Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Lokanatha Reddy

    Lokanatha Reddy

    Mobile Ad-hoc Networks (MANETs) are highly decentralized, independent and self-organizing networks. It is significant to study the cost of the network, to optimize the routing method by means of cross layer interaction across the layers... more
    Mobile Ad-hoc Networks (MANETs) are highly decentralized, independent and self-organizing networks. It is significant to study the cost of the network, to optimize the routing method by means of cross layer interaction across the layers of the network. In this paper, first we generate a minimum cost spanning tree for a given network of N- nodes using an efficient algorithm, and then we study the problem of constructing a K-node Multicast Minimum Spanning Tree (KMMST) for any given multicasting group with K nodes, where K is less than n. Comparing the cost associated with the minimum spanning tree of the entire network with n nodes and the cost of KMMST, it is found that the cost of KMMST is significantly less compared to cost of the n nodes spanning tree. Key words: K-nodes multicasting, cost, spanning tree, routing. 1.
    Interpreting available data is a focal issue in data mining. Gathering of primary data is a difficult and expensive affair for assessing the trends for any business decision especially when multiple players are present. There is no... more
    Interpreting available data is a focal issue in data mining. Gathering of primary data is a difficult and
    expensive affair for assessing the trends for any business decision especially when multiple players are
    present. There is no uniform formula-type work procedure to deduce information from a vast data set
    especially if the data formats in the secondary sources are not uniform and need enormous cleansing to
    mend the data for statistical analysis. In this paper, an incremental approach to cleanse data using a
    simple yet extended procedure is presented and it is shown how to deduce conclusions to facilitate business
    decisions. Freely available Indian Telecom Industry’s data over a year is used to illustrate this process. It
    is shown how to conclude the superiority of one telecom service provider over the others comparing
    different parameters like network availability, customer service quality etc. using a relative parameter
    quantification technique. It is found that this method is computationally less costly than the other known
    methods.
    Research Interests:
    The chief limiting factor for current mobile devices is the amount of battery power. To improve this crucial factor, researchers have tried to optimize power consumption of every aspect of the mobile device. Power consumption can be... more
    The chief limiting factor for current mobile devices is the amount of battery power. To improve this crucial factor, researchers have tried to optimize power consumption of every aspect of the mobile device. Power consumption can be optimized by disks, memory chips, CPU scheduling and efficient routing techniques.

    Dynamic Source Routing (DSR) is a popular protocol for mobile adhoc routing and data forwarding over wireless networks. In this research an innovative mechanism is suggested for DSR that improves both the routing and data forwarding performance, with lesser power consumption.This mechanism involves intelligent use of the route discovery and route maintenance process thereby providing faster routing and reduced traffic as compared to the basic DSR. This mechanism enables faster data forwarding and reduced collisions with lesser power consumption. The basic DSR and modified DSR were studied and compared in GloMoSim simulation environment. Since one of our major goals was to reduce the routing overhead, the existing algorithm was modified to achieve this objective. To get a better idea of the generated overhead we considered the number of routing packets, which carry the overhead. The analysis shows that the performance of modified DSR is better than the performance of the basic DSR for the considered simulations scenarios. The modified algorithm was found to reduce the power consumption of the network by routing lesser routing load.
    ABSTRACT In Mobile Ad hoc Networks (MANETs), the issues of connectivity, bandwidth, link stability and route failure tolerance significantly affect multicasting. This research work investigates these key issues using graph theory... more
    ABSTRACT In Mobile Ad hoc Networks (MANETs), the issues of connectivity, bandwidth, link stability and route failure tolerance significantly affect multicasting. This research work investigates these key issues using graph theory concepts. Further, route failure-tolerant and stable multicast paths are computed based on the graph theory metric called Connectivity Index (CI). This investigation has resulted in Cross-Layer Design (CLD) of QoS multicast protocol based on MPEG-21 multimedia framework. The research work is carried out in MATLAB environment.
    The Efficient routing protocols can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed so far. Amongst the most popular ones... more
    The Efficient routing protocols can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed so far. Amongst the most popular ones are Ad hoc On-demand Distance Vector (AODV), Destination-Sequenced Distance-Vector Routing protocol (DSDV), Dynamic Source Routing Protocol (DSR), and Optimum Link State Routing (OLSR). Despite the popularity of those protocols, research efforts have not focused much in evaluating their performance when applied to variable bit rate (VBR). In this paper we present our observations regarding the performance comparison of the above protocols for VBR in mobile ad hoc networks (MANETs). We perform extensive simulations, using NS-2 simulator. Our studies have shown that reactive protocols perform better than proactive protocols. Further DSR has performed well for the performance parameters namely delivery ratio and routing overload while AODV performed better in terms of average delay.
