Using consumer behavior data to reduce energy consumption in smart homes
|
|
|
- Regina Young
- 9 years ago
- Views:
Transcription
1 Using consumer behavior data to reduce energy consumption in smart homes Applying machine learning to save energy without lowering comfort of inhabitants Daniel Schweizer, Michael Zehnder, Holger Wache, Hans- Friedrich Witschel Institute of Business Information Systems University of Applied Sciences and Arts Northwestern Switzerland FHNW - Olten, Switzerland [email protected] {holger.wache;hansfriedrich.witschel}@fhnw.ch Abstract This paper discusses how usage patterns and preferences of inhabitants can be learned efficiently to allow smart homes to autonomously achieve energy savings. We propose a frequent sequential pattern mining algorithm suitable for real-life smart home event data. The performance of the proposed algorithm is compared to existing algorithms regarding completeness/correctness of the results, run times as well as memory consumption and elaborates on the shortcomings of the different solutions. We also propose a recommender system based on the developed algorithm. This recommender provides recommendations to the users to reduce their energy consumption. The recommender system was deployed to a set of test homes. The test participants rated the impact of the recommendations on their comfort. We used this feedback to adjust the system parameters and make it more accurate during a second test phase. The historical dataset provided by digitalstrom contained 33 homes with 3521 devices and over 4 million events. The system produced 160 recommendations on the first phase and 120 on the second phase. The ratio of useful recommendations was close to 10%. Keywords smart cities; smart homes; energy saving; recommender systems; association rules; unsupervised learning; internet of things I. INTRODUCTION King defines a smart home as a dwelling incorporating a communications network that connects the key electrical appliances and services, and allows them to be remotely controlled, monitored or accessed [1]. The definition goes on by stating benefits that a smart home can have regarding energy management like running appliances when energy is cheapest or controlling the air conditioning/heating for maximum efficiency when the house is busy or empty. Harper acknowledged that smart house technologies that most people are pleased with are connected with saving energy or money [2]. Moreover, previous studies carried by digitalstrom show that energy savings can only be achieved if the inhabitants comfort is taken into consideration [3]. Danilo Zanatta, Miguel Rodriguez Research and Development digitalstrom AG Zurich, Switzerland {danilo.zanatta;miguel.rodriguez}@digitalstrom.com Based on these findings, we believe that a smart home needs to be able to predict future needs of its inhabitants before initiating actions to reduce the energy consumption without decreasing the comfort of its inhabitants. While Wang [4] suggest that manually specified preferences are used, this project wants to analyze if and how such preferences in the form of frequent and periodic patterns can also be gained autonomously through sequential pattern mining. Frequent means a pattern which occurs more often than others, while periodic means a pattern which occurs at a constant interval. Manual specification of such rules is not desirable because of the high degree of interaction and involvement required from the inhabitants. In this paper we propose an autonomous recommender system to provide energy saving actions to the home inhabitants without reducing their comfort level. In order to achieve this goal, the recommender has to be fed with the event stream from the smart home and to previously mined patterns that reflects the inhabitants behavior. We propose thus a frequent sequential pattern mining algorithm tailored for mining smart home event data. The rest of this paper is organized as follows. Section II provides some background about smart homes and pattern mining applied to them. Section III describes the proposed algorithm for mining patterns in smart homes events. Section IV presents the proposed recommender to reduce energy consumption in the smart homes. The results of field tests are presented in Section V and in Section VI conclusions are drawn and future work directions are described. II. BACKGROUND A. Pattern mining for smart homes A suitable algorithm allows a smart home to learn its inhabitants usage patterns autonomously. The Apriori algorithm was originally designed with the goal of association rule mining in mind, as described by Agrawal & Srikant [5]. In the smart home context, the sequence of events is of crucial importance when analyzing the data generated by the inhabitants. In order to learn from the inhabitants habits, it is relevant if appliance A was turned on before or after appliance
