首页 > 最新文献

IOSR journal of computer engineering最新文献

英文 中文
Security Issues in Hadoop Associated With Big Data Hadoop与大数据相关的安全问题
Pub Date : 2017-07-01 DOI: 10.9790/0661-1903068085
M. P. Kumar, Sampurnima Pattem
Due to the advent of new technologies, devices, Now-a-days the amount of data produced by mankind is growing rapidly every year. Big data includes huge volume, high velocity, and extensible variety of data. The Big data is in the form of Structured data (Ex: Relational data), unstructured data (Ex: Text, PDF, Word) and Semi Structured data (Ex: XML data). It is really a tedious task to process such data through a traditional database server. Google solved this problem using an algorithm called Map Reduce, used in the technology Hadoop. In this paper we discuss some security issues in Hadoop associated with Big data. Big data applications are very much useful to Organizations, all type of Companies may be small or large scale companies and to the Industries etc.
由于新技术、新设备的出现,如今人类产生的数据量每年都在迅速增长。大数据包括海量、高速、可扩展的各种数据。大数据以结构化数据(例如:关系数据)、非结构化数据(例如:文本、PDF、Word)和半结构化数据(例如:XML数据)的形式存在。通过传统的数据库服务器处理此类数据确实是一项繁琐的任务。谷歌使用一种名为Map Reduce的算法解决了这个问题,该算法在Hadoop技术中使用。在本文中,我们讨论了与大数据相关的Hadoop中的一些安全问题。大数据应用程序对组织非常有用,所有类型的公司可能是小型或大型公司,也可能是工业等。
{"title":"Security Issues in Hadoop Associated With Big Data","authors":"M. P. Kumar, Sampurnima Pattem","doi":"10.9790/0661-1903068085","DOIUrl":"https://doi.org/10.9790/0661-1903068085","url":null,"abstract":"Due to the advent of new technologies, devices, Now-a-days the amount of data produced by mankind is growing rapidly every year. Big data includes huge volume, high velocity, and extensible variety of data. The Big data is in the form of Structured data (Ex: Relational data), unstructured data (Ex: Text, PDF, Word) and Semi Structured data (Ex: XML data). It is really a tedious task to process such data through a traditional database server. Google solved this problem using an algorithm called Map Reduce, used in the technology Hadoop. In this paper we discuss some security issues in Hadoop associated with Big data. Big data applications are very much useful to Organizations, all type of Companies may be small or large scale companies and to the Industries etc.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85430925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Encryption Technique for Secure Password Authentication Scheme at Application Layer 应用层安全密码认证方案的加密技术
Pub Date : 2017-07-01 DOI: 10.9790/0661-1904022325
Poonam Pandey, R. Tyagi, Dr. R. K. Bharti
Password security is the main issue in today’s trends. Everything is based on the internet. For securing our data, files etc. we need password .Password should be secure and safe from third party and it must be safe from shoulder suffering attack, for that purpose we design an authentication scheme at application layer. To secure our password we use AES Encryption technique. This Paper shows the design of effective security issue for password by AES algorithm for encryption and decryption. It is based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of strings and numbers with the 128 bit key which changes for every set of strings.
