Internet users are increasing rapidly during the last decade, and after the Covid-19 outbreak, so... more Internet users are increasing rapidly during the last decade, and after the Covid-19 outbreak, social media platforms became the favorite source to express public responses. They are using Twitter, a free microblogging site, to express their thoughts, joys, and sorrows spontaneously. Researchers take great interest in analyzing public sentiments with the help of Data science techniques like natural language processing and machine learning methods, to predict public suggestions on topics of social concerns. In the proposed research article, we have collected public tweets during the third wave of Covid19 from 21st to 31st January 2022, and public sentiments are observed with 12 popular Machine Learning algorithms and commonly used words are represented as n-grams and here three n-grams (Unigram, Bigram, and Trigram) are collected and prediction is also observed on these data. It is observed that in all the cases LinearSVC presents the highest classification accuracy of approx. 96% fo...
Many diseases are increasing day by day and it takes too much time to detect. In India after Covi... more Many diseases are increasing day by day and it takes too much time to detect. In India after Covid-19 pandemic so many diseases have been spread their era. Like Liver Disease, Lung cancer and Brain Stroke. They are among us and lethal diseases which need to predict earlier or in initial stage. Machine Learning (ML) is the subset of Artificial intelligent which can imitate like human intelligence and it can process the large information. The classification or prediction of those diseases can be done by classifiers. The disease prediction is the method which can predict future of Liver diseases, Lung Cancer and Brain Stroke possibilities based on the collection of historical dataset. In this paper we will use Hybrid Ensemble Classifier Model (HECM) which is the combination of Supervised Classifiers like LightGBM, Random Forest, KNN used as Ensemble Classifier then output given to Voting classifier for final output. Accuracy and time will be calculate
Intracranial aneurysms are sometimes associated with other vascular anomalies in extracranial loc... more Intracranial aneurysms are sometimes associated with other vascular anomalies in extracranial location. Coarctation of aorta, a congenital vascular lesion can be associated with intracranial aneurysms. In patients with coarctation, evaluation of intracranial vasculature is essential. We encountered a 12-year kid with subarachnoid hemorrhage. On further evaluation, she had anterior communicating artery aneurysm. On further evaluation for secondary causes of aneurysm, she had coarctation of aorta. She was surgically managed successfully by clipping of the aneurysm.
The reversible data hiding techniques, which are used to improve the distortion in images. We hav... more The reversible data hiding techniques, which are used to improve the distortion in images. We have proposed a secure RDH method, Based on Histogram Modification and Random Scramble Transform. This Paper consists different phases for embedding of data, encryption of image, and data extraction/image-recovery. In first phase, the owner gets content's histogram by the inverse s-order technique. After that hides the additional data into the image and then encrypts the image with the help of encryption key. At the receiver end the receiver does not have knowledge about the original content of encrypted image associated with additional data. A receiver gets only the contents of the image after decryption according encryption key, and then extract the embedded data and gets the original image and embedded data separately. In the scheme, the data extraction from decryption is non-separable. The proposed technique was tested for different hiding capacity and the consequences showed that i...
In current years, the use of data mining techniques and related applications has enlarged a lot a... more In current years, the use of data mining techniques and related applications has enlarged a lot as it is used to extract important knowledge from large amount of data. Now a days the incredible growth of data in every field[1]. This increment of the data created lots of challenges in privacy. Privacy preserving in data mining becomes too essential due to share this data for our benefit purpose[2].This shared data may contain sensitive attributes, Database containing sensitive knowledge must be protected against illegal access. Therefore this it has become necessary to hide sensitive knowledge in database. Privacy preserving data mining (PPDM) try to conquer this problem by protecting the privacy of data without sacrificing the integrity of data. A number of techniques have been proposed for privacy-preserving data mining. To address this problem, Privacy Preservation Data Mining (PPDM) include association rule hiding method to protect privacy of sensitive data against association ru...
the wireless communication leads effective solutions.But still there are a number of performance ... more the wireless communication leads effective solutions.But still there are a number of performance and security issues are remains to be fixed. In most of the wireless ad hoc infrastructures the problem of continuous connectivity and resources optimization issues are a major concern. In this context the experts are suggested to deploy the network in clustered organization for improving the network efficiency and the resource utilization. In this paper a weighted clustering algorithm is proposed for implementation and their performance evaluation. In addition of that the effect of the performance improvement is also noticed in comparison of the normal AODV routing technique. The obtained results show that the performance of the network is increases when the network nodes are functioning a clustered organization.