2 B. However, the Apriori algorithm does not take into account the sequence of events when detecting patterns. Rashidi and Cook [6] adapted the Apriori algorithm to consider the order of events when mining patterns from smart home data. They look for patterns that are at least two activities long and then iteratively extend the length of the patterns by one until they are unable to find frequent patterns anymore. A wide range of sequential pattern mining algorithms are implemented in the open-source data mining library SPMF by Fournier-Viger et al. [7]. The implemented generic algorithms include BIDE+ [8] and PrefixSpan [9]. They are in general considered very fast and efficient sequential pattern mining because of their usage of pruning techniques. Another desired feature that a pattern mining algorithm used for smart homes should support is wildcarding. The idea behind wildcarding patterns is that there are interesting patterns that are very similar, differing only by a few events (e.g. one or two), but are not considered frequent because of this variation. For the sake of clarity, consider a set of patterns that differ by only one event. If a wildcard would replace this event, the frequency of occurrence of such pattern would increase and the wildcarded pattern would become frequent. GapBIDE by Li [10] is an adaption and enhancement of the previously mentioned BIDE+ algorithm, taking wildcarding into account. We use GapBIDE as a representative of sequential pattern mining algorithms. Other algorithms in this class are, for example, MAIL by Xie [11] and PMBC by Wu [12]. B. Smart home technology digitalstrom products provide connectivity to electrical devices in the home over the existing power cables. This includes every lamp, light switch, blinds and any plugged in device. This network of devices is connected through a server mounted in the electrical cabinet to a local area network. The result is a network of connected devices, bringing the internet of things (IoT) to each home. digitalstrom components are based on a high volt IC in a small size module. Each digitalstrom module can switch, dim, measure electricity and communicate its status. The products are available through Europe with its larger installed base in Germany and Switzerland. A digitalstrom system is based on concentrators that reside in the electrical distribution panel, acting as power meters for the individual distribution circuits and communicating with individual nodes installed within a home over differently modulated up and downstream channels [13]. The system includes a Linux server application with a JSON API. Moreover, real-time data from test homes are collected by a logging system, parsed and stored in a database, being available for processing. From this logging system, historical data can easily be obtained and processed. C. Criteria used for choosing pattern mining algorithms The choice of the pattern mining algorithms used in this work was influenced by the following criteria: The algorithm has to be able to find patterns in data. To be more precise it has to find both frequent sequential patterns and periodic sequential patterns It has to be able to find wildcarded patterns and to output where the wildcard is positioned in the pattern The algorithm needs to be able to process the continuous stream of data coming from a smart home, i.e. it must be able to process this events in real-time In general both Apriori-inspired algorithms employing pruning techniques, from the family of deterministic algorithms, as well as genetic algorithms, from the family of heuristic algorithms, are suitable for finding frequent patterns in large datasets. In this work, we consider only deterministic algorithm, since they are able to find patterns in a reasonable amount of time and do not have the disadvantage of getting stuck at local maxima. D. Training data set The historical training dataset used contains 33 homes with 3521 devices, which are related to 4,331,443 events and 6829 unique scenes. These events extend over a period between 08/12/2002 and 25/06/2014. There are several types of electrical devices that can be connected and they are grouped by functionality, such as lighting, shades, audio and so on. The events themselves are either in one of the device groups or are of a broadcast or unknown type. Events have a scene ID and a source ID. The scene ID defines the action executed, like Turn