Index of Kumbakonam Using Top-K Query Retrieval Algorithm
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.157-159, Feb-2019
Abstract
Top-k denotes to the method which only returns the top K most important objects according to a given ranking function. To tackle the limitations of the existing Top-k query, we proposed a modified Top-k query algorithm. In this algorithm, we select the data elements which have higher ranking scores on each attribute, and then run a threshold controlling scheme on these data elements.This system reduces the manual and paper work. This proposed system will help the user to know the exact information and details of the facility that they are finding. This system is very much useful for all users. In the proposed system, the user can see the information’s of the facilities that are available in the various areas. The user can also see the top ten facilities that are available. And it is used to book travels ticket. And it’s contain the search button and corresponding textbox to search the particular information when the user click the search button it will be redirect to the related pages. The admin can add the additional information about the indexes of Kumbakonam. This system provides the addresses and information of the various facilities.
Key-Words / Index Term
Massive data retrieval, Top-k query, I/O debugging, Accuracy
References
[1] Vega J., Murari A., Pereira A., Portas A., Ratta G. A., Castro R., Overview of intelligent data retrieval methods for waveforms and images in massive fusion databases, Fusion Engineering and Design, 2009, 84(7-11): 1916-1919.
[2] Vega J., Pereira, A., Portas A., et al., Data mining technique for fast retrieval of similar waveforms in Fusion massive databases, Fusion Engineering and Design, 2008, 83(1): 132-139.
[3] Czyzewski A., Bratoszewski P., Ciarkowski A., et al., Massive surveillance data processing with supercomputing cluster, Information Sciences, 2015, 296: 322-344.
[4] Neff Lucas P., Cannon Jeremy W., Morrison Jonathan J., Edwards Mary J., Spinella Philip C., Borgman Matthew A., Clearly defining pediatric massive transfusion: Cutting through the fog and friction with combat data, Journal of Trauma and Acute Care Surgery, 2015, 78(1): 22-28.
[5] Khan Mukhtaj, Ashton Phillip M., Li Maozhen, Taylor, Gareth A., PisicaIoana, Liu Junyong, Parallel Detrended Fluctuation Analysis for Fast Event Detection on Massive PMU Data, IEEE Transactions on Smart Grid, 2015, 6(1): 360-368.
[6] Wang Debby D., Zhou Weiqiang, Yan Hong, Mining of proteinprotein interfacial residues from massive protein sequential and spatial data, Fuzzy Sets and Systems, 2015, 258: 101-116.
[7] Fang Cheng, Liu Jun, Lei Zhenming, Parallelized User Clicks Recognition from Massive HTTP Data Based on Dependency Graph Model, China Communications, 2014, 11(12): 13-25.
[8] Yu Ce, Wang Runtao, Xiao Jian, Sun Jizhou, High Performance Indexing for Massive Audio Fingerprint Data, IEEE Transactions on Consumer Electronics, 2014, 6(4): 690-695.
[9] Gog Simon, Petri Matthias, Optimized succinct data structures for massive data, Software-practice & Experience, 2014, 44(11): 1287-1314.
[10] Liu Dexi, Novel Semantics of the Top-k Queries on Uncertainly Fused Multi-Sensory, Journal of Information Science and Engineering, 2015, 31(1): 179-205.
[11] Guo Long, Shao Jie, AungHtooHtet, Tan Kian-Lee, Efficient continuous top-k spatial keyword queries on road networks, GEOINFORMATICA, 2015, 19(1): 29-60.
[12] DimitriouAggeliki, Theodoratos Dimitri, Sellis, Timos, Top-k-size keyword search on tree structured data, Information Systems, 2015, 47: 178-193.
[13] Rahul Saladi, Janardan Ravi, A General Technique for Top-k Geometric Intersection Query Problems, IEEE Transactions on Knowledge and Data Engineering, 2014, 26(12): 2859-2871.
[14] Zou Lei Chen Lei, Pareto-based dominant graph: An efficient indexing structure to answer top-K queries, IEEE Transactions on Knowledge and Data Engineering, 2011, 23(5): 727-741.
[15] DeNavas-Walt Carmen, Proctor Bernadette D, Smith Jessica C, US Census Bureau, current population reports, Income, poverty, and health insurance coverage in the United States, 2008, 60-236.
Citation
M. Nagalakshmi, M. Vaishnavi, "Index of Kumbakonam Using Top-K Query Retrieval Algorithm", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.157-159, 2019.
