OCCASIONAL ITEMSET MINING BASED ON THE WEIGHT
|
|
- Lucas Smith
- 5 years ago
- Views:
Transcription
1 OCCASIONAL ITEMSET MINING BASED ON THE WEIGHT 1 K. JAYAKALEESHWARI, 2 M. VARGHESE 1 P.G Student, M.E Computer Science And Engineering, Infant Jesus College of Engineering and Technology,Thoothukudi ,Tamilnadu, India 2 Prof. Dept of Computer Science And Engineering, Infant Jesus College of Engineering and Technology,Thoothukudi ,Tamilnadu, India ABSTRACT Continuous weighted itemsets speak to associations frequently holding in information in which things may weight distinctively. Nonetheless, in a few settings, e.g., when the necessity is to minimize a certain expense capacity, uncovering extraordinary information relationships is more intriguing than mining successive ones. This paper handles the issue of running across extraordinary and weighted itemsets, i.e., the Infrequent Weighted Itemset (IWI) mining issue. Two novel quality measures are proposed to drive the IWI mining procedure. Besides, two calculations that perform IWI and Negligible IWI mining efficiently, determined by the proposed measures, are displayed. Test outcomes show efficiency and adequacy of the proposed methodology. INDEX TERM: Clustering, classification, and association rules, Data mining 1. INTRODUCTION Itemset mining is an exploratory information mining system generally utilized for uncovering profitable connections among information. The main endeavor to perform itemset mining was concentrated on uncovering successive itemsets, i.e., designs whose watched recurrence of event in the source information (the help) is over a given edge. Incessant itemsets discover provision in various genuine connections (e.g., market wicker container dissection, medicinal picture handling, and biotic information investigation). In any case, numerous customary methodologies overlook the impact/enthusiasm of everything/transaction inside the investigated information. To permit treating things/transactions diversely focused around their significance in the INTERNATIONAL JOURNAL OF SCIENCE, ENGINEERING AND TECHNOLOGY- 158
2 incessant itemset mining process, the thought of weighted itemset has additionally been presented. A weight is connected with every information thing and portrays its neighborhood essentialness inside every transaction. As of late, the consideration of the exploration group has additionally been centered around the occasional itemset mining issue, i.e., uncovering itemsets whose recurrence of event in the investigated information is short of what or equivalent to a most extreme edge. For example, in calculations for finding insignificant occasional itemsets, i.e., rare itemsets that don't hold any occasional subset have been proposed. Occasional itemset finding is material to information hailing from distinctive genuine provision connections, for example, (i) measurable divulgence hazard evaluation from registration information and (ii) misrepresentation recognition. In any case, customary rare itemset mining calculations still experience the ill effects of their powerlessness to consider nearby thing interestingness throughout the mining stage. Indeed, from one viewpoint, itemset quality measures utilized within to drive the regular weighted itemset mining methodology are not specifically appropriate to fulfill the occasional weighted itemset mining undertaking viably, while, then again, state of thecraftsmanship rare itemset mineworkers are, to the best of our learning, unable to adapt to weighted information. Event weights are inferred from the weights connected with things in every transaction by applying a given expense capacity. Specifically, we center our consideration on two diverse IWI help measures: (i) The IWI help min measure, which depends on a base expense capacity, i.e., the event of an itemset in a given transaction is weighted by the weight of its slightest fascinating thing, (ii) The IWI help max measure, which depends on a greatest expense capacity, i.e., the event of an itemset in a given transaction is weighted by the weight of the most intriguing thing. 2. EXISTING SYSTEM Itemset mining is an exploratory information digging procedure generally utilized for uncovering profitable connections among information. The primary endeavor to perform itemset mining was centered on finding continuous thing sets. That is examples whose watched recurrence of event in the source information is over a given limit. To permit treating INTERNATIONAL JOURNAL OF SCIENCE, ENGINEERING AND TECHNOLOGY- 159
3 transactions contrastingly focused around their pertinence in the continuous itemset mining process, the thought of weighted itemset has likewise been presented. A weight is connected with every information thing and describes its nearby noteworthiness inside every transaction. The weaknesses has an incessant weighted thing set mining is not specifically material to achieve the rare weighted thing set. Time for doing the methodology is likewise high in view of the successive things. 