Abstract- In this paper an algorithm is proposed for mining multilevel association rules. A Boole... more Abstract- In this paper an algorithm is proposed for mining multilevel association rules. A Boolean Matrix based approach has been employed to discover frequent itemsets, the item forming a rule come from different levels. It adopts Boolean relational calculus to discover maximum frequent itemsets at lower level. When using this algorithm first time, it scans the database once and will generate the association rules. Apriori property is used in prune the item sets. It is not necessary to scan the database again; it uses Boolean logical operation to generate the multilevel association rules and also use top-down progressive deepening method.
Cloud computing has come to be on the top of any list of topics in the fields of computer because... more Cloud computing has come to be on the top of any list of topics in the fields of computer because of its cost effectiveness. Storage and maintenance of large amount of data used to be a nightmare of the end users, but the advent of cloud computing gave them breathers because of its third party computing capabilities, thereby cutting the cost of infrastructure and man power. Moreover cloud computing has greater flexibility and reliability. Since it has effected a paradigm shift in the whole field of computing, it has become an unavoidable concept with any government in the field of e-governance and rural development in the developing world, shifting the entire concept of computing from the user-owned network infrastructure to the third party computing capability, sourcing data from a server situated not in the user’s location but somewhere else. At the same time a word of caution becomes inevitable on the security aspect of the stored data which is kept in the open environment. This ...
The main source livelihood of many people is agriculture. Approximately 70 % of the people direct... more The main source livelihood of many people is agriculture. Approximately 70 % of the people directly rely on agriculture as a mean of living. Development in agriculture may also increase savings. The rich farmers we see today started saving particularly after green revolution. This surplus quantity may be invested further in the agriculture sector to develop the sector. Green revolution began in India with an objective to give greater emphasis on Agriculture. The introduction of improved methods of agriculture and high yielding varieties (HYV) seeds, mainly wheat, had resulted into remarkable improvement in agricultural outputs. And all this was just because of technology. In this paper, we propose some novel method to find the most favorable conditions based on geographic factors for growing crops which helps in maximum crop production.
Due to ease of application and capability to provide accurate and gradual responses, neural netwo... more Due to ease of application and capability to provide accurate and gradual responses, neural networks have become very popular over the recent past when it comes to classification problems. Also, data mining has been used extensively with good effect for decision making in educational system. Improved assessment technique is of paramount importance in understanding, analysing and assessing the progress in performance of the candidates in higher education sectors. Availability of a prediction tool to asses such progression accurately can be boon to organisations. In our work we proposed a model called Fuzzy decision tree model which uses the data of the student to analyse and evaluate their performance. The data include various factors such as previous year results, academic performance, sports interest, social activities etc. to predict their success rate. Use of such model will enable the organisation to identify students who are at potential risk and help them to develop best cours...
In chitrakoot of satna (M.P.), tribal communities rear livestock mostly cattle, buffalo, goats, s... more In chitrakoot of satna (M.P.), tribal communities rear livestock mostly cattle, buffalo, goats, sheep etc. Most of the time animal diseases are treated by the use of local medicines extracted from the different part of the plant. All together 23 plant species belonging to 20 families are being identified having used to treat different veterinary diseases like injury, poisoning foot and mouth, wounds, stomach disorder, ant worms and bone fracture of animals these Ethnoveterinary plant species are normaly collected from nearby forest or natural vegetation.
Key informant method is an innovative technique for identifying people who are disabled in the co... more Key informant method is an innovative technique for identifying people who are disabled in the community, by training local volunteers to act as key informants. Key informants are the local native people include teachers, village doctors, local health workers, religious leaders, community leaders, students, traditional healers, police, NGO staffs, health professionals, local journalists, village councils etc. For them, host organization organized a training to train the key informants to identify and refer the suspected disable people. The study proved key informant method as a valid method for identification of disabling children. Key informant method had a high sensitivity (average 98%) for case detection in all groups but specificity was lower (average 44%), particularly for hearing impairment. Key Informant Method can be used to collect data on types of disabilities, cause, the magnitude of impairments, severity, quantify a need for disabled people, and making access to services...