Data Transmission Issues in Business while using CC – A Survey
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.160-161, Feb-2019
Abstract
Cloud Computing is a huge storage domain by which everyone can access the functions and utilities through the Internet, irrespective of the locations without any difficulties in maintenance and management. Security is a vital aspect in any business to sustain in the digitalized world forever. Cloud computing also enhances in the transfer of data without any deviations. The major security issues like breaches, inadequate access management, specter and meltdown, loss and DOS attacks of all business oriented data.
Key-Words / Index Term
Cloud Computing, Security, Types, Business Terms
References
[1] Manoj Chopra, Jai Mungi, Kulbhushan Chopra, “A Survey on Use of Cloud Computing in various Fields”, International Journal of Science, Engineering and Technology Research, Volume 2, Issue 2, February 2013.
[2]National Seminar on “Cloud Computing and its Applications”, Organised by School Engineering Sciences and Technology (SEST), JamiaHamdrad, New Delhi, IJARCS, Special Issue Volume 8 Issue 2, March 2017.
[3]G. Kiryakova, N. Angelova, L. Yordanova, “Application of Cloud Computing Services In Business”, Trakia Journal of Sciences, Volume 13, Suppl. 1, pp 392 – 396, 2015.
[4] Briefly discuss the limitations of the research and Future Scope for improvement.
Citation
A. Fairosebanu, A. NishaJebaseeli, "Data Transmission Issues in Business while using CC – A Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.160-161, 2019.
A Survey on Earth Quakes Prediction Techniques with Clustering Methods
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.162-166, Feb-2019
Abstract
The field of data mining has evolved from its roots in databases, statistics, artificial intelligence, information theory and algorithms into a core set of techniques that have been applied to a range of problems. Computational simulation and data acquisition in scientific and engineering domains have made tremendous progress over the past two decades. A mix of advanced algorithms, exponentially increasing computing power and accurate sensing and measurement devices have resulted in more data repositories. Advanced technologies in networks have enabled the communication of large volumes of data across the world.This paper aims at further data mining study on scientific data. This paper highlights the data mining techniques applied to mine for surface changes over time (e.g. Earthquake rupture). The data mining techniques help researchers to predict the changes in the intensity of volcanos. This paper uses predictive statistical models that can be applied to areas such as seismic activity , the spreading of fire. The basic problem in this class of systems is unobservable dynamics with respect to earthquakes. The space-time patterns associated with time, location and magnitude of the sudden events from the force threshold are observable. This paper highlights the observable space time earthquake patterns from unobservable dynamics using data mining techniques, pattern recognition and ensemble forecasting. Thus this paper gives insight on how data mining can be applied in finding the consequences of earthquakes and hence alerting thepublic.
Key-Words / Index Term
Earthquake, data mining techniques, space-time patterns
References
[1]. W.Dzwinel et al Non multidimensional scaling and visualization of earth quake cluster over space and feature space, nonlinear processes in geophysics 12[2005]pp1-12.
[2]. C.Lomnitz.FundamentalsofEarthquakeprediction[1994].
[3]. B.Gutenberg& C.H. Richtro, Earthquake magnitude, intensity, energy & acceleration bulseismsoc. Am 36, 105-145 [1996].
[4]. C.Brunk, J.Kelly&Rkohai “MinesetAn integrate system for Visual Data Mining” 1997.
[5]. MAdFraud: Investigating Ad Fraud in Android Applications.
[6]. Mining Personal Context-Aware Preferences for Mobile Users.
[7]. A Flexible Generative Model for Preference Aggregation.
[8]. D. M. Blei, A. Y. Ng, and M. I. Jordan. Lantentdirichlet allocation.Journal of Machine Learning Research, pages 993– 1022, 2003.
[9]. Y. Ge, H. Xiong, C. Liu, and Z.-H. Zhou. A taxi driving fraud detection system. In Proceedings of the 2011 IEEE 11th International Conference Neural Networks, ICNN ’11, pages 181–190, 2011.
[10]. N. Spirin and J. Han, “Survey on webspam detection: Principles and algorithms,” SIGKDD Explor. Newslett., vol. 13, no. 2, pp. 50–64,May2012.
[11]. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw, “Detecting product review spammers using rating behaviors,” in Proc.19thACMInt. Conf. Inform. Knowl.Manage., 2010, pp. 939–948.
[12]. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik,
[13]. “Scalable and efficient provable data possession,” in Proc.SecureComm, 2008, Art. ID 9.C. C. Erway, A. Küpçü, C. Papamanthou, and R.Tamassia, “Dynamic provable data possession,” in Proc. CCS,2009, pp. 213–222.