密码安全是当今趋势的主要问题。一切都基于互联网。为了保护我们的数据,文件等,我们需要密码。密码应该是安全的,安全的第三方,它必须是安全的,从肩膀遭受攻击,为此我们设计了一个认证方案在应用层。为了保护我们的密码,我们使用AES加密技术。本文介绍了采用AES算法对密码进行加解密的有效安全问题的设计。它基于AES密钥扩展,其中加密过程是一组字符串和数字的位智能排他或操作,128位密钥对每组字符串都有变化。
{"title":"Encryption Technique for Secure Password Authentication Scheme at Application Layer","authors":"Poonam Pandey, R. Tyagi, Dr. R. K. Bharti","doi":"10.9790/0661-1904022325","DOIUrl":"https://doi.org/10.9790/0661-1904022325","url":null,"abstract":"Password security is the main issue in today’s trends. Everything is based on the internet. For securing our data, files etc. we need password .Password should be secure and safe from third party and it must be safe from shoulder suffering attack, for that purpose we design an authentication scheme at application layer. To secure our password we use AES Encryption technique. This Paper shows the design of effective security issue for password by AES algorithm for encryption and decryption. It is based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of strings and numbers with the 128 bit key which changes for every set of strings.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89681321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantitative Analysis of Infrastructural Security Concerns in Cloud Computing for Indian SMEs 印度中小企业云计算基础设施安全问题的定量分析
Pub Date : 2017-07-01 DOI: 10.9790/0661-1904023943
Monisha Singh, C. Kumar
SMEs (Small and Medium-size Enterprises) are essential drivers for innovation and growth in India. It is observed that SMEs are picking up the most from cloud computing, as it is a complex and costlier task to set-up and run ICT (Information and Communication Technology) in a traditional way. But, many SMEs generally do not see all the information security risks involved in cloud computing and have to compromise on their data at the end. This paper provides a guidance for SMEs of India about the security aspects of cloud computing. It facilitates the decision making process through the proposal of a taxonomy which highlights the security factors to be considered when evaluating the cloud as a potential solution. The data was collected through a quantitative survey which gave inputs for forming up the taxonomy based on the scenario in India. This paper provides a roadmap to the current and potential stakeholders of cloud who need to ensure security of
中小企业是印度创新和增长的重要驱动力。据观察,中小企业从云计算中获益最多,因为以传统方式建立和运行ICT(信息和通信技术)是一项复杂且成本更高的任务。但是,许多中小企业通常没有看到云计算所涉及的所有信息安全风险,最终不得不在他们的数据上妥协。本文为印度中小企业提供了云计算安全方面的指导。它通过提出一种分类法来促进决策过程,该分类法突出了在将云作为潜在解决方案进行评估时要考虑的安全因素。数据是通过定量调查收集的,该调查为根据印度的情况形成分类提供了输入。本文为需要确保云安全的当前和潜在的云利益相关者提供了路线图
{"title":"A Quantitative Analysis of Infrastructural Security Concerns in Cloud Computing for Indian SMEs","authors":"Monisha Singh, C. Kumar","doi":"10.9790/0661-1904023943","DOIUrl":"https://doi.org/10.9790/0661-1904023943","url":null,"abstract":"SMEs (Small and Medium-size Enterprises) are essential drivers for innovation and growth in India. It is observed that SMEs are picking up the most from cloud computing, as it is a complex and costlier task to set-up and run ICT (Information and Communication Technology) in a traditional way. But, many SMEs generally do not see all the information security risks involved in cloud computing and have to compromise on their data at the end. This paper provides a guidance for SMEs of India about the security aspects of cloud computing. It facilitates the decision making process through the proposal of a taxonomy which highlights the security factors to be considered when evaluating the cloud as a potential solution. The data was collected through a quantitative survey which gave inputs for forming up the taxonomy based on the scenario in India. This paper provides a roadmap to the current and potential stakeholders of cloud who need to ensure security of","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73953892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Structural Damages After Nepal Earthquakes
Pub Date : 2017-07-01 DOI: 10.9790/3021-0706014554
Ibrahim Baran Karasin, Dursun Bakir, M. Ülker, A. E. Ulu
Two destructive earthquakes happened on April 25 and May 12 in Nepal. These earthquakes have been ranked among the most significant ones due to their effects. The earthquakes were felt in many settlements. Nepal earthquakes caused considerable damage to buildings and to public facilities. The first damage assessment of constructions after earthquake has importance in order to prevent loss of life and property in coming earthquakes. In this study the effects of earthquakes on constructions in Nepal have been evaluated. The damages to reinforced-concrete (RC) and masonry structures after earthquake are evaluated and recommendations made in Nepal which is seismically active. The goal of this paper is to introduce major reasons for structural damages after earthquakes. The observed damages overlap with typical earthquake damages. It has been observed that the negative features of constructions have caused an increase in damage extent. The careless selection of the design and construction of structural systems has increased the damage extent.
