Vol 4 Issue 3 July 2016-September 2016
S. Samarasinghe, M. K. Weerasekara
Abstract: Field of data mining sprinkled across different industries. One of the major concerns available in the healthcare industry right now is the lack of clinical risk assessment tools for different diseases such as breast cancer, diabetes, prostate cancer, lung cancer, heart failures/diseases (cardiac arrest), kidney failure etc. Even though many risk assessment tools are freely available all over the internet, most of them are glaring major omissions. Those tools fails to analyze vital factors related to the specific disease. Hence, this project will address this issue and provide a convenient and reliable risk assessment tool for breast cancer which is introduced as a ‘breast cancer staging’ tool here by. System will also provide an online appointment feature for patients to make appointments to get their various clinical test needs completed.
Keywords: Cancer Prediction, Data Mining, Staging Tool, K Nearest Neighbor.
Title: PREDICTIVE DATA MINING FOR MEDICAL PREDICTION
Author: S. Samarasinghe, M. K. Weerasekara
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Dr. Shankariah, Kalma TMR
Abstract: A Cloud is a virtual asset convenient to install the applications, whereas Cloud Computing is a general term for anything that involves delivering hosted services over the Internet. Open Stack is free open source cloud computing software initially launched by Rackspace and NASA, which aims to close the gap in the lack of a comprehensive cloud platform with a quick development and innovation, and assisted by both an active community of people and large companies. Cloud migration involves migrating the services or applications from live system to the cloud and planning to set up a basic cloud migration for managing load on running Open Stack environment. This presents the methodology of setting up migration in OpenStack Liberty environment. It serves as a reference for migration looking at the possibilities of applying cloud solutions, in order to profit from getting the basics and a view on the different aspects of cloud migration concepts.
Keywords: Cloud migration, Load balancing, Live migration, Static/Offline migration and Liberty.
Title: MIGRATION IN OPENSTACK LIBERTY
Author: Dr. Shankariah, Kalma TMR
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Ms. Anitha S., Ms. Lavanya S.
Abstract: Wireless Sensor Networks (WSNs) provides a new model for sensing and spreading information from different environments, with the possibility to serve numerous and various applications. Wireless sensor network is a collection of various small micro-electro-mechanical devices. These small devices have sensors, capability of computation, supply of power and the wireless transmitter and receiver. Existing schemes are prolonging network lifetime or improving throughput which are not focused on location of wireless devices since wireless devices can change its location there are major disadvantage in clustering the nodes. The proposed process focus on dynamic clustering mechanism for geographic aware multilayer cluster design for energy efficient forwarding node selection, cluster heads rotation and both inter-cluster and intra-cluster geographic routing. To improve throughput, role of cluster head is rotated among various nodes based on threshold levels which reduces the number of dropped packets.
Keywords: Wireless Sensor Networks (WSN), Clustering, Static Cluster, Dynamic Cluster, Network Lifetime.
Title: Geographic-Aware Energy Efficient Forwarding Node Selection for Throughput Improvement in Wireless Sensor Networks
Author: Ms. Anitha S., Ms. Lavanya S.
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Krishnamoorthy Marimuthu, Dr. V.Prasanna Venkatesan
Abstract: An Enterprise Architecture (EA) provides an organization to operate effectively with a well-defined standards and artifacts in achieving its objectives. It maps all of the software development architectures and identifies the organization's Strengths, Weakness and Gaps and provides roadmap components to be used in achieving its mission. The Open Group was formed in mid-90’s and is a vendor – technology neutral consortium with over four hundred member organizations contributing in developing and managing the Industry standards in providing an Industry standard Enterprise Architecture Framework (EAF). The TOGAF (1), its flagship framework emphasizes business goals as architecture drivers and provides a repository of Guidelines, Techniques, Models and Framework. With frameworks like TOGAF provides the Organizations with the guidance on the IT Architecture development, the need has raised to effectively manage IT and to have a professionalized IT architecture to run IT as a business. This has made the Open group's member organization to publish IT4IT (2) - An open standard value chain based Reference Architecture that can add values in managing IT as a Business. This study provides an overview of EA, its Framework and the importance of IT4IT with for executing IT as a business.
Keywords: Enterprise Architecture, TOGAF,ADM, IT4IT.
Title: An overview of The Open Group's Enterprise Architecture and Evolution of IT4IT
Author: Krishnamoorthy Marimuthu, Dr. V.Prasanna Venkatesan
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
A. Praveen
Abstract: In the recent era there are lots of techniques available for the gesture recognition. These gestures were made from hands, facial, eyes etc. Getting a three dimensional pose of the gesture using camera and matching it with a already recorded gesture and meanwhile producing the equivalent voice or text is the technique of gesture recognition. Some of the techniques where skin detection, single hand, double hand, skeletal image detection etc. These techniques were failed due to the inconvenience faced by the individuals of doing difficult poses for communication and the poses weren’t easily absorbed by all. In this paper we are going to propose a new method such that it recognizes the gesture made by our mouth named “MOUTH GESTURE “. And moreover we are going to make this technique useful for the patients who were suffering from VOCAL CORD PARALYSIS, LARYNGECTOMEE, and FUNCTIONAL APHONIA.
Keywords: Mouth gesture, kinect depth camera, video searching of gestures.
