IJCT
- Volume 4, Issue 5 / September - October 2017
S.No
|
Title/Author Name
|
Serial No
|
1 |
Proficient Possessions Supervision Using Various Clustering Techniques
- T.Karunakaran , J.John Clotilda
Abstract
Feed is the largest input in any livestock enterprise and the rapid increase in feed prices and shortage of feed resources has been one of the major constraints for farmers, livestock industries, planners and the policy makers. This calls for prudent management of available resources and application of computing techniques can be one of the possible potential approaches. India is endowed with a wide range of feed resources varying widely in their composition and utility for different livestock species. Clustering of feed resource into different groups based on the composition can help in better feed management. To evaluate and to suggest a best technique for clustering feed resources, we have evaluated three clustering techniques viz. K-means, spectral k-means and auto spectral on two different data sets containing 236 and 106 feed resources with major constituents like crude protein, crude fiber ash, fat etc., . The composition of commonly used feed resources (236 and 106) were sourced from the published articles in various scientific journals and based on the composition of the feeds, they were subjected to clustering techniques.A total of three clustering techniques – k means, spectral k means and auto spectral were employed and the outputs were compared against the grouping done by subject matter experts.The outputs of different clustering techniques were validated with the expert grouping using precision, recall and F-measure. Of the three methods used it was found that k-means was the best and closest to the experts classification. Clustering of feeds into different groups based on their composition will form a sound basis to select different feeds for formulating economic and nutritionally balanced diets leading to better feed management. Keyword: cluster, mining, data. × T.Karunakaran , J.John Clotilda ," Proficient Possessions Supervision Using Various Clustering Techniques " Vol. 4 - Issue 5 (1-5) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P1 |
2 |
A Review on Identity-Based Proxy-Oriented Data Uploading and Inaccessible Data Integrity Inspection in Public Cloud
- K. Ravikumar, I. Renuka
Abstract
More clients might want to store their information to PCS (public cloud servers) along with the rapid improvement of cloud computing. Cloud computing is changing into progressively popular. An outsized range of information square measure outsourced to the cloud by data homeowners actuated to access the large-scale computing resources and economic savings. The existing remote data possession checking (RDPC) protocols have been designed in the PKI (public key infrastructure) setting. The cloud server has to validate the users’ certificates before storing the data uploaded by the users in order to prevent spam. When the client is controlled to admittance PCS, he determination representative its proxy to procedure his information and uploaded them in many files. On the additional pointer, inaccessible information examination is also an significant safety problematic in public cloud storage. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and security model. Cloud computing is the new range in wireless world. One of the major challenging issues is data integrity/security. For achieving the efficiency of cloud storage, the proposed system provides flexible data segmentation with additional authorization process among the three participating parties of client, server and a third-party auditor (TPA). We propose an identity based data storage scheme, it will resist the collusion attacks. Keyword: Cloud computing, Identity-based cryptography, Proxy public key cryptography, remote data integrity checking. × K. Ravikumar, I. Renuka ," A Review on Identity-Based Proxy-Oriented Data Uploading and Inaccessible Data Integrity Inspection in Public Cloud " Vol. 4 - Issue 5 (6 -9) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P2 |
3 |
Ontology - based Semantic Value Conversion
- JieWang
Abstract
In the face of massive Web data, an important task is to integrate relevant data of interest from users in Deep Web into a unified and structured form. In order to facilitate the identification and processing of computers, each data item needs to be annotated. Ontology is the key to semantic tagging. In order to facilitate the sharing and exchange of information, the semantic value of ontology instances must be consistent and compatible. In this paper, a semantic value conversion method based on ontology is proposed. This method is divided into two parts, one is to define the conversion function as the entry point of the semantic value conversion. The second is to use OWL as the ontology language description, and establish an OWL ontology relational database to store the relationship between ontology instances and various semantic values. The semantic value conversion method improves the integrity and consistency of the ontology instance semantic information. Keyword: Deep Web; Information extraction; Semantic annotation; OWL ontology; Relational database; Semantic value conversion. × JieWang ," Ontology - based Semantic Value Conversion " Vol. 4 - Issue 5 (10 -17) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P3 |
4 |
Event Data Analysis Using Data Mining
- A.Arokia Marshal Roach , G.Raja Raja Cholan
Abstract
