A Comparative Study on Various Clustering Techniques in Data Mining
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.1-8, Dec-2018
Abstract
Clustering is the process of combination of identical objects into same classes. A cluster is a grouping of data objects that are analogous to one another within the same cluster and are disparate to the objects in other clusters. Data clustering can be performed on various areas such as data mining, statistics, machine learning, spatial database, biology and marketing. Machine learning is classified into supervised and unsupervised learning. Clustering is the example of unsupervised learning that has no predefined classes and deals with unknown samples. Cluster analysis can be done with different types of methods includes partitioning methods, hierarchical methods, density based methods, grid based methods and model based methods. Quality of clusters can be determined by the two factors that they are high intra-cluster similarity and low inter-cluster similarity. In this paper, various clustering techniques has been analyzed in data mining in terms of methodology adopted, dataset handled, accuracy, advantages and limitations.
Key-Words / Index Term
Agglomative approach, Clustering, K-means, K-medoid
References
[1] Pushpalatha K.P., and Raju G., “Text Document Retrieval through Clustering using Meaningful Frequent Ordered Word Patterns", In: International Journal of Applied Engineering Research, Volume.13, pp. 4822-4833, ISSN: 0973-4562, 2018.
[2] Hemanth Somasekar and Kavya Naveen, “Text Categorization and graphical representation using Improved Markov Clustering", In: International Journal of Intelligent Engineering and Systems,Volume.11, pp.107-116, March 2018.
[3] Dr.Vo Ngoc Phu and Dr.Vo Thi Ngoc Tran, “English Sentiment Classification Using an YULEQ Similarity Measure and the One dimensional Vectors in a Parallel Network Environment”, In: Journal of Theoretical and Applied Information Technology, Volume.96, pp.3356-3382, ISSN: 1992-8645, June 2018.
[4] Arpit Bansal, Mayur Sharma, Shalini Goel, “Improved K-mean Clustering Algorithm for Prediction Analysis using Classification Technique in Data Mining”, In: International Journal of Computer Applications, Volume.157, pp.35- 40, January 2017.
[5] Vairaprakash Gurusamy S., Kannan, J. and Regan Prabhu, “Mining the Attitude of Social Network Users using K-means”, In: International Journal of Advanced Research in Computer Science and Software Engineering, Volume.7, Issue.5, pp.226-230, ISSN: 2277-128X, May 2017.
[6] Suman, Pinki Rani, “A Survey on STING and CLIQUE Grid Based Clustering Methods”, In: International Journal of Advanced Research in Computer Science, Volume.8, pp.1510-1512, ISSN: 0976-5697, May-June 2017.
[7] Chitra K., and Maheswari D., “A Comparative Study of Various Clustering Algorithms in Data Mining”, In: International Journal of Computer Science and Mobile Computing, Volume.6, Issue.8, pp.109-115, ISSN: 2320–088X, August 2017.
[8] Sajana T., Sheela Rani C.M., and Narayana K.V, “A Survey on Clustering Techniques for Big Data Mining”, In: Indian Journal of Science and Technology, Volume.9, pp.1-12, ISSN: 0974-6846, January 2016.
[9] Shilna S. and Navya EK, “Heart Disease Forecasting System using K-mean Clustering Algorithm with PSO and other Data Mining Methods”, In: International Journal On Engineering Technology and Sciences, Volume.3, Issue.4, pp.51-55, ISSN(P): 2349-3968, ISSN (O): 2349-3976, April 2016.
[10] Kiranjeet Kaur and Lalit Mann Singh, “Heart Disease Prediction System Using ANOVA, PCA And SVM Classification”, In: International Journal of Advance Research, Ideas and Innovations in Technology, Volume.2, Issue.3, pp.1-6, ISSN: 2454-132X, 2016.
[11] Swarndeep Saket J. and Sharnil Pandya, “An Overview of Partitioning Algorithms in Clustering Techniques”, In: International Journal of Advanced Research in Computer Engineering & Technology, Volume.5, Issue.6, pp.1943-1946, ISSN: 2278–1323, June 2016.
[12] Abdullah Z. and Hamdan A. R, “Hierarchical Clustering Algorithms in Data Mining”, In: International Journal of Computer and Information Engineering, Volume.9, pp.2201- 2206, 2015.
[13] Rajalakshmi K, and Dhenakaran, Roobini N, “Comparative Analysis of K-Means Algorithm in Disease Prediction”, In: International Journal of Science, Engineering and Technology Research (IJSETR), Volume.4, Issue.7, pp.2697-2699, ISSN: 2278-7798, July 2015.
