IOSR Journal of Computer Engineering (IOSR-JCE)

Jul - Aug 2017 Volume 19 - Issue 4

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6 Version 7


Paper Type : Research Paper
Title : Effectiveness of transformation from e-Governance to m-Governance of a HEI on its communication services to the stakeholders
Country : India
Authors : E.Ramganesh || E. Kirubakaran || D.Ravindran || R.Gobi
: 10.9790/0661-1904010108     logo

Abstract:As technology has made an unprecedented change in world economy and professional preparation, India is rapidly advancing in the technological space. With the growing population and increasing Smartphone penetration, it is going mobile and digital. Smartphone and internet is not just for the rich and wealthy but more users are becoming informed by getting access of mobile internet. e-Governance is trying its level best to provide e-government services to citizens. But still there is need to reach these services to individual at their doorstep. So the looking at the current mobile age there is need for transforming e-governance services to m-Governance, which promises to bring the "anywhere-anytime-anybody" e-government service vision one step closer. It is in this way that this research intends to address variables that would facilitate the migration to m-governance model in a Higher Education Institution experiencing a very high growth and adoption of mobile communication technology............

Keyword: e-Governance; m-Governance, enabler and communication service. .

[1] Amailef, K. & Lu, J. (2008). M-Government: A framework of mobile-based emergency response systems. 3rd International Conference on Intelligent System and Knowledge Engineering (pp. 1398-1403).
[2] Cao, Y.Z., Lu, Y.B., Gupta, S. and Yang, S.Q. (2015) 'The effects of differences between E-commerce and m-commerce on the consumers' usage transfer from online to mobile Channel', International Journal of Mobile Communications, Vol. 13, No. 1, pp.51–70.
[3] DAVIS, F. D., BAGOZZI, R. P., & WARSHAW, P. R. User acceptance of computer technology: A comparison of two theoretical models. ... Journal of Applied Psychology, 1988, 73, 421-435. , Google Scholar.... Vol 45, Issue 7, 1992.
[4] Eom, S.-J. and Kim, J.H. (2014) 'The adoption of public smartphone applications in Korea: empirical analysis on maturity level and influential factors', Government Information Quarterly, Vol. 31, pp.S26–S36.
[5] Gefen, D, K. Elena and D. Straub, "Trust and TAM in online shopping: An integrated model. Management Information Systems Quarterly", 2003, vol. 1, pp. 51–90


Paper Type : Research Paper
Title : SentiT: A Semi Real Time System for Interpreting Sentiment in Twitter
Country : India
Authors : Dr.G.Krishna Kishore || Kambhampati Dheeraj
: 10.9790/0661-1904010913      logo

Abstract: SentiT is an opinion analysis application for Twitter. Based on the keyword searched, SentiT collects tweets having to do with it , separates and labels them into the different polarity classes neutral, negative and positive , simultaneously we also categorize them into emotions which are anger, disgust, fear, joy, sadness, surprise .Our main objective is to prepare a system that takes real time data from the twitter and come to a conclusion about the opinion on particular product/keyword.

Keywords: Public opinion mining, Social media, Analysis Introduction

[1] Joshi, A.; Balamurali, A. R.; Bhattacharyya, P.; and Mohanty, R. 2011. C-feel-it: a sentiment analyzer for microblogs. In Proceedings of ACL Demo Papers, HLT '11, 127–132
[2] Mukherjee.; Balamurali, A. R.; Bhattacharyya,P.;2012. TwiSent:A Multistage System for Analyzing Sentiment in Twitter
[3] Dietterich, T.G., Ensemble methods in machine learning, in Multiple classifier systems. 2000, Springer. p. 1-15.
[4] F. Morstatter, J. Pfeer, H. Liu, and K. M. Carley. Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose. In Proc. ICWSM, 2013.
[5] Carlo Strapparava and Alessandro Valitutti, "WordNet-Affect: an affective extension of WordNet". In Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC 2004), Lisbon, May 2004, pp. 1083-1086.


