Paper Type | :: | Research Paper |
Title | :: | Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis |
Country | :: | India |
Authors | :: | Sandhya.K (M.Phil) || Dr. Anandakrishan |
Page No. | :: | 01-15 |
With the proliferation of websites, the security level of password-protected accounts is no longer purely determined by individual ones. Users may register multiple accounts on the same site or across multiple sites, and these passwords from the same users are likely to be the same or similar. As a result, an adversary can compromise the account of a user on a web forum, then guess the accounts of the same user in sensitive accounts, e.g., online banking services, whose accounts could have the same or even stronger passwords. We name this attack as the shadow attack on passwords. To understand the situation, we examined the state of-theart Intra-Site Password Reuses (ISPR) and Cross-Site Password Reuses (CSPR) based on the leaked passwords from the biggest Internet user group (i.e., 668 million members in China).............
[1]. R. Morris and K. Thompson, ―Password security: A case history,‖ Communications of the ACM, vol. 22(11), pp. 594–597, 1979.
[2]. A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, ―The tangled web of password reuse,‖ in NDSS'2014, 2014.
[3]. D. Florencio and C. Herley, ―A large-scale study of web password habits,‖ in WWW'07 Proceedings of the 16th international
conference on World Wide Web, 2007, pp. 657–666.
[4]. CSDN, ―http://www.csdn.net/company/about.html.‖
[5]. Tianya, ―http://help.tianya.cn/about/history/2011/06/02/
Paper Type | :: | Research Paper |
Title | :: | PROVEST Provenance-based Trust Model for Delay Tolerant Networks |
Country | :: | India |
Authors | :: | Saranya.R (M.Phil) || Dr.Anandakrishnan |
Page No. | :: | 16-33 |
Delay tolerant networks (DTNs) are often encountered in military network environments where endto- end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenancebased trust framework, namely PROVEST (provenance-based trust model) that aims to achieve accurate peerto- peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost under resource-constrained network environments. Provenance refers to the history of ownership of a valued object or information. We leverage the interdependency between trustworthiness of information source and information itself in PROVEST...........
Keywords: Delay tolerant networks, provenance, store-and-forward, trust, trustworthiness
[1]. T. Spyropoulos, R. Rais, T. Turletti, K. Obraczka, and A. Vasilakos, ―Routing for disruption tolerant networks: taxonomy and
design,‖ Wireless Networks, vol. 16, no. 8, pp. 2349–2370, 2010.
[2]. I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho, ―Trust management for encounter-based routing in delay tolerant networks,‖ in IEEE
Global Telecommunications Conference, Miami, FL, 6-10 Dec. 2010, pp. 1–6.
[3]. ——, ―Dynamic trust management for delay tolerant networks and its application to secure routing,‖ IEEE Transactions on Parallel
and Distributed Systems, vol. 25, no. 5, pp. 1200–1210, May 2014.
[4]. P. Buneman, S. Khanna, and W. Tan, ―Why and where: A characterization of data provenance,‖ in Proceedings of International
Conference on Database Theory, Springer-Verlag, 2001, pp. 316–330.
[5]. J.-H. Cho, M. Chang, I.-R. Chen, and A. Swami, Trust Management VI, IFIP Advances in Information and Communication
Technology. 6th IFIPTM, Surat, India: Springer, 2012, vol. 374, ch. A Provenancebased Trust Model of Delay Tolerant Networks,
pp. 52–67.
Paper Type | :: | Research Paper |
Title | :: | Security Enhancements in Electronic Mail Systems |
Country | :: | India |
Authors | :: | D.Ananthi |
Page No. | :: | 34-36 |
Email Security has become the forefront of network management and implementation. In distributed
environments, electronic mail is the most used network based application. Users able to send e-mail to others,
who are connected directly or indirectly to the internet using communications suite, Electronic mail networks
have grown in both size and importance in a very short period of time. Electronic mail security describes that
the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized
access, exploitation, modification, or denial of the network and network resources. Now a day's variety of
security mechanisms is implemented. Email security is the collective action used to secure the access and
content of an email account or service. It allows an individual or organization to protect the overall access to
one or more email addresses/accounts. This paper delivers two approaches that are used to protect email from
unauthenticated access.
