IOSR Journal of Computer Engineering (IOSR-JCE)

Jan – Feb. 2015 Volume 17 - Issue 1

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : A Novel Methodology of Fuzzy Logic Controller for A Dynamically Interconnected Electric Power System
Country : Egypt
Authors : Sherif Kamel Hussein || Mahmoud Hanafy Saleh

Abstract: This paper presents a novel methodology for designing a fuzzy controller for a dynamically interconnected electric power system. One controller with constant gains for different operating points may not be sufficient to guarantee satisfactory performance for Load Frequency Control. Therefore, the knowledge-based fuzzy controller is proposed either to cope with the operating conditions or to remove any fixed mode. The fuzzy logic control utilizes the error and the change of error as fuzzy linguistic inputs to regulate the system performance. The proposed control scheme is applied to a two-area power system provided with both hydraulic and thermal turbines.

Keywords: Fuzzy Logic Control "FLC", Load Frequency Control "LFC". Interconnected Power System "IPS"

[1]. O.L.Elgerd " Electric Energy System Theory-An Introduction" Mc-Hill, New York, 1983
[2]. N.Samul " A Single Area Load Frequency Control; A Comparative Study Based on PI-Optimal and Fuzzy Logic Controllers" American Journal of Scientific & Industrial Research, 2011
[3]. S.K.Vavilala & R.S. Srinivas and M.Suman" Load Frequency Control of Two Area Interconnected System Using Conventional and Intelligent Controllers" Int. Journal of Engineering Research and Applications. 2014
[4]. A. Ike, A. Kulkam, and Dr. Veeresh " Load Frequency Control Using Fuzzy Logic Controller of Two Area Thermal-Thermal Power System" International Journal of Engineering Technology and Advanced Engineering, Vol.2, October 2012
[5]. K. Des, P.Des, and S. Sharma " Load Frequency Control Using Classical Controller in an Isolated Single Area and Two Area Reheat Thermal Power Systems" International Journal of Engineering Technology and Advanced Engineering, Vol.2, March 2012
[6]. K.Yamashita, M.Hirayasu, K. Okafuji and H.Miyagi " A Design Method of Adaptive Load Frequency Control With Dual-Rate Sampling" Int. Journal of Adaptive Control and Signal Processing, Vol.9,No.2, March 1995


Paper Type : Research Paper
Title : OSPCV: Off-line Signature Verification using Principal Component Variances
Country : India
Authors : Arunalatha J S || Prashanth C R || Tejaswi V || Shaila K || K B Raja || Dinesh Anvekar || Venugopal K R || S S Iyengar || L M Patnaik || Arun C || Pawan K S

Abstract: This paper presents a novel methodology for designing a fuzzy controller for a dynamically interconnected electric power system. One controller with constant gains for different operating points may not be sufficient to guarantee satisfactory performance for Load Frequency Control. Therefore, the knowledge-based fuzzy controller is proposed either to cope with the operating conditions or to remove any fixed mode. The fuzzy logic control utilizes the error and the change of error as fuzzy linguistic inputs to regulate the system performance. The proposed control scheme is applied to a two-area power system provided with both hydraulic and thermal turbines.

Keywords: Fuzzy Logic Control "FLC", Load Frequency Control "LFC". Interconnected Power System "IPS"

[1]. O.L.Elgerd " Electric Energy System Theory-An Introduction" Mc-Hill, New York, 1983
[2]. N.Samul " A Single Area Load Frequency Control; A Comparative Study Based on PI-Optimal and Fuzzy Logic Controllers" American Journal of Scientific & Industrial Research, 2011
[3]. S.K.Vavilala & R.S. Srinivas and M.Suman" Load Frequency Control of Two Area Interconnected System Using Conventional and Intelligent Controllers" Int. Journal of Engineering Research and Applications. 2014
[4]. A. Ike, A. Kulkam, and Dr. Veeresh " Load Frequency Control Using Fuzzy Logic Controller of Two Area Thermal-Thermal Power System" International Journal of Engineering Technology and Advanced Engineering, Vol.2, October 2012
[5]. K. Des, P.Des, and S. Sharma " Load Frequency Control Using Classical Controller in an Isolated Single Area and Two Area Reheat Thermal Power Systems" International Journal of Engineering Technology and Advanced Engineering, Vol.2, March 2012
[6]. K.Yamashita, M.Hirayasu, K. Okafuji and H.Miyagi " A Design Method of Adaptive Load Frequency Control With Dual-Rate Sampling" Int. Journal of Adaptive Control and Signal Processing, Vol.9,No.2, March 1995


Paper Type : Research Paper
Title : Research on Clustering Method of Related Cases Based On Chinese Text
Country : China
Authors : Gang Zeng

Abstract: With the movement of population, crimes are showing mobility and professionalism characteristics, the cases which the same suspects committed have the same or similar characteristics, it is helpful to find the related cases. In this article, firstly, analyzes the factors associated with the cases, discusses how to form vector space of Chinese cases, then proposes a method to associate cases by joint use of FKM and Canopy clustering algorithm.