light in kitchen off, while the source ID can be used to identify if it was a user generated event, a scripting event, e.g. the one generated by a system timer, or a sensor event, e.g. the one generated by a motion detector or temperature sensor. For example, the following 3 events compose one pattern: Time :26: :30: :41:50 Event data Event Turn on the light in living room to evening light scene Turn on the light in living room to the reading scene Source ID Scene ID Turn off light in living room III. ALGORITHM DESIGN A. Window Sliding with De-Duplication (WSDD) A new algorithm for mining patterns from smart home events was designed. The algorithm is based on the idea of socalled open and overlapping patterns [14]. It follows a brute force approach, namely find all possible frequent patterns by sliding a window of a specifiable size over the chronologically ordered events and count their overall occurrences inside the data. The patterns found by this algorithm were encouraging: a two-event pattern with over 9% support was found and supported the assumption that patterns are deducible in event data of smart homes. However, the run times were long, as expected from a brute-force approach. In order to improve the algorithm, a hash map data structure was used. This hash map uses the key for storing the pattern itself and the support count of this pattern is stored as the value. This means that, when the proposed algorithm has finished mining, the support of a certain pattern is stored as the
3 value, while the pattern itself is the key. Therefore, we achieve a speed improvement by doing the following: 1. Pattern de-duplication: The enhanced algorithm avoids mining patterns more than once. This gives the algorithm its name: WSDD, Window Sliding with De- Duplication 2. Instead of building possible patterns in a first loop and then mine for these found patterns in a 2nd loop, the counting is done in the same loop. This eliminates the need for reiterating over the events As an additional improvement, in analogy to the Apriori algorithm, a minimum support parameter was introduced. This was done because very infrequent patterns are not interesting, e.g. all the patterns that occur only once can never be considered normal behavior of the smart home inhabitants. The minimum support parameter is therefore used to post-process the patterns found. This algorithm returns only patterns that have a support greater than this minimum. The final proposed algorithm is depicted in Fig. 1. B. Algorithm comparison To compare the WSDD algorithm with the two well-known sequential pattern mining algorithms BIDE+ and PrefixSpan, an interface to the open-source Java framework SPMF by Fournier-Viger et al. [7] was implemented. It became obvious very soon that regarding throughput and run times, the developed WSDD algorithm is very competitive for the available data set. For a minimum support of 0.01, PrefixSpan needs 3 seconds for a smart home with events, BIDE+ needs 25 seconds while WSDD finishes in less than 1 second. A reason for the good run times of the WSDD algorithm is that the number of the different patterns in a smart home is relatively small which allows the algorithm to store all the patterns without producing very big hash maps. Moreover, there are three general advantages of the smart home specific algorithm WSDD over general purpose algorithms such as BIDE+, PrefixSpan and GapBIDE: WSDD reports not only frequent but also periodic patterns WSDD reports where wildcards are detected in a pattern No post-processing is needed for the correct support count These results were expected given the fact that PrefixSpan, BIDE+ and GapBIDE are generic algorithms, not explicitly developed for frequent sequential pattern mining in smart homes. We ran benchmarks measuring both the run times as well as the memory consumption. The different algorithms were run multiple times and with various different parameter settings. To get representative results, a selection of five different smart homes with various amounts of events was chosen: the smart home with the fewest events (1,173 events), three smart homes with average amounts of events (22,489 42,129 events) and the smart home with most events (156,121 events). The results of an example run can be seen in Fig. 2. Fig. 1. WSDD algorithm In addition to the run time benchmarks, the same four algorithms were compared regarding their memory consumption. The memory consumption was measured with the MemoryLogger, which is provided as part of the SPMF framework and with Performance Monitor of Windows 8. The benchmark settings were the same as for the previous run time experiments.