There is a need to understand how industry as a whole is performing from a safety standpoint. To date, no one can really answer this question with certainty. People do a decent job collecting data on Events, but few take the analyses of the data past basic trending. Having the capability to collect enormous amounts of data is a feat in and of itself; however, it begs the question, “So what?” With the amount of resources spent to collect data, it seems logical to look at the data under extreme scrutiny to obtain as much knowledge about the data as possible. Data in a database is just that, data. By analyzing and understanding what is in the database yields knowledge. Passing this knowledge on to others can improve the understanding of what went wrong with Events from the past thereby greatly enabling the prevention of future Events.Trending analyses do provide useful comparisons in the data, however, going beyond comparisons by using data mining techniques can enable one to build predictive models, unveil relationships within the data that are not necessarily intuitive, and perhaps answer the question, “How is industry’s safety performance doing?” Marketers have successfully harnessed the power of data mining to build predictive models to increase profit by, for example, determining customer buying habits based on advertisement campaigns. Keyword: Mining, market, Data Analysis. × A.Arokia Marshal Roach ,G.Raja Raja Cholan ," Event Data Analysis Using Data Mining " Vol. 4 - Issue 5 (18 -21) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P4 |
5 |
The Application of Deep Learning in Natural Language Processing
- Yongxing Peng
Abstract
In recent years, due to the improvement of computing performance and neural network breakthrough, depth learning in the field of picture processing and natural language processing has made a great breakthrough. This paper mainly introduces the related research work of the combination of depth learning in natural language processing, and expounds and analyzes the combination effect and advantages and disadvantages of different depth neural network results in different sub-tasks. Keyword: Deep Learning, Natural Language Processing. × Yongxing Peng ," The Application of Deep Learning in Natural Language Processing " Vol. 4 - Issue 5 (22 -25) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P5 |
6 |
Drop-by-Drop Irrigation Technology Powered by Photovoltaic Solar Panels
- Marius Marcu , Charles Rostand Mvongo Mvodo , Valteri Audrey Voula ,Marius Cucaila
Abstract
Drop-by-drop irrigation is an optimal technique of localized watering which permits the normal development of a plant with minimal water necessary for its good growth. Its aim is to minimize water wastage and promote agriculture in arid zones. The present study was on a drop-by-drop irrigation device powered by solar energy which provided its own electrical energy. This system was experimented in the culture of Vernonia amygdalina (Delile) also known as “Ndolé” in Cameroon. This was in a bit to contribute to development and in the promotion of “clean and new generation” agriculture. Keyword: Arid zones, clean agriculture, irrigation, solar energy, wastage. × Marius Marcu , Charles Rostand Mvongo Mvodo , Valteri Audrey Voula , Marius Cucaila ,"Drop-by-Drop Irrigation Technology Powered by Photovoltaic Solar Panels" Vol. 4 - Issue 5 (26 -30) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P6 |
7 |
Designing English Rush Game as an Android-Based English Learning Media for Primary School Students
- Muhammad Sholeh , EdhySutanta , Sulistyowati
Abstract
Drop-by-drop irrigation is an optimal technique of localized watering which permits the normal development of a plant with minimal water necessary for its good growth. Its aim is to minimize water wastage and promote agriculture in arid zones. The present study was on a drop-by-drop irrigation device powered by solar energy which provided its own electrical energy. This system was experimented in the culture of Vernonia amygdalina (Delile) also known as “Ndolé” in Cameroon. This was in a bit to contribute to development and in the promotion of “clean and new generation” agriculture. Keyword: Arid zones, clean agriculture, irrigation, solar energy, wastage. × Muhammad Sholeh , EdhySutanta , Sulistyowati ,"Designing English Rush Game as an Android-Based English Learning Media for Primary School Students" Vol. 4 - Issue 5 (31 -35) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P7 |
8 |
Radiographic Model Matching with Markov Graph Shape Model
- Steve A. Adeshina, Timothy F. Cootes
Abstract
Skeletal maturity assessment is important for diagnosing and monitoring growth disorders in Children and young adults. Statistical models of bone shape and appearance have been shown to be useful for estimating skeletal maturity. One critical requirement in automated skeletal maturity estimation is matching built models to unseen images of the bones of the hand. Oftentimes some form of initialization is required to prevent the model from falling into local minima. In this work we used Markov Graph Shape models (MGSM) to initialize the image of an incoming radiographic image and then fit a global Active Appearance models of the whole hand using the found points from the Markov Graph Shape models as ’weighted’ constraints. Having found the approximate positions of the bones of hands, we then fit local models to refine the model fit. By analysing performance on dataset of 70 digitized images of normal children we achieved a model fitting accuracy of an overall point-to-point median error of 0.67mm. Keyword: Skeletal maturity assessment, Constrained Active Appearance Models, Markov Graph Shape Models.× Steve A. Adeshina, Timothy F. Cootes ,"Radiographic Model Matching with Markov Graph Shape Model" Vol. 4 - Issue 5 (36 -45) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P8 |
