An Analysis of Association Rule Mining Algorithm Techniques Geographical Point of Interest in Big Data
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.776-781, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.776781
Abstract
Association rule mining represent a countenance up to in the field of big data. Association rule mining utilize conservative algorithms produce a big numeral of interviewee rules, with even use procedures such as preserve,consistency.There are still numerous rules to maintain, field authority are necessary to obtain out the rules of interest from the remaining rules. It paper is on we can straight provide rule rankings and appraise the relative relationship between the substance in the rules. this paper suggest a adapted FP-Growth algorithm called FP-GCID (novel FP-Growth algorithm based on Cluster IDs) to produce Association rule in accretion, this method called Mean-Product of Probabilities (MPP) is proposed to location rules and compute the ratio of substance for one rule. The research estranged into three phase DBSCAN (Density-Based Scanning Algorithm with Noise) algorithm is used to get mutually the geographic concern points and chart the gain cluster into comparable contract in succession; FP-GCID is used to produce Association rule.
Key-Words / Index Term
association rules ,DBSCAN, FP-GCID,Mean-Product of Probabilities (MPP)
References
[1]. Maquee, A.; Shojaie, A.A.; Mosaddar, D. Clustering and association rules in analyzing the efficiency of maintenance system of an urban bus network. Int. J. Syst. Assur. Eng. Manag. 2012, 3, 175–183.
[2]. Sohrabi, M.; Javidi, M.M.; Hashemi, S. Detecting intrusion transactions in database systems: A novel approach. J. Intell. Inf. Syst. 2014, 42, 619–644.
[3]. Sharma, N.; Om, H. Significant patterns for oral cancer detection: Association rule on clinical examination and history data. Netw. Model. Anal. Health Inform. Bioinform. 2014, 3, 50.
[4]. Geng, X.; Chu, X.; Zhang, Z. An association rule mining and maintaining approach in dynamic database for aiding product–service system conceptual design. Int. J. Adv. Manuf. Technol. 2012, 62, 1–13.
[5]. Ma, X.; Wu, Y.-J.; Wang, Y.; Chen, F.; Liu, J. Mining smart card data for transit riders’ travel patterns.Transp. Res. Part C Emerg. Technol. 2013, 36, 1–12.
[6]. Edla, D.R.; Jana, P.K. A prototype-based modified DBSCAN for gene clustering. Procedia Technol. 2012,6, 485–492.
[7]. Usman, M.; Sitanggang, I.S.; Syaufina, L. Hotspot distribution analyses based on peat characteristics using density-based spatial clustering. Procedia Environ. Sci. 2015, 24, 132–140.
[8]. Lin, K.-C.; Liao, I.-E.; Chen, Z.-S. An improved frequent pattern growth method for mining association rules. Expert Syst. Appl. 2011, 38, 5154–5161. ISPRS Int. J. Geo-Inf. 2018, 7, 146 16 of 16
[9]. Lin, C.-W.; Hong, T.-P.; Lu,W.-H. An effective tree structure for mining high utility itemsets. Expert Syst. Appl.2011, 38, 7419–7424.
[10]. B.; Le, B. Interestingness measures for association rules: Combination between lattice and hash tables.Expert Syst. Appl. 2011, 38, 11630–11640.
[11]. Shaharanee, I.N.M.; Hadzic, F.; Dillon, T.S. Interestingness measures for association rules based on statistical validity. Knowl.-Based Syst. 2011, 24, 386–392.
[12]. Lee, I.; Cai, G.; Lee, K. Mining points-of-interest association rules from geo-tagged photos. In Proceedings of the 2013 46th International Conference on System Sciences (HICSS), Wailea, HI, USA, 7–10 January 2013.
[13]. Rajeswari AM, Sridevi M, Deisy C. Outliers detection on educational data using fuzzy association rule mining. In: Int. Conf. on Adv. In Computer,Communication and information Science (ACCIS-Elsevier Publications; 2014. p. 1e9.
[14]. Butincu CN, Craus M. An improved version of the frequent Itemset mining algorithm. In: 14th IEEE Int. Conf. Networking in Education andResearch, Craiova; 2015. p. 184e9.
[15]. Ban T, Eto M, Guo S, Inoue D, Nakao K, Huang R. A study on association rule mining of darknet big data. In: Proc IEEE Int Joint Conf on Neural Network (IJCNN); 2015. p. 1e7.
[16]. Dinesh J. Prajapati a,*, Sanjay Garg b, N.C. Chauhan c”Interesting association rule mining with consistent and inconsistent rule detection from big sales data in distributed environment” Department of Computer Science & Engineering, Institute of Technology, Nirma University, AhmedabadD.J. Prajapati et al. / Future Computing and Informatics Journal 2 (2017) 19-30
[17]. 1ms.j.omana, 2ms.s.monika, 3ms.b.deepika” survey on efficiency of association rule mining techniques” j.omana et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 2017, pg. 5-8
[18]. A Survey: On Association Rule Mining. Jeetesh Kumar Jain, Nirupama Tiwari and Manoj Ramaiya. International Journal of Engineering and Research and Application. February 2013. [2] An Extensive Survey on Association Rule Mining Algorithms. Mihir R Patel and Dipak Dabhi. International journal of Emerging technology and Advanced Engineering, January 2015.
[19]. Comparative Analysis of Association Rule Mining Algorithms Based on Performance Survey. K.Vani. International journal of Computer Science and Information Technologies, 2015.
[20]. Bhavesh M. Patel*, Vishal H. Bhemwala, Dr. Ashok R. Patel” Analytical Study of Association Rule Mining Methods in Data Mining” Department of Computer Science, Hemchandracharya North Gujarat University, Gujarat, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2018 IJSRCSEIT | Volume 3 | Issue 3 | ISSN : 2456-3307
[21]. Sohrabi, M.; Javidi, M.M.; Hashemi, S. Detecting intrusion transactions in database systems: A novel approach. J. Intell. Inf. Syst. 2014, 42, 619–644.
