首页 > 最新文献

Women In Research最新文献

英文 中文
Errors Detection in Big Sensor Data on Cloud using Time Efficient Technique 基于时间效率技术的云大传感器数据错误检测
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909071
J. Pansare, V. Bajad
Big sensor data is huge amount of data in both industry and scientific research application in which it generate high quantity of data. Cloud computing provides a special platform to support this challenge as it provides a flexible massive data, storage, and different software services in a scalable manner at low cost. Different technique has been developing in recent years for processing sensor data on cloud, such as sensor-cloud. But, these techniques do not provide efficient support on fast detection and locating of errors in big sensor data. For faster error detection in big sensor data sets, in this system, it develop a novel data error detection approach which gives the full feature of cloud platform and the network feature of Wireless sensor network(WSN). Firstly, it classifies a set of sensor data error types and then defined it. Specifically, in proposed system, the error detection is based on the scale-free network topology and most of detection operations can be conducted in clustered form not a whole big data set.
传感器大数据是指工业和科研应用中产生的海量数据。云计算提供了一个特殊的平台来支持这一挑战,因为它以低成本的可伸缩方式提供了灵活的海量数据、存储和不同的软件服务。近年来,在云上处理传感器数据的技术不断发展,如传感器云。但是,这些技术并不能为大传感器数据中的错误快速检测和定位提供有效的支持。为了对大传感器数据集进行更快的错误检测,本系统开发了一种新的数据错误检测方法,充分发挥了云平台的特点和无线传感器网络(WSN)的网络特性。首先对一组传感器数据误差类型进行分类并进行定义;具体而言,在本文系统中,错误检测基于无标度网络拓扑,并且大多数检测操作可以以聚类形式进行,而不是整个大数据集。
{"title":"Errors Detection in Big Sensor Data on Cloud using Time Efficient Technique","authors":"J. Pansare, V. Bajad","doi":"10.1145/2909067.2909071","DOIUrl":"https://doi.org/10.1145/2909067.2909071","url":null,"abstract":"Big sensor data is huge amount of data in both industry and scientific research application in which it generate high quantity of data. Cloud computing provides a special platform to support this challenge as it provides a flexible massive data, storage, and different software services in a scalable manner at low cost. Different technique has been developing in recent years for processing sensor data on cloud, such as sensor-cloud. But, these techniques do not provide efficient support on fast detection and locating of errors in big sensor data. For faster error detection in big sensor data sets, in this system, it develop a novel data error detection approach which gives the full feature of cloud platform and the network feature of Wireless sensor network(WSN). Firstly, it classifies a set of sensor data error types and then defined it. Specifically, in proposed system, the error detection is based on the scale-free network topology and most of detection operations can be conducted in clustered form not a whole big data set.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image Visualization as per the User Appeal through Deep Learning 通过深度学习实现用户诉求的图像可视化
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909081
Ankit Gandhi, Amarjeet Poonia
Visualization is a term used in the wide area of research to visualize the things as per the human vision. Mostly these terms are used to optimize the data, file format, multimedia format to clarify the concept of human understanding and acceptance in easiest manner. To prove the research in this perspective standard term involved to maintain the quality of work is known as scientific. Scientific visualization emphasises that the research on visualization will be performed as deep learning. Image visualization is mostly used in the medical field for visualization of complex images as per human vision. Sometimes images are visualized as enjoyable, memorable, analysis or for understanding the depth behind the images. Deep learning facilitates visualization of images as per the human vision through inceptions of processed vector/pixels involved in a image. The main motive of visualized image through deep learning is to project an image more attractive as per human vision. Different scientific parameters of computations are involved to process the image as per the user interaction. These parameters sometimes create a dangerous form of image, attractive look of image; deform the image quality through counting inceptions. In this article we analyze the deep learning process in an image visualization to find out the actual parameter to achieve the desired quality of image as per human vision and compute the chaining inceptions to form a new image within the images as meta-images.
