{"title":"SEQUENTIAL PATTERN MINING ALGORITHMS – RECENT TRENDS","authors":"S. Mukherjee","doi":"10.26483/ijarcs.v12i6.6779","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i6.6779","url":null,"abstract":": Sequential pattern mining is a technique of data mining whose objective is to identify statistically relevant patterns within a database with time-related data. It has a wide range of applications in variety of domains like education, healthcare, bioinformatics, web usage mining, telecommunications, intrusion detection etc. At present, most of the real sequence databases are incremental in nature. So there is a need to explore incremental and distributed pattern mining algorithms. Periodic pattern mining is a technique to discover periodic pattern which may be a pattern that repeats itself after a specific time interval. It has a wide range of applications in weather prediction, stock market analysis, web usage recommendation etc. Moreover, uncertain frequent pattern mining has become a popular research domain among researchers, as many real-life databases at present consist of uncertain and incomplete data. In this paper, a novel attempt is made to incorporate a systematic literature review of state-of-the-art techniques of sequential pattern mining which ranges from incremental pattern mining, periodic pattern mining and uncertain frequent pattern mining. Researchers in the field of pattern mining will find it very useful to get the information about various algorithms of different types of pattern mining.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123662615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REENGINEERING OF HUMAN RESOURCE MANAGEMENT PROCESS FOR CONTROL OF STAFF AND THE WAGE BILL IN CAMEROON","authors":"Ghislain Abessolo Alo’o","doi":"10.26483/ijarcs.v12i6.6785","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i6.6785","url":null,"abstract":": Over a number of years, Cameroon has undertaken a number of actions aiming at controlling the wage bill of the civil service. Despite all these efforts and enormous budgets, the country is not always able to achieve this goal. The control of the wage bill and the number of civil servants has become a well-worm subject. Actions that have been undertaken range from the physical census of public officials to computerization operations. This gave rise to the implementation of two software systems, ANTILOPE for the payroll management and SIGIPES for the career profiles processing of public officials. However, many questions still remain in Cameroonian’s minds (1) What is problematic in this management? (2) What is the best way to manage the public expenditure? This work presents a new procedure of staff control management of the Cameroonian civil service. This procedure results from the reengineering of the existing administrative procedures in order to allow each participant of the payroll processing chain to fully play its role for a proximity management, thus guaranteeing the payroll control through the control of staff and skills. In addition, we can aggregate the improvement of the quality of service in the administration and the prospective management of skills and workstations in line with the evolution of the environment. The new state human resources management procedure takes into account the division of administrative work and the role of each administration in the management and control of the state's HR management.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124711881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FUZZY DEFINITION FOR TASKS AND RESOURCES CATEGORIZATION IN SOFTWARE PROJECTS","authors":"W. Ajayi","doi":"10.26483/ijarcs.v12i5.6776","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i5.6776","url":null,"abstract":": Risk in software development process is an event that if allowed to occur can cause a major hazard in the development process and subsequently, deterioration in software quality. Risk reduction has been a major concern to software project stakeholders. A major way of preventing risks is to get the tasks and resource combination / allocation right from onset in software development. Otherwise, it could lead to major bottleneck; one that can either halt project temporarily, extending delivery date or cause a total stoppage of the project. To forestall such occurrence, this work looked into tasks and resources combination for software projects by remodeling the risk identification procedure of an existing risk model (the Riskit model)- introduced by Kontio and Basili. A typical project process to depict the risk identification procedure of the original riskit model was arranged, the risk identification stage was then redesigned and broken down into different parts; the total RAG time (RAG T ) was generated in the process. The main task-resource fuzzification then took place in Part C and project information update took place in Part D of the system. Pointer setting to risky task was estimated from the difficulty level of the task-hours (X t ) and the required resources (X h ) and categorized using trapezoidal membership function in fuzzy logic. The resulting system later named ERAM was compared with Brainstorming and Riskit Analysis Graph technique (BRAG) using runtime and task segments performed by both models. Applying the task –resource combination, the result showed that the original model BRAG took 88 minutes while ERAM generated a faster advisory output in 3 seconds with X t X h coordinate W between 0.9 -1.0. Again, the study revealed that time saving is not the only benefit if resource (X h ) and Task (or task hour (X t )) combination and categorization is properly done. BRAG yearly runtime estimate was 237 hours at overhead cost of ₦3,051,612 while ERAM was 2.6 hours at overhead cost of ₦37,078. The study concluded that ERAM is adequate in speedy classification of software project constituents, early risk identification, reduction in delivery time and cost. Therefore, it is recommended that software risks experts and project managers adopt ERAM to increase speed in risk identification, gain ample time for other project activities and reduced overhead cost .","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"600 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123167646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Allen Llorca, Rosly Rapada, Maryland Dayuta, Mary Anne Perez, John Christopher Raymundo
{"title":"LANGKIWA RIVER WATER DETECTION SYSTEM IMPLEMENTING INTERNET OF EVERYTHING","authors":"Allen Llorca, Rosly Rapada, Maryland Dayuta, Mary Anne Perez, John Christopher Raymundo","doi":"10.26483/ijarcs.v12i4.6751","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i4.6751","url":null,"abstract":"The goal of this study is to establish a structure and test model that will provide communities with information and early flood warning and notification system and information dissemination for the municipalities of Binan City, Laguna particularly in Command Control and Communication Centre (City Disaster Risk Reduction and Management Office). Since the study focuses on the design, development and evaluation of instructional research methods, The study focuses on the design, production and evaluation of teaching systems, procedures and products. With the introduction of the IOE, the Langkiwa river water level detection system is a significant aid to the disaster rescue team of the Binan City local government. It could be a replacement for the municipality's existing manual control scheme. It uses ultrasonic sensor to detect the current situation of the river, and by the power of Arduino microcontroller that serves as the brain of the system that initiates to produce reliable and accurate information, and delivering of messages through GSM modem in a most convenient and fastest way of communication. The proposed project can also be a useful tool for monitoring the impact of global warning, the sudden increase and heavy rain water per year. It keeps the data gathered by the system from the river in database for future study and reference","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121664597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlo A. Batitis, Charlie Antonio, Gerald Arandia, Bon Lynard Canta, Harrold Gueta
{"title":"THERMAL DETECTION SWING GATE TURNSTILE WITH QR CODE APPLICATION","authors":"Carlo A. Batitis, Charlie Antonio, Gerald Arandia, Bon Lynard Canta, Harrold Gueta","doi":"10.26483/ijarcs.v12i4.6754","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i4.6754","url":null,"abstract":"Thermal Detection Swing Gate Turnstile with QR Code Application. An automated health form system could be a big step forward in upgrading and updating the health information system as we enter the new normal way of life. This may assist administrators at all institutions in executing their new standard operating procedures. However, some establishments, unlike others, continue to use a manual approach to implementing health and safety protocols, such as handing out a health declaration form to be filled out, and their information may not be secure, and spreading the virus by giving and using the same pen to all clients who enter the establishment's premises. The Thermal Detection Swing Gate Turnstile with QR Code Application was created to address all of these difficulties. First, a prototype for an automated health form system that may be used by all clients, students, and employees. We made it easier for clients to use our system by including QR codes and RFID readers for students and employees. This will save them time when filling out their health declaration papers, and their data will be considerably safer because we built admin and super admin access so that only authorized persons have access to it.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126130823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlo A. Batitis, Harrold Gueta, Dulce Maria Carla A. Gabatbat, Lloyd Daniel Manansala, Crysthalene Uway