Citation
Sachin Kumar Pandey, "An Analysis of Association Rule Mining Algorithm Techniques Geographical Point of Interest in Big Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.776-781, 2018.
Automatic Extractive Text Summarization Using K-Means Clustering
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.782-787, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.782787
Abstract
In recent year, data is emerging rapidly in each and every domain such as social media, news, education, etc. Due to data excessiveness, there is a need for an automatic text summarizer which will be having an ability to summarize the data. Since the research importance focusing on Natural Language Processing (NLP), text summarization can be used in several fields. Text summarization is a process of extracting data from a documents and generating summarized text of that documents. Thus presents an important data to the users in a relatively more concise form. The study of various extractive summarization of text is made and an essential text summarization method is proposed on the basis of Support-Vector-Machine (SVM). The proposed model tries to improve the quality as well as performances of the summary generated by the clustering technique by cascading it with Support-Vector-Machine (SVM). The documents are preprocessed to get the tokens that are obtained after tokenization, stop word removal, case folding and stemming. The various similarity measures are utilized in order to identify the similarity between the sentences of the document and then they are grouped in cluster on the basis of their term frequency and inverse document frequency (tf-idf) values of the words.
Key-Words / Index Term
Text Summarization, Extractive Summarization, Natural language Processing (NLP), Clustering, Support-Vector-Machine (SVM), Advanced Encryption Standard (AES), Tokens.
References
[1] Shiva Kumar K M and Soumya R, “Text Summarization using Clustering Technique and SVM Technique”, International Journal of Applied Engineering Research, Vol. 10, No. 12, 2015.
[2] Mgbeafulike IJ nad Christopher, “CONDENZA: A System for Extracting Abstract from a Given Source Document”, Journal of Information Technology and Software Engineering, Vol. 8, Issue 1, 2018.
[3] Babar S, “Text Summarization”, an overview, 2013.
[4] Lehmam A, “Essential summarizer: Innovative automatic text summarization software in twenty languages”, ACM Digital Library, Personalization and Fusion of Heterogeneous Information, 2010.
[5] Ayush Agarwal and Utsav Gupta, “Extraction based approach for text summarization using k-means clustering”, International Journal of Scientific and Research Publications, Vol. 4, Issue 11, Nov 2014.
[6] Simran Kaur and wg.cdr Anil Chopra, “CLUSTERING BASED DOCUMENT SUMMARIZATION”, International Journal of Emerging Trends and Technology in Computer Science, Volume 5, Issue 1, January-February 2016.
[7] Mehdi Allahyari, Seyedamin Pouriyeh, Mehdi Assefi, Saied Safaei, Elizabeth D.Trippe, Juan B. Gutierrez, and Krys Kochut, “A Brief Survey of Text Mining: Classification, Clustering and Extraction Techniques”, August 2017.
[8] Chengzhi ZHANG, Huilin WANG, Yao LIU, Dan WU, Yi LIAO and Bo WANG, “Automatic Keyword Extraction from Documents Using Conditional Random Fields”, Journal of Computational Information Systems 4:3, 2008.
[9] Santosh Kumar Bharti, Korra Sathya Babu, and Anima Pradhan, “Automatic Keyword Extraction for Text Summarization in Multi-document e-Newspapers Articles”, European Journal of Advances in Engineering and Technology, 4(6), 2017.
[10] A. Kogilavani and Dr. P. Balasubramani, “CLUSTERING AND FEATURE SPECIFIC SENTENCE EXTRACTION BASED SUMMARIZATION OF MULTIPLE DOCUMENTS”, International Journal of Computer Science and Information Technology, Vol. 2, No. 4, August 2010.
[11] A. Srinivasa Roa, Dr. Ch. Divakar, Dr. A. Govardhan, “RANK BASED DOCUMENT CLUSTERING AND SUMMARIZATION APPROACH IN THE DISTRIBUTED P2P NETWORK”, Journal of Theoretical and Applied Information Technology, Vol. 78, No. 2, 20th August 2015.
[12] Ayushi Arya, “A Review Paper on Effective AES Implementation”, International Journal of Engineering and Computer Science, Vol. 4, Issue 12, Dec 2015.
[13] Baxendale P. B, “Man-made index for technical literature-an experiment”, IBM Journal of Research and Development, 2(4), 1958.
[14] Edmundson H. P, “New Methods in Automatic Extracting”, Journal of the Association for Computing Machinery, 16(2), April 1969.
[15] Luhn H. P, “The Automatic Creation of Literature Abstracts”, IBM Journal of Research and Development, 2(2), April 1958.
[16] K. Sparck Jones, “A statistical interpretation of term specificity and its application in retrieval”, Journal of Documentation, 28(1), 1972.
[17] G. Salton, Edward Fox and Wu Harry, “Extended Boolean information retrieval”, Communications of the ACM, 26(11), November 1983.
[18] G. Salton and M. J. McGill, “Introduction to modern information retrieval”, McGraw-Hill, 1983.
[19] G. Salton and C. Buckley, “Term-weighting approaches in automatic text retrieval”, Information Processing and Management, 24(5), 1988.
[20] H. Wu and R. Luk, K. Wong and K. Kwok, “Interpreting TF-IDF term weights as making relevance decisions”, ACM Transactions on Information Systems, 26(3), June 2008.
Citation
M R Prathima, H R Divakar, "Automatic Extractive Text Summarization Using K-Means Clustering," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.782-787, 2018.
