作者:
Nikunj JoshiBintu KadhiwalaPG Student
Computer Engineering Department Sarvajanik College of Engineering and Technology Surat Gujarat India Assistant Professor
Computer Engineering Department Sarvajanik College of Engineering and Technology Surat Gujarat India
Nowadays, many people get connected with each other in one virtual world known as "Cyber Society" instead of physically connected. The interaction of people with cyber society components, such as social medi...
详细信息
ISBN:
(纸本)9781509056835
Nowadays, many people get connected with each other in one virtual world known as "Cyber Society" instead of physically connected. The interaction of people with cyber society components, such as social media, search engines, blogs, websites - with their services, causes generation of enormous amount of data termed as, "Big Data", With adaption of Big Data in banking, finance, retail industry, health care, smart city, social media and IT sectors, it has started gaining importance along with many research challenges such as heterogeneity, data life cycle management, data processing, scalability, security and privacy, and data visualization. Many security and privacy issues emerged with Big Data that are not likely to be solved by conventional security solutions. Hence, this article is aimed to present overall perspective snapshot of security and privacy issues of Big Data.
The evolution of bio fuel supply chain has revolutionized the organization by restructuring the practices of the traditional management. A flexible distribution system is becoming the need of our society. The main foc...
The evolution of bio fuel supply chain has revolutionized the organization by restructuring the practices of the traditional management. A flexible distribution system is becoming the need of our society. The main focus of this paper is to integrate IoT technologies into a cultivation, extraction and management of Jatropha seed. It was noticed that major set-back of farmers due to poor supply chain integration. The various losses like information about the Jatropha seed availability, the location of esterification plants and distribution details are identified through this IoT. This enables the farmers to reorganize the land resources, yield estimation and distribution functions. The wastage and the scarcity of energy can be tackled by using the smart phone technologies. This paper is proposes a conceptual frame work on various losses involved in the supply chain of Jatropha seed.
作者:
Sminu IzudheenSheena MathewAssistant Professor
Department of Computer Science & Engineering Rajagiri School of Engineering & Technology Kerala India Professor
Division of Computer Engineering School of Engineering Cochin University of Science & Technology Kerala India
Link prediction has recently attracted the attention of many researchers as an effective technique to understand the associations between proteins. But most of the work in this area was concentrated on predicting exis...
详细信息
Link prediction has recently attracted the attention of many researchers as an effective technique to understand the associations between proteins. But most of the work in this area was concentrated on predicting existence of links in future. Very few works has explored the prediction of links that might disappear in future. Also, links predicted by these methods may contain high levels of wrong interactions. In this paper, we propose a method to optimize the negative link predicted in protein network through Weak Edge-Edge Domination (WEED) set. We have tested our model using different standard prediction methods and the results obtained assert that our method can be used as an effective method to reduce false positive rate of negative links predicted in protein network.
Big Data, the new buzz word in the industry, is data that exceeds the processing and analytic capacity of conventional database systems within the time necessary to make them useful. With multiple data stores in abund...
详细信息
Big Data, the new buzz word in the industry, is data that exceeds the processing and analytic capacity of conventional database systems within the time necessary to make them useful. With multiple data stores in abundant formats, billions of rows of data with hundreds of millions of data combinations and the urgent need of making best possible decisions, the challenge is big and the solution bigger, Big Data. Comes with it, new advances in computing technology together with its high performance analytics for simpler and faster processing of only relevant data to enable timely and accurate insights using data mining and predictive analytics, text mining, forecasting and optimization on complex data to continuously drive innovation and make the best possible decisions. While Big Data provides solutions to complex business problems like analyzing larger volumes of data than was previously possible to drive more precise answers, analyzing data in motion to capture opportunities that were previously lost, it poses bigger challenges in testing these scenarios. Testing such highly volatile data, which is more often than not unstructured generated from myriad sources such as web logs, radio frequency Id (RFID), sensors embedded in devices, GPS systems etc. and mostly clustered data for its accuracy, high availability, security requires specialization. One of the most challenging things for a tester is to keep pace with changing dynamics of the industry. While on most aspects of testing, the tester need not know the technical details behind the scene however this is where testing Big Data Technology is so different. A tester not only needs to be strong on testing fundamentals but also has to be equally aware of minute details in the architecture of the database designs to analyze several performance bottlenecks and other issues. Like in the example quoted above on In-Memory databases, a tester would need to know how the operating systems allocate and de-allocate memory and u
With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and secur...
With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and security. This paper deals with the user of principal component and security. PCA is a statistical approach used to simplify a data set. The minimum Euclidean distance found from the PCA technique is used to recognize the face. Raspberry Pi a low cost ARM based computer on a small circuit board, controls the servo motor and other sensors. The servo-motor is in turn attached to the doors of home and opens up when the face is recognized. The proposed work has been done using a self-made training database of students from B.K. Birla Institute of engineering and Technology, Pilani, Rajasthan, India.
