Clustering Techniques and Hierarchical Distance Measure in Datamining
Review Paper | Journal Paper
Vol.07 , Issue.17 , pp.85-89, May-2019
Abstract
Data mining is extracting information from huge set of data. Clustering is a process of organizing object into unknown group. it deals with finding a structure in a collection of unlabeled data. Similar objects are grouped in one cluster and dissimilar are grouped in another cluster. The documents clustering will aims to group in unsupervised way. Clustering analysis is one of the main logical methods in data mining. Which focuses on the current popular and commonly used k-means algorithm? Clustering can be classified into partition method, hierarchical method, density based method, grid based method, and model based method. In hierarchical method are based on different distance measures. In each type calculate the distance between each data objects and all cluster centers .this paper provides a broad survey of the most basic techniques and identifies.
Key-Words / Index Term
Data mining, Clustering techniques, K-means algorithm ,Hierarchical method, Partition method
References
[1] k.chithra, D.maheswari,”A comparitive study of various clustering algorithms in datamining” (ISSN 2320-088X),vol6,issue.8,auguest 2017
[2] Dhara patel,Ruchi modi and Ketan sarvakar, ”A comparitive study of clustering datamining:techniques and research challenges” (ISSN 2278-2540)vol 3, issue.9,september 2014
[3] S.Mythili,E.Madhiya,”An analysis on clustering algorithms in datamining”(ISSN 2320-088X)vol.3,issue.1,january 2014
[4] Shivangi bhardwaj,”data mining clustering techniques-A review” (ISSDN 2320-088X)vol.6,issue.5,may 2017
[5] Amandeep kaur mann,Navneet kaur,”Survey paper on clustering techniquies”(ISSN:2278-7798)vol.2,issue.4,april2013
[6] Pradeep rai,Shubha singh”A survey of clustering techniques” (0975-8887) vol.7-no.12,october 2010
[7] Aastha joshi,Rajneet kaur”Comparitive study of various clustering techniques in datamining” (ISSN:2277 128X) vol3,issue 3,march 2013
[8] Shraddha K.popat,Emmanuel.M”Review and comparative study of clustering techniques” (ISSN:0975-9646)vol5(1),2014,805-812
Citation
M. Angelin Rosy, D. Shyamala, M. Felix Xavier Muthu, "Clustering Techniques and Hierarchical Distance Measure in Datamining", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.85-89, 2019.
Emerging Applications of Augmented Reality System for Future Industry
Survey Paper | Journal Paper
Vol.07 , Issue.17 , pp.90-95, May-2019
Abstract
Augmented Reality (AR) makes the real-life environment about us into a digital interface by putting virtual objects in real time. It Augmented Reality Apps are software applications which merge the digital visual (audio and other types also) content into the user’s real-world environment. This project focus on the use of desktop display interfaces for applications of augmented reality (AR), there are including the games, education, business, medical, etc. This type of interface, the user is able to look at a screen and see the computer-generated graphics displayed above markers. In AR process overviews of desktop display interface alleviate most of the problems associated with head mounted displays (HMDs). AR applications also require removing real objects from the perceived environment in addition to adding virtual real objects environment
Key-Words / Index Term
Augmented Reality, Computer generated, 3D view, GPS, Construction industry, Education, Environment
References
[1] Andrijana Bocevska and Zoran Kotevski - Implementation of Interactive Augmented Reality In 3d Assembly Design Presentation ,(IJCSIT), Vol9, No 2, April 2017
[2] Application of Augmented Reality Gis In Architecture, Yan Guo a*, Qingyun Du A, Yi Luo a, Weiwei Zhang a, Lu Xu a- Commission V, WG V/2.
[3] Recent Advances In Augmented Reality, Ronald Azuma HRL Laboratories, Yohan Baillot, Reinhold Behringerc -0272-1716/01/$10.00 © 2001 IEEE.
[4] The Pokémon GO Experience: A Location-Based Augmented Reality Mobile Game Goes Mainstream, CHI 2017, May 6–11, 2017, Denver, CO, USA.