BER Performance Comparison of TCM and BICM for fast Recovery of Data at the Receiver
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.788-792, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.788792
Abstract
Trellis coded modulation is a technique in which coding and modulation are done jointly unlike earlier uncoded modulation in which coding and modulation were done separately and hence TCM gives more coding gain without escalating the signal bandwidth required.TCM uses set portioning based signal labeling to achieve a high free Euclidian distance. However decoding and demodulation are complex process in Trellis coded modulation. Bit interleaved coded modulation (BICM) reduced the decoding complexity of TCM by incorporating random interleavers to the coded scheme. BICM combines convolution codes with bit interlavers. Then BICM is modified for iterative decoding and demodulation and this modified BICM technique is known as BICM-ID. This scheme uses signal portioning as in TCM but enhances the BICM free Euclidian distance space. so better utilization of bandwidth with less complexity can be achieved with above defined schemes. In this research work a comparison of coded modulation schemes (TCM, BICM, BICM-ID) is done for finding better BER performance. According to results iterative bit interleavers are better choice than other two.
Key-Words / Index Term
BICM, TCM, BICM-ID, AWGN, BER, SNR
References
[1] S. Lin and D. J. Costello, “Error control coding." 2nd ed., Inc. UpperSaddle River, NJ: Prentice-Hall, 2004. ! pages 1
[2] G. Ungerboeck, “Channel coding with multilevel/phase signals," IEEETrans. Inf. Theory, vol. 28, no. 1, pp. 55{67, Jan. 1982. ! pages 1, 8
[3] E. Zehavi, “8-psk trellis codes for a Rayleigh channel," IEEE Trans.Commun., vol. 40, no. 3, pp. 873{884, May 1992 ! pages 2, 5, 8, 20,65
[4] G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modulation,"IEEE Trans. Inf. Theory, vol. 44, no. 3, pp. 927{946, May 1998.! pages 2, 8, 9, 20, 39, 40, 42
[5] A. Alvarado, L. Szczecinski, and E. Agrell, “On BICM receivers forTCM transmission," IEEE Trans. Commun., vol. 59, no. 10, pp. 2692{2702, Oct. 2011. ! pages 3, 4, 5, 9, 10, 16, 17, 18, 19, 21, 25, 32, 39,50, 51, 53, 57, 59
[6] C. Stierstorfer, R. F. H. Fischer, and J. B. Huber, “Optimizing BICMwith convolutional codes for transmission over the AWGN channel," inProc.of International Zurich Seminar Commun., March 2010. ! pages3, 9
[7] LEE – FANG WEI, “trellis coded modulation with multidimensional constellation”, IEEE Transactions onet al, International Journal of Advanced Research in Computer Science, 8(9), Nov–Dec, 2017,797-800© 2015-19, IJARCS All Rights Reserved 800Information Theory, volume IT-33,No.4, pp 483- 501, July1987.
[8] G.Caire, G.Taricco, E.Biglieri, “bit interleaved coded modulation”, communications, 1997, ICC ’97 Montreal, Towards the Knowledge millennium. IEEE International conference , 12 june 1997.
[9] Vincent K.N. Lau, “Performance of variable bit interleaved coding for high bandwidth efficiency”, The 51st IEEE V T SVehicular technology conference proceedings, spring, Tokyo,japan, vol.3, pp 2054-2058, 15-18 May 2000.
[10] Xiaodong Li, Aik Chindapol, James A. Ritcey, “bit interleaved coded modulation with iterative decoding and 8 PSK signalling”, IEEE Transactions on communication Vol. 50,No.8, august 2002.
[11] Naghi H. Tran and Ha H. Nguyen, “signal mapping of 8 – ary constellation for bit interleaved coded modulation with iterative decoding”. IEEE Transactions on Broad casting, Volume 52, No.1, pp 92-99, March 2006.
[12] Md. Jahangir Hossian, Alex Alvarado, Laszek Szczecinski, “Constellation and Interleaver design for bit interleaved coded modulation”, Global Telecommunication Conference(GLOBECOM 2011) , IEEE, 5-9 December 2011.
[13] Hongzhong Yan and Ha H. Nguyen,“Bit interleaved coded modulation with Iterative decoding in two way relaying communication”, IEEE International Conference on communications (ICC) ,22-27 may 2016.
[14] J. Barrueco, C.Reguerio, J. Montalban, M.Velez, P. Angueria, Heung-mook, sung-IK Park, Jae-young lee,“Combining advanced constellation and SSD techniques for optimal BICM capacity”, IEEE international symposium on broadband multimedia systems and broadcasting, 6 august 2015.
[15] Rugui Yao, Lu Li , Juan Xu, Fanqi Gao and Yongjia Zhu “Improving BER Performance with a BICM System of 3D-Turbo code and Rotated Mapping QAM”, 2015 IEEE 26th International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC): Fundamentals and PHY
Citation
Nisha, Manoj Ahlawat, "BER Performance Comparison of TCM and BICM for fast Recovery of Data at the Receiver," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.788-792, 2018.
Impact Assessment of Common Service Centres (Telecenters) on Citizen Services: - Findings from Jammu and Kashmir
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.793-798, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.793798
Abstract
Under the National E- Governance Plan (NeGP) and with the aim of providing quality services to its citizens, government of India established around one hundred thousand common service centres (CSCs) across India. These Common Service Centres were established with the objective of delivering various types of services to its citizens. The services included government-to-citizen services (G2C), business-to-consumer services (B2C) and other services. Like other states in India, the scheme was extended to the state of Jammu & Kashmir as well and these CSCs were popularly referred as Khidmet Centres in the state. The objective of the present study is to find out whether any significant improvement has occurred in delivery of government-to-citizen services since these Khidmet centres came into existence in the state of Jammu & Kashmir. While making use of the secondary as well as primary data, the study finds that after the establishment of Khidmet Centres, there has been a remarkable improvement in delivery of services to citizen in terms of timeliness, transparency and cost. However the findings also suggest that these Khidmet centres have become more of a business-to-consumer than government-to-citizen delivery points.
Key-Words / Index Term
Common Service Centres, Khidmet Centres, Citizen Services etc
References
[1] “The Role of ICT in Advancing Growth in Least Developed Countries: - Trends, Challenges and Opportunities,” International Telecommunication Union, 2011.
