Papers by iir publications

Due to increase in e-health technology, enormous amount of health records are collected from the ... more Due to increase in e-health technology, enormous amount of health records are collected from the patient side because of the demand for monitoring the patient's complete in daily routine basis. Providing ehealth care service and maintaining these health records is a complex task because they need to be accessed remotely and the storage needs to be scalable. To handle this process cloud storage is a feasible and cost effective solution. As these health records are very sensitive, privacy of these outsourced e-health data needs to be preserved. Another problem is that we need a proper searching scheme to fetch health record faster from the large e-health record database. We can preserve e-health records privacy by using encryption standards by using encryption standard make the record non searchable. As a solution for the above two issues we use a searchable encryption algorithm for enabling search over encrypted data and an indexing technique which enhance the searching speed by creating an index file and updating it frequently when a new record is inserted and our index based searching technique reduce the need for bigger computation resources.

The Social website is the place where people can share information about the current events aroun... more The Social website is the place where people can share information about the current events around the world at any time. Social Network Data Analysis Applications have experienced tremendous improvements over the past few years. Due to its straightforwardness, this social network allows data trends to detect current trends, which will have the capacity to affect company global research on the common market research and group program. Unfortunately, by mistake, social network trends mislead people. Trend handling is based entirely on the users text post, including the text and its current combined searches and detection of current trends, but these methods do not know behind compromise and pseudo account users. Therefore, we try to design a safe dialogue approach for handling trends in social networking, which will have a real account of complex manufacturers and small business entities trying to reach fraudulent means and creates compromises and fake accounts. Users made us pay attention to this logic that will lead us to remove the current topic of interest between users to process these contents in this particular behavior.
The number of videos exploding on the web is a good challenge in automatic video search. Existing... more The number of videos exploding on the web is a good challenge in automatic video search. Existing Video search engines, like YouTube, imagine the sorted list of search results. The straightforward list system may be suitable for finding an ad or a music video, although queries cannot be handled with complex header systems, so users create difficulties to find the necessary information. During this event, the best way to a semistructured array in the nodes that covers all the main headings. Obviously, each question manually changes headlines and thanks for a good range of search titles. By implementing video descriptions on their linguistic information page, we use a prototype-based streamline cluster regime. We will take this information from linguistic information to the complete linguistic information we make by utilizing a sub-ontology conception in our site.

A distributed solar panel control system that allows the user to collect, store, and control and ... more A distributed solar panel control system that allows the user to collect, store, and control and monitor a solar farm situated in remote locations anywhere on the planet. The panel orientation is constantly adjusted according to the sunlight using a servo/stepper motor mechanism aiming to generate maximum power. Each panel is connected to a CAN bus network and comes fitted with sensors that measures parameters such as power, current, voltage, and light intensity and panel orientation. The collected data is transmitted to an IoT gateway using the CAN field bus protocol. The IoT gateway is built with Wi-Fi capability that allows it to get connected to the internet via a Wi-Fi router. The gateway is in constant communication with a cloud platform, where the data gets stored and forwarded to the user. The user can now subscribe to this cloud platform and able to view the collected data, and control and monitor the solar farm in real-time from a remote location from his/her smart phone app.
Individuals, organizations, companies are using facebook media for sharing information and utiliz... more Individuals, organizations, companies are using facebook media for sharing information and utilize it to improve their marketing strategy. Likes, share and followers provide the opinions of the products or service which turns to an encouragement for the development of that companies or organizations. Using the number of likes and shares of a particular product, its popularity can be easily predicted.
In this paper we present about Data Mining and brief detail about the clustering algorithm which ... more In this paper we present about Data Mining and brief detail about the clustering algorithm which is used to cluster categorical data. The algorithm called K-means. The K-means algorithm is capable of clustering large data sets. Clustering is used to measure the difference between objects by identifying the distance between the pair of objects. These measures include the Euclidean, Minkowski and Manhattan distance. In this paper we used Euclidean distance to measure the distance between objects. Segmentation is within our overall customer database, which ones have something in common. We need to find the groups of people, understand them and make some commercial value from the different groups[8].
Educational data mining has emerged an on independent research area

