Volume-8 (National Conference on Recent Trends in Computer Science and Information Technology)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Overview of Data Replication Strategies in Various Mobile Environment |
Country | : | India |
Authors | : | Mr. Dhiraj Rane || Dr. M. P. Dhore |
Abstract: With the tremendous growth of the portable computing devices and wireless communication, the mobile computing has become extremely popular. The wireless enabled portable computing devices with massive storage capacity and high-end processing capabilities have started to make the extensive use of mobile databases already. The rising popularity in these computing paradigms demands that the mobile computing be reliable enough to ensure the continuous data availability and integrity. However mobility comes at the cost of bandwidth, limited power, security and interference............
Keywords -About five key words in alphabetical order, separated by comma.
[1] Brown University, USA. Aho, A.V., J.E. Hopcroft and J.D. Ullman, 1974. The Design and Analysis of Computer Algorithms. Addison-Wesley, Reading, Mass.
[2] Barbara, D. and H.G. Molina, 1986. The vulnerability of vote assignments. ACM T. Comput. Syst., 4(3): 187-213.
[3] Biswas, S. and S. Neogy, 2010. A Mobility-based check pointing protocol for mobile computing system. IJCSIT, 2(1).
[4] Boukerche, A., 2006. Handbook of Algorithms for Wireless Networking and Mobile Computing. Taylor and Francis Group, LLC.
[5] Ciciani, B., D.M. Dias and P.S. Yu, 1990. Analysis of replication in distributed database systems. IEEE T. Knowl. Data Eng., 2(2): 247-261.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Survey on Methodologies of Data Mining using Neural Network |
Country | : | India |
Authors | : | Mrs. Mausami Sawarkar || Mr. Dhiraj Rane |
Abstract: The traditional data mining algorithms are hard to apply on noisy data, redundant information, incomplete data and sparse data in database, or the application effects are not good. But neural network have many virtues such as robustness, parallelism and anti-noise, so it is very effective on data mining in large and real databases. This paper expounds the process of data mining based neural network in detail, discusses the algorithms of classifying and clustering, indicates the problems at present and makes an expectation for the development.
Keywords:Neural Network, Data Mining, Classification, Regression
[1] "Data Mining Curriculum". ACM SIGKDD. 2006-04-30. Retrieved 2014-01-27.
[2] Clifton, Christopher (2010). "Encyclopædia Britannica: Definition of Data Mining". Retrieved 2010-12-09.
[3] Hastie, Trevor; Tibshirani, Robert; Friedman, Jerome (2009). "The Elements of Statistical Learning: Data Mining, Inference, and Prediction". Retrieved 2012-08-07.
[4] Fayyad, Usama; Piatetsky-Shapiro, Gregory; Smyth, Padhraic (1996). "From Data Mining to Knowledge Discovery in Databases" (PDF). Retrieved 17 December 2008.
[5] Agrawal, R., Imielinski, T., Swami, A., "Database Mining: A Performance Perspective", IEEE Transactions on Knowledge and Data Engineering, pp. 914- 925, December 1993.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review on Bio-Inspired Computing Algorithms and Application |
Country | : | India |
Authors | : | Ms. Neeta Nemade || Mr. Dhiraj Rane |
Abstract:Computer science and biology have enjoyed a long and fruitful relationship for decades. Biologists rely on computational methods to analyze and integrate large data sets, while several computational methods were inspired by the high level design principles of biological systems. Recently, these two directions have been converging. In this review, we argue that thinking computationally about biological processes may lead to more accurate models, which in turn can be used to improve the design of algorithms........
Keywords: AI, Swarm Intelligence, Cock search, Ant Colony Optimization, DNA Computing
[1]. Xu Z, Ziye X, Craig H, Silvia F; Xu; Henriquez; Ferrari (Dec 2013). ―Spike-based indirect training of a spiking neural network-controlled virtual insect‖. Decision and Control (CDC), IEEE: 6798–6805. doi:10.1109/CDC.2013.6760966. ISBN 978-1-4673-5717-3.