    Multicasting can efficiently support a variety of applications that are characterized by a close degree of collaboration, typical for many ad-hoc applications currently envisioned. Within the wired network, well established routing... more
    Multicasting can efficiently support a variety of applications that are characterized by a close degree of collaboration, typical for many ad-hoc applications currently envisioned. Within the wired network, well established routing protocols exist to offer an efficient multicasting service. As nodes become increasingly mobile, these protocols need to evolve to similarly provide an efficient service in the new environment. Future multimedia communication systems have to support the user’s needs, the terminal capabilities, the content specification and the underlying networking technologies. The related protocols and applications must be designed from this integration perspective in a cross-layer centric manner. This paper presents the survey of existing related work on QoS Multicasting, Cross-Layer design for QoS Multicasting in ad hoc wireless networks, and MPEG-21 enabled cross-layer Multicast Routing with Quality of Service in Mobile Ad hoc Networks (MCMR- QoS ).
    A novel infrastructureless mobile networks (MANETs) is a collection of wireless nodes that can dynamically form a network to exchange information. The special features of MANET bring this technology great opportunity together with severe... more
    A novel infrastructureless mobile networks (MANETs) is a collection of wireless nodes that can dynamically form a network to exchange information. The special features of MANET bring this technology great opportunity together with severe challenges. This paper describes the fundamental problems of ad hoc networking by giving its related background including the concept, features, applications, issues of MANETs, investigates and presents recent research trends and identifies Simulators for MANETs[5]. Based on recent research interests of scholars we found that some issues such as routing and power management attracted much attention and issues such as IP addressing and fault tolerance will have wide scope in the future. In the qualitative analysis [5], we found that some factors such as scalability, stability, and reliability attracted much. The essential simulation metrics for various MANET issues are identified and Simulators are listed for experiment. The analysis results demonstrate the utilization trends for various MANET simulators.
    In this paper, we study the problem of constructing minimum cost multicast trees and computing multiple multicast paths. Due to the lack of redundancy in multi-path and multicast structures, the multicast routing protocols are vulnerable... more
    In this paper, we study the problem of constructing minimum cost multicast trees and computing multiple multicast paths. Due to the lack of redundancy in multi-path and multicast structures, the multicast routing protocols are vulnerable to the failure in ad-hoc networks. So it is the dire need to come across the fault tolerant solution. This paper proposes edge disjoint spanning tree based Multicasting in ad-hoc networks for route failure tolerance.
    The survivability of the network is closely related to the connectivity of the network. For many network applications such as a sensor network/ad hoc network for battlefield monitoring or wild fire tracking etc., survivability is one of... more
    The survivability of the network is closely related to the connectivity of the network. For many network applications such as a sensor network/ad hoc network for battlefield monitoring or wild fire tracking etc., survivability is one of most important requirements, and therefore a number of related problems are proposed. In this paper we study the survivability with respect to multicast route failure tolerance in K-connected MANET. We analyze the key issues namely connectivity, route failure tolerance and energy of the network. These issues can optimize the design of the routing protocol by means of cross layer interaction across the layers of the network. This paper analyzes the K-connected MANET for various parameters namely connectivity, no. of links, no. of spanning trees, no. of EDMSTs using graph theory metric, connectivity index.
    Mobile Ad-hoc Networks (MANETs) are highly decentralized, independent and self-organizing networks. It is significant to study the cost of the network, to optimize the routing method by means of cross layer interaction across the layers... more
    Mobile Ad-hoc Networks (MANETs) are highly decentralized, independent and self-organizing networks. It is significant to study the cost of the network, to optimize the routing method by means of cross layer interaction across the layers of the network. In this paper, first we generate a minimum cost spanning tree for a given network of N- nodes using an efficient algorithm, Then we study the problem of constructing a K-node Multi cast Minimum Spanning Tree (KMMST) for any given multicasting group with K nodes, where K is less than n. Comparing the cost associated with the minimum spanning tree of the entire network with n nodes and the cost of KMMST, it is found that the cost of KMMST is significantly less compared to cost of the n nodes spanning tree.