4 Fig. 2. Benchmark of run times for data mining algorithms TABLE I. TOP 20 WILDCARDED PATTERNS OF ONE SMART HOME Support Count a b 8495 b a 8141 a * a 7913 a b a 7807 b * b 7787 b a b 7488 a * a b 7335 a b * b 7324 b a * a 7320 a b a b 7169 b * b a 7153 b a b a 6905 a b a * a 6904 a * a b a 6806 b a * a b 6767 a b * b a 6755 a b a b a 6692 b * b a b 6689 b a b * b 6677 b a b a b The results from memory consumption show that PrefixSpan, GapBIDE and, especially WSDD, are significantly better than BIDE+. The memory consumption of the former three algorithms ranges from a few dozen MB to some hundred MB, depending on the number of events, the minimum support and the pattern length. BIDE+ on the other hand uses up to 1.7 GB. It can be concluded that, from a memory consumption point of view, WSDD and GapBIDE have the best results, while PrefixSpan uses slightly more memory and BIDE+ uses significantly more memory. The correlation between the input parameters and the memory consumption can be clearly observed: the more events, the longer the patterns and/or the less the minimum support, the higher the memory consumption. An additional insight into memory consumption was that the increase of events and the lowering of the minimum support favor WSDD more than GapBIDE, meaning that the increase of memory consumption for GapBIDE is proportionally higher for more events and/or less minimum support than it is for WSDD. A comparison of wildcarded patterns with non-wildcarded patterns does not show significant improvement. As TABLE I. shows, there are only few instances where wildcarding produces significantly different results from when wildcarding is deactivated. Furthermore the increase of the support count of the wildcarded patterns over the non-wildcarded patterns is mostly rather low. It can therefore be said that wildcarding is not worth considering when mining frequent patterns in smart home event data since the increase in run times and memory consumption is not yielding significantly better results. In the following we consider only non-wildcarded pattern. IV. DESIGN OF THE RECOMMENDER SYSTEM Because not all frequent or periodic patterns result in energy savings, we defined some characteristics to identify the relevant behavior patterns. To ensure that a relevant pattern can be used to save energy, it must be composed of two main components: (1) A relevant pattern must contain at least one action to lower energy usage (actions are a subset of normal events). For a detailedd description, see [15] (2) The pattern must consist of normal events, which serve as condition to suggest the action at the right time. Because a relevant pattern consists of normal events, which represents the condition, and an action, this pattern can be interpreted using an association rule. An association rule is an implication of the form X Y, where X, Y I, where X is a sequence of normal events, Y is a single action, and I is the set of all possible events. The association rule above states that when X occurs, Y occurs with certain probability [16]. For this application no motion detectors or other location sensors where used. Only activities like turning on (or off) light, TV etc. are considered. A. Architecture We proceeded to build a recommender system using the WSDD algorithm we designed. The architecture of the recommender system developed in this project is shown in Fig. 3 and can be divided in three main parts: The storage of the association rules The event stream of the current behavior data inside the smart home The matching algorithm
5 copied every 5 minutes by remote synch to the VM where the recommender system is running. They are parsed by a Python script and stored in a MySQL database. Fig. 3. Recommender system architecture Hi Michael Zehnder, I would recommend to turn-off device Bed side lamp (on :19:16). Is this recommendation useful? Yes: No: Fig. 5. Recommendation SMS Fig. 4. Example of a matching rule in the algorithm (FSM) The rule database stores the association rules, which were obtained from the mined relevant patterns. The event stream contains the real-time events from the smart home, ordered by time of their occurrence. The matching algorithm is the core component of the recommender system. It matches the rules and the event stream. The most common existing rule matching algorithm is RETE by Forgy [17]. We use a deterministic finite state machine (FSM) approach as depicted in Fig. 4, which reflects the order of the events better than RETE. A new instance of the FSM is created for each new event in the stream. If there is no matching in the first attempt, the instance is removed from memory. If the condition did match and the next event is not the action itself, the machine sends a recommendation. The design of the recommender system allows more than one rule to be matched at the same time. In order to avoid multiple conflicting recommendations, we propose to weight the rules and use the weights as a prioritization criterion. B. Implementation The recommender system was implemented on a cloud based Microsoft Azure VM (Virtual Machine). The VM was set up with Ubuntu The smart homes event data is parsed from the log files of the digitalstrom system. The files are uploaded by a script installed on the digitalstrom infrastructure in the houses and made accessible for this project on a file server. The files are V. RESULTS The evaluation was conducted in 33 households with inhabitants producing real event data. The test households were equipped with the smart home automation system digitalstrom. The historical event data of the homes was mined by the recommender system in advance. According to the number of relevant patterns found in the houses, they were ranked and the owners of the 15 most promising households where requested to take part in the evaluation. From these, 8 houses agreed to participate in the evaluation of this work including both single- and multi-inhabitant houses. Recommendations were sent per SMS to the mobile devices of the inhabitants. An example of such recommendation is shown in Fig. 5. We ran the evaluation in two phases, which are described in the following sections. # days evaluated TABLE II. Recommendations sent Parameter Answered recommendations Voted useful Voted not useful Ratio useful/answered Number of active rules KEY RESULTS OF EVALUATION Phase % 9.10% Number of rules that resulted in recommendations Number of rules with 10 negative feedbacks 5 3 A. Phase 1 The aim of the first phase was to provide a large basis of data for evaluation and further improvement of the system. The analysis of the data collected during phase 1 should help to improve the recommender system in terms of decreasing the negatively rated recommendations in phase 2, while holding the positives at the highest amount possible. The results for phase 1 are summarized in TABLE II.
