AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS

Size: px
Start display at page:

Download "AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS"

Transcription

1 AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS Maddela Pradeep 1, V. Nagi Reddy 2 1 M.Tech Scholar(CSE), 2 Assistant Professor, Nalanda Institute Of Technology(NIT), Siddharth Nagar, Guntur, Andhra Pradesh, (India) ABSTRACT Mining is the concept of implementing data in an efficient manner and to transfer that data in secure progression. It supports to choose the set of items and to display the related products to that items in shopping cart. Advantage of prediction is to maintain the attention toward the selected set of items from data base and to provide likewise products in the time of products selection. That means if user came to buy cake making products he was selected only cake powder and sugar. He may forgotten the reaming things of eggs and milk and cheese products it will display to the user you can select this products also then user can take his choice to select that product, if he forgotten he can buy that products or else if willingly denied that he can ignore that products. This all the information will be display to the customer in the time of selection process, after that it will display the related information in the matrix from of 1 s and 0 s. If the product was available it will show 1 or else 0. Not only the selection of items and it will display the related cost of that products when user selected milk related to that it will display the products based on the cost how many different types of items are available in that product name. Then the content information of shopping cart data be an unique index identification. Then after completion of all these things it will display to the customer based on its association rule of shopping cart. Keywords : Shopping Cart, Customer, Selection, Boolean Form, Organization And Products. I INTRODUCTION Mining is collection of large amounted data and to maintain the each and every particular information in database. In present situation the need of data mining is very huge, in every industrial has maintaining a large amount of and they need to get each and every particular about their information. To maintain that information and to use in secure manner we are using this concept. Data mining will involve in the extraction part of data and to collect the information from a large amount of databases. It has potentiality to support the big organizations and it will help to make good decisions in a secure manner to run the companies in society. Data mining will work beyond our imaginations and our analysis, it create more efficient situations to overcome the difficulty situations in an involvement. To respond the business leaning query data mining tools will support and it will help to resolve the problems in a simple manner. It helps to find out the predicted results of miss leading information in organizations. In general companies will collect the in quality of data and in that data they use to apply the data mining concepts to work on it rapidly and to maintain that in one ordered form. Data 299 P a g e

2 mining will work as a platform for an existed data to enhance and to make it a new way outcome from an existing system. Then it will be in high qualified data and it will maintain all the data information parallel in the business oriented environment. Not only maintaining information it helps to find out the fraud detection and exploration of data. Not only system data and it helps in online servers as well to make good decisions in the time of data transmission. 1.1 Association Rule for Data Mining To find the relation between the values and large databases in online shopping and shopping carts and to maintain it we have some values identification {X1,X2,X3,...,Xn}=>Y in this set all the elements are general purpose elements in market based process. There is some other chances to find out the possible chances in systems. For example let we consider one shopping market there is a large amount of products in database everyone in that market is busy to assist the products and to check the things at that time data mining will helps to find out the process and to check the strategy of process and to maintain that large data and to help the customers in the time of purchasing. Here we are implemented prediction rules for the processing of data and to extract in servers. In above rule we can check that the efficiency of work and its frequency to deliver the data of each product status from database. That s for the implementation of predication process in online servers. Primary task in prediction id find out the frequency of products and its related co occurring products from database. Here we consider all involved things as a class and label based items. So just we put in different way to call the products and to maintain in a set of items to be interlinked with inside of its related products. In shopping carts we want to know the products and we have to check that products. If a customer has entered in to shopping he has purchased related to his requirements like he was selected only cake powder and sugar. He may forgotten the reaming things of eggs and milk and cheese products it will display to the user you can select this products also then user can take his choice to select that product, if he forgotten he can buy that products or else if willingly denied that he can ignore that products.. Through this predication if any case customer has forgot to purchase his requirements in shopping cart it will help the customers to purchase and to check the required products then customers can shop easily. Its good and important things to understand and responding to the customers in the time of shopping to perform their shopping, and treating that items as a class and labels is good thing. If there is ten products is related to the each other products it s easy to recognize, in that of selection if it was based on other products in the system it may be in hundred or else in thousand of item for that time we can t guess the products and we may forgot in that time to help the customers and to support the customers to met their needs in the shopping mall. For that purpose association rule is the best concept to met the customer requirements and to support the user requirements based on the probability status in the system. And it will help the customers to select products in less time. Through this association rule we can answer the user questions and we can simply solve the customer problems in the time of shopping in real time. 300 P a g e