[5] New Trends in Using Augmented Reality Apps for Smart City Contexts- ISPRS Int. J. Geo-Inf. 2018, 7, 478.
[6] Recent Developments and Future Challenges in Medical Mixed Reality- Arxiv: 1708.01225v1 [Cs.CV] 3 Aug 201.
Citation
M. Angelin Rosy, L. Umarani, M. Felix Xavier Muthu, "Emerging Applications of Augmented Reality System for Future Industry", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.90-95, 2019.
Internet of Things Based on Arduino Heart Rate Health Care Monitor System
Survey Paper | Journal Paper
Vol.07 , Issue.17 , pp.96-99, May-2019
Abstract
Health care monitoring system is used to patients body temperature and heartbeat by using health care technique. The doctors to test the patients health conditions .In the world spread many diseases for the patients to spread some disease are cancer ,heart attack ,etc… , Many of people are death affecting families, communities and countries. Health care system is organization of the people institution and deliver health care services to meet the health needs of population .The doctor monitoring the system is provided by using delivery machine, blood pressure monitor ,heartbeat sensor .This system is to detect the abnormal conditions . The patient’s heart beat count the abnormal times to check the pulse using sensor monitoring .To circulate the blood in body in active mode or passive mode of the body temperature .In this paper introduce the IOT based health care monitoring system.
Key-Words / Index Term
Internet of things, Body temperature, Heartbeat sensor, Blood pressure monitor, Active mode or Passive mode
References
[1] Heart attack detection by heartbeat sensing using internet of things-e-ISSN:2395-0056p-ISSN:2395-00072 Dr.A.A.Gujara1,Neha A.Sarnaik2.
[2] Wireless sensor network application for IOT based health care system-JETIR(ISSN-2349-5162) Gurram Dheeraj Reddy1,Shashank Chutke2,M.Sri Venkat Rami Reddy3,Dr.D.Nageswara Rao.
[3] A smart patient health monitoring system using iot ISSN-3395(on-line version) 1C.Senthamilarasi,2J.Jansi Rani,3B.Vidhy,4.H.Aritha. http://www.acadpubl.eu/hub
[4] The Application of the Internet of Things in Healthcare Fayez Hussain Alqahtani King Saud University P. O. BOX 2454, Riyadh 11451 Kingdom
[5] IOT Patient Health Monitoring System Ahmed Abdulkadir Ibrahim*, Wang Zhuopeng ISSN : 2248-9622,
Citation
M. Inbavalli, N. Prameela, "Internet of Things Based on Arduino Heart Rate Health Care Monitor System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.96-99, 2019.
Security Issues in the Cloud Computing Environment : An Overview
Research Paper | Journal Paper
Vol.07 , Issue.17 , pp.100-103, May-2019
Abstract
In Cloud Computing environment, Security issues is the hottest topic. Many tools and techniques are applied to secure the data in the cloud server. Although, the security providers focus on data storage of third party at risk to be maintain sensitive information. As the information grows day by day, Security control over the data should be more effective and adaptive to changing risk services. Protection of data manages how data is stored, how it is accessed and how it is handled. Taking lease of many servers and provisioning the resources for usage cost turns to a revolution. This paper reveals the outline of cloud computing, cloud security concepts, challenges and solutions for dynamically securing sensitive data of unlimited resources and services.
Key-Words / Index Term
Cloud Computing, Security Issues, Sensitive Data, Service Providers, Services
References
[1]Dr.P.Madhubala and Dr.P.Thangaraj – “Comprehensive and Comparative Analysis of Cryptographic Solutions in Cloud”, ISSN ONLINE(2320-9801) PRINT(2320-9798).
[2] P. Madhubala, P. Thangaraj, - “Key Generation Policy for Durable Storage in Cloud” - ISSN: 232 7782 1 (Online) Computer Science and Management Studies ¬ International Journal of Advance Research in Volume 3, Issue 2, February 2015.