4月25日和5月12日,尼泊尔发生了两次破坏性地震。这些地震因其影响而被列为最严重的地震之一。许多居民点都有震感。尼泊尔地震对建筑物和公共设施造成相当大的破坏。地震后建筑物的首次损伤评估对于防止未来地震造成的生命财产损失具有重要意义。在这项研究中,地震对尼泊尔建筑的影响进行了评估。对地震活跃地区尼泊尔的钢筋混凝土和砌体结构在地震后的破坏进行了评估,并提出了建议。本文的目的是介绍地震后结构破坏的主要原因。观测到的震害与典型地震震害重叠。已经观察到,建筑物的负面特征导致了破坏程度的增加。结构体系的设计和施工选择不当,增加了结构的破坏程度。
{"title":"The Structural Damages After Nepal Earthquakes","authors":"Ibrahim Baran Karasin, Dursun Bakir, M. Ülker, A. E. Ulu","doi":"10.9790/3021-0706014554","DOIUrl":"https://doi.org/10.9790/3021-0706014554","url":null,"abstract":"Two destructive earthquakes happened on April 25 and May 12 in Nepal. These earthquakes have been ranked among the most significant ones due to their effects. The earthquakes were felt in many settlements. Nepal earthquakes caused considerable damage to buildings and to public facilities. The first damage assessment of constructions after earthquake has importance in order to prevent loss of life and property in coming earthquakes. In this study the effects of earthquakes on constructions in Nepal have been evaluated. The damages to reinforced-concrete (RC) and masonry structures after earthquake are evaluated and recommendations made in Nepal which is seismically active. The goal of this paper is to introduce major reasons for structural damages after earthquakes. The observed damages overlap with typical earthquake damages. It has been observed that the negative features of constructions have caused an increase in damage extent. The careless selection of the design and construction of structural systems has increased the damage extent.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76837752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Laser Technology Improving Wireless Communication: A Comprehensive Study on Laser Communicator 改进无线通信的激光技术:激光通信器的综合研究
Pub Date : 2017-07-01 DOI: 10.9790/0661-1904022633
S. Khanna, K. Sharma
Since the origin of wireless communication it has gained huge popularity and acceptance in the whole world, providing a setup which uses minimum amount of cables for transmission of data. There has been an explosive growth in the wireless communications over the last few decades in its applications cellular telephony, wireless internet and wireless home networking arenas. As we have advanced so has the data processed and transmitted has increased exponentially leading to Big Data problems. The wireless media is now becoming less efficient in handling large amounts of data signaling to a new innovation in communications. This paper is intended to provide the reader with an overview of innovation that has been attained with the help of lasers to transmit sound and also elaborates on how it is being used along with the future developments.
自无线通信的起源以来,它在全世界获得了巨大的普及和接受,提供了一种使用最少电缆传输数据的设置。在过去的几十年里,无线通信在蜂窝电话、无线互联网和无线家庭网络领域的应用有了爆炸式的增长。随着我们的进步,处理和传输的数据呈指数级增长,导致了大数据问题。无线媒体在处理大量数据信号方面的效率越来越低,这是一种新的通信创新。这篇论文的目的是为读者提供了一个创新的概述,已经获得了激光传输声音的帮助,也详细说明了它是如何被使用随着未来的发展。
{"title":"Laser Technology Improving Wireless Communication: A Comprehensive Study on Laser Communicator","authors":"S. Khanna, K. Sharma","doi":"10.9790/0661-1904022633","DOIUrl":"https://doi.org/10.9790/0661-1904022633","url":null,"abstract":"Since the origin of wireless communication it has gained huge popularity and acceptance in the whole world, providing a setup which uses minimum amount of cables for transmission of data. There has been an explosive growth in the wireless communications over the last few decades in its applications cellular telephony, wireless internet and wireless home networking arenas. As we have advanced so has the data processed and transmitted has increased exponentially leading to Big Data problems. The wireless media is now becoming less efficient in handling large amounts of data signaling to a new innovation in communications. This paper is intended to provide the reader with an overview of innovation that has been attained with the help of lasers to transmit sound and also elaborates on how it is being used along with the future developments.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84802705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Text Mining Framework, Methods and Techniques 文本挖掘框架、方法和技术
Pub Date : 2017-07-01 DOI: 10.9790/0661-1904021922
Yugandhara Bapurao Dasri, Bhagyashree Vyankatrao Barde, Nalwade Prakash Shivajirao, A. M. Bainwad
