IJCT
- Volume 4, Issue 6 / November - December 2017
S.No
|
Title/Author Name
|
Serial No
|
1 |
Information Confidentiality Using Fuzzy Based Data Transformation Method
- Mrs. TamilSelvi. S. Mrs. Anette Regina I.
10.29126/23942231/IJCT-V4I6P1
Abstract
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together Knowledge extraction process poses certain problems like accessing sensitive, personal or business information. Privacy invasion occurs owing to the abuse of personal information. Hence privacy issues are challenging concern of the data miners. Privacy preservation is a complex task as it ensures the privacy of individuals without losing the accuracy of data mining results. In this paper, fuzzy based data transformation methods are proposed for privacy preserving clustering in centralized database environment. In case one, a fuzzy data transformation method is proposed and various experiments are conducted by varying the fuzzy membership functions such as Z-shaped fuzzy membership function, Triangular fuzzy membership function, Gaussian fuzzy membership function to transform the original dataset. In case two, a hybrid method is proposed as a combination of fuzzy data transformation approach specified in case one and Random Rotation Perturbation (RRP). The experimental results proved that the proposed hybrid method yields good results for all the member functions which are used in case one. Keyword: Clustering, Fuzzy mean Clustering, Random Rotation Perturbation. × Mrs. TamilSelvi. S. Mrs. Anette Regina I," Information Confidentiality Using Fuzzy Based Data Transformation Method " Vol. 4 - Issue 6 (1-5) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P1 |
2 |
Cross-Domain Sentiment Classification Using Web Usage Mining
- Mrs. Saraswathi.S, Mrs. Anette Regina.I
10.29126/23942231/IJCT-V4I6P2
Abstract
Web usage mining is crucial for the Cross-Domain Sentiment Classification (CDSC) as it can ensure customer satisfaction as far as the interaction between the customer and the organization is concerned. Web usage mining is also helpful for identifying or improving the visitors of a particular Website by accessing the log file of that site. In this paper the focus is on Web usage mining of Log data of an educational institution. Web usage mining (WUM) also known as Web Log Mining is the application of Data Mining. WUM techniques are applied on large volume of data to extract useful and interesting patterns from Web data, specifically from web logs, in order to improve web based applications. Web usage mining consists of four phases, data source, pre-processing, pattern discovery, and pattern analysis. After the completion of these four phases the user can find the required usage patterns and use this information for the specific needs in a variety of ways such as improvement of the Web application, identifying the visitor’s behaviour, customer attraction, Customer retention etc. Keyword: Cross-Domain Sentiment Classification (CDSC) Web usage mining (WUM).Customer attraction, Data mining Techniques. × Mrs. Saraswathi.S, Mrs. Anette Regina.I.,"Cross-Domain Sentiment Classification Using Web Usage Mining" Vol. 4 - Issue 6 (6 -10) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P2 |
3 |
RFID Tag Ownership Transfer Protocol of Multi-owner and Multi-tag Based on EPC C1G2 Protocol
- MENG Ke, HUANGXincheng ,CHEN Shun'er, HUANG Hongbing, LIU Weiping
10.29126/23942231/IJCT-V4I6P3
Abstract
The mutual authentication and ownership transfer are the core issues in the protocols of Regarding RFID tag, especially those based on EPC C1G2 protocol. At present, most of the multi-owner multi-tag ownership transfer cannot be able to deal with the problem of part ownership transfer. To solve this problem, we here integrate the mutual authentication and ownership transfer of tag to propose an effective multi-owner multi-tag protocol by storing the tags related information into the server. Our protocol characters with low resource consumption and high security compared with now existed protocols. Keyword: RFID tag,C1G2 protocol, Multi-ownership tag, Transfer of ownership. × MENG Ke, HUANGXincheng ,CHEN Shun'er, HUANG Hongbing, LIU Weiping,"RFID Tag Ownership Transfer Protocol of Multi-owner and Multi-tag Based on EPC C1G2 Protocol" Vol. 4 - Issue 6 (11 - 17) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P3 |
4 |
Towards a Skill-oriented Educational Scenario: Vocational Training as Use Case
- MoncefBentaleb, MeriemHnida, Mohammed KhalidiIdrissi
10.29126/23942231/IJCT-V4I6P4
Abstract