    Due to random mobility of nodes in MANETs, the connectivity of the nodes in very sensitive environments become a serious issue and is subject to increased risk of damage. Sometimes a MANET suffers from the simultaneous failure of multiple... more
    Due to random mobility of nodes in MANETs, the connectivity of the nodes in very sensitive environments become a serious issue and is subject to increased risk of damage. Sometimes a MANET suffers from the simultaneous failure of multiple multicast paths and gets partitioned into disjoint segments. In order to avoid poor performance of a multicast/ unicast routing protocol and to curb the adverse affect on an application performance, it is essential to restore the network connectivity. In this research work, we proposed a novel strategy, designed and implemented to restore the connectivity in MANET as well as to compute Steiner minimum spanning tree.
    In this paper, we study the fundamental property of the ad hoc network using connectivity index. We investigate the construction of minimum cost multicast trees by selecting a link having minimum connectivity Index and comparing... more
    In this paper, we study the fundamental property of the ad hoc network using connectivity index. We investigate the construction of minimum cost multicast trees by selecting a link having minimum connectivity Index and comparing application required bandwidth with (available bandwidth – allocated bandwidth) of the link. We have shown that Increase in total connectivity Index of the entire network increases no. of spanning trees. Due to the lack of redundancy in multi-path and multicast structures, the multicast routing protocols are vulnerable to the failure in ad-hoc networks. So it is the dire need to come across the fault tolerant solution. This paper proposes edge disjoint spanning tree Multicasting based on connectivity index with bandwidth constraint.
    In this paper an effort has been made to study various Congestion control techniques used for reducing/easing the level of congestion and subsequently avoiding the congestion of the wired communication networks in general and High Speed... more
    In this paper an effort has been made to study various Congestion control techniques used for reducing/easing the level of congestion and subsequently avoiding the congestion of the wired communication networks in general and High Speed Networks in particular. Many authors have suggested several congestion control techniques [2], [3], [4], [8], [12], [14], [15], [23], [29], [32] & [33] and studied their behavior under various network conditions, for a range of parameters also under heterogeneous networking environments. A special effort has been made to study the problems associated with the TCP congestion control mechanisms and the several solutions that have been proposed to improve its performance. This analysis tries to study the limitations of the suggested solutions, based on various parameters and propose algorithms to overcome these limitations for the High Speed Networks.
    Conventional TCP suffers from poor performance on high bandwidth delay product links meant for supporting transmission rates of multi Gigabits per seconds (Gbps). This is largely due to TCP’s congestion control algorithm, which can be... more
    Conventional TCP suffers from poor performance on high bandwidth delay product links meant for supporting transmission rates of multi Gigabits per seconds (Gbps). This is largely due to TCP’s congestion control algorithm, which can be slow in taking advantage of large amounts of available bandwidth. A number of high-speed variants have been proposed recently, the major ones being BIC TCP, CUBIC, FAST, High-Speed TCP, Layered TCP, Scalable TCP and XCP. In this paper an effort has been made to comparatively analyze the aforementioned protocols based on various parameters viz., Throughput, Fairness, Stability, Performance, Bandwidth Utilization and Responsiveness and study the limitations of these protocols meant for the High Speed Networks.
    The conventional TCP suffers from poor performance on high bandwidth delay product links meant for supporting data transmission rates of multi Gigabits per seconds (Gbps). This is mainly due to the fact that during congestion, the TCP's... more
    The conventional TCP suffers from poor performance on high bandwidth delay product links meant for supporting data transmission rates of multi Gigabits per seconds (Gbps). This is mainly due to the fact that during congestion, the TCP's congestion control algorithm reduces the congestion window cwnd to ½ and enters additive increase mode, which can be slow in taking advantage of large amounts of available bandwidth. In this paper we have presented a new model and to overcome the drawbacks of the TCP protocol and propose to carry out a study of the same based on various parameters viz., Throughput, Fairness, Stability, Performance and Bandwidth Utilization for supporting data transmission across the High Speed Networks
    The conventional TCP suffers from poor performance on high bandwidth delay product links meant for supporting data transmission rates of multi Gigabits per seconds (Gbps). This is mainly due to the fact that during congestion, the TCP's... more
    The conventional TCP suffers from poor performance on high bandwidth delay product links meant for supporting data transmission rates of multi Gigabits per seconds (Gbps). This is mainly due to the fact that during congestion, the TCP's congestion control algorithm reduces the congestion window cwnd to frac12 and enters additive increase mode, which can be slow in taking advantage of large amounts of available bandwidth. In this paper we have presented a modified new model and to overcome the drawbacks of the TCP protocol and propose to carry out a study of the modified model based on various parameters viz., Throughput, fairness, stability, performance and bandwidth utilization for supporting data transmission across the high speed networks.
