A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Nandhini, K.
- Predicting Academic Performance Using Genetic Algorithm and SVM Classifier
Authors
1 Department of Computer Science, Dr. N.G.P. Arts and Science, Coimbatore -48, Tamil Nadu, IN
2 Dr.N.G.P. Arts and Science, Coimbatore -48, Tamil Nadu, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 10 (2010), Pagination: 300-304Abstract
Predicting the performance of a student is a great concern to the higher education managements, where several factors affect the performance. The scope of this paper is to investigate the accuracy of data mining techniques in such an environment. The first step of the study is to gather student’s data and their marks and technical, analytical, communicational and problem solving abilities. We collected records of 200 under graduate students of computer science course, from a private Educational Institution conducting various Under Graduate and Post Graduate courses. The second step is to extract and select the data and choose the relevant attributes for the accuracy using genetic algorithm. Attributes were classified into two groups “Demographic Attributes” and “Performance Attributes”. In the third step, support vector machine algorithms were constructed and their performances were evaluated. This work will help the institute to accurately predict the performance of the students for their growth.Keywords
Decision Tree, Data Mining, Feature Extraction and Selection, Genetic Algorithm, Support Vector Machines.- Feature Selection with Naive Bayes Classifier
Authors
1 Department of Computer Applications, D. J. Academy for Managerial Excellence, Coimbatore-32, Tamilnadu, IN
2 Computer Science Department, Dr. N. G. P. Arts and Science College, Coimbatore-48, Tamilnadu, IN
Source
Data Mining and Knowledge Engineering, Vol 1, No 6 (2009), Pagination: 275-281Abstract
The ability to predicting the performance of a student is very essential task of all educational institutions. This will not be decided by using only the academic excellence of a student. The behaviors such as aptitude, attitude, communications, technological, interpersonally, problem solving ability etc., should be taken into care to predict the real excellence of a student. This form a heterogeneous dataset covering cross section of categorical, integer type data types etc. This has given rise to a high dimensional dataset which will hamper classification process. Since this is the task of prediction and mining the classification algorithms of data mining is used. The decision tree algorithms of classification are one of the fine grained methods to bring the more accuracy of prediction. The first phase of the work is collecting the wide cross section of atabase of values for attributes which are quite cross functional. The second phase plays vital role for effective classification by narrowing down by selection of predictive attributes. This phase is done by Feature Extraction techniques to reduce the high dimensional dataset in to a low dimensional dataset. The third phase applying the algorithms uses the Naive Bayes and tree induction of decision tree methods for actual classification of the data. The scalability of these methods has improved by perception based learning. Also, there is a school of thought that one can take up the classification and data mining without incorporating any Dimensionality reduction techniques like Feature Extraction. This work compare results obtained by the both process and study the performance of the Prediction accuracy. It is not that only the student domain can be used for excellence prediction. It can be applied for any kind of domain.Keywords
Data Mining, Decision Tree, Feature Extraction, Performance Prediction.- Privacy Protection and Interruption Avoidance for Cloud-Based Medical Data Sharing
Authors
1 Department of Computer Applications, S.A. Engineering College, IN
Source
Data Mining and Knowledge Engineering, Vol 11, No 4 (2019), Pagination: 53-56Abstract
In this paper and analyse a behaviour-rule specification-based technique for intrusion detection of medical devices embedded in a Medical Cyber Physical System (MCPS) in which the patient's safety is of the utmost importance. A methodology to transform behaviour rules to a state machine, so that a device that is being monitored for its behaviour can easily be checked against the transformed state machine for deviation from its behaviour specification.
Using vital sign monitor medical devices as an example; In demonstrate that our intrusion detection technique can effectively trade false positives off for a high detection probability to cope with more sophisticated and hidden attackers to support ultra-safe and secure MCPS applications. Moreover, through a comparative analysis, A demonstrate that our behaviour-rule specification-based IDS technique outperforms two existing anomaly-based techniques for detecting abnormal patient behaviours in pervasive healthcare applications.
Keywords
Privacy Protection, Data Sharing, NTRU, Collaborative IDS.References
- Min Chen, Senior Member, IEEE, Yongfeng Qian, Jing Chen,Kai Hwang, Fellow, IEEE, Shiwen Mao, Senior Member, Long Hu ”Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing”2015.
- Garima Dadheech”A privacy protection scheme to transmit medical data from wearable devices to clouds through cloudlets”2018.
- Praveen Kumar Rajendran, B. Muthukumar, G, Nagarajan ”Hybrid intrusion detection system for private cloud: A systematic approach”2015.
- Yue Shi, Sampatoor Abhilash, and Kai Hwang “Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks*”2015.
- K.Abirami and S.Yogalakshmi “Privacy preserved Medical data sharing models for cloud systems”2018.
- M. Quwaider and Y. Jararweh, “Cloudlet-based efficient data collection in wireless body area networks,” Simulation Modelling Practice and Theory, vol. 50, pp. 57–71, 2015.
- M. S. Hossain, “Cloud-supported cyber–physical localization framework for patients monitoring,” 2015.
- K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices for telehome healthcare,” in Engineering in Medicine and Biology Society, 2004. IEMBS’04. 26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387.
- J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit, and D. Georgakopoulos, “A security framework in g-hadoop for big data computing across distributed cloud data centres,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.
- M. S. Hossain and G. Muhammad, “Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring,” Computer Networks, vol. 101, pp. 192–202, 2016.
- R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,” in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 2010, pp. 268–275.
- Huang, D., Zhou, Z., Xu, L., Xing, T., Zhong, Y.: Secure data processing framework for mobile cloud computing. : Proc. of the IEEE Conference on Computer Communications Workshop, Shanghai, pp. 614–618, 2011.
- Anderson, Andres, Yigaw, KassyeYitbarek & Karlsen, Randi, ”Privacy preserving health data processing”, IEEE 16th international conference on e-health networking, applications and services,2014.
- Y. Chen, K. Hwang, and W. S. Ku, “Collaborative Detection of DDoS Attacks over Multiple Network Domains”, IEEE Trans. on Parallel and Distributed Systems, Dec. 2007.
- D. Chen, and Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," IEEE International Conf. Computer Science and Electronics Engineering (ICCSEE), pp. 647-651, March. 2012.