[2] “ICTs and e-governance in UNDP,” UNDP, 2013.
[3] “Saaransh: - A Compendium of Mission mode Projects under NeGP,” January.
[4] “Internet Users per 100,” 2015. [Online]. Available: http://data.worldbank.org/indicator/IT.NET.USER. [Accessed 2015].
[5] “United Nations E-government Survey 2014,” UNO, 2014.
[6] J. Grace and C. Kenny, “Information and Communication Technologies and Broad-Based Development: A Partial Review of the Evidence,” Worldbank, Washington DC, 2004.
[7] Gomez and H. P, “Telecentres Evaluation and research: A global perspective,” International Development Research Centre., Ottawa, Cannada, 1999.
[8] M. Islam and M. Hassan, “Multipurpose community telecentres in Bangladesh: problems and prospects.,” The Electronic Library Emerald Group Publishing Ltd.
[9] M. K, “Multipurpose community centers for rural development in Pakistan,” E, 2005.
[10] Banjamin, “Does "Telecentres" mean the center is far away: Telecenter development in South,” The South Africal Journal of Information and Communication, p. 1.
[11] “About The scheme,” [Online]. Available: http://csc.gov.in/index.php?option=com_content&view=article&id=106&Itemid=249. [Accessed 10 11 2015].
[12] “CSC Status,” [Online]. Available: http://csc.gov.in/cscstatus/cscstatus.html. [Accessed 23 6 2015].
[13] “CSC Dashboard,” [Online]. Available: http://csc.gov.in/dashboard/default.php. [Accessed 21 7 2015].
[14] “Impact Assessment of Indian Common Services Centres,” Ministry of Communication and Information Technology.
[15] “Acheivements,” [Online]. Available: http://www.akshaya.kerala.gov.in/index.php/achievements. [Accessed 26 7 2015].
Citation
Mohammad Asif Naqshbandi, Asif Iqbal Fazili, "Impact Assessment of Common Service Centres (Telecenters) on Citizen Services: - Findings from Jammu and Kashmir," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.793-798, 2018.
Water Level Management Using Ultrasonic Sensor(Automation)
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.799-804, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.799804
Abstract
Majority of earth’s surface is covered with water but less than 5% is useful. So water conserving has become a major issue so certain water management steps are to be taken. Measuring water level is an important task from government and residence side. Thus, existing management systems has to be updated [1]. In this paper, we investigate the water level management using ultrasonic sensor which detects the amount of water present in the tank and returns the percentage of water present in it. This system has an Arduino, motor pump, LCD display, over-head tank, resource tank, buzzer and an LED. All components are interfaced with the Arduino and works by automation as per uploaded code. We divided the over–head tank by mean of percentages likely 10%, 20%...100%. 10% is the condition of the tank where the quantity of water present in it is very less and finally 100% is maximum condition. We have to monitor and maintain the tank when the water in it is getting less, but in this we make use of a buzzer so whenever the water level percentage is about 10% the buzzer, makes sense and automatically the relay based motor starts and standstill up to reach of 100% of the tank. So no one is required to monitor the tank and for switching of the motor. The main thing we employed is echo, which can be easily understood by an example consider you are in a silent cave when you produce sound you will listen the same thing by high intensity and this is called echo. Like example the ultrasonic sensor has two small openings on it. In which one opening sends the high frequency sound pulse called as ultrasonic waves like a small speaker (sender) and other opening receives them like a small microphone (receiver) [2] the explanation can be better understood by fig (1).
Key-Words / Index Term
Ultrasonic waves, echo, trig, Arduino, smart water, water level management, automation, relay, water level, trig, echo
References
[1] Yogita patil, Ramandeep Singh, “Smart tank Management System for Residential Colonies Using Atmega 128A Microcontroller”, International Journal of Scientific & Engineering Research, Volume 5, Issue 6, June-2014.
[2] http://arduino-info.wikispaces.com/Ultrasonic+Distance+Sensor
[3] Asaad Ahmed Mohammedahmed Eltaieb, Zhang Jian Min, “Automatic Water level control System”, International Journal of Science and Research, volume 4 issue 12 December 2015.
[4] Partik Roy, “Construction of Digital Water Level Indicator and Automatic Pump Control System”, International journal of research, volume-3 issue-13 September 2016.
[5] http://arduino-info.wikispaces.com
[6] https://components101.com/ultrasonic-sensor-working-pinout-datasheet
[7] Beza Negash Getu, Hussian A. Attia, Automatic Water Level Sensor and Controller System, IEEE volume-1 issue-3 2016.
[8] https://circuitdigest.com/microcontroller-projects/arduino-ultrasonic-sensor-based-distance-measurement
[9] J.A Jodice, “Relay Performance Testing”, IEEE, volume- 12 issue- 1, 1997.
[10] https://www.electronics-tutorials.ws/resistor/potentiometer.html
[11] Abhishek Saini, Shikhar Rana, Simranjeet Singh, Mohit, Harpreet Kaur Channi, “Designing and Modeling of Water Level Indicator”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology,
Volume 2, Issue 6, November-December 2017.
[12] Supriya R. Khaire, Revati M. Wahul, “Water Quality Data Transfer and Monitoring System in IOT Environment: A Survey”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 2, Issue 6, November-December 2017.
Citation
Kodathala Sai Varun, Kandagadla Ashok Kumar, Vunnam Rakesh Chowdary, C. S. K. Raju, "Water Level Management Using Ultrasonic Sensor(Automation)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.799-804, 2018.
