-
Orchidaceae family in Imphal East, Manipur.
Laiphrakpam Linthoingambi ; Dr. Ajit Kumar Das ; Professor Ghosh S.K. ; Professor P. K. Singh
Applied Science
Year: 2015, Volume:1, Issue : 9
Pages: 183 - 185
Orchids are herbaceous plants found mostly as epiphytic, terrestrial and saprophytic, belonging to the familyOrchidaceae constituting the second largest family in flowering plants under the order Asparagles. They are cosmopolitan throughout the world with an about 10,000 genera, and 25,000- 35,000 species. They are in high demand due to their extraordinary flowers which exhibit an incredible range of diversity in shape, size and the colour of their flowers. The present paper deals with the survey conducted on Orchid flora in the ImphalEast, Manipur. During the survey a total of 34 orchid species belonging to 18 genera were recorded.
Read More...
-
Survey on Range Free-Localization Schemes Based on Anchors Count in WSN Model
Yuvashree A K ; Venkatakrishnan M
Electronics & Communication Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 186 - 192
The range-free localization algorithm in wireless sensor network tolerates network anisotropy with a small number of anchors and range-free approaches exploit network connectivity information (i.e., the hop count of the shortest path between nodes) to localize normal nodes with a limited number of anchors in large-scale networks. The localization algorithm calculates location accuracy and localization performance under particular level demonstrated by both theoretical analysis and simulations. In this paper we present some of the basic range free localization algorithms available in wireless sensor networks.
Read More...
-
Comprehensive Model Of Intelligent Counselor
Rajput Alpaba C.
Computer Science and Application
Year: 2015, Volume:1, Issue : 9
Pages: 193 - 197
Higher education industry in India has been given a boost in the past couple of decade. Due to the tremendous increased number of HEI and courses around, it is difficult for students to select appropriate choice for branch and college which best suit their need. In Gujarat for engineering admission “Admission committee of professional courses (ACPC)†conducts online admission procedure. Due to lack of awareness, experience and absence of proper evaluation channel, at a time of selection procedure eligible candidates get droop in allotment process. Paper include descriptive model of intelligent counselor works as an intelligent advisory which candidate can utilize to receive approbation of a certain choice of colleges and branches in which he/she would likely succeed by self-assessment. Different factors that influencing the selection of specific course or college were converted into computer coding by which system identify students interesting pattern of selection and apply expert system to choose appropriate branch and college with respect to given pattern of interest ,where students have large degree of chances of admission and success . Feed forward multilayer Neural Network techniques have been used with an aim to find the structures and relationships among the student interest and available choice of college or branch of engineering.
Read More...
-
Towards the Analysis of Replication
Seema Rani
Computer Science Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 198 - 201
The visualization of 802.11 mesh networks is an important question. Given the current status of linear-time communication, system administrators famously desire the simulation of symmetric encryption. We present a heuristic for the improvement of symmetric encryption, which we call SIS.
Read More...
-
Privacy Preserving Distributed Data Mining Techniques
Tank Mayurkumar Bhagavanjibhai ; Tushar A. Champaneria
COMPUTER SCIENCE AND ENGINEERING
Year: 2015, Volume:1, Issue : 9
Pages: 202 - 206
The aim of Privacy Preserving Distributed Data Mining is to extract relevant knowledge from large amount of data while protecting at the same time sensitive information. Due to personal interests, medical databases or business interest privacy is needed. Due to privacy infringement while performing the data mining operation this not often possible to utilize large databases for scientific or financial research. For better decision making we need to perform multi-party computation by combining the database of two or more than two parties, which cannot guarantee security. To address this problem, several privacy preserving data mining techniques are used. In this survey paper, various privacy preserving techniques are reviewed and, also open challenges related to privacy when performing data mining are discussed.
Read More...
-
Implementation of Data Mining Algorithm to Analysis Breast Cancer
K.Shiny ; M.Swaminathan; N.Siva Kumar; L.Thiyagarajan
DATA MINING
Year: 2015, Volume:1, Issue : 9
Pages: 207 - 212
The aim is to evaluate the analytical data to see if the domain can be a subject to data mining. The next step is to evaluate several data mining methods with respect to their applicability to the given data. This is to show which of the techniques are particularly usable for the given dataset. Finally, the research aims at extracting some tangible medical knowledge from the set. The research utilizes a data warehouse to store the data. The data is accessed via the ETL process. The performance of the data mining models is measured with the use of the lift charts and confusion (classification) matrices. The medical knowledge is extracted based on the indications of the majority of the models. The experiments are conducted in the Microsoft SQL Server 2005.The data mining models were not unanimous about patterns in the data. Thus the medical knowledge is not certain and requires verification from the medical people. However, most of the models strongly associated patient's age, tissue type, hormonal therapies and disease in family with the malignancy of cancers. The next step of the research is to present the findings to the medical people for verification. In the future the outcomes may constitute a good background for development of a Medical Decision Support System.