[14]. E. Esiner, A. Küpçü, and Ö. Özkasap, “Analysis and optimization on FlexDPDP: A practical solution for dynamic provable data possession,” Intelligent Cloud Computing(Lecture Notes in Computer Science), vol. 8993. Berlin, Germany: Springer-Verlag, 2014, pp. 65–83.
[15]. E. Zhou and Z. Li, “An improved remote data possession checking protocol in cloud storage,” in Algorithms andArchitectures for Parallel Processing (Lecture Notes ),105- 110.
[16] Opinion spam and analysis. In Proceedings of the 2008 International Conference on Web Search and Networking, WSDM ’08, pages 219–230, 2008.
Citation
A. Mary Subashini, "A Survey on Earth Quakes Prediction Techniques with Clustering Methods", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.162-166, 2019.
A Brief Survey on Intrusion Detection System in Network Communication
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.167-172, Feb-2019
Abstract
Network Security is assuming an imperative job in a wide range of systems. These days the system is actualized in all spots like workplaces, schools, banks and so on and every one of the people are participating in informal community media. Despite the fact that numerous sorts of system security frameworks are being used, the helpless exercises are occurring occasionally. This research exhibits a study about different sorts of system attacks for the most part web attack, and distinctive Intrusion Detection System which are being used. This may clear a way to outline another sort of Intrusion Detection System which may shield the system framework from different kinds of system attack. Essentially Intrusion Detection Systems is been utilized based on two major methodologies first the acknowledgment of odd exercises as it by and large happens on the abandons normal or abnormal conduct and second abuse location by watching unapproved "marks" of those perceived vindictive attacks and grouping vulnerabilities. Oddity or the unknown (conduct based) Intrusion Detection Systems assume the distinction of ordinary conduct underneath assaults and accomplish anomalous exercises assessed and perceived with predefined framework or client conduct reference show. Our novel approach will mainly focus on detect the intrusion in network communication and provide a security.
Key-Words / Index Term
Network security, Intrusion detection system, Classification
References
[1] C Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing” www.ietf.org-RFC3561, 2003, pp 01-31.
[2] Dr. S. Vijayarani & Ms. Maria S.S., “Intrusion Detection System- A Study”, IJSPTM Vol4, No1, February 2015, pp 31-44.
[3] Ehsan Amiri, Hassan K, H Heidari, E. Mohamadi, Hossein M., “Intrusion Detection System in MANET: A Review”, Procedia- Social and Behavioral Sciences 129(2014), ELSEVIER, ScienceDirect, pp 453-459.
[4] Ming-Yang Su, Gwo-Jong, YuChun-Yuen Lin, “A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach” Computer & Security, ElLSEVIER, Volume 28, Issue 5, July 2009, Pages 301–309.
[5] Roman Fekolkin, “Intrusion Detection & Prevention System: Overview of Snort & Suricata” Internet Security, A7011N, Lulea University of Technology, Jan 06, 2015 pp 1-4.
[6] S. Mukkamala, G. Janoski, and A. Sung “Intrusion detection using neural networks and support vector machines,” International Joint Conference on Neural Networks (IJCNN). vol. 2: IEEE, 2002, pp. 1702- 1707.
[7] Ved Prakash Mishra & Balvinder Shukla, “Process Mining in Intrusion Detection – The need of current digital world”, Springer Nature Singapore Pte Ltd. 2017: CCIS 712, pp. 238–246, 2017.
[8] R. Fekolkin, “Intrusion Detection & Prevention System: Overview of Snort & Suricata, Internet Security”, A7011N, Lulea University of Technology, Jan 06, 2015 pp 1-4.
[9] Md. Mostaque & M Hassan, “Current studies on Intrusion Detection System”, Genetic algorithm and Fuzzy logic, International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.2.2013 pp. 35 -47.
[10] R.P.J.C Bose, W.M. P Van der Aalst, I, Žliobait˙e, & M Pechenizkiy, “Dealing with Concept Drifts in Process Mining”, IEEE Transactions on Neural Networks and Learning Systems, Vol. 25, No. 1, 2014 pp. 154 – 171.
[11] M.Y. Su, G Jong, Y Chun, & Y Lin, “A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach”, Computer & Security, ELSEVIER, Volume 28, Issue 5, 2009, pp 301–309.
