{"title":"Relevance of Reaction Surface Strategy and Artificial Neural Network Proposal in Representing and Development of Confession-Suction Procedure","authors":"M. Roberts, C. Vijayakumar, K. Sharmila","doi":"10.20894/ijdmta.102.007.001.002","DOIUrl":"https://doi.org/10.20894/ijdmta.102.007.001.002","url":null,"abstract":"","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131242505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Silhouette Threshold Based Text Clustering for Log Analysis","authors":"J. J","doi":"10.20894/IJDMTA.102.006.001.004","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.004","url":null,"abstract":"- Automated log analysis has been a dominant subject area of interest to both industry and academics alike. The heterogeneous nature of system logs, the disparate sources of logs (Infrastructure, Networks, Databases and Applications) and their underlying structure & formats makes the challenge harder. In this paper I present the less frequently used document clustering techniques to dynamically organize real time log events (e.g. Errors, warnings) to specific categories that are pre-built from a corpus of log archives. This kind of syntactic log categorization can be exploited for automatic log monitoring, priority flagging and dynamic solution recommendation systems. I propose practical strategies to cluster and correlate high volume log archives and high velocity real time log events; both in terms of solution quality and computational efficiency. First I compare two traditional partitional document clustering approaches to categorize high dimensional log corpus. In order to select a suitable model for our problem, Entropy, Purity and Silhouette Index are used to evaluate these different learning approaches. Then I propose computationally efficient approaches to generate vector space model for the real time log events. Then to dynamically relate them to the categories from the corpus, I suggest the use of a combination of critical distance measure and least distance approach. In addition, I introduce and evaluate three different critical distance measures to ascertain if the real time event belongs to a totally new category that is unobserved in the corpus.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Multi Keyword Search Methods over Encrypted Data in Single Cloud Environment","authors":"S. Devi, V. Senthilkumar","doi":"10.20894/IJDMTA.102.006.001.002","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.002","url":null,"abstract":"- Cloud computing [11] is a tremendous growth in every years and it can be utility the computing and large storage capability to the public users. The data owner can store the data in the cloud server is called data outsourcing and then the cloud data access for public users through the cloud server. The outsourced data are contains sensitive privacy information and it can be encrypted before uploaded to the cloud server and then the search user can access to the data through the cloud server is some difficulty of searching over the encrypted data in cloud. In this paper address this problem by developed the fine-grained multi-keyword search scheme over encrypted data in the cloud. There are three contribution of this paper. First one is, to provided relevance scores and preference factors upon keywords which enabled the precise keyword search. Second one is, to developed a complicated logic search the mixed AND, OR and NO operations of multi-keyword search scheme. And finally, auxiliary employ the classified sub-dictionaries technique to accomplish the index building, trapdoor generating and query. By using this experiments to the real-world dataset, so easily retrieve the result from dataset.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116327119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grey Wolf Optimizer Based Web usage Data Clustering with Enhanced Fuzzy C Means Algorithm","authors":"P. Selvaraju, B. Kalaavathi","doi":"10.20894/IJDMTA.102.006.001.003","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.003","url":null,"abstract":"Recommendation system plays a major role in web mining and it is applied to many applications such as ecommerce, e-government and e-library. The key challenges of recommendation system is to recommend the users based on their interest among more visitors and huge information. To make this challenge effective, there is a need for clustering algorithm to handle the data. Hence, this research focused on designing effective clustering algorithm to apply it in ecommerce applications. The grey wolf optimization based clustering is proposed to make an efficient clustering method for grouping the users based on their interest. To find the effective clustering, proposed a grey wolf optimization based fuzzy clustering algorithm, and made a comparison on Fuzzy C Means (FCM) based Genetic Algorithm (GA), Entropy based FCM and Improved Genetic FCM (FCM-GA). The experimental results proves that it performs better than traditional algorithms, at the same time the quality is improved.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"648 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Quasi Regular Ring","authors":"Shrooq Bahjat Smeein","doi":"10.20894/IJDMTA.102.006.001.007","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.007","url":null,"abstract":"- Let R be a commutative ring with unity. In this paper we introduce and study Fuzzy Quasi regular ring as generalizations of (ordinary) Quasi regular ring. We give some basic properties about these concepts.