A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Deepa Shenoy, P.
- Dynamic Traffic Splitting in a Multi-Radio Multi-Hop Network
Authors
1 Department of CSE, University Visvesvaraya College of Engineering, Bangalore, IN
2 University Visvesvaraya College of Engineering, Bangalore, IN
3 Indian Institute of Science, Bangalore, IN
Source
Networking and Communication Engineering, Vol 6, No 3 (2014), Pagination: 85-92Abstract
WiFi and WiMAX are two popular wireless standards, where WiFi is a wireless LAN standard and WiMAX is a wireless MAN standard. WiFi (IEEE 802.11) provides coverage of few hundred feet whereas WiMAX (IEEE 802.16) covers a range of upto 40 miles. Nowadays multiple radios are equipped within a single device. One way to achieve high performance in a network consisting of such multi-radio devices is by splitting traffic over the multiple radios. Research work has shown that traffic splitting has a positive impact on network throughput. In this work, our objective is to split the data traffic dynamically in an ad-hoc network with such hybrid nodes equipped with WiFi and WiMAX radios. We have used Bee-Hive Routing Protocol to make routing decisions in the network and analyze the effect of traffic splitting on network throughput.Keywords
Bee-Hive Routing Protocol, Dynamic Traffic Splitting, Hybrid Node, LAN, MAN, WiFi, WiMAX.- Ensemble PHOG and SIFT Features Extraction Techniques to Classify High Resolution Satellite Images
Authors
1 Department of MCA, Dr Ambedkar Institute of Technology, Bangalore, IN
2 Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore, IN
3 University Visvesvaraya College of Engineering, Bangalore University, Bangalore, IN
4 Indian Institute of Science, Bangalore, IN
Source
Data Mining and Knowledge Engineering, Vol 6, No 5 (2014), Pagination: 199-206Abstract
The task of indentifying similar objects within the querying image remains challenging. It is due to viewpoint and lighting changes, deformation and partial occlusions that may exist across different examples. In this framework we focus on combination methods that ensemble multiple descriptors at multiple spatial resolution levels. Ensemble PHOG (Pyramid histogram orientation and gradient) and SIFT (Scale invariant feature transformation) descriptors are used for the feature extraction to achieve the good classification accuracy. Within a region local feature was captured by the distribution over edge orientation, and spatial layout by tiling the image into regions at multiple resolutions. The SIFT features are extracted for each PHOG block. These features are trained using SOM network. Later SVM and Neural network classifiers are used for classification. Results demonstrating the effectiveness of the proposed technique are provided using confusion matrix, transition matrix and other accuracy measures. Area of different land cover regions are calculated, which can be used for land use changes.Keywords
PHOG, SIFT, Classification, Satellite Image.- Cancer Prognosis Prediction Model Using Data Mining Techniques
Authors
1 Dept. of Comp. Sci., Christ University, Bangalore, IN
2 Department of CSE, University Visvesvaraya College of Engineering, Bangalore, IN
3 University Visvesvaraya College of Engineering, Bangalore, IN
4 Indian Institute of Science, Bangalore, IN
Source
Data Mining and Knowledge Engineering, Vol 6, No 1 (2014), Pagination: 21-29Abstract
Cancer prognosis prediction improves the quality of treatment and increases the survivability of the patients. Disease prognosis is identified at the treatment stage and at the recurrence stage. Conventional cancer prediction method deals only with the survival or mortality of the patients, but not with other labels such as severity of the disease through metastasis or multi-primary, stage, grade, etc. The SEER Public Use cancer database has more prominent variables that support better prediction approach. The objective of this paper is twofold. One is to build a prediction model to find the prominent variables by using the standard classifiers and the second is to improve the prediction accuracy through various sampling techniques. The proposed prediction model consist of three phases namely, basic level pre-processing, problem specific processing and modeling classifiers. Problem specific processing phase deals with feature extraction, sampling and response variable selection. The well known classification algorithms (Decision Tree, Naive Bayes and KNN) have been used to model the classifiers for prediction analysis. Apart from the available incident data from SEER (Breast, Colorectal and Respiratory Cancer data) a new mixed combination of the three in equal proportion have been generated for the experimentation. Feature selection through correlation and information gain reduced the attributes to 37 from the raw size of 118. Patient survival, age at diagnosis, stage and multiple primaries in the given order has been identified as the prominent response variable, where as grade performed very low in the experimentation. The performances of various sampling techniques have been studied with the data set size ranging from 500 to 30000 samples for the four prominent labels identified in the previous step. The result shows that the balanced stratified sampling technique always maintains consistency in the performance. Also classifier model with decision tree algorithm optimizes the performance compared to the other algorithms. All the results of the models are tabulated in this paper.Keywords