3 In the above place we came to know the predication purpose and its status of help and understanding of customer values in the time of shopping. This prediction rules may useful in hospitals also not only in shopping carts and we can identify the reputational products and things through we can supply the requirements of customers and not only this we can use this in all online shopping website etc to help the customers and to review their related products and its importance of usage in the time of shopping. II RELATED WORK In existing study we have used the IT tree process to find the related values and to maintain the probability condition to all the products in database. So based on products we are considered a set possible entities as {T1,T2,T3,...,Tn} these all are the possible chances of items in the tree. And next we have to the nods information related to selected items. Then after the appearance of remaining products which was related and which is based things related to the products may be twice in database. D = { [1, 4], [2, 5], [1, 2, 3, 4, 5], [1, 2, 4], [2, 5], [2, 4] these are the elements of IT-tree we can see its formation. In that some of the elements are the flag elements ait represents the entity relations between the products in the system. To maintain good name for the project we have to maintain some of the characteristics to monitor the operations in project, in arranging of everything on project should be in equal point in all the situations. And all the things should be an independent process of action. And the work of the project should able to understand the customer requirements and to maintain the need of user, then it s very easy to monitor the user requirements in the project for that we have some of the characteristics to maintain that status is as follows. 301 P a g e

4 Fig2: Architecture of prediction Shopping cart will work on Boolean matrix form and it will generate automatic information based on user query and it will convert the data from data base and to display the values in Boolean form. Here we need to support those Boolean values and to follow that we have to maintain association rules for the process of item selection. Here association rules are generated based on the prediction form. And it will support the values with high qualified supported information in association condition. When customer completed his shopping after that he come for billing at that time it will check the products which are things he was purchased and what are the remaining products he was forgotten in the shop it will show, the iteration of the products will come and display the things based on its probability and it will display the remaining item then customer can select either he want to purchase or he want to remove that products based on the customer selection it will work and the process was implemented like this. These all things of elements are in a set form to get the values and it will represent the Boolean vector form of yes or no statements in the time of combination purpose in shopping cart. For that we are using Dempster s combinations rule, it will help us to identify the combination of related product or events. That means absence of item selection in cart and in the time of prediction process it supports to recognize the items. Related to the combinations whatever we know in the time of selection process but here mainly the things is how could we count the products and how can we supply the related items data to the customers to identify the data in shopping cart. The potentiality of the conflicted approach is to find the combination of items. 2.1 Boolean Matrix invention This is one of the major module in this project and it will help us to transfer the data from data base to Boolean from in the time of display. That value has to be in either 0 s and 1 s, that revenue if the purchaser chosen item is available it will shows the value 1 or else it will shows the value 0. That all the information will form in rows 302 P a g e

5 form to display in the time of customer selection. Then after m is the maximum number of values and n is the minimum number of values in the matrix and it will treated as m X n (M by N ) by the implementation of that normal data has converted into Boolean values. Here i is the value of row description and j is the column value description in the above formula. i m do the process j n do the process if j value is represented in i row it like set Rdb[i,j]=1; else set Rdb[i,j]=0; end process. End process. For that we can check the database and the availability of data representation in a table from and it like be a large amount of data formation in real time work. Fig3: input database Ten it would be arrange in matrix form for an output of user identification in shopping cart Like in this form it will all the related attribute information in the circuit. If the value is available means 1 or else it will display 0. III RESULT Here in this we are implemented with the selection base algorithm to perform all the actions and to make the combination of products. To maintain the each and every detail when customer came to select the products what the products they forgotten in the time of selection, with that it will check the items with the combination of item whatever we selected if there is any sub product was related to that product it will provide the information to the customer like that we are implemented here in the combination of products with the selection bases. And after the selection of that all the products and its information we are converted into Boolean from we retrieved that data from database and we are showed that information to the customer in Boolean form of binary digits 303 P a g e