Cancer occurs when changes called mutations obtain situate in genes that control cell growth. The... more Cancer occurs when changes called mutations obtain situate in genes that control cell growth. The mutations permit the cells to divide and multiply in an uncontrolled, hectic way. The cells are multiplying, producing copies that obtain increasingly more abnormal. In the majority cases, the cell copies finally form a tumor. Cancer is the most vital reason for death in the world. The most of common cancers diagnosed in the world are those of the breast, lung, and blood cancers. The prognosis of different cancer is extremely variable. Several cancers are curable with early detection and treatment. Cancers that are aggressive at a later stage may be more difficult to cure. Knowledge Discovery in the database (KDD), which includes data mining techniques are has been used in healthcare. This study paper we have discussed various data mining techniques that have been utilized for the breast cancer, lung cancer, blood cancer. We focus on present research being carried out using the data mining approach to enhance the breast, lung, blood cancers risk factors are diagnosis and prognosis.
A study will be made on the various clustering methods. Method of grouping set of physical or abs... more A study will be made on the various clustering methods. Method of grouping set of physical or abstract objects into classes of similar objects is called as clustering. Splitting a data set into groups such that the similarity within a group is larger than among groups are done by clustering algorithm. This paper discusses about few types of clustering methods-Partitioning methods, Hierarchical methods, Density-based methods, Grid-based method, Model based methods, Constraint based methods.
Data mining is a field of research which is escalating gradually. Data mining is the method of an... more Data mining is a field of research which is escalating gradually. Data mining is the method of analyze data from unique views and summarization it interested in useful data. "Data mining, also in general referred to like knowledge discovery from data (KDD), is the computerize or suitable extraction of patterns in place of knowledge completely stored or captured in large databases, data warehouse, the web, other vast information repositories or information streams". Data mining machine works with data warehouse and the whole process is divided into action plan to be performed on data: selection, transformation, mining and results elucidation. In this term paper, we have reviewed equal types of obedience in data mining, also make clear different areas somewhere used data mining feeling and used of it.

The Indian government is familiarizing many schemes of the encouragement of poor but they are not... more The Indian government is familiarizing many schemes of the encouragement of poor but they are not embracing them in a felicitous and convenient path. There is ambivalence or inadequacy scrutinize in materialized schemes. The system of MGNREGA is one of the expedient materialized by the governance of India in preservation sense that "The spirit Of India Lives in Its rural community", uttermost of the populace in the imagined place of rural bliss part of the country is gamble on the tongue-tied sweat of one's for their endurance. MGNREGA is one of such schemes materialized by the government of India which indent at providing hobby to the poor in rural areas by assigning local work them. Data mining tactics that is categorization, bigotry, classification, clustering, outlier and tendency analysis etc...Are enforced on various district for awkward labium, material and juncture are collected separately and presented in this paper and also analysis of the payment of wages to the workers under MGNREGA scheme.
Cluster analysis is the duty of assemblage a set of items in such a manner that items in the same... more Cluster analysis is the duty of assemblage a set of items in such a manner that items in the same group are more alike to each other than to those in other groups .A collection of data entities can be treated as one group. Whereas undertaking gathering investigation, we first distinct the regular of records into groups based on data association and then assign the tags to the groups. The main advantage of gathering over arrangement is that, it is adaptable to variations and helps single out useful features that distinguishes dissimilar groups. It is a most significant tasks to efficient the data mining, and a common method for numerical data analysis, used in numerous fields. In This paper converse about different types of clustering algorithms such as Partitioning Method, Hierarchical Method Density-based Method, Grid-Based Method, Model-Based Method, and Constraint-based Method.

A distributed frameworks cluster is a gathering of machines that are for all intents and purposes... more A distributed frameworks cluster is a gathering of machines that are for all intents and purposes or topographically isolated and that cooperate to give a similar services or application to customers in web application. It is conceivable that huge numbers of the services you keep running in your system today are a piece of a distributed system cluster. Cluster is a vital information mining procedure which expects to isolate the information objects into important gatherings called as groups. It is the way toward gathering objects into bunches to such an extent that items from a similar group are comparable and objects from various groups is unique. In information mining, information bunching has been examined for long time utilizing diverse calculations and ordinary patterns are proposed for better results around tailed data. The fuzzy semantic strategy is look at to group the overwhelming followed information by utilizing some technique for remove. An appraisal thinks about is introduced in view of time and exactness. In this method proposed here is evaluated to other relational clustering schemes using various propinquity matrices as input. Simulations demonstrate the scheme to be very effectual.

High competitive pressure in the global manufacturing industry makes a successful, successful and... more High competitive pressure in the global manufacturing industry makes a successful, successful and sustainable development processes a successful factor. However, analyzes produced by the production control systems are defined by continuous functional improvements defined by large short-rumors. In particular, they do not use data mining to identify hidden patterns in product data. The data mining approach offered by the Advanced Production Analytics Platform is currently based on identification and method based production process optimization. Twitter is a big fast growing micro-blogging social networking platform to express their opinions about the constitution and products game. These ideas are useful for businesses, government and individuals. Therefore, tweets can be used as a valuable source for public opinion. Emotional analysis is a process to automatically identify whether a user-generated speech expresses a positive, negative or neutral point of view of a company.