[2]. http://www.duke.edu/~{}jme17/Joshua_E. _Mendoza-Elias/Research_Interests.html# Neuroscience_-_Neural_Plasticity_in_brain
[3]. Saket Navlakha and Ziv Bar-Joseph, Algorithms in nature: the convergence of systems biology and computational thinking, Molecular Systems Biology 7; Article number 546; doi:10.1038/msb.2011.78
[4]. Thamarai Selvi Somasundaram and KannanGovindarajan, CLOUDRB: A framework for scheduling and managingHighPerformance Computing(HPC) applications in science cloud, Future Generation Computer Systems, 34 (2014) 47–65.
[5]. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson,A. Rabkin, I. Stoica and M. Zaharia. Above the Clouds: A Berkeley View of Cloud computing. Technical Report No. UCB/EECS-2009-28, University of
[6]. California at Berkley, USA, Feb. 10, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Exploring the Applications and Potential of Bioinformatics |
Country | : | India |
Authors | : | Mrs. Kanchan Gawande || Mr. Dhiraj Rane |
Abstract: This paper has discussed basic working of Bioinformatics and its association with computation. It also summarizes the application domains of Bioinformatics. The use of computer science is also discussed with the bioinformatics. This paper has explored the potential domain of the bioinformatics in the computer science development. It has also given the technical tools discussion for the various practical implantation and conducting experiments.
Keywords: Bioinformatics, Bioweka, Genes, DNA
[1] Hogeweg P (2011). Searls, David B., ed. "The Roots of Bioinformatics in Theoretical Biology". PLoS Computational Biology 7 (3): e1002021.
[2] Hesper B, Hogeweg P (1970). "Bioinformatica: een werkconcept" 1 (6). Kameleon: 28–29.
[3] Hogeweg P (1978). "Simulating the growth of cellular forms". Simulation 31 (3): 90–96.
[4] Moody, Glyn (2004). Digital Code of Life: How Bioinformatics is Revolutionizing Science, Medicine, and Business. ISBN 978-0-471-32788-2.
[5] Dayhoff, M.O. (1966) Atlas of protein sequence and structure. National Biomedical Research Foundation, 215 pp.
[6] Eck RV, Dayhoff MO (1966). "Evolution of the structure of ferredoxin based on living relics of primitive amino Acid sequences". Science 152 (3720): 363–6. Bibcode:1966Sci...152..363E. doi:10.1126/science.152.3720.363. PMID 17775169.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Approaches to Text Mining using Information Extraction |
Country | : | India |
Authors | : | Mrs. Rashmi Dukhi || Ms. Antara Bhattacharya |
Abstract: Information extraction is an important text mining problem and has been extensively studied in areas such as natural language processing, information retrieval and Web mining. Information Extraction (IE) techniques aim to extract the names of entities and objects from text and to identify the roles that they play in event descriptions. IE systems generally focus on a specific domain or topic, searching only for information that is relevant to a user's interests. Information extraction technology focuses on only the relevant parts of the text and ignores the rest......
Keywords: Automatic Content Extraction, corpus , Named entity recognition ,semantic, tokenizer.
[1]. Chia-Hui Chang, Mohammed Kayed, Moheb Ramzy Girgis, and Khaled F. Shaalan. A survey of Web information extraction systems. IEEE Transactions on Knowledge and Data Engineering,18(10):1411–1428, October 2006.
Books:
[2]. C.C. Aggarwal and C.X. Zhai (eds.), Mining Text Data (Springer Science+ Business Media, LLC 2012 )
Proceedings Papers:
[3]. Douglas E. Appelt, Jerry R. Hobbs, John Bear, David Israel, and Mabry Tyson. FASTUS: A finite-state processor for information extraction from real-world text. In Proceedings of the 13th International Joint Conference on Artificial Intelligence, 1993.
