IJCT - Volume 4, Issue 3 / May - June 2017
S.No
|
Title/Author Name
|
Serial No
|
1
|
Breathe Sound Analysis: A New Approach for Diagnosis
- Sudarshan Badjatiya , Manisha Mhetre , Dr. Rahul Kodgule, Dr. Hemant Abhyankar.
Abstract
This paper presents a new approach of breath sound analysis by recording exhalation and inhalation sounds with microphone placed in a pipe. The aim of this study is to understand the differences in inspiration and expiration signals of male and female subjects, differences in breath signals of healthy non-smokers and smoker subjects, differences in the breath signals of healthy and well controlled asthma patients. These differences were studied by comparing different signal parameters like Peak Frequency, significant frequency range, Power and the frequency at which maximum power occurs, Power Spectral Density and the frequency at which Maximum Power Spectral Density occurs. Exhalation and Inhalation sounds generated from mouth in a pipe arrangement were evaluated for testing and recorded for 45 subjects. Online microphone sound recording with developed experimental set up and computer based data analysis has been carried out according to physical parameters, the body mass index i.e. height and weight, gender, diseases and smoking habits. Frequency analysis carried out using Fast Fourier Transformation helps in extracting peak frequency and significant frequency range of the recorded sound signal. Significant difference in maximum Power Spectral Density (PSD) has been found in healthy men and women. This study discusses the possibility of modern lung examination through breath sound analysis which involves the study of exhaled air sound signal available from mouth in a pipe arrangement. Keyword: Spirometer, Fast Fourier Transform, Power spectral density, Sound Signal Power, Body Mass Index, Linear regression. × Sudarshan Badjatiya , Manisha Mhetre , Dr. Rahul Kodgule, Dr. Hemant Abhyankar"Breathe Sound Analysis: A New Approach for Diagnosis" Vol. 4 - Issue 3 (1-8) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P1 |
2
|
Survey on Opinion Mining Algorithms and Applications
- Anjanabhargavi A. Kulkarni ,Vidyashree A. Hundekar ,S. S. Sannakki ,Vijay S. Rajpurohit
Abstract
The Opinion mining is an ongoing field of research and development in web text mining domain. It is the computational treatment of opinions, sentiments and subjectivity of text. This survey paper focus on a comprehensive overview of the Opinion mining algorithms and the different classification with their field of applications. Keyword: Opinion Mining, web text mining, sentiment analysis. × Anjanabhargavi A. Kulkarni ,Vidyashree A. Hundekar ,S. S. Sannakki ,Vijay S. Rajpurohit"Survey on Opinion Mining Algorithms and Applications" Vol. 4 - Issue 3 (9-18) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P2 |
3
|
A Proposal on Implementing Optimal Algorithm on Best Saving Services for Potential Investors by Using Data Mining Algorithms
- Priya Babbar , Barjinder Singh
Abstract
The main aspect of Data Mining is to divide large data sets into small datasets based upon some criterion. So far, many algorithms have been developed but they do not show uniformity in results. Some algorithms are reliable for some attributes and some for other attributes. The construction of classification trees separates these algorithms based upon their quality and scalability. This research will suggest many techniques that can be useful in improving the efficiency of the construction of classification trees (decision trees). The main problem in this approach is to identify the various resources that are required by an algorithm. To overcome this problem many mathematical models are used that studies the problem and finds the amount of resources that are required by an algorithm. These resources include time, memory storage, processor (it includes number and type of processors), buses, type of processing i.e. serial processing or parallel processing and many more. The objective of this study is to find the best investment scheme by using optimized algorithm. This algorithm tries to reduce the errors made by the predictive models. Keyword: Investment Schemes, Clustering, Classification, Prediction, C4.5 Algorithm. × Priya Babbar , Barjinder Singh ,"A Proposal on Implementing Optimal Algorithm on Best Saving Services for Potential Investors by Using Data Mining Algorithms" Vol. 4 - Issue 3 (19-22) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P3 |
4
|
Executing SQL Queries over Encrypted Data: A Survey
- Taipeng Zhu
Abstract
This paper presents an overview of recent secure database systems, which are capable of executing SQL queries over encrypted data. Data security issues in a cloud database system which database-as-a-service model is one of most import concerns, a simple and effective way to guarantee confidentiality is to encrypt data before storing. Meanwhile, the ability to operate on encrypted data in the cloud needs to be guaranteed. In those systems, different encryption schemes are promoted and the capabilities of executing SQL queries over encrypted data have software and hardware implementation. Keyword: SQL Queries, Encrypted Data, Secure Database Systems, Encryption Schemes.. × Taipeng Zhu ,"Executing SQL Queries over Encrypted Data: A Survey " Vol. 4 - Issue 3 (23-33) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P4 |