6 related to that product, it was available or not in the list. It will in the form of matrix when user selects the items. Then customer may choose that if he want to get the product or he want to deny that product that all things are based on the customer after the list displayed to the customer based on his selected times. IV CONCLUSION Here in this paper we are introduced fast generation algorithm concepts to retrieve the data and to perform well operations in the time of selection process. In the time of execution it will transfer the normal data from data base to Boolean data values here the selection process is very important to generate that values, for the fast selection we need more efficient status control in the application for that we are using association rules in this paper to represent the data in Boolean from and to display an exact form of repeated items in the time of customer selection. REFERENCES [1]. Kasun Wickramaratna, Miroslav Kubat and Kamal Premaratne, Predicting Missing Items in Shopping Carts, IEEE Trans. Knowledge and Data Eng., vol. 21, no. 7, july [2]. M.Anandhavalli, Sandip Jain, Abhirup Chakraborti,Nayanjyoti Roy and M.K.Ghose Mining Association Rules Using Fast Algorithm, Advance Computing Conference (IACC), 2010 IEEE 2nd International. [3]. H.H. Aly, A.A. Amr, and Y. Taha, Fast Mining of Association Rules in Large-Scale Problems, Proc. IEEE Symp. Computers and Comm. (ISCC 01), pp ,2001. [4]. R. Agrawal and R. Srikant, Fast Algorithms for Mining Association Rules, Proc. Int l Conf.Very Large Databases(VLDB 94), pp , [5]. K.K.R.G.K. Hewawasam, K. Premaratne, and M.-L. Shyu, Rule Mining and Classification in a Situation Assessment Application: A Belief Theoretic Approach for Handling Data Imperfections, IEEE Trans. Systems, Man, Cybernetics, B, vol. 37, no. 6 pp , Dec [6] Apriori Algorithm Reference URL: et_prog1.html AUTHOR PROFILE M Pradeep is currently pursuing M.Tech in the Department of Computer Science & Engineering, from Nalanda Institute of Technology (NIT), siddharth Nagar, Kantepudi(V), Sattenapalli (M), Guntur (D), Andhra Pradesh, Affiliated to JNTU-KAKINADA. V Nagireddy (M.Tech) working as Assistant Professor at Nalanda Institute of Technology (NIT), siddharth Nagar, Kantepudi(V), Sattenapalli (M), Guntur (D), Andhra Pradesh, Affiliated to JNTU-KAKINADA. 304 P a g e

7 305 P a g e

DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS

DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS Paparao Golusu 1, Nagul Shaik 2 1 M. Tech Scholar (CSE), Nalanda Institute of Tech, (NIT), Siddharth Nagar, Guntur, A.P, (India) 2 Assistant

More information

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao

More information

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

More information

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi

More information

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1

More information

DYNAMIC QUERY FORMS WITH NoSQL

DYNAMIC QUERY FORMS WITH NoSQL IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 7, Jul 2014, 157-162 Impact Journals DYNAMIC QUERY FORMS WITH

More information

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati tnpatil2@gmail.com, ss_sherekar@rediffmail.com

More information

A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India

More information

Exploring Resource Provisioning Cost Models in Cloud Computing

Exploring Resource Provisioning Cost Models in Cloud Computing Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department

More information

Regression model approach to predict missing values in the Excel sheet databases

Regression model approach to predict missing values in the Excel sheet databases Regression model approach to predict missing values in the Excel sheet databases Filling of your missing data is in your hand Z. Mahesh Kumar School of Computer Science & Engineering VIT University Vellore,

More information

Optimization of Image Search from Photo Sharing Websites Using Personal Data

Optimization of Image Search from Photo Sharing Websites Using Personal Data Optimization of Image Search from Photo Sharing Websites Using Personal Data Mr. Naeem Naik Walchand Institute of Technology, Solapur, India Abstract The present research aims at optimizing the image search

More information

Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm

Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*

More information

Role of Social Networking in Marketing using Data Mining

Role of Social Networking in Marketing using Data Mining Role of Social Networking in Marketing using Data Mining Mrs. Saroj Junghare Astt. Professor, Department of Computer Science and Application St. Aloysius College, Jabalpur, Madhya Pradesh, India Abstract:

More information

Decision Trees for Mining Data Streams Based on the Gaussian Approximation

Decision Trees for Mining Data Streams Based on the Gaussian Approximation International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

Search Result Optimization using Annotators

Search Result Optimization using Annotators Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,

More information

A SECURE BALANCING SUPPORT ON CLOUD PANEL DIVISION FOR PUBLIC CLOUDS

A SECURE BALANCING SUPPORT ON CLOUD PANEL DIVISION FOR PUBLIC CLOUDS A SECURE BALANCING SUPPORT ON CLOUD PANEL DIVISION FOR PUBLIC CLOUDS Apparao Settipalli 1, Kunapareddy Rajanidevi 2 1 M.Tech Scholar (CSE), 2 Associate Professor Nalanda Institute of Technology (NIT),