Keywords: related cases, Chinese segmentation, Fuzzy K-Means, Canopy.

[1]. Ning Han, Wei Chen. Research on clustering analysis on related Cases. Journal of Chinese People's Public Security University(Science and Technology), 2012(1):53-58.
[2]. Sean Owen, Robin Anil, Ted Dunning, Ellen Friedman. Mahout in Action[M]. Manning Publication, Westampton.
[3]. Tony H. Grubesic. On The Application of Fuzzy Clustering for Crime Hot Spot Detection[J]. Journal of Quantitative Criminology, 2006,22(1):77-105.
[4]. [Deguang Wang, Baochang Han, Ming Huang. Application of Fuzzy C-Means Clustering Algorithm Based on Particle Swarm Optimization in Computer Forensics. 2012 International Conference on Applied Physics and Industrial Engineering, 1186-1191.
[5]. Gang Liu. Programing Hadoop[M]. BeiJing:China Machine Press, 2014.


Paper Type : Research Paper
Title : Software Engineering Process in Web Application Development
Country : India
Authors : Manju K Mathai || Rakhi Venugopal || Dr. John T Abraham

Abstract: The methods used for the development of conventional software engineering models cannot be used directly for the development of web based applications. This paper identifies and analyses the various adaptations required in the conventional models to make them applicable for the development of web based applications.

Keywords: Software engineering, Web engineering, software development models, software testing.

[1]. Andrews AA, Offutt J, Alexander RT (2005) Testing Web Applications by Modeling with FSMs. Software Systems and Modeling, 4(2)
[2]. Binder RV (1999) Testing Object-Oriented Systems. Models, Patterns, and Tools. Addison-Wesley: Reading, MA
[3]. Sandeep Kumar Satyaveer Sangwan, Adapting the software engineering process to web engineering process, ISSN (Online) : 2229-6166 ,Volume 2 Issue 1 2011
[4]. Marciniak, J.J. (ed.), 'Process Models in Software Engineering', Encyclopedia of Software Engineering, 2nd Edition, John Wiley and Sons, Inc, New York, December 2001.
[5]. Pressman R.S., 'Software Engineering: A Practitioner's Perspective', 5th ed.,McGraw- Hill, New York, 2000, pp. 769-798.


Paper Type : Research Paper
Title : Data mining Algorithm's Variant Analysis
Country : India
Authors : Kiranpreet || Ramandeep Kaur || Sourabh Sahota || Prince Verma

Abstract: The Data Mining is extricating or mining information from extensive volume of information. Information mining frequently includes the examination of information put away in an information distribution center. This paper examines the three noteworthy information mining calculations: Association, classification and clustering. Classification is the procedure of looking connections between variables in gave database. Clustering comprises of anticipating a certain result focused around given information. Clustering is a procedure of dividing a set of data(or items) into a set of important sub-classes, called clusters. Execution of the 3 techniques is exhibited utilizing WEKA apparatus.

Keyword Terms: Data mining, Weka tools, Association, Classification and clustering algorithms.

[1]. Yuni Xia, Bowei Xi ―Conceptual Clustering Categorical Data with Uncertainty‟ Indiana University – Purdue University Indianapolis Indianapolis, IN 46202, USA.
[2]. Xu R. Survey of clustering algorithms.IEEE Trans. Neural Networks 2005.
[3]. B¨OHM, C., KAILING, K., KRIEGEL, H.-P., AND KR¨OGER, P. 2004. Density connected clustering with local Subspace preferences.In Proceedings of the 4th International Conference on Data Mining (ICDM).
[4]. R. Ng and J. Han. "Efficient and effective clustering method for spatial data mining". In: Proceedings of the 20th VLDB Conference,pages 144-155, Santiago, Chile, 1994.
[5]. Fei Shao, Yanjiao Cao ―A New Real-time Clustering Algorithm Department of Computer Science and Technology, Chongqing University of Technology Chongqing 400050, China.