[14] Abdullah Z, Hamdan A. R, “Hierarchical Clustering Algorithms in Data Mining”, In: International Journal of Computer and Information Engineering, Volume.9, pp.2201- 2206, 2015.
[15] Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Morgan Kaufmann, Third Edition, 2012.
[16] Mohammed M. Abu Tair, Alaa M. El-Halees, “Mining Educational Data to Improve Students’ Performance: A Case Study”, In: International Journal of Information and Communication Technology Research, Volume.2, pp.140-146, February 2012.
[17] M. Kasthuri, Dr. S. Britto Ramesh Kumar, “A Framework for Language Independent Stemmer Using Dynamic Programming”, In: International Journal of Applied Engineering Research (IJAER), Print ISSN 0973-4562, Volume.10, Number.18, pp.39000-39004 Online ISSN1087-1090, 2015.
[18] M. Kasthuri, Dr. S. Britto Ramesh Kumar, “PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming”, In: 2016 World Congress on Computing and Communication Technologies, ISBN: 978-1-5090-5573-9, pp.132-135, IEEE, 2016.
[19] M. Kasthuri and Dr. S. Britto Ramesh Kumar, “Multilingual Phonetic Based Stem Generation”, In: Proceedings of the Second International Conference on Emerging Research in Computing, Information Communication and Applications (ERCICA-2014), ELSEVIER Science :: Technology India, ISBN:9789351072 607, Volume.1, pp.437-442, 01-02 August, 2014.
[20] Dr.M.Kasthuri and Dr.S.Britto Ramesh Kumar, “PLIS: Proposed Language Independent Stemmer Performance Evaluation”, In: International Journal of Advanced Research in Computer Science & Technology (IJARCST 2017), Volume.5, Issue.4, ISSN: 2347-8446 (Online), ISSN:2347-9817 (Print), Oct-Dec, 2017.
Citation
M. Kasthuri, S. Kanchana, R. Hemalatha, "A Comparative Study on Various Clustering Techniques in Data Mining", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.1-8, 2018.
A Performance Analysis of Improved_Eclat Algorithm in Association Rule Mining
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.9-13, Dec-2018
Abstract
In mining frequent Itemsets, Eclat algorithm is an important one. But it has some inefficiency. We proposed an algorithm called Improved_Eclat which is a new improved eclat method with high efficiency in the searching process to reduce the running time using two dimensional pattern tree. By comparing Improved_Eclat with Eclat , Eclat-opt and Bi-Eclat, hereby it is proved that the Improved_Eclat has the highest efficiency in mining associating rules from various databases.
Key-Words / Index Term
Association rules, Eclat, increased search approach, increased two- dimensional pattern trees
References
[1] R. Agrawal, T. Imilienski and A. Swami, “Mining association rules between sets of items in large databases”, Proceeding of the ACM SIGMOD Int‟l Conference on Management of Data, Washington DC, (1993), pp. 207-216.
[2] J. Han, J. Pei and Y. Yin, “Mining frequent patterns without candidate generation”, Proceedings of the2000 ACM SIGMOD International Conference on Management of Data, (2000), pp. 1-12.
[3] J. Dong and M. Han, “BitTableFI: An efficient mining frequent itemsets algorithm”, Knowledge-Based Systems, vol. 20, no. 4, (2007), pp. 329-335.
[4] C. Aflori and M. Craus, “Grid implementation of the Apriori algorithm”, Advances in Engineering Software, vol.38, no. 5, (2007), pp. 295-300.
[5] F. Berzal, J. Cubero and N. Marin, “TBAR: An efficient method for association rule mining in relational databases”, Data & Knowledge Engineering, vol. 37, no. 1, (2001), pp. 47-64.
[6] D. C. Pi, X. L. Qin and N. S. Wang, “Mining Association Rule Based on Dynamic Pruning”, Mini- Micro Systems, vol. 10, (2004), pp. 1850-1852.
[7] J. Pork, M. Chen and P. Yu, “An effective hash based algorithm for mining association rules”, ACM SIGMOD, vol. 24, no. 2, (1995), pp. 175-186.
[8] S. Brin, R. Motwani and C. Silverstein, “Beyond market baskets: generalizing association rules to correlations,” ACM SIGMOD Conference on Management of Data, Tuscon, AZ, (1997), pp. 265–276.
[9] H. F. Li and S. Y. Lee, “Mining frequent itemsets over data streams using efficient window sliding techniques”, Expert Systems with Applications, vol. 36, no. 2, (2009), pp. 1466-1477.
[10] Y. F. Zhong and H. B. Lv, “An Incremental Updating Algorithm to Mine Association Rules Based on Frequent Pattern Growth”, Computer engineering and Application, vol. 26, (2004), pp. 174-175.
