Version-1 (July-August 2017)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7
- Citation
- Abstract
- Reference
- Full PDF
Abstract:As technology has made an unprecedented change in world economy and professional preparation, India is rapidly advancing in the technological space. With the growing population and increasing Smartphone penetration, it is going mobile and digital. Smartphone and internet is not just for the rich and wealthy but more users are becoming informed by getting access of mobile internet. e-Governance is trying its level best to provide e-government services to citizens. But still there is need to reach these services to individual at their doorstep. So the looking at the current mobile age there is need for transforming e-governance services to m-Governance, which promises to bring the "anywhere-anytime-anybody" e-government service vision one step closer. It is in this way that this research intends to address variables that would facilitate the migration to m-governance model in a Higher Education Institution experiencing a very high growth and adoption of mobile communication technology............
Keyword: e-Governance; m-Governance, enabler and communication service. .
[1] Amailef, K. & Lu, J. (2008). M-Government: A framework of mobile-based emergency response systems. 3rd International Conference on Intelligent System and Knowledge Engineering (pp. 1398-1403).
[2] Cao, Y.Z., Lu, Y.B., Gupta, S. and Yang, S.Q. (2015) 'The effects of differences between E-commerce and m-commerce on the consumers' usage transfer from online to mobile Channel', International Journal of Mobile Communications, Vol. 13, No. 1, pp.51–70.
[3] DAVIS, F. D., BAGOZZI, R. P., & WARSHAW, P. R. User acceptance of computer technology: A comparison of two theoretical models. ... Journal of Applied Psychology, 1988, 73, 421-435. , Google Scholar.... Vol 45, Issue 7, 1992.
[4] Eom, S.-J. and Kim, J.H. (2014) 'The adoption of public smartphone applications in Korea: empirical analysis on maturity level and influential factors', Government Information Quarterly, Vol. 31, pp.S26–S36.
[5] Gefen, D, K. Elena and D. Straub, "Trust and TAM in online shopping: An integrated model. Management Information Systems Quarterly", 2003, vol. 1, pp. 51–90
- Citation
- Abstract
- Reference
- Full PDF
Abstract: SentiT is an opinion analysis application for Twitter. Based on the keyword searched, SentiT collects tweets having to do with it , separates and labels them into the different polarity classes neutral, negative and positive , simultaneously we also categorize them into emotions which are anger, disgust, fear, joy, sadness, surprise .Our main objective is to prepare a system that takes real time data from the twitter and come to a conclusion about the opinion on particular product/keyword.
Keywords: Public opinion mining, Social media, Analysis Introduction
[1] Joshi, A.; Balamurali, A. R.; Bhattacharyya, P.; and Mohanty, R. 2011. C-feel-it: a sentiment analyzer for microblogs. In Proceedings of ACL Demo Papers, HLT '11, 127–132
[2] Mukherjee.; Balamurali, A. R.; Bhattacharyya,P.;2012. TwiSent:A Multistage System for Analyzing Sentiment in Twitter
[3] Dietterich, T.G., Ensemble methods in machine learning, in Multiple classifier systems. 2000, Springer. p. 1-15.
[4] F. Morstatter, J. Pfeer, H. Liu, and K. M. Carley. Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose. In Proc. ICWSM, 2013.
[5] Carlo Strapparava and Alessandro Valitutti, "WordNet-Affect: an affective extension of WordNet". In Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC 2004), Lisbon, May 2004, pp. 1083-1086.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Recommender system is a growing proliferation in today online applications contributed to the problems of Information overloading. In a day to day life enormous amount of data is generated and collected leads to a problem of information overloading. This paper focuses on how to deal with the problem of information overloading and how to recommend an additional product to the end user using collaborative filtering (CF) recommendation algorithms. The personalized recommendation algorithm with their benefits and limitations are described. A pitfall occurs in CF recommendation system is described. An outline framework is proposed for the initial stage of recommendation...............
Keywords: Web Mining, Collaborative filtering, CF Algorithms, CF Framework, E-Commerce
[1]. Young Sung so, song chul moon. "Frequent pattern to promote sale for selling associated items for recommender in E-Commerce". Indian journal of science and technology. oct 2016, vol9 (38), DOI: 10.17485 /ijst / 2016 / v9i38 / 102552.
[2]. Melville.P, Sindhwani.V 2010. "Recommender Systems" Encyclopedia of Machine Learning. Springer Science & Business Media.