    The Transmission Control Protocol (TCP) suffers from poor performance on high bandwidth delay product links meant for supporting data transmission rates of multi Gigabits per seconds (Gbps). During congestion, the TCP’s congestion control... more
    The Transmission Control Protocol (TCP) suffers from poor performance on high bandwidth delay product links meant for supporting data transmission rates of multi Gigabits per seconds (Gbps). During congestion, the TCP’s congestion control algorithm reduces the congestion window cwnd to ½ and enters additive increase mode, which proves to be slow in taking advantage of large amounts of available bandwidth. In this paper a refined new model, to overcome the drawbacks of the TCP protocol, has been presented. We propose to carry out a study of the refined new model based on various parameters viz., Throughput, Fairness, Stability, Performance and Bandwidth Utilization for supporting high data transmission rates across the High Speed Networks.
    The conventional TCP suffers from poor performance on high bandwidth delay product links meant for supporting very high data transmission rates to the tune of multi Gigabits per seconds (Gbps). This is mainly due to the fact that during... more
    The conventional TCP suffers from poor performance on high bandwidth delay product links meant for supporting very high data transmission rates to the tune of multi Gigabits per seconds (Gbps). This is mainly due to the fact that during congestion, the TCP’s congestion control algorithm reduces the congestion window cwnd to ½ and enters additive increase mode, which can be slow in taking advantage of large amounts of available bandwidth. In this paper an effort has been made to overcome the drawbacks of the TCP protocol through newTCP, a refined new model suggested for controlling the congestion and study its behavior based on various parameters viz., Throughput, Fairness, Scalability, Performance and Bandwidth Utilization for supporting data transmission across the High Speed Networks.
    This research work focuses on application layer. By making use of RTSP we can extend control over the delivery of data with real-time properties. RTSP is the robust protocol that can stream multimedia over multicast and nicest in... more
    This research work focuses on application layer. By making use of RTSP we can extend control over the delivery of data with real-time properties. RTSP is the robust protocol that can stream multimedia over multicast and nicest in ‘one-to-many’ applications. RTSP takes advantage of streaming which breaks data into many packets sized according to the available bandwidth between client and server [19] [20]. An usual instance is while enough packets have been received by the client; the user's software can be playing a particular packet, decompressing one packet and downloading another. The user is able to start listening/viewing almost immediately without having to get the entire media file. Both live data feeds and stored clips can be the sources of data. Using RTSP we can reduce the jitter and improve the quality to a significant extent.
    Connectivity is one of the most fundamental aspects of MANETs. The fundamental application of a network is to facilitate the exchange of data among its nodes. This paper introduces connectivity Index (CI) as one of the parameter to study... more
    Connectivity is one of the most fundamental aspects of MANETs. The fundamental application of a network is to facilitate the exchange of data among its nodes. This paper introduces connectivity Index (CI) as one of the parameter to study MANETs
    Mobile Ad-hoc Networks (MANETs) are highly decentralized, independent and self-organizing networks, and these tend to be highly unstable with respect to packet delivery, connectivity between the nodes and routing between the nodes. It is... more
    Mobile Ad-hoc Networks (MANETs) are highly decentralized, independent and self-organizing networks, and these tend to be highly unstable with respect to packet delivery, connectivity between the nodes and routing between the nodes. It is important to study the topological parameters including energy of the network to optimize the routing process by means of cross layer interaction across the layers of the network. This paper employs a semi-analytical approach to analyze topological and energy related properties of K-connected MANETs.
    The issues in Mobil ad-hoc networks (MANETs) always bring the attention of research community. The fundamental issues of connectivity, scalability, routing and topology control in MANETS is worth to study. Graph theory plays an important... more
    The issues in Mobil ad-hoc networks (MANETs) always bring the attention of research community. The fundamental issues of connectivity, scalability, routing and topology control in MANETS is worth to study. Graph theory plays an important role to study these fundamental issues. This paper highights the concepts of graph theory that are employed to address these fundamental issues. This paper also highights the importance of MANET simulation and also gives an insight into the various simulation models that are used currenty.