可视化是一个广泛用于研究领域的术语,根据人类的视觉将事物可视化。这些术语大多用于优化数据、文件格式、多媒体格式,以最简单的方式阐明人类理解和接受的概念。从这个角度来证明研究所涉及的标准术语,以保持工作的质量被称为科学。科学可视化强调可视化的研究将以深度学习的方式进行。图像可视化主要应用于医学领域,根据人类视觉对复杂图像进行可视化处理。有时图像被可视化为令人愉快的,令人难忘的,分析或理解图像背后的深度。深度学习通过图像中涉及的处理矢量/像素的初始化,促进了图像按照人类视觉的可视化。通过深度学习实现可视化图像的主要目的是投影出更符合人类视觉的图像。根据用户交互的不同,涉及不同的科学计算参数来处理图像。这些参数有时会产生一种危险的图像形式,吸引人的图像外观;通过计数初始变形图像质量。在本文中,我们分析了图像可视化中的深度学习过程,找出了实际参数,以达到人类视觉所需的图像质量,并计算了链接初始值,以在图像中形成一个新的图像作为元图像。
{"title":"Image Visualization as per the User Appeal through Deep Learning","authors":"Ankit Gandhi, Amarjeet Poonia","doi":"10.1145/2909067.2909081","DOIUrl":"https://doi.org/10.1145/2909067.2909081","url":null,"abstract":"Visualization is a term used in the wide area of research to visualize the things as per the human vision. Mostly these terms are used to optimize the data, file format, multimedia format to clarify the concept of human understanding and acceptance in easiest manner. To prove the research in this perspective standard term involved to maintain the quality of work is known as scientific. Scientific visualization emphasises that the research on visualization will be performed as deep learning. Image visualization is mostly used in the medical field for visualization of complex images as per human vision. Sometimes images are visualized as enjoyable, memorable, analysis or for understanding the depth behind the images. Deep learning facilitates visualization of images as per the human vision through inceptions of processed vector/pixels involved in a image. The main motive of visualized image through deep learning is to project an image more attractive as per human vision. Different scientific parameters of computations are involved to process the image as per the user interaction. These parameters sometimes create a dangerous form of image, attractive look of image; deform the image quality through counting inceptions. In this article we analyze the deep learning process in an image visualization to find out the actual parameter to achieve the desired quality of image as per human vision and compute the chaining inceptions to form a new image within the images as meta-images.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133475203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Execution and Analysis of Topology Based Routing Protocols in VANET VANET中基于拓扑的路由协议的执行与分析
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909082
Srishti, S. Yadav
Vehicular Ad Hoc Network (VANET) is the special branch of the Mobile Ad Hoc Network. MANET has un-controlled moving patterns of a number of nodes where as VANET has restricted node movement by factors like a road course, traffic and traffic regulations because VANET is formed mainly by vehicles. VANET is the collection of information on moving vehicles throughout the period of communication. The Routing Protocols are intended to deliver several different service qualities like packet Delivery Ratio, Throughput, Jitter Rate, End to End Delay and Routing Overhead. In this paper, a study on various topology based routing protocols such as DSDV, AODV, DSR and AOMDV in VANET and we are exploiting routing protocols by varying the No. Of nodes and Constant bit rate and then comparing their performances with respect to throughput, end to end delay.
车载自组网(VANET)是移动自组网的一个特殊分支。MANET具有许多节点的不受控制的移动模式,而VANET由于主要由车辆组成,因此受道路路线、交通和交通法规等因素的限制,限制了节点的移动。VANET是在整个通信期间收集移动车辆的信息。路由协议旨在提供几种不同的服务质量,如数据包传送率、吞吐量、抖动率、端到端延迟和路由开销。本文研究了VANET中各种基于拓扑的路由协议,如DSDV、AODV、DSR和AOMDV,并通过改变路由协议的编号来开发路由协议。节点和恒定比特率,然后比较它们的性能方面的吞吐量,端到端延迟。
{"title":"Execution and Analysis of Topology Based Routing Protocols in VANET","authors":"Srishti, S. Yadav","doi":"10.1145/2909067.2909082","DOIUrl":"https://doi.org/10.1145/2909067.2909082","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) is the special branch of the Mobile Ad Hoc Network. MANET has un-controlled moving patterns of a number of nodes where as VANET has restricted node movement by factors like a road course, traffic and traffic regulations because VANET is formed mainly by vehicles. VANET is the collection of information on moving vehicles throughout the period of communication. The Routing Protocols are intended to deliver several different service qualities like packet Delivery Ratio, Throughput, Jitter Rate, End to End Delay and Routing Overhead. In this paper, a study on various topology based routing protocols such as DSDV, AODV, DSR and AOMDV in VANET and we are exploiting routing protocols by varying the No. Of nodes and Constant bit rate and then comparing their performances with respect to throughput, end to end delay.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114438618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computerized Forensic Approach Using Data Mining Techniques 使用数据挖掘技术的计算机取证方法
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909076
Nilakshi Jain, Priyanka Sharma, R. Anchan, Apoorva Bhosale, Pooja Anchan, D. Kalbande
Criminal activities are a manifestation of unseen termites that are slowly but steadily decaying the deep rooted pillars of ethics and values established in our society. The evolving technology can be very well be utilized as arms and ammunitions by the law agencies against this social evil of criminalization. In our paper, we propose a novel and unified approach to examine and investigate digital crimes as well as physical crimes. Our model works on the principle of integrating various computerized forensic tools to analyze the reported digital crime and adopts data mining techniques for detecting crime and predicting the criminal in the case of physical crimes. In the first phase the user registered in the system can file a valid case by entering the details of the crime occurred. Depending on the type of crime the case will be evaluated. For detecting and investigating intruder attacks launched on a user's system, a set of digital tools is used and the generated report is sent to the intended user. In the event of a physical crime, k-means clustering algorithm is used to generate crime clusters. Based on the crime location the clusters are diagrammatically represented on google maps. We have further incorporated the use of Naïve Bayes classification algorithm for predicting the criminals for a particular crime case based on similar crime activities that happened in the past. If no previous record is found then the new crime pattern is added to the existing crime dataset. Our computerized forensic model aids the victim to amicably cooperate with the law agencies and aims to accelerate the process of crime investigation in order to combat rapidly growing criminal activities.
犯罪活动是看不见的白蚁的一种表现,它们正在缓慢但稳步地侵蚀我们社会中建立的根深蒂固的道德和价值观的支柱。法律机构可以很好地利用不断发展的技术作为武器和弹药来对付这种刑事定罪的社会罪恶。在我们的论文中,我们提出了一种新的和统一的方法来检查和调查数字犯罪以及物理犯罪。我们的模型的工作原理是整合各种计算机法医工具来分析所报告的数字犯罪,并在实体犯罪的情况下采用数据挖掘技术来发现犯罪和预测罪犯。在第一阶段,在系统中注册的用户可以通过输入犯罪发生的详细信息来提交有效的案件。根据犯罪的类型对案件进行评估。为了检测和调查在用户系统上发起的入侵者攻击,使用了一组数字工具,并将生成的报告发送给预期用户。在物理犯罪事件中,使用k-means聚类算法生成犯罪聚类。根据犯罪地点,这些集群在谷歌地图上以图表形式表示。我们进一步结合了Naïve贝叶斯分类算法的使用,根据过去发生的类似犯罪活动来预测特定犯罪案件的罪犯。如果没有找到先前的记录,则将新的犯罪模式添加到现有的犯罪数据集中。我们的计算机化法医模型有助于受害者与法律机构友好合作,旨在加快犯罪调查进程,以打击迅速增长的犯罪活动。
