Learn More
  • Badri Prasad Patel, Nitesh Gupta, Rajneesh K Karn, Y K Rana
  • 2011
Discovering association rules between items in a large database of sales transactions has been described as an important database mining problem. Relationships between data are called associations. Association rule mining reveals such interesting relationships. These association rules are presented in a compact form, eliminating redundancy. Elimination of(More)
OBJECTIVE Exhaled nitric oxide (FENO) and nasal nitric oxide (n NO) measurement is an area of ongoing research in the study of airway inflammation. The atopic status is known to influence the levels of FENO and n NO. This study was undertaken to study the relationship between nitric oxide measurements in bronchial asthma and allergic rhinitis along with(More)
The web log data embed much of the user's browsing behavior. Every visit of internet user is recorded in web server log. There are many systems that attempt to predict user navigation on the internet through the use of past behavior, preferences and environmental factors. Ensuring the integrity of computer networks, both in relation to security and with(More)
In this paper we presents a method for handling multiple metrics and different network parameters simultaneously to analyze the loss factor of routing protocols in mobile ad hoc network(MANET) environments. We have used Taguchi' loss function to determine the best parameters giving maximum throughput, packet delivery ratio (PDR), average delay, DROP and(More)
Instant identification of outlier patterns is very important in modern-day engineering problems such as credit card fraud detection and network intrusion detection. Most previous studies focused on finding outliers that are hidden in numerical datasets. Unfortunately, those outlier detection methods were not directly applicable to real life transaction(More)
— Security is one of the main concerns for Smartphone users today. As the power and features of Smartphone's increase, so has their vulnerability for attacks by viruses etc. An Android OS could be attacked by hackers: Because it's Open platform, Users will access the Internet intensively and everyone can develop applications for Android. In previous(More)
BACKGROUND AND OBJECTIVE Obesity and asthma are common inflammatory conditions, having presence of both local and systemic inflammation and this relationship is not well understood. This study was undertaken to compare pulmonary function parameters, inflammatory marker like C-reactive protein (hs-CRP), exhaled nitric oxide (FENO) and atopic profile between(More)
In a Network we have various issues to work with our services & data (maintenances) & today Cloud computing provides convenient on-demand network access to a shared pool of configurable enumerate resources. The resources can be rapidly expand with great efficiency and minimal management atop. Cloud is an afraid computing platform from the view point of the(More)
In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threats because of its open entrusted environment, with little security arrangement, security over MANET can be enhance up to some satisfactory level because of(More)