{"title":"Text Mining Framework, Methods and Techniques","authors":"Yugandhara Bapurao Dasri, Bhagyashree Vyankatrao Barde, Nalwade Prakash Shivajirao, A. M. Bainwad","doi":"10.9790/0661-1904021922","DOIUrl":"https://doi.org/10.9790/0661-1904021922","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85379022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Association Rule Mining Algorithm Based on Apriori and Ant Colony approaches 基于Apriori和蚁群方法的改进关联规则挖掘算法
Pub Date : 2017-07-01 DOI: 10.9790/3021-0707011823
Dr.Hussam M. Al Shorman, Dr.Yosef Hasan Jbara
The Knowledge Discovery in Databases (KDD) field of data mining is useful in finding trends, patterns and anomalies in the databases which is helpful to make accurate decisions for the future. Association rule mining is an important topic in data mining field. Association rule mining finds collections of data attributes that are statistically related to the data available. Apriori algorithm generates all significant association rules between items in the database. Besides, ACO algorithms are probabilistic techniques for solving computational problems that are based in finding as good as possible paths through graphs by imitating the ants’ search for food. The use of such techniques has been very successful for several problems. The collaborative use of ACO and DM (the use of ACO algorithms for DM tasks) is a very promising direction. In this paper, based on association rule mining and Apriori algorithm, an improved Ant Colony algorithm is proposed to solve the Frequent Pattern Mining problem. Ant colony algorithm is employed as evolutionary algorithm to optimize the obtained set of association rules produced using Apriori algorithm. The results and comparison of the method is shown at the end of the paper. --------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 11-07-2017 Date of acceptance: 22-07-2017 --------------------------------------------------------------------------------------------------------------------------------------
数据库中的知识发现(Knowledge Discovery in Databases, KDD)是数据挖掘的一个领域,它有助于发现数据库中的趋势、模式和异常,从而为未来做出准确的决策。关联规则挖掘是数据挖掘领域的一个重要课题。关联规则挖掘查找与可用数据在统计上相关的数据属性集合。Apriori算法生成数据库中项目之间所有重要的关联规则。此外,蚁群算法是解决计算问题的概率技术,其基础是通过模仿蚂蚁寻找食物的过程,在图中找到尽可能好的路径。这种技术在解决几个问题方面非常成功。蚁群算法和DM的协同使用(在DM任务中使用蚁群算法)是一个非常有前途的方向。本文在关联规则挖掘和Apriori算法的基础上,提出了一种改进的蚁群算法来解决频繁模式挖掘问题。采用蚁群算法作为进化算法,对Apriori算法生成的关联规则集进行优化。最后给出了方法的结果和比较。-------------------------------------------------------------------------------------------------------------------------------------- 提交日期:11-07-2017验收日期:22-07-2017 --------------------------------------------------------------------------------------------------------------------------------------
{"title":"An Improved Association Rule Mining Algorithm Based on Apriori and Ant Colony approaches","authors":"Dr.Hussam M. Al Shorman, Dr.Yosef Hasan Jbara","doi":"10.9790/3021-0707011823","DOIUrl":"https://doi.org/10.9790/3021-0707011823","url":null,"abstract":"The Knowledge Discovery in Databases (KDD) field of data mining is useful in finding trends, patterns and anomalies in the databases which is helpful to make accurate decisions for the future. Association rule mining is an important topic in data mining field. Association rule mining finds collections of data attributes that are statistically related to the data available. Apriori algorithm generates all significant association rules between items in the database. Besides, ACO algorithms are probabilistic techniques for solving computational problems that are based in finding as good as possible paths through graphs by imitating the ants’ search for food. The use of such techniques has been very successful for several problems. The collaborative use of ACO and DM (the use of ACO algorithms for DM tasks) is a very promising direction. In this paper, based on association rule mining and Apriori algorithm, an improved Ant Colony algorithm is proposed to solve the Frequent Pattern Mining problem. Ant colony algorithm is employed as evolutionary algorithm to optimize the obtained set of association rules produced using Apriori algorithm. The results and comparison of the method is shown at the end of the paper. --------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 11-07-2017 Date of acceptance: 22-07-2017 --------------------------------------------------------------------------------------------------------------------------------------","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78270168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Simulation Investigation over 1680km WDM Transmission System Reviewing NRZ and RZ Modulation Formats 1680km WDM传输系统仿真研究,回顾了NRZ和RZ调制格式