The approach of imagery disclosure has been developing enormously by the whole of the wealth of W... more The approach of imagery disclosure has been developing enormously by the whole of the wealth of WWW. From the no end in sight number of images, pictures it is absolutely essential for users to preserve required images, pictures using an pragmatic and responsible mechanism. To quickly out the brain wave retrieval lag, plentiful techniques have been devised addressing the string attached to something of part of applications. Problem of the reactionary techniques of theory indexing have influenced to the fall in to place of wealth in techniques for retrieving images on the what it all about of automatically derived features one as enlarge, hue and impress a technology commonly referred as Content-Based Image Retrieval (CBIR). We dissent the theory in four antithetical and enhancement Binset which diverge the perception in four value. According to their XY critical point which calculates all together the values for four different binsets .that can be obligated more top in the forever an...
Identifying and locating defects in software projects is a difficult work. In particular, when pr... more Identifying and locating defects in software projects is a difficult work. In particular, when project sizes grow, this task becomes expensive. The aim of this research is to establish a method for identifying software defects using data mining applications methods. In this work we used Synthetic data Program (SD).We used mining methods to construct a two step model that predicts potentially defected modules within a given set of software modules with respect to their metric data. The data set used in the experiments is organized in two forms for learning and predicting purposes; the training set and the testing set. The experiments show that the two step model enhances defect prediction performance. KeywordsFault Prediction, Hardware, Software, Mining, Fault Detection.
International Journal for Innovative Research in Science and Technology, 2015
We proposed a Fuzzy Model System (FMS) for student performance evaluation. A suitable fuzzy infer... more We proposed a Fuzzy Model System (FMS) for student performance evaluation. A suitable fuzzy inference mechanism has been discussed in the paper. We mentioned how fuzzy principal can be applying in student performance prediction. This model can be useful for educational organization, educators, teachers, and students also. We proposed this model especially for first year students who need some extraordinary monitoring to their performance. Modeling based on the past academic result and on some information they earlier submitted for admission purposes.
Pedestrian accidents still represent the second largest source of traffic related injuries and fa... more Pedestrian accidents still represent the second largest source of traffic related injuries and fatalities after accidents involving passenger cars. Pedestrian detection is a key problem in computer vision, with several applications that have the potential to positively impact quality of life. In recent years, many pedestrian classification approaches have been proposed. The pedestrian classification consists of two stages: feature extraction and feature classification. Recently several robust feature extracting methods have been proposed in literature like Scale Invariant Feature Transform (SIFT), Histogram of Gradients (HOG), Co-occurrence of Histogram of Gradients (CoHOG). Also several classifiers exists like Hidden Markov Model (HMM), Support Vector Machines (SVM), and Neural Network. In this paper, we examine the two feature extraction method and we use neural network as classifier instead of SVM. An extensive evaluation and comparison of these methods are presented. The advanta...
We can use educational data mining to predict student' performance on the basis of different ... more We can use educational data mining to predict student' performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learning is one of the most famous practical methods for analytical study. We use DT as prediction method in this paper. In this paper we propose a model using fuzzy set to predict more accurate result.Fuzzy logic brings in an improvement of analysis aspects due to the elasticity of fuzzy sets formalism. Therefore, we proposed a decision tree on fuzzy set data, which combines ID3 with fuzzy theory.The results are compared to some other popular classification algorithms.
Currently in INDIA there is an increasing interest in e-education. Whenever we have a new start t... more Currently in INDIA there is an increasing interest in e-education. Whenever we have a new start that time we have to face lots of problem to manage it, Data mining techniques provides lots of tools for this problem. This work provides the application of data mining to e-learning educational systems, particular web-based courses, well-known learning content management systems, and adaptive and intelligent web-based educational systems. Each of these systems has different tricks,algorithms and objectives for knowledge discovering. After preprocessing the available data in each case, data mining techniques can be applied like statistics and visualization; clustering, classification and outlier detection; association rule mining and pattern mining.
International Journal of Advanced Research in Computer Science, 2017
Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience... more Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology. Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach aims to provide ...