[3]. J. Delgado, N. Ishii. "Memory-based weighted majority prediction. SIGIR Workshop Recomm. Syst. Citeseer, 1999.
[4]. B. Sarwar, G. Karypis, J. Konstan, J. Riedl, Item-based collaborative filtering recommendation algorithms. Proceedings of the 10th International Conference on World Wide Web, ACM. 2001.
[5]. Heng-Ru Zhang, Fan Min. Three-way recommender systems based on random forests. Elsevier, Knowledge-Based Systems. 2016, 91, pp. 275–286..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Automated Door Control System using Biometric Technology |
Country | : | Nigeria |
Authors | : | J. O. Odiete || A. O. Agbeyangi || O. Olatinwo |
: | 10.9790/0661-1904012025 |
Abstract: Biometric technology has been seen as one of the most effective technology for human secured identification systems. In this paper, we present the development of an automated fingerprint-based door control system to address the shortcomings of the manual door control systems. The developed system used fingerprint sensing device and an application to control the whole system. The fingerprint sensing device controls user identification, enrollment and verification while the application provides access to the system. The control application was implemented using C# programming language. The result shows that the system works as expected and scored 89% from the testing metrics used. There are other issues which can be taken as further research.
Keywords: Biometric technology, fingerprint, door automation
[1] A. Jain, R. Bolle and S. Pankanti, Biometrics: personal identification in networked society (Boston: Kluwer Academic Publishers, 1999).
[2] J. D. Woodward, M. Nicholas and P. T. Higgins, Biometrics (Osborne, New York: McGraw Hill, 2003).
[3] H. Kang, Biometric identification system by extracting hand vein patterns, Journal of the Korean Physical Society, 38( 3), 2001, 268-272.
[4] S. Crisan, I. G. Tarnovan and T. E. Crisan , A low cost vein detection system using near infrared radiation, Proc. IEEE Sensors Applications Symposium, San Diego, California, 2007.
[5] S. Pankanti and A. K. Jain, Biometric recognition: security and privacy concerns, IEEE Security and Privacy, 1(2), 2003, pp. 33-42..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Most researchers concerning real time distributed scheduling assumes constraints to be accurate. However, in many situations the values of these parameters are indistinguishable. The indistinctness of parameters suggests that we make use of fuzzy logics to decide in what order the requests should be executed to make better utilization of systems. In this research, we are taking a fuzzy dynamic load balancing approach. We get the output feasible surfaces of the optimal utilization and load balanced distributed real time systems with the use of fuzzy inferences systems. We analysed the effects of different fuzzy membership functions on the optimal utilization and load balanced surfaces.
Keywords: Fuzzy logic, Membership function, Distributed real time Systems, Load Balancing
[1]. S. Sharma, S. Singh and M. Sharma, "Performance Analysis of Load Balancing Algorithm," World Academy of Sciences, Engineering and Technology, Vol. 38, 2008.
[2]. Z. Xu and R. Huang , "Performance Study of Load Balancing Algorithms in Distributed Web Server Systems" CS213 Parallel and Distributed Processing Project Report.
[3]. R. Motwani, P. Raghavan, "Randomized algorithms," ACM Comput. Surv., Vol.28, pp.33-37,1966.
[4]. P.L. McEntire, J.G. O'Reilly, and R.E. Larson, Distributed Computing: Concepts and Implementations, New York, IEEE Press, 1984.
[5]. W.I. Kim and C.S. Kang, "An adaptive soft handover algorithm for traffic-load shedding in the WCDMA mobile communication system," presented at WCNC'2003, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, a lossy image compression is introduced, it based on utilizing three techniques of wavelet, polynomial prediction and block truncation coding, in which each technique exploited in away according to redundancy presents. The test results shown are promising performance in terms of higher compression performance achieved with lower noticeable error or degradation
[1]. Wallace, G. K. 1992. The JPEG Still Picture Compression Standard. IEEE Transactions on Image Processing, 38(1), xviii-xxxiv.
[2]. Christopoulos, C., Skodras, A. and Ebrahimi, T. 2000. The JPEG2000 Still Image XOSING System: an Overview. IEEE Transactions on Consumer Electronics, 46(4), 1103-1127.
[3]. Taubman, D. and Marcellin, M. 2004. JPEG2000: Image Compression Fundamentals, Standards & Practices. Kluwer Academic Publishers.
[4]. Acharya, T. and Tsai, P. 2004. JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures. John Wiley & Sons, Hoboken, New Jersey.