Title: A REVIEW ON MOUTH GESTURE RECOGNITION SYSTEM
Author: A. Praveen
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Dashrath Mane, Rajinder Singh Pabla
Abstract: Organizations are generating, processing, and retaining data at a rate that often exceeds their ability to analyse it effectively. The outcomes and results derived from these large data sets helps in decision making and are often key to the success of the organizations. This helps in understand how to solve hard problems and thus gain competitive advantage. It has started being impractical to analyse using traditional offline, read-only relational databases because the data is so voluminous and increasing day by day. New “big data” technologies and architectures, like Hadoop and NoSQL databases, have been introduced to better support the needs of organizations analysing such data. In particular, Elastic search is a way to organize data and make it easily accessible. It is a server based search on Lucene. It is a distributed full-text search engine explicitly addresses issues of scalability, big data search, and performance that relational databases were simply never designed to support. In this paper, I reflect upon my own experience with Elastic search and how it can help organizations to manage their highly voluminous data.
Keyword: Elastic search, Dashboard, TFS (Team Foundation Server), Elastic search index.
Title: Elastic search as Middleware Search Engine for Dashboards
Author: Dashrath Mane, Rajinder Singh Pabla
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Amit Singh, Sonia Arora
Abstract: The enormous content of information available on the World Wide Web makes it important topic for data mining research. Data mining techniques‟s application to the World Wide Web is known as Web mining where this term has been used in three different ways; which are Web Content Mining, Web Structure Mining and Web Usage Mining. Web Mining uses the data mining techniques to automatically discover and extract information from and its usage patterns. Web Crawling, also known as Web spider, an automated indexer, an web documents/services. It is used to discover useful information from the World-Wide Web ant or a Web scutter is a program that browses the world wide web in a systematically, automated manner for indexing the content of web pages and keep the copy of all the pages that it has already visited for later processing. Web crawling is important to collect data for business intelligence, for market research about the services offered by the user and to determine and assess trends in a given market, to collect user behaviour information so that product can perform better and to develop a relevant product with more relevant contents. In my thesis work, I have explore data mining tool RAPIDMINER and showed how the operator of Crawling Web can be simulated into RAPIDMINER and result of Web Crawling can be generated accordingly. In my work, I have also designed an effective Web Search Engine in which we can give the lengthy query which will save the time of the user in searching the query. Web is expending day by day and people generally rely on search engine to explore the web. In such a scenario it is the duty of service provider to provide proper, relevant and quality information to the internet user against their query submitted to the search engine. It is a challenge for service provider to provide proper, relevant and quality information to the internet user by using the web page contents and hyperlink between the web pages.
Keywords: Optimization, RAPIDMINER.
Title: A Prioritized Method of Searching a Keyword (Access over Internet) and Optimization
Author: Amit Singh, Sonia Arora
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Neelam Yadav, Heena Mehta
Abstract: The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this research, we attempt to provide taxonomy of structured P2P overlay networks security attacks. Which ensures the existing network are still a way from the security and their safe working. We have specially focused on the way these attacks can arise at each level of the network. Moreover, We observed that most of the existing systems such as Content Addressable Network (CAN), Chord , Pastry, Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability which lead to disrupt and corrupt their functioning. The idea of this survey was conceived when we were considering how to secure structured P2P overlay networks from security attacks without a central coordination. We are convinced that knowing how systems have failed can help us to build systems that resist to failure. This paper provides an overview of different categories of hierarchical P2P systems and took a major security attacks threatening the function of structured P2P overlay networks. We classified these attacks into two main groups: general network attacks and specific structured P2P network attacks. Both networks are secured but General network are less secured as compared to Specified structured network because of their decentralized nature. For this various Security goals are discussed which provide services how to secure the network at different level. At each level attack is detected and solved at same time by this the data can be secured and safely used. This paper provides a way to handle that problem before it harms to the network. By this the data is made secured from the hacking. I hope that this survey constitutes a good help for security of the network and who’s want to work on this area of research. In light of this study we can affirm that existing structure P2P can be safely utilized and secured from attack.
Keywords: P2P, Structured P2P overlay network, security, CAN, classification.
Title: Sybil Attack
Author: Neelam Yadav, Heena Mehta
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Anshul Vyas, Prof. Varshapriya Jyotinagar
Abstract: In bioinformatics field, sequencing technologies evolving rapidly. And it generates so much unclassified and random data. In the process of analyzing this data, most difficult part is, sequence alignment, where we compare sequence reads with a reference. Over the past two years, so many different algorithms and software has been developed for this purpose. One can use cloud computing for that purpose. We can also go for different algorithms for mapping purpose. After study of different algorithms over different data sets, we can conclude that short-read sequences are not bottleneck for data analysis. With the help of long sequence reads and cloud computing, We can develop much faster and accurate algorithms which can be used by different sequence alignment software.
Keyword: Next generation sequencing, RNA-sequence, tophat, splice junction, Alignment algorithms.
Title: Alignment Algorithms For RNA-Seq
Author: Anshul Vyas, Prof. Varshapriya Jyotinagar
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 3 July 2016-September 2016
Sushil Kumar, Akhilesh Yadav, Ramesh Solanki, Vaishali Gatty
Abstract: This research paper is carried out on mobile apps and their security issues. Most of the users don’t know the risk involved in sharing their personal data with the apps. This research will make awareness in users about risk involved in sharing their personal data and then see the effect of awareness in the users while installing the app.
Keywords: Android Applications, Personal Data.
Title: Pre-emptive Risk Determination for Improved User Experience in Android Applications
Author: Sushil Kumar, Akhilesh Yadav, Ramesh Solanki, Vaishali Gatty
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals