Saturday, September 5, 2015

Special Issue For Data Mining #ijsrd

Dear Researchers/Authors,

IJSRD is promoting a new field of this Digital Generation-“Data Mining”. 

In accordance to it IJSRD is inviting research Papers from you on subject of Data Mining. This is under special Issue Publication by IJSRD. In addition to this authors will have a chance to win the Best Paper Award under this category.

To submit your research paper on Data Mining Click here


 IJSRD

What is Data Mining..?

Data mining (the analysis step of the "Knowledge Discovery in Databases" process. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use.

The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown, interesting patterns such as groups of data records, unusual records and dependencies.The Knowledge Discovery in Databases (KDD) process is commonly defined with the stages:

(1) Selection
(2) Pre-processing
(3) Transformation
(4) Data Mining
(5) Interpretation/Evaluation.

To know more…….

Data mining involves six common classes of tasks:

Anomaly detection (Outlier/change/deviation detection) – The identification of unusual data records, that might be interesting or data errors that require further investigation.

Association rule learning (Dependency modelling) – Searches for relationships between variables. For example, a supermarket might gather data on customer purchasing habits. Using association rule learning, the supermarket can determine which products are frequently bought together and use this information for marketing purposes. This is sometimes referred to as market basket analysis.

Clustering – is the task of discovering groups and structures in the data that are in some way or another "similar", without using known structures in the data.

Classification – is the task of generalizing known structure to apply to new data. For example, an e-mail program might attempt to classify an e-mail as "legitimate" or as "spam".

Regression – attempts to find a function which models the data with the least error.

Summarization – providing a more compact representation of the data set, including visualization and report generation.

Application Areas….


Games

            They are used to store human strategies into databases and based on that new tactics are designed by Computer ( in association with Machine Learning, Artificial Intelligence)

Business

            Businesses employing data mining may see a return on investment. In situations where a large number of models need to be maintained, some businesses turn to more automated data mining methodologies.In business, data mining is the analysis of historical business activities, stored as static data in data warehouse databases. The goal is to reveal hidden patterns and trends. Data mining software uses advanced pattern recognition algorithms to sift through large amounts of data to assist in discovering previously unknown strategic business information. Examples of what businesses use data mining for include performing market analysis to identify new product bundles, finding the root cause of manufacturing problems, to prevent customer attrition and acquire new customers, cross-selling to existing customers, and profiling customers with more accuracy.

Science and engineering

            In recent years, data mining has been used widely in the areas of science and engineering, such as bioinformatics, genetics, medicine, education and electrical power engineering.

Human rights

            Data mining of government records – especially records of the justice system (i.e., courts, prisons) – empowers the revelation of systemic human rights infringement in association with era and publication of invalid or deceitful lawful records by different government organizations

Medical data mining

            Some machine learning algorithms can be applied in medical field as second-opinion diagnostic tools and as tools for the knowledge extraction phase in the process of knowledge discovery in databases.

Spatial data mining

            Spatial data mining is the application of data mining methods to spatial data. The end objective of spatial data mining is to find patterns in data with respect to geography. So far, data mining and Geographic Information Systems (GIS) have existed as two separate technologies, each with its own methods, traditions, and approaches to visualization and data analysis. Data mining offers great potential benefits for GIS-based applied decision-making.

Temporal data mining

            Data may contain attributes generated and recorded at different times. In this case finding meaningful relationships in the data may require considering the temporal order of the attributes.

Sensor data mining

            By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms.

Visual data mining

            During the time spent transforming from analogical into computerized, vast datasets have been created, gathered, and stored finding measurable patterns, trends and information which is covered up in real data, with a specific end goal to manufacture prescient formations(patterns).


Friday, September 4, 2015

Now, a dedicated lifetime online space for science research scholars to share their work globally #ijsrd

IJSRD is an India's leading open access e-journal for all kinds of science, engineering & technologies manuscript. We publish original and high quality papers.


International Journal for Scientific Research & Development (IJSRD) is one of the leading e-journals which offers new ideas of current trends in Engineering and Science through published research papers with authentic data and pure knowledge. This online journal in the internet space is made available for all interested research scholars who look forward to showcase and share their work with their peer groups and others working in the same space across the globe.


At IJSRD, an exhaustive list of executive board members is available who were invited from a wide range of colleges, universities and research organizations to supervise the content. This online journal has proven to be extremely helpful for scholars and research students who call for research papers in their undergraduate, post graduate and higher levels of education. The original and supreme quality research papers that are uploaded and submitted in IJSRD are aimed at providing an outstanding all-round development to the students and research scholars in the field of Engineering and Technologies.


IJSRD is a monthly journal, publishes one issue per month. The precise and analytical narration of knowledge given by the reviewers in the journals make them more credible. IJSRD, touted as one of the premium online destinations for Journal of Science, has received about 19,255 papers and has about 27063 authors. The total number of accepted papers is 6473 till date.


IJSRD is easy to use and an open access peer reviewed International Journal wherein the research scholars are given the opportunity of downloading any relevant article or research paper from the website free of cost. These scholars are also allowed to submit their research papers online and generate an e-certificate online at any given point of time. One of the major highlights is that of referring to the statistics for each of the authored articles and papers and checking the status of the paper submitted online. 


For further details call us on +918866191212 or IJSRD can be contacted at info@ijsrd.com.