Paper Type : Research Paper
Title : Mathematical Programming Approach to Improve Website Structure for Effective User Navigation
Country : India
Authors : Ms .Kshitija Potdar || Prof .RohiniBhosale

Abstract: Due to tremendous growth of web applications. It increases the complexity of web applications and web navigation. Designing well-structured website has been long challenge because while creating website web developers understanding of a how website should be structured can be different from that of user's preferences. Such differences result in cases users having difficulty to locate desired information on website. While various methods have been proposed to reorganize Webpages to improve users navigation using users navigation data but it still causes disorienting users and increases user's cognitive load. There is a need to improve the efficiency and the performance of a website for effective user navigation. Recommendations play an important role towards this direction. Our Recommendation is based on user Browsing patterns. Our approach presents a comprehensive overview of web mining methods and techniques used for the evaluation of reconciling systems to achieve better web navigation in order to improve the efficiency of web site. In this Paper we will propose Mathematical programming model to improve user navigation while minimizing alteration to current structure. Using our model it will possible to obtain optimal solution very quickly.

Keywords: clustering,mathematical programming model, mini session, Path threshold, user navigation,web mining

[1]. Min Chen and young U.RYU "Facilitating effective user navigation through website structure improvement "IEEE,Volume 25,pp 571-588,2013.
[2]. Pingdom, "Internet 2009 in Numbers," http://royal.pingdom com/2010/01/22/internet-2009-in-numbers/, 2010.
[3]. T. Nakayama, H. Kato, and Y. Yamane, "Discovering the Gap between Web Site Designers‟ Expectations and Users‟ Behavior," Computer Networks, vol. 33, pp. 811-822, 2000.
[4]. R.Shrikant and Y. Yang"Mining web logs to improve web site organization", ," Proc. 10th Int‟l Conf. World Wide Web, pp. 430-437,2001.
[5]. R. Cooley, B. Mobasher, and J. Srivastava, "Data Preparation for Mining World Wide Web Browsing Patterns," Knowledge and Information Systems, vol. 1, pp. 1-27, 1999.
[6]. B. Mobasher, R. Cooley, and J. Srivastava, "Automatic Personalization Based on Web Usage Mining," Comm. ACM, vol. 43, no. 8, pp. 142-151, 2000.


Paper Type : Research Paper
Title : Feasibility of Laying Fiber-Optic Cables underwater along River Nile Basin- Sudan Study Case
Country : Sudan
Authors : Ammar A. Saleh || Dr. Amin B. A. Mustafa || Dr. Ashraf A. Osman

Abstract: Fiber optics cables offers various advantages of over regular cables when used as data transportation medium in today's communication networks. The River Nile basin countries such as Sudan enjoys vast distances that are travelled by the River Nile, offering a natural path for an underwater cable laying areas. In this study, the potential of laying such cables is investigated with Sudan taken as a case study. The socioeconomic impact analysis will be provided, and potential issues and obstacles will be discussed. Keywords: Communications, Fibers, Network, Optic

[1]. Ankit Gambhir, Merits and demerits of optical fiber communication, International Journal of Research in Engineering & Applied Sciences , Vol. 3, Issue 3, 2013, 99 -104 2012, 112-116.
[2]. Paul, D. ; Greene, K. ; Koepf, Gerhard A. , "Undersea fiber optic cable communications system of the future: Operational, reliability, and systems considerations", IEEE journal of light technology, Volume: 2 , Issue: 4 , 1984 , Page(s): 414 – 425
[3]. Iwamoto, Y., Fukinuki, H., Recent advances in submarine optical fiber cable transmission systems in Japan, IEEE Journal of Lightwave Technology, Volume:3 , Issue: 5 , Oct 1985, pp 1005 – 1016.
[4]. Aditi, Preeti, Submarine Optical Cables as a Key Component in Undersea Telecommunications: A Review, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 1, Issue 4, December 2012, pp 79- 83
[5]. Submarine Cable Map, TeleGeography, "http://www.submarinecablemap.com/#/country/sudan", updated Jan 27, 2015.


