Computer Science & I.T

Search by keywords:
Total Articles 64 - 72 of 2109 | |

MULTIPLE REGRESSION: A DATA MINING APPROACH FOR PREDICTING THE STOCK MARKET TRENDS BASED ON OPEN, CLOSE AND HIGH PRICE OF THE MONTH

Author(s):SACHIN KAMLEY, SHAILESH JALOREE, R. S. THAKUR
Journal: International Journal of Computer Science Engineering and Information Technology Research
Publisher:TJPRC Pvt Ltd.
Abstract
| Pages: 173-180
Stock market is basically non linear in nature and the research on stock market is one of the most important issue in recent years. People invest in stock market based on some prediction. For predict, the stock market prices people search such methods and tools which will increase their profits, while minimize their risks. Prediction plays a very important role in stock market business which is very complicated and challenging process. Employing traditional methods like fundamental and technical analysis may not ensure the reliability of the prediction. To make predictions using two variables the linear regression analysis is used mostly. The drawback of this approach is that it works only for two variables. In this paper we applied well known efficient multiple regression approach to predict the stock market price from stock market data based on three variables. In future the results of multiple regression approach could be improved using more number of variables.

PREVENTING WORMHOLE ATTACK IN MULTICAST ROUTING PROTOCOLS FOR MANET

Author(s):MOHANAVEL S., SUNTHARAM A., PRANEV RAM B .R., SASHANK S.
Journal: International Journal of Computer Science Engineering and Information Technology Research
Publisher:TJPRC Pvt Ltd.
Abstract
| Pages: 181-186
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network. MANET nodes are typically distinguished by their limited power, processing, and memory resources as well as high degree of mobility. Due to the limited transmission range of wireless network nodes, multiple hops are usually needed for a node to exchange information with any other node in the network. Thus secure routing is a crucial issue to the design of a MANET In the field of networking, the specialist area of network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and re-transmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems.

MARKER BASED WATERSHED TRANSFORMATION FOR IMAGE SEGMENTATION

Author(s):AMAN KUMAR SHARMA, ANJU BALA
Journal: International Journal of Computer Science Engineering and Information Technology Research
Publisher:TJPRC Pvt Ltd.
Abstract
| Pages: 187-192
The image segmentation is one of the most challenging tasks in the field of image processing and pattern recognition. Watershed transform is a technique that always generates closed contours for every region of an image and one of the best techniques used for image segmentation but over segmentation is a major drawback of this method for which present study was undertaken to devise a new three step methodology for image segmentation using watershed transformation working firstly with pre-segmentation processing then detecting edges of image and then computing watershed transformation. As a result of applying these segmentation processes on image, better results were observed than traditional methodology. Improved marker based watershed transformation for image segmentation was done using MATLAB.

SECURE DATA COMMUNICATION OVER NETWORK BASED ON DNA CRYPTOGRAPHY

Author(s):ATANU MAJUMDER, TANUSREE PODDER, SUBIR SAHA, NIRMALYA KAR
Journal: International Journal of Computer Science Engineering and Information Technology Research
Publisher:TJPRC Pvt Ltd.
Abstract
| Pages: 193-202
Data communication and security are the significant issues of today’s world. Data are needed to be shared or transfer from one network to another. While sharing data or information different sorts of attacks may arise on that data. In order to make secure data transmission different cryptographic algorithms have been developing day by day, researchers are working on the evolvement of new cryptographic algorithms. Data security is the most significant concerned in the area of data communication or data sharing. Cryptography can be defined as the process of making secure data for transmitting over the public network by transforming the plain message that is understandable by everyone into a format that is difficult to make out by anyone else apart from the sender and receiver. One of the efficient directions of achieving security data communication is DNA based Cryptography. The proposed encoding and decoding process is based on the use of the DNA sequencing string of the DNA strands. The encoded text that is cipher text produced by the encoding algorithm is looks similar with the bio-logical structure of the DNA strands sequence. In order to make the coded text more complex to the intruders some extra bits are padded along with the coded cipher text. The algorithm proposed here by using the property of DNA sequencing.

ENHANCED DOCUMENT FORMATTING USING LATEX SOFTWARE

Author(s):PRATIK P. NAROLE, NILESH R. PATEL, ATHER RAVISH M. KHAN, SNEHAL R. ATKAR, SANJEEV KUSHWAHA
Journal: International Journal of Computer Science Engineering and Information Technology Research
Publisher:TJPRC Pvt Ltd.
Abstract
| Pages: 203-208
LaTeX is a family of programs designed to produce publication-quality typeset documents. Latex is portable document formatting system based on TEX. It is a typesetting language originally designed for math and science. Documentation is useful in our day to day life. For creating any educational related file, it needs Documentation. Documentation gives proper credit to the sources used in the argument. LaTeX gives richness to the Documentation. LaTeX uses a markup language in order to describe document structure and presentation. LaTeX converts source text, combined with the markup, into a high quality document. LaTeX works on any operating system such as Windows, Linux.