Keywords:Authentication, Confidentiality, E-mail Security Enhancements, Cryptographic Algorithms (SHA, DSS…)
[1]. Ms.Supriya and Mrs.Manju Khari, "MANET security breaches: Threat to a Secure communication platform", International Journal
on AdHoc Networking Systems
[2]. (IJANS) Vol. 2, No. 2, April 2012
[3]. Satyam Shrivastava, Sonali Jain "A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network "International Journal of Computer Science & Engineering Technology (IJCSET) Vol.4. No.3. 2013 ISSN : 2229-334
Books:
[4]. William Stallings, Cryptography and Network Security (Principles and Practice, Pearson, Fifth Edition).
Paper Type | :: | Research Paper |
Title | :: | Prediction of Investment Options using Optimal Decision Tree Algorithm |
Country | :: | India |
Authors | :: | B.Sharmila || Dr.R.Khanchana |
Page No. | :: | 37-39 |
Investment decision is a major issue for every individual. The spectrum of investment is extremely wide. Many investment options are available for the investor. People are not aware of best saving scheme for their investment. This paper deals with information from various domain to suggest the investor best investment option for his investment. The decision is based upon various parameters of the investor. A refined algorithm helps the investor to make an effective decision for his investment which suits their requirement. Expert's rules and feature reduction technique have been applied to this data set to convert it into an optimal dataset. Decision tree technique is applied to make investment decisions.
Keywords: Data mining, Decision tree, Expert rules, gain ratio, feature reduction.
[1]. Weka, University of Waikato, New Zealand, http://www.cs.waikato.ac.nz/ml/weka.
[2]. Income Tax and Investment Journal – (AY-2008-09)–by A.N. Agarwal (Income tax expert), Rajesh Agrwal(CA), Sanjay Kulkari
(CA), and Dr. Gajanan Patil.- ABC Publication- Nagpur.
[3]. Dr.Binod Kumar Singh" A study on investors‟ attitude towards mutual funds as an investment option", International Journal of
Research in Management ISSN 2249-5908 Issue2, Vol. 2 (March-2012).
[4]. S. Saravana Kumar in his article "An Analysis of Investor Preference Towards Equity and Derivatives" published in The Indian
journal of commerce, July-September 2010
[5]. Mohammed M Mazid, A B M Shawkat Ali, Kevin S Tickle, "Improved C4.5 Algorithm for Rule Based Classification‟, Recent
Advances in Artificial Intelligence, Knowledge Engineering and Data Bases.
[6]. Chotirat "Ann" Ratanamahatana and Dimitrious Gunopulos, "Scaling up the Naïve Bayesian Classifier: Using Decision Tree for
Feature Selection‟
Paper Type | :: | Research Paper |
Title | :: | A Survey on Linking Locations Using User Comments |
Country | :: | India |
Authors | :: | N.Mahesh || Dr.N.Muthumani |
Page No. | :: | 40-46 |
Many websites are based on domain specific contents for profile hosting, for example: locations on foursquare, Products in flipkart, amazon and movies in IMDB using the comments post by users on. When user is comment on the particular entity the reference and comparison is made from each and every entities in it. Thus we often mention on entities with comparision makes an object and entity relation ship model that compared to other web pages, in tweets it disambiguate entities of comment by users that is yet to received, many of users reveal their focal linking locations such as land marks, shops, restaurants and mall in tweets, the problem arise in disambiguate with already mention entities of user comments which has not yet received. Fine grained locations make linking of entities easily of location profiles with the gio-coordinates. It is very often to define location profiles.............
[1]. M. Cornolti, P. Ferragina, and M. Ciaramita, "A framework for benchmarking entity-annotation systems," in Proc. 22nd Int. Conf.
World Wide Web, 2013, pp. 249–260.
