Research & Publications

Research By
Prof Anil Rajput

Research Article Decision tree approach to build a model for water quality

Research Article Decision tree approach to build a model for water quality

This paper presents a Classification data model using decision tree for the purpose of analyzing water quality data of MAA Narmada River at Harda district. The data model was implemented in WEKA software. Classification using decision tree was applied to classify /predict the pollutant class of water. It is observed in the analysis that the Nitrogen (NH3_N,NO3_N), pH,Temp _C, BOD, COD, other parameter relevant to water processes play an important role to assess the quality of river water. In this experiment we have used five attribute of water quality data which can affect accuracy of water.

Stability of Picard Iteration Procedure Using Ciric Multi-Valued Contraction Condition

Stability of Picard Iteration Procedure Using Ciric Multi-Valued Contraction Condition

Stability of iterative procedure plays very important role in various fields like computer programming. game theory etc. The aim of this paper is to establish the stability results using Ciric multi-valued contraction for iterative procedure on a metric space.

Fifth Generation Technology (Nano Technology) 2014

Fifth Generation Technology (Nano Technology) 2014

In this paper we are discussing about a new technology in mobile industry that is known as 5 th generation mobile technology (5G) or Nano technology. The enhancement in technologies by everyday, Mobile industry is also getting more enhanced. In every 4 to 5 years a new technology in the IT market is introduced. New technology is developed for integrating the real life with mobile technology. Over the years, wireless telecommunications market has recognized as one of the most dynamic and fastest growing segments of the global telecommunications industry [2].First came the 1G, after that 2G and 3G came to surface. Nowadays the very popular technology 4G is running that is also known as super fast technology. Now there will come 5G Fifth Generation technology. This latest and more enhanced technology will provide a unique experience to its users. 5 th generation wireless systems is a major phase of mobile telecommunications standards.

Performance of “ VCPHCF-RTT ” Security Agent in Private Virtual Cloud Infrastructure

Performance of “ VCPHCF-RTT ” Security Agent in Private Virtual Cloud Infrastructure

Cloud Security issue is one of the biggest challenges that hampers the growth of Cloud for its various service provisioning. An on-demand access to a shared pool of computing resources in the cloud is the major service provisioning that involves delivering hosted services over the Internet. Security of Private Virtual Cloud Infrastructure will be proposed against IP-Spoofing based DDoS Attacks using Private Virtual Cloud Infrastructure Model. Virtualization Enhancement will be done in Cloud using proposed Security Agent VCPHCF-RTT. Performance Parameters will be analysed after introspection to cloud security techniques to resolve focussed Research Problem Issues and Challenges. VCPHCF-RTT improves the efficiency of the probability based Hop Count Filtering technique using HCF at intermediate nodes between the Virtual Machines of Client VM and Server VM along with RTT. It reduces the probability of guessing the RTT and VCHCF parameter values both at the intermediate routers by the at…

Publications By
Prof Anil Rajput

Web usage mining: applications and pattern discovery

Web usage mining: applications and pattern discovery

With the explosive growth of information sources available on the World Wide Web and the rapidly increasing space of adoption to Internet commerce, the Internet has evolved into a gold mine that contains or dynamically generates information that is beneficial to E-businesses. A web site is the most direct link a company has to its current and potential customers. The companies can study visitor’s activities through web analysis, but before performing analysis we need to discover pattern and find the patterns in the visitor’s behavior. In this paper we describing about the tools and techniques for pattern discovery and many applications of web usage mining. In this paper we also gather data from WWW for pattern discovery. 

An efficient model for information gain of sequential pattern from web logs based on dynamic weight constraint

An efficient model for information gain of sequential pattern from web logs based on dynamic weight constraint

Data mining is the task of discovering interesting patterns from large amounts of data. There are many data mining tasks, such as classification, clustering, association rule mining, and sequential pattern mining. Many frequent sequential traversal pattern mining algorithms have been developed which mine the set of frequent subsequences traversal pattern satisfying a minimum support constraint in a session database. However, previous frequent sequential traversal pattern mining algorithms give equal weightage to sequential traversal patterns while the pages in sequential traversal patterns have different importance and have different weightage.

An Efficient Protocol Using Smart Interval for Coordinated Checkpointing

An Efficient Protocol Using Smart Interval for Coordinated Checkpointing

Checkpointing using message logging is a very popular technique for fault tolerance in distributed systems. The proposed protocol controls the lost messages, orphan messages and also simplifies garbage collection which is not available in most of existing protocols. In the protocol, all processes take checkpoints at the end of their respective smart interval to form a global consistent checkpoint. Since the checkpointing is allowed only within smart interval, the protocol will minimize various overheads like checkpointing overhead, message logging overhead etc. KeywordsDistributed Systems–Checkpointing–Fault Tolerance and Message Logging–Smart Interval

Fixed Point Theorem for Fuzzy Mappings in Generalized R Fuzzy Metric Spaces

Fixed Point Theorem for Fuzzy Mappings in Generalized R Fuzzy Metric Spaces

The study of theory of fuzzy sets was initiated by Zadeh in 1965. Since then many authors have extended and developed the theory of fuzzy sets in the fields of topology and analysis. The notion of fuzzy metric spaces has very important applications in quantum particle physics. As a result many authors have extended the Banach’s Contraction Principle to fuzzy metric spaces and proved fixed point and common fixed point theorems for fuzzy metric spaces. The aim of this paper is to introduce the new definition of R-fuzzy metric space and establish a fixed point theorem for fuzzy mappings in generalized R-fuzzy metric spaces.

Performance of “VCPHCF-RTT” security agent in private virtual cloud infrastructure

Performance of “VCPHCF-RTT” security agent in private virtual cloud infrastructure

Cloud Security issue is one of the biggest challenges that hampers the growth of Cloud for its various service provisioning. An on-demand access to a shared pool of computing resources in the cloud is the major service provisioning that involves delivering hosted services over the Internet. Security of Private Virtual Cloud Infrastructure will be proposed against IP-Spoofing based DDoS Attacks using Private Virtual Cloud Infrastructure Model. Virtualization Enhancement will be done in Cloud using proposed Security Agent VCPHCF-RTT.