{"title":"Computerized Forensic Approach Using Data Mining Techniques","authors":"Nilakshi Jain, Priyanka Sharma, R. Anchan, Apoorva Bhosale, Pooja Anchan, D. Kalbande","doi":"10.1145/2909067.2909076","DOIUrl":"https://doi.org/10.1145/2909067.2909076","url":null,"abstract":"Criminal activities are a manifestation of unseen termites that are slowly but steadily decaying the deep rooted pillars of ethics and values established in our society. The evolving technology can be very well be utilized as arms and ammunitions by the law agencies against this social evil of criminalization. In our paper, we propose a novel and unified approach to examine and investigate digital crimes as well as physical crimes. Our model works on the principle of integrating various computerized forensic tools to analyze the reported digital crime and adopts data mining techniques for detecting crime and predicting the criminal in the case of physical crimes. In the first phase the user registered in the system can file a valid case by entering the details of the crime occurred. Depending on the type of crime the case will be evaluated. For detecting and investigating intruder attacks launched on a user's system, a set of digital tools is used and the generated report is sent to the intended user. In the event of a physical crime, k-means clustering algorithm is used to generate crime clusters. Based on the crime location the clusters are diagrammatically represented on google maps. We have further incorporated the use of Naïve Bayes classification algorithm for predicting the criminals for a particular crime case based on similar crime activities that happened in the past. If no previous record is found then the new crime pattern is added to the existing crime dataset. Our computerized forensic model aids the victim to amicably cooperate with the law agencies and aims to accelerate the process of crime investigation in order to combat rapidly growing criminal activities.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Nearest Neighbor Search Technique Using Keywords and Threshold 基于关键字和阈值的最近邻搜索技术
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909070
P. Shejawal, J. Pansare
Today's applications asking for finding spatial protests nearest to a predefined area in the meantime fulfill limitation of keywords. Best answer for such questions depends on the IR2-tree, which has some inadequacies that truly affect system s efficiency. To defeat those inadequacies another access strategy is produced called the Spatial-inverted Index (SI) that extends the modified file to adapt to multidimensional information, and accompanies calculations that can answer closest neighbor queries with keywords continuously. This new technique SI is produced broadens the capacities of routine modified record makes do with multidimensional information, alongside the arrangement of using so as to move reach queries replied SI results to calculation which tackles the issue continuously.
今天的应用程序要求找到最接近预定区域的空间抗议,同时满足关键字的限制。这些问题的最佳答案取决于ir2树,它有一些真正影响系统效率的不足之处。为了克服这些不足,产生了另一种访问策略,称为空间倒排索引(Spatial-inverted Index, SI),它扩展已修改的文件以适应多维信息,并伴随着可以连续回答带有关键字的最近邻查询的计算。这种新的SI技术的产生拓宽了常规修改记录处理多维信息的能力,并利用排列方式将查询回复SI结果移动到连续处理问题的计算中。
{"title":"Nearest Neighbor Search Technique Using Keywords and Threshold","authors":"P. Shejawal, J. Pansare","doi":"10.1145/2909067.2909070","DOIUrl":"https://doi.org/10.1145/2909067.2909070","url":null,"abstract":"Today's applications asking for finding spatial protests nearest to a predefined area in the meantime fulfill limitation of keywords. Best answer for such questions depends on the IR2-tree, which has some inadequacies that truly affect system s efficiency. To defeat those inadequacies another access strategy is produced called the Spatial-inverted Index (SI) that extends the modified file to adapt to multidimensional information, and accompanies calculations that can answer closest neighbor queries with keywords continuously. This new technique SI is produced broadens the capacities of routine modified record makes do with multidimensional information, alongside the arrangement of using so as to move reach queries replied SI results to calculation which tackles the issue continuously.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Attribute Measures of Network Security Analyzer 网络安全分析器的系统属性度量
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909099
S. Pawar, Nilakshi Jain, Swati Deshpande
In this paper, we have mentioned a method to find the performance of projectwhich detects various web - attacks. The project is capable to identifying and preventing attacks like SQL Injection, Cross -- Site Scripting, URL rewriting, Web server 400 error code etc. The performance of system is detected using the system attributes that are mentioned in this paper. This is also used to determine efficiency of the system.
