of increase in number of attacks. In this paper we have shown the comparison between different types of attacks in a network in a tabular form.</description>
		<link>http://ijaems.com/detail/different-attacks-in-the-network-a-review/</link>
		<author>Mohit Angurala, Gurinderjit Kaur</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1452742746-1 IJAEMS-SEPT-2015-3-Different Attacks in the Network_ A Review.pdf</pdflink>
                
		</item><item>
		<title>Experimental investigation of Waste Transformer Oil as alternative Fuel in a DI Diesel Engine</title>
		<description>This paper reports on the Waste transformer oil fuel is blended with diesel fuel in different percentage and the effects of their operational characteristics and performance and emission characteristics of the DI diesel engine. In this study, the tested fuels were obtained through catalytic cracking process. Experimental results showed that the flash points and cetane number of the WTO blended diesel have increased with higher concentration of WTO. Based on the experimental results, HC, CO and NOx emissions noticeably decrease, while smoke emissions dramatically increase with increasing the dosing level of WTO. At the full load, the magnitude of HC, CO and NOx emissions for the neat diesel was 120 ppm, 0.36 (%by volume)  and 1130ppm, whereas it was 68 ppm, 0.17 (%by volume) and 410ppm for the WTO20 fuel, respectively. The results also showed a significant enhancement in brake thermal efficiency and heat release rate due to the influence of the WTO20 in diesel blend.</description>
		<link>http://ijaems.com/detail/experimental-investigation-of-waste-transformer-oil-as-alternative-fuel-in-a-di-diesel-engine/</link>
		<author>Shubham Singh, C. Syed Aalam, Ankit Kumar</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1452742942-2 IJAEMS-SEPT-2015-2-Experimental investigation of Waste Transformer Oil as alternative Fuel in a DI Diesel Engine.pdf</pdflink>
                
		</item><item>
		<title>Mining Consumer Knowledge from Shopping Experience: A case study on Indian E_Commerce Industry</title>
		<description>E_Commerce becomes far much popular in recent years. E Commerce nowadays is almost everywhere. People go through online ; meanwhile, they are more and more accustomed to buy goods via E_Commerce channel. - The E-Commerce web sites are facing lots of problems today. Customers prefer traditional way to purchase the products and not from E-Commerce web sites. If we see the history of E-Commerce, then we get that E-Commerce is the purpose of Internet and the web to conduct business Even in recession, it is thriving and has become one of the most important consumption modes. This study uses cluster analysis to identify the profiles of E_Commerce consumers. The rules between E_Commerce spokespersons and commodities from consumers are recognized by using association analysis. Depicting the marketing knowledge map of spokespersons, the best endorsement portfolio is found out to make recommendations. By the analysis of spokespersons, period, customer profiles and products, four business modes of E_Commerce are proposed for consumers: new product, knowledge, low price and luxury product; the related recommendations are also provided for the industry reference.</description>
		<link>http://ijaems.com/detail/mining-consumer-knowledge-from-shopping-experience-a-case-study-on-indian-e-commerce-industry/</link>
		<author>Dr. M.Suresh Babu, Dr. D.Asha Devi, Mr. Mohammad Raziuddin</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1452743095-3 IJAEMS-SEPT-2015-4-Mining Consumer Knowledge from Shopping Experience_ A case study on Indian E_Commerce Industry.pdf</pdflink>
                
		</item><item>
		<title>Review of Image Compression Methods</title>
		<description>Everyday some development is taking place in imaging field. The large volume of data is required to be transmitted. It is therefore, mandatory to compress the data as much as possible without compromising with the quality of an image. General techniques are being developed globally to meet out the modern requirement. This review paper is targeted to make a fruitful investigation  of such compression methods</description>
		<link>http://ijaems.com/detail/review-of-image-compression-methods/</link>
		<author>Ranju Yadav, Prof. Anuj Bhargava</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1452743202-4 IJAEMS-SEPT-2015-10-Review of Image Compression Methods.pdf</pdflink>
                
		</item><item>
		<title>Video Feature Extraction Based on Modified LLE Using Adaptive Nearest Neighbor Approach</title>
		<description>Locally linear embedding (LLE) is an unsupervised learning algorithm which computes the low dimensional, neighborhood preserving embeddings of high dimensional data. LLE attempts to discover non-linear structure in high dimensional data by exploiting the local symmetries of linear reconstructions. In this paper, video feature extraction is done using modified LLE alongwith adaptive nearest neighbor approach to find the nearest neighbor and the connected components. The proposed feature extraction method is applied to a video. The video feature description gives a new tool for analysis of video.</description>
		<link>http://ijaems.com/detail/video-feature-extraction-based-on-modified-lle-using-adaptive-nearest-neighbor-approach/</link>
		<author>Preksha Bohra, Sunil Joshi</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1452743342-5 IJAEMS-SEPT-2015-9-Video Feature Extraction Based on Modified LLE Using Adaptive Nearest Neighbor Approach.pdf</pdflink>
                
		</item><item>
		<title>A Review of Data Security Primitives in Data Mining</title>
		<description>This paper has discussed various issues and security primitives like Spatial Data Handing, Privacy Protection of data, Data Load Balancing, Resource Mining etc. in the area of Data Mining.A 5-stage review process has been conductedfor 30 research papers which were published in the period of year ranging from 1996 to year 2013. After an exhaustive review process, nine key issues were found â€œSpatial Data Handing, Data Load Balancing, Resource Mining ,Visual Data Mining, Data Clusters Mining, Privacy Preservation, Mining of gaps between business tools &amp; patterns, Mining of hidden complex patterns.â€ which have been resolved and explained with proper methodologies. Several solution approaches have been discussed in the 30 papers. This paper provides an outcome of the review which is in the form of various findings, found under various key issues. The findings included algorithms and methodologies used by researchers along with their strengths and weaknesses and the scope for the future work in the area.</description>
		<link>http://ijaems.com/detail/a-review-of-data-security-primitives-in-data-mining/</link>
		<author>Asmita Singh, Anchal Pokharana</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1452743450-6 IJAEMS-SEPT-2015-6-A Review of Data Security Primitives in Data Mining.pdf</pdflink>
                
		</item><item>
		<title>Design and Implementation of Fuzzy Logic Based Image Fusion Technique </title>
		<description>The quality of image holds importance for both humans and machines. To fulfill the requirement of good quality images, image enhancement is needed. Application of a single contrast enhancement technique often does not produce desirable result and may lead to over enhanced images. To overcome this problem image fusion is performed so that better results with desired enhancement can be achieved. In the present paper an amalgamation of image enhancement, fusion and sharpening have been carried out in the candidate algorithm.  The algorithm makes use of fuzzy logic for weight calculation. The results are compared with DACE/LIF approach and it is observed that the proposed algorithm improves the result in terms of quality parameters like PSNR (Peak Signal to Noise Ratio), AMBE (Absolute Mean Brightness Error) and SSIM (Structural Similarity Index) by 0.5 dB, 3 and 0.1 respectively from the existing technique.</description>
		<link>http://ijaems.com/detail/design-and-implementation-of-fuzzy-logic-based-image-fusion-technique/</link>
		<author>Samriddhi Bhatnagar, Navneet Agrawal</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1452743568-7 IJAEMS-SEPT-2015-8-Design and Implementation of Fuzzy Logic Based Image Fusion Technique.pdf</pdflink>
                
		</item></channel>
</rss>