Paper Type : Research Paper
Title : A Study on Ontology Based Collaborative Filtering Recommendation Algorithms in E-Commerce Applications
Country : India
Authors : H Mohana || Dr. M Suriakala
: 10.9790/0661-1904011419      logo

Abstract: Recommender system is a growing proliferation in today online applications contributed to the problems of Information overloading. In a day to day life enormous amount of data is generated and collected leads to a problem of information overloading. This paper focuses on how to deal with the problem of information overloading and how to recommend an additional product to the end user using collaborative filtering (CF) recommendation algorithms. The personalized recommendation algorithm with their benefits and limitations are described. A pitfall occurs in CF recommendation system is described. An outline framework is proposed for the initial stage of recommendation...............

Keywords: Web Mining, Collaborative filtering, CF Algorithms, CF Framework, E-Commerce

[1]. Young Sung so, song chul moon. "Frequent pattern to promote sale for selling associated items for recommender in E-Commerce". Indian journal of science and technology. oct 2016, vol9 (38), DOI: 10.17485 /ijst / 2016 / v9i38 / 102552.
[2]. Melville.P, Sindhwani.V 2010. "Recommender Systems" Encyclopedia of Machine Learning. Springer Science & Business Media.
[3]. J. Delgado, N. Ishii. "Memory-based weighted majority prediction. SIGIR Workshop Recomm. Syst. Citeseer, 1999.
[4]. B. Sarwar, G. Karypis, J. Konstan, J. Riedl, Item-based collaborative filtering recommendation algorithms. Proceedings of the 10th International Conference on World Wide Web, ACM. 2001.
[5]. Heng-Ru Zhang, Fan Min. Three-way recommender systems based on random forests. Elsevier, Knowledge-Based Systems. 2016, 91, pp. 275–286..


Paper Type : Research Paper
Title : An Automated Door Control System using Biometric Technology
Country : Nigeria
Authors : J. O. Odiete || A. O. Agbeyangi || O. Olatinwo
: 10.9790/0661-1904012025      logo

Abstract: Biometric technology has been seen as one of the most effective technology for human secured identification systems. In this paper, we present the development of an automated fingerprint-based door control system to address the shortcomings of the manual door control systems. The developed system used fingerprint sensing device and an application to control the whole system. The fingerprint sensing device controls user identification, enrollment and verification while the application provides access to the system. The control application was implemented using C# programming language. The result shows that the system works as expected and scored 89% from the testing metrics used. There are other issues which can be taken as further research.

Keywords: Biometric technology, fingerprint, door automation

[1] A. Jain, R. Bolle and S. Pankanti, Biometrics: personal identification in networked society (Boston: Kluwer Academic Publishers, 1999).
[2] J. D. Woodward, M. Nicholas and P. T. Higgins, Biometrics (Osborne, New York: McGraw Hill, 2003).
[3] H. Kang, Biometric identification system by extracting hand vein patterns, Journal of the Korean Physical Society, 38( 3), 2001, 268-272.
[4] S. Crisan, I. G. Tarnovan and T. E. Crisan , A low cost vein detection system using near infrared radiation, Proc. IEEE Sensors Applications Symposium, San Diego, California, 2007.
[5] S. Pankanti and A. K. Jain, Biometric recognition: security and privacy concerns, IEEE Security and Privacy, 1(2), 2003, pp. 33-42..


Paper Type : Research Paper
Title : Feasible Surfaces of Optimal Utilization and Dynamic Load Balancing of Processors with a Fuzzy Tasks Scheduler for Distributed Real Times Systems
Country : India
Authors : Preet Pal Singh || Dipa Sharma
: 10.9790/0661-1904012633      logo

Abstract: Most researchers concerning real time distributed scheduling assumes constraints to be accurate. However, in many situations the values of these parameters are indistinguishable. The indistinctness of parameters suggests that we make use of fuzzy logics to decide in what order the requests should be executed to make better utilization of systems. In this research, we are taking a fuzzy dynamic load balancing approach. We get the output feasible surfaces of the optimal utilization and load balanced distributed real time systems with the use of fuzzy inferences systems. We analysed the effects of different fuzzy membership functions on the optimal utilization and load balanced surfaces.

