Manik K. Chavan

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
A cross sectional survey was carried in an Urban Slum Community in Bombay having a population of 60,000. A total of 393 women in reproductive age group were screened for VDRL reactivity. The highest prevalence was in 15 to 29 years of age group. The sero-positivity rate at 1:8 dilution and above was 0.50%. The seropositivity rate can be further brought down(More)
The botnet, which mainly consists of bots that are remotely controlled that provide the platform for most of the cyber threats. The effective countermeasure against such botnet is provided by IDS (Intrusion detection system). IDS regularly observes and identify the presence of active attack by inspecting the vulnerabilities in network traffic. A(More)
Health is basic requirement of any society to develop and progress. Nutrition has major effects on health. Nutrition refers to the availability of energy and nutrients to the body’s cells in relation to body requirements. Growth and development of any country is reflected by the growth and development of its children. The present community based(More)
Cloud computing provides the platform to share the application. In order to share data with other security mechanisms like cryptography is necessary. The success of data sharing on cloud depends on how we store and manage the key values. Motivation behind using elliptic curve cryptography is it will easy to find public key family with shorter operation and(More)
Previously, queries on spatial data involves, finding nearest neighbor from the current location and also finding locations in given range, so called range queries involves condition or predicate on geometric objects. Many applications today, call a new form of queries which comes with a condition on their spatial data, i.e. location and also conditions on(More)
Many previous works have focused on detection of malicious user accounts. Detecting spams or spammers on twitter has become a recent area of research in social network. However, we present a method based on two new aspects: the identification of spam-tweets without knowing previous background of the user; and the other based on analysis of language for(More)
  • 1