Paper Type : Research Paper
Title : Encryption Technique for a Trusted Cloud Computing Environment
Country : India
Authors : Aishwarya Asesh

Abstract: Cloud computing has reached a certain level of maturity which leads to a defined productive state. With varying amount of computing power present with everyone, it has become necessity of the hour to use cloud computing systems. It helps us to store our data within a virtual cloud structure. When we use the cloud storage mechanism, the computing power gets distributed rather than being centralised. The whole system uses the internet communication to allow linkage between client side and server side services/applications. The service providers may use the cloud platform as a web service platform or a data storage architecture.

[1]. Venkata Karthik Gullapalli and Aishwarya Asesh, Data Trawling and Security Strategies, ISSN – 2278-8727, IOSR Journal of Computer Engineering, Volume 16, Issue 6, Ver. 1, Nov - Dec 2014.
[2]. Z. Lan, V. Varadharajan and M. Hitchens, "Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage", Information Forensics and Security, IEEE Transactions on, vol. 8, no. 12, (2013), pp. 1947-1960.
[3]. A. A. Soofi and M. I. K Fazal-e-Amin, "A Review on Data Security in Cloud Computing", International Journal of Computer Applications, vol. 94,no.5,(2014), pp.12-20.
[4]. D. E. Goldberg and J. H. Holland, Genetic Algorithms and machine learning, Guest Editorial, Machine Learning 3: 95-99, 1988 Kluwer Academic Publishers - The Netherlands.
[5]. I. Foster and C. Kesselman (eds). The Grid: Blueprint for a Future Computing Infrastructure. Morgan Kaufmann, San Francisco, USA, 1999.


Paper Type : Research Paper
Title : Adaptive Shared Channel Assignment Scheme for Cellular Network to Improve the Quality of the Handoff Calls
Country : India
Authors : S S Nayak || R R Kar || M Garanayak

Abstract:In this paper, an adaptive channel assignment scheme is proposed to ensure the quality of services for the wireless networks. The proposed scheme divides the channels into two categories, the guard channels and the shared channels. The number of guard channels is estimated by the Markovian model in order to keep the handoff calls higher priority. The remaining channels, called shared channels, can be used by both new calls and handoff calls. The proposed scheme based on incoming rates of handoff and new calls allocates channels for guard and shared channels. In addition, this approach is able to provide quality of service guarantee in terms of handoff dropping rate. From the simulation, the proposed scheme significantly improves the dropping rate and the blocking rate in comparison with the existing methods.
Keywords: Channel assignment; Wireless network; Guard channels

[1]. Macdonald VH. Advanced mobile phone service: the cellular concept. Bell Syst Technic J 1996;58(January):15–41. [2] Tekenay S, Jabbari B. Handover and channel assignment in mobile cellular networks. IEEE PCM 1991;29:42–6.
[2]. Katzela I, Naghshineh M. Channel assignment schemes for cellular mobiles telecommunication systems. IEEE PCM 1996;6:10–31.
[3]. Raychaudhuri D, Merchant A. A global dynamic channel allocation algorithm in a wireless communication. IEEE GLOBECOM 1997.
[4]. Luo X, Thng I, Zhang W. A dynamic channel pre-reservation scheme for handoffs with GoS guarantee in mobile networks, computers and communications, 1999. In: Proceedings of IEEE international symposium on 1999. p. 404–8.
[5]. Kahwa TJ, Georganas ND. A hybrid channel assignment scheme in large-scale cellular-structure mobile communication systems. IEEE Trans Commun 1998;COM-26:432–8.
[6]. Lin YB, Mohan S, Noerpel A. Queueing channel assignment strategies for PCS hand-off and initial access. IEEE PersCommun 1994;3:47–56.


Paper Type : Research Paper
Title : DCT based Steganographic Evaluation parameter analysis in Frequency domain by using modified JPEG luminance Quantization Table
Country : India
Authors : Sourish Mitra || Moloy Dhar || Ankur Mondal || Nirupam Saha || Rafiqul Islam

Abstract: Steganography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. In this paper we want to increase the capacity and performance of DCT based steganography by using modified JPEG quantization table embedding technique in frequency domain. Our experimental results show that the proposed method will provide a better result in terms of some evaluation criteria named Peak Signal to noise ratio, square of error between cover & stego image, maximum no of bits that can be embedded in a cover image with a negligible probability of detection by an adversary of steganography system. Our proposed method shows that after modification of frequency values in default JPEG quantization table we can be able to increase the image quality by increasing the value of Peak signal to noise ratio, capacity and also by decreasing mean square error of embedded image.