Keywords: Fuzzy logic, Membership function, Distributed real time Systems, Load Balancing

[1]. S. Sharma, S. Singh and M. Sharma, "Performance Analysis of Load Balancing Algorithm," World Academy of Sciences, Engineering and Technology, Vol. 38, 2008.
[2]. Z. Xu and R. Huang , "Performance Study of Load Balancing Algorithms in Distributed Web Server Systems" CS213 Parallel and Distributed Processing Project Report.
[3]. R. Motwani, P. Raghavan, "Randomized algorithms," ACM Comput. Surv., Vol.28, pp.33-37,1966.
[4]. P.L. McEntire, J.G. O'Reilly, and R.E. Larson, Distributed Computing: Concepts and Implementations, New York, IEEE Press, 1984.
[5]. W.I. Kim and C.S. Kang, "An adaptive soft handover algorithm for traffic-load shedding in the WCDMA mobile communication system," presented at WCNC'2003, 2003.


Paper Type : Research Paper
Title : Lossy Image Compression Using Wavelet Transform, Polynomial Prediction And Block Truncation Coding
Country : Iraq
Authors : Dr. Ghadah Al-Khafaji || rafaa Ismael Yahya
: 10.9790/0661-1904013438     logo

Abstract: In this paper, a lossy image compression is introduced, it based on utilizing three techniques of wavelet, polynomial prediction and block truncation coding, in which each technique exploited in away according to redundancy presents. The test results shown are promising performance in terms of higher compression performance achieved with lower noticeable error or degradation

[1]. Wallace, G. K. 1992. The JPEG Still Picture Compression Standard. IEEE Transactions on Image Processing, 38(1), xviii-xxxiv.
[2]. Christopoulos, C., Skodras, A. and Ebrahimi, T. 2000. The JPEG2000 Still Image XOSING System: an Overview. IEEE Transactions on Consumer Electronics, 46(4), 1103-1127.
[3]. Taubman, D. and Marcellin, M. 2004. JPEG2000: Image Compression Fundamentals, Standards & Practices. Kluwer Academic Publishers.
[4]. Acharya, T. and Tsai, P. 2004. JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures. John Wiley & Sons, Hoboken, New Jersey.
[5]. Jabbar, S. and Panchikkil, S. 2012. Lossy Image Compression Scheme based on Transforms- A Literature Review on Medical Images. International Journal of Advanced Information Technology (IJAIT), 2(6), 25-31.


Paper Type : Research Paper
Title : Comparison Between Dynamic And Static Blocks In Sequitur Algorithm
Country : Malaysia
Authors : Andysah Putera Utama Siahaan || Solly Aryza || Robbi Rahim || Andre Hasudungan Lubis
: 10.9790/0661-1904013943      logo

Abstract: In the Sequitur algorithm, the compression process is performed based on the number of characters having similar similarities. Similarities will be detected on every syllable in the entire text. Determination of the number of characters to be compared will affect the compression level of this algorithm. Using dynamic or static blocks can optimize the number of compressed characters and of course, it affects the speed of data transmission..