E-learning changed drastically the way we teach and learn. New forms of education are now possible thanks to recent advances in information and communication technology. Also, learners nowadays have different needs, they learn at their own pace and are interested in using technology in the classroom settings. One of the current challenges in education area is how technology could be integrated in the classroom and how to design an educational scenario model in respect to student’s characteristics and curriculum constraints. More specifically, this papers deals with the issue of designing a skill-based learning program aligned to society and labor market demand. As result, we propose a methodology to construct a skill-oriented educational scenario adapted to vocational training. Keyword: Vocational Training, Skill-oriented Training, Competency-Based Approach, E-learning, Instructional Design. × MoncefBentaleb, MeriemHnida, Mohammed KhalidiIdrissi,"Towards a Skill-oriented Educational Scenario: Vocational Training as Use Case" Vol. 4 - Issue 6 (18 - 23) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P4 |
5 |
Discrete Cosine Transform DCT Methods on Compression RGB and Grayscale image
- Fifit Alfiah, Ade Setiadi, Saepudin, Ajay Supriadi, Ihsan Maulana
10.29126/23942231/IJCT-V4I6P5
Abstract
This paper presents a study of image compression methods algorithm for techniques on lossy image compression. One of the major difficulties encountered in lossy image compression is how to protect image quality in a way that the compressed image remains identical to the original, different from the types of methods that exist in the lossless image that can maintain the quality of the image's authentiqly. Digital image compression is a data compression application that aims to reduce the redundancy of data so that theimage can be stored and transmitted efficiently. For compression image, the methods that are often always used is lossy compression and for this research we try to use Discrete Cosine Transform (DCT). Discrete Cosine Transform (DCT) is a technique for graphics signals into basic frequency components. Base on the result this research will be show comparison size of compressing image between grayscale image and color (RGB) image measurement of experimental results using PSNR and MSE. The better one compression scheme having a lower MSE and a high PSNR is DCT method for RGB or color image that is: peppers.bmp (MSE:0.02 and PSNR: 65.6070). Keyword: Image Compression, DCT, PSNR, MSE. × Fifit Alfiah, Ade Setiadi, Saepudin, Ajay Supriadi, Ihsan Maulana,"Discrete Cosine Transform DCT Methods on Compression RGB and Grayscale image" Vol. 4 - Issue 6 (24 - 29) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P5 |
6 |
A Survey on Techniques and Applications of Data mining in Banking Field
- Md. Shakeel Ahamad, Sk. Wasim Akram
10.29126/23942231/IJCT-V4I6P6
Abstract
In these days’s generation, data mining is turning into strategically crucial place for lots enterprise organizations inclusive of banking area. It is a process of analysing the records from various views and summarizing it into precious records. Data mining assists the banks to look for hidden pattern in a set and find out unknown relationship within the records. These days, clients have such a lot of opinions in regards to where they could choose to do their enterprise. Early records evaluation strategies had been orientated in the direction of extracting quantitative and statistical information characteristics. These strategies facilitate useful records interpretations for the banking field to avoid customer attrition. Customer retention is the most important thing to be analysed in today’s competitive business surroundings. And additionally fraud is a great hassle in banking field. Detecting and stopping fraud is difficult, because fraudsters broaden new schemes all the time, and the schemes develop an increasing number of sophisticated to elude clean detection. This paper analyses the data mining techniques and its applications in banking field like fraud prevention and detection, patron retention, advertising and danger management. Keyword: Data mining, Banking Field, Customer Retention, Credit Approval, Fraud Detection. × Md. Shakeel Ahamad, Sk. Wasim Akram ,"A Survey on Techniques and Applications of Data mining in Banking Field" Vol. 4 - Issue 6 (30 - 39) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P6 |
7 |
Kids EduLink - Android application to provide extra knowledge for kids based on the Local Syllabus
- S.D Samarasinghe, K.M.C Konara, W.G.M Sudarshani, T.D Liyanapathiranage, N. Ellepola
10.29126/23942231/IJCT-V4I6P7
Abstract