Prediction of Human Health using Decision Tree Technique
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.805-808, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.805808
Abstract
Now a day’s prediction of diseases is gaining importance in a hospital management system, rather than giving treatment for the diseases after it is being diagnosed. It is better to avoid that in an initial stage, by taking proper suggestions from the doctor. Artificial intelligence and machine learning are used for this purpose, so in this project we are using decision tree technique based on prediction mechanism to predict the future occurring diseases and avoiding that before it is forthcoming. The main aim of using artificial intelligence in healthcare is to analyse relationships between prevention and treatment of the diseases. We survey the current status of artificial intelligence applications in healthcare and discuss its future. This proposed system highlights the use of artificial intelligence for decision making and Prediction of diseases in the medical field. Decision makers should be aware of giving proper treatment for the particular disease and which will be the evolution of the patient during the treatment.
Key-Words / Index Term
Artificial intelligence, machine learning, deep learning, prediction, Image Net, decision tree technique
References
[1]. Paritosh Khubchandani, Kundan Jha, Rohit Bijani, Surah Lala, Pallavi Saindane, ”Medical Prediction using Artificial Intelligence” research article vol.7 issue No 3 2017.
[2]. Fei Jiang, Yong Jiang, Hui Zhi, Yi Dong, Hao Li, Sufeng Ma, Yilong Wang, Qiang Dong, Haipeng Shen, Yongjun Wang “artificial intelligence in healthcare: past, present and future” 22 June 2017
[3]. Daniel flagella “machine learning healthcare applications 2018 and beyond” 01 June 2018
[4]. Carlo combi “artificial intelligence in medicine”
[5]. Eman Saleem Ibrahem Harba “Computer-Aided Diagnosis for Lung Diseases based on Artificial Intelligence: A Review to Comparison of Two-Ways: BP Training and PSO Optimization” IJCSMC, Vol. 4, Issue. pg.1121 – 1138 6, June 2015
[6]. Jonathan H. Chen, Steven M. Asch, “Machine Learning and Prediction in Medicine — Beyond the Peak of Inflated Expectation” June 2017
[7]. “Artificial Intelligence for Health and Health Care “ December 2017
[8]. Daniel B. Neill, “Using Artificial Intelligence to Improve Hospital Inpatient Care” March/April 2013
[9]. Gianluca bontempi,“machine learning for predicting in a big data world” August 2017
[10]. Ashish Khare, Moongu Jeon, Ishwar K. Sethi,and Benlian Xu, “Machine Learning Theory and Applications for Healthcare” Volume 2017, Article ID 5263570, 27 September 2017
[11]. Yong Xia, Zexuan Ji, Andrey Krtlov,Hang Chang, and Weidong cai, “machine learning in multimodal medical imaging” volume 2017 article ID 1278329 5 march 2017
[12]. Qing-yun Dai, Chun-ping Zhang and Hao Wu, “Research of decision tree classification algorithm in data mining” vol.9, no.5 2016
[13]. Shikha Chourasia, “Survey paper on improved methods of ID3 decision tree classification” vol.3, issue 12, December 2013
[14]. J y chung,”a new decision tree classification algorithm for machine learning” 06 august 2002
[15]. Alan brown, “Machine learning with decision trees” 14 February 2018
Citation
S. Divyashree , H.R. Divakar, "Prediction of Human Health using Decision Tree Technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.805-808, 2018.
Divergence Based Generalized Fuzzy Rough Sets
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.809-815, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.809815
Abstract
Fuzzy set theory and rough set theory are two formal mathematical tools to handle vagueness, imperfection or incompleteness in data. Fuzzy rough set theory is an embodiment of the prime features of both the theories. This hybrid theory has been proved to be an effective tool for data mining, particularly for feature selection. In this paper, generalized fuzzy rough approximations based on divergence measure of fuzzy sets in an information system is defined using a fuzzy implicator and a fuzzy t-norm. Also, the properties of the fuzzy rough approximations are investigated. Further, an algorithm for feature selection using the fuzzy boundary region of the proposed approximations is presented and experimented with twelve real data sets.
Key-Words / Index Term
Information System, Approximations, Divergence Measure, Fuzzy rough set, Feature selection
References
[1] S. Sumathi and S.N. Sivanandam, "Introduction to Data Mining and its Applications", Springer, Berlin, 2006.
[2] Sonali Suskar, S. D. Babar , "Survey on Feature Selection for Text Categorization", International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol.3, Issue.4, pp.261-266, 2018.
[3] P. Rutravigneshwaran , "A Study of Intrusion Detection System using Efficient Data Mining Techniques", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.5-8, 2017.
[4] L. A. Zadeh, "Fuzzy Sets", Information and Control, Vol.8, Issue.3, pp.338-353, 1965.
[5] Z. Pawlak, "Rough Sets", International Journal of Computer and Information Sciences, Vol.11, Issue.5, pp.341 - 356, 1982.
[6] S. Vluymans, L. D`eer, Y. Saeys, C. Cornelis, "Applications of Fuzzy Rough Set Theory in Machine Learning: a Survey", Fundamenta Informaticae, pp.1-34, 2015.
[7] D. Dubois, H. Prade, "Rough Fuzzy Sets and Fuzzy Rough Sets", International Journal of General Systems, Vol.17, pp.191-209, 1990.
[8] J. S. Mi, Y. Leung and T. Feng, "Generalized Fuzzy Rough Sets Determined by a Triangular Norm", Information Sciences, Vol.178, pp.3203-3213, 2008.
[9] N. M. Parthalain, R. Jensen and Q. Shen, "Fuzzy entropy assisted fuzzy-rough feature selection", in Proceedings of 2006 IEEE International Conference on Fuzzy Systems, pp.1499-1506, 2006.
[10] A. Radzikowska and E. E. Kerre, "A comparative Study of Fuzzy Rough Sets", Fuzzy Sets and Systems, Vol.126, pp.137-155, 2002.
[11] W. Z. Wu, J. S. Mi and W. X. Zhang, "Generalized Fuzzy Rough Sets", Information Sciences, Vol.151, pp.263-282, 2003.
