An Approach for User Account Customization Using Dynamic Baysian Network
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2014, Vol 4, Issue 5
Abstract
The software personalization is highly demanding in the current scenario that’s why the software giants are being very sensitive toward user’s requirements to customize and deploy the product according to user’s mood and need. In this perspective this paper reflects the user account customization technique using Dynamic Bayesian Network based on observations, which helps to collect probabilities of the next states and transitions on the basis of various outcomes happen on the occurrence of certain events initiated by user.
Authors and Affiliations
Mayank Pathak| TIT, Bhopal, India, Dharmendra N Jha| M. Tech Scholar, TIT Bhopal, India, Bhupendra Verma| Director, TIT Excellence, Bhopal, India
Reduced Area and Improve Delay Module Design of 64 × 16 RAM
This paper describes a new design approach of RAM in which word can be accessed by row decoder & column decoder, which give the concept of 2-Dimentional RAM. The 64 × 16 RAM has 16-bit data length. This can read and...
Practical Implementation and Performance Analysis of Improved-DSR Protocol using ZigBee in Wireless Sensor Network
Wireless sensor networks are self-configuring network of mobile and static nodes connected by wireless link. The communication in WSN is uncertain because established route can be broken anytime. A lot of delay occurs...
Emotion Detection Using EEG Signal Analysis
This paper focus on various techniques for emotion extraction and emotion classification methods using EEG analysis, and various database for EEG are summarized. In the feature extraction techniques, discrete wavelet...
Wideband Printed Monopole Antenna for WLAN Application
This paper present printed monopole antenna with wideband presented for wireless local loop (WLAN) application. The antenna structure consist of rectangular monopole with microstrip feed line for excitation and conduc...
Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery
In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to estab...