Classifier, Pre-Processing, Prognosis Prediction, SEER.- FKP Biometrics for Human Authentication
Authors
1 RNS Institute of Technology, Bangalore, IN
2 University Visveswaraya College of Engineering, Bangalore University, Bangalore, IN
3 DIAT, Pune, IN
Source
Biometrics and Bioinformatics, Vol 3, No 5 (2011), Pagination: 238-244Abstract
Automated security is one of the major concerns of modern times. Secure and reliable authentication systems are in great demand. A biometric trait like Finger Knuckle Print (FKP) of a person is unique and secure. In this paper, we propose a human authentication system based on FKP image of a person. Depending on the security level required by an organization that implements the proposed system, we provide two modes of security viz. basic mode and advanced mode. In the basic mode, the Radon Transform is applied on pre-processed FKP image and Eigen values are computed. Then we compute the correlation coefficient between the set of Eigen values stored in the database and that of input image to authenticate a person. For advanced level of security, we apply Gabor Wavelet on pre-processed FKP image. The magnitude values of the Gabor Wavelet Transform are computed. Then the correlation coefficient between the set of magnitude values stored in the database and that of input image is used to authenticate a person. For real time implementation, suitable GUI can be developed. The basic mode of security system is found to have FAR as 6.79% and FRR as 0.0517%. The advanced mode has the FAR of about 3.07% and FRR as 1.14%.Keywords
Correlation Coefficient, Eigen Values, FAR, FRR, Gabor Wavelet Transform, Magnitude Values, Radon Transform, ROC Curve.- A Brief Survey on Privacy Preserving Data Mining Techniques
Authors
1 Visvesvaraya Technological University, Belagavi-590 018, IN
2 University Visvesvaraya College of Engineering, Bangalore University, Bangalore, IN
3 BMS College of Engineering, Bangalore-560019, IN
Source
Data Mining and Knowledge Engineering, Vol 8, No 9 (2016), Pagination: 267-273Abstract
With the onset of the digital revolution, organizations are increasingly maintaining a huge amount of information on their databases and use data mining tools to extract useful information for their business intelligence. The problem with the availability of the digital information is the scarce privacy leakage. In many business domains, leakage of personal information of the client either directly or through data mining tools can lead to loss of competitive edge of the company, loss of revenue and customer churn. Companies are pushing for encryption and other data transformation methods to keep the data private. But mining tools which invoke algorithms like clustering, classification etc. may not work properly on the transformed data. In this paper, we analyze the privacy preserving data mining solutions and privacy leakage in them through indirect means. The main objective of this paper is to identify the open areas of research on privacy-preserving data mining.
Keywords
Transformation Strategy, Privacy Preserving Data Mining, Cryptography, Wavelet Transformation, Correlation Analysis.- PTMIBSS:Profiling Top Most Influential Blogger Using Synonym Substitution Approach
Authors
1 Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, IN
Source
ICTACT Journal on Soft Computing, Vol 7, No 2 (2017), Pagination: 1408-1420Abstract
Users of Online Social Network (OSN) communicate with each other, exchange information and spread rapidly influencing others in the network for taking various decisions. Blog sites allow their users to create and publish thoughts on various topics of their interest in the form of blogs/blog documents, catching the attention and letting readers to perform various activities on them. Based on the content of the blog documents posted by the user, they become popular. In this work, a novel method to profile Top Most Influential Blogger (TMIB) is proposed based on content analysis. Content of blog documents of bloggers under consideration in the blog network are compared and analyzed. Term Frequency and Inverse Document Frequency (TF-IDF) of blog documents under consideration are obtained and their Cosine Similarity score is computed. Synonyms are substituted against those unmatched keywords if the Cosine Similarity score so computed is below the threshold and an improved Cosine Similarity score of those documents under consideration is obtained. Computing the Influence Score after Synonym substitution (ISaS) of those bloggers under conflict, the top most influential blogger is profiled. The simulation results demonstrate that the proposed Profiling Top Most Influential Blogger using Synonym Substitution (PTMIBSS) algorithm is adequately accurate in determining the top most influential blogger at any instant of time considered.Keywords
Blog Document, Content Analysis, Cosine Similarity Score, Influential Blogger, Profiling.References
- Cristina Castronovo and Lei Huang, “Social Media in an Alternative Marketing Communication Model”, Journal of Marketing Development and Competitiveness, Vol. 6, No. 1, pp. 117-136, 2012.