本文提出了一种检测各种web攻击的项目性能检测方法。该项目能够识别和防止攻击,如SQL注入,跨站脚本,URL重写,Web服务器400错误代码等。利用本文提到的系统属性来检测系统的性能。这也用于确定系统的效率。
{"title":"System Attribute Measures of Network Security Analyzer","authors":"S. Pawar, Nilakshi Jain, Swati Deshpande","doi":"10.1145/2909067.2909099","DOIUrl":"https://doi.org/10.1145/2909067.2909099","url":null,"abstract":"In this paper, we have mentioned a method to find the performance of projectwhich detects various web - attacks. The project is capable to identifying and preventing attacks like SQL Injection, Cross -- Site Scripting, URL rewriting, Web server 400 error code etc. The performance of system is detected using the system attributes that are mentioned in this paper. This is also used to determine efficiency of the system.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"10 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113964433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Punjabi Stop Words: A Gurmukhi, Shahmukhi and Roman Scripted Chronicle 旁遮普停止词:Gurmukhi, Shahmukhi和罗马脚本编年史
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909073
Jasleen Kaur, Jatinderkumar R. Saini
With advent of Unicode encoding, Punjabi language content, written using gurmukhi script as well as in shahmukhi script, is increasing day by day on internet. Processing textual information involves passing it to various pre-processing phases. Stop-word elimination is one such sub phase. 256 Gurmukhi stop words had been identified from poetry, stories and online material and passed to Punjabi stemmer. After stemming, 184 stemmed stop words were generated and these stemmed stop words were passed to transliteration phase. This led to generation of stop words in shahmukhi script. For the first time in scientific community dealing with computational linguistics and literature processing using NLP techniques, the list of 184 stop words of Punjabi language is released for public usage and further NLP applications. The presented list consists of stop words of Punjabi language with their Gurmukhi, Shahmukhi as well as Roman scripted forms.
随着Unicode编码的出现,旁遮普语内容,使用gurmukhi脚本和shahmukhi脚本编写,在互联网上日益增加。文本信息的处理包括将其传递到各种预处理阶段。停止词消除就是这样一个子阶段。256个Gurmukhi停顿词从诗歌、故事和网络材料中被识别出来,并传递给旁遮普语的词干。词干提取后,生成184个词干停止词,这些词干停止词进入音译阶段。这导致了shahmukhi文字中停顿词的产生。在科学界第一次使用NLP技术处理计算语言学和文献处理,旁遮普语184个停止词的列表被发布给公众使用和进一步的NLP应用。所呈现的列表包括旁遮普语的停顿词及其Gurmukhi, Shahmukhi以及罗马脚本形式。
{"title":"Punjabi Stop Words: A Gurmukhi, Shahmukhi and Roman Scripted Chronicle","authors":"Jasleen Kaur, Jatinderkumar R. Saini","doi":"10.1145/2909067.2909073","DOIUrl":"https://doi.org/10.1145/2909067.2909073","url":null,"abstract":"With advent of Unicode encoding, Punjabi language content, written using gurmukhi script as well as in shahmukhi script, is increasing day by day on internet. Processing textual information involves passing it to various pre-processing phases. Stop-word elimination is one such sub phase. 256 Gurmukhi stop words had been identified from poetry, stories and online material and passed to Punjabi stemmer. After stemming, 184 stemmed stop words were generated and these stemmed stop words were passed to transliteration phase. This led to generation of stop words in shahmukhi script. For the first time in scientific community dealing with computational linguistics and literature processing using NLP techniques, the list of 184 stop words of Punjabi language is released for public usage and further NLP applications. The presented list consists of stop words of Punjabi language with their Gurmukhi, Shahmukhi as well as Roman scripted forms.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124133683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set 基于紧凑数据结构的频繁封闭项集挖掘技术综述
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909093
Kamlesh Ahuja, D. Mishra, Sarika Jain
Association discovery finds closely correlate sets so the presence of some components in an exceedingly frequent set can imply the presence of the remaining components (in identical set). Closed item sets are a solution to the problems described above. These are obtained by partitioning the lattice of frequent item sets into equivalence classes according to the following property: two distinct item sets belong the same class if and only if they occur in the same set of transactions. Closed item sets are the collection of maximal item sets of these equivalence classes. This paper proposes a comprehensive survey of the closed item set mining. The concept of the frequent closed item set mining is also elaborated in detail. The modern methods of frequent closed item set mining are also discussed in brief.