[11] R. Balazs, “Nonordfp: An FP-Growth Variation without Rebuilding the FP-Tree”, Proceedings of the IEEE ICDM Workshop on Frequent Itemset Mining Implementa-tions, (2004).
[12] G. Gosta and J. F. Zhu, “Fast Algorithms for Frequent Itemset Mining Using FP-Trees”, IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 10, (2005), pp. 1347-1362.
[13] W. Ke, T. Liu, H. J. Wei and L. J. Qiang, “Top down fp-growth for association rule mining”, The 6th Pacific-Asia Conference, PAKDD 2002, Taipei, Taiwan, (2002), pp. 334-340.
[14] J. Pei, J. W. Han and H. J. Lu, “H-Mine: Fast and space-preserving frequent pattern mining in large databases”, IIE Transactions, vol. 39, no. 6, (2007), pp. 593-605.
[15] K. C. Lin, I. Liao and Z. S. Chen, “An improved frequent pattern growth method for mining association rules”, Expert Systems with Applications, vol. 38, no. 5, (2011), pp. 5154-5161.
[16] M. Zaki, “Scalable algorithms for association mining”, IEEE Transactions on Knowledge and Data Engineering, vol. 12, no. 3, (2000), pp. 372-390.
[17] L. S. Thieme, “Algorithmic Features of Eclat”, Proceedings of the IEEE ICDM Workshop on Frequent Itemset Mining Implementations, Brighton, UK, November, (2004).
[18] M. J. Zaki and K. Gouda, “Fast vertical mining using diffsets”, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, USA, (2003), pp. 326-335.
[19] X. Z. Yang, C. P. En and Z. Y. Fang, “Improvement of Eclat algorithm for association rules based on hash Boolean matrix”, Application Research of Computers, vol. 27, no. 4, (2010), pp. 1323-1325.
[20] F. P. En, L. Yu, Q. Q. Ying and L. L. Xing, “Strategies of efficiency improvement for Eclat algorithm”,Journal of Zhejiang University (Engineering Science), vol. 47, no. 2, (2013), pp. 223-230.
[21] Xiaomei Yu, Hong Wang, “Improvement of Eclat Algorithm Based on Support in Frequent Itemset Mining”,Journal ofComputers”, vol. 9, no. 9, (2014), pp. 2116-2123
Citation
V. Priya, S.Murugan, "A Performance Analysis of Improved_Eclat Algorithm in Association Rule Mining", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.9-13, 2018.
Application of Big Data Tools and Techniques in Prediction of Heart Diseases
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.14-16, Dec-2018
Abstract
Heart disease is one of the major causes of death in human life. But, prediction of heart disease with desired accuracy is difficult due to many reasons. For example, the database of heart disease is being archived for many years with huge volume which are too large for traditional systems to process. Also, the clinical reports and medical tests related to heart disease produce in a variety of formats such as text, images, sound etc which are not effectively handled by traditional database systems. Nowadays data mining algorithms and big data technologies play crucial role in the prediction of heart diseases. In addition, big data techniques are useful in finding the patterns of heart disease in its early stage. Analysis of heart disease data can be done on big scale using Hadoop, R and MapReduce. In our previous paper, we proposed a conceptual approach for prediction of heart diseases with Support Vector Machine (SVM) in parallel programming fashion. In relation to our previous work, in this paper, an investigation is done in finding the applicability of different big data tools and technologies for prediction of heart diseases.
Key-Words / Index Term
Big data tools, Hadoop, Map Reduce, prediction of diseases
References
[1]. Revathi.T, Jeevitha,”Comparative Study on Heart Disease Prediction System Using Data Mining Techniques”,International Journal of Scienc and Research,Volume:4,Issue 7,July 2015,PP.2120-2123.
[2]. Miss.Chaitrali S.Dangare, Dr.Mrs.Sulabha S.Apte,”A Data Mining Approach for Prediction of Heart Disease Using Neural Networks”,International Journal of Computer Engineering & Technology,Volume:3,Issue 3,December 2012,pp.30-40
[3]. Thenmozhi.K, Deepika.P,” Heart Disease Prediction Using Classification with Different Decision Tree Techniques”, International Journal of Engineering Research and General Science,Volume:2,Issue 6,November 2014,pp.6-11.
[4]. Subha.V, Revathi.M, Murugan.D,“Comparative Analysis of Support Vector Machine Ensembles for HeartDiseasePrediction”,InternatinalJournalofComputerScience&CommunicationNetworks,Volume:5(6),December 2015,pp.386-390
[5]. Deepali Aggarwal, ”Differences between traditional data and big data”,June30,2016
[6]. Andrea Di Lenarda et al, ”The future of telemedicine for the management of heart failure patients ”,Journal of the European Society of Cardiology, May 2017
[7]. Sharmila.R, Chellammal.S,”A conceptual method to enhance the prediction of heart disease using big data techniques”, International Journal of Computer Science and Engineering,Volume:6,Issue 4,May 2018,pp.25.