Keywords: Sequitur, Compression, Algorithm, Security

[1]. A. S. Sidhu and M. Garg, "Research Paper on Text Data Compression Algorithm using Hybrid Approach," IJCSMC, vol. 3, no. 12, pp. 1-10, 2014.
[2]. H. Al-Bahadili and S. M. Hussain, "A Bit-level Text Compression Scheme Based on the ACW Algorithm," International Journal of Automation and Computing, pp. 123-131, 2010.
[3]. M. Schindler, "Practical Huffman coding," 1998. [Online]. Available: http://www.compressconsult.com/huffman/.
[4]. C. G. Nevill-Manning and I. H. Witten, "Identifying Hierarchical Structure in Sequences: A Linear-time Algorithm," International Arab Journal of Information Technology, vol. 7, no. 1, pp. 67-82, 1997.
[5]. U. Mahajan and P. C. S. R., "Algorithms for Data Compression in Wireless Computing Systems," International Journal of Computer Science, vol. 10, no. 5, pp. 71-77, 2013.


Paper Type : Research Paper
Title : Glaucoma Detection Using Enhanced K-Strange Points Clustering Algorithm and Classification
Country : India
Authors : Vaishnavi Kamat || Shruti Chatti || Alvira Rodrigues || Chinmayee Shetty || Anusaya Vadji
: 10.9790/0661-1904014449      logo

Abstract: Glaucoma is an eye disorder that majorly affects the optic nerve head in the retina. The damage caused to optic disc leads to gradual loss of peripheral vision which may further result in complete blindness. Glaucoma cannot be cured, hence early and accurate detection is necessary. This paper proposes a method to detect Glaucoma using fundus images. Enhanced K-Strange Points Clustering (EKSTRAP) algorithm is applied to obtain cup, disc and the blood vessels from the Neuro-Retinal Rim (NRR). Further elliptical fitting method is used to compute cup to disc (CDR) ratio. The Inferior-Superior-Nasal-Temporal (ISNT) ratio is obtained using masking. CDR and ISNT are used as inputs to the Naïve Bayes classifier.

Keywords: Cup to Disc Ratio (CDR), Enhanced K-Strange Points Clustering (EKSTRAP), Glaucoma, Inferior, Superior, Nasal, Temporal quadrants (ISNT), Neuro Retinal Rim (NRR)

[1] K.Narasimhan, Dr.K.Vijayarekha, "An efficient automated system for glaucoma detection using fundus image", Journal of Theoretical and Applied Information Technology Vol. 33 No.1, ISSN: 1992-8645, November 2011
[2] Preeti Kailas Suryawanshi: "An approach to glaucoma using image segmentation techniques" International Journal Of Engineering
Sciences & Research Technology 2(9): September, 2013.
[3] Arulmozhivarman Pachiyappan, Undurti N Das, Tatavarti VSP Murthy and Rao Tatavarti, "Automated diagnosis of diabetic retinopathy and glaucoma using fundus and OCT images" Lipids in Health and Disease 2012, 11:73.
[4] Terence Johnson, Dr. Santosh Kumar Singh, "Enhanced K Strange Points Clustering Algorithm", Proceedings of the 2nd International Research Conference on Emerging Information Technology and Engineering Solutions. EITES 2015, 978-1-4799-1838-6/15, IEEE Computer Society Washington, DC USA© 2015 IEEE, DOI 10.1109/EITES.2015.14, indexed in ACM Digital Library, pp 32-37
[5] Gonzalez, R.C. and R.E. Woods, Digital Image Processing. (Reading, Massachusetts: Addison-Wesley, 1992)..


Paper Type : Research Paper
Title : Impact of Operations Research on Computer Science
Country : Saudi Arabia
Authors : Mobin Ahmad
: 10.9790/0661-1904015053      logo

Abstract: Operations research on computers interact in numerous logical fields of imperative significance to our society. These incorporate, among others, transportation, financial matters, speculation procedure, stock control, co ordinations, wellbeing, dependability, urban arranging, and ecology. Computers and Operations Research (COR) gives a global discussion to the application of computers and operations research techniques to issues in these and related fields. The field of mathematics plays essential part in various fields. One of the important areas in mathematics is Operations research which is utilized as a part of basic models..........

Keywords: Operations research, computer science, importance, society, application, techniques, problems, mathematics, models.