[12] V P Mishra, Yogesh Waran, Subheshree, “Detecting Attacks Using Big Data with Process Mining”, International Journal of System Modeling and Simulation, v. 2, n. 2, June 2017, p. 5-7.
[13] Hussein, Safwan Mawlood, Fakariah Hani Mohd Ali, and Zolidah Kasiran. “Evaluation effectiveness of hybrid IDS using snort with naïve Bayes to detect attacks.” Digital Information and Communication Technology and it`s Applications (DiCTA?). 2012 Second international Conference on. IEEE, 2012.
[14]
[15] Marin, Jack, Daniel Ragsdale, and 1. Sirdu. “A hybrid approach to the profile creation and intrusion detection.” DARPA information Survivability Conference & Exposition ii, 2001.
[16] Aydin, M. Ali, A. Halim Zaim, and K. Gokhan Ceylan. “A hybrid intrusion detection system design for computer network security.” Computers & Electrical Engineering 35.3 (2009): 517-526.
[17] Arnza, Cristina, Catalin Leordeanu, and Valentin Cristea. "Hybrid network intrusion detection." Intelligent Computer Communication and Processing (ICCP), 2011 iEEE International Conference on. IEEE, 2011.
[18] Northcutt, Stephen. Snort: IDS and IPS toolkit. Eds. Jay Beale, and Toby Kohlenberg. Syngress Press, 2007.
[19] AI-mamory, Safaa, and Firas S. Jassim. "Evaluation of Different Data Mining Algorithms with KDD CUP 99 Data Set." Journal of Babylon University/Pure and Applied Sciences 21.8 (2013): 2663-2681.
[20] Shanmugavadivu, R., and N. Nagarajan. "Network intrusion detection system using fuzzy logic." Indian Journal of Computer Science and Engineering (JJCSE) 2.1 (2011): 10 I-Ill.
[21] Hochberg, Judith, et al. "NADIR: An automated system for detecting network intrusion and misuse." Computers & Security 12.3 (1993): 235- 248.
[22] Teng, Shaohua, et al. "A cooperative network intrusion detection based on fuzzy SVMs." Journal of Networks 5.4 (2010): 475-483.
[23] Mining, Data, I. Han, and M. Kamber. "Data mining concepts and techniques." Morgan Kaujinann (2006).
[24] IIgun, Koral, Richard A. Kemmerer, and Phillip A. Porras. "State transition analysis: A rule-based intrusion detection approach." iEEE transactions on software engineering 21.3 (1995): 181-199.
IIgun, Koral. "USTAT: A real-time intrusion detection system for UNIX." Research in Security and Privacy, 1993. Proceedings. , 1993 IEEE Computer Society Symposium on. IEEE, 1993.
Citation
M. Jeyakarthic, A. Thirumalairaj, "A Brief Survey on Intrusion Detection System in Network Communication", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.167-172, 2019.
A Survey on Security Threats in Cloud Computing
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.173-176, Feb-2019
Abstract
Cloud computing, also referred to as ‘on demand computing’, is a recent concept making waves in the IT industry. When compared to other specific, dedicated infrastructures in computing, cloud concept gives the advantage of reliability, quantifiability, cost- effectiveness and improved performance. It is easy and convenient to have network access to other shared configurable computing resources using this concept. Another advantage of the concept is that the resources can be utilized with increasing efficiency and minimum overhead efforts. Clouds can be used for services, solutions, and applications and also for storing large amount of data in different locations. Data is stored over a set of resources which are networked so that the data can be accessed through any other virtual system. The security and privacy issues associated with data management is reduced considerably using the cloud computing facility as the data centers are literally beyond the reach and control of users. Further, server breakdowns which normally affect data storage and use does not seem to affect the user in cloud computing. But this system has its own set of disadvantages. This work is an attempt discuss in detail cloud computing, its types and Network/security issues related to it. Networks structure faces some attacks that are denial off service attack, man in the middle attack, network sniffing, port scanning, SQL injection attack, cross site scripting. Security Issues that occur in Cloud Computing are XML signature element wrapping, Browser security, cloud malware injection attack, flooding attacks, data protection, insecure or incomplete data deletion, locks in.
Key-Words / Index Term
Cloud Computing, Data Integrity, Data storage, Security, Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Interoperability, Denial of Service (DoS).
References
[1]. R. Maggiani, Communication Consultant, Solari Communication, “Cloud Computing is Changing How we Communicate,” 2009 IEEE International Professional Conference, IPCC, pp. 1-4, Waikiki, HI, USA, July 19- 22,2009. ISBN: 978-1-4244-4357-4.