5
|
Privacy and Security of Big Data Mining Issues
- Pasupuleti Nagendra Babu , Prof.S.Rama Kirshna
Abstract
Today the main crucial task is one of the most important concept is to store and preserve the data in a safest place and retrieving the data in a efficient and intelligent method even then today we are seeing the information technology is drastic growth at the same time there is not having security for data. Making some changes in security point of issue this research revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current topic with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the topic. This also discusses current relevant work and identifies open issues. Keyword: Big Data, Security, Privacy, Data Ownership, Cloud, Social Applications, Intrusion Detection, Intrusion Prevention. × Pasupuleti Nagendra Babu , Prof.S.Rama Kirshna ,"Privacy and Security of Big Data Mining Issues" Vol. 4 - Issue 3 (34-42) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P5 |
6
|
Fast Detection of Transformed Data Leaks
- V.Prathibha , E.Dilipkumar
Abstract
Today the main crucial task is one of the most important concept is to store and preserve the data in a safest place and retrieving the data in a efficient and intelligent method even then today we are seeing the information technology is drastic growth at the same time there is not having security for data. Making some changes in security point of issue this research revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current topic with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the topic. This also discusses current relevant work and identifies open issues. Keyword: Big Data, Security, Privacy, Data Ownership, Cloud, Social Applications, Intrusion Detection, Intrusion Prevention. × V.Prathibha , E.Dilipkumar ,"Fast Detection of Transformed Data Leaks" Vol. 4 - Issue 3 (43-49) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P6 |
7
|
Graphical Code Word-Authentication Using Net Banking
- S.Sujith , E.Dilipkumar
Abstract
Today the main crucial task is one of the most important concept is to store and preserve the data in a safest place and retrieving the data in a efficient and intelligent method even then today we are seeing the information technology is drastic growth at the same time there is not having security for data. Making some changes in security point of issue this research revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current topic with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the topic. This also discusses current relevant work and identifies open issues. Keyword: Big Data, Security, Privacy, Data Ownership, Cloud, Social Applications, Intrusion Detection, Intrusion Prevention. × S.Sujith , E.Dilipkumar ," Graphical Code Word-Authentication Using Net Banking " Vol. 4 - Issue 3 (50-56) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P7 |
8
|
Numerical Approximation to Spherical Functions by Regularization method
- Siyong Chen, Congpei An
Abstract
In this paper, we apply Alternating Direction Method of Multipliers(ADMM) to solve a regularization optimization problem over the unit sphere. For different functions, we set up proper regularization operators. In particular, we consider approximation to Wendland function and cone function, with or without the presence of data errors. Based on choosing nodes as well conditioned spherical t-design, numerical experiments demonstrate approximation quality vividly. Keyword: spherical polynomial approximation, ADMM, regularization. × Siyong Chen, Congpei An ," Numerical Approximation to Spherical Functions by Regularization method " Vol. 4 - Issue 3 (57-61) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P8 |
9
|
Reducing Energy Consumption in WSN Based on MIMO and IOT Environment
- Rita Hassoun , Aws Khadour ,Ghadir Madi
Abstract
Lately, many researchers have focused on improving communication systems in Wireless Sensor Networks WSNs. However, energy consumption was the most important factor to be decreased to make the network much efficient. Therefore, many techniques have been studied in this field such as Cooperative Multi-input-Multi-output MIMO. In this paper, we have suggested a new transmission technique to minimize the power consumption in WSN, considering a Cooperative MIMO at the transmission side and a Data Gathering Node DGN in the reception side by the use of well-known Internet Of Things IOT environment. Various models of prior well-known techniques have been compared with our proposed scenario. Keyword: WSN, MIMO, Cooperative MIMO, IOT, Energy Efficiency. × Rita Hassoun , Aws Khadour ,Ghadir Madi ," Reducing Energy Consumption in WSN Based on MIMO and IOT Environment " Vol. 4 - Issue 3 (62-66) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P9 |
10
|
Clustering Application for prediction in OLAP Cube
- Asma Lamani , Brahim Erraha, Malika Elkyal
Abstract