Pub Date : 2017-07-01 DOI: 10.9790/3021-0707010511
A. Gafur
-The investigation of a 16x10Gbps WDM transmission system on 0.8nm channel spacing over 1680km optical link distance with Single Mode Fiber (SMF) is predicted. Two different modulation techniques namely NRZ and RZ are examined. It is analyzed the BER, Q values and eye opening factor for this model using two different modulation formats. The simulation results show the dominance of WDM transmission exploiting NRZ encoding technique for long-haul optical transmission system. It is found that Q penalty is 0.68dB for channel 1 and 0.24dB for channel 8 considering eye diagrams with respect to NRZ and RZ modulation formats.
-预测了在0.8nm信道间距、1680km光链路距离上使用单模光纤(SMF)的16x10Gbps WDM传输系统的研究。研究了两种不同的调制技术,即NRZ和RZ。分析了该模型在两种不同调制格式下的误码率、Q值和开眼系数。仿真结果表明,利用NRZ编码技术的WDM传输在长距离光传输系统中具有优势。考虑到NRZ和RZ调制格式的眼图,信道1的Q损失为0.68dB,信道8的Q损失为0.24dB。
{"title":"Simulation Investigation over 1680km WDM Transmission System Reviewing NRZ and RZ Modulation Formats","authors":"A. Gafur","doi":"10.9790/3021-0707010511","DOIUrl":"https://doi.org/10.9790/3021-0707010511","url":null,"abstract":"-The investigation of a 16x10Gbps WDM transmission system on 0.8nm channel spacing over 1680km optical link distance with Single Mode Fiber (SMF) is predicted. Two different modulation techniques namely NRZ and RZ are examined. It is analyzed the BER, Q values and eye opening factor for this model using two different modulation formats. The simulation results show the dominance of WDM transmission exploiting NRZ encoding technique for long-haul optical transmission system. It is found that Q penalty is 0.68dB for channel 1 and 0.24dB for channel 8 considering eye diagrams with respect to NRZ and RZ modulation formats.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81864615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pattern Discovery and Association Analysis To Identify Customer Vulnerable To HIV/AIDS: Case of Marie Stopes Gonder Branch Clinic 模式发现与关联分析识别易感染HIV/AIDS的顾客:以Marie Stopes Gonder分院为例
Pub Date : 2017-07-01 DOI: 10.9790/0661-1904020107
Fistume Tamene, Fediu Akmel, E. Birhanu, B. Siraj
In the 30 years since HIV/AIDS was first discovered, the disease has become a disturbing pandemic, taking the lives of 30 million people around the world. In 2010 alone, HIV/AIDS killed 1.8 million people, 1.2 million of whom were living in sub-Saharan Africa. In Ethiopia,HIV/AIDS is one of the key challenges for the overall development of Ethiopia, as it has led to a seven-year decrease in life expectancy and a greatly reduced workforce. Even if there are a number of voluntarily counseling and testing centers that work on HIV/AIDS prevention located in several cities of the country, they didn’t change and solve the problem related with HIV/AIDS. In addition in most of Countries counseling and Testing centers ,the data collected is simply put together and maximum used for statics purpose rather than analyzing to discover relevant and interesting previously unknown data characteristics,relationships,dependencies etc . The main objective of this study was pattern discovery and generating interesting hidden association rules from data which is taken from Marie stopes Gondar branch clinic. The contribution of this Study is by analyzing customer’s data that did HIV/AIDS test on the clinic, to identify which customer is more vulnerable to HIV/AIDS. It helps counselors in VCT centers in predicting some hidden but interesting relationships among the attributes they use during the course of counseling. For doing this, methodology such as data collection and tool selection was used. After data was collected, the main data preprocessing tasks are applied on data sets to clean data and to make it ready for experiment purpose. Out of 1992 instances of original data 1861 was made ready for the experiment. Weka3.4. tool is used for experiment and the well known association rule mining algorithm Apriori was used to extract those interesting rules from data. In order to get those interesting rules three basic experiment was conducted .Experiment I was conducted by using the whole data set. Experiment II was conducted by considering only those positive classes. Experiment III was done by only considering those positive classes but with the absence of positive class attribute. One of the result of experiments showed that customers that donot use condom during sexual intercourse and non employed person are vulnerable to HIV/AIDS.