[2]. Harold C. Lin, Shivnath Babu, Jeffrey S. Chase, Sujay S. Parekh, “Automated Control in Cloud Computing: Opportunities and Challenges”, Proc. of the 1st Workshop on Automated control for data centers and clouds, New York, NY, USA, pp. 13-18, 2009, ISBN: 978-1-60558-585-7.
[3]. Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacon, “On technical Security Issues in Cloud Computing,” Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009.
[4] R. L Grossman, “The Case for Cloud Computing,” IT Professional, vol. 11(2), pp. 23-27, 2009, ISSN: 1520-9202.
[5].Foster, I., & Kesselman, C. (1998). The Grid: Blueprint for a New Computing Infrastructure (The Elsevier Series in Grid Computing). Morgan Kaufmann
[6] Han Y (2010). On the clouds: a new way of computing. Inf Technol Libr, Vol. 29 No. 2, pp: 87- 92.
[7]. Iyer B, Henderson JC (2010). Preparing for the future: understanding the seven capabilities of cloud computing. MIS Q Exec; Vol. 9 No. 2, pp: 117-131.
[8]. Jamil, D, & Zaki, H. (2011a). cloud computing security. International Journal of Engineering Science and Technology (IJEST) , Vol.3 No.4, 3478-3483.
[9]. Jamil, D., & Zaki, H. (2011b). SECURITY ISSUES IN CLOUD COMPUTING AND
COUNTER MEASURES. International Journal of Engineering Science and Technology (IJEST) , Vol. 3 No. 4, 2672-2676.
[10]. Jensen, M. (2009, September). On Technical Security Issues in Cloud Computing. IEEE International Conference in Cloud Conouting , 109- 116.
[11]. Lohr, S. (2007, October 8). Google and I.B.M. Join in „Cloud Computing‟ Research. Retrieved 1 28, 2012, from The Newyork Times: http://www.nytimes.com/2007/10/08/technology/08cl oud.html
[12]. Mell P, Grance T (2010). The NIST definition of cloud computing. Commun ACM; Vol. 53 No. 6, pp:50.
[13]. NAONE, E ( 2007, September 18). Computer in the Cloud. Retirived 1 24, 2012, from Technology Review, MIT: http://www.technologyreview.com/printerfriendlyar ticle.aspx?id=19397
[14]. Peter Mell and Tim Grance, (2009)The NIST Definition of Cloud Computing, version 15, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov)
[15]. RALEIGH, NC & ARMONK, NY (2007, May 7). North Carolina State University and IBM help bridge digital Divide in North Carolina and beyond. Retrived 1 27, 2012,from IBM:ttp://www‐ 03.ibm.com/press/us/en/ press release /21506.wss
[16]. REIMER, J (2007, April 8). Dreaming in the “Cloud” with the XIOS web operating system. Retrived 1 24,2012, from are technical: http://arstechnica.com/news.ars/post/20070408‐ d reaming‐ in‐ the‐ cloud‐ with‐ thexios‐ web‐ oper ating ‐ system.html
[17]. Ren, K., & Lou, W. (2009). Ensuring Data Storage Security in Cloud Computing. Retrieved from http://www.ece.iit.edu/~ubisec/IWQoS09.pdf
[18]. Scarfone K, S. A. (2007). Guide to Secure Web Services. Retrievedfrom http://csrc.nist.gov/publications/nistpubs/800-95/ SP800- 95 .pdf
[19] Services, A. W. (2009, April). Amazon Virtual private Cloud. Retrieved from http://aws.amazon.com/vpc/
[20] Vaquero LM, Rodero-Merino L, Caceres J, Lindner M (2009). A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput Commun, Vol. 39 No. 1, pp:50-55.
[21].View, M. Calif & Armonk. (2007, October 8). Google and IBM Announced University Initiative to Address Internet-Scale Computing Challenges. Retrieved 1 28, 2012, from IBM: http://www- 03.ibm.com/press/us/en/pressrelease/22414.wss
[22].View, M. Calif & Armonk. (2007, October 8). Google and IBM Announced University Initiative to Address Internet-Scale Computing Challenges. Retrieved 1 28, 2012, from IBM: http://www- 03.ibm.com/press/us/en/pressrelease/22414.wss
[23]Vouk, M. (2008). Cloud Computing-Issues, Research and Implication. "Journal of Computing and Information Technology - CIT" , Vol. 16 No.4, pp. 235–246. [24]Wikipedia (2012a, January 26). Amazon Elastic Compute Cloud Retrived 1 27, 2012, from Wikimedia Foundation Inc. http://en.wikipedia.org/wiki/Amazon_Elastic_Compute Cloud.