3. PROPOSED SYSTEM The finding of occasional and weighted itemsets, i.e., the Infrequent Weighted Item sets from transactional weighted datasets. The IWI help measure is characterized as a weighted recurrence of event of an itemset in the broke down information. The IWI help min measure, which depends on a base expense capacity. That is the event of an itemset in a given transaction is weighted by the weight of its slightest fascinating thing. The IWI help max measure, which depends on a greatest expense capacity. That is the event of an itemset in a given transaction is weighted by the weight of the most intriguing thing. The favorable circumstances has an occasional thing set finding is pertinent to information originating from diverse genuine requisition settings, for example, (i) measurable divulgence hazard appraisal from enumeration information and (ii) misrepresentation location. Suitable for driving the choice of an advantageous subset of rare weighted information relationships. 4. DESIGN 4.1 ARCHITECTURE DIAGRAM Figure 1: System Architecture 4.2 ALGORITHMS The Infrequent Weighted Itemset Miner algorithm IWI Miner is a FP development like mining calculation that performs projection based itemset mining. Consequently, it performs the fundamental FP development mining steps: (a) Fptree creation and (b) recursive itemset mining from the FPtree file. Dissimilar to FP Growth, IWI INTERNATIONAL JOURNAL OF SCIENCE, ENGINEERING AND TECHNOLOGY- 160
4 Miner uncovers rare weighted itemsets rather than successive (unweighted) ones. To achieve this undertaking, the accompanying primary alterations regarding FP development have been presented: (i) A novel pruning system for pruning some piece of the inquiry space early and (ii) a somewhat adjusted FP tree structure, which permits putting away the IWI help worth connected with every hub. IWI mineworker calculation create the FP tree connected with the data weighted dataset T. At that point, the recursive mining procedure is conjured on the built FP tree. The FP tree is at first populated with the set of proportionate transactions created from T. For each one weighted transaction tq T the equal set is created by applying capacity equivalent transaction set, which actualizes the transactional dataset comparability conversion. At first, everything is joined together with the current prefix to create another itemset I. In the event that I is rare, then it is put away in the yield IWI set F. At that point, the FP tree anticipated as for I is produced and the IWIMining system is recursively connected on the anticipated tree to mine all occasional amplifications of I. Not at all like conventional FP Growth like calculations, has IWI Miner embraced an alternate pruning method The Minimal Infrequent Weighted Itemset Miner Algorithm Consequently, because of space obligations, the pseudo code is not reported. Notwithstanding, in the accompanying, the fundamental contrasts concerning IWI Miner are illustrated. The MIWIMining system is like IWIMining. Then again, since MIWI Miner concentrates on producing just insignificant occasional examples, the recursive extraction in the MIWIMining system is ceased when a rare itemset happens. Truth be told, at whatever point an occasional itemset I is ran across, all its amplifications are not insignificant. 5. IMPLEMENTATION 5.1. WEIGHTED TRANSACTIONAL DATASET The weighted transaction information set holds the transaction of the everything. The weight is then computed for everything in the transactional dataset. The weight implies the use of framework is considered as the weight. Utilizing this mining of the occasional thing is figure out. Let I={i1, i2,..., im} be a set of things. A weighted transactional dataset Tw is a situated of weighted INTERNATIONAL JOURNAL OF SCIENCE, ENGINEERING AND TECHNOLOGY- 161
5 transactions, where each one weighted transaction twq is a situated of weighted things _ik, wq k _ such that ik I and wq WEIGHTED TRANSACTION EQUIVALENCE Weighted transaction equivalence is utilized make acquaintanceship between weighted transaction dataset T and an identical dataset TE. Each one weighted transaction tq T compares to a proportional weighted transaction set. T be a weighted transactional dataset and TE its comparing identical dataset. TE of a weighted transactional dataset T is the union of all comparable transactional set 5.3. INFREQUENT WEIGHTED ITEM SET MINER The IWI Miner mining are the same by implementing either IWI help min or IWI help max edges. To lessen the many sided quality of the mining procedure, IWI Miner receives a FP tree hub. The IWI mining is likewise the part if the IWI mineworker calculation MINIMAL INFREQUENT WEIGHTED ITEM SET The insignificant rare weighted thing set is by the occasional weighted thing set mining. It additionally utilizes the rare weighted thing set mining and the occasional weighted thing set digger. The utilization of the rare weighted thing set mining in the occasional weighted thing set digger is diverse. 6. CONCLUSION The occasional itemset mining process confronts the issue of uncovering rare itemsets by utilizing weights for separating between significant things and not inside every transaction. Two Fpgrowth like calculations that finish IWI and MIWI mining productively are likewise proposed. The helpfulness of the uncovered examples has been accepted on information hailing from a genuine setting with the assistance of an area master. 7. FUTUREWORK As future work, plan to coordinate the proposed approach in a propelled choice making framework that backings space master's focused on activities focused around the qualities of the found IWIs. Besides, the requisition of diverse total capacities furthermore least and greatest will be contemplated. REFERENCE [1] J. M. Kleinberg, Authoritative sources in a hyperlinked environment, J. ACM, vol. 46, no. 5, pp , [2] C. K. Chui, B. Kao, and E. Hung, Mining frequent itemsets from INTERNATIONAL JOURNAL OF SCIENCE, ENGINEERING AND TECHNOLOGY- 162