[12] Sheeja T. K. and A. Sunny Kuriakose, "A novel feature selection method using fuzzy rough sets", Computers in Industry, Vol.97, pp.111 - 116, 2018.
[13] J. Klir and B. Yuan, "Fuzzy Sets and Fuzzy Logic", Prentice Hall, New Jersey,1995.
[14] Z. Pawlak, "Rough Sets - Theoretical Aspect of Reasoning About Data", Kluwer Academic Publishers, The Netherlands, 1991.
[15] S. Montes, I. Couso, P. Gil and C. Bertoluzza, "Divergence Measure Between Fuzzy Sets", International Journal of Approximate Reasoning, Vol.30, pp.91-105, 2002.
[16] S. An, Q. Hu and D. Yu, "A Robust Rough Set Model Based on Minimum Enclosing Ball", In Rough Sets and Knowledge Discovery, LNAI 6401 eds J. Yu et al., pp.102-109, Springer - Verlag, Berlin 2010.
[17] C. Chornelis, N. Verdiest and R. Jensen, "Ordered Weighted Average Based Fuzzy Rough Sets", In Rough Sets and Knowledge Discovery, LNAI 6401, eds J. Yu et al., pp.78-85, (Springer - Verlag, Berlin 2010.
[18] Q. Hu, D. Chen, D. Yu and W. Pedrycz, "Kernelized Fuzzy Rough Sets", In Rough Sets and Knowledge Discovery, LNCS 5589, eds P. Wen et al. pp.304-311, 2009 (Springer-Verlag, Berlin).
[19] L. Deer, N. Verbiest, C. Cornelis and L. Godo, "A comprehensive study of implicator-conjunctor-based and noise-tolerant fuzzy rough sets: Definitions, properties and robustness analysis", Fuzzy Sets and Systems, Vol.275, pp.1-38, 2015.
[20] R. Jensen and Q. Shen, "Fuzzy-rough attribute reduction with application to web categorization", Fuzzy Sets and Systems, Vol.141, issue.3, pp.469-485, 2004.
[21] R. Jensen and Q. Shen, "Fuzzy-rough data reduction with ant colony optimization", Fuzzy Sets and Systems, Vol.149, Issue.1, pp.5- 20, 2005.
[22] R. Jensen and Q. Shen, "New approaches to fuzzy-rough feature selection", IEEE Transactions on Fuzzy Systems, Vol.17, Issue.4, pp.824-838, 2009.
[23] R. Jensen and Q. Shen, "Fuzzy-rough sets assisted feature selection", IEEE Transactions on Fuzzy Systems, Vol.15, Issue.1, pp.73 - 89, 2007.
[24] C. C. Eric, D. Chen, D.S.Yeung, X. Z. Wang and W.T. John, "Attributes reduction using fuzzy rough sets", IEEE Transactions on Fuzzy Systems, Vol.16, Issue.5, pp.1130-1141, 2008.
[25] N. M.Parthalain, Q. Shen and R. Jensen, "A distance measure approach to exploring the rough set boundary region for attribute reduction", IEEE Transactions on Knowledge and Data Engineering, Vol.22, Issue.3, pp.305-317, 2010.
[26] M. Lichman, UCI Machine Learning Repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science 2013.
[27] C. Armanino, R. Leardi, S. Lanteri and G. Modi, "Chemometrics and Intelligent Laboratory Systems" Vol.5, pp.343-354, 1989.
[28] H. T. Kahraman, S. Sagiroglu and I.Colak, "Developing intuitive knowledge classifier and modeling of users` domain dependent data in web", Knowledge Based Systems, Vol.37, pp.283-295, 2013.
[29] A. Tsanas and A. Xifara, "Accurate quantitative estimation of energy performance of residential buildings using statistical machine learning tools", Energy and Buildings, Vol.49, pp.560-567, 2012.
[30] C. Mallah, J. Cope and J. Orwell, "Plant Leaf Classification Using Probabilistic Integration of Shape, Texture and Margin Features", Signal Processing, Pattern Recognition and Applications, 2013.
[31] P. Cortez, A. Cerdeira, F. Almeida, T. Matos and J. Reis, "Modeling wine preferences by data mining from physicochemical properties", Decision Support Systems, Elsevier, Vol.47, Issue.4, pp.547-553, 2009.
Citation
Sheeja T.K., Sunny Kuriakose A., "Divergence Based Generalized Fuzzy Rough Sets," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.809-815, 2018.
Improving VANET Protocols using Graph Structure Approach
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.816-821, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.816821
Abstract
It is very difficult to develop an efficient protocol for message broadcast in vehicular ad-hoc network that supports communication between vehicles and road side units with minimum delay, minimum overhead and maximum reachability. In this paper we show that if we study graph theoretic characteristics of VANETs because they don’t follow scale free and small world network properties, we can improve message broadcast in VANETs. We study urban and highway VANETs graph scenario for different capacities and different network densities. We study properties of graph like average shortest path length, node degree distribution, clustering coefficient and connectivity. For different parameters we develop separate analytical model for both urban and highways VANETs and study VANETs from graph structure point of view. After that we observe that clustering coefficient do not depend upon network density and network size. We study the impact of network density on connectivity and also study VANETs node degree distribution. We then show how this information can be used to reduce overhead in urban vehicular broadcasting protocol (UVCAST) with no major reduction in performance of existing protocol.
Key-Words / Index Term
Connectivity, Node Degree, Vehicular Adhoc Networks, Routing Protocols
References
[1] Amit Dua, Neeraj Kumar and Seema Bawa, “Systematic review of vanet routing protocols” Elsevier vehicular communications pages 33-52, 2014.
[2] Costa, P., Frey, D., Migliavacca, M., & Mottola, L. (2006). Towards lightweight information dissemination in inter-vehicular networks. In ACM workshop on vehicular ad-hoc networks (VANET), pp. 20–29.