[3] Charles P. Pfleegar, Shari Lawrence Pfleegar, Jonathan Margulies – “ Security in Computing ”, Fifth edition.
[4] 4 Best cloud Deployment Models – Types and Examples, SAM solutions. Aug 15, 2017.
[5].Subra Kumarasamy, “Introduction to Cloud Security Architecture from a Cloud Consumer’s Perspective”, 2011.
[6] Mohammad Haris, Rafiqul Zaman Khan – A Systematic Review on cloud Computing, International Journal of Computer Sciences and Engineering Open Access, Vol-6, Issue-11, Nov 2018, E-ISSN:2347-2693.
[7] Cloud Computing Security Architecture for IaaS, PaaS, SaaS.
[8]. V. Krishna Reddy, Dr. L.S.S. Reddy – “Security Architecture of Cloud Computing”, International Journal of Engineering Science and Technology (IJEST), ISSN: 0975-5462, Vol 3 No. 9, September 2011
[9]. Varsha, Amit Wadhwa, Swati Gupta, “Study of Security Issues in Cloud computing”, Inernational Journal of Computer Science and Mobile Computing, ISSN 2320-088X, IJCSMC, Vol. 4, Issue 6, June 2015, pg.230-234, Research Article.
[10]. Barrie Sosinsky – “Cloud Computing – Bible”, Book, Wiley India Pvt Ltd.
[11]. Dimitrios Zissis, Dimitrios Lekkas – “Addressing Cloud Computing Security Issues”, Future Generation Computer Systems-ELSEVIER, Vol.28, Issue 8, March-2012, Pages 583-592.
[12]. Thomas Erl, Zaigham Mahmood, Richardo Puttini – “Cloud Computing – Concepts, Technology & Architecture”, Book, Pearson.
[13]. Dr. Kumar Saurabh – “Cloud Computing”, Book, Wiley.
Citation
S. Rajalakshmi, P. Madhubala, "Security Issues in the Cloud Computing Environment : An Overview", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.100-103, 2019.
Social Networks in Organizations with Focus on a Company Management
Research Paper | Journal Paper
Vol.07 , Issue.17 , pp.104-108, May-2019
Abstract
The present research had the objective of analyzes the impacts of social networks in organizations, focusing on a company Management and Outsourcing Services, comparing the views of employees with the director`s view. Whereas that people disclose their personal and professional information freely online, research aimed to analyze the organization`s current situation regarding the use of social networks, by comparing views of different hierarchies, and suggest adjustments that improve the ambient, aiming to optimize the results. The field research methodology was descriptive and quantitative, held through forms completed by employees and interview with director. The flexibility of opinion is essential, and for an appropriate interaction between staff and leadership, the company`s rules need to be concise and well defined. The employee needs to be properly guided on how to use social networks in a way that not denigrate the organization or himself. It is important that these rules be visible and easily accessible to the entire organization and why is extremely important fulfil them.
Key-Words / Index Term
Social networks, Impact, Rules
References
[1]. Adams, P. 2011. Grouped: How small groups of friends are the key to influence on the social web. New Riders
[2]. Almquist, E., & Roberts, K. J. 2000. A ‘Mindshare ‘Manifesto. Mercer Management Journal, 12, 9-20.
[3]. Anderson, C. 2004 The Long Tail: Why the Future of Business is Selling Less of More. Hyperion, New York.
[4]. Ankolekar, A., Krötzsch, M., Tran, T., & Vrandecic, D. 2007. The two cultures: Mashing up Web 2.0 and the Semantic Web. In Proceedings of the 16th international conference on World Wide Web (pp. 825-834). ACM.
[5]. Ardichvili, A., Page, V., & Wentling, T. 2003. Motivation and barriers to participation in virtual knowledge-sharing communities of practice. Journal of knowledge management, 7(1), 64-77.
[6]. Armstrong, A., & Hagel, J. 2000. The real value of online communities.Knowledge and communities, 85-95.