6 uncertain data, in Proceedings of the 11th Pacific Asia conference on Advances in knowledge discovery and data mining, ser. PAKDD 07.Berlin, Heidelberg: Springer Verlag, 2007, pp [3] T. Bernecker, H. P. Kriegel, M. Renz, F. Verhein, and A. Zuefle, Probabilistic frequent itemset mining in uncertain databases, in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, ser. KDD 09. New York, NY, USA: ACM, 2009, pp [4] C. K. S. Leung, C. L. Carmichael, and B. Hao, Efficient mining of frequent patterns from uncertain data, in Proceedings of the Seventh IEEE International Conference on Data Mining Workshops, ser. ICDMW 07, 2007, pp [5] X. Wu, C. Zhang, and S. Zhang, Efficient mining of both positive and negative association rules, ACM Trans. Inf. Syst., vol. 22,no. 3, pp , [6] X. Dong, Z. Zheng, Z. Niu, and Q. Jia, Mining infrequent itemsets based on multiple level minimum supports, in Second International Conference on Innovative Computing, Information and Control, ICICIC 07, 2007, pp [7] A. Gupta, A. Mittal, and A. Bhattacharya, Minimally infrequent itemset mining using pattern growth paradigm and residual trees, in COMAD, 2011, pp [8] M. J. Elliot, A. M. Manning, and R. W. Ford, A computational algorithm for handling the special uniques problem, Int. J.Uncertain. Fuzziness Knowl. Based Syst., vol. 10, no. 5, pp ,2002. [9] IBM, IBM Quest Synthetic Data Generation Code, 2009.[Online]. Available: [10] A. Frank and A. Asuncion, UCI machine learning repository, [Online]. Available: INTERNATIONAL JOURNAL OF SCIENCE, ENGINEERING AND TECHNOLOGY- 163
AN ALTERNATIVE METHOD FOR ASSOCIATION RULES
AN ALTERNATIVE METHOD FOR ASSOCIATION RULES RECAP Mining Frequent Itemsets Itemset A collection of one or more items Example: {Milk, Bread, Diaper} k-itemset An itemset that contains k items Support (
More informationInternational Journal of Computer Techniques - Volume 2 Issue 5, Sep Oct 2015
RESEARCH ARTICLE Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm Karandeep Kaur*, Ms. Poonamdeep Kaur**, Ms. Lovepreet Kaur*** *(Student (Computer Science & Engineering), Guru
More informationAssociation Rule Mining. Entscheidungsunterstützungssysteme SS 18
Association Rule Mining Entscheidungsunterstützungssysteme SS 18 Frequent Pattern Analysis Frequent pattern: a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data
More informationM.S., Quantitative Finance, May 2009 Rutgers Business School - Newark and New Brunswick Rutgers, The State University of New Jersey, USA
Keli Xiao, Ph.D. Contact Information Research Interests Harriman Hall 346 Tel: (631) 762-4760 College of Business Fax: (631) 632-9412 Stony Brook University E-mail: Keli.Xiao@stonybrook.edu Stony Brook,
More informationEDUCATION EMPLOYMENT. 2009: Elected to Member of IBM Academy of Technology.
Jan 2018 CHIDANAND (Chid) APTE, Ph. D. Director, AI & Blockchain Solutions Industries Research IBM Research - T J Watson Research Center P. O. Box 218 Yorktown Heights, NY 10598 apte@us.ibm.com, +1-914-945-1024
More informationThe Analysis of Unified Software Engineering Reuse (USER) Using Stable Analytical Model, Design of Structure and Architectural Patterns
Journal of Electrical Engineering 5 (2017) 270-274 doi: 10.17265/2328-2223/2017.05.006 D DAVID PUBLISHING The Analysis of Unified Software Engineering Reuse (USER) Using Stable Analytical Model, Design
More informationACTIVITY LIGHT DETECTION FOR COLORBLIND PEOPLE Shima Ramesh 1, B.Sujesh Kumar 2
ACTIVITY LIGHT DETECTION FOR COLORBLIND PEOPLE Shima Ramesh 1, B.Sujesh Kumar 2 Abstract This paper proposed a calculation that recognizes activity light hues for partially blind people, the proposed calculation
More informationFrequent Itemset based Event Detection in Uncertain Sensor Networks
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Frequent Itemset based Event Detection in Uncertain Sensor
More informationI. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN:
A Friend Recommendation System based on Similarity Metric and Social Graphs Rashmi. J, Dr. Asha. T Department of Computer Science Bangalore Institute of Technology, Bangalore, Karnataka, India rash003.j@gmail.com,
More informationChapter 2 Transformation Invariant Image Recognition Using Multilayer Perceptron 2.1 Introduction
Chapter 2 Transformation Invariant Image Recognition Using Multilayer Perceptron 2.1 Introduction A multilayer perceptron (MLP) [52, 53] comprises an input layer, any number of hidden layers and an output
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationA Novel Color Image Denoising Technique Using Window Based Soft Fuzzy Filter
A Novel Color Image Denoising Technique Using Window Based Soft Fuzzy Filter Hemant Kumar, Dharmendra Kumar Roy Abstract - The image corrupted by different kinds of noises is a frequently encountered problem
More informationPETROLEUM ENGINEERING LEARNING PROVOCATION
International Journal of Production Technology and Management (IJPTM) Volume 6, Issue 2, July-Dec 2015, pp. 16-20, Article ID: IJPTM_06_02_003 Available online at http://www.iaeme.com/ijptm/issues.asp?jtype=ijptm&vtype=6&itype=2
More informationAbstraction as a Vector: Distinguishing Philosophy of Science from Philosophy of Engineering.