Introduction: Today, information technology is considered as an important national development principle in each country which is applied in different fields. Health care as a whole and the hospitals could be regarded...
详细信息
Introduction: Today, information technology is considered as an important national development principle in each country which is applied in different fields. Health care as a whole and the hospitals could be regarded as a field and organizations with most remarkable IT applications respectively. Although different benchmarks and frameworks have been developed to assess different aspects of Hospital Information Systems (HISs) by various researchers, there is not any suitable reference model yet to benchmark HIS in the world. Electronic Medical Record Adoption Model (EMRAM) has been currently presented and is globally well-known to benchmark the rate of HIS utilization in the hospitals. Notwithstanding, this model has not been introduced in Iran so far. Methods: This research was carried out based on an applied descriptive method in three private hospitals of Isfahan—one of the most important provinces of Iran—in the year 2015. The purpose of this study was to investigate IT utilization stage in three selected private hospitals. Conclusion: The findings revealed that HIS is not at the center of concern in studied hospitals and is in the first maturity stage in accordance with EMRAM. However, hospital managers are enforced and under the pressure of different beneficiaries including insurance companies to improve their HIS. Therefore, it could be concluded that these types of hospitals are still far away from desirable conditions and need to enhance their IT utilization stage significantly.
In the past decade, more stress has been given to user interface since technology is made available to every human being. This includes advancement of touch technology over buttons and many more gesture control mechan...
详细信息
In the past decade, more stress has been given to user interface since technology is made available to every human being. This includes advancement of touch technology over buttons and many more gesture control mechanisms. These technologies enable even a laymen to better use the day-to-day technologies like cell phone and personal computer easily with navigation. This work focuses on one such technology that can be implemented on a PC (Personal computer). We use single web camera as input device to recognize gestures of hand. Some of these gestures include controlling the mouse cursor, the clicking actions, and few shortcuts for opening specific applications. This work includes Face Recognition model as an replacement for default lock screen. The Face Recognition model uses Viola and Jones method for detection of face and PCA (Principal Component Analysis) for recognition and identification of algorithms.
作者:
M. NishaP.C. Reghu RajMtech Scholar
Department of Computer Science and Engineering Government Engineering College Sreekrishnapuram Palakkad Kerala Assistant Professor
Department of Computer Science and Engineering Government Engineering College Sreekrishnapuram Palakkad Kerala
The morphological richness and the agglutinative nature of Malayalam make it necessary to retrieve the root word from its inflected form in most of the NLP tasks. This paper presents an approach to identify the suffix...
详细信息
The morphological richness and the agglutinative nature of Malayalam make it necessary to retrieve the root word from its inflected form in most of the NLP tasks. This paper presents an approach to identify the suffixes of Malayalam words using MBLP approach. The idea here is to use Memory Based Language Processing (MBLP) algorithm for Malayalam suffix identification. MBLP is an approach to language processing based on exemplar storage during learning and analogical reasoning during processing. Sandhi splitting is essential for morphological analysis, document indexing and topic modeling. Suffix separation improves the quality of machine translated text. Training instances created from words are manually annotated for their segmentation and the system is trained using TiMBL (Tilberg Memory Based Learner). The paper presents memory-based model of Malayalam suffix identification and its generalization accuracy.
Ontology matching systems take a prominent position in solving semantic heterogeneity problems to facilitate sharing and reuse of ontologies. The process of generating ontology alignments through ontology matching tec...
详细信息
Ontology matching systems take a prominent position in solving semantic heterogeneity problems to facilitate sharing and reuse of ontologies. The process of generating ontology alignments through ontology matching techniques purely lies on how the concepts and relationships are modeled. This paper focuses on designing an ontology matching system in which concepts are modeled based on cognitive units of knowledge comprising of objects, attributes and relationships. The proposed cognitive based ontology matching system(COGOM) identifies semantically related concepts by aggregating the attribute similarity degree, structural similarity degree and semantic conception degree. The similarity computation is adapted from the Tversky psychological model of similarity. The proposed ontology matching system is adaptive in nature because of the cognitive based knowledge expression and the computational overhead of generating alignments is improved by forming quality clusters of semantically correlating concepts thus reducing the concept match space. The precision and recall metrics are used for evaluation of the proposed system using the benchmark data sets of OAEI 2015.
This paper conducts a correlation review of classification algorithm using some free available data mining and knowledge discovery tools such as WEKA, Rapid miner, Tanagra, Orange and Knime. The accuracy of classifica...
详细信息
This paper conducts a correlation review of classification algorithm using some free available data mining and knowledge discovery tools such as WEKA, Rapid miner, Tanagra, Orange and Knime. The accuracy of classification algorithm like Decision tree, Decision Stump, K-Nearest Neighbor and Naïve Bayes algorithm have been compared using all five tools. Indian Liver Patient DataSet is used for testing the Classification algorithm in order to classify the people with and without Liver disorder.
暂无评论