在首次发现艾滋病毒/艾滋病以来的30年里,这种疾病已成为一种令人不安的流行病,夺走了全世界3 000万人的生命。仅在2010年,艾滋病毒/艾滋病就导致180万人死亡,其中120万人生活在撒哈拉以南非洲。在埃塞俄比亚,艾滋病毒/艾滋病是埃塞俄比亚整体发展的主要挑战之一,因为它导致预期寿命减少了7年,劳动力大大减少。即使有一些自愿咨询和检测中心在国内的几个城市从事艾滋病毒/艾滋病的预防工作,他们并没有改变和解决与艾滋病有关的问题。此外,在大多数国家的咨询和测试中心,收集的数据只是简单地放在一起,最大限度地用于统计目的,而不是分析,以发现相关和有趣的以前未知的数据特征,关系,依赖关系等。本研究的主要目的是从Marie stopes Gondar分支诊所的数据中发现模式并生成有趣的隐藏关联规则。本研究的贡献是通过分析在诊所进行HIV/AIDS检测的客户数据,来确定哪些客户更容易感染HIV/AIDS。它帮助VCT中心的咨询师预测他们在咨询过程中使用的属性之间一些隐藏但有趣的关系。为此,使用了数据收集和工具选择等方法。数据采集完成后,主要的数据预处理任务是在数据集上进行数据清洗,为实验做好准备。在1992年的原始数据中,1861年为实验做好了准备。Weka3.4。使用关联规则挖掘算法Apriori从数据中提取出感兴趣的规则。为了得到这些有趣的规律,我们进行了三个基本实验。实验一是利用整个数据集进行的。实验二只考虑那些积极的班级。实验三只考虑那些积极类,不考虑积极类属性。其中一项实验结果表明,在性交过程中不使用避孕套的顾客和非工作人员容易感染艾滋病毒/艾滋病。
{"title":"Pattern Discovery and Association Analysis To Identify Customer Vulnerable To HIV/AIDS: Case of Marie Stopes Gonder Branch Clinic","authors":"Fistume Tamene, Fediu Akmel, E. Birhanu, B. Siraj","doi":"10.9790/0661-1904020107","DOIUrl":"https://doi.org/10.9790/0661-1904020107","url":null,"abstract":"In the 30 years since HIV/AIDS was first discovered, the disease has become a disturbing pandemic, taking the lives of 30 million people around the world. In 2010 alone, HIV/AIDS killed 1.8 million people, 1.2 million of whom were living in sub-Saharan Africa. In Ethiopia,HIV/AIDS is one of the key challenges for the overall development of Ethiopia, as it has led to a seven-year decrease in life expectancy and a greatly reduced workforce. Even if there are a number of voluntarily counseling and testing centers that work on HIV/AIDS prevention located in several cities of the country, they didn’t change and solve the problem related with HIV/AIDS. In addition in most of Countries counseling and Testing centers ,the data collected is simply put together and maximum used for statics purpose rather than analyzing to discover relevant and interesting previously unknown data characteristics,relationships,dependencies etc . The main objective of this study was pattern discovery and generating interesting hidden association rules from data which is taken from Marie stopes Gondar branch clinic. The contribution of this Study is by analyzing customer’s data that did HIV/AIDS test on the clinic, to identify which customer is more vulnerable to HIV/AIDS. It helps counselors in VCT centers in predicting some hidden but interesting relationships among the attributes they use during the course of counseling. For doing this, methodology such as data collection and tool selection was used. After data was collected, the main data preprocessing tasks are applied on data sets to clean data and to make it ready for experiment purpose. Out of 1992 instances of original data 1861 was made ready for the experiment. Weka3.4. tool is used for experiment and the well known association rule mining algorithm Apriori was used to extract those interesting rules from data. In order to get those interesting rules three basic experiment was conducted .Experiment I was conducted by using the whole data set. Experiment II was conducted by considering only those positive classes. Experiment III was done by only considering those positive classes but with the absence of positive class attribute. One of the result of experiments showed that customers that donot use condom during sexual intercourse and non employed person are vulnerable to HIV/AIDS.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75116173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introducing Two Level Verification Model for Reduction of Uncertainty of Message Exchange in Inter Agent Communication in Organizational-Multi-Agent Systems Engineering, O-MaSE 引入降低组织多智能体系统工程中智能体间通信信息交换不确定性的两级验证模型