Paper ID #7154 Abstraction as a Vector: Distinguishing Philosophy of Science from Philosophy of Engineering. Dr. John Krupczak, Hope College Professor of Engineering, Hope College, Holland, Michigan. Former
More informationAnalysis of Data Mining Methods for Social Media
65 Analysis of Data Mining Methods for Social Media Keshav S Rawat Department of Computer Science & Informatics, Central university of Himachal Pradesh Dharamshala (Himachal Pradesh) Email:Keshav79699@gmail.com
More informationA SIMPLE CONCEPT OF ENERGY HARVESTING USING RADIO FREQUENCY
Sukumar & Balakrishnan, 2016 Volume 2 Issue 2, pp.19-31 Year of Publication: 2016 DOI- http://dx.doi.org/10.20319/mijst.2016.22.1931 This paper can be cited as: Sukumar, N., & Balakrishnan, S. (2016).
More informationReview Analyzer Analyzing Consumer Product
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationTowards Assessment of Indicators Influence on Innovativeness of Countries' Economies: Selected Soft Computing Approaches
Towards Assessment of Indicators Influence on Innovativeness of Countries' Economies: Selected Soft Computing Approaches Marta Czyżewska, Krzysztof Pancerz, Jarosław Szkoła Abstract The aim of this paper
More informationPREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm
PREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm Ekaterina S. Ponomareva, Kesheng Wang, Terje K. Lien Department of Production and Quality Engieering,
More informationA Three-layered Conceptual Framework of Data Mining
A Three-layered Conceptual Framework of Data Mining Y.Y. Yao 1, N. Zhong 2 and Y. Zhao 1 1 Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: {yyao, yanzhao}@cs.uregina.ca
More informationFinger Vein Presentation Attack Detection using Total Variation Decomposition
Finger Vein Presentation Attack Detection using Total Variation Decomposition Srija. S.K 1, Sowmiya Preethi. S 2, Vaishnavi. S 3 1,2,3Student, Dept. of Electronics and communication Engineering, Jeppiaar
More informationA Conceptual Framework of Data Mining
1 A Conceptual Framework of Data Mining Yiyu Yao 1, Ning Zhong 2 and Yan Zhao 1 1 Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: {yyao, yanzhao}@cs.uregina.ca
More informationA Collaborative Web Recommendation System Using Hidden Markov Model
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 4, Ver. IV. (Jul.-Aug. 2017), PP 05-09 www.iosrjournals.org A Collaborative Web Recommendation System
More informationINTELLIGENT APRIORI ALGORITHM FOR COMPLEX ACTIVITY MINING IN SUPERMARKET APPLICATIONS
Journal of Computer Science, 9 (4): 433-438, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.433.438 Published Online 9 (4) 2013 (http://www.thescipub.com/jcs.toc) INTELLIGENT APRIORI ALGORITHM FOR COMPLEX
More informationPredicting Content Virality in Social Cascade
Predicting Content Virality in Social Cascade Ming Cheung, James She, Lei Cao HKUST-NIE Social Media Lab Department of Electronic and Computer Engineering Hong Kong University of Science and Technology,
More informationIMPLEMENTATION OF AREA EFFICIENT AND LOW POWER CARRY SELECT ADDER USING BEC-1 CONVERTER
IMPLEMENTATION OF AREA EFFICIENT AND LOW POWER CARRY SELECT ADDER USING BEC-1 CONVERTER Hareesha B 1, Shivananda 2, Dr.P.A Vijaya 3 1 PG Student, M.Tech,VLSI Design and Embedded Systems, BNM Institute
More informationWi-Fi Fingerprinting through Active Learning using Smartphones
Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,
More informationEvolutionary Image Enhancement for Impulsive Noise Reduction
Evolutionary Image Enhancement for Impulsive Noise Reduction Ung-Keun Cho, Jin-Hyuk Hong, and Sung-Bae Cho Dept. of Computer Science, Yonsei University Biometrics Engineering Research Center 134 Sinchon-dong,
More informationResearch Statement. 1. Research Overview. 2. Current Research Agenda
Research Statement Gregory James Gay Department of Computer Science and Engineering, University of South Carolina 2247 Storey Innovation and Engineeing Center, 550 Assembly Street, Columbia, SC 29208 (803)-777-9479,
More informationContext-Aware Interaction in a Mobile Environment
Context-Aware Interaction in a Mobile Environment Daniela Fogli 1, Fabio Pittarello 2, Augusto Celentano 2, and Piero Mussio 1 1 Università degli Studi di Brescia, Dipartimento di Elettronica per l'automazione