9 |
An Adaptive Congestion Control Algorithm with CoAP for the Internet of Thing
- He Meng , Huang HongBing , Liu WeiPing
Abstract
CoAP is a dominant application protocol designed for the constrained devices in IoT (the Internet of Things) which is going to interconnect every physical object in our daily life together to make an intelligent world. To keep the communication between devices in IoT from congestion, CoAP originally provides a simple congestion control mechanism. Since this mechanism can hardly meet the requirements of many IoT applications, an extension called CoCoA is being standardized by IETF(the Internet Engineering Task Force) to optimize CoAP. However, the thresholds underpinned the VBF(variable backoff factor) and RTO(retransmission timeout) aging mechanism in traditional CoCoA are constants and cannot be changed under most conditions which limit the performance of CoCoA; and further the existed estimators of CoCoA ambiguity have the potential risk to cause some unexpected or unpredictable problems. Hence, in this paper, we propose a novel threshold adjustable scheme for the VBF and RTO aging mechanism and a new encapsulation method for message retransmission to solve the above problems in the traditional CoCoA. Our evaluation results show that our modified version CoCoA greatly helps to solve the problem of congestion in IoT which outperforms over the existed CoCoA in terms of throughput and network adaptability. Keyword: CoAP, congestion control, CoCoA, IoT.× He Meng , Huang HongBing , Liu WeiPing ,"An Adaptive Congestion Control Algorithm with CoAP for the Internet of Thing " Vol. 4 - Issue 5 (46 -51) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P9 |
10 |
Assessment of Different Structures for Predicting Bone Age using Statistical Appearance Models
- Steve A. Adeshina, Timothy F. Cootes , Judith E. Adams
Abstract
We compare the utility of models of different structures in the hand for predicting skeletal maturity in young people. Bone age assessment is important for diagnosing and monitoring growth disorders. Statistical models of bone shape and appearance have been shown to be useful for estimating skeletal maturity. In this work we investigate the effect of the choice of region to model on the prediction performance. By analysing the performance on a dataset of 170 digitized radiographs of normal children we show that improvements in accuracy can be achieved by using models of the joint complexes and bones constructed by automatic registration, compared to ones built from manual annotation.We also investigate how sets of joint complexes and bones can best be combined to estimate overall skeletal age. Our results show that the best predictions are obtained from 13 RUS complexes and their combination into eight bone complexes. The mean absolute prediction errors of 0.80 (13 joint complexes) , 0.81(eight bone complexes) years for females and 0.93, 0.94 years for males respectively, demonstrates that similar results are obtained whether we use many local models of individual joints, or a smaller number of models of groups of bones. Keyword: Bone Age assessment, Statistical Appearance Models, Groupwise Registration.× Steve A. Adeshina, Timothy F. Cootes , Judith E. Adams ,"Assessment of Different Structures for Predicting Bone Age using Statistical Appearance Models" Vol. 4 - Issue 5 (52 -57) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P10 |
11 |
A study on the Relevance of Data Driven Analytics Approach of Big Data in Professional Education
- Smitha Harikumar
Abstract
This paper is a study on the relevance of Big Data in Education. In this paper, using the data driven analytics approach. I have analysed how the Big Data analysis can actually involve to professional education and also how the unused data can benefit and improve the teaching and learning process in the present education system. Keyword: Big Data, Data Analytics, Data Mining.× Smitha Harikumar ,"A study on the Relevance of Data Driven Analytics Approach of Big Data in Professional Education " Vol. 4 - Issue 5 (58 - 61) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P11 |
12 |
Probability of Genetic Diagnosis
- GanSiqing , SunHeng
Abstract
The main study in this paper is to calculate the probability of disease in patients with disease genes. At the time of gene sequence analysis, the distance between the DNA strand and the template strand was calculated using Levenshtein, and the probability of occurrence of the disease was estimated using similarity. Then we construct the DNA molecule on the probabilistic reasoning method for the Bayesian formula to be calculated. In order to test the validity of the sequences designed in this paper, nupack software was used to test and participate in the design of the sequence to detect the temperature of the reaction and the free energy of the secondary structure. Keyword: DNA Computing, Bayesian Formula, DNA Strand, The Levenshtein Distance.× GanSiqing , SunHeng ," Probability of Genetic Diagnosis " Vol. 4 - Issue 5 (62 - 68) - September – October 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I5P12 |