[2]. X. Han and L. Sun, "A generative entity-mention model for linking entities with knowledge base," in Proc. 49th Annu. Meeting
Assoc. Comput. Linguistics: Human Language Technol., 2011, pp. 945–954.
[3]. Y. Fang and M.-W. Chang, "Entity linking on microblogs with spatial and temporal signals," Trans. Assoc. Comput. Linguistics,
vol. 2, pp. 259–272, 2014.
[4]. W. Shen, J. Wang, and J. Han, "Entity linking with a knowledge base: Issues, techniques, and solutions," IEEE Trans. Knowl. Data
Eng., vol. 27, no. 2, pp. 443–460, Feb. 2015.
[5]. F. Hasibi, K. Balog, and S. E. Bratsberg, "Exploiting entity linking in queries for entity retrieval," in Proc ACM Int. Conf. Theory
Inf. Retrieval, 2016, pp. 209–218.
Paper Type | :: | Research Paper |
Title | :: | Giant Sheltered Interloping Endurance System in Divergent Wireless Sensor Network Network Security Algorithm |
Country | :: | India |
Authors | :: | R.Sivaranjani || Sharmila Banu |
Page No. | :: | 47-53 |
Real Time interloping endurance system in divergent wireless sensor networks is proposed in this study, to minimize the redundancy and maximize the tolerance life time through increasing mean time to repair on nodes and analyzing Mean time Between Failures. Multipath routing helps in successful completion of the task, but identifying the malicious nodes between divergent networks and surpassing them is often energy consuming and time-delayed. In order to overcome this, a real time system was formulated by identifying the Mean time to repair and the mean time between failures in multipath routing. When there are more than two nodes in the divergent network are identified as malicious, the Mean Time to Repair is applied on the specific network so as to rely on the particular network's tolerance and once the decrease in mean............
Keywords: Interloping detection, interloping endurance, Redundancy minimization, secure transmission
[1]. S. Bo, L. Osborne, X. Yang, and S. Guizani, "Intrusion detection techniques in mobile ad hoc and wireless sensor networks," IEEE
Wireless Commun. Mag., vol. 14, no. 5, pp. 560–563, 2007.
[2]. A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L.B. Ruiz, and H. C. Wong, "Decentralized intrusion
detection in wireless sensor networks," in Proc. 2005 ACM Workshop Quality Service Security Wireless Mobile Netw.
[3]. Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a survey," IEEE Commun. Surveys & Tutorials, vol. 10, no.
3, pp. 6–28, 2008 .
[4]. Philipp Hurni and Torsten Braun "Energy-Efficient Multi-Path Routing in Wireless Sensor Networks" 7th International Conference,
September 10-12, 2008.
[5]. Jing Deng, Richard Han, Shivakant Mishra "INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks" University of
Colorado, Department of Computer Science Technical Report CU-CS-939-02.
Paper Type | :: | Research Paper |
Title | :: | Discovery of Web Usage Pattern using Latent Semantic Indexing Algorithm |
Country | :: | India |
Authors | :: | V. Sangeetha |
Page No. | :: | 54-56 |
Web clustering is one of the familiar used techniques in the context of Web mining, which is to aggregate Web objects, such as Web pages or users session, into a number of object groups by measuring the mutual vector distance. Clustering can be performed upon these two types of Web objects, which results in clustering Web users or Web pages. The resulting Web user session groups are considered as representatives of user navigational behavior patterns, while Web page clusters are used for generating task-oriented functionality aggregations of Web organizations. The mined usage knowledge in terms of Web usage patterns and page aggregates can be utilized to improve Web site structure designs
Keywords - Web clustering, web mining, vector distance, web objects.
[1]. Zhang, Y., J.X. Yu, and J. Hou, Web Communities: Analysis and Construction. 2006, Berlin Heidelberg: Springer.
[2]. Ghani, R. and A. Fano. Building Recommender Systems Using a Knowledge Base of Product Semantics. in Proceedings of the
Workshop on Recommendation and Personalization in E-Commerce, at the 2nd International Conference on Adaptive Hypermedia
and Adaptive Web Based Systems (AH2002). 2002, p. 11-19, Malaga, Spain.