- P. Deepa Shenoy, K.G. Srinivasa, K.R. Venugopal and Lalit M. Patnaik, “Evolutionary Approach for Mining Association Rules on Dynamic Databases”, Proceedings of the 7th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, pp. 325-336, 2003.
- P. Deepa Shenoy, K.G. Srinivasa, K.R. Venugopal and Lalit M. Patnaik, “Dynamic Association Rule Mining using Genetic Algorithms”, Intelligent Data Analysis, Vol. 9, No. 5, pp. 439-453, 2005.
- Colleen Jones, “Clout: The Role of Content in Persuasive Experience”, Proceedings of the First International Conference of Design, User Experience and Usability: Theory, Methods, Tools and Practice, Vol. 6770, pp. 582-587, 2011.
- Leonidas Akritidis, Dimitrios Katsaros and Panayiotis Bozanis, “Identifying the Productive and Influential Bloggers in a Community”, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, Vol. 41, No. 5, pp. 759-764, 2011.
- Yichuan Cai and Yi Chen, “Mass: A Multi-Facet Domain-Specific Influential Blogger Mining System”, Proceedings of 26th IEEE International Conference on Data Engineering, pp. 1109-1112, 2010.
- Eunyoung Moon and Sangki Han, “A Qualitative Method to Find Influencers using Similarity-based Approach in the Blogosphere”, International Journal of Social Computing and Cyber-Physical Systems, Vol. 1, No. 1, pp. 56-78, 2011.
- Chang Sun, Bing-Quan Liu, Cheng-Jie Sun, De-Yuan Zhang and Xiaolong Wang, “Simrank: A Link Analysis based Blogger Recommendation Algorithm using Text Similarity”, Proceedings of International Conference on Machine Learning and Cybernetics, pp. 3368-3373, 2010.
- Mohammad Alodadi and Vandana P Janeja, “Similarity in Patient Support Forums using TF-IDF and Cosine Similarity Metrics”, Proceedings of International Conference on Healthcare Informatics, pp. 521-522, 2015.
- Emily Hill, Shivani Rao and Avinash Kak, “On the use of Stemming for Concern Location and Bug Localization in Java”, Proceedings of IEEE 12th International Working Conference on Source Code Analysis and Manipulation, pp. 184-193, 2012.
- Mohamed H Haggag, “Keyword Extraction using Semantic Analysis”, International Journal of Computer Applications, Vol. 61, No. 1, pp. 1-6, 2013.
- Cristian Moral, Angelica de Antonio, Ricardo Imbert, and Jaime Ramirez, “A Survey of Stemming Algorithms in Information Retrieval”, Information Research, Vol. 19, No. 1, 2014.
- S. Megala, A. Kavitha and A. Marimuthu, “Improvised Stemming Algorithm-Twig,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 7, pp. 168-171, 2013.
- Cedric De Boom, Steven Van Canneyt, Steven Bohez, Thomas Demeester and Bart Dhoedt, “Learning Semantic Similarity for Very Short Texts”, Proceedings of IEEE International Conference on Data Mining Workshop, pp. 1229-1234, 2015.
- Masahiko Itoh, Naoki Yoshinaga, Masashi Toyoda and Masaru Kitsuregawa, “Analysis and Visualization of Temporal Changes in Bloggers’ Activities and Interests”, Proceedings of IEEE Pacific Visualization Symposium, pp. 57-64, 2012.
- Lu and Fuxi Zhu, “Discovering the Important Bloggers in Blogspace”, Proceedings of IEEE International Conference on Artificial Intelligence and Education, pp. 151-154, 2010.
- Macskassy and Sofus A, “Leveraging Contextual Information to Explore Posting and Linking Behaviors of Bloggers”, Proceedings of IEEE International Conference on Advances in Social Networks Analysis and Mining, pp. 64-71, 2010.
- Rui, Cai, Qi Jia-yin and Wang Mian, “Forecasting Bloggers’ Online Behavior based on Improved Pareto/NBD Model”, Proceedings of IEEE International Conference on Management Science and Engineering, pp. 84-90, 2013.
- Yuan Zhang and Yuqian Bai, “Research on the Influence of Microbloggers, Take Sina Celebrity Micro-blog as an Example”, Proceedings of IEEE Eighth International Conference on Semantics, Knowledge and Grids, pp. 189-192, 2012.