Citation
R. Sharmila, S. Chellammal, "Application of Big Data Tools and Techniques in Prediction of Heart Diseases", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.14-16, 2018.
The Node Energy of Multipath Routing Protocol for Mobile Ad Hoc Networks
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.17-22, Dec-2018
Abstract
In this research, a cross-layer optimized energy-aware multipath routing protocol (EMRP) for mobile ad hoc networks (MANET) is proposed. By sharing the information among the physical layer, the MAC sub-layer and the network layer, EMRP efficiently utilizes the network resources such as the node energy and the link bandwidth. Simulation results show that the protocol prolongs the network lifetime, increases the volume of packets delivered, lowers the energy dissipation per bit of data delivery and shortens the end-to-end delay. The growth of interest and research on multihop wireless network is exponential in recent years. In mobile ad hoc networks (MANET), the nodes play the role of routers to forward the packets of neighbor nodes as there is no fixed infrastructure available to do so. Network is a proven solution that maps the architecture of cellular networks into ad hoc networks. Here, selected nodes form the virtual backbone of the network and take part in packet routing. This achieves faster packet delivery as limited nodes are responsible for the same even though the network is not strongly connected. In this paper, a distributed topology adaptive clustering algorithm is designed that requires local information by the nodes for the formation of clusters. The role of cluster head is fairly distributed among the nodes to obtain a longer network lifetime. The change of cluster heads and the mobility of nodes disturb the node connectivity resulting in communication instability. To overcome such situations, a topology control protocol is developed that adjusts the transmission range of concerned mobile nodes to achieve local connectivity among nodes within the clusters even after the hand-off by the heads takes place.
Key-Words / Index Term
EMRP, MANET, MAC sub-layer, network layer, node energy, link bandwidth
References
[1] K.D. Sajal, A. Mukherjee, et al., "Improving quality-of-service in ad hoc wireless networks with adaptive multi-path routing," In Proceedings of IEEE Globecom 2000, San Francisco, CA, Nov. 2000, pp. 261-265.
[2] M. R. Pearlman, Z. J. Haas, et al., "Alternate path routing in mobile ad hoc networks," In the Proceedings of IEEE MILCOM 2000, Los Angeles, CA, Oct. 2000, pp.501-506.
[3] M. R. Pearlman, Z. J. Haas, et al., "On the impact of alternate path routing for load balancing in mobile ad hoc networks," In Proceedings of IEEE MobiHoc 2000, Boston, MA, Aug. 2000, pp. 3-10.
[4] S. J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks," In Proceedings of IEEE ICC 2001, Helsinki, Finland, June 2001, pp. 3201-3205.
[5] K. Wu and J. Harms, "Performance study of a multipath routing method for wireless mobile ad hoc networks," In Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Cincinnati, OH, Aug. 2001, pp. 99 -107.
[6] A. Tsirigos and Z.J. Haas, "Multipath routing in mobile ad hoc networks or how to route in the presence of frequent topology changes," In Proceedings of IEEE MILCOM 2001, McLean, VA, Oct. 2001, pp. 878- 883.
[7] A. Tsirigos and Z.J. Haas, "Multipath routing in the presence of frequent topological changes," IEEE Communications Magazine, vol. 39, no. 11, Nov. 2001, pp. 132 -138.
[8] R. Leung, J. Liu, et al., "MP-DSR: a QoS-aware multi-path dynamic source routing protocol for wireless ad-hoc networks," In Proceedings of the 26th Annual IEEE Conference on Local Computer Networks, Tampa, FL, Nov. 2001, pp. 132-141.
[9] T. Ogawa, E. Kudoh and H. Suda, "Multi-routing schemes for adhoc wireless networks," In Proceedings of 2001 IEEE International Symposium on Circuits and Systems, Sydney, Australia, May 2001, pp. 866-869.
[10] M.K. Marina and S.R. Das, "On-demand multipath distance vector routing in ad hoc networks," In Proceedings of Ninth International Conference on Network Protocols, Riverside, CA, Nov. 2001, pp. 14-23.
[11] W. Lei, L. Zhang, et al., "Multipath source routing in wireless ad hoc networks," In Proceedings of 2000 Canadian Conference on Electrical and Computer Engineering , Halifax, Canada, May 2000, pp. 479-483.
