161. Visual Data Mining: A Review |
Deepa Boinwad, Santosh Khamitkar, Parag Bhalchandra and Satishkumar Mekewad |
Abstract |
Pdf
|
Category : Computing and Informatics | Sub Category : Computer Engineering |
Visual Data Mining: A Review
Visual Data mining (VDM) is extensively used and being studied field of research area now a days. We surveyed in this paper the basic idea behind the visual data mining. How and why we have to classify the VDM techniques and corresponding classification criteria’s. We also presented some of its advantages.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Advanced Lifetime Enhancement Algorithm in Wireless Sensor Networks Utilizing Clustering Approach Based on Genetic Algorithm
Today, significant development has been occurred in the field of Electronics and Telecommunications. One of these developments is sensor that can monitor the operational environment. These sensors can monitor a short board of the environment but in the operational environment, they can report results to sink by sending data, hand to hand. Clustering is and efficient method in this field. There are several algorithms for clustering and each of them investigates different measures of the network. in this paper, a clustering method is proposed by using genetic algorithm and its efficiency is compared with LEACH, LEACH-M algorithms. The simulation results indicate that the proposed algorithm is this paper lead to increase the network lifetime and improve the network coverage in comparing with these two algorithms.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Review of Metaphase Image Selection Techniques for Automatic Karyotype Generation
The karyotype is analyzed to detect the genetic abnormalities. It is generated by arranging the chromosomes after extracting them from the metaphase images. The chromosomes are non-rigid bodies that contain the genetic information of an individual. The metaphase spread contains the chromosomes but these chromosomes are not distinct bodies, they can either be individual chromosomes or they may be touching one another, they may be bent or even may be overlapping and thus forming a cluster of chromosomes. The extraction of these touching and overlapping chromosomes is a very tedious process. The segmentation of these may not give us correct and accurate results. Therefore before taking up a metaphase image for analysis it must be analyzed for the orientation of the chromosomes it contains. The various reported methods for metaphase image selection for automatic karyotype generation are compared in this paper, the images of metaphase spread are having hypo or hyper fluorescent regions and there is variability of contrast between the background and the chromosomes. After analysis it has been concluded that each metaphase image selection method has its advantages and disadvantages. The MetaSel software outperforms all the methods and is having the overall best performance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
164. Cloud Computing |
Anchal Jain and Srishti Aneja |
Abstract |
Pdf
|
Category : Computing and Informatics | Sub Category : Computer Engineering |
Cloud Computing
Cloud computing is the emerging technology in IT industry Cloud Computing helps the startup companies to implement their ideas and grab opportunities without worrying about the capital needed to start their Business plan. It is built on the concept of virtualization, utility computing, networking and Autonomic computing. The aim of this paper is to provide better understanding of the security challenges of cloud computing and analyze the research direction in this widely uses technology affecting people . In this paper, we present the prospect of cloud computing, its architecture and pros and cons of Cloud Computing .
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Diagnosing diabetes using data mining algorithms and artificial intelligence systems
The purpose of this study is to investigate the role and the scope of the application of data mining predictive science and medicine in a bid to build, evaluate, and the exploitation of data mining models in this regard. In this study to examine the related works in the field of prediction data mining in medicine, who recently published and is trying to highlight important issues and summarize methods and algorithms applied in the form of a series of training. According to the study of used in this study, in most cases to explore knowledge in the medical data from a combination of such as smart algorithms artificial neural network and the decision in the direction of the optimal - the former methods have been used.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Model-driven transformation for GWT with approach by modeling: from UML model to MVP web applications
The continuing evolution of business needs and technology makes Web applications more demanding in terms of development, usability and interactivity of their user interfaces. To cope with this complexity, several frameworks have emerged and a new type of Web applications called RIA (Rich Internet Applications) has recently appeared providing richer and more efficient graphical components similar to desktop applications. Given this diversity of solutions, the generation of a code based on UML models has become important. This paper presents the application of the MDA (Model Driven Architecture) to generate, from the UML model, the Code following the MVP pattern (Model-View-Presenter) for a RIA. We adopt GWT (Google web Toolkit) for creating a target meta-model to generate an entire GWT-based web application.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Virtual information environments
The recovery of significance topics and associated sources from environment where the information is readily available. In this project, fusion system has been developed to handle the information assembly method. Hierarchal Hyperbolic SOM (H2SOM) network is used in this system to configure the information background for information seeking process and to recover the information for the significant topic. Activation network has been used to choose the related information with reference to the existing knowledge. This network is used to choose the appropriate information from the source. This project use association rule of Data mining to examine the recognized topics. Association rule will perform numerical testing to examine the recognized topics. This system will be implemented in several industries and most applicable domain is hospital industry. Information overload has been monitored by this system. In this system information assembly method will be achieved effectively.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
IoT based Intensity Control of Room Lights
Recent years, Light energy consumption minimization has become the important aspect. In this, it is proposed to develop a system that will help various organizations to play an effective role in saving electrical energy. Energy utilized for lighting purpose sums up to a considerable part in the overall energy consumed. Effective and efficient lighting helps in reducing the unwanted excessive use of energy wasted. Smart illuminance control techniques concentrates on providing effective illuminance at a work place by varying the dimming levels of the networked luminaires.so here we used arduino board and Light Dependent Resister sensor to control the room light. Keywords— Arduino, Light Dependent Resister
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Various Techniques for PAPR Mitigation in OFDM System: A Survey
High peak-to-average power ratio of the transmit signal is a major drawback of multi-carrier transmission such as Orthogonal Frequency Division Multiplexing, which causes power inadequacy in Radio Frequency section of the transmitter. This paper describe some of the important PAPR reduction techniques for multi-carrier transmission including amplitude clipping and filtering, partial transmit sequence, selected mapping, and active constellation extension. Among various PAPR reduction techniques, neural network is the most powerful techniques in reducing the PAPR due its good generalization properties with flexible modelling and learning capabilities.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Blockchain for Real Estate Industry
Blockchain technology is one of the latest technologies on the horizon and has evolved over the last 7-10 years. There is tremendous potential for usage of Blockchain technology in today’s Real Estate industry. This paper aims to analyze the disruptive power of Blockchain digital technologies in real estate industry. This paper will start with an introduction of the blockchain technology and high-level technical overview. It will then go on to discuss the various benefits the Real Estate industry can reap from this technology. It will also put forth various use cases or opportunities in the Real Estate sector for this technology. In the end, the paper will also discuss the present-day limitations and the questions marks over this technology in relation to its usage for the Real Estate industry.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]