Internet users are increasing rapidly during the last decade, and after the Covid-19 outbreak, so... more Internet users are increasing rapidly during the last decade, and after the Covid-19 outbreak, social media platforms became the favorite source to express public responses. They are using Twitter, a free microblogging site, to express their thoughts, joys, and sorrows spontaneously. Researchers take great interest in analyzing public sentiments with the help of Data science techniques like natural language processing and machine learning methods, to predict public suggestions on topics of social concerns. In the proposed research article, we have collected public tweets during the third wave of Covid19 from 21st to 31st January 2022, and public sentiments are observed with 12 popular Machine Learning algorithms and commonly used words are represented as n-grams and here three n-grams (Unigram, Bigram, and Trigram) are collected and prediction is also observed on these data. It is observed that in all the cases LinearSVC presents the highest classification accuracy of approx. 96% fo...
Many diseases are increasing day by day and it takes too much time to detect. In India after Covi... more Many diseases are increasing day by day and it takes too much time to detect. In India after Covid-19 pandemic so many diseases have been spread their era. Like Liver Disease, Lung cancer and Brain Stroke. They are among us and lethal diseases which need to predict earlier or in initial stage. Machine Learning (ML) is the subset of Artificial intelligent which can imitate like human intelligence and it can process the large information. The classification or prediction of those diseases can be done by classifiers. The disease prediction is the method which can predict future of Liver diseases, Lung Cancer and Brain Stroke possibilities based on the collection of historical dataset. In this paper we will use Hybrid Ensemble Classifier Model (HECM) which is the combination of Supervised Classifiers like LightGBM, Random Forest, KNN used as Ensemble Classifier then output given to Voting classifier for final output. Accuracy and time will be calculate
Intracranial aneurysms are sometimes associated with other vascular anomalies in extracranial loc... more Intracranial aneurysms are sometimes associated with other vascular anomalies in extracranial location. Coarctation of aorta, a congenital vascular lesion can be associated with intracranial aneurysms. In patients with coarctation, evaluation of intracranial vasculature is essential. We encountered a 12-year kid with subarachnoid hemorrhage. On further evaluation, she had anterior communicating artery aneurysm. On further evaluation for secondary causes of aneurysm, she had coarctation of aorta. She was surgically managed successfully by clipping of the aneurysm.
The reversible data hiding techniques, which are used to improve the distortion in images. We hav... more The reversible data hiding techniques, which are used to improve the distortion in images. We have proposed a secure RDH method, Based on Histogram Modification and Random Scramble Transform. This Paper consists different phases for embedding of data, encryption of image, and data extraction/image-recovery. In first phase, the owner gets content's histogram by the inverse s-order technique. After that hides the additional data into the image and then encrypts the image with the help of encryption key. At the receiver end the receiver does not have knowledge about the original content of encrypted image associated with additional data. A receiver gets only the contents of the image after decryption according encryption key, and then extract the embedded data and gets the original image and embedded data separately. In the scheme, the data extraction from decryption is non-separable. The proposed technique was tested for different hiding capacity and the consequences showed that i...
In current years, the use of data mining techniques and related applications has enlarged a lot a... more In current years, the use of data mining techniques and related applications has enlarged a lot as it is used to extract important knowledge from large amount of data. Now a days the incredible growth of data in every field[1]. This increment of the data created lots of challenges in privacy. Privacy preserving in data mining becomes too essential due to share this data for our benefit purpose[2].This shared data may contain sensitive attributes, Database containing sensitive knowledge must be protected against illegal access. Therefore this it has become necessary to hide sensitive knowledge in database. Privacy preserving data mining (PPDM) try to conquer this problem by protecting the privacy of data without sacrificing the integrity of data. A number of techniques have been proposed for privacy-preserving data mining. To address this problem, Privacy Preservation Data Mining (PPDM) include association rule hiding method to protect privacy of sensitive data against association ru...
the wireless communication leads effective solutions.But still there are a number of performance ... more the wireless communication leads effective solutions.But still there are a number of performance and security issues are remains to be fixed. In most of the wireless ad hoc infrastructures the problem of continuous connectivity and resources optimization issues are a major concern. In this context the experts are suggested to deploy the network in clustered organization for improving the network efficiency and the resource utilization. In this paper a weighted clustering algorithm is proposed for implementation and their performance evaluation. In addition of that the effect of the performance improvement is also noticed in comparison of the normal AODV routing technique. The obtained results show that the performance of the network is increases when the network nodes are functioning a clustered organization.