[25].Wikipedia (2012b, January 27). Cloud Computing Retrieved 1 28, 2012, from Wikimedia Foundation Inc. http://en.wikipedia.org/wiki/Cloud_computing
[26].Yang, A. (2003). Guide to XML Web Services Security. Retrieved from http://www.cgisecurity.com/ws/WestbridgeGuideTo WebServicesSecurity.pdf[27]. Zurich.Catteddu, D. (2010). Cloud Computing. Retrieved from http://www.enisa.europa.eu/act/rm/files/ deliverables/ cloud‐ computingrisk‐ assessment
[27]. Zurich.Catteddu, D. (2010). Cloud Computing. Retrieved fromhttp://www.enisa.europa.eu/act/rm/files/ deliverables/ cloud‐ computingrisk‐ assessment
Citation
P. Anusha, R. Maruthi, "A Survey on Security Threats in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.173-176, 2019.
A Review of Datamining Techniques in Internet of Things
Review Paper | Journal Paper
Vol.07 , Issue.04 , pp.177-180, Feb-2019
Abstract
We are entering in a new era of computing technology i.e Internet of Things(IoT). IoT is a network in which all physical objects are connected to the internet through network devices or routers and exchange data. IoT allows objects to be controlled remotely across existing network infrastructure. This technique also has autonomous control feature by which any device can control without any human interaction. The enormous amount of data produced by IoT devices can be converted into knowledge using data mining techniques. Data mining will play important role in constructing smart system that provides convenient services. It is required to extract data and knowledge from the connected things. For this purpose, various data mining techniques are used. Various algorithms such as classification, clustering, association rule etc. helps to mine data. This paper represents the different Data mining techniques with IOT.
Key-Words / Index Term
Internet of Things, Data mining
References
[1] H. Jiawei, M. Kamber, Data mining: concepts and techniques, Morgan Kaufmann Publishers, 2011.
[2] Feng Chen, Pan Deng, Jiafu Wan, Daqiang Zhang, Athanasios V. Vasilakos, and XiaohuiRong, “Data Mining for the Internet of Things: Literature Review and Challenges”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, 2015.
[3] Shweta Bhatia, Sweety Patel, “Analysis on different Data mining Techniques and algorithms used in IOT”, International Journal of Engineering Research and Applications, November 2015.
[4] Chun-Wei Tsai, Chin-Feng Lai, Ming-Chao Chiang, And Laurence T. Yang, “Data Mining For Internet Of Things: A Survey”, Ieee Communications Surveys & Tutorials, Vol. 16, 2014.
[5] AsmitaGorave, VrushaliKulkarni, “Discrimination Aware Data Mining In Internet Of Things”, Ijca, 0975 – 8887, Volume 159, February 2017.
[6] KrushikaTapedia, AnuragManoharWagh, “Data Mining For Various Internets Of Things Applications”, Ijrat, E-Issn: 2321-9637, Ncpci-2016.
[7] S. Haller, S. Karnouskos, and C. Schroth, “The Internet of Things in an enterprise context,” Future Internet Systems (FIS), LCNS, vol. 5468. Springer, 2008, pp. 14-8.
Citation
G. Saranya, M. Subashini, "A Review of Datamining Techniques in Internet of Things", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.177-180, 2019.
Hybrid Semantic Ontology Data (HSOD) Analysis Algorithm for Heterogeneous Tourism Information
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.181-183, Feb-2019
Abstract
This technique is an ontology-based approach and a formal concept analysis (FCA) approach to integrating heterogeneous tourism information for online tour planning. Two ontologies, ontology for tourists and ontology for tourism information providers, are developed with respect to their own perspective. The ontology for tourists is developed from the tourism literature. The ontology for tourism information providers is developed by integrating heterogeneous online tourism information using a FCA approach. This HSOD Hybrid Semantic Ontology Data (HSOD) Analysis is then mapped using the FCA and Bayesian analysis to evaluate tourists` preferences against information published by tourism information providers. An example of planning a tour to Thanjvaur, Trichy is used to illustrate the proposed ontology approach. An analytic hierarchy process is used to rank the tourism attractions suggested by the ontology and FCA based approaches.
Key-Words / Index Term
Ontology design, tourism, recommender system, formal concept analysis
References
[1]. Anderson, B. & Langmeyer, L., 1982. The under 50 and over 50 travelers: a profile of similarities and differences. Journal of Travel Research, 20(4), 20-24.
