48 research outputs found

    Machine Learning and Pattern Recognition

    Get PDF
    Learning is needed when there is no human expertise existing or when human beings are unable to explain their expertise. In such a situation, one simply collects all the possible previous information, analyse it and then make a rule for future prediction or taking meaningful decision. When we plan to conclude such a work with the help of a computer by providing it ample amount of data and our past experience with tools and techniques, then the whole process becomes machine learning. Hence, machine learning can be defined as programming computers to optimise a performance criterion using example data and past experience. For example, recognition of spoken speech is being done by human beings seemingly without any difficulty, but cannot explain how they do it.Defence Science Journal, 2010, 60(4), pp.345-347, DOI:http://dx.doi.org/10.14429/dsj.60.50

    Cryptology and Communication Security

    Get PDF
    Cryptology is the scientific study and practice of making (cryptography) and breaking (cryptanalysis) of codes andciphers. Code is a system of rephrasing parts of normal language meaningful with certain standard groups or symbols. Whereas cipher is a system of transforming fixed length group of language symbols at normally the single character of alphabet into code alphabet character. The science of making communications unintelligible to all except the intended recipient(s) is known as cryptography. Until recently cryptography has been of interest primarily to the defence and diplomatic personnel of governments, guarded over and directed by their national crypto logic services. But now a day’s It has become the part of our daily life viz. providing electronic security to our house and offices, use of ATM, Credit Card, Smart Cards and RFID tags, etc. all of them needs cryptography in some form. Private business sectors, terrorist outfit and electronic communication agencies are using cryptographic methods to keep their data, valuable information and their developmental activities secret until they feel that it is important for their commercial interest, etc. Many cryptographic devices and algorithms are available for non-governmental application, such as M209, Hagelin machine, DES, AES, Public key cryptography (RSA system), and also varieties of crypto algorithms are available in the open literatures for any interested agency to implement their own system of encryptions.Defence Science Journal, 2012, 62(1), pp.3-5, DOI:http://dx.doi.org/10.14429/dsj.62.143

    Classification Models for Symmetric Key Cryptosystem Identification

    Get PDF
    The present paper deals with the basic principle and theory behind prevalent classification models and their judicious application for symmetric key cryptosystem identification. These techniques have been implemented and verified on varieties of known and simulated data sets. After establishing the techniques the problems of cryptosystem identification have been addressed.Defence Science Journal, 2012, 62(1), pp.38-45, DOI:http://dx.doi.org/10.14429/dsj.62.144

    Analysis of rainfall data for drought investigation at Agra U.P.

    Get PDF
    This study presents analysis of droughts at Agra district of Uttar Pradesh India. Drought conditions were assessed for yearly time steps using rainfall data for thirty one years (1970 to 2000) at Agra station. According to the India Meteorological department (IMD) an area/region is considered to be drought if it receives seasonal total rainfall less than 75% of its normal value. The rainfall records of 31 years for Agra were obtained from the India Meteorological Department (IMD). Rainfall data has been subjected to various kind of analysis including seasonal & annual rainfall departures, probability distribution and dry spell analysis etc. For identification of drought years and the extent of deficit of annual rainfall, the annual rainfall departure analysis has been carried out. A year is considered as drought year if the total amount of annual rainfall over an area is deficient by more than 25% of its normal value. From the analysis it is observed that in years 1970,1986,1987,1990 and 2000 as moderate drought & years 1972 & 1979 as a severe drought occurred in Agra district, the chance of occurrence of drought in every 10 years varies from 2 to 2.5. It means that year after every 3 to 4 year is a drought year

    Microbial succession and changes in carbon and nitrogen during decomposition of leaf litters of Tephrosia candida (Roxb.) DC. and Oryza sativa L. under shifting cultivation in Mizoram, northeast India

    Get PDF
    The present study aims to understand microbial succession and dynamics of dry matter, carbon and nitrogen during the decomposition of leaf litters of Tephrosia candida (Roxb.) DC. and Oryza sativa L. in two fallow lands (FL) of 3 years (FL-3) and 8 years (FL-8) following shifting cultivation in Mizoram. A total of 64 microorganisms were isolated from two leaf litters by serial dilution method, out of which 13 microbes were identified as decomposers as they exhibited a positive response towards the enzyme activity. Among these 13 microorganisms, 4 (SKT 02, SKT 05, SKT 09 and SKT 020) were bacteria (Streptobacillus sp. and Bacillus sp.), 5 (SKT 033, SKT 034, SKT 035, SKT 040 and SKT045) were fungi (Microsporum sp., Rhizopus sp. and Aspergillus sp.) and 4 (SKT 030, SKT 052, SKT 053 and SKT 060) were actinomycetes (Streptomycetes sp.). T. candida leaf litter possessed low initial Carbon/Nitrogen (8.77) and Lignin/Nitrogen ratio (2.29) and considered a high-quality resource exhibiting higher decomposition rate.   Mass loss of carbon and nitrogen (~ 40-80%) was maximum during the initial two months, which slowed down in the later period of decomposition. It was concluded that the number of bacteria, fungi and actinomycetes regulate organic matter and nutrient dynamics in the soil through various enzymatic actions on high- and low-quality litters. The combination of O. sativa and T. candida litter is recommended to manage soil fertility in shifting cultivation of Mizoram,Northeast India

    Mediation of Lazy Update Propagation in a Replicated Database over a Decentralized P2P Architecture

    Get PDF
    While replicating data over a decentralized Peer-to- Peer (P2P) network, transactions broadcasting updates arising from different peers run simultaneously so that a destination peer replica can be updated concurrently, that always causes transaction and data conflicts. Moreover, during data migration, connectivity interruption and network overload corrupt running transactions so that destination peers can experience duplicated data or improper data or missing data, hence replicas remain inconsistent. Different methodological approaches have been combined to solve these problems: the audit log technique to capture the changes made to data; the algorithmic method to design and analyse algorithms and the statistical method to analyse the performance of new algorithms and to design prediction models of the execution time based on other parameters. A Graphical User Interface software as prototype, have been designed with C #, to implement these new algorithms to obtain a database synchronizer-mediator. A stream of experiments, showed that the new algorithms were effective. So, the hypothesis according to which 201C;The execution time of replication and reconciliation transactions totally depends on independent factors.201D; has been confirmed

    Identification of meteorological drought year for Varanasi district U.P.

    Get PDF
    Drought can be defined as a temporary harmful and widespread lack of available water with respect to specific need. It implies a deficiency of rainfall of sufficient magnitude over a prolonged duration so as to interfere with some phases of regional economic activities. According to the India Meteorological Department (IMD) an area is considered to be drought if it receives seasonal total rainfall less than 75% of its normal value. The rainfall records of 37 years for Varanasi were obtained from the India Meteorological department (IMD). Rainfall data has been subjected to various kind of analysis including seasonal & annual rainfall departures, probability distribution and dry spell analysis etc. For identification of drought years and the extent of deficit of annual rainfall, the annual rainfall departure analysis has been carried out. A year is considered as drought year if the total amount of annual rainfall over an area is deficient by more than 25% of its normal value. From the analysis it is observed that in years 1972, 1979, 1992, 2004 as moderate drought years occurred in Varanasi district & there were no severe drought in this region. The chance of occurrence of drought in every 10 years varies from 1 to 2. It means that year after every 4 to 5 is a drought year
    corecore