[3]. Chakrabarti, S., et al. The Structure of Broad Topics on the Web. in Proceeding of 11th International World Wide Web Conference.
2002, p. 251 - 262, Honolulu, Hawaii, USA.
[4]. Büchner, A.G. and M.D. Mulvenna, Discovering Internet Marketing Intelligence through Online Analytical Web Usage Mining.
SIGMOD Record, 1998. 27(4): p. 54-61.
[5]. Chang, G., et al., eds. Mining the World Wide Web: An Information Search Approach. The Information Retrieval. Vol. 10. 2001,
KAP.
Paper Type | :: | Research Paper |
Title | :: | A survey on Techniques used for the herapy of the Autistic Children |
Country | :: | India |
Authors | :: | R. Subalakshmi |
Page No. | :: | 57-59 |
Autism spectrum disorder (ASD) has become one of the most prevalent mental disorders over the last few years and its prevalence is still growing every year. It is a serious developmental disorder that afflicts children and that is more common than childhood cancer. The disorder is characterized by a wide variety of possible symptoms such as developmental disabilities, extreme withdrawal, lack of social behaviour, severe language and attention deficits, and repetitive behaviours. The symptoms intensity ranges from almost unnoticeable to very severe. Because of this wide variety of symptoms and intensity, therapy needs to be individualized for every person. On the other hand, the most recent application of virtual reality is the interface to e-learning applications, which is also known as virtual reality based e-learning tool. The potential of virtual reality tool is demonstrated by its ability to facilitate learning processes while avoiding many problems characterizing traditional or conventional teaching learning methods.
Keywords- AUTISM spectrum disorder, virtual reality, e-learning tool
[1]. J. Bishop, "The Internet for educating individuals with social impairments," Journal of Computer Assisted Learning, vol. 19, pp.
546-556, 2003.
[2]. [5] M. Dauphin, E. M. Kinney, and R. Stromer, "Using Video-Enhanced Activity Schedules and Matrix Training to Teach
Sociodramatic Play to a Child with Autism," Journal of Positive Behavior Interventions, vol. 6, pp. 238-250, 2004.
[3]. T. Miller, G. Leroy, J. Huang, S. Chuang, and M. H. Charlop-Christy, "Using a Digital Library of Images for Communication:
Comparison of a Card-Based System to PDA Software," presented at First International Conference on Design Science Research in
Information Systems and Technology, Claremont, CA, 2006.
[4]. G. Rajendran and P. Mitchell, "Computer mediated interaction in Asperger's syndrome: the Bubble Dialogue program," Computers
and Education, vol. 35, pp. 189-207, 2000.
[5]. Happe, F. & Frith, U. (1996). The neuropsychology of autism. Brain - A jnl of Neurology, 119(4):1377-1400 Hardy, C., Ogden, J.,
Newman, J. & Cooper, S. (2002) Autism and ICT: A Guide for Teachers and Parents. London, UK: David Fulton Publishers Ltd.
Paper Type | :: | Research Paper |
Title | :: | Artificial Intelligence in E-Commerce |
Country | :: | India |
Authors | :: | Dr.A.Ramya || Dr.S.Sundaramoorthy |
Page No. | :: | 60-65 |
Artificial intelligence has the powerful ability to acquire and analyze large volumes of data and provide decisions for action. E-commerce is now adopting this technology to identify patterns based on browsing, purchase history, credit checks, account information etc. This data collected then form the basis of creating customized recommendations for each customer. Google and Microsoft are already investing into new AI initiatives. Many e-commerce businesses have started implementing different forms of AI to better understand their customers, and provide an enhanced customer experience. This paper highlights the role of artificial intelligence in e-commerce and its application in different areas of e-commerce.