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127145977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Cryptographic Approach for Privacy Preserving in Big Data Analysis for Sensitive Data","authors":"K. Sujatha, N. Rajesh, Udayarani","doi":"10.20894/IJDMTA.102.006.001.006","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.006","url":null,"abstract":"","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124706999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Functions and Cyclic Group in Calculated Questions Moodle 3.2","authors":"R. RanjithKumarK, A. NaseerAhmed","doi":"10.20894/IJDMTA.102.006.001.008","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.008","url":null,"abstract":"— In modern days, assessment methods are designed in online to enhance its effectiveness among students as well as staff members of the institution. The Learning Management System (LMS) plays a vital role of conducting the assessments through online. This paper discusses the need to have an efficient and systematic usage of LMS, in particular Moodle, for improving the existing assessment methods of mathematics curriculum. Also, various question types which are used to overcome the disadvantages of classical assessment methods, are highlighted and described in detail. The working methodology of such question types in Moodle is explained by using the properties of functions and cyclic groups.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on E-Learning System with Data Mining","authors":"Bhagyalakshmi Aechham, P. Govindarajulu","doi":"10.20894/IJDMTA.102.006.001.001","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.006.001.001","url":null,"abstract":"E-learning process has been widely used in university campus and educational institutions are playing vital role to enhance the skill set of students. Modern E-learning done by many electronic devices, such as smartphones, Tabs, and so on, on existing E-learning tools is insufficient to achieve the purpose of online training of education. This paper presents a survey of online e-Learning authoring tools for creating and integrating reusable e-learning tool for generation and enhancing existing learning resources with them. The work concentrates on evaluation of the existing e-learning tools a, and authoring tools that have shown good performance in the past for online learners. This survey work takes more than 20 online tools that deal with the educational sector mechanism, for the purpose of observations, and the outcome were analyzed. The findings of this paper are the main reason for developing a new tool, and it shows that educators can enhance existing learning resources by adding","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116847898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Mining @ Information Age","authors":"M. Arunmozhi, R. Usha","doi":"10.20894/IJDMTA.102.005.002.012","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.005.002.012","url":null,"abstract":"In the information age, data turns to be the vital. Hence it is important to understand the data in order to face the future information challenges. This paper deals with the importance of data mining while explaining the concepts and life cycle involved. It extracts the basic gist of the topic presented in a user-friendly way. Further, in developing different stages of data mining followed by its extended application usage in practical business platform.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127595206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding influential healthcare interventions of different socio-economically and educationally segmented regions by using data mining techniques: case study on nine high focus states of India","authors":"P. Saha, U. K. Banerjee","doi":"10.20894/IJDMTA.102.005.002.013","DOIUrl":"https://doi.org/10.20894/IJDMTA.102.005.002.013","url":null,"abstract":"- United Nations at Millennium Summit 2000 made targets on Under-five Mortality Ratio (U5MR) and Maternal Mortality Ratio (MMR) for improving health condition of mothers and children. Though India did not be able to achieve those targets but have improved significantly. Aim of the study is to find out influential healthcare interventions of socio-economically and educationally different regions which have high impact on their HIs. At resource constrained condition, strategic evidence based planning will help healthcare department to reduce inequity in HIs among different regions. Data of different HIs has been collected from Family Welfare Statistics of India 2012 and healthcare interventions have been collected from District Level Household Survey 3. 192 districts from ‘Nine High Focus States of India’ have been used as case study area in this research work. Both hierarchical and k-means, clustering techniques have been used for segmenting 192 districts based on their socio-economic and educational status and decision tree classification technique has been used for building relationship model for each segment. Total six decision tree classifiers have been developed for identifying most influential interventions on Infant Mortality Rate (IMR) and U5MR. From this work it has become clear that impact of healthcare interventions on healthcare indicators varies from region to region. In hilly regions, adolescent interventions had more impact on U5MR and IMR than child age interventions.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115614030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}