[1]. Adam Schenker, Mark Last, horst Banke,Abraham andel,"Clustering of Web documents using a Operations Research", Springer werlog, Septermber 2007.
[2]. Anindya J.Pal, Samar S.Sarma, Biman Ray, "CCTP, Operations Research algorithms – Soft computing Solutions IEEE, 2007
[3]. Bing Hong Liu, Wel Chieh Ke, Chin-Hsien Tsai, Ming-Jer Tsai, "Constructing a message pruning tree with minimum cost for tracking moving objects in wireless sensor networks", IEEE Volume 57, Number 6, July 2008
[4]. Daniel Marx, "Operations Research problems and their applications in scheduling",
[5]. Gian Luca Marcialis, Fabio Roli, Alessandra Serrau, "Operations Research Based and Structural Methods for Fingerprint Classification, Springer verlag, Berlin Heidelberg 2007


Paper Type : Research Paper
Title : Predictive Probabilistic Resource Availability based Cloud Workflow Scheduling (PPRA)
Country : India
Authors : Chitra S || Dr. Prashanth C S R
: 10.9790/0661-1904015463      logo

Abstract: Cloud Computing provides access to a shared pool of computing resources such as servers, storage, computer networks and services, which can be rapidly provisioned and released, for the execution of various scientific and business applications. Scheduling scientific workflows modeled by Directed Acyclic Graphs is an NP complete problem. In cloud environment, there are fluctuations in resource availability due to shared resources and vastly varying workloads. The performance variations in virtual machines, have an impact on task execution times and data transfer times.........

Keywords: Cloud Computing, Directed Acyclic Graphs, Makespan, Resource Availability probability, Scientific Workflows

[1]. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: Vision, hype, and reality for
delivering computing as the 5th utility. Future Generation Computer Systems 2009; 25(6):599–616.
[2]. Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, C´esar A. F. De Rose and Rajkumar Buyya," CloudSim: a toolkit for
modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms",SOFTWARE –
PRACTICE AND EXPERIENCE,Softw. Pract. Exper. 2011; 41:23–50, Published online 24 August 2010 in Wiley Online Library
(wileyonlinelibrary.com). DOI: 10.1002/spe.995
[3]. Cloud Computing Theory and Practice, Dan C. Marinescu, Morgan Kaufmann,Elseiver,2013
[4]. Dan Sullivan,"A Definitive Guide to Cloud Computing",Real Time Publishers
[5]. Maria A. Rodriguez_, Rajkumar Buyya, "A Taxonomy and Survey on Scheduling Algorithms for Scientific Workflows in IaaS
Cloud Computing Environments", CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, Concurrency
Computat.: Pract. Exper. 0000; 00:1–32,Published online in Wiley InterScience (www.interscience.wiley.com). DOI:
10.1002/cpe.4041


Paper Type : Research Paper
Title : An Adaptive Fault Reduction Scheme to Provide Reliable Cloud Computing Environment
Country : India
Authors : M. Damodhar || S. Poojitha
: 10.9790/0661-1904016473      logo

Abstract: The Now a days Cloud technologies has become an essential trend in the market of information technology. Virtualization and Internet-based Cloud computing leads to different kinds of failures to arise and hence, leads to the requirement for reliability and availability has become an essential issue. To make ensure for reliability and availability of cloud technologies, a scheme for fault tolerance need to be developed and implemented. As the majority of the early schemes for fault tolerance were focused on the utilization of only one way to tolerate faults. This paper presents an adaptive scheme that deals with the difficulty of fault tolerance in various cloud computing environments..........

Keywords: Adaptive fine-grained checkpointing(AFC), Cloud technologies, Fault tolerance, replication, virtual machines.