[3] Romeu Monteiro, Wantanee Viriyasitavat, Susana Sargento,Ozan K. Tonguz,” A graph structure approach to improving message dissemination in vehicular networks” Springer Science+Business Media New York 2016.
[4] Ros, F.J., Ruiz, P.M., & Stojmenovic, I. (2009). Reliable and efficient broadcasting in vehicular ad-hoc networks. In IEEE vehicular technology conference (VTC), April.
[5] Viriyasitavat, W., Bai, F., & Tonguz, O. (2010). UV-CAST: An urban vehicular broadcast protocol. In Proceedings of the IEEE vehicular networking conference (VNC), December, pp. 25–32.
[6] Busanelli, S., Ferrari, G., & Panichpapiboon, S. (2009). Efficient broadcasting in IEEE 802.11 networks through irresponsible forwarding. In Proceedings of IEEE ‘‘GLOBECOM’’.
[7] Panichpapiboon, S., & Cheng, L. (2013). Irresponsible forwarding under real inter-vehicle spacing distribution. IEEE Transactions on Vehicular Technology, 62, 2264–2272.
[8] Mostafa, A., Vegni, A. M., & Agrawal, D. P. (2014). A probabilistic routing by using multi-hop retransmission forecast with packet collisionaware constraints in vehicular networks. Ad Hoc Networks, 14, 118–129.
[9] Watts, D. J., & Strotgatz, S. H. (1998). Collective dynamics of ‘small-world’ networks. Nature, 393, 440–442.
[10] Zhang, H., & Li, J. (2015). Topology analysis of VANET based on complex network. In LISS. Springer, Heidelberg, Berlin.
[11] Tonguz, O. K., Viriyasitavat, W., & Bai, F. (2009). Modeling urban traffic: A cellular automata approach. IEEE Communications Magazine, Topics in Automotive Networking, 47(5), 142–150. May.
[12] Berkeley Highway Lab (BHL). http://sprocket.ccit.berkeley.edu/bhl.
[13] X. F. Wang and G. Chen, "Complext Networks: Small-World, Scale-Free and Beyond," in IEEE Circuits and Systems Magazine, First Quarter 2003.
[14] S. H. Strotgatz, "Exploring complex networks," Nature, Vol. 410 (8 March 2010).
[15]A. Barabási and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, October 1999.
[16] N. Garg, S.Singla and S.Jangra, “Challenges and Techniques for Testing of Big” published in the Journal, “Procedia Computer Science (Elsevier)”, 85 (2016), Pg. 940-948, DOI:10.1016/j.procs.2016.05.285, ISSN: 1877-0509.
[17] Ritesh Gupta and Parimal Patel, “An Improved Performance of Greedy Perimeter Stateless Routing protocol of Vehicular Adhoc Network in Urban Realistic Scenarios” published inInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology Volume 1, Issue 1,ISSN : 2456-3307, 2016.
[18] Lubdha M. Bendale, Roshani. L. Jain and Gayatri D. Patil, “Study of Various Routing Protocols in Mobile Ad-Hoc Networks” published in International Journal of Scientific Research in Network Security and Communication Vol.06 , Special Issue.01 , pp.1-5, Jan-2018.
Citation
Jagtar Singh, Sanjay Singla, Surender Jangra, "Improving VANET Protocols using Graph Structure Approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.816-821, 2018.
Design of Planar Triple Mode Dipole Antenna for 900/1800/2400 MHz Applications
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.822-825, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.822825
Abstract
This Paper presents the design and simulation of a low profile planar triple mode dipole antenna which is designed for wireless applications. Three symmetric arms are etched on metallic layer of a single sided printed circuit board (PCB). By changing the size of the arms of the antenna we can adjust the resonant frequency. Computer Simulation Technology (CST) studio software is used for design the antenna which has its peak gain at 900/1800/2400 MHz. The effect of changing length of antenna arms on resonant frequency and parameters S11 (return loss) are described. Proposed antenna can also be work as sensor application at different frequency 900/1800/2400 MHz.
Key-Words / Index Term
Computer Simulation Technology (CST), Printed Circuit Board (PCB), Voltage Standing Wave Ratio (VSWR)
References
[1] Y.Y. Lu, J.Y. Guo, H.C. Huang, “Design of Triple Symmetric Arms Dipole Antenna for 900/1800/2450MHz Applications,” pp.978-1-4799-5390, 2014.
[2] H. Prasad, M. J. Akhtar, “CPW fed Triple Band Antenna for Sensor Application”,IEEE International Microwave and RF Conference (IMaRC).pp 333-336, 2015.
[3] W. Lin, Q.X. Chu, “Novel RFID tag antenna for matching complex impedances on 915MHz and 2.45GHz bands”, Proceedings of APMC, pp. 2248-2251, Dec. 2010.
[4] Y.-Y. Lu, S. H. Wu, H. C. Huang, “Design of Triple-Band Fork-Shaped CPW-fed Antenna,” Third International Conference on Robot, Vision and Signal processing, DOI: 10.1109, pp. 236-239, 2015.
[5] P. Xu, Z.H. Yan, C. Wang, “Multi-band modified fork-shaped monopole antenna with dual L-shaped parasitic plane”, Electronics Letters, Vol. 47, no. 6, pp. 364-365, 2011.
[6] W.S. Chen, J.W. Wang, B. Y. Lee, H.Y. Lin, “A small planar 4G antenna with a coupled-fed monopole and a directed-fed monopole for mobile handset application,”. Proceedings of APMC, pp. 334-336, Dec. 2012.
[7] Y. Y. Lu, J. Y. Kuo, H. C. Huang, “Design and application of triple-band planar dipole antennas,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 792-805, July.
[8] Y. D. Kim, H. M. Lee, “Design of compact triple-band meander chip antenna using LTCC technology for mobile handsets,” Microwave and Opt. Tec. Let., Vol. 48, pp. 160-162, 2006.