[7]. Arnould, E. J., & Thompson, C. J. 2005. Consumer culture theory (CCT): Twenty years of research. Journal of consumer research, 31(4), 868-882.
[8]. Arvidsson, A. 2004. ‘On the “Pre-History of the Panoptic Sort”: Mobility in Market Research’, Surveillance & Society 1(4): 456–74.
[9]. Arvidsson, A. 2006. Brands, Meaning and Value in Media Culture. Routledge, New York.
[10]. Asur, S., & Huberman, B. A. 2010. Predicting the future with social media. In Web Intelligence and Intelligent Agent Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference on (Vol. 1, pp. 492-499). IEEE.
[11]. Atkinson, J., & Dougherty, D. S. 2006. Alternative media and social justice movements: The development of a resistance performance paradigm of audience analysis. Western Journal of Communication, 70(1), 64-88.
Citation
M. Dukitha, K. Gayathri, "Social Networks in Organizations with Focus on a Company Management", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.104-108, 2019.
Wireless Security Network Using Authentication and Encryption
Research Paper | Journal Paper
Vol.07 , Issue.17 , pp.109-112, May-2019
Abstract
The 21th Century is defined by human scientific breakthroughs. One of them is the global use of the Internet. Almost every educated person nowadays knows more or less about the internet. Thereby, a large percentage of the human populations make use of the internet on a daily basis. Wireless internet access is thereby made affordable and accessible for everyone and that has boosted human communication and economy development into a new era. However, along with benefits, wireless internet access also possesses several risks and threats of security. The Internet has become a fertile land for criminals of all kinds to operate. Most of the time what they try to take is personal information, some of them of extreme values and sensitivity, from naive and unaware users. In that sense, a comprehensive study on how cybercriminal carry out their attacks and how to avoid and actually prevent such attacks if possible would be beneficial for the righteous netizens.
Key-Words / Index Term
Wireless, WLAN, Security, Internet, Protection, Cyber threats
References
[I] Peter Rysavy, "Secure Wireless Networking Using SSL VPNs," Rysavy Research, [© 2005 Aventail Corp. All rights reserved. Aventail Corporation, 808 Howell St., Second Floor, Seattle, WA 98101], Rysavy Research, PO Box 680, Hood River, OR 97031U.S.A., 2005
[2] Robert Whitely, Stan Schatt and Benjamin Gray."SSL Is the Future of Remote Access VPNs," © 1997-2005, Forrester Research, Inc. All rights reserved. Forrester Research, Inc., 400 Technology Square, Cambridge, MA 02139, USA), June, 2004.
[3] Fred Sandsmark, "Securing Wireless Networks," Copyright © 2005 Cisco Systems, Inc. All rights reserved. Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134, USA [iQ Magazine (vil. VI,No. 1)., 2005.
[4] Jupitermedia Headquarters, Jupiter Research, 23 Old Kings Highway South, Darien, CT 06820, 2005.
[5] Scott Robinson, "Strengthen Your Wireless Security By Avoiding These Missteps," Copyright ©2005 CNET Networks, Inc. All rights reserved. TechRepublic, 235 Second Street, San Francisco, CA 94105, 2005.
[6] "End Point Control: Secure Anywhere Access With Reduced Risk And Increased IT Control," © 2004 Aventail Corp. All rights reserved. Aventail Corporation, 808 Howell St., Second Floor, Seattle, WA 98101, 2004.
[7] John R. Vacca, Firewalls : Jumpstart for Network and Systems Administrators, Digital Press, 2004.
[8] John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.
[9] John R. Vacca, The Essential Guide To Storage Area Networks, Prentice Hall, 2002.
[10] John R. Vacca, Wireless Data Demystified (Mcgraw-Hill Demystified Series) (Paperback)s, McGraw-Hill Professional, 2003.
Citation
M. Dukitha, G. Sheeba, "Wireless Security Network Using Authentication and Encryption", International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.109-112, 2019.