More information

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Bala Kumari P 1, Bercelin Rose Mary W 2 and Devi Mareeswari M 3 1, 2, 3 M.TECH / IT, Dr.Sivanthi Aditanar College

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Email Spam Detection Using Customized SimHash Function

Email Spam Detection Using Customized SimHash Function International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email

More information

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of

More information

Natural Language to Relational Query by Using Parsing Compiler

Natural Language to Relational Query by Using Parsing Compiler Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

An Effective Content Based Web Page Ranking Approach

An Effective Content Based Web Page Ranking Approach An Effective Content Based Web Page Ranking Approach NIDHI SHALYA M.Tech (Computer Science), nidz.cs@hotmail.com SHASHWAT SHUKLA Computer Science Department, shashwatshukla10aug@gmail.com DEEPAK ARORA

More information

CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS

CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS Subbarao Jasti #1, Dr.D.Vasumathi *2 1 Student & Department of CS & JNTU, AP, India 2 Professor & Department

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

Resource Selection in Collaborative Cloud Computing Based on User Preference

Resource Selection in Collaborative Cloud Computing Based on User Preference Resource Selection in Collaborative Cloud Computing Based on User Preference W.Renuka Devi 1, K.Sudhakar 2 P.G Student. Department of Computer Engineering, GPREC Engineering College, Kurnool, Andhra Pradesh,

More information

Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode Value

Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode Value IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode

More information

Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis

Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis Rajesh Reddy Muley 1, Sravani Achanta 2, Prof.S.V.Achutha Rao 3 1 pursuing M.Tech(CSE), Vikas College of Engineering and

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.

More information

Exploring the Efficiency of Big Data Processing with Hadoop MapReduce

Exploring the Efficiency of Big Data Processing with Hadoop MapReduce Exploring the Efficiency of Big Data Processing with Hadoop MapReduce Brian Ye, Anders Ye School of Computer Science and Communication (CSC), Royal Institute of Technology KTH, Stockholm, Sweden Abstract.

More information

A STUDY TO FIND THE FRAUD DETECTION IN ONLINE BY USING THE PRO-ACTIVE METHODOLOGY

A STUDY TO FIND THE FRAUD DETECTION IN ONLINE BY USING THE PRO-ACTIVE METHODOLOGY International Journal of Advance Research In Science And Engineering http:// A STUDY TO FIND THE FRAUD DETECTION IN ONLINE BY USING THE PRO-ACTIVE METHODOLOGY B Brahma Reddy 1, T Lavanya 2 1 M.Tech (CS)

More information

The Data Mining Process

The Data Mining Process Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data

More information

Report on the Train Ticketing System

Report on the Train Ticketing System Report on the Train Ticketing System Author: Zaobo He, Bing Jiang, Zhuojun Duan 1.Introduction... 2 1.1 Intentions... 2 1.2 Background... 2 2. Overview of the Tasks... 3 2.1 Modules of the system... 3

More information

Financial Trading System using Combination of Textual and Numerical Data

Financial Trading System using Combination of Textual and Numerical Data Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,

More information

Ranked Keyword Search in Cloud Computing: An Innovative Approach

Ranked Keyword Search in Cloud Computing: An Innovative Approach International Journal of Computational Engineering Research Vol, 03 Issue, 6 Ranked Keyword Search in Cloud Computing: An Innovative Approach 1, Vimmi Makkar 2, Sandeep Dalal 1, (M.Tech) 2,(Assistant professor)

More information

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device

Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device Gaurav Kumar 1, P. S. Game 2 1 Pune Institute of Computer Technology, Savitribai Phule Pune University, Pune, India

More information

Data sets preparing for Data mining analysis by SQL Horizontal Aggregation

Data sets preparing for Data mining analysis by SQL Horizontal Aggregation Data sets preparing for Data mining analysis by SQL Horizontal Aggregation V.Nikitha 1, P.Jhansi 2, K.Neelima 3, D.Anusha 4 Department Of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU

More information

Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm

Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm

More information

Selection of Optimal Discount of Retail Assortments with Data Mining Approach

Selection of Optimal Discount of Retail Assortments with Data Mining Approach Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.