Keywords- Artificial Intelligence, E-Commerce, Machine Learning
[1]. Avneet Pannu, "Artificial Intelligence and its Application in Different Areas", International Journal of Engineering and Innovative
Technology (IJEIT) Volume 4, Issue 10, April 2015
[2]. Dheeraj Kapoor, R. K. Gupta," Software Cost Estimation using Artificial Intelligence Technique" International Journal of Research
and Development in Applied Science and Engineering (IJRDASE), Volume 9, Issue 1, February 2016
[3]. Mausami Sahu, "Plagiarism Detection Using Artificial
[4]. Intelligence" International Journal of Scientific & Technology Research, Volume 5, Issue 04, April 2016
[5]. Ashish, A.Dongare, Prof.R.D. Ghongade, "Artificial Intelligence Based Bank Cheque Signature Verification System" International
Research Journal of Engineering and Technology (IRJET) Volume 03, Issue 01, Jan-2016 Siddharth Gupta, Deep Borkar, Chevelyn
De Mello
Paper Type | :: | Research Paper |
Title | :: | A Survey on Efficient Project Management and Scheduling in Software Testing |
Country | :: | India |
Authors | :: | K.Vinitha || Dr. S.Preetha |
Page No. | :: | 66-69 |
Project scheduling plays an important role in research field. Project scheduling has raised noticeable attention within the last decades as a widely used discipline, applicable to many different real world areas. Software project scheduling is one of the most important scheduling areas faced by software project management team. Both software engineering and software management are very necessary for a successful project. To complete the software project within a listed time limit, allocate a start and end date that determine the milestones and outcomes of the tasks, determine which tasks are depend on another task to complete its operation, save time, build consistency, enhance visibility scheduling is very essential.............
Keywords- Project Scheduling, Planning, Controlling, Project management, Software project.
[1]. Survey paper for Software Project Scheduling and Staffing Problem NANDKISHOR PATIL1, KEDAR SAWANT2, PRATIK
WARADE3, YOGESH SHINDE4 BE IT, SAE, Pune, India1, 2, 3,
[2]. A Review of various Software Project Scheduling techniques Ramandeep Kaur M-Phil Student, Guru Kashi University, Talwandi
Sabo(Punjab) Gillraman532
[3]. A Brief Review on Integrated Planning of the Project Scheduling and Material Procurement Problem Babak H Tabrizi* Department
of Industrial Engineering, University of Tehran, Iran
[4]. Software Engineering "Software Reliability, Testing and quality assurance" Nasib Singh Gill
[5]. Lavagnon A. Ika Amadou Diallo and Denis Thuillier, "Project management in the international development industry" (2009)
Paper Type | :: | Research Paper |
Title | :: | Role of Data Mining in Cyber Security |
Country | :: | India |
Authors | :: | T.Nandhini || C.Rangarajan |
Page No. | :: | 70-74 |
Data mining is becoming a invasive knowledge in activities as varied as using historical data to forecast the success of a marketing process looking for patterns in monetary contact to discover banned activities or analyzing genome sequences From this perception it was just a material of time for the control to reach the important area of computer safety This book presents a collection of investigate efforts on the use of data mining in computer safety.
Keywords - Scan Detection; Virus exposure; Anomaly disclosure; Shelter
[1]. Data Mining for Security Applications : Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen
[2]. Rakesh Agrawal, Tomasz Imieliski, and Arun Swami. Mining association rules between sets of items in large databases. In
Proceedings of the 1993 ACM SIGMOD international conference on Management of data.
[3]. Daniel Barbara and Sushil Jajodia, editors. Applications of Data Mining in Computer Security. Kluwer Academic Publishers
[4]. Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and J Sander. Lof: identifying density-based local outliers. In
Proceedings of the 2000 ACM SIG-MOD international conference on Management of data, pages
[5]. Varun Chandola and Vipin Kumar. Summarization {compressing data into an informative representation. In Fifth IEEE
International Conference on Data Mining, pages.