- Riccardo Cognini, Damiano Falcioni and Alberto Polzonetti, “Social Networks: Analysis for Integrated Social Profiles”, Internet Technologies and Applications, pp. 68-72, 2015.
- B. Erlin, Norazah Yusof and Azizah Abdul Rahman, “Analyzing Online Asynchronous Discussion using Content and Social Network Analysis”, Proceedings of IEEE Ninth International Conference on Intelligent Systems Design and Applications, pp. 872-877, 2009.
- Boudiba Tahar-Rafik and Ahmed-Ouamer Rachid, “Towards a New Approach for generating user Profile from Folksonomies”, Proceedings of IEEE 4th International Symposium on ISKO-Maghreb: Concepts and Tools for knowledge Management, pp. 1-6, 2014.
- Yi Cai and Qing Li, “Personalized Search by Tag-based User Profile and Resource Profile in Collaborative Tagging Systems”, Proceedings of 19th ACM International Conference on Information and Knowledge Management, pp. 969-978, 2010.
- Bo Wang, Yingjun Sun, Cheng Tang and Yang Liu, “A Visualization Toolkit for Online Social Network Propagation and Influence Analysis with Content Features”, Proceedings of IEEE International Conference on Orange Technologies, pp. 129-132, 2014.
- Christopher C. Yang and Tobun D. Ng, “Terrorism and Crime related Weblog Social Network: Link, Content Analysis and Information Visualization”, Intelligence and Security Informatics, pp. 55-58, 2007.
- Hong-Jun Yoon and Georgia Tourassi, “Analysis of Online Social Networks to Understand Information Sharing Behaviors through Social Cognitive Theory”, Proceedings of Annual Oak Ridge National Laboratory Biomedical Science and Engineering Center Conference, pp. 1-4, 2014.
- Noor Izzati Ariff and Zaidatun Tasir, “Meta-analysis of Content Analysis Models for Analysing Online Problem Solving Discussion”, Proceedings of IEEE Conference on e-Learning, e-Management and e-Services, pp. 148-152, 2015.
- Adham Beykikhoshk, Ognjen Arandjelovic, Dinh Phung and Svetha Venkatesh, “Overcoming Data Scarcity of Twitter: Using Tweets as Bootstrap with Application to Autism-related Topic Content Analysis”, Proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1354-1361, 2015.
- Yung-Chung Tsao, Kevin Chihcheng Hsu and Yin-Te Tsai, “Using Content Analysis to Analyze the Trend of Information Technology Toward the Academic Researchers at the Design Departments of Universities in Taiwan”, Proceedings of IEEE 2nd International Conference on Consumer Electronics, Communications and Networks, pp. 3691-3694, 2012.
- Nitin Agarwal, Huan Liu, Shankara Subramanya, John J. Salerno and S. Yu Philip, “Connecting Sparsely Distributed similar Bloggers”, Proceedings of 9th IEEE International Conference on Data Mining, pp. 11-20, 2009.
- Faiza Belbachir, Khadidja Henni and Lynda Zaoui, “Automatic Detection of Gender on the Blogs”, Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 1-4, 2013.
- Bi Chen, Qiankun Zhao, Bingjun Sun and Prasenjit Mitra, “Predicting Blogging Behavior using Temporal and Social Networks”, Proceedings of Seventh IEEE International Conference on Data Mining, pp. 439-444, 2007.
- Seung-Hwan Lim, Sang-Wook Kim, Sunju Park and Joon Ho Lee, “Determining Content Power Users in a Blog Network: An Approach and its Applications”, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, Vol. 41, No. 5, pp. 853-862, 2011.
- G.U. Vasanthakumar, Bagul Prajakta, P. Deepa Shenoy, K.R. Venugopal and Lalit M. Patnaik, “PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach”, Proceedings of Eleventh International Multi-Conference on Information Processing, Vol. 54, pp. 362-370, 2015.
- G.U. Vasanthakumar, R. Priyanka, K.C. Vanitha Raj, S. Bhavani, B.R. Asha Rani, P. Deepa Shenoy and K.R. Venugopal, “PTMIB: Profiling Top Most Influential Blogger using Content Based Data Mining Approach”, Proceedings of IEEE International Conference on Data Science and Engineering, 2016.
- G.U. Vasanthakumar, P. Deepa Shenoy and K.R. Venugopal, “PTIB: Profiling Top Influential Blogger in Online Social Networks”, International Journal of Information Processing, Vol. 10, No. 1, pp. 77-91, 2016.