More information

PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS

PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 8 (October2012) PP: 20-25 PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS Manoj

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries

Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries Kale Sarika Prakash 1, P. M. Joe Prathap 2 1 Research Scholar, Department of Computer Science and Engineering, St. Peters

More information

MULTI LAYERS INTERFERENCE DETECTION SYSTEM IN WEB BASED SERVICES

MULTI LAYERS INTERFERENCE DETECTION SYSTEM IN WEB BASED SERVICES http:// MULTI LAYERS INTERFERENCE DETECTION SYSTEM IN WEB BASED SERVICES Jasti Hima Bindu 1, K. Satya Sandeep 2 1 Pursuing M.tech (IT), 2 Assistant professor, Nalanda Institute of Engineering & Technology,

More information

Distributed Framework for Data Mining As a Service on Private Cloud

Distributed Framework for Data Mining As a Service on Private Cloud RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &

More information

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD Ch. Kousalya Devi 1, B Dada Khalande 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana Bharathi

More information

Mining an Online Auctions Data Warehouse

Mining an Online Auctions Data Warehouse Proceedings of MASPLAS'02 The Mid-Atlantic Student Workshop on Programming Languages and Systems Pace University, April 19, 2002 Mining an Online Auctions Data Warehouse David Ulmer Under the guidance

More information

Handwritten Character Recognition from Bank Cheque

Handwritten Character Recognition from Bank Cheque International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*

More information

Advance Technique for Online Payment Security in E-Commerce : Double Verification

Advance Technique for Online Payment Security in E-Commerce : Double Verification Advance Technique for Online Payment Security in E-Commerce : Double Verification Shilpa Research Scholar Shri Krishan Institute of Engineering & Technology, Kurukshetra University Kurukshetra, India er.shilpa2011@gmail.com

More information

Project Report. 1. Application Scenario

Project Report. 1. Application Scenario Project Report In this report, we briefly introduce the application scenario of association rule mining, give details of apriori algorithm implementation and comment on the mined rules. Also some instructions

More information

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh

More information

MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM

MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan

More information

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

International Journal of Emerging Technology & Research

International Journal of Emerging Technology & Research International Journal of Emerging Technology & Research An Implementation Scheme For Software Project Management With Event-Based Scheduler Using Ant Colony Optimization Roshni Jain 1, Monali Kankariya

More information

ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU

ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Computer Science 14 (2) 2013 http://dx.doi.org/10.7494/csci.2013.14.2.243 Marcin Pietroń Pawe l Russek Kazimierz Wiatr ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Abstract This paper presents

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image

More information

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

DESIGN OF VLSI ARCHITECTURE USING 2D DISCRETE WAVELET TRANSFORM

DESIGN OF VLSI ARCHITECTURE USING 2D DISCRETE WAVELET TRANSFORM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE DESIGN OF VLSI ARCHITECTURE USING 2D DISCRETE WAVELET TRANSFORM Lavanya Pulugu 1, Pathan Osman 2 1 M.Tech Student, Dept of ECE, Nimra

More information

Enhanced Wireless Security System With Digital code lock using RF &GSM Technology

Enhanced Wireless Security System With Digital code lock using RF &GSM Technology ISSN (e): 2250 3005 Vol, 04 Issue, 7 July 2014 International Journal of Computational Engineering Research (IJCER) Enhanced Wireless Security System With Digital code lock using RF &GSM Technology 1 E.Supraja,

More information

Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL

Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL Jasna S MTech Student TKM College of engineering Kollam Manu J Pillai Assistant Professor

More information

Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data

Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data Volume 39 No10, February 2012 Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data Rajesh V Argiddi Assit Prof Department Of Computer Science and Engineering,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Moving Large Data at a Blinding Speed for Critical Business Intelligence. A competitive advantage

Moving Large Data at a Blinding Speed for Critical Business Intelligence. A competitive advantage Moving Large Data at a Blinding Speed for Critical Business Intelligence A competitive advantage Intelligent Data In Real Time How do you detect and stop a Money Laundering transaction just about to take

More information

OPINION MINING IN PRODUCT REVIEW SYSTEM USING BIG DATA TECHNOLOGY HADOOP

OPINION MINING IN PRODUCT REVIEW SYSTEM USING BIG DATA TECHNOLOGY HADOOP OPINION MINING IN PRODUCT REVIEW SYSTEM USING BIG DATA TECHNOLOGY HADOOP 1 KALYANKUMAR B WADDAR, 2 K SRINIVASA 1 P G Student, S.I.T Tumkur, 2 Assistant Professor S.I.T Tumkur Abstract- Product Review System

More information

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence

More information

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet

More information

Enhanced data mining analysis in higher educational system using rough set theory

Enhanced data mining analysis in higher educational system using rough set theory African Journal of Mathematics and Computer Science Research Vol. 2(9), pp. 184-188, October, 2009 Available online at http://www.academicjournals.org/ajmcsr ISSN 2006-9731 2009 Academic Journals Review