More informationThe Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation
The Study on the Architecture of Public knowledge Service Platform Based on Chang ping Hu, Min Zhang, Fei Xiang Center for the Studies of Information Resources of Wuhan University, Wuhan,430072,China,
More informationISSN: [Khan* et al., 7(8): August, 2018] Impact Factor: 5.164
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMAGE ENCRYPTION USING TRAPDOOR ONE WAY FUNCTION Eshan Khan *1, Deepti Rai 2 * Department of EC, AIT, Ujjain, India DOI: 10.5281/zenodo.1403406
More informationDesign and Implementation of Privacy-preserving Recommendation System Based on MASK
JOURNAL OF SOFTWARE, VOL. 9, NO. 10, OCTOBER 2014 2607 Design and Implementation of Privacy-preserving Recommendation System Based on MASK Yonghong Xie, Aziguli Wulamu and Xiaojing Hu School of Computer
More informationDesign of Efficient Han-Carlson-Adder
Design of Efficient Han-Carlson-Adder S. Sri Katyayani Dept of ECE Narayana Engineering College, Nellore Dr.M.Chandramohan Reddy Dept of ECE Narayana Engineering College, Nellore Murali.K HoD, Dept of
More informationA review and analysis on knowledge discovery and data mining techniques
Review Article International Journal of Advanced Technology and Engineering Exploration, Vol 5(41) ISSN (Print): 2394-5443 ISSN (Online): 2394-7454 http://dx.doi.org/10.19101/ijatee.2018.541006 A review
More informationSpecial issue on behavior computing
Knowl Inf Syst (2013) 37:245 249 DOI 10.1007/s10115-013-0668-0 EDITORIAL Special issue on behavior computing LongbingCao Philip S Yu Hiroshi Motoda Graham Williams Published online: 19 June 2013 Springer-Verlag
More informationLearning Pixel-Distribution Prior with Wider Convolution for Image Denoising
Learning Pixel-Distribution Prior with Wider Convolution for Image Denoising Peng Liu University of Florida pliu1@ufl.edu Ruogu Fang University of Florida ruogu.fang@bme.ufl.edu arxiv:177.9135v1 [cs.cv]
More informationFUZZY AND NEURO-FUZZY MODELLING AND CONTROL OF NONLINEAR SYSTEMS
FUZZY AND NEURO-FUZZY MODELLING AND CONTROL OF NONLINEAR SYSTEMS Mohanadas K P Department of Electrical and Electronics Engg Cukurova University Adana, Turkey Shaik Karimulla Department of Electrical Engineering
More informationINTAIRACT: Joint Hand Gesture and Fingertip Classification for Touchless Interaction
INTAIRACT: Joint Hand Gesture and Fingertip Classification for Touchless Interaction Xavier Suau 1,MarcelAlcoverro 2, Adolfo Lopez-Mendez 3, Javier Ruiz-Hidalgo 2,andJosepCasas 3 1 Universitat Politécnica
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationA Study On Smart Agriculture Farm Using Data Mining Techniques
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 A Study On Smart Agriculture Farm Using Data Mining
More informationMove Evaluation Tree System
Move Evaluation Tree System Hiroto Yoshii hiroto-yoshii@mrj.biglobe.ne.jp Abstract This paper discloses a system that evaluates moves in Go. The system Move Evaluation Tree System (METS) introduces a tree
More informationThe Medical Examiner s Process
The Medical Examiner s Process A generic description, for local adaptation. It is anticipated that local groups of medical examiners, coordinated by a lead medical examiner, will develop local processes
More informationFUTURISTIC USE OF DATA MINING APPLICATIONS Vaibhav Vishal 1, Abhishek Bansal 2
FUTURISTIC USE OF DATA MINING APPLICATIONS Vaibhav Vishal 1, Abhishek Bansal 2 1School of Computer Science, VIT University, Vellore, India 2 School of Computer Science, VIT University, Vellore, India ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationAnalysis Techniques for WiMAX Network Design Simulations
Technical White Paper Analysis Techniques for WiMAX Network Design Simulations The Power of Smart Planning 1 Analysis Techniques for WiMAX Network Jerome Berryhill, Ph.D. EDX Wireless, LLC Eugene, Oregon
More informationISSN Vol.03,Issue.08, September-2015, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.03,Issue.08, September-2015, Pages:1351-1356 Control of a Transformer less High Step-Up DC DC Converter by using Cascade Cockcroft Walton Voltage Multiplier CHENNAMPALLI
More informationVision Based Automatic Parking Slot Detection for ADAS