Pub Date : 2017-07-01 DOI: 10.9790/0661-1904020818
G. K. Shankhdhar, M. Darbari
The last decade has seen tremendous advancements in the field of Multi-Agent Systems. Inter-agent communication is the most integral part of any MAS. The problem of impreciseness and obscurity in agent communication has been swelled with increasing complexity of MAS and deepened with the rise of heterogeneity and diversity in varied platforms of data storage. Another technology with parallel growth is the semantic theory, significantly contributing in providing meaning to expressions thereby reducing ambiguity. The authors here provide two layers of verification of messages. At first, a vocabulary of terms used in messages is constructed with the help of an ontology in OWL to diminish vagueness. Then at a higher level business organization rules contribute to another ontology defining the policies that orchestrate the MAS establishing the domain of organization. The O-MaSE is used as MAS design methodology. In this paper, extension to O-MaSE is provided through dual verification system.
在过去的十年中,多智能体系统领域取得了巨大的进步。agent间通信是任何MAS中最重要的组成部分。agent通信中的不精确和模糊问题随着MAS复杂性的增加而膨胀,随着各种数据存储平台的异构性和多样性的增加而加深。另一种平行增长的技术是语义理论,它在为表达提供意义从而减少歧义方面做出了重大贡献。作者在这里提供了两层消息验证。首先,借助OWL中的本体构建消息中使用的术语词汇表,以减少模糊性。然后,在更高的层次上,业务组织规则为另一个本体做出贡献,该本体定义了协调建立组织领域的MAS的策略。使用O-MaSE作为MAS的设计方法。本文通过双验证系统对O-MaSE进行了扩展。
{"title":"Introducing Two Level Verification Model for Reduction of Uncertainty of Message Exchange in Inter Agent Communication in Organizational-Multi-Agent Systems Engineering, O-MaSE","authors":"G. K. Shankhdhar, M. Darbari","doi":"10.9790/0661-1904020818","DOIUrl":"https://doi.org/10.9790/0661-1904020818","url":null,"abstract":"The last decade has seen tremendous advancements in the field of Multi-Agent Systems. Inter-agent communication is the most integral part of any MAS. The problem of impreciseness and obscurity in agent communication has been swelled with increasing complexity of MAS and deepened with the rise of heterogeneity and diversity in varied platforms of data storage. Another technology with parallel growth is the semantic theory, significantly contributing in providing meaning to expressions thereby reducing ambiguity. The authors here provide two layers of verification of messages. At first, a vocabulary of terms used in messages is constructed with the help of an ontology in OWL to diminish vagueness. Then at a higher level business organization rules contribute to another ontology defining the policies that orchestrate the MAS establishing the domain of organization. The O-MaSE is used as MAS design methodology. In this paper, extension to O-MaSE is provided through dual verification system.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90884862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
IOSR journal of computer engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1