Sakkarapani Krishnaveni

Learn More
Data Mining is taking out of hidden patterns from huge database. It is commonly used in a marketing, surveillance, fraud detection and scientific discovery. In data mining, machine learning is mainly focused as research which is automatically learnt to recognize complex patterns and make intelligent decisions based on data. Nowadays traffic accidents are(More)
At present most of the women were having symptoms of breast cancer it can be detected by presence of microclacifications in mammogram. Classifier makes vital role in early detection and diagnosis of microclacifications in mammogram. Most of the classifier at present which is not more efficient to diagnosis the breast cancer. In this paper leads to analysis(More)
Web applications are most widely used technique for providing an access to online services. At the same time web applications are easiest way for vulnerable acts. When a security mechanism is failed then the user may download malicious code from a trusted web site. In this case, the malicious script is contracted to full access with all assets belonging to(More)
Malicious code is a way of attempting to acquire sensitive information by sending malicious code to the trustworthy entity in an electronic communication. JavaScript is the most frequently used command language in the web page environment. If the hackers misuse the JavaScript code there is a possibility of stealing the authentication and confidential(More)
Data warehouse is a centralized repository for analyzing and storing huge amount of data. In distributed data warehouse, data can be shared across multiple data repositories which belong to one or more organizations. Query sorting is one of the issues for formatting the number of queries that can be selected together. Reducing the usual completion period of(More)
Data mining refers to extracting knowledge from large amounts of data. Most of the current systems are weak at detecting attacks without generating false alarms. Intrusion detection systems (IDSs) are increasingly a key part of system defense. An intrusion can be defined as any set of actions that compromise the integrity, confidentiality or availability of(More)
ABTRACT As the population is increasing in cities transportation has become difficult. In this paper, we present an easy way of transportation. The GPS module collects the position of the bus via GPS receiver and then sends the data of positions to specified center through SMS by using GSM service. After processing data, the position of the mobile vehicle(More)
Multi-stage processing occurred in distributed data warehouse. Many joints and splits are required at the time of submitting queries. Scheduling algorithms are used to resolve these issues. Reducing the processing time and cost are common concerns in scheduling. By this way the available resources are used to accomplish the task with quick manner. In this(More)