[12] W. Lei, L. Zhang, et al., "Adaptive multipath source routing in ad hoc networks," In Proceedings of IEEE ICC 2001, Helsinki, Finland, June 2001, pp. 867-871.
[13] L. Zhang, Z. Zhao, et al., "Load balancing of multipath source routing in ad hoc networks," In Proceeding of ICC’2002 , New York, NY, April 2002, pp. 3197-3201.
[14] D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad hoc Wireless Networks," Mobile Computing, vol.353, pp. 153-181, Kulwer Academic Publishers, 1996.
[15] M. Li, L. Zhang, and X. Shan, "Power Controlled MAC Protocol with Dynamic Neighbor Prediction for Ad Hoc Networks," Journal of China University of Posts and Telecommunications, vol.11, no.1, pp. 29-37.
[16] P. P. Pham and S. Perreau, "Performance Analysis of Reactive Shortest Path and Multi-path Routing Mechanism With Load Balance," In Proceedings of IEEE INFOCOM’2003, San Fransisco, CA, Mar. 2003, pp. 251-259.
[17] http://www.isi.edu/nsnam/ns/ index.html
Citation
S.J. Sangeetha, T. Rajendran, "The Node Energy of Multipath Routing Protocol for Mobile Ad Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.17-22, 2018.
DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.23-27, Dec-2018
Abstract
Visual Cryptography is a new cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such some way that the decipherment will be performed by human, with none decipherment algorithmic rule. Here we have a tendency to propose a knowledge activity in halftone pictures victimisation conjugate ordered video digitizing (DHCOD) algorithmic rule that could be a changed version of information activity in halftone pictures victimisation conjugate error diffusion technique (DHCED). We have a tendency to use this DHOCD algorithmic rule for proposing a brand new 3 part visual cryptography theme. DHCOD technique is employed to cover Associate in Nursing binary visual pattern in 2 or additional ordered dither halftone pictures, which may be from identical or completely different multi-tone pictures. In projected theme we have a tendency to shall generate the shares victimisation basic visual cryptography model so imbed them into a canopy image employing a DHCOD technique, so the shares are going to be safer and pregnant.
Key-Words / Index Term
Secret shares, Halftone pictures, Visual cryptography, VCS, Watermarking, DHCED and DHCOD
References
[1] M.Naor and A. Shamir “Visual cryptography”. Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science, (950):1–12, 1995.
[2] Ming Sun Fu and Oscar C. Au “Data hiding in halftone images by conjugate error diffusion” D-7803-7761-3/03 © 2003 IEEE.
[3] Ming Sun Fu and Oscar C. Au “Joint Visual cryptography and watermarking”. 0-7803-8603-5/04 © 2004 IEEE.
[4] Zhongmin Wang and Gonzalo R. Arce “Halftone visual cryptography through error diffusion” ISBN 1-4244-0481- 9/06 © 2006 IEEE, pp.109-112.
[5] Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo “Halftone Visual Cryptography” 0-7803-7750-8/03 © 2003 IEEE,
[6] Notes “Digital Image Processing Laboratory: Image Halftoning” April 30, 2006. Purdue University.
[7] Lingo Fang and Bin Yu “Research on pixel expansion of (2,n) Visual threshold scheme” 2006 1st International Symposium on Pervasive Computing and Applications.
[8] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, Information and Computation, Vol. 129, No. 2, (1996), pp. 86-106.
[9] V. S. Miller, Uses of Elliptic Curve in Cryptography, ser. Lectures notes on Computer Sciences. New York, USA: Springer-Verlag, 1986, vol. 218, ch. Advances in Cryptography- Proceedings of Crypto85, pp. 417– 426.
[10] P. C. v. O. Alfred J. Menezes and S. A. Vanstone, Handbook of Applied Cryptography, 1st ed. CRC Press, 1996.
[11] D. R. Stinson, Cryptography: Theory and Practice, 2nd ed. CRC Press, 2002.
Citation
S. Ponnarasi, T. Rajendran, "DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.23-27, 2018.
Anchoring Your Big Data Environment
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.28-34, Dec-2018
Abstract
Security and protection issues are amplified by the volume, assortment, and speed of Big Data. The decent variety of information sources, arrangements, and information streams, joinExternalize data security when possible and d with the gushing idea of information procurement and high volume make one of kind security dangers. This paper points of interest the security challenges when associations begin moving touchy information to a Big Data store like Hadoop. It distinguishes the diverse danger models and the security control structure to address and alleviate security hazards because of the recognized risk conditions and use models. The system laid out in this paper is likewise intended to be circulation skeptic.