Data warehouses are designed to help users to manage large volumes of data. Online analysis OLAP provides a simple and quick visualization of the information and multidimensional view of data. On the other hand, Data mining is a set of techniques which allows the extraction of knowledge from data warehouses. As part of this work, we propose new ways to improve existing approaches in the process of decision support. In the continuity of the work treating the coupling between the on-line analysis and data mining, an approach based on automatic learning and clustering was proposed in order to integrate the prediction in the heart of OLAP. Keyword: Online analysis OLAP, data mining, multidimensional data cube, prediction, clustering. × Asma Lamani , Brahim Erraha, Malika Elkyal ," Clustering Application for prediction in OLAP Cube " Vol. 4 - Issue 3 (67-72) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P10 |
11
|
A Survey of Star Recognition Algorithms
- Jiazong Yu
Abstract
Star recognition is the fundamental guarantee of star sensor working, it is also an important part of astronomical navigation. This paper summarizes the existing star recognition algorithm, and analyzes the advantages and disadvantages of each kind of algorithm. Keyword: Star recognition, pattern recognition, triangle algorithm. × Jiazong Yu ," A Survey of Star Recognition Algorithms " Vol. 4 - Issue 3 (73-78) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P11 |
12
|
Traits of Magic Realism in Salman Rushdie’s Midnight’s Children
- A.G.Ananth
Abstract
“Magic realism”, a term first coined by Franz Roh and used in the title of his book “Nach- expressionismus, magischer Realismus: Probleme derneuesten eruopaishcher Maleri (1925). He was concerned with the characteristic and tendencies discernible in the work of certain German painter of his contemporary period, especially the artists of Munich, because their themes were often imaginary, somewhat outlandish and fantastic and with a certain dream-like quality. Later the term came to be associated with certain kinds of fiction. The term drew much attention on literary circles and chiefly used by the literary critics. . Keyword: --. × A.G.Ananth ," Traits of Magic Realism in Salman Rushdie’s Midnight’s Children " Vol. 4 - Issue 3 (79-83) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P12 |
13
|
Enhancing Security in Manets Communication Issues and Mechanisms
- R.Sujatha , Dr.P.Srivaramangai
Abstract
MANET is one of the promising area in research and development. A MANET is a self configuring infrastructure with less wireless network. Each node is having ability to form a network by finding the suitable node to communicate for transferring data through radio waves. A mobile communication demands cooperation between the nodes. The selfish behaviour of intermediate nodes during packet transmission will lead to the negative impact. Behaviour of a node plays an important role. This paper analysis different security issues, trust mechanisms and proposes a trust evaluation security solution. Keyword: MANET, Adhoc , Mobile access. × R.Sujatha , Dr.P.Srivaramangai ," Enhancing Security in Manets Communication Issues and Mechanisms " Vol. 4 - Issue 3 (79-83) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P13 |
14 |
Developing Model Open Access Journal Department of Information System Universitas Mercu Buana
- Sulis Sandiwarno
Abstract
Information technology now has big impact for help human in all activity. Many researches study in information technology and some references said information technology useful for users. With information technology, they could solve the problem quickly. UniversitasMercuBuana is best University in west Jakarta, Indonesia. UniversitasMercuBuana has Department of Information System and many students in there. There are library at UniversitasMercuBuana, and many students want studies or reading books in the library, but many students have problem, they can studies and reading books in there. In this study, proposed developing model open access journal for department of Information System. In developing this model, use UML (Unified Modeling Language) as tools develop this model. With developing this model, we got the results Department of Information System needs system open access journal in order to can help students looking for some references. Keyword: Information Technology, Open Access Journal, UML (Unified Modeling Language). × Sulis Sandiwarno ," Developing Model Open Access Journal Department of Information System Universitas Mercu Buana " Vol. 4 - Issue 3 (84-88) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P14 |
15 |
Deployment TAM to Examine Discussion Online Discussion
- Sulis Sandiwarno
Abstract
Information Technology today has evolved in human life. Utilization information technology helps people in adapted for using system. For this study information technology has impact in learning process. Inside learning process need concept feedback between lecturer and students. Lecturer and student should could interaction and lecturer should give student motivation and help student solved the problems. The problem in this study is which one the better discussion learning face to face or online discussion. In this study propose to compare discussion learning face to face and online discussion. Using TAM (Technology Acceptance Model) and UML (Unified Modeling Language) as method in this study. The results in this study is online discussion has given good impact for interacting between lecturer and students.. Keyword: Information Technology, TAM, Online Discussion. × Sulis Sandiwarno ," Deployment TAM to Examine Discussion Online Discussion " Vol. 4 - Issue 3 (89-92) - May - June 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I3P15 |