Vision Based Automatic Parking Slot Detection for ADAS Santhosh D K 1, Honnaraju B 2 1Mtech. Student, Department of Computer Science and Engineering, Maharaja Institute of Technology - Mysore, Karnataka,
More informationThe User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space
, pp.62-67 http://dx.doi.org/10.14257/astl.2015.86.13 The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space Bokyoung Park, HyeonGyu Min, Green Bang and Ilju Ko Department
More informationMulticarrier Modulation For 5g Mobile Applications
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p-ISSN: 2278-8735 PP 01-05 www.iosrjournals.org Multicarrier Modulation For 5g Mobile Applications M.Banupriya #1
More informationPractical Text Mining for Trend Analysis: Ontology to visualization in Aerospace Technology
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 11, NO. 8, Aug. 2017 4133 Copyright c2017 KSII Practical Text Mining for Trend Analysis: Ontology to visualization in Aerospace Technology Yoosin
More informationTHE ASEAN FRAMEWORK AGREEMENT ON ACCESS TO BIOLOGICAL AND GENETIC RESOURCES
Draft Text 24 February 2000 THE ASEAN FRAMEWORK AGREEMENT ON ACCESS TO BIOLOGICAL AND GENETIC RESOURCES The Member States of the Association of South East Asian Nations (ASEAN) : CONSCIOUS of the fact
More informationEffective Contrast Enhancement using Adaptive Gamma Correction and Weighting Distribution Function
e t International Journal on Emerging Technologies (Special Issue on ICRIET-2016) 7(2): 299-303(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Effective Contrast Enhancement using Adaptive
More informationarxiv: v1 [cs.lg] 2 Jan 2018
Deep Learning for Identifying Potential Conceptual Shifts for Co-creative Drawing arxiv:1801.00723v1 [cs.lg] 2 Jan 2018 Pegah Karimi pkarimi@uncc.edu Kazjon Grace The University of Sydney Sydney, NSW 2006
More informationAn Improved Event Detection Algorithm for Non- Intrusive Load Monitoring System for Low Frequency Smart Meters
An Improved Event Detection Algorithm for n- Intrusive Load Monitoring System for Low Frequency Smart Meters Abdullah Al Imran rth South University Minhaz Ahmed Syrus rth South University Hafiz Abdur Rahman
More informationVIVO + ORCID = a collaborative project
VIVO + ORCID = a collaborative project Gudmundur Mummi Thorisson Department of Genetics, University of Leicester ORCID - http://www.orcid.org GEN2PHEN - http://www.gen2phen.org -- Outline
More informationIJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron
Impact of attribute selection on the accuracy of Multilayer Perceptron Niket Kumar Choudhary 1, Yogita Shinde 2, Rajeswari Kannan 3, Vaithiyanathan Venkatraman 4 1,2 Dept. of Computer Engineering, Pimpri-Chinchwad
More informationReasoning about Sets using Redescription Mining
Reasoning about Sets using Redescription Mining Mohammed J. Zaki zaki@cs.rpi.edu Naren Ramakrishnan naren@cs.vt.edu What are redescriptions? A shift-of-vocabulary, or a different way of communicating a
More informationWorld Trade Organization Panel Proceedings
World Trade Organization Panel Proceedings Australia Certain Measures Concerning Trademarks, Geographical Indications and other Plain Packaging Requirements Applicable to Tobacco Products and Packaging
More informationAnticipative Approach to Project Management for the Creation of Distributed Information Systems
Anticipative Approach to Project Management for the Creation of Distributed Information Systems Viktor Morozov, Olena Kalnichenko, Iuliia Liubyma Taras Shevchenko National University of Kyiv Faculty of
More informationLocal and Low-Cost White Space Detection
Local and Low-Cost White Space Detection Ahmed Saeed*, Khaled A. Harras, Ellen Zegura*, and Mostafa Ammar* *Georgia Institute of Technology Carnegie Mellon University Qatar White Space Definition A vacant
More informationIntroduction to Computational Intelligence in Healthcare
1 Introduction to Computational Intelligence in Healthcare H. Yoshida, S. Vaidya, and L.C. Jain Abstract. This chapter presents introductory remarks on computational intelligence in healthcare practice,
More informationClassification rules for Indian Rice diseases
www.ijcsi.org 444 Classification rules for Indian Rice diseases A.Nithya 1 and Dr.V.Sundaram 2 1 Asst Professor in Computer Applications, Nehru Arts and Science College, Coimbatore, Tamil Nadu, India.