[2]. Anderson, D.H., 1981. The effect of user experience on displacement. In: J.W. Frasier and B.M. Epstein, eds. Proceedings of Applied Geography Conferences,vol. 4. Tempe, AZ, 272-278.
[3]. Nyaupane, G.P., 2004. Nauture tourism constraints: a cross-activity comparison. Annals of Tourism Research, 31(3), 540-555.
[4]. Ryan, C. & Huyton, J., 2000. Who is interested in aboriginal tourism in the Northern Territory, Australia? A Cluster Analysis. Journal of Sustainable Tourism
[5]. Wickens,E.,2002.Thesacredandtheprofane:atourist typology. Annals of Tourism Research
[6]. Xie, P. & G. Wall, 2003 Authenticating visitor attractions based upon ethnicity.In: A. Fyall, A. Leask and B. Garrod, eds. Managing visitor attractions: new directions, Oxford, Butterworth Heineman
[7]. Ricci, F. & Werthner, H., (2002). Case-based querying for travel planning recommendation. Information Technology & Tourism
[8]. Ricci,F.,(2002).Travel recommendation systems. IEEE Intelligent Systems
[9]. Peng, Z.R., & Huang, R.H., (2000). Design and development ofinteractive trip planning for web-based transit information systems. TransportationResearch
[10]. Zografos, K.G., & Androutsopoulos, K.N., (2008). Algorithms for Itinerary Planning in Multimodal Transportation Networks. IEEE Transactions on Intelligent Transportation Systems.
Citation
S. Subhalakshmi, C. Premila Rosy, "Hybrid Semantic Ontology Data (HSOD) Analysis Algorithm for Heterogeneous Tourism Information", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.181-183, 2019.
A Study on Internet of Things(IoT)
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.184-186, Feb-2019
Abstract
Internet of Things is a new pattern which provides a set of new services for the next form of technological development. IOT in the sense, it is a “universal global neural network” in the cloud which connects various things. The form of communication that is either human-device, or human-human but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a future vision , IoT Architecture , Applications and its Challenges.
Key-Words / Index Term
Vision, Challenges, Applications, Architecture
References
[1] Y.Cao, W.Li, J.Zhang, ”Real-time traffic information collecting and monitoring system based on the internet of things,” in Pervasive Computing and Applications (ICPCA), 2011 6th International Conference,
[2] ”WISP” by Intel Labs; It can be accessed at: http://wisp.wikispaces.com
[3] Bob Violino, ”Top IT Vendors reveal their IOT strategies”. It can be accessed at: http://www.networkworld.com/article/2604766/internet-ofthings/top-it-vendors-reveal-their-iot-strategies.html
[4] Guicheng Shen and Bingwu Liu, ”The visions, technologies, applications and security issues of Internet of Things,” in E -Business and E -Government (ICEE)
[5] M.Aamir, Prof. X.Hong, A.A.Wagan, M.Tahir, M.Asif, ”Cloud Computing Security Challenges and their Compromised Attributes,” in International Journal of Scientific Engineering and Technology, Volume 3, Issue 4, pp. 395-399.
[6] P.Fuhrer, D.Guinard, ”Building a Smart Hospital using RFID technologies,”
[7] L.Xiao, Z.Wang, ”Internet of Things: A New Application for Intelligent Traffic Monitoring System,” in JOURNAL OF NETWORKS, 2011
[8] Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, ”Security in the Internet of Things: A Review,” in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648-651
Citation
N.S. Sanguida, M. Sasikala, "A Study on Internet of Things(IoT)", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.184-186, 2019.
User Web Access Record Mining for Business Intelligence
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.187-189, Feb-2019
Abstract
User’s access records are captured by implementing a data mining algorithm on the website. User mostly browses those products in which he is interested. This system will capture user’s browsing pattern using data mining algorithm. This system is a web application where user can view various resources on the website. User will register their profile in an exchange of a password. User will get user ID and password in order to access the system. Once the user login’s to the system user will gain access to certain resources on the website. The links to the resources on the website have been modified such that a record of information about the access would be recorded in the database when clicked. This way, data mining can be performed on a relatively clean set of access records about the users. When user clicks on certain resources on the website his access records will be captured by the system this can be achieved with the help of data mining algorithm used in this system. By using this application, product based organization will get to know the demand for certain products. This system will help organization to target right consumers. This system will help product based firms to maintain good customer relationship. Hence, a good deal of business intelligence about the users’ behavior’s, preferences and about the popularities of the resources (products) on the website can be gained.