[5]. Jabbar, S. and Panchikkil, S. 2012. Lossy Image Compression Scheme based on Transforms- A Literature Review on Medical Images. International Journal of Advanced Information Technology (IJAIT), 2(6), 25-31.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the Sequitur algorithm, the compression process is performed based on the number of characters having similar similarities. Similarities will be detected on every syllable in the entire text. Determination of the number of characters to be compared will affect the compression level of this algorithm. Using dynamic or static blocks can optimize the number of compressed characters and of course, it affects the speed of data transmission..
Keywords: Sequitur, Compression, Algorithm, Security
[1]. A. S. Sidhu and M. Garg, "Research Paper on Text Data Compression Algorithm using Hybrid Approach," IJCSMC, vol. 3, no. 12, pp. 1-10, 2014.
[2]. H. Al-Bahadili and S. M. Hussain, "A Bit-level Text Compression Scheme Based on the ACW Algorithm," International Journal of Automation and Computing, pp. 123-131, 2010.
[3]. M. Schindler, "Practical Huffman coding," 1998. [Online]. Available: http://www.compressconsult.com/huffman/.
[4]. C. G. Nevill-Manning and I. H. Witten, "Identifying Hierarchical Structure in Sequences: A Linear-time Algorithm," International Arab Journal of Information Technology, vol. 7, no. 1, pp. 67-82, 1997.
[5]. U. Mahajan and P. C. S. R., "Algorithms for Data Compression in Wireless Computing Systems," International Journal of Computer Science, vol. 10, no. 5, pp. 71-77, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Glaucoma is an eye disorder that majorly affects the optic nerve head in the retina. The damage caused to optic disc leads to gradual loss of peripheral vision which may further result in complete blindness. Glaucoma cannot be cured, hence early and accurate detection is necessary. This paper proposes a method to detect Glaucoma using fundus images. Enhanced K-Strange Points Clustering (EKSTRAP) algorithm is applied to obtain cup, disc and the blood vessels from the Neuro-Retinal Rim (NRR). Further elliptical fitting method is used to compute cup to disc (CDR) ratio. The Inferior-Superior-Nasal-Temporal (ISNT) ratio is obtained using masking. CDR and ISNT are used as inputs to the Naïve Bayes classifier.
Keywords: Cup to Disc Ratio (CDR), Enhanced K-Strange Points Clustering (EKSTRAP), Glaucoma, Inferior, Superior, Nasal, Temporal quadrants (ISNT), Neuro Retinal Rim (NRR)
[1] K.Narasimhan, Dr.K.Vijayarekha, "An efficient automated system for glaucoma detection using fundus image", Journal of Theoretical and Applied Information Technology Vol. 33 No.1, ISSN: 1992-8645, November 2011
[2] Preeti Kailas Suryawanshi: "An approach to glaucoma using image segmentation techniques" International Journal Of Engineering
Sciences & Research Technology 2(9): September, 2013.
[3] Arulmozhivarman Pachiyappan, Undurti N Das, Tatavarti VSP Murthy and Rao Tatavarti, "Automated diagnosis of diabetic retinopathy and glaucoma using fundus and OCT images" Lipids in Health and Disease 2012, 11:73.
[4] Terence Johnson, Dr. Santosh Kumar Singh, "Enhanced K Strange Points Clustering Algorithm", Proceedings of the 2nd International Research Conference on Emerging Information Technology and Engineering Solutions. EITES 2015, 978-1-4799-1838-6/15, IEEE Computer Society Washington, DC USA© 2015 IEEE, DOI 10.1109/EITES.2015.14, indexed in ACM Digital Library, pp 32-37
[5] Gonzalez, R.C. and R.E. Woods, Digital Image Processing. (Reading, Massachusetts: Addison-Wesley, 1992)..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Impact of Operations Research on Computer Science |
Country | : | Saudi Arabia |
Authors | : | Mobin Ahmad |
: | 10.9790/0661-1904015053 |
Abstract: Operations research on computers interact in numerous logical fields of imperative significance to our society. These incorporate, among others, transportation, financial matters, speculation procedure, stock control, co ordinations, wellbeing, dependability, urban arranging, and ecology. Computers and Operations Research (COR) gives a global discussion to the application of computers and operations research techniques to issues in these and related fields. The field of mathematics plays essential part in various fields. One of the important areas in mathematics is Operations research which is utilized as a part of basic models..........