More informationPerformance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images
Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Keshav Thakur 1, Er Pooja Gupta 2,Dr.Kuldip Pahwa 3, 1,M.Tech Final Year Student, Deptt. of ECE, MMU Ambala,
More informationAudio Imputation Using the Non-negative Hidden Markov Model
Audio Imputation Using the Non-negative Hidden Markov Model Jinyu Han 1,, Gautham J. Mysore 2, and Bryan Pardo 1 1 EECS Department, Northwestern University 2 Advanced Technology Labs, Adobe Systems Inc.
More informationAn Embedding Model for Mining Human Trajectory Data with Image Sharing
An Embedding Model for Mining Human Trajectory Data with Image Sharing C.GANGAMAHESWARI 1, A.SURESHBABU 2 1 M. Tech Scholar, CSE Department, JNTUACEA, Ananthapuramu, A.P, India. 2 Associate Professor,
More informationCC4.5: cost-sensitive decision tree pruning
Data Mining VI 239 CC4.5: cost-sensitive decision tree pruning J. Cai 1,J.Durkin 1 &Q.Cai 2 1 Department of Electrical and Computer Engineering, University of Akron, U.S.A. 2 Department of Electrical Engineering
More informationPhoto Quality Assessment based on a Focusing Map to Consider Shallow Depth of Field
Photo Quality Assessment based on a Focusing Map to Consider Shallow Depth of Field Dong-Sung Ryu, Sun-Young Park, Hwan-Gue Cho Dept. of Computer Science and Engineering, Pusan National University, Geumjeong-gu
More informationDesign and Implementation of Real Time Basic GPS Receiver System using Simulink 8.1
Design and Implementation of Real Time Basic GPS Receiver System using Simulink 8.1 Mrs. Rachna Kumari 1, Dr. Mainak Mukhopadhyay 2 1 Research Scholar, Birla Institute of Technology, Mesra, Jharkhand,
More informationAdaptive Feature Analysis Based SAR Image Classification
I J C T A, 10(9), 2017, pp. 973-977 International Science Press ISSN: 0974-5572 Adaptive Feature Analysis Based SAR Image Classification Debabrata Samanta*, Abul Hasnat** and Mousumi Paul*** ABSTRACT SAR
More informationComputer Log Anomaly Detection Using Frequent Episodes
Computer Log Anomaly Detection Using Frequent Episodes Perttu Halonen, Markus Miettinen, and Kimmo Hätönen Abstract In this paper, we propose a set of algorithms to automate the detection of anomalous
More informationProbability Models. Section 6.2
Probability Models Section 6.2 The Language of Probability What is random? Empirical means that it is based on observation rather than theorizing. Probability describes what happens in MANY trials. Example
More informationImplementation of a New Recommendation System Based on Decision Tree Using Implicit Relevance Feedback
Implementation of a New Recommendation System Based on Decision Tree Using Implicit Relevance Feedback Anıl Utku*, Hacer Karacan, Oktay Yıldız, M. Ali Akcayol Gazi University Computer Engineering Department,
More informationEconomic and Social Council
United Nations Economic and Social Council Distr.: General 18 December 2017 Original: English Statistical Commission Forty-ninth session 6 9 March 2018 Item 4 (a) of the provisional agenda* Items for information:
More informationFDM (Fast Distributed Mining) over normal mining algorithm based on A-priori property and its application in market basket analysis
FDM (Fast Distributed Mining) over normal mining algorithm based on A-priori property and its application in market basket analysis Sateesh Reddy, Ravi Konaraddi, Sivagama Sundari G CSE Department, MVJCE
More informationGame Mechanics Minesweeper is a game in which the player must correctly deduce the positions of
Table of Contents Game Mechanics...2 Game Play...3 Game Strategy...4 Truth...4 Contrapositive... 5 Exhaustion...6 Burnout...8 Game Difficulty... 10 Experiment One... 12 Experiment Two...14 Experiment Three...16
More informationDYNAMIC FACE RECOGNITION IN A GROUP PHOTOGRAPH USING PCA ALGORITHM
DYNAMIC FACE RECOGNITION IN A GROUP PHOTOGRAPH USING PCA ALGORITHM Mangala R #1 and Dr. Bindu A Thomas *2 # Student, Dept. of ECE, VVIET, Mysore, India * HOD, Dept. of ECE, VVIET, Mysore, India Abstract
More informationSquare Pixels to Hexagonal Pixel Structure Representation Technique. Mullana, Ambala, Haryana, India. Mullana, Ambala, Haryana, India
, pp.137-144 http://dx.doi.org/10.14257/ijsip.2014.7.4.13 Square Pixels to Hexagonal Pixel Structure Representation Technique Barun kumar 1, Pooja Gupta 2 and Kuldip Pahwa 3 1 4 th Semester M.Tech, Department
More informationWorkshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF
Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationLocating the Query Block in a Source Document Image
Locating the Query Block in a Source Document Image Naveena M and G Hemanth Kumar Department of Studies in Computer Science, University of Mysore, Manasagangotri-570006, Mysore, INDIA. Abstract: - In automatic