Abstract- In this paper an algorithm is proposed for mining multilevel association rules. A Boole... more Abstract- In this paper an algorithm is proposed for mining multilevel association rules. A Boolean Matrix based approach has been employed to discover frequent itemsets, the item forming a rule come from different levels. It adopts Boolean relational calculus to discover maximum frequent itemsets at lower level. When using this algorithm first time, it scans the database once and will generate the association rules. Apriori property is used in prune the item sets. It is not necessary to scan the database again; it uses Boolean logical operation to generate the multilevel association rules and also use top-down progressive deepening method.
Cloud computing has come to be on the top of any list of topics in the fields of computer because... more Cloud computing has come to be on the top of any list of topics in the fields of computer because of its cost effectiveness. Storage and maintenance of large amount of data used to be a nightmare of the end users, but the advent of cloud computing gave them breathers because of its third party computing capabilities, thereby cutting the cost of infrastructure and man power. Moreover cloud computing has greater flexibility and reliability. Since it has effected a paradigm shift in the whole field of computing, it has become an unavoidable concept with any government in the field of e-governance and rural development in the developing world, shifting the entire concept of computing from the user-owned network infrastructure to the third party computing capability, sourcing data from a server situated not in the user’s location but somewhere else. At the same time a word of caution becomes inevitable on the security aspect of the stored data which is kept in the open environment. This ...
The main source livelihood of many people is agriculture. Approximately 70 % of the people direct... more The main source livelihood of many people is agriculture. Approximately 70 % of the people directly rely on agriculture as a mean of living. Development in agriculture may also increase savings. The rich farmers we see today started saving particularly after green revolution. This surplus quantity may be invested further in the agriculture sector to develop the sector. Green revolution began in India with an objective to give greater emphasis on Agriculture. The introduction of improved methods of agriculture and high yielding varieties (HYV) seeds, mainly wheat, had resulted into remarkable improvement in agricultural outputs. And all this was just because of technology. In this paper, we propose some novel method to find the most favorable conditions based on geographic factors for growing crops which helps in maximum crop production.
Due to ease of application and capability to provide accurate and gradual responses, neural netwo... more Due to ease of application and capability to provide accurate and gradual responses, neural networks have become very popular over the recent past when it comes to classification problems. Also, data mining has been used extensively with good effect for decision making in educational system. Improved assessment technique is of paramount importance in understanding, analysing and assessing the progress in performance of the candidates in higher education sectors. Availability of a prediction tool to asses such progression accurately can be boon to organisations. In our work we proposed a model called Fuzzy decision tree model which uses the data of the student to analyse and evaluate their performance. The data include various factors such as previous year results, academic performance, sports interest, social activities etc. to predict their success rate. Use of such model will enable the organisation to identify students who are at potential risk and help them to develop best cours...
In chitrakoot of satna (M.P.), tribal communities rear livestock mostly cattle, buffalo, goats, s... more In chitrakoot of satna (M.P.), tribal communities rear livestock mostly cattle, buffalo, goats, sheep etc. Most of the time animal diseases are treated by the use of local medicines extracted from the different part of the plant. All together 23 plant species belonging to 20 families are being identified having used to treat different veterinary diseases like injury, poisoning foot and mouth, wounds, stomach disorder, ant worms and bone fracture of animals these Ethnoveterinary plant species are normaly collected from nearby forest or natural vegetation.
Key informant method is an innovative technique for identifying people who are disabled in the co... more Key informant method is an innovative technique for identifying people who are disabled in the community, by training local volunteers to act as key informants. Key informants are the local native people include teachers, village doctors, local health workers, religious leaders, community leaders, students, traditional healers, police, NGO staffs, health professionals, local journalists, village councils etc. For them, host organization organized a training to train the key informants to identify and refer the suspected disable people. The study proved key informant method as a valid method for identification of disabling children. Key informant method had a high sensitivity (average 98%) for case detection in all groups but specificity was lower (average 44%), particularly for hearing impairment. Key Informant Method can be used to collect data on types of disabilities, cause, the magnitude of impairments, severity, quantify a need for disabled people, and making access to services...