[1]. C.Y. Yang,―Colour Steganography based on Module Substitutions, Third International Conference on International Information Hiding & Multimedia Signal Processing Year of Publication:2007,ISBN: 0-7695-2994-1.
[2]. Li Xiaoxia, Wang Jianjun. ―A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences, Vol.177, 2007, 3099-3109.
[3]. N. N. EL-Emam, ―Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm,‖ International Journal of Information and Communication Engineering, Vol.4, Issue-2, 2008.
[4]. D.C. Lou and C.H. Sung, ―A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem, IEEE TRANSACTIONS ON MULTIMEDIA, Vol. 6, No. 3, June 2004.
[5]. Li Xiaoxia, Wang Jianjun. ―A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences, Vol.177, 2007, 3099-3109.
[6]. K B Shiva Kumar, K B Raja, R K Chhotaray, Sabyasachi Pattanaik, "Bit Length Replacement Steganography Based on DCT Coefficients," International Journal of Engineering Science and Technology Vol. 2(8), 2010, 3561-3570, 2010.


Paper Type : Research Paper
Title : Effectiveness of Information Communication Technologies for Education System
Country : India
Authors : Lisha Singh || Abhijeet Singh

Abstract: Information and Communication Technology (ICT) provides important overview guidance for designing and implementing education programs that use technology. The principles and indicators are primarily meant to guide program designs, including the development of requests for and subsequent review of proposals, the implementation of program activities, and the development of performance management plans, evaluations, and research studies. Across the past twenty years the use of Information Communication Technology (ICT) has basically changed all forms of endeavor within business, governance and off-course education. ICT has begun to have a presence but unfortunately we are lacking to achieve desired impact.

[1]. Per Bergamin, a presentation on ―Some lessons to learn from the OER-Movement?‖, Online Available: www.ifel.ch.
[2]. http://www.expresscomputeronline.com/20051114/market03.shtml
[3]. O'Reilly T.; What Is Web 2.0 - Design Patterns and Business Models for the Next Generation of Software, 2005, Online Available: http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html.
[4]. Alexander B.;Web 2.0: A New Wave of Innovation for Teaching and Learning? EDUCAUSE Review, vol. 41, no. 2 (March/April 2006): 32–44, 2006.


Paper Type : Research Paper
Title : Computational Intelligence Methods for Clustering of Sense Tagged Nepali Documents
Country : India
Authors : Sunita Sarkar || Arindam Roy || Bipul Syam Purkayastha

Abstract: This paper presents a method using hybridization of self organizing map (SOM ), particle swarm optimization(PSO) and k-means clustering algorithm for document clustering. Document representation is an important step for clustering purposes. The common way of represent a text is bag of words approach. This approach is simple but has two drawbacks viz. synonymy and polysemy which arise because of the ambiguity of the words and the lack of information about the relations between the words. To avoid the drawbacks of bag of words approach words are tagged with senses in WordNet in this paper. Sense tagging of words provide exact senses of words. Feature vectors are generated using sense tagged documents and clustering is carried out using proposed hybrid SOM+PSO+K-means algorithm. In the proposed algorithm initially SOM is applied to the feature vectors to produce the prototypes and then K-means clustering algorithm is applied to cluster the prototypes. Particle Swarm Optimization algorithm is used to find the initial centroid for K-means algorithm. Text documents in Nepali language are used to test the hybrid SOM+PSO+K-means clustering algorithm. Keywords: Computational Intelligence, Sense tagging, Self organization map, Particle swarm optimization.

[1]. A.P. Engebrecht, Computational Intelligence An Introduction (John Wiley & Sons, Ltd, 2007)
[2]. S. Urooj, S. Shams, S. Hussain, F. Adeeba, Sense Tagged CLE Urdu Digest Corpus, Proc. Conf. on Language and Technology, Karachi, 2014
[3]. T. Kohonen, : Self-organized formation of topologically correct feature maps. Biol.Cybern. 43 59–69 (1982)
[4]. J. Kennedy and R.C. Eberhart, "Particle Swarm Optimization," Proc. IEEE, International Conference on Neural Networks.
[5]. Piscataway. Vol. 4, pp 1942-1948,1995
[6]. S.C. Satapathy, N. VSSV P B. Rao, JVR. Murthy, R. P.V.G.D. Prasad, "A Comparative Analysis of Unsupervised K-means, PSO and Self- Organizing PSO for Image Clustering,"Proc. International Conference on Computational Intelligence and Multimedia Applications,2007.
[7]. A. Roy, S. Sarkar, B. S. Purkayastha, "A Proposed Nepali Synset Entry and Extraction Tool," Proc. 6th Global wordnet conference, Matsue,Japan,2012.