The integration of educational process with digital technology is a trend and may greatly enhance the teaching learning process. In current situations, kids are failing to keep a proper balancing between studies and extra-curricular activities. They feel bored when they learn with books. An android education system is the easiest and the most effective way of teaching kids in an interesting way. Games can be considered educational teaching resources, allowing the learning and fun process together. The developed project is an android based educational application which makes the teaching and learning process easier. The research group has use the prototype approach in implementing this new system and several algorithms. To successfully complete the research, the research team had to meet up with main objectives that came up with prior to implementing such as to develop an algorithm to measure the performance of the kids and to develop game levels based on logical thinking. There are many applications to teach kids mathematical and English content and also many learning technics based on covering a particular subject. But the developed project has many special features. It has many lessons, tutorials, games as well as a dictionary. And it has provide a summary of the overall performance of the kid. The �Kids EduLink� has cover not only the learning process but it also provided some fun activities that will entertain the kids.. Keyword: Android Applications, Logical thinking, Mobile games, Algorithms. × S.D Samarasinghe, K.M.C Konara, W.G.M Sudarshani, T.D Liyanapathiranage, N. Ellepola ,"Kids EduLink - Android application to provide extra knowledge for kids based on the Local Syllabus" Vol. 4 - Issue 6 (40 - 46) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P7 |
8 |
Assessment of Efficiency of Part & Geometry Models for Groupwise Registration
- Steve A.Adeshna , Timothy F.Cootes
10.29126/23942231/IJCT-V4I6P8
Abstract
We evaluate the performance of a system which addresses the problem of building detailed models of shape and appearance of complex structures,given only a training set of representative images and some minimal manual intervention. We focus on objects with repeating structures(such as bones in the hands),which can cause normal deformable registration techniques to fall into local minima and fail.Using a sparse annotation of a single image we can construct a parts+geometry(P+G) model capable of locating a small set of features on every training image. Iterative refinement leads to a model which can locate structures accurately and reliably. The resulting sparse annotations are sufficient to initialise a dense groupwise registration algorithm, which gives a detailed correspondence between all images in the set. We demonstrate the method on a much larger set of radiographs of the hand while comparing results with that of the earlier work, we achieved a sub-millimeter accuracy in a prominent group Keyword: Bone Age assessment, Statistical Appearance Models, Groupwise Registration, Parts + Geometry Models (P+G). × Steve A.Adeshna , Timothy F.Cootes ,"Assessment of Efficiency of Part & Geometry Models for Groupwise Registration" Vol. 4 - Issue 6 (47 - 51) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P8 |
9 |
Sensor Networks for Emergency Response: Challenges and Opportunities
- R.Karthikeyan ,Shanmugapriya M ,Indhu P
10.29126/23942231/IJCT-V4I6P9
Abstract
Wireless networking is inherently insecure. From jamming to eavesdropping, from man-in the middle to spoofing, there are a variety of attack methods that can be used against the users of wireless networks. Modern wireless data networks use a variety of cryptographic techniques such as encryption and authentication to provide barriers to such infiltrations. An overview of the advantages that wireless networks have over wired technology is then given. The paper also advances some of the major security risks that wireless networks face. It is at such security holes that the information criminals tend to attack. In this paper, we identify the various security related challenges faced by wireless protocols. This study is useful as it provides lessons for ICT managers, directors, academia and organizations, who wish to develop install or are already using wireless networks within their offices. Keyword: Blue Tooth, WEP. × R.Karthikeyan ,Shanmugapriya M ,Indhu P,"Sensor Networks for Emergency Response: Challenges and Opportunities" Vol. 4 - Issue 6 (52 - 58) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P9 |
10 |
Factors in Faculty Performance Analysis
- Suman Bhatnagar, Prashant Sahai Saxena
10.29126/23942231/IJCT-V4I6P10
Abstract
In this research paper, chi-square test is applied for analysis of performance feedback of faculty members received from the students of BCA and MCA Programmes of an institute of higher education. Two parameters namely �Pass and Fail� and �Good Grades� are being introduced for determining the most relevant factor of a faculty member�s academic delivery throughout the semester. Keyword: Performance, Feedback of Faculty, Subject Command, Pass_Fail, Good_Grades, EDA,Chi-Square. × Suman Bhatnagar, Prashant Sahai Saxena,"Factors in Faculty Performance Analysis" Vol. 4 - Issue 6 (59 - 71) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P10 |
11 |
Analysis of CMOS Based Full Adders for Mobile Communications
- V. Manojna, Mr. P. Koteswara Rao, Dr. Ch. Subrahmanyam
10.29126/23942231/IJCT-V4I6P11
Abstract