Process mining is a generally youthful and creating research zone with the primary thought of fin... more Process mining is a generally youthful and creating research zone with the primary thought of finding, checking and enhancing forms by removing data from occasion logs. Going out on a limb viewpoint on the business procedure administration (BPM) lifecycle has in this manner been perceived as a fundamental research stream. Notwithstanding significant information on hazard mindful BPM with an attention on process configuration, existing methodologies for real time chance observing regard occurrences as confined when identifying dangers.To address this hole, we propose an approach for Anomaly Predictive -Risk Monitoring (APRM). This approach naturally spreads chance data, which has been identified by means of hazard sensors, crosswise over comparable running occasions of a similar procedure progressively. We show APRM's capacity of prescient hazard checking by applying it with regards to a certifiable situation. With the expansion of distributed computing and shared foundations, occasion logs of various associations are accessible for examination where cross-hierarchical process mining remains with the open door for associations gaining from each other. Created proposal comes about demonstrate that the utilization of this approach can help clients to concentrate on the parts of process models with potential execution change, which are hard to spot physically and outwardly.
The credit card system is the process which is initiates the global economy to develop significan... more The credit card system is the process which is initiates the global economy to develop significantly. Credit card providers issued millions of credit cards to their customers. They don't know whether the card holder is wrong customer, if card is issued to wrong customer that can be a very crucial factor of the financial crisis. This survey represents an organized analysis of data mining methods and its applications in credit card process. Our survey mainly focuses on data mining methods implemented especially in credit card process which helps to emphasis much larger parts. Hence, this survey must be very helpful for any credit card providers to select an appropriate solution for their problem as well as for researchers to have comprehensive of the review of literature in their area.

Big data is termed as huge volume of both structured and unstructured dataset. When dealing with ... more Big data is termed as huge volume of both structured and unstructured dataset. When dealing with these huge dataset several challenges are encountered by the users such as analysis, capture, storage, search, transfer, sharing, and visualization. To handle these complex data sets numerous technologies have been developed such as data mining, web mining, machine learning and optimization methods. From the above technologies data mining technology is considered in this paper. Data mining technology contains various techniques such as classification, prediction and clustering etc., This paper reviews the basic concepts and clustering approaches used for big data and also a comparison study is carried out in DBSCAN, DENCLUE, and OPTICS algorithms. Each of these methods has its own pros and cons. This paper reveals that DBSCAN is efficient than the other algorithms because of its simplicity.
A survey on the use of reaction surface strategy (RSS) and Artificial neural network (ANN) in con... more A survey on the use of reaction surface strategy (RSS) and Artificial neural network (ANN) in confession-suction demonstrating and improvement is displayed. The hypothetical foundation of the examined strategies with the application strategy is clarified. The paper portrays most every now and again utilized trial outlines, concerning their constraints and normal applications. The paper additionally exhibits approaches to decide the precision and the hugeness of model fitting for the two strategies depicted in this. Moreover, late references on confession-suction demonstrating and advancement with the utilization of RSS and the ANN approach are appeared. Uncommon consideration was paid to the choice of variables and reactions, and in addition to factual examination of the displaying comes about.

Recently, the centrality of data mining and machine learning has been featured in expanded applic... more Recently, the centrality of data mining and machine learning has been featured in expanded application situations. Different data mining and machine learning procedures are regularly used to dissect the colossal measure of information to make more business esteems in top of the line enterprise frameworks. Be that as it may, the headway of advancements has made data mining and machine learning conceivable on low-end frameworks, for example, PCs or installed frameworks. While specialists have proposed amazing work on the management designs of various segments of the framework, the vast majority of the work is based upon the qualities of the framework, which may change every once in a while. This makes it difficult to enhance the framework execution with static, or statically adaptive, framework plans. In the work, propose to install the backings of data mining and machine learning to the design of operating system, to find another, automatized small data analytics framework (ASDAF) to adaptively optimize the framework without utilizing complex algorithms. To approve the proposed thoughts, pick the reserve outline as a contextual analysis, where the substitution of stored substance is consequently controlled by a leader. The chief at that point answers on a data mineworker, which examines the data gathered by the framework screen. The viability of the considered case is confirmed by a progression of analyses, where the outcomes are very promising.
Nowadays, software is an intrinsic part of human life and is everywhere such as media players, mo... more Nowadays, software is an intrinsic part of human life and is everywhere such as media players, mobile phones, airways, etc., and is important that, these systems should perform their intended functions, as software failures may be expected at any where any point of time. Software testing is essential for developing software and one of the important phases is test case generation. As software size grows, test cases generated for them are also more in number. Even though many techniques are available for test case reduction, still there is a need for new techniques. This paper presents detailed description of software testing techniques and presents an overview of coverage criteria based test case reduction techniques, which helps new researchers to know about existing test case reduction techniques and come up with a new test case reduction technique.
Uploads
Papers by iir publications