Key-Words / Index Term
Hadoop, Big Data, enterprise, defense, risk, Big Data Reference Framework, Security and Privacy, threat model
References
[1] EMC Big Data 2020 Projects http:// www.emc.com/leadership/digitaluniverse/iview /big-data-2020.html
[2] NIST Special Publication 1500-1 NIST Big Data Interoperability Framework: Volume 1, Definitions http:// bigdatawg.nist.gov/_uploadfiles/M0392_v1_3022325181.pdf
[3] Securosis – Securing Big Data Security issues with Hadoop environments https://securosis.com/blog /securing-big-datasecurity-issues-with-hadoop-environments
[4] Top 10 Big Data Security and Privacy Challenges, Cloud Security Alliance,2012 https://downloads .cloudsecurityalliance.org/inititives/bdwg/ Big_Data_Top_Ten_v1.pdf
[5] Hadoop in Action, Second Edition by Manning Publications.ISBN:9781617291227http://www.manning. com/ lam2/
Citation
S. Regha, M. Manimekalai, "Anchoring Your Big Data Environment", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.28-34, 2018.
A Comparative Study of Social Media Data Using Weka Tool
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.35-39, Dec-2018
Abstract
Social media is a growing trend in the world today. It is being utilized by students, parents, businesses and religious organizations. Nowadays mostly every human being becomes addicted to social media, i.e. Facebook, Twitter and WhatsApp. Usages of social media are increasing in trends. They can build a personal network of friends that is connected to an open worldwide community. Information is now shared freely between the two. These parties can communicate either publicly or via the more discrete personal message. In this paper contains Facebook, Twitter and WhatsApp dataset like status and profile photo. The goal here is to analyze the time execution, Execution process and frequency by implementing weka tool. Here analogize the three algorithms, namely K-means, Bayesion algorithm and apriori algorithm. In this research process, the three algorithms used to find the time execution, Execution process and frequency which are predicting time consumes.
Key-Words / Index Term
Facebook, Twitter, WhatsApp, Bayesion algorithm, K- Means algorithm, Apriori algorithm
References
[1]. Bogdan Batrinca, Philip C.&Treleaven “Social media analytics: a survey of techniques, tools and platforms” Springer open access, AI &Soc (2015) 30:89–116.
[2]. G.ThirumaniAatthi, R.Aishwarya, R.Mallika, and Angel “PREDICTION OF SOCIAL NETWORK SITES USING WEKA TOOL”International journal of advanced technology and science, volume 3, Isssue 1, Nov-2015. ISSN-2348.
[3]. Andrzejewski, David, XiaojinZhu, Mark Craven, and Ben Recht [3]“Learning from Bullying Traces in Social Media” IJCAI, pages 1171–1177, 2011.
[4]. Boyd, D., & Ellison, N., (2007), ‘Social network sites: Definition, history, and scholarship’, Journal of Computer-Mediated Communication, 13(1),.Retrieved August 22, 2009 from http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.htm , pp.1-11
[5]. Christopher,C.(2008) Executive Briefing: Social network for business associations. Retrieved August 20, 2009 from http://haystack.cerado.com/html/haystack_directory.php. PP.18.
[6]. Dan, M. (2009). Social networking for dentists – made easy. Retrieved August 22, 2009 from http://www.dental- tribune.com/articles/content/id/315/scope/news/region/usa.
[7]. DiMicco. J., Millen. D., Geyer. W., Dugan, C., Brownholtz, B., and Muller, M. (2008) Motivations for Social Networking At Work. In Proceedings of The 2008 ACM Conference on Computer Supported Cooperative Work, San Diego, CA, USA, November 08 - 12, 2008, pp.711-720
[8]. David,R.(2007) YouTube for Your Business; Computerworld. Retrieved August 20, 2009 from http://www.pcworld.com/article/133278/youtube_for_your_business.html.
[9]. Emin , D. & Cüneyt , B. (2007) Web 2.0 - an Editor’s Perspective: New Media for Knowledge Cocreation. International Conference on Web Based Communities (2007),pp 27-34. [7]. Facebook Adds Marketplace of Classified Ads (2007-05-12). Retrieved August 24, 2009 from www.physorg.com/news98196557.html .
Citation
M. Saranya kala , "A Comparative Study of Social Media Data Using Weka Tool", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.35-39, 2018.