关联发现查找密切相关的集合,因此在一个非常频繁的集合中出现某些组件可能意味着(在相同的集合中)存在其余组件。封闭项目集是上述问题的解决方案。这是通过将频繁项目集的格划分为等价类而得到的:当且仅当两个不同的项目集出现在同一交易集中时,它们属于同一类。闭项集是这些等价类的最大项集的集合。本文对封闭项集挖掘进行了全面的综述。详细阐述了频繁封闭项集挖掘的概念。本文还简要讨论了频繁闭项集挖掘的现代方法。
{"title":"A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set","authors":"Kamlesh Ahuja, D. Mishra, Sarika Jain","doi":"10.1145/2909067.2909093","DOIUrl":"https://doi.org/10.1145/2909067.2909093","url":null,"abstract":"Association discovery finds closely correlate sets so the presence of some components in an exceedingly frequent set can imply the presence of the remaining components (in identical set). Closed item sets are a solution to the problems described above. These are obtained by partitioning the lattice of frequent item sets into equivalence classes according to the following property: two distinct item sets belong the same class if and only if they occur in the same set of transactions. Closed item sets are the collection of maximal item sets of these equivalence classes. This paper proposes a comprehensive survey of the closed item set mining. The concept of the frequent closed item set mining is also elaborated in detail. The modern methods of frequent closed item set mining are also discussed in brief.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical relationship between Victim's occupation and their knowledge of Digital Forensic 受害人职业与数字法医知识的实证关系
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909077
Nilakshi Jain, D. Kalbande, Priyanka Sharma
Computer crime also popularly known as Cybercrime has escalated to such a huge extent that it is now posing a threat to various industries, educational universities and professional organizations as well. The law enforcement agencies, police departments and crime branch units have acknowledged the upsurge in digital crime cases and they have begun to deploy measures to curb this evil phenomenon. In this paper, we inspect about the awareness of digital crime among the general public and illustrate an overview of Cybercrime, with the motive of highlighting the necessity to restrain the impact of cybercrime all over the world. This paper examines the rise in number of cybercrimes in India and takes into consideration the analytical traits of the offenders who commit such crimes. The paper banks on the information obtained from different sects of our country. The experimentation results depict that the top four cyber crimes committed in the past few years such as Internet frauds, data theft, cyber piracy and crime sex were all spread across the internet. The output reveals that cyber crime not only encompasses the internet but it has already expanded across all communities worldwide. The soaring crime rate is a major concern as it is indicative of the huge amount of cyber crime cases enrolled in recent years. The objective of this paper is to provide some guidelines to cybercrime analysts, government organizations, and educational universities.