More informationConstrained Unsharp Masking for Image Enhancement
Constrained Unsharp Masking for Image Enhancement Radu Ciprian Bilcu and Markku Vehvilainen Nokia Research Center, Visiokatu 1, 33720, Tampere, Finland radu.bilcu@nokia.com, markku.vehvilainen@nokia.com
More informationNirali A. Patel 1, Swati J. Patel 2. M.E(I.T) Student, I.T Department, L.D College of Engineering, Ahmedabad, Gujarat, India
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology A Survey On Hand Gesture System For Human Computer Interaction(HCI) ABSTRACT Nirali
More informationISSN Vol.03,Issue.07, August-2015, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.03,Issue.07, August-2015, Pages:1283-1288 ZCS Phase shift PWM Full-Bridge DC DC Converter with Simple Auxiliary Circuits SURESH KUMAR 1, AMARNATH NAIDU 2 1 PG Scholar,
More informationAN EVALUATION OF TWO ALTERNATIVES TO MINIMAX. Dana Nau 1 Computer Science Department University of Maryland College Park, MD 20742
Uncertainty in Artificial Intelligence L.N. Kanal and J.F. Lemmer (Editors) Elsevier Science Publishers B.V. (North-Holland), 1986 505 AN EVALUATION OF TWO ALTERNATIVES TO MINIMAX Dana Nau 1 University
More informationCopper To The World 2018
Copper To The World 2018 Andrew Mooney Principal Advisor Mining 2 6 J u n e 2 0 1 8 Disclaimer Forward looking statements This presentation has been prepared by OZ Minerals Limited (OZ Minerals) and consists
More informationUnited Nations Statistics Division Programme in Support of the 2020 Round of Population and Housing Censuses
United Nations Statistics Division Programme in Support of the 2020 Round of Population and Housing Censuses Srdjan Mrkić United Nations Statistics Division Definitions A population census is the total
More informationFirst steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems
First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems Shahab Pourtalebi, Imre Horváth, Eliab Z. Opiyo Faculty of Industrial Design Engineering Delft
More informationWe Don't Have To Go To the Courthouse Do We? by Mary Lou Bevers
We Don't Have To Go To the Courthouse Do We? by Mary Lou Bevers Note: This article originally appeared in the September 2006 issue of Indiana Genealogist and is reprinted here with the author's permission.
More informationA Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information
A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu
More informationMODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES
International Journal of Advanced Research in Computer Science and Emerging Engineering Technologies ISSN : 2454-9924 MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES D.Geethanjali 1 and. M.Margarat 2 1
More informationGesture Recognition with Real World Environment using Kinect: A Review
Gesture Recognition with Real World Environment using Kinect: A Review Prakash S. Sawai 1, Prof. V. K. Shandilya 2 P.G. Student, Department of Computer Science & Engineering, Sipna COET, Amravati, Maharashtra,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DESIGN OF LOW POWER MULTIPLIERS USING APPROXIMATE ADDER MR. PAWAN SONWANE 1, DR.
More informationIn practice, the question is frequently raised of what legislation applies to clamping devices that are intended to be used on machines.
VDMA Position Paper (Version from 22 nd June, 2017) Machine tools and manufacturing systems Precision Tools Clamping devices for use on machines This position paper is intended as information on how clamping
More informationTarget detection in side-scan sonar images: expert fusion reduces false alarms
Target detection in side-scan sonar images: expert fusion reduces false alarms Nicola Neretti, Nathan Intrator and Quyen Huynh Abstract We integrate several key components of a pattern recognition system
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DESIGN OF A CARRY TREE ADDER VISHAL R. NAIK 1, SONIA KUWELKAR 2 1. Microelectronics
More informationInternational Journal of Advance Engineering and Research Development. Generating The Summary Of Geographic Area
Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 4, April -2016 Generating The Summary Of Geographic Area Priyanka
More informationGeneralized Game Trees
Generalized Game Trees Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, Ca. 90024 Abstract We consider two generalizations of the standard two-player game
More informationAutonomous Localization
Autonomous Localization Jennifer Zheng, Maya Kothare-Arora I. Abstract This paper presents an autonomous localization service for the Building-Wide Intelligence segbots at the University of Texas at Austin.
More information