[1] R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality
for delivering computing as the 5th utility, Future Generation Computing Sytems., vol. 25, no. 6, pp. 599–616, Jun. 2009.
[2] M. Chen, Y. Ma, J. Song, C. -F. Lai, and B. Hu, Smart Clothing: Connecting human with clouds and big data for sustainable health
monitoring, Mobile Network Appl., vol. 21, no. 5, pp. 825–845, Oct. 2016.
[3] M. Armbrust et al., Above the clouds: A Berkeley view of cloud computing, Univ. California at Berkeley, Berkeley, CA, USA, Tech.
Rep. UCB/EECS-2009-28. [Online]. Available: http:// www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf


Paper Type : Research Paper
Title : Enhancing Micro-ATMs and POS Terminals Authentication System Using AdvancedBiometric Techniques
Country : India
Authors : Priya Tawde || Dr. G. Prasanna Lakshmi
: 10.9790/0661-1904017477      logo

Abstract: Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of micro-ATM device.The current authentication system uses fingerprint authentication or PIN based authentication method.Biometric features are unique for every individual and hence can be widely used in fusion for enhancing the security system for micro-ATMS and POS terminals.

Keywords: Biometric authentication, Micro-ATM Security, Point of sale terminal biometric authentication.

[1]. S.Koteswari, Dr.P.John Paul: "A Survey: Fusion of Fingerprint and Iris for ATM services",International Research Journal of
Engineering and Technology (IRJET), Volume: 04 Issue: 01 | Jan -2017, e-ISSN: 2395 -0056
[2]. AlirezahFarhang, Hasan Rashidi: "ATM Security based on Fingerprint Biometric and SVM" , International Journal of Computer &
Information Technologies (IJOCIT), February 2016, ISSN = 2345-3877
[3]. S.PadmaPriya: "Biometrics and Fingerprint Payment Technology", International Journal of Advanced Research in Computer
Science & Technology (IJARCST 2017), Vol. 5, Issue 1 (Jan. - Mar. 2017) ISSN : 2347 – 9817
[4]. AnshuPremchand, Anurag Choudhry: "Future of Payments- ePayments", International Journal of Emerging Technology and
Advanced Engineering,ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015
[5]. Mr. Mahesh A. Patil, Mr. Sachin P. Wanere, Mr.RupeshP.Maighane, Mr.AashayR.Tiwari : "ATM Transaction Using Biometric
Fingerprint Technology",International Journal of Electronics, Communication & Soft Computing Science and Engineering, ISSN:
2277-9477, Volume 2, Issue 6, 2012


Paper Type : Research Paper
Title : Bi-Secting K-Means Of Document Clustering For Forensic Analysis of Computer Inspection
Country : India
Authors : Mr. E. YesuBabu || Mr.J. NageswaraRao
: 10.9790/0661-1904017882      logo

Abstract: In most recent couple of decade numerous analysts investigation is anticipated to break down the criminal with that of wrongdoing. It is seen that there is a lot of acceleration in the wrongdoing rate because of the crevice between the ideal use of investigation and advances. In view of this there are numerous new accommodation for the advancement of new strategy and procedures in the field of wrongdoing examination utilizing the strategies built up on information mining, criminological, picture change over, and social mining.The vital part of computerized face off regarding is to enhance the examination of criminal exercises that include assemble, to save, investigate, advanced gadgets and give mechanical and logical statement, and to give the vital approval to experts..........

Keywords: Clustering, far from being obviously true figuring, mining.

[1] J. F. Gantz, D. Reinsel, C. Chute, W. Schlichting, J. McArthur, S. Minton, I. Xheneti, A. Toncheva, and A. Manfrediz, ―The expanding digital universe: A forecast of worldwide information growth through 2010,‖ Inf. Data, vol. 1, pp. 1–21, 2007.
[2] B. S. Everitt, S. Landau, and M. Leese, Cluster Analysis. London, U.K.: Arnold, 2001.
[3] A. K. Jain and R. C. Dubes, Algorithms for Clustering Data .Englewood Cliffs, NJ: Prentice-Hall, 1988.
[4] L. Kaufman and P. Rousseeuw, Finding Groups in Gata: An Introduction to Cluster Analysis. Hoboken, NJ: Wiley -Interscience, 1990.
[5] R. Xu and D. C.Wunsch, II, Clustering. Hoboken, NJ: Wiley/IEEE Press, 2009.