Analysis of PG Admission in Arts and Science College using Data Mining Tools
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.40-43, Dec-2018
Abstract
Information is the backbone of any Organization. To succeed in this situation, one must manage the information in the right amount and at right time. Data Mining is used to mine the new pattern or trends or rules from the unknown/ large amount of data / unpredictable data sets. Data Mining is used at diverse fields like Educational, Agriculture, Medical, Police Department, Research side, Information Technology side and Image processing etc., This Paper analyzes the mindset of Final year UG student about PG admission. For that 18 attributes and one class label collected from the final year UG students then applied on the Data Mining Tools like Weka Tool and Orange Tool. The data sets passed on the classification algorithms like J48, Naive Bayes, RandomForest and REPT Tree in Weka and Classification Tree, CN2, Naive Bayes and kNN of Orange Data Mining Tool. The Confusion matrix, Training and simulated Errors and Testing and Validation Results are obtained and tabulated. The Weka and Orange data mining tools classifiers performance are represented in the graphical form and its decision tree. From the decision tree, hidden rules are extracted, from which possible to determine factors which affects the PG admission. From the Weka tool, obtain attributes interest, jobavailability, feestat, colinfra and scholarship can predict the PG admission. In orange data mining tool, attributes interest to study, jobavailability, feestatus, scholarship, gender, pregovexam and colinfra from the original data set can predict the PG admission.
Key-Words / Index Term
Data Mining, Weka, Orange Data Mining Tool, Classification Algorithms, Evaluation Result, Confusion Matrix, Rules.
References
[1] Rakesh Kumar Arora, Department of Computer Science, Krishna Engineering College, Ghaziabad, UP, India, Dr. Dharmendra Badal, Dept. of Mathematical Science & Computer Applications, Bundelkhand University, Jhansi, U.P, India, ”Admission Management through Data Mining using WEKA”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013.
[2] Neeraj Bhargava, MDS University, Anil Rajput, Govt, PG Nodal College, Sehore (M.P) India, Pooja Shrivastava, Research Scholar Barkatullah University, Bhopal, “Mining higher educational students data to analyze student’s admission in various discipline”, Binary Journal of Data Mining & Networking 1 (2010) 01-05.
Citation
P. Sundari, "Analysis of PG Admission in Arts and Science College using Data Mining Tools", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.40-43, 2018.
A Novel Approach for Heart Disease Classification using Feature Selection
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.44-48, Dec-2018
Abstract
Heart disease is predicted by classification technique. The data mining tool WEKA has been utilized for implementing J48 classifier. Proposed work is framed with a specific end goal to enhance the execution of models. For improving the classification accuracy J48 is combined with Bagging and Feature Selection. Trial results demonstrated a critical change over in the current J48 classifier. This approach enhances the classification accuracy and reduces computational time.
Key-Words / Index Term
Data mining, Heart diseases, WEKA, classification, J48, Bagging
References
[1] KanikaPahwa, Ravinder Kumar,” Prediction of Heart Disease Using Hybrid Technique For Selecting Features”, 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON) GLA University, Mathura, Oct 26-28, 2017.
[2] Salha M. Alzahani, AfnanAlthopity, AshwagAlghamdi, BoushraAlshehri, and SuheerAljuaid “An Overview of Data Mining Techniques Applied for Heart Disease Diagnosis and Prediction”, Lecture Notes on Information Theory Vol. 2, No. 4, December 2014.
[3] Jay Gholap” Performance Tuning Of J48 Algorithm For Prediction Of Soil Fertility”,.
[4] ShahedAnzarusSabab, Ahmed IqbalPritom, Md. AhadurRahmanMunshi, Shihabuzzaman” Cardiovascular Disease Prognosis Using Effective Classification and Feature Selection Technique”,
[5] Monika Gandhi,Dr.Shailendra Narayan Singh, “Predictions in Heart Disease Using Techniques of Data Mining”, 2015 1st International Conference on Futuristic trend in Computational Analysis and Knowledge Management (ABLAZE-2015).
[6]R.umadevi,M.umamaheswari,Dr.J.G.R.Sathiaseelan,”Cardiac Disease Prediction using Data mining techniques:Asurvey”,International journal of Advance Research Trends in engineering and technology(IJARTET)vol 5,special issue12,April 2018,ISSN 2394-3777.
[7] SarathBabu, Vivek EM, Famina KP, Fida K, Aswathi P, Shanid M, Hena M,” Heart Disease Diagnosis Using Data Mining Technique”, International Conference on Electronics, Communication and Aerospace Technology ICECA 2017.
[8] Abhishek TANEJA,” Heart disease Prediction System Using data Mining Techniques”, Oriental Journal Of Computer Science & Technology ISSN: 0974-6471 December 2013, Vol. 6, No. (4): Pgs. 457-466 An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India.