[9] Y. A. Lee, H. J. Lim, H. M Lee, “Triple-band compact chip antenna using coupled meander line structure for mobile, RFID/PCS/WiBro, IEEE AP-S Int Sy, pp. 2649-2652, 2006.
Citation
Pawan, A. Sangwan, "Design of Planar Triple Mode Dipole Antenna for 900/1800/2400 MHz Applications," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.822-825, 2018.
Consummate Approach for Classification and Pattern Matching for a Web usage based Recommendation System
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.826-830, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.826830
Abstract
Recommendation system is used to generate the recommendations on the basis of the input and processed data. This study develops a web usage data mining based recommendation system. To perform the classification and pattern matching is the major task of a recommendation system. For the purpose of classification, traditional recommendation system prefers the KNN classifiers but the issue was that the KNN performs the classification and pattern matching on the basis of the nearest neighbour and thus in this manner, it lacks the scalability and fails to perform the exact matches for the recommendation system. Therefore the Naïve Bayes classifier is implemented and analyzed in this study for the recommendation system and after simulation, it is found that the Naïve Bayes classifier generates the highly accurate and error-free recommendations for the users. The JAVA platform is used for simulation and the results are evaluated in the form of Accuracy, Error Rate, RMSE and Precision.
Key-Words / Index Term
Data Mining, Web Usage Data mining, Classification, Pattern Matching, Naïve Bayes Classifiers
References
[1] D.A. Adeniyi, Z. Wei, Y. Yongquan, “Automated web usage data mining and recommendation system using K-Nearest Neighbor (KNN) classification method”, ELSEVIER, Vol. 12, pp. 90-108, 2014.
[2] Ngoc Nhu Van, J. Rokne, “Integrating SOM and Fuzzy K-means Clustering for Customer Classification in Personalized Recommendation System for Non-Text based Transactional Data”, International Conference on Information Technology, Amman, Jordan, 2017.
[3] Anitha Talakokkula, “A Survey on Web Usage Mining, Applications and Tools”, Computer Engineering and Intelligent System, Vol. 6, No.2, pp. 22-30, 2015.
[4] Bo Cheng, Shuai Zhao, Changbao Li, Junliang Chen, “A Web Services Discovery Approach Based on Mining Underlying Interface Semantics”, IEEE, Vol. 29, pp 950-962, 2017.
[5] Satya Prakash Singh , Meenu, “Analysis of web site using web log expert tool based on web data mining”, IEEE, 2017.
[6] Yeqing Li, “Research on Technology, Algorithm and Application of Web Mining”, IEEE, Vol. 1, pp. 772-775, 2017.
[7] Z. A. Usmani, Saiqa Khan, Mustafa Kazi, Aadil Bhatkar, Shuaib Shaikh, “ZAIMUS: A department automation system using data mining and web technology”, IEEE, pp 1-6, 2017.
[8] Martin Lnenicka , Jan Hovad , Jitka Komarkova , Miroslav Pasler, “A proposal of web data mining application for mapping crime areas in the Czech Republic”, IEEE, 2016.
[9] Viktor Medvedev, Olga Kurasova, Gintautas Dzemyda, “A new web-based solution for modelling data mining processes”, ELSEVIER, Vol. 76, pp. 34-46, 2016.
[10] Petar Ristoski, Heiko Paulheim, “Semantic Web in data mining and knowledge discovery: A comprehensive survey”, ELSEVIER, Vol. 36, pp. 1-22,2016.
[11] Venkata Subba Reddy Poli, “Fuzzy data mining and web intelligence”, IEEE, 2016.
[12] Zoltán Balogh, “Data-mining behavioural data from the web”, IEEE, Vol.1, pp. 122-127, 2016.
[13] Suvarn Sharma, Amit Bhagat, “Data preprocessing algorithm for Web Structure Mining”, IEEE, pp. 94-98, 2016.
[14] Wang Lei , Liu Chong, “Implementation and Application of Web Data Mining Based on Cloud Computing”, IEEE, 2016.
[15] D. Bavarva Bhaskar , Dheeraj Kumar Singh, “Multimedia questions and answering using web data mining”, IEEE, 2015.
[16] Ying Han , Kejian Xia, “Data Preprocessing Method Based on User Characteristic of Interests for Web Log Mining”, IEEE, 2014.
[17] Quang yang, “10 Challenging problems in Data Mining research”, World Scientific, Vol. 5, No. 4, pp 597-604, 2006.
[18] L. Habin, K. Vlado, “Combining mining of web server logs and web content for classifying users’ navigation pattern and predicting users future request”, J. Data Knowledge Eng., Vol. 61, pp. 304–330, 2014.
[19] Dhanashree S. medhekar, “Heart Disease prediction System using Naïve Bayes”, IJERSTE, Vol. 2, No. 3, pp. 1-5, 2013.
[20] Arno J. Knobbe, “Multi-Relational Data Mining”, SIKS, pp 1-130, 2015.
[21] F.O. Isinkaye, Y.O. Folajimi, B.A. Ojokoh, “Recommendation Systems: Principles, methods and evaluation” ELSEVIER, Vol. 16, pp. 261-273, 2015.
[22] K.Reka, T.N.Ravi, "Hybrid Recommender Systems: Process, Challenges, Approaches and Metrics", International Journal of Computer Sciences and Engineering, Vol. 6, No. 5, pp. 1024-1033, 2018.
[23] S.N. Patil, S.M. Deshpande, Amol D. Potgantwar, "Product Recommendation using Multiple Filtering Mechanisms on Apache Spark", International Journal of Scientific Research in Network Security and Communication, Vol. 5, No. 3, pp. 76-83, 2017
Citation
Hutashan Vishal Bhagat, Shashi Bhushan, Sachin Majithia, "Consummate Approach for Classification and Pattern Matching for a Web usage based Recommendation System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.826-830, 2018.