6 After running the evaluation for phase 1 for 2 weeks, the inhabitants were interviewed and their feedback was used to improve the recommender for the second phase. We also did a regression analysis of the results using the weighted feedback as the dependent variable and the following prioritization served as explanatory variables: The length of the pattern The position of the action Support of the pattern Confidence of the rule The result of the regression analysis shows that patterns with high confidence and high pattern-length tend to receive better feedback than the other patterns. On the other hand, support and position of the action did not show any significance to describe the feedback a rule. It is worth to notice that support was the major attribute for mining frequent patterns. Fig. 6 shows the regression based on confidence. Fig. 6. Scatter plot of confidence with line of best fit B. Phase 2 The aim of the second phase of the evaluation was to increase the ratio of answered recommendations and the ratio of useful recommendations compared to the first phase. The analysis of the data collected during phase 1 was used to adapt the system, which should lower negative rated and unanswered recommendations. The prototype was improved in the following points: All rules with 10 negative feedbacks in a row during phase 1 were removed from phase two To mitigate the problem of the low response rate caused by ambiguous recommendations, we enriched the text with the name of the room where the device is located As result of the regression analysis, confidence and pattern-length of each rule where multiplied with their estimate to calculate a coefficient which gives indication about the usefulness of a rule. A threshold is defined and 19 rules out of 54 were excluded from the second phase (35 rules remained) The results from phase 2 are summarized in TABLE II. The results show a similar ratio of useful recommendations as in phase 1, as well as a similar response rate (45.8%). However, a significant improvement can be observed in the number of recommendations sent: 0.44 recommendations/day/home in phase 2 versus 1.43 recommendations/day/home in phase 1. Note that, for the same ratio of useful recommendations, a lower number of recommendations per day per home means less noise for the user and a better comfort level. We consider the 10% ratio of useful recommendations a promising good start for a first version of the system which has not been optimized nor has it seen a large amount of usage data. VI. CONCLUSION AND FUTURE WORK In this work, we proposed an algorithm to mine data from smart home events and a recommender system that helps to save energy in smart homes without reducing the comfort of the inhabitants. The proposed algorithm, called WSSD, outperforms existing algorithms both in run-time as well as in memory usage. Even though WSDD allows the mining of wildcarded patterns, their use does not show any significant improvement over non-wildcarded patterns for smart home events, with the drawback of increased memory usage and runtime. Based on this algorithm, we proposed a recommender system that generates recommendations for the smart home inhabitants with the aim of reducing power consumption without decreasing their comfort. The results show that such a system works in real life and achieved a ratio of useful recommendations of about 10%, while sending 0.44 recommendations/day/home. Several points of improvement were identified during the evaluation phases of this work. A follow-up research project is already ongoing and will build upon the findings of this work. The following ideas for further research materialized during the design, implementation