    The issue of network partitioning is an important aspect of any network design and its study is more relevant to mobile ad-hoc networks (MANETs). MANETs are highly vulnerable to network partition due to the dynamic change in the topology.... more
    The issue of network partitioning is an important aspect of any
    network design and its study is more relevant to mobile ad-hoc
    networks (MANETs). MANETs are highly vulnerable to
    network partition due to the dynamic change in the topology.
    Very often the network will partition and remerge, affecting the
    performance of routing protocols. This paper introduces the
    application of Connectivity Index (CI) concept to detect the
    partition (having two clusters) of MANET.
    The issues in Mobile ad-hoc networks (MANETs) always bring the attention of research community. The fundamental issues of connectivity, scalability, routing and topology control in MANETS is worth to study. Graph theory plays an important... more
    The issues in Mobile ad-hoc networks (MANETs) always bring the attention of research community. The fundamental issues of connectivity, scalability, routing and topology control in MANETS is worth to study. Graph theory plays an important role in the study of these fundamental issues. This paper highlights the concepts of graph theory that are employed to address these fundamental issues.
    Machine Translation (MT) is a subfield of computational linguistics. It is a major challenging area of research especially in the Indian context. Machine Translation is the process by which we understand text/speech written in one... more
    Machine Translation (MT) is a subfield of computational linguistics. It is a major challenging area of research especially in the Indian context. Machine Translation is the process by which we understand text/speech written in one language and then generate it in another language. The major challenge in MT is how to program a computer to understand a text/speech as a human being does and how to creat a new text in TL (Target Language) that sounds as if it has been written by a human. In this article, a comparative study is done on the various principles and practices used in machine translation and the examples are discussed in the Indian context. This informative arcticle discusses the various approaches to MT from various angles and also discusses the different issues in MT with a special emphasison word sense disambiguation and Named Entity Recognition. The research is done purely on the basis of the secondary data available such as books, published articles and other resources such as newspapers. My work in sentemce alignment ios expected to resolve some of these issues to some extent.
    Natural Language Processing, a branch of artificial intelligence and a subfield of computational linguistics, aims at designing and building software that will analyze, understand, and generate natural human languages, so that in the... more
    Natural Language Processing, a branch of artificial intelligence and a subfield of computational linguistics, aims at designing and building software that will analyze, understand, and generate natural human languages, so that in the future we will be able to interface with computers, in both written and spoken contexts using natural human languages, instead of computer languages. One of the greatest challenges inherent in natural language processing is how to teach computers understand the way humans learn (speak) and use language. While humans communicate, the meaning of the sentence depends on both the context in which it is communicated and the understanding of the word sense ambiguity. To make the software able to do that, it must be programmed to understand context and linguistic structures. In this article, NLP is discussed as a computational model of language which computes a representation of the meaning of sentences and texts and use these representations in reasoning tasks. The applications and the process of evaluation of language understanding systems are discussed and the basic organization of natural languages are covered to a large extent to have a better understanding of  the NLP. The research is done purely on the basis of secondary data available such as books, published articles and other resources such as newspapers.
    Sentence alignment task in machine translation gained more importance recently. It is the task of finding correspondences of sentences in one language (eg. English) and another (eg. Malayalam, an Indian language). Basically, alignment... more
    Sentence alignment task in machine translation gained more importance recently. It is the task of finding correspondences of sentences in one language (eg. English) and another (eg. Malayalam, an Indian language). Basically, alignment aims to succeed the task of extracting structural information and statistical parameters from bilingual corpora. This process might seem very easy at first sight but it has some important challenges to face which make the task difficult. These challenges are discussed with special reference to English to Malayalam sentence alignment. There is a special mention on the previous work in this area and a new algorithm is proposed for sentence alignment in English to Malayalam.
    Basically, alignment aims to succeed the task of extracting structural information and statistical parameters from bilingual corpora but it has some important challenges to face which make the task difficult. In this hybrid method, the... more
    Basically, alignment aims to succeed the task of extracting structural information and statistical parameters from bilingual corpora but it has some important challenges to face which make the task difficult. In this hybrid method, the location information of sentences and paragraphs as well as the lengths of them for aligning the bilingual texts are used. This method speeds up the automatic translation and tends to be independent of the languages of the bilingual texts.