Paper Type | :: | Research Paper |
Title | :: | Enhanced Load Balancing Routing Protocol to Reduce Energy Consumption in Wireless Sensor Networks |
Country | :: | India |
Authors | :: | M.Lingaraj || Dr. A.Prakash |
Page No. | :: | 75-83 |
Wireless Sensor Networks (WSNs) are formed by a very large number of modest power-constrained wireless sensor nodes; it can identify and monitor the changes around them by self. WSNs are implemented in various fields, which include the medical field, army and manufacturing applications. Nodes of WSN are restricted to energy consumption, data storage, and computational power. Routing plays an important role in WSN. Choosing of routing path is considered as important because the choosing of lengthy or congested routing path leads to loss of energy. This paper aims to propose a new routing protocol namely enhanced load balancing routing protocol (ELBRP), which will balance the load in WSN in order to avoid the congestion and reducing the energy consumption............
Keywords- Energy, Load Balancing, Sensor, Routing, Wireless.
[1]. Sofiane Moad, Morten Tranberg Hansen, Raja Jurdak, Branislav Kusy, Nizar Bouabdallah, Load Balancing Metric with Diversity
for Energy Efficient Routing in Wireless Sensor Networks, Procedia Computer Science, Volume 5, 2011, Pages 804-811.
[2]. Prasenjit Chanak, Indrajit Banerjee, Hafizur Rahaman, Load management scheme for energy holes reduction in wireless sensor
networks, Computers & Electrical Engineering, Volume 48, 2015, Pages 343-357.
[3]. Germán A. Montoya, Yezid Donoso, Energy Load Balancing Strategy to Extend Lifetime in Wireless Sensor Networks, Procedia
Computer Science, Volume 17, 2013, Pages 395-402.
[4]. B. Baranidharan, B. Santhi, DUCF: Distributed load balancing Unequal Clustering in wireless sensor networks using Fuzzy
approach, Applied Soft Computing, Volume 40, 2016, Pages 495-506.
[5]. Pratyay Kuila, Prasanta K. Jana, Energy Efficient Load-Balanced Clustering Algorithm for Wireless Sensor Networks, Procedia
Technology, Volume 6, 2012, Pages 771-777.
Paper Type | :: | Research Paper |
Title | :: | Fingerprint Based Authentication of Internet of Things Users |
Country | :: | India |
Authors | :: | Kalaivani S || Shalini Dhiman |
Page No. | :: | 84-89 |
Internet of Things (IoT) can be seen as a pervasive network of networks: numerous heterogeneous entities both physical and virtual interconnected with any other entity or entities through unique addressing schemes, interacting with each other to provide/request all kinds of services. Given the enormous number of connected devices that are potentially vulnerable, highly significant risks emerge around the issues of security, privacy, and governance; calling into question the whole future of IoT. During the data exchange, it is mandatory to secure the messages between sender and receiver to handle the malicious human based attacks. The main problem during Fingerprint based approaches is the computational overhead..........
Keywords- Confidentiality, Complex Numbers, Digital Fingerprint, Internet of Things.
[1]. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, W. Zhao,"A Survey on Internet of Things: Architecture, Enabling Technologies,
Security and Privacy, and Applications", IEEE Internet of Things Journal, Vol. 4 No. 5, pp. 1125-1142, 2017.
[2]. X. Luo, J. Liu, D. Zhang, and X. Chang, "A large-scale web QoS prediction scheme for the industrial Internet of Things based on a
kernel machine learning algorithm," Computer Networks, Vol. 101, pp. 81-89, 2016.
[3]. W. Zhao, R. Lun, C. Gordon, A. M. Fofana, D. D. Espy, A. Reinthal, B. Ekelman, G. D. Goodman, J. E. Niederriter, and X. Luo, "A human-centered activity tracking service: Towards a healthier workplace," IEEE Transactions on Human-Machine Systems,
Vol. 47, No. 3, pp. 343-355, 2017.
[4]. H. Lin, T. Zong, and Y. Yeh, "A DL Based Short strong Designated Verifier Fingerprint Scheme with Low Computation" Journal
of Information Science and Engineering, Vol. 27, pp. 451-463, 2011.