As technology scales into the nanometer regime leakage power and noise immunity are becoming important metric of comparable importance to active power, delay and area for the analysis and design of complex arithmetic and logic circuits. In this project, low leakage 1 -bit full adder cells are proposed for mobile applications. For the most recent CMOS feature sizes (e.g., 180nm), leakage power dissipation has become an overriding concern for VLSI circuit designers. The main goal is to reduce leakage power. Therefore a new transistor resizing approach is used for 1-bit Full Adder cells. The simulation results depicts that the proposed design also leads to efficient 1-bit full adder cells in terms of standby leakage power. In order to verify the leakage power, various designs of full adder circuits are simulated using DSCH, Micro wind and Virtuoso (Cadence). Keyword: CMOS, 1-bit Full Adder, leakage power, noise immunit × V. Manojna, Mr. P. Koteswara Rao, Dr. Ch. Subrahmanyam,"Analysis of CMOS Based Full Adders for Mobile Communications" Vol. 4 - Issue 6 (72 - 79) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P11 |
12 |
A Survey of Data Integration
- RenHao Chen
10.29126/23942231/IJCT-V4I6P12
Abstract
With the continuous development of enterprises, it is difficult for all departments within an enterprise to avoid the phenomenon of "isolated islands of information" resulting from the distribution of data in various departments and the different ways of data management. The task of data integration is to integrate data from interdependent, autonomous, and heterogeneous data sources and provide users with a common query interface that enables users to access the data transparently. Instead of accessing the data source directly, the user submits the required query to the integrated system, which returns the consistent query result. Keyword: Data integration, Heterogeneous data sources, Consistency × RenHao Chen,"A Survey of Data Integration" Vol. 4 - Issue 6 (80 - 88) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P12 |
13 |
A Novel Method of Moving Object Detection
- JielongHuang , Hongqi Li ,Lianglu Yin , Yuanliang Huang
10.29126/23942231/IJCT-V4I6P13
Abstract
The Security has become a main problem of concern among the people. Biometrics is robotic method of identifying a person based on physiological or behavioural uniqueness. Threat starts while an useless person tries to obtain access. A person verification system localize facial landmarks and extracts biometrical features for face authentication. This includes image acquirement, segmentation, normalization, pattern generation and matching. Databases of biometrical facial appearance around the eye area of customers are construct. The accuracy of the segmentation procedure plays a major role in the performance of the iris recognition system. Segmentation is performed by identifying the obligatory region from the acquired image. Image has to be smoothened to develop the accuracy. Noise present in the image is to be detached by using specific filter. This segmented image is to be normalized and Feature extraction takes place. The output of feature extraction will be in the form of bit template which will be compared to find for a match. Keyword: biometrics system, segmentation, normalization, feature extraction. × JielongHuang , Hongqi Li ,Lianglu Yin , Yuanliang Huang,"A Novel Method of Moving Object Detection" Vol. 4 - Issue 6 (89 - 94) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P13 |
14 |
Personal Identification Based on IRIS Texture Analysis
- R.Karthikeyan , Sivasankar R , Sathya G
10.29126/23942231/IJCT-V4I6P14
Abstract
Visual background extractor (Vibe), a universal background subtraction algorithm, which has the characteristics of fast operation, high accuracy and wide application range. But there are also difficulties in eliminating the "ghost" and adapting to the light mutation, in this paper, an improved Vibe algorithm is proposed. It draws on the W4 theory and the mean value method in establishing the background model to suppress ghosts and some shadows, the new background model of Vibe was created by adding light mutation criterion to the motion detection algorithm, so that it could adapt to the light mutation rapidly, the experimental results show that the proposed method have good performance in removing interfaces as ghost shadow, when any sudden light change of circumstance occurs, the algorithm can also detect and update pixels statistical parameters adaptively. Keyword: W4 model,Vibe, motion detection, ghost suppression, light mutation. × R.Karthikeyan , Sivasankar R , Sathya G,"Personal Identification Based on IRIS Texture Analysis" Vol. 4 - Issue 6 (95 - 101) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P14 |
15 |
Performance optimization in distributed DataWarehouses with MapReduce: Treatment of data partitioning and distribution problems
- Sara Riahi , Azzeddine Riahi
10.29126/23942231/IJCT-V4I6P15
Abstract