More information

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

Survey on Load Rebalancing for Distributed File System in Cloud

Survey on Load Rebalancing for Distributed File System in Cloud Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university

More information

A Survey on Association Rule Mining in Market Basket Analysis

A Survey on Association Rule Mining in Market Basket Analysis International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey

More information

FLAWLESS DISPENSATION PRICING FOR A CLOUD CACHE

FLAWLESS DISPENSATION PRICING FOR A CLOUD CACHE NAKKA G BHAVANI, et al, [IJRSAE] TM Volume 2, Issue 7, PP:, SEPTEMBER 2014. FLAWLESS DISPENSATION PRICING FOR A CLOUD CACHE NAKKA GANGA BHAVANI 1*, N.ANJANEYULU 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial

More information

DATA MINING AND REPORTING IN HEALTHCARE

DATA MINING AND REPORTING IN HEALTHCARE DATA MINING AND REPORTING IN HEALTHCARE Divya Gandhi 1, Pooja Asher 2, Harshada Chaudhari 3 1,2,3 Department of Information Technology, Sardar Patel Institute of Technology, Mumbai,(India) ABSTRACT The

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Efficient Iceberg Query Evaluation for Structured Data using Bitmap Indices

Efficient Iceberg Query Evaluation for Structured Data using Bitmap Indices Proc. of Int. Conf. on Advances in Computer Science, AETACS Efficient Iceberg Query Evaluation for Structured Data using Bitmap Indices Ms.Archana G.Narawade a, Mrs.Vaishali Kolhe b a PG student, D.Y.Patil

More information

Floating Point Fused Add-Subtract and Fused Dot-Product Units

Floating Point Fused Add-Subtract and Fused Dot-Product Units Floating Point Fused Add-Subtract and Fused Dot-Product Units S. Kishor [1], S. P. Prakash [2] PG Scholar (VLSI DESIGN), Department of ECE Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu,

More information

A Survey on Product Aspect Ranking

A Survey on Product Aspect Ranking A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,

More information

Enhanced Boosted Trees Technique for Customer Churn Prediction Model

Enhanced Boosted Trees Technique for Customer Churn Prediction Model IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction

More information

Role of Component Based Systems in Data Mining & Cloud Computing

Role of Component Based Systems in Data Mining & Cloud Computing Role of Component Based Systems in Data Mining & Cloud Computing Rimmy Chuchra 1, Mahak Jindal 2, Bharti Mehta 3 1 Asst.Proff (CSE) & Sri Sai University (SSU),Palampur(HP) 2,3 M.Tech(CSE) & Yadwindra college

More information

A Secure Model for Cloud Computing Based Storage and Retrieval

A Secure Model for Cloud Computing Based Storage and Retrieval IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma

More information

SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD

SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com

More information

COGNITIVE SECURITY SYSTEM BASED ON IMAGE COMPARISON AND MOTION DETECTION WITH ABLE MEMORY USAGE

COGNITIVE SECURITY SYSTEM BASED ON IMAGE COMPARISON AND MOTION DETECTION WITH ABLE MEMORY USAGE COGNITIVE SECURITY SYSTEM BASED ON IMAGE COMPARISON AND MOTION DETECTION WITH ABLE MEMORY USAGE Namratha M., Pradeep, Ramani Sagar V. M. Tech in Software Engineering, Department of Information Science,

More information

Enhanced Model of SQL Injection Detecting and Prevention

Enhanced Model of SQL Injection Detecting and Prevention Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. b_srinio@yahoo.com

More information

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner 24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India

More information

An Effective Analysis of Weblog Files to improve Website Performance

An Effective Analysis of Weblog Files to improve Website Performance An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL

More information

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an

More information

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi

More information

Design and Implementation of 64-Bit RISC Processor for Industry Automation

Design and Implementation of 64-Bit RISC Processor for Industry Automation , pp.427-434 http://dx.doi.org/10.14257/ijunesst.2015.8.1.37 Design and Implementation of 64-Bit RISC Processor for Industry Automation P. Devi Pradeep 1 and D.Srinivasa Rao 2 1,2 Assistant Professor,

More information

A Survey on Web Research for Data Mining

A Survey on Web Research for Data Mining A Survey on Web Research for Data Mining Gaurav Saini 1 gauravhpror@gmail.com 1 Abstract Web mining is the application of data mining techniques to extract knowledge from web data, including web documents,

More information