{"title":"SAINT JOHN ACADEMY OF VISUAL AND PERFORMING ARTS STUDENTS AND EMPLOYEES ATTENDANCE MONITORING WITH PAYROLL AND E-BULLETIN USING RFID","authors":"Carlo A. Batitis, Harrold Gueta, Dulce Maria Carla A. Gabatbat, Lloyd Daniel Manansala, Crysthalene Uway","doi":"10.26483/ijarcs.v12i4.6753","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i4.6753","url":null,"abstract":"In this study, RFID is one of the best ways to track the student's in and out. Aside from the convenience, it will benefit both the school and the parent's side by allowing them to monitor and keep track of the student's school activities with a single touch. It is applicable to the employee module. It will reveal their time in and out by tapping the RFID. This will automatically record their attendance and make it easy to compute their income based on the sort of work they have, whether full-time or part-time. If they work full-time, their salary will be determined per day; if they only work part-time, their salary will be computed per hour. If students are coming to Saint John Academy of Visual and Performing Arts, the first thing they must do is enroll and fill out a registration form. Employees must also register if they do not currently have RFID, and administrators will give them with one. They will also be held accountable if a student or employee has an issue with their accounts. Admin may also track their actual time in and out.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131232533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Allen Llorca, Arnan Christian Tan, John Riell Fadrigon, Jefferson Cunanan, John Christian Pacle
{"title":"PLANNING MANAGEMENT AND INVENTORY SYSTEM WITH PREDICTIVE ANALYTICS FOR TECHNOPROBE ASIA PTE LTD (PHIL. BRANCH)","authors":"Allen Llorca, Arnan Christian Tan, John Riell Fadrigon, Jefferson Cunanan, John Christian Pacle","doi":"10.26483/ijarcs.v12i4.6752","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i4.6752","url":null,"abstract":"The purpose of this study is to create a framework in a new company with limited manpower and increased customer’s order planning front to end process is not an easy task, given the fact that the planner needs to account everything before they can commit the delivery date to the customer. The aim of this paper is to help the planner to controls and oversees the exact process of the customer order and account inventory before and after starting the order. This program is designed to control and oversee productions work in process and set priorities depends on customer urgency.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114244728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COMPARATIVE EVALUATION OF MACHINE LEARNING METHODS FOR NETWORK INTRUSION DETECTION SYSTEM","authors":"Sunil Kumar Rajwar","doi":"10.26483/ijarcs.v12i4.6748","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i4.6748","url":null,"abstract":"Cyber security is becoming more sophisticated, and as a result, there is an increasing challenge to accurately detect intrusions. Lack of intrusion prevention can degrade the credibility of security services, namely data confidentiality, integrity and availability. Many intrusion detection methods have been suggested in the literature to address threats to computer security, which can be broadly classified into signature-based intrusion detection (SIDS) and anomaly-based intrusion detection systems. (AIDS). This research presents the contemporary taxonomy of IDS, a comprehensive review of important recent work, and an overview of commonly used datasets for assessment purposes. It also presents detail analysis of different machine learning approach for intrusion detection.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128738443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ATTENDANCE MONITORING AND REMUNERATION WITH ANDROID APPLICATION IMPLEMENTING IOE IN THUMBAYAN FOOD EXPRESS AND MARKETPLACE","authors":"Harrold M. Gueta,","doi":"10.26483/ijarcs.v12i4.6750","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i4.6750","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AYURVEDIC DOSHAS IDENTIFICATION USING FACE AND BODY IMAGE FEATURES","authors":"Sanyam Jain, Tarun Chawla","doi":"10.26483/ijarcs.v12i4.6762","DOIUrl":"https://doi.org/10.26483/ijarcs.v12i4.6762","url":null,"abstract":"Ayurveda is an alternative medicine system with historical roots in India. In Ayurveda, any disease is considered to be caused by the imbalance of various Doshas (Vata, Pitta & Kapha) in human body. In order to diagnose this imbalance of doshas, there are several methods, out of which one is to observe visually the different features of the human body. Body type, skin type, hair type, eyes type, face type, etc possess different characteristics under the influence of various doshas. Hence the idea is to automate this process where we scan a body image using machine learning and deep learning algorithms and classify the different features into different doshas to finally conclude the dominant dosha as result.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115489585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}