Keywords: Operations research, computer science, importance, society, application, techniques, problems, mathematics, models.
[1]. Adam Schenker, Mark Last, horst Banke,Abraham andel,"Clustering of Web documents using a Operations Research", Springer werlog, Septermber 2007.
[2]. Anindya J.Pal, Samar S.Sarma, Biman Ray, "CCTP, Operations Research algorithms – Soft computing Solutions IEEE, 2007
[3]. Bing Hong Liu, Wel Chieh Ke, Chin-Hsien Tsai, Ming-Jer Tsai, "Constructing a message pruning tree with minimum cost for tracking moving objects in wireless sensor networks", IEEE Volume 57, Number 6, July 2008
[4]. Daniel Marx, "Operations Research problems and their applications in scheduling",
[5]. Gian Luca Marcialis, Fabio Roli, Alessandra Serrau, "Operations Research Based and Structural Methods for Fingerprint Classification, Springer verlag, Berlin Heidelberg 2007
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud Computing provides access to a shared pool of computing resources such as servers, storage, computer networks and services, which can be rapidly provisioned and released, for the execution of various scientific and business applications. Scheduling scientific workflows modeled by Directed Acyclic Graphs is an NP complete problem. In cloud environment, there are fluctuations in resource availability due to shared resources and vastly varying workloads. The performance variations in virtual machines, have an impact on task execution times and data transfer times.........
Keywords: Cloud Computing, Directed Acyclic Graphs, Makespan, Resource Availability probability, Scientific Workflows
[1]. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: Vision, hype, and reality for
delivering computing as the 5th utility. Future Generation Computer Systems 2009; 25(6):599–616.
[2]. Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, C´esar A. F. De Rose and Rajkumar Buyya," CloudSim: a toolkit for
modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms",SOFTWARE –
PRACTICE AND EXPERIENCE,Softw. Pract. Exper. 2011; 41:23–50, Published online 24 August 2010 in Wiley Online Library
(wileyonlinelibrary.com). DOI: 10.1002/spe.995
[3]. Cloud Computing Theory and Practice, Dan C. Marinescu, Morgan Kaufmann,Elseiver,2013
[4]. Dan Sullivan,"A Definitive Guide to Cloud Computing",Real Time Publishers
[5]. Maria A. Rodriguez_, Rajkumar Buyya, "A Taxonomy and Survey on Scheduling Algorithms for Scientific Workflows in IaaS
Cloud Computing Environments", CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, Concurrency
Computat.: Pract. Exper. 0000; 00:1–32,Published online in Wiley InterScience (www.interscience.wiley.com). DOI:
10.1002/cpe.4041
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Adaptive Fault Reduction Scheme to Provide Reliable Cloud Computing Environment |
Country | : | India |
Authors | : | M. Damodhar || S. Poojitha |
: | 10.9790/0661-1904016473 |
Abstract: The Now a days Cloud technologies has become an essential trend in the market of information technology. Virtualization and Internet-based Cloud computing leads to different kinds of failures to arise and hence, leads to the requirement for reliability and availability has become an essential issue. To make ensure for reliability and availability of cloud technologies, a scheme for fault tolerance need to be developed and implemented. As the majority of the early schemes for fault tolerance were focused on the utilization of only one way to tolerate faults. This paper presents an adaptive scheme that deals with the difficulty of fault tolerance in various cloud computing environments..........
Keywords: Adaptive fine-grained checkpointing(AFC), Cloud technologies, Fault tolerance, replication, virtual machines.
[1] R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality
for delivering computing as the 5th utility, Future Generation Computing Sytems., vol. 25, no. 6, pp. 599–616, Jun. 2009.
[2] M. Chen, Y. Ma, J. Song, C. -F. Lai, and B. Hu, Smart Clothing: Connecting human with clouds and big data for sustainable health
monitoring, Mobile Network Appl., vol. 21, no. 5, pp. 825–845, Oct. 2016.
[3] M. Armbrust et al., Above the clouds: A Berkeley view of cloud computing, Univ. California at Berkeley, Berkeley, CA, USA, Tech.
Rep. UCB/EECS-2009-28. [Online]. Available: http:// www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of micro-ATM device.The current authentication system uses fingerprint authentication or PIN based authentication method.Biometric features are unique for every individual and hence can be widely used in fusion for enhancing the security system for micro-ATMS and POS terminals.