or evaluation of the recommender system: Using confidence and pattern length instead of support or periodicity as criteria for the mining algorithm, resulting in more and better patterns The time between two events (or the action) is considered neither by the mining algorithm nor by the recommender system. Using this information will improve the accuracy of the suggestions made by the system Other attributes could be introduced to decide if a rule is relevant or not. Such attributes might be: Time of day when the pattern occurs most Weekday when the pattern occurs most Season when the pattern occurs most The recommender should learn from the feedback of the inhabitants in order to prioritize the rules, instead
7 of just excluding a rule after 10 negative feedbacks in a row Look into estimating the amount of energy that would be saved by the recommendations Test other machine learning algorithms and frameworks such as Torch and Caffe VII. REFERENCES [1] King, N. Smart home. A definition Intertek Research and Testing Center, pp. 1-6, 2003 [2] Harper, R. Inside the Smart Home Springer-Verlag ISBN , 2003 [3] Baumann, C. et al. Smart energy case study Proceedings ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings. BuildSys pp 36-38, Nov [4] Wang, L., Wang, Z. & Yang, R. Intelligent Multiagent Control System for Energy and Comfort Management in Smart and Sustainable Buildings. IEEE transactions on smart grid, 3(2)., 2012, pp [5] Agrawal, R. & Srikant, R.,. Fast algorithms for mining association rules. Proc. 20th Int. Conf. Very Large Data Bases, VLDB, Volume 1215, 1994, pp [6] Rashidi, P. and Cook, D. J.,. Keeping the Resident in the Loop: Adapting the Smart Home to the User. in IEEE transactions on systems, man, and cybernetics - Part A: Systems and humans, 39(5), 2009, pp [7] Fournier-Viger, P., Gomariz, A., Soltani, A. & Gueniche, T., SPMF: Open-Source Data Mining Platform. Available online at: [8] Wang, J. & Han, J., BIDE: Efficient Mining of Frequent Closed Sequences. Proceedings of the 20th International Conference on Data Engineering., 2004, pp [9] Pei, J. et al., Mining Sequential Patterns by Pattern-Growth: The PrefixSpan Approach. IEEE Transactions on knowledge and data engineering, 16(10) , [10] Li, C., Yang, Q., Wang, J. & Li, M. Efficient Mining of Gap- Constrained Subsequences and Its Various Applications. ACM Transactions on Knowledge Discovery from Data, Volume 6, Article [11] Xie, F. et al. Sequential Pattern Mining with Wildcards. 22nd IEEE International Conference on Tools with Artificial Intelligence (ICTAI), 2010 pp [12] Wu, X., Zhu, X., He, Y. & Arslan, A. N. PMBC: Pattern mining from biological sequences with wildcard constraints. Computers in Biology and Medicine, Volume 43., 2013, p [13] Dickmann, G. digitalstrom: A centralized PLC Topology for Home Automation and Energy Management IEEE International Symposium on Power Line Communications and its Applications (ISPLC), pp , April [14] Chikhaoui, B., Wang, S. & Pigot, H. A New Algorithm Based On Sequential Pattern Mining For Person Identification In Ubiquitous Environments. KDD Workshop on Knowledge Discovery from Sensor Data., 2010, pp [15] Zehnder, M. Energy saving in smart homes based on consumer behaviour data Master s thesis, School of Business, University of Applied Sciences and Arts Nortwestern Switzerland (FHNW) Jan [16] Deenadayalan, E., Hanirex, D. & Kaliyamurthie, K.,. Association rule mining in distributed database system. International Journal of Computer Science and Mobile Computing, vol. 3, issue 4, pp , April [17] Forgy, C.L. Rete: A Fast Algorithm for the Many Pattern / Many Object Pattern Match Problem.. Artifical Inteligence 19, pp.17 37, 1982.