Existing approaches for opinion mining for the most part center around re-sees from Amazon, space particular audit sites or online networking. Little efforts have been spent on fine-grained analysis of opinions in audit texts from portable advanced cell applications. In this paper, we propose a perspective and subjective expression extraction demonstrate for German reviews from the Google Play store. We break down the effect of deferent highlights, including space particular word embeddings. Our best model design demonstrates a performance of 0.63 F1 for viewpoints and 0.62 F1 for subjective expressions. Further, we perform cross-area analyzes: A model prepared on Amazon reviews and tried on app reviews accomplishes bring down performance (drop by 27 rate focuses for angles and 15 rate focuses for subjective expressions). The outcomes demonstrate that there are solid deference’s in the way closely-held convictions on item angles are communicated in the specific spaces. Keyword: Sentiment Analysis, Reviews, German, App Reviews, Opinion Mining.× Kavitha Gopu, Alampally Sreedevi,"Performance optimization in distributed DataWarehouses with MapReduce: Treatment of data partitioning and distribution problems" Vol. 4 - Issue 6 (103 - 118) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P15 |
16 |
Comprehensive study on Opinion Mining for User Reviews for Mobile App Comparisons
- Kavitha Gopu, Alampally Sreedevi
10.29126/23942231/IJCT-V4I6P16
Abstract
We are currently facing an explosion of structured or unstructured data massively produced by different digital data sources. Firstly applications that generate data from logs, sensor networks, traces of GPS, etc., and secondly, users produce a lot of data such as photographs, videos and music. According to IBM, every hour 2.5 trillion bytes of data are generated. According to forecasts made, by 2020 this growth will be greater than 40 Zettabytes, while a Zettabyte of digital data only, were generated from 1940 to 2010. Many "inseparable" concepts currently dominate the IT field: "Cloud Computing", "Big Data", "NoSQL" or "MapReduce". Strict constraints put different researchers in the field, as for the storage and analysis of these data masses. The growth rate forecasts for the volumes of data processed exceed the limits of traditional technologies, namely relational databases or data warehouses. Our problem is how to manage the rapid growth geographically remote data volumes and how to manage this powerful scalability. What are the technologies and programming models proposed to overcome these various problems caused by this deluge of data. Keyword: Big Data, HDFS, Hadoop, DataWarehouse ,MapReduce, Business intelligence. × Kavitha Gopu, Alampally Sreedevi,"Comprehensive study on Opinion Mining for User Reviews for Mobile App Comparisons" Vol. 4 - Issue 6 (119 - 130) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V4I6P16 |
17 |
An Efficient System for Heart Risk Detection using Associative Classification and Genetic Algorithms
- P Vinay Bhushan, Ch Narasimha Chary, V Nithesh, Dr Rp Singh
10.29126/23942231/IJCT-V4I6P17
Abstract
Associative classification is an ongoing and compensating system which incorporates affiliation govern mining and classification to a model for forecast and accomplishes greatest exactness. Associative classifiers are particularly fit to applications where most extreme exactness is wanted to a model for expectation. There are many spaces, for example, medication where the most extreme exactness of the model is wanted. Heart illness is a solitary biggest reason for death in created nations and one of the fundamental supporters of malady load in creating nations. Mortality information from the enlistment center general of India demonstrates that heart illness is a noteworthy reason for death in India, and in Andhra Pradesh, coronary heart malady causes around 30%of passings in rustic territories. Consequently there is a need to build up a choice emotionally supportive network for foreseeing heart sickness of a patient. In this paper, we propose efficient associative classification algorithm using genetic approach for heart ailment expectation. The primary inspiration for using a genetic algorithm in the revelation of abnormal state expectation decides is that the found tenets are profoundly intelligible, having high prescient exactness and of high intriguing quality qualities. Trial Results demonstrate that a large portion of the classifier rules help in the best forecast of heart sickness which even helps specialists in their finding choices. Keyword: Associative classification, Genetic algorithm, Gini Index, Z-Statistics. × P Vinay Bhushan, Ch Narasimha Chary, V Nithesh, Dr Rp Singh"An Efficient System for Heart Risk Detection using Associative Classification and Genetic Algorithms" Vol. 4 - Issue 6 (131 - 139) - November - December 2017 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
(IJCT-V4I6P17) |
18
|
Distributed Rare Itemset and Sequential Pattern Mining: A Methodology Leveraging Existing Techniques for Efficient Data Mining.
-
Hitesh Ninama
: Click Here |
IJCT-V4I6P18
|