Volume 5 Issue 2 April-June 2017

Volume 5 Issue 2                         April-June 2017

CLUSTER BASED LOAD BALANCING IN CLOUD [pp 01-04]

Shrivastava Anurag, Sondhi Jyoti, Mukhraiya Pooja
Abstract- However, the complexity involved in incoming load to the cloud and the limited availability and characteristics of the resources in the cloud needs some well-designed resource management system to efficiently utilize the resources, without any latency or lag. In this paper we are presenting an effective Virtual machines (VMs) controlling and load distribution algorithm for cloud ….

EFFICIENT LICENSE PLATE RECOGNITION USING DYNAMIC THRESHOLDING AND GENETIC ALGORITHMS [pp 5-10]

Joshi Ritika, Kourav Deepak

Abstract- In this paper planned technique depends on identifying the key characteristic of a number plate the concentration of characters with robust light-on-dark edges. The system that reads number plates from any digital image, color or monochrome, sizes vary from 640×480 to megapixel pictures there are 3 major steps to number plate reading. Locating and isolating the number plates within the image, Locating and isolating the characters within the number plate, Reading the characters (OCR, optical character recognition).A style….

MACHINE LEARNING TECHNIQUE FOR PRODUCT CLASSIFICATION IN E-COMMERCE DATA USING MICROSOFT AZURE CLOUD [pp 11-13]

Anurag Shrivastava, Jyoti Sondhi, Bharat Kumar

Abstract – Rapid growth of online shopping and marketing increase the field of e-commerce, which got boosted rapidly with the application of machine learning. Machine Learning (ML) has empowered businesses by finding useful patterns from customers’ search patterns and buying behaviours on web. Predictive analytics based on mach…..

AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING MACHINE LEARNING CLASSIFICATION TECHNIQUE [pp 14-17]

Anurag Shrivastava, Jyoti Sondhi, Sadaf Khan

Abstract – Use of internet is increasing progressively, so that large amount of data and it security is also an issue. IDS (Intrusion detection system) are main defending technique. Sampling technique is one the solution of large dataset. This work proposes a sampling technique for obtaining the sampled data. Sampled dataset represent the whole dataset with proper class balancing. The purpose of this paper ….

IMPROVED DECISION TREE CLASSIFICATION PERFORMANCE [pp 18-22]

Babita Patel, Anurag Shrivastava, Jyoti Sondhi

Abstract – Growth and popularization of information system increase now days, security of information is a big problems. Intrusion Detection System (IDS) as the main security defensive technique and is widely used against intrusion. Data Mining and Machine Learning techniques proved useful and attracted increasing attention in the network intrusion detection research area. Recently, many machine learning methods….

DESIGN, SIMULATION AND COMPARISON OF PFC BOOST CONVERTER TOPOLOGIES [pp 23-27]

Mirza Faizan Baig, Hitesh Lade

Abstract- It is a big challenge to maintain a good power factor while working in industrial and domestic applications as well, since most of the loads are inductive which tend to make power factor more lagging. To remedy this situation many solutions are available, out of which boost converters are studied and analyzed in the upcoming work. There are various topologies of the boost converters which ….

CYBER ATTACK DETECTION AND CLASSIFICATION BASED ON MACHINE LEARNING TECHNIQUE USING NSL KDD DATASET [pp 28-31]

Anurag Shrivastava, Jyoti Sondhi, Sunita Ahirwar

Abstract – This research work aims in design and development of an approach for boost cyber attack detection. Growth of information system is increase the data size and attention of intruders now days. Intrusion Detection System (IDS) as the security technique and is widely used against intrusion. Researchers use Data Mining and Machine learning techniques intrusion detection research area. Recently, many machine learning methods have also ….

CYBER ATTACK DETECTION AND CLASSIFICATION USING MACHINE LEARNING TECHNIQUE USING MICROSOFT AZURE CLOUD [pp 32-35]

Rajshri Pohekar, Vaibhav Patel, Anurag Shrivastava

Abstract—Information security is always a very important issue for modern computer world. Intrusion Detection System (IDS) as the security technique and is widely used against intrusions. Researchers use Data Mining and Machine learning techniques in intrusion detection research area. Many machine learning methods have also been useful to obtain high….