Key-Words / Index Term
User Access Record, Good Customer Relationship, Web Mining, User Behavior, Web Logs
References
[1]. Abraham, A (2001). Neuro-fuzzy systems: State-of-the- art modeling techniques, connectionist models of neurons, learning processes, and arti_cial intelligence. In Lecture Notes in Computer Science 2084, J Mira and APrieto (eds.), Germany, Spain: Springer-Verlag, pp. 269-276.
[2]. Cord_on, O, F Herrera, F Ho_mann and L Magdalena (2001). Genetic Fuzzy Systems: Evolutionary Tuning and Learning of Fuzzy Knowledge Bases. Singapore: World Scienti_c Publishing Company.
[3]. Hall, LO, IB Ozyurt and JC Bezdek (1999). Clustering with a genetically optimized approach. IEEE Transactions on Evolutionary Computation, 3(2), 103-112.
[4]. Pal, SK, V Talwar and P Mitra (2002). Web mining in soft computing framework: Relevance, state of the art and future directions. IEEE Transactions on Neural Networks, Vol. 13, No. 5, pp. 1163-1177.
[5]. Paliouras, G, C Papatheodorou, V Karkaletsisi and CD Spyropoulous (2000). Clustering the users of large websites into communities. In Proc. of the 17th International Conference on Machine Learning (ICML`00), pp. 719-726. USA: Morgan Kaufmann.
[6]. Pazzani, M and D Billsus (1997). Learning and revising user pro_les: The identi_cation of interesting web sites. Machine Learning, 27, 313-331.
[7]. Spiliopoulou, M and LC Faulstich (1999). WUM: A web utilization miner. In Proc. of EDBT Workshop on the Web and Data Bases (WebDB`98), pp. 109-115. Springer Verlag.
[8]. Srivastava, J, R Cooley,MDeshpande and PN Tan (2000). Web usage mining: Discovery and applications of usage patterns from web data SIGKDD Explorations, 1(2), 12-23.
[9]. Wang, X, A Abraham and KA Smith (2002). Soft computing paradigms for web access pattern analysis. In Proc.of the 1st International Conference on Fuzzy Systems and Knowledge Discovery, pp. 631-635.
[10]. Yang, Q and HH Zhang (2003). Web-log mining for predictive web caching. IEEE Transactions on Knowledge and Data Engineering, Vol. 15, No. 4, pp. 1050-1053.
Citation
D. Kamalavadhanai, N. Aarthi, "User Web Access Record Mining for Business Intelligence", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.187-189, 2019.
A Study of WSN Based Application Using RFID
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.190-192, Feb-2019
Abstract
WSN, which aims to exchange data wirelessly in a short distance using short-wavelength radio transmissions, is providing a necessary technology to create convenience, intelligence and controllability. Using RIFD technique to sense and monitoring the environment. Integrating RIFD with WSN not only provides identity and location of an object but also provides the information regarding the condition of the object carrying the sensors enabled RIFD tag. This paper discuss about the RIFD technology, which are used by the WSN through Zigbee device such as in Agriculture, Home Appliances and Health Care Monitoring. These applications are used for managing the user’s time and cost and also reduced human resources and improve productivity.
Key-Words / Index Term
WSN, RIFD Applications, Zigbee, Arduino
References
[1] L.Radha Alias Naga; akshmi,”Deployment of RFID at Indian academic libraries”, International journal of Library and Information Science Vol.3 (2), pp.34-37.
[2] Victor Shnayder, Bor-rong Chen, Konard Lorincz, Thaddeus R.F. Fulford-Jones, and matt welsh. “Sensor Networks for medical care”, Hardware University Technical report TR-08-05, April 2005.
[3] F. Chiesa, F. Luzi, M. Crivella, The electronic identification of animals: regulation and application aspects, Minutes of the Conference “Let’s talk about new regulations in the field of animal breeding”, Cuneo 23-24 October 2004.
[4] M. Patil, S.R.N. Reddy, “Comparative Analysis of RFID and Wireless Home/Office Automation”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-3, Issue-3, July 2013.
[5] Yu, W.D., Ramni, A., "Design and implementation of a personal mobile medical assistant", HEALTHCOM2005, 23-25, June 2005.
Citation
J.P. Keerthana, R. Chithirai Selvi, "A Study of WSN Based Application Using RFID", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.190-192, 2019.