Read More...
-
A Study on Sentiment Analysis using Tweeter data
Dr. H S Guruprasad ; Suprajha S; Yogitha C; Architha J Sanghvi
Computer Science Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 213 - 218
Twitter is a popular micro blogging service where users create status messages (called “tweetsâ€). Tweets are short messages with a maximum length of 140 characters. The distinguishing characteristics of tweets are hashtags. Hashtags are used for logically grouping tweets and searching them. Authors of those messages write about their life, share opinions on variety of topics and discuss current issues. As more and more users post about products and services they use, or express their political and religious views, micro blogging websites become valuable sources of people’s opinions and sentiments. Such data can be efï¬ciently used for marketing or social studies. As a result, there has been a tremendous need to design methods and algorithms which can effectively process a wide variety of text applications.
Read More...
-
A Survey of Attacks in Mobile Ad Hoc Network
Riteshkumar Vasava ; Pradeep Gamit
Computer Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 219 - 223
This paper is a survey of attacks in Mobile Ad Hoc Network (MANET). A mobile ad hoc network is a self-constructed network. MANET is connected with mobile device. It’s also called a node. All nodes pretend as both communications and router. MANET is an open network because there is an absence of centralized administration, due to these MANETs is attacks by malicious nodes. There are many attacks which are implemented by those malicious nodes like. Blackholl attack, Flooding Attack Replay Attack, Link Spoofing Attack. These research papers provide an overview of Attack in MANET.
Read More...
-
Using Support Vector Machine and Naive Bayes Classification for Intrusion Detection
Aman Mudgal ; Rajiv Munjal
computer science
Year: 2015, Volume:1, Issue : 9
Pages: 224 - 227
For identifying the various attacks involved in a particular network, Intrusion Detection System is used. The role of Intrusion Detection System (IDS) is identified and prevent the malicious or un-authorized user to access the system. The data present on web or other data on the system or the data on a network of systems have many complicated and structural relations. To uniquely and properly identify the intrusion in a network it is necessary to understand the structural relationship between the data types and many algorithms based for clustering data neglect the relation among the individual data types. A defensive layer, or in other words the preventive layer is made between the data and data types by Intrusion Detection System; this ensures the unauthorized and unauthenticated users to have access for the system. These unauthorized users can be easily detected by sensing and sending a Alert Message, Operator to the Administrator. The Support Vector Machine and Naïve Bayes Classification are defined as the two techniques which can be used to create a valuable Intrusion Detection System. The proposed System accepts Fuzzy K-Means clustering algorithm which accepts either Support Vector Machine or Naïve Bayes Classifier to detect the malicious Users. The administrator would have the complete data set which will help out to detect the malicious users after complete scanning and authorization of user. If any type of user with different data sets trying to access system, then can be considered as a Intrusion Detection. In this paper we combine two of the efficient data mining algorithms and make a hybrid technique for the detection of intrusion called fuzzy k-means, Naïve Bayes Classification and Support vector machine.
Read More...
-
Highway Alignment Using Remote Sensing and Geographical Information System
K.Rajadurai ; J.Colins Johnny
CIVIL ENGINEERING
Year: 2015, Volume:1, Issue : 9
Pages: 228 - 234
The aim of this project is to identify and map the suitable highway construction site by using Remote Sensing and Geographical Information System in the Chettikulam junction to kottar, Agastheeswaram Taluk, Kaniyakumari District, Tamilnadu. Remote sensing and GIS model for route location and highway alignment was developed and used to generate alternate highway route applications.. Geographic Information Systems (GIS) can easily model such variables, including topography, environment, built-up areas, and geology. Planning a new road or highway can be expensive and time consuming process. There are numerous environmental issues that need to be addressed. GIS, a powerful tool for the compilation, management and display data associated with geographic space, is used for the preparation of digital maps and analysis purposes. The conventional manual methods were difficult, time consuming and expensive. In this project the shortest and the economical path is identified using GIS software. The factors considered are mainly related to the land use, geology, land value and soil. The weights and ranks are assigned to each of the above themes, according to expert opinions, for GIS analysis. After assigning weights and ranks these themes are overlaid to get a suitability overlaid map. The final overlaid will have the most suitable area to align the highway.
Read More...