    Today’s digital libraries are extreme complex information systems, which run on the Internet [1]. The facilities of digital libraries are increasing daily as the technology advances with a motive to provide the appropriate information to... more
    Today’s digital libraries are extreme complex information systems, which run on the Internet [1]. The facilities
    of digital libraries are increasing daily as the technology advances with a motive to provide the appropriate information to its users. The very purpose of the digital libraries is to provide the required information to its users in a convenient and fashioned manner. Since the digital libraries are running on the Internet and the users are from different psychological, educational and social backgrounds, the usage of digital libraries is varying from user to user which entail the need of best user interface. Hence, this paper proposes some design principles for user interfaces for digital libraries for its effective implementation.
    The evolution of computer technology has provided effective ways of information storing, organizing and disseminating. Digital repositories are playing a vital role in knowledge storage and dissemination. DSpace and Greenstone are two... more
    The evolution of computer technology has provided effective ways of information storing, organizing and disseminating. Digital repositories are playing a vital role in knowledge storage and dissemination. DSpace and Greenstone are two popular and open source digital repository software systems. This paper deals with the comparison between these two digital repositories in various technical views. This comparative study would definitely helpful to the digital repository builders. Besides an extensible architecture for image handling is proposed which holds good for application in open source software. The pilot study results are encouraging to extend further.
    The rapid development of Information and Communication Technologies has provided a well sophisticated environment to develop the digital libraries. A digital library is a large-scale, organized collection of complex and dynamic multimedia... more
    The rapid development of Information and Communication Technologies has provided a well sophisticated environment to develop the digital libraries. A digital library is a large-scale, organized collection of complex and dynamic multimedia information and knowledge, and tools and methods to enable search, manipulation and presentation of this information and knowledge via Internet. User-Centered approach for the digital libraries would increase its usage [1]. Web 2.0 technologies provide better user-centered services with rich user experience for Web applications. Hence this paper deals with the significance of Web 2.0 in building of digital libraries and presents the architecture of Web 2.0
    enabled user interface system for DSpace digital repository.
    Digital Libraries are evolving rapidly with the usage of Internet and WWW technologies. Since the digital libraries are running on the Internet and the users are from various psychological, educational and social backgrounds, the usage of... more
    Digital Libraries are evolving rapidly with the usage of Internet and WWW technologies. Since the digital libraries are running on the Internet and the users are from various psychological, educational and social backgrounds, the usage of digital libraries is varying from user to user which entail the need of best user interface. In order to design usable and useful interactive systems, designers need to ensure that good design features are incorporated into the systems, taking into consideration end-users' needs, experience and cultural backgrounds [1]. Hence, this paper presents the users’ study in various aspects and identifies various challenges for designing the user interface system for university digital libraries for its effective implementation.
    The proliferation of Information and Communication Technologies (ICT) has provided a well sophisticated environment for the development of digital libraries. The usability of a digital library primarily depends upon its user interface... more
    The proliferation of Information and Communication Technologies (ICT) has provided a well sophisticated environment for the development of digital libraries. The usability of a digital library primarily depends upon its user interface (UI) system. Designing effective user interface system for digital libraries is a complex task. User Interface Framework is helpful to design effective interface system, as it identifies and focuses on the various factors and limitations that influence the design of the system. Hence, this paper presents a novel user interface design framework for digital libraries based on user-centered design methodology and digital library user interface design principles, for its effective implementation.
    In Data mining, Classification of objects based on their features into pre-defined categories is a widely studied problem with rigorous applications in fraud detection, artificial intelligence methods and many other fields. Among the... more
    In Data mining, Classification of objects based on their features into pre-defined categories is a widely studied problem with rigorous applications in fraud detection, artificial intelligence methods and many other fields. Among the various classification algorithms available in literature the decision tree is one of the most practical and effective methods and uses inductive learning. In this paper we reviewed various decision tree algorithms with their limitations and also we evaluated their performance with experimental analysis based on sample data.
    Data and Information or Knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. Due... more
    Data and Information or Knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. Due to the importance of extracting knowledge/information from the large data repositories, data mining has become an essential component in various fields of human life. Advancements in Statistics, Machine Learning, Artificial Intelligence, Pattern Recognition and Computation capabilities have evolved the present day’s data mining applications and these applications have enriched the various fields of human life including business, education, medical, scientific etc. Hence, this paper discusses the various improvements in the field of data mining from past to the present and explores the future trends.