[9] AdityaMethaila, Prince Kansal, HimanshuArya, PankajKumar,“Early Heart Disease Prediction Using Data Mining Techniques”, Sundarapandian et al. (Eds) : CCSEIT, DMDB, ICBB, MoWiN, AIAP - 2014 pp. 53–59, 2014. © CS&IT-CSCP2014 DOI : 10.5121/csit.2014.4807
Citation
R. UmaDevi, Raynuka Azhakarsamy , J.G.R. Sathiaseelan, "A Novel Approach for Heart Disease Classification using Feature Selection", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.44-48, 2018.
Analysis of Security Algorithms used to secure Cloud Environment
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.49-54, Dec-2018
Abstract
Cloud computing is an environment that enables its users to store data in virtualized storage. Cloud provides different services to users; the prime aim of this service usage is to store data in the cloud. When the users store data in the cloud, security of the data is becoming the topmost challenge to be considered in the cloud environment. There are different approaches and techniques which are proposed to address the security of data in the cloud. This paper presents a study and review of different security algorithms that are used in the cloud to secure the cloud environment. The paper presents the comparison of security algorithms with respect to different parameters. Findings and observations obtained from the study of different security algorithms are discussed. Finally, the paper suggests some points to be considered at the time of developing security algorithms for the cloud environment.
Key-Words / Index Term
Cloud computing; security; security algorithms; cryptography techniques
References
[1] Arockiam, L., Monikandan, S. and Parthasarathy, G., Cloud computing: a survey. Int. J. Internet Comput, 1(2), pp.26-33, 2011.
[2] Peter Mell and Tim Grance, “The NIST Definition of Cloud Computing”, Technical Report-800-145, Version 15, National Institute of Standards & Technology, Gaithersburg, MD, United States, 2011.
[3] Dr. L. Arockiam, S. Monikandan, “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International
Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 8, pp 3064-3070., 2013.
[4] Dr. D.I. George Amalarethinam, H. M. Leena, “Enhanced RSA Algorithm with varying Key Sizes for Data security in Cloud”, World congress on Computing and communication Technologies (WCCCT), 978-1-5090, DOI 10.1109,pp.172-175, 2017 IEEE.
[5] Prakash Kuppuswamy, Dr. S. Nithyarekha” Enhanced Security for Cloud Storage using Linear Block Cipher Algorithm”, 978-1-4673-6618,-2015 IEEE.
[6] NiveditaShimbre, Prof.Priya Deshpande, “Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES algorithm”, International Conference on Computing Communication Control Automation, 978-1-4799-6892-3, DOI 10.1109, pp.35-39, 2015 IEEE.
[7] Samrat Kumar Dey, Md.Raihan Uddin, Kh.MohaimenulKabir, Md. Mahbubur Rahman, “Enhancing the Security of Cloud Computing: Genetic Algorithm and QR Code Approach”, 4th International Conference on Advance in Electrical Engineering 28-30 September, 978-1-5386-0869-2,pp.181-186, 2017 IEEE.
[8] G.Prabukanna, V.Vasudevan “Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud” ,International Conference on Electrical, Electronics, and Optimization Techniques(ICEEOT),978-1-4673-9939-5,pp.3688-3693,2016 IEEE.
[9] Uma Somani, Kanika Lakhani, Manish Mundra “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, International Conference on Parallel, Distributed and Grid Computing(PDGC),978-1-4244-7674,pp.211-216, 2010 IEEE.
[10] S. Suganya, P.M Durai Raj Vincent “Improving Cloud Security by Enhancing Remote Data Integrity Checking Algorithm” , International Conference on Innovation in Power and Advance Technologies[i-PACT],978-1-5090-5682,pp.1-6, 2017 IEEE.
[11] Jay Singh, Brajesh Kumar, Asha Kharti, “Improving Stored Data Security in Cloud Using Rc5 Algorithm”, 2017 IEEE.
[12] Arockiam, L., and S. Monikandan. "Efficient cloud storage confidentiality to ensure data security." In Computer Communication and Informatics (ICCCI), 2014 International Conference on, pp. 1-5. 2014, IEEE.
[13] Akanksha Bansal, Arun Agrawal, “Providing Security, Integrity and Authentication Using ECC Algorithm in cloud storage”, International Conference on Computer Communication and Informatics (ICCCI), Jan 05-07, 978-1-4673-8855, 2017 IEEE.
[14] Mr.PrashantRewagad, Ms.YogitaPawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, International Conference on Communication System and Network Technologies, 978-0-7695-4958, DOI 10.1109, pp.437-439, 2016-IEEE.
[15] Tim Mather, Subra Kumaraswamy, and Shahed Latif, ”Cloud Security and Privacy”, O’Reilly Media, Inc., chapter 4, September, pp. 61-71, 2009.
Citation
A. Ahadha Parveen, P.S.S Akilashri, "Analysis of Security Algorithms used to secure Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.49-54, 2018.