Keywords: Biometric authentication, Micro-ATM Security, Point of sale terminal biometric authentication.
[1]. S.Koteswari, Dr.P.John Paul: "A Survey: Fusion of Fingerprint and Iris for ATM services",International Research Journal of
Engineering and Technology (IRJET), Volume: 04 Issue: 01 | Jan -2017, e-ISSN: 2395 -0056
[2]. AlirezahFarhang, Hasan Rashidi: "ATM Security based on Fingerprint Biometric and SVM" , International Journal of Computer &
Information Technologies (IJOCIT), February 2016, ISSN = 2345-3877
[3]. S.PadmaPriya: "Biometrics and Fingerprint Payment Technology", International Journal of Advanced Research in Computer
Science & Technology (IJARCST 2017), Vol. 5, Issue 1 (Jan. - Mar. 2017) ISSN : 2347 – 9817
[4]. AnshuPremchand, Anurag Choudhry: "Future of Payments- ePayments", International Journal of Emerging Technology and
Advanced Engineering,ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015
[5]. Mr. Mahesh A. Patil, Mr. Sachin P. Wanere, Mr.RupeshP.Maighane, Mr.AashayR.Tiwari : "ATM Transaction Using Biometric
Fingerprint Technology",International Journal of Electronics, Communication & Soft Computing Science and Engineering, ISSN:
2277-9477, Volume 2, Issue 6, 2012
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In most recent couple of decade numerous analysts investigation is anticipated to break down the criminal with that of wrongdoing. It is seen that there is a lot of acceleration in the wrongdoing rate because of the crevice between the ideal use of investigation and advances. In view of this there are numerous new accommodation for the advancement of new strategy and procedures in the field of wrongdoing examination utilizing the strategies built up on information mining, criminological, picture change over, and social mining.The vital part of computerized face off regarding is to enhance the examination of criminal exercises that include assemble, to save, investigate, advanced gadgets and give mechanical and logical statement, and to give the vital approval to experts..........
Keywords: Clustering, far from being obviously true figuring, mining.
[1] J. F. Gantz, D. Reinsel, C. Chute, W. Schlichting, J. McArthur, S. Minton, I. Xheneti, A. Toncheva, and A. Manfrediz, ―The expanding digital universe: A forecast of worldwide information growth through 2010,‖ Inf. Data, vol. 1, pp. 1–21, 2007.
[2] B. S. Everitt, S. Landau, and M. Leese, Cluster Analysis. London, U.K.: Arnold, 2001.
[3] A. K. Jain and R. C. Dubes, Algorithms for Clustering Data .Englewood Cliffs, NJ: Prentice-Hall, 1988.
[4] L. Kaufman and P. Rousseeuw, Finding Groups in Gata: An Introduction to Cluster Analysis. Hoboken, NJ: Wiley -Interscience, 1990.
[5] R. Xu and D. C.Wunsch, II, Clustering. Hoboken, NJ: Wiley/IEEE Press, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Extracting the Frequent Item Sets by Using Greedy Strategy in Hadoop |
Country | : | India |
Authors | : | Mr. B. Veerendranadh || Mr.M. Naveen Kumar |
: | 10.9790/0661-1904018390 |
Abstract: Information mining came into the presence because of mechanical advances in numerous various controls. As it were, every one of the information on the planet are of no incentive without components to proficiently and successfully remove data and learning from them. In contrast with other information mining fields, visit design mining is a generally late improvement. This paper exhibits a novel approach through which the Apriori calculation can be progressed. The adjusted calculation presents elements time devoured in exchanges filtering for competitor itemsets and the quantities of tenets produced are additionally diminished.
Keywords: Apriori, Frequent - itemsets, Minimum Support, Confidence, Greedy Method.
[1] Luca Cagliero and Paolo Garza "Infrequent Weighted Itemset Mining using Frequent Pattern Growth", IEEE Transactions on Knowledge and Data Engineering, pp. 1- 14, 2013.
[2] Xin Li, XuefengZheng, Jingchun Li, Shaojie Wang "Frequent Itemsets Mining in Network Traffic Data", 2012 Fifth International Conference on Intelligent Computation Technology and Automation, pp. 394- 397, 2012.
[3] SoumadipGhosh, SushantaBiswas, DebasreeSarkar, ParthaPratimSarkar "Mining Frequent Itemsets Using Genetic Algorithm", International Journal of Artificial Intelligence & Applications (IJAIA), Vol.1, No.4, pp. 133 – 143, October 2010.