For more information, visit: http://www.ijsrd.com

Tuesday, September 1, 2015

AODV Routing Protocol in VANETs in Comparison with OLSR and DSR #ijsrd

IJSRD Recently Published Good Article on AODV which shows the comparison with OLSR and DSR


Title : Earthquake Risk Reduction Development and Disaster ManagementProgramme in India

Abstract :- Vehicular Ad hoc Network (VANET) is a new communication paradigm that enables the communication process between these vehicles which acts as nodes in the network. Various methods of data dissemination in VANET are used to inform the vehicles about the dynamic road traffic conditions for achieving safe and efficient transportation. Ad-hoc On-demand Distance Vector (AODV) is a reactive routing protocol designed for the adhoc networks. AODV is an unicast routing protocol which establishes a route only when a node wants to send data packets. AODV involves route discovery and route maintenance process. Due to large delay in the route discovery process and due to route failure which may require a new route discovery process, the data transmission rate decreases and network overhead increases. In this paper we have discussed AODV protocol and its comparison with OLSR and DSR routing protocol. 

Key words: VANET, AODV, OLSR, DSR

Since their arrival in the 1970s, the use of wireless communication technology has increased. An ad hoc wireless network consists of mobile nodes which communicate with each other without any infrastructure. Vehicular Ad hoc Network (VANET) is a new technology integrating ad hoc network, WLAN and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. IEEE formed the IEEE 802.11p task group for Wireless Access in Vehicular Environments (WAVE)[1]. VANET is a new distinctive form of Mobile Ad Hoc Network (MANET). Without having any infrastructure and legacy client and server communication, VANET is a highly autonomous network where each vehicle in it acts as a wireless router or a node to communicate with nearby vehicles and fixed roadside equipment. In VANET the movement of vehicles is affected by the factors like the structure of the road, traffic congestion and traffic rules. VANET involves topology which changes very rapidly and also the network gets disconnected frequently.
 Simulation Parameters


Many routing protocols have been proposed for ad hoc networks. A protocol can perform worse or better than other protocols depending upon scenario of ad hoc networks.After reviewing different approaches we can conclude that AODV is better than OLSR and DSR in terms of packet delivery ratio and end-end delay. Though some improvement needed in AODV routing protocol because the route discovery process on route failure causes a great delay.  




Thursday, August 27, 2015

Real Time Traffic Control using Image Processing #ijsrd

Real Time Traffic Control using Image Processing

Author(s):

Rahul Rane , Rajiv Gandhi Institute Of Technology
S.P.Khachane, Rajiv Gandhi Institute of Technology
Sayali Pathak, Rajiv Gandhi Institute of Technology
Aruta Oak, Rajiv Gandhi Institute of Technology

Keywords:

Traffic control, image processing, edge detection, background subtraction

Abstract

The Idea behind real time traffic control using image processing is due to increase in number of vehicles on road which causes traffic congestion. There are various successful techniques to overcome this problem such as inductive loop detectors, magnetic loop detectors and video based system. We propose a system based on measurement of vehicle density on road using Real Time Image Processing. To control the congestion in traffic signal intelligently by using density information in this paper we are presenting the algorithm with the help of which the congestion in traffic can easily retrieved. The image sequences from camera are analyzed using edge detection and counting methods. Subsequently the number of vehicles at intersection is evaluated due to which traffic can easily be managed moreover determined vehicle density can easily be compared with other direction of traffic in order to control traffic signals efficiently.[1]

For More Details about this paper visit : http://ijsrd.com/Article.php?manuscript=IJSRDV3I30243

Tuesday, August 25, 2015

An Overview and Study of Android 5.0 #IJSRD

An Overview and Study of Android 5.
Author(s):
Ankit Kumar Jain , IET,DAVV Indore(M.P.)
Balram Jatav, IET,DAVV Indore(M.P.)
Er.Arpit Agrwal, IET,DAVV Indore(M.P.)

Keywords:

Android, Lollipop 5.0, Smart phone

Abstract

Android is Linux based mobile OS which is being used by popular smart phone brands like Samsung, LG, HTC, Sony Xperia, and many other. Android 5.0 "Lollipop" is the latest version of the Android mobile operating system developed by Google. Unveiled on June 25, 2014 during Google I/O, it became available through official over-the-air (OTA) updates on November 12, 2014. This paper will contain detailed study of Android 5.0: Lollipop OS. It will cover stepwise development of android OS up to Lollipop. Contrast of Lollipop from old android OS, IOS and Windows Phone OS, details review of technical background of Lollipop OS.

For More information about this paper visit :


For More Paper About Engineering Research visit www.ijsrd.com

Monday, August 24, 2015

Good Journals of India: Understanding SQL Injection Attack Techniques and Implementation of Various Methods for Attack Detection and Prevention

Good Journals of India: Understanding SQL Injection Attack Techniques and Implementation of Various Methods for Attack Detection and Prevention

Understanding SQL Injection Attack Techniques and Implementation of Various Methods for Attack Detection and Prevention

Author(s):

Shruti Gangan , V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR; 
Tina Gyanchandani, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR; 
Dhanamma Jagli, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR

Keywords:

SQL Injection, Website Security, SQL Injection Detection, SQL Injection Prevention, Sanitization

Abstract

Security issues of different database driven web applications are continue to be an important and crucial aspect of the ongoing development of the Internet. In the last several decades, Web applications have brought new classes of computer security vulnerabilities, such as AQL injection. SQL Injection Attacks (SQLIAs) is one of the most severe threats to the security of database driven web applications as it compromises integrity and confidentiality of information in database. In this type of attack, an attacker gain control over the database of an application and consequently, he/she may be able to alter data. In this paper we present different types of SQL injection attacks and also implementation of different types of tools which can be used to detect and prevent these attacks.

Click Here to see Full Length Paper : 
http://www.ijsrd.com/Article.php?manuscript=IJSRDV3I40489

Good Research Journal For Engineering Students.....IJSRD.com