计算机犯罪也被普遍称为网络犯罪已经升级到如此巨大的程度,它现在对各个行业,教育大学和专业组织也构成了威胁。执法机构、警察部门和刑事部门已经认识到数字犯罪案件的激增,并开始采取措施遏制这一邪恶现象。在本文中,我们检查了公众对数字犯罪的认识,并阐述了网络犯罪的概述,目的是强调在世界范围内抑制网络犯罪影响的必要性。本文研究了印度网络犯罪数量的上升,并考虑到罪犯的分析特征。论文汇集了从我国不同教派获得的信息。实验结果显示,过去几年发生的网络诈骗、数据盗窃、网络盗版和性犯罪等四大网络犯罪都是通过互联网传播的。研究结果显示,网络犯罪不仅涉及互联网,而且已经扩展到全球所有社区。飙升的犯罪率是一个令人担忧的主要问题,因为它表明近年来登记的网络犯罪案件数量巨大。本文的目的是为网络犯罪分析人员、政府机构和教育大学提供一些指导方针。
{"title":"Empirical relationship between Victim's occupation and their knowledge of Digital Forensic","authors":"Nilakshi Jain, D. Kalbande, Priyanka Sharma","doi":"10.1145/2909067.2909077","DOIUrl":"https://doi.org/10.1145/2909067.2909077","url":null,"abstract":"Computer crime also popularly known as Cybercrime has escalated to such a huge extent that it is now posing a threat to various industries, educational universities and professional organizations as well. The law enforcement agencies, police departments and crime branch units have acknowledged the upsurge in digital crime cases and they have begun to deploy measures to curb this evil phenomenon. In this paper, we inspect about the awareness of digital crime among the general public and illustrate an overview of Cybercrime, with the motive of highlighting the necessity to restrain the impact of cybercrime all over the world. This paper examines the rise in number of cybercrimes in India and takes into consideration the analytical traits of the offenders who commit such crimes. The paper banks on the information obtained from different sects of our country. The experimentation results depict that the top four cyber crimes committed in the past few years such as Internet frauds, data theft, cyber piracy and crime sex were all spread across the internet. The output reveals that cyber crime not only encompasses the internet but it has already expanded across all communities worldwide. The soaring crime rate is a major concern as it is indicative of the huge amount of cyber crime cases enrolled in recent years. The objective of this paper is to provide some guidelines to cybercrime analysts, government organizations, and educational universities.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122053680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm 采用提出的基于时间集成种子的元素生成密码算法的动态引用数据仓库
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909094
Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, S. Datta, Mallika De
Network Security has become imperative in the contemporary scenario and subsequently an assortment of modus operandi is being espoused to evade it. Network administrators need to adhere with latest advancement in both hardware and software field to prevent user data from malicious intrusions. The formulated paper outlines a cryptographic algorithm based on Time Integrated Seed modus operandi Engendering Elements at bay and focusing on Dynamic Referencing Data Warehouse employing the identical concept amid its functionality. An amalgamation would endow with a proficient and prearranged approach of amassing data with stringent security modus operandi, with effective deployment of all obtainable space. The incorporation of the novel cryptographic algorithm with the Dynamic Referencing Data Warehouse would ensure performance enhancement in course of action. The pertinent employment of the formulated work could be ensured in a variety of organizations where accrual of cosseted data is of extreme enormity, which would include educational organizations, corporate houses, medical establishments, private establishments and so on and so forth.
网络安全已经成为当代场景的当务之急,随后各种各样的操作方式被支持以逃避它。网络管理员需要紧跟硬件和软件领域的最新进展,以防止用户数据受到恶意入侵。本文概述了一种基于时间集成种子操作方式的加密算法,并着重于动态引用数据仓库,在其功能中采用相同的概念。合并将以一种熟练和预先安排的方式,以严格的安全操作方式收集数据,并有效地部署所有可用的空间。将新的加密算法与动态引用数据仓库相结合,可以保证在操作过程中性能的提高。可以确保在各种组织中适当地使用拟定的工作,这些组织中累积的受保护数据极其巨大,包括教育组织、公司、医疗机构、私人机构等等。
{"title":"Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm","authors":"Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, S. Datta, Mallika De","doi":"10.1145/2909067.2909094","DOIUrl":"https://doi.org/10.1145/2909067.2909094","url":null,"abstract":"Network Security has become imperative in the contemporary scenario and subsequently an assortment of modus operandi is being espoused to evade it. Network administrators need to adhere with latest advancement in both hardware and software field to prevent user data from malicious intrusions. The formulated paper outlines a cryptographic algorithm based on Time Integrated Seed modus operandi Engendering Elements at bay and focusing on Dynamic Referencing Data Warehouse employing the identical concept amid its functionality. An amalgamation would endow with a proficient and prearranged approach of amassing data with stringent security modus operandi, with effective deployment of all obtainable space. The incorporation of the novel cryptographic algorithm with the Dynamic Referencing Data Warehouse would ensure performance enhancement in course of action. The pertinent employment of the formulated work could be ensured in a variety of organizations where accrual of cosseted data is of extreme enormity, which would include educational organizations, corporate houses, medical establishments, private establishments and so on and so forth.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Women In Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1