An Analysis of Hepatitis C Virus Prediction Using Different Data Mining Techniques

Author(s):Ahmed A. A. Radwan, Tarekabd-El-Hafeez, Heba Mamdouh
Journal: International Journal of Computer Science Engineering and Information Technology Research
Publisher:TJPRC Pvt Ltd.
Abstract
| Pages: 209-214
The prediction of hepatitis C virus (HCV) is a significant and tedious task in medicine. The healthcare environment is generally perceived as being ‘information rich’ yet ‘knowledge poor’. There is a wealth of data available within the healthcare system. However, there is a lack of effective analysis tools to discover hidden relationships and trends in data. Knowledge discovery and data mining have found numerous applications in business and scientific domain. Valuable knowledge can be discovered from application of data mining techniques in healthcare system. Using medical profile such as age, sex, residence and (ALT, AST) enzyme blood tests it can predict the likelihood of patients getting HCV infection. It enables significant knowledge, e.g. patterns, relationships between medical factors related to HCV, to be established. It can serve a training tool to train nurses and medical students to diagnose patients infected with HCV. This paper analyses the performance of various classification function techniques in data mining for predicting the infection with HCV from the HCV data set. These Techniques are Decision Trees, Naïve Bayes and Neural Network. Results show that each technique has its unique strength in realizing the objectives of the defined mining goals. Also the performance of three data mining techniques is compared using three data sets of different size.

A Perusal on Hadoop Small File Problem

Author(s):Bincy P Andrews, Binu A
Journal: International Journal of Computer Science Engineering and Information Technology Research
Publisher:TJPRC Pvt Ltd.
Abstract
| Pages: 215-220
The Hadoop Distributed File System (HDFS) is developed to store and process large data sets over the range of tera bytes & peta bytes. However, storing a large number of small files in HDFS is inefficient. Also too many small files increase the number of mappers, job coordination effort (task scheduling), less work for each map task and overall processing time. This paper lists some of the existing solutions for handling small file problem. Thus, the main objective of this survey is to help tool designers/developers and experienced end users understand the details of particular file problem & to select a possible solution, enabling them to make the best choices for their particular research interests.

Perturbation Technique and Differential Transform Method for Mixed Convection Flow on Heat and Mass Transfer with Chemical Reaction

Author(s):J. Prathap Kumar, J.C. Umavathi
Journal: International Journal of Computational Engineering Research(IJCER)
Publisher:IJCER
Abstract
| Pages: 26-44
A new analytical solution is introduced for the effect of chemical reaction on mixed convective heat and mass transfer in a vertical double passage channel. The vertical channel is divided into two passages (by means of a baffle) for two separate flow streams. Each stream has its own individual velocity, temperature and concentration fields. After placing the baffle the fluid is concentrated in one of the passage. Approximate analytical solutions are found for the coupled nonlinear ordinary differential equations using regular perturbation method (PM) and Differential Transform method (DTM). The validity of the Differential Transform series solutions are verified with the regular perturbation method. The velocity, temperature and concentration solutions are obtained and discussed for various physical parameters such as thermal Grashoff number, mass Grashoff number, Brinkman number and chemical reaction parameter at different positions of the baffle. It is found that the thermal Grashoff number, mass Grashoff number, Brinkman number enhances the flow whereas chemical reaction parameter reduces the flow at all baffle positions. It is also found that as Brinkman number increases the DTM and PM show more error.

Adaptive Passive Duplicate Address Detection (APDAD) in MANETs

Author(s):S. Bajidvali -- B. N. Bhandari
Journal: International Journal of Computer Networking, Wireless and Mobile Communications
Publisher:TJPRC Pvt Ltd.
Abstract
| Pages: 1-6
Ad hoc networks are new paradigm of networks offering unrestricted mobility without any underlying infrastructure. ROUTING is one of the most basic networking functions in mobile ad hoc networks. In partitioned networks, same addresses can exist between partitioned networks. Therefore, when several partitioned networks or independent networks merge into one network, potential address conflicts must be resolved. The address conflicts are detected through a DAD (Duplicate Address Detection) procedure. In reference 1, authors introduced three schemes: PDAD-RREQ Never- Sent (RNS), PDAD-RREP-Without-RREQ (RwR), and PDAD-2RREPs-on-RREQ (2RoR). These schemes can detect conflicts of a set of nodes but not all the duplicates and with a higher scope of false positives. This paper presents an adaptive version of PDAD.
Page:12345678910Next