Master Thesis: Learning frequent and periodic usage patterns in smart homes
Master Thesis: Learning frequent and periodic usage patterns in smart homes Author: Date: D. Schweizer Olten, 31 January 2014 Supervisors: Prof. Dr. H. Wache Prof. Dr. H. F. Witschel Programme: Master
SPMF: a Java Open-Source Pattern Mining Library
Journal of Machine Learning Research 1 (2014) 1-5 Submitted 4/12; Published 10/14 SPMF: a Java Open-Source Pattern Mining Library Philippe Fournier-Viger [email protected] Department
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
Building Web-based Infrastructures for Smart Meters
Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under
International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department
Storage and Retrieval of Data for Smart City using Hadoop
Storage and Retrieval of Data for Smart City using Hadoop Ravi Gehlot Department of Computer Science Poornima Institute of Engineering and Technology Jaipur, India Abstract Smart cities are equipped with
Improved metrics collection and correlation for the CERN cloud storage test framework
Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, [email protected] D.S. Rajpoot Registrar,
Design of Home Automation Framework With Social Network Integration
Design of Home Automation Framework With Social Network Integration Warodom Werapun, Amatawit Kamhang, Aekawat Wachiraphan Department of Computer Engineering, Faculty of Engineering Prince of Songkla University
Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud
Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud Pooja H 1, S G Maknur 2 1 M.Tech Student, Dept. of Computer Science and Engineering, STJIT, Ranebennur (India) 2 Head of Department,
Mining various patterns in sequential data in an SQL-like manner *
Mining various patterns in sequential data in an SQL-like manner * Marek Wojciechowski Poznan University of Technology, Institute of Computing Science, ul. Piotrowo 3a, 60-965 Poznan, Poland [email protected]
International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET
DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand
Classification and Prediction
Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser
International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop
ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: [email protected]
Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control
Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control EP/K006487/1 UK PI: Prof Gareth Taylor (BU) China PI: Prof Yong-Hua Song (THU) Consortium UK Members: Brunel University
Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis
, 23-25 October, 2013, San Francisco, USA Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis John David Elijah Sandig, Ruby Mae Somoba, Ma. Beth Concepcion and Bobby D. Gerardo,
This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902
Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited
Original Research Articles
Original Research Articles Researchers Mr.Ramchandra K. Gurav, Prof. Mahesh S. Kumbhar Department of Electronics & Telecommunication, Rajarambapu Institute of Technology, Sakharale, M.S., INDIA Email-
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
Predict the Popularity of YouTube Videos Using Early View Data
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), [email protected], Velalar College of Engineering and Technology,
Cloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI
Available online at www.apije.com ASIA PACIFIC INTERNATIONAL JOURNAL OF ENGINEERING SCIENCE Vol. 02 (01) (2016) 37 41 AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI A.Arun Raja
Efficient Agent Based Testing Framework for Web Applications
International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Efficient Agent Based Testing Framework for Web Applications Ms.Neha Saluja Prof.Amit Kanskar Abstract- Now
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
Lyapunov Stability Analysis of Energy Constraint for Intelligent Home Energy Management System
JAIST Reposi https://dspace.j Title Lyapunov stability analysis for intelligent home energy of energ manageme Author(s)Umer, Saher; Tan, Yasuo; Lim, Azman Citation IEICE Technical Report on Ubiquitous
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
An Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.
A hybrid algorithm combining weighted and hasht apriori algorithms in Map Reduce model using Eucalyptus cloud platform
A hybrid algorithm combining weighted and hasht apriori algorithms in Map Reduce model using Eucalyptus cloud platform 1 R. SUMITHRA, 2 SUJNI PAUL AND 3 D. PONMARY PUSHPA LATHA 1 School of Computer Science,
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets
9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)
Distributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
High-Mix Low-Volume Flow Shop Manufacturing System Scheduling
Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: [email protected]
COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Virtual Machine Instance Scheduling in IaaS Clouds
Virtual Machine Instance Scheduling in IaaS Clouds Naylor G. Bachiega, Henrique P. Martins, Roberta Spolon, Marcos A. Cavenaghi Departamento de Ciência da Computação UNESP - Univ Estadual Paulista Bauru,
ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU
Computer Science 14 (2) 2013 http://dx.doi.org/10.7494/csci.2013.14.2.243 Marcin Pietroń Pawe l Russek Kazimierz Wiatr ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Abstract This paper presents
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Design and Development of SMS Based Wireless Home Appliance Control and Security System
Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing N.F. Huysamen and A.E. Krzesinski Department of Mathematical Sciences University of Stellenbosch 7600 Stellenbosch, South
Solar energy e-learning laboratory - Remote experimentation over the Internet
Solar energy e-learning laboratory - Remote experimentation over the Internet Ioannis Michaelides, Polyvios Eleftheriou, Kypros Economides Department of Mechanical Engineering Higher Technical Institute,
Data Mining in Vehicular Sensor Networks: Technical and Marketing Challenges
Data Mining in Vehicular Sensor Networks: Technical and Marketing Challenges Hillol Kargupta Agnik & University of Maryland, Baltimore County http://www.cs.umbc.edu/~hillol http://www.agnik.com Roadmap
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
Cloud Based Distributed Databases: The Future Ahead
Cloud Based Distributed Databases: The Future Ahead Arpita Mathur Mridul Mathur Pallavi Upadhyay Abstract Fault tolerant systems are necessary to be there for distributed databases for data centers or
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Dynamic resource management for energy saving in the cloud computing environment
Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan
A Web-based Interactive Data Visualization System for Outlier Subspace Analysis
A Web-based Interactive Data Visualization System for Outlier Subspace Analysis Dong Liu, Qigang Gao Computer Science Dalhousie University Halifax, NS, B3H 1W5 Canada [email protected] [email protected] Hai
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Practical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
Application of the Pareto Principle in Rapid Application Development Model
Application of the Pareto Principle in Rapid Application Development Model Vishal Pandey #1, AvinashBairwa #2, Sweta Bhattacharya #3 School of Information Technology & Engineering VIT University, Vellore
Pattern-Aided Regression Modelling and Prediction Model Analysis
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2015 Pattern-Aided Regression Modelling and Prediction Model Analysis Naresh Avva Follow this and
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data
Volume 39 No10, February 2012 Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data Rajesh V Argiddi Assit Prof Department Of Computer Science and Engineering,
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation
International Journal of Smart Grid and Clean Energy Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation Aina Hu a *, Huanhuan Wang b, and Jianchen Wan a a Department
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Distinguishing Humans from Robots in Web Search Logs: Preliminary Results Using Query Rates and Intervals
Distinguishing Humans from Robots in Web Search Logs: Preliminary Results Using Query Rates and Intervals Omer Duskin Dror G. Feitelson School of Computer Science and Engineering The Hebrew University
A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING
A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING Ahmet Selman BOZKIR Hacettepe University Computer Engineering Department, Ankara, Turkey [email protected] Ebru Akcapinar
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
1394 Bus Analyzers. Usage Analysis, Key Features and Cost Savings. Background. Usage Segmentation
1394 Bus Analyzers Usage Analysis, Key Features and Cost Savings By Dr. Michael Vonbank DapUSA Inc., and Dr. Kurt Böhringer, Hitex Development Tools GmbH Background When developing products based on complex
ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION
1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: [email protected]
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
File Size Distribution Model in Enterprise File Server toward Efficient Operational Management
Proceedings of the World Congress on Engineering and Computer Science 212 Vol II WCECS 212, October 24-26, 212, San Francisco, USA File Size Distribution Model in Enterprise File Server toward Efficient
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
Benchmarking Open-Source Tree Learners in R/RWeka
Benchmarking Open-Source Tree Learners in R/RWeka Michael Schauerhuber 1, Achim Zeileis 1, David Meyer 2, Kurt Hornik 1 Department of Statistics and Mathematics 1 Institute for Management Information Systems
Monitis Project Proposals for AUA. September 2014, Yerevan, Armenia
Monitis Project Proposals for AUA September 2014, Yerevan, Armenia Distributed Log Collecting and Analysing Platform Project Specifications Category: Big Data and NoSQL Software Requirements: Apache Hadoop
Meeting Scheduling with Multi Agent Systems: Design and Implementation
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Martin Hlosta, Rostislav Stríž, Jan Kupčík, Jaroslav Zendulka, and Tomáš Hruška A. Imbalanced Data Classification
Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone
International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