[5]. Andrew Chi-Chih Yao ; Yunlei Zhao,"Online based Fingerprints for Low-Power Devices", IEEE Transactions on Information
Forensics and Security, Vol. 8, No. 2, pp. 283-294, 2013.
Paper Type | :: | Research Paper |
Title | :: | A Statistical Approach for Feature Extraction in Brain Computer Interface |
Country | :: | India |
Authors | :: | M. Kanimozhi || R. Roselin |
Page No. | :: | 90-95 |
Brain computer interface also known as the Brain Machine interface (BMI) is direct communication
between brain and computer devices without the any muscle reaction.BCI researchaimsto provide
communication ability to the people who are totally paralyzed or suffer neurological neuromuscular disorders
like amyotrophic lateral sclerosis, brain stem stroke or spinal cord injury. The efficient classification of motor
imagery movements for disabled people can lead toexact design of Brain Computer Interface (BCI). In this
paper data are taken from the UCI data repository BCI competition III dataset 1. Statistical featuredescriptors
such as mean, maximum, minimum and standard deviation from each channel in every trial are extracted to
reduce the dimensionality. Finally multilayer perceptron and J48 classification algorithms are applied to
compare the efficiency of the proposed model.
Keywords- Brain Computer Interface, Multi Layer Perceptron, J48, Statistical Features.
[1]. Jonathan R. Wolpaw, NielsBirbaumer, Dennis J. McFarland, GertPfurtscheller, Theresa M. Vaughan," Brain-computer interface for
communication and control", Clinical Neurophysiology (113),(2002),pp767–791.
[2]. H.H. Alwasiti, I. Aris, & A. Jantan, "Brain Computer Interface Design and Applications: Challenges and Future," World Applied
Sciences Journal, 11(7) (2010), pp. 819-825.
[3]. L. F Nicolas-Alonso, & J. Gomez-Gil, "Brain computer interfaces, a review," Sensors, 12(2) (2012),pp. 1211-1279,.
[4]. Aswinseshadri K and ThulasiBai V "Genetic Algorithm Based Feature Selection for the Classification of Electrocardiogram
Features in Brain Computer Interface"International Journal of Control Theory and Applications ISSN: 0974-5572.pp 352-364.
[5]. SaadatNasehi. HosseinPourghassem" A Novel Effective Feature Selection Algorithm based on S-PCA and Wavelet Transform
Features in EEG Signal Classification ",In Communication Software and Networks (ICCSN), (2011) IEEE 3rd International
Conference ,IEEE, pp-114-117.
Paper Type | :: | Research Paper |
Title | :: | An Overview on Big Data Analysis |
Country | :: | India |
Authors | :: | Avanthika || Mithra Shree A || Sudhakar K |
Page No. | :: | 96-101 |
Now the world is rallying digitized. To bring development in innovative world, we are ongoing on in a new concept known as the big data. Almost eighty to ninety percent of professions that are moving today seek a new and better approach to remain ambitious and profitable. To do this, big data leads them in a path that stopovers ahead of the curves. Thus big data is an advance that helps people to make their life more convenient, profitable and compatible one. Big data plays a major role in planning important vital and operational plans and instrument them. Apart from profession people also use big data for many other reasons............
[1]. Neelam Singh, Neha Garg, Varsha Mittal, Data – insights, motivation and challenges, Volume 4, Issue 12, December-2013, 2172,
ISSN 2229-5518 2013.
[2]. Karthik Kambatlaa, Giorgos Kollias b, Vipin Kumarc, Ananth Gramaa, Trends in big data Analytics, (2014) 74 2561–2573
[3]. Francis X. "On the Origin(s) and Development of the Term \Big Data"_ Francis X., 2012
[4]. Venkata narasimha inukollu1, sailaja arsi1 and srinivasa rao ravuri3 Security issues associated with big data in cloud computing
Vol.6, No.3, May 2014
[5]. Matzat1, Ulf-Dietrich Reips2,3 1 Eindhoven "Big Data" 2012, 7 (1), 1–5 ISSN 1662-5544.
© 2019 All Rights Reserved | Design by iosrjen