[4]. Mary Elaine Califf and Raymond J. Mooney. Relational learning of pattern-match rules for information extraction. In Proceedings of the 16th National Conference on Artificial Intelligence and the 11th Innovative Applications of Artificial Intelligence Conference, pages 328–334, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Intelligent single phase to three phase smart control system for efficient power distribution management using Embedded System |
Country | : | India |
Authors | : | Dr. P. G. Chakole || Dr. J. N. Ramteke |
Abstract: Pure electricity is a primary need for today, rather to say 4th necessity after the food clothes and shelter. Impure power supply affects many times because of undershoot or overshoot of power supply and may damages the power based equipments either laboratory based, industrial based or home appliances and the mostly affected devices are the induction motors. There is a tremendous development to maintain the ac pick voltage and the current these days. But these systems are not so effective on site when sudden changeovers in the ac waves. There may be some drawback of the system methodologies implemented by that time. But the things are going to r........
Keywords: PHP, Smart System, SQL, Training and Placement, Web Application
[1]. Principles and Applications, New York, NY: Marcel Dekker, Inc. 1987
[2]. W.A. Elmore, Protective Relaying Theory and Applications, New York, NY: Marcel Deffker, Inc. 2004
[3]. Farrokh Shokooh and JJ Dai, "An Intelligent Load Shedding (ILS) System Application in a Large Industrial Facility," IEEE IAS Conference Record, 2005
[4]. James McCalley and J.A. Pecas Lopes, "Using Neural Network to Predict the Dynamic Frequency Response of a Power System to an Under-Frequency Load Shedding Scenario," IEEE Transactions on Industry Applications, pp 346-351, Jan 2000.
[5]. Load Shedding, Load Restoration and Generator Protection Using Solid-state and Electromechanical Under frequency Relays, GET-6449, General Electric Company, Philadelphia, PA.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An approach towards solving the emerging technological implications of Mobile Apps |
Country | : | India |
Authors | : | Mr. Kalpesh Parmar |
Abstract: In the last few years, testing of mobile application has become very important and a point of concern for the app developers. So in this vibrant market where innovation in the field of mobile technology is taking place on everyday basis, it has become very difficult to cope up with this new eco-system. Mobile application testing is very important component of software development life cycle. As development of software application is a very complex process and hence the possibility of bugs and errors cannot be ruled out.......
Keywords - Mobile Applications and Testing Strategy
[1]. http://ubertesters.com/why-is-mobile-application-testing-important/
[2]. http://www.articlesbase.com/cell-phones-articles/importance-of-testing-in-mobile-application-development-cycle-5892139.html
[3]. http://www.mobileappstesting.com/category/mobile-application-testing/android-application-testing/
[4]. TEST PLANNING FOR MOBILE AND INTERNET-BASED SYSTEMS BY HUNG Q. NGUYEN ,BOB JOHNSON, MICHAEL AND HACKETT, 11JUL 2003.
[5]. Beginner's Guide for Mobile Applications Testing by Jeesmon jacob , 28 May 2015
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study of Distributed Data Mining Algorithm and Trends |
Country | : | India |
Authors | : | Ms. Rupali Chikhale |
Abstract: Data mining technology now a days is used as a mode of identifying patterns and trends from large quantities of data.The Data Mining technology use data integration method to generate Data warehouse, where all data put together on one of the site which is treated as a central site, and then data mining algorithm executed against that data to extract the useful Module Prediction and knowledge evaluation.......
Keywords - Distributed Data Mining, Grid Computing, Multi Agent Systems.
[1]. http://www.csee.umbc.edu/~hillol/PUBS/review.pdf
[2]. http://www.distributeddatamining.org/
[3]. http://www.dfki.de/~klusch/papers/eaai.pdf
[4]. http://link.springer.com/article/10.1007%2Fs10799-012-0124-y#page-1
[5]. http://neuron-ai.tuke.sk/babik/19310438.pdf
[6]. http://dml.cs.byu.edu/~cgc/docs/atdm/Readings/DistributedDM.pdf