Paper Type : Research Paper
Title : Proposal Laying Fiber Optic for Cables along Railways Tracks in Sudan
Country : Sudan
Authors : Ammar A. Saleh || Dr. Amin B. A. Mustafa || Dr. Ashraf A. Osman

Abstract: Fiber optics cables offers various advantages of over regular cables when used as data transportation medium in today's communication networks. Many African countries such as the Sudan and South Africa large portions of their land connected through railway networks. Remote areas in such countries are scarcely connected to communication networks other than use of mobile phones communications relying on microwave or satellite communications. Such communications are expensive and inefficient. In this study, a proposal to use the railway networks for establishing fiber optic networks for communication purposes to connect remote cities and towns. The socioeconomic impact analysis will be provided, and potential issues and obstacles will be discussed.

Keywords: Communications, Fibers, Network, Optic

[1]. AnkitGambhir, Merits and demerits of optical fiber communication,International Journal of Research in Engineering & Applied Sciences, Vol. 3, Issue 3, 2013, 99 -1042012, 112-116.
[2]. British Rail Telecommunications, http://en.wikipedia.org/wiki/British_Rail_Telecommunications
[3]. RailTel Corporation of India, http://www.railtelindia.com/index.php?option=com_content&view=article&id=119&Itemid=172&lang=en
[4]. Worldbank Data, Rail lines (total route-km), http://data.worldbank.org/indicator/IS.RRS.TOTL.KM
[5]. Institute of Developing Economies Japan External Trade Organization (IDE-JETRO), http://www.ide.go.jp/English/Data/Africa_file/Company/sudan05.html
[6]. Jane Tanner, New Life for Old Railroads; What Better Place to Lay Miles of Fiber Optic Cable, NewYork Times, May 6, 2000,http://www.nytimes.com/2000/05/06/business/new-life-for-old-railroads-what-better-place-to-lay-miles-of-fiber-optic-cable.html


Paper Type : Research Paper
Title : A review on Visualization Approaches of Data mining in heavy spatial databases
Country : India
Authors : Sayyada Sara Banu || Dr.Perumal Uma || Mohammed Waseem Ashfaque || Quadri S.S Ali Ahmed

Abstract: Data mining is the phenomenon to extract and recognized the new required pattern or types from the large data seta or data bases and whatever required data is being extracted and separated from large data bases then it is stored and that needs to give some sort of briefing via visualization and its techniques and then it is being recognized it important pattern and analysis identifications. And which is having a very common methodology of displaying the spatial data bases or data sets to search for the required pattern. no doubt its quit typical to search and browse the spatial data bases for human beings to browse and identify from a such huge collection of data bases. There for data mining algorithmic techniques is applied to filter and sort out the spatial data sets as per the requirements .A new web based visualization application is being devolved for supervising of spatial patterns and temporal, Data mining algorithm for sorting and searching from large spatial data sets also being presenting and that algorithm is tested on real time experienced. Hence in this paper a review is being presented on visualization approaches of data mining in large spatial data sets.

Keywords: Data Mining, Data Visualization; Visualization techniques; visual data mining

[1]. G. Piatetsky-Shapiro andW. J. Frawley. Knowledge Discovery in Databases. AAAI/MIT Press, 1991.
[2]. U. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy. Advances in Knowledge Discovery and Data Mining. MIT Press, Cambridge, MA, 1996
[3]. K. Koperski, J. Adhikary, and J. Han. Spatial data mining: Progress and challenges. InWorkshop on Research Issues on Data Mining and Knowledge Discovery(DMKD‟96), pages 1–10, Montreal, Canada, 1996.
[4]. K. Koperski and J. Han. Discovery of spatial association rules in geographic information databases. In Advances in Spatial Databases, Proc. of 4th International Symposium, SSD‟95, pages 47–66, Portland, Maine, USA, 1995.
[5]. S. Shekhar, C. Lu, and P. Zhang. Detecting Graph-Based Spatial Outlier: Algorithms and Applications(A Summary of Results). In Computer Science & Engineering Department, UMN, Technical Report 01-014, 2001.
[6]. S. Shekhar and Y. Huang. Co-location Rules Mining: A Summary of Results. In Proc. Spatio-temporal Symposium on Databases, 2001.



Researcher can also search IOSR published article contents through

IOSR Xplore