The approach of imagery disclosure has been developing enormously by the whole of the wealth of W... more The approach of imagery disclosure has been developing enormously by the whole of the wealth of WWW. From the no end in sight number of images, pictures it is absolutely essential for users to preserve required images, pictures using an pragmatic and responsible mechanism. To quickly out the brain wave retrieval lag, plentiful techniques have been devised addressing the string attached to something of part of applications. Problem of the reactionary techniques of theory indexing have influenced to the fall in to place of wealth in techniques for retrieving images on the what it all about of automatically derived features one as enlarge, hue and impress a technology commonly referred as Content-Based Image Retrieval (CBIR). We dissent the theory in four antithetical and enhancement Binset which diverge the perception in four value. According to their XY critical point which calculates all together the values for four different binsets .that can be obligated more top in the forever an...
Identifying and locating defects in software projects is a difficult work. In particular, when pr... more Identifying and locating defects in software projects is a difficult work. In particular, when project sizes grow, this task becomes expensive. The aim of this research is to establish a method for identifying software defects using data mining applications methods. In this work we used Synthetic data Program (SD).We used mining methods to construct a two step model that predicts potentially defected modules within a given set of software modules with respect to their metric data. The data set used in the experiments is organized in two forms for learning and predicting purposes; the training set and the testing set. The experiments show that the two step model enhances defect prediction performance. KeywordsFault Prediction, Hardware, Software, Mining, Fault Detection.
International Journal for Innovative Research in Science and Technology, 2015
We proposed a Fuzzy Model System (FMS) for student performance evaluation. A suitable fuzzy infer... more We proposed a Fuzzy Model System (FMS) for student performance evaluation. A suitable fuzzy inference mechanism has been discussed in the paper. We mentioned how fuzzy principal can be applying in student performance prediction. This model can be useful for educational organization, educators, teachers, and students also. We proposed this model especially for first year students who need some extraordinary monitoring to their performance. Modeling based on the past academic result and on some information they earlier submitted for admission purposes.
Pedestrian accidents still represent the second largest source of traffic related injuries and fa... more Pedestrian accidents still represent the second largest source of traffic related injuries and fatalities after accidents involving passenger cars. Pedestrian detection is a key problem in computer vision, with several applications that have the potential to positively impact quality of life. In recent years, many pedestrian classification approaches have been proposed. The pedestrian classification consists of two stages: feature extraction and feature classification. Recently several robust feature extracting methods have been proposed in literature like Scale Invariant Feature Transform (SIFT), Histogram of Gradients (HOG), Co-occurrence of Histogram of Gradients (CoHOG). Also several classifiers exists like Hidden Markov Model (HMM), Support Vector Machines (SVM), and Neural Network. In this paper, we examine the two feature extraction method and we use neural network as classifier instead of SVM. An extensive evaluation and comparison of these methods are presented. The advanta...
We can use educational data mining to predict student' performance on the basis of different ... more We can use educational data mining to predict student' performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learning is one of the most famous practical methods for analytical study. We use DT as prediction method in this paper. In this paper we propose a model using fuzzy set to predict more accurate result.Fuzzy logic brings in an improvement of analysis aspects due to the elasticity of fuzzy sets formalism. Therefore, we proposed a decision tree on fuzzy set data, which combines ID3 with fuzzy theory.The results are compared to some other popular classification algorithms.
Currently in INDIA there is an increasing interest in e-education. Whenever we have a new start t... more Currently in INDIA there is an increasing interest in e-education. Whenever we have a new start that time we have to face lots of problem to manage it, Data mining techniques provides lots of tools for this problem. This work provides the application of data mining to e-learning educational systems, particular web-based courses, well-known learning content management systems, and adaptive and intelligent web-based educational systems. Each of these systems has different tricks,algorithms and objectives for knowledge discovering. After preprocessing the available data in each case, data mining techniques can be applied like statistics and visualization; clustering, classification and outlier detection; association rule mining and pattern mining.
International Journal of Advanced Research in Computer Science, 2017
Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience... more Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology. Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach aims to provide ...
Uploads
Papers by Pratima Gautam