[4] X. Wu, C. Zhang, and S. Zhang "Efficient mining of both positive and negative association rules", ACM Transaction Information System, vol. 22, issue 3, pp. 381–405, 2004.
[5] D. J. Haglin and A. M. Manning "On minimal infrequent itemset mining", In DMIN, pp. 141–147, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Easy access to massive amount of information available on the internet and also availability of information in digital formats has led to an increase in the act of plagiarism. Plagiarism can be found in many fields including novels, scientific papers, art designs and source code. Most cases of plagiarism are found in academia where students often produce plagiarized documents in the form of essays or reports. Plagiarism detection tools and techniques have a large scope in today's world as the widespread use of computers and internet has made it easier to plagiarize the work of others..........
Keywords: Bisecting k-means clustering, Divisive Min-Max clustering, External Plagiarism Detection, Vector space model
[1] Du Zou, Wei-jiang Long, Zhang Ling "A Cluster Based Plagiarism Detection Technique" for PAN , CLEF, 2010.
[2] Johnson, Terence, and Santosh Kumar Singh. "Divisive Hierarchical Bisecting Min–Max Clustering Algorithm." Proceedings of the International Conference on Data Engineering and Communication Technology. Springer Singapore, 2017.
[3] Basile, Chiara, et al. "A plagiarism detection procedure in three steps: Selection, matches and "squares"." Proc. SEPLN. 2009.
[4] Kent, Chow Kok, and Naomie Salim. "Features based text similarity detection." arXiv preprint arXiv:1001.3487 (2010).
[5] Manav Bagai, Vibhanshu, Siddharth Gupta, Rashid Ali. "Text Based Plagiarism Detection".International Journal for Technological Research in Engineerin,Vol 3, April 2016(Pg.1710-1714).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on Diabetes Prediction with a Reference to Mapreduce Technique |
Country | : | India |
Authors | : | GURURAJ A NAGALIKAR || DR. RAJEEV YADAV |
: | 10.9790/0661-19040198102 |
Abstract: A large number of data mining systems have been applied to survey essential drivers of diabetes, yet very few methods consider clinical condition factors. So the results considered by such systems may not address careful diabetes. We really need to narrow down the number of components, for example, basic and earned credit factors, stress, weight record, extended cholesterol level, high sugar diet, sound need, nature of exercise, stress and tension, high blood pressure Insulin deficiency, insulin resistance. Then, we evaluate and consider this development using sensible standards and guidance computations. The onset of development is analyzed to such an extent that different thresholds such as the use of rules, gathering accuracy and delineation deteriorate. By considering this vast number of thresholds, the system can predict diabetic patients with excellent accuracy. Likewise this paper reviews about the various frameworks and gadgets available in Super Data for the probability of Diabetes Mellitus. There can be enormous data in general diabetes whenever research is done and ultimately related to the potential for clinical consideration for diabetics.
[1]. C.L Philip Chen, Chun-Yang Zhang, Data intensive application, challenges, techniques and technologies: A survey on Big Data, Information Sciences 275 (2014) 314–347
[2]. Big Data ( Covers Hadoop 2, MapReduce, Hive, YARN, Pig, R and Data Visualization) Black Book, Authored By DT Editorial Services. Pages 83 – 114
[3]. Predictive Methodology for Diabetic Data Analysis in Big Data. Dr Saravana kumar N M, Associate Professor, Dept of CSE, Bannari Amman Insitute of Technology,Sathyamangalam. Eswari T , 2,4Assistant Professor, Dept of IT, Sri Krishna College of Engineering&Techechnology,Coimbatore. Sampath P, Associate Professor, Dept of CSE, Bannari Amman Institute of Technology, Sathymangalam. Lavanya S, Assistant Professor, Dept of IT, Sri Krishna College of Engineering & Techechnology,Coimbatore. Procedia Computer Science 50 ( 2015 ) 203 – 208
[4]. Purushottam, 3Amity University, Noida. Dr. Kanak Saxena, S.A.T.I. Vidisha, M.P. Richa Sharma, Amity University, Noida: Diabetes Mellitus Prediction System Evaluation Using C4.5 Rules and Partial Tree. 978-1-4673-7231-2/15/ ©2015 IEEE
[5]. Application Data Mining Methods and Techniques for Diabetes Diagnosis, International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 3, September 2012. Mr K Rajesh, M.E in Computer Science and Engineering at Rajalakshmi.