Paper Type : Research Paper
Title : Extracting the Frequent Item Sets by Using Greedy Strategy in Hadoop
Country : India
Authors : Mr. B. Veerendranadh || Mr.M. Naveen Kumar
: 10.9790/0661-1904018390      logo

Abstract: Information mining came into the presence because of mechanical advances in numerous various controls. As it were, every one of the information on the planet are of no incentive without components to proficiently and successfully remove data and learning from them. In contrast with other information mining fields, visit design mining is a generally late improvement. This paper exhibits a novel approach through which the Apriori calculation can be progressed. The adjusted calculation presents elements time devoured in exchanges filtering for competitor itemsets and the quantities of tenets produced are additionally diminished.

Keywords: Apriori, Frequent - itemsets, Minimum Support, Confidence, Greedy Method.

[1] Luca Cagliero and Paolo Garza "Infrequent Weighted Itemset Mining using Frequent Pattern Growth", IEEE Transactions on Knowledge and Data Engineering, pp. 1- 14, 2013.
[2] Xin Li, XuefengZheng, Jingchun Li, Shaojie Wang "Frequent Itemsets Mining in Network Traffic Data", 2012 Fifth International Conference on Intelligent Computation Technology and Automation, pp. 394- 397, 2012.
[3] SoumadipGhosh, SushantaBiswas, DebasreeSarkar, ParthaPratimSarkar "Mining Frequent Itemsets Using Genetic Algorithm", International Journal of Artificial Intelligence & Applications (IJAIA), Vol.1, No.4, pp. 133 – 143, October 2010.
[4] X. Wu, C. Zhang, and S. Zhang "Efficient mining of both positive and negative association rules", ACM Transaction Information System, vol. 22, issue 3, pp. 381–405, 2004.
[5] D. J. Haglin and A. M. Manning "On minimal infrequent itemset mining", In DMIN, pp. 141–147, 2007.


Paper Type : Research Paper
Title : Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage
Country : India
Authors : Mr. B. Gopi Krishna || Mr.B. Siva Rama Krishna
: 10.9790/0661-1904019197      logo

Abstract: Easy access to massive amount of information available on the internet and also availability of information in digital formats has led to an increase in the act of plagiarism. Plagiarism can be found in many fields including novels, scientific papers, art designs and source code. Most cases of plagiarism are found in academia where students often produce plagiarized documents in the form of essays or reports. Plagiarism detection tools and techniques have a large scope in today's world as the widespread use of computers and internet has made it easier to plagiarize the work of others..........

Keywords: Bisecting k-means clustering, Divisive Min-Max clustering, External Plagiarism Detection, Vector space model

[1] Du Zou, Wei-jiang Long, Zhang Ling "A Cluster Based Plagiarism Detection Technique" for PAN , CLEF, 2010.
[2] Johnson, Terence, and Santosh Kumar Singh. "Divisive Hierarchical Bisecting Min–Max Clustering Algorithm." Proceedings of the International Conference on Data Engineering and Communication Technology. Springer Singapore, 2017.
[3] Basile, Chiara, et al. "A plagiarism detection procedure in three steps: Selection, matches and "squares"." Proc. SEPLN. 2009.
[4] Kent, Chow Kok, and Naomie Salim. "Features based text similarity detection." arXiv preprint arXiv:1001.3487 (2010).
[5] Manav Bagai, Vibhanshu, Siddharth Gupta, Rashid Ali. "Text Based Plagiarism Detection".International Journal for Technological Research in Engineerin,Vol 3, April 2016(Pg.1710-1714).


Researcher can also search IOSR published article contents through

IOSR Xplore