With the advancement in digitalization vast amount of Image data is uploaded and used via Interne... more With the advancement in digitalization vast amount of Image data is uploaded and used via Internet in today’s world. With this revolution in uses of multimedia data, key problem in the area of Image processing, Computer vision and big data analytics is how to analyze, effectively process and extract useful information from such data. Traditional tactics to process such a data are extremely time and resource intensive. Studies recommend that parallel and distributed computing techniques have much more potential to process such data in efficient manner. To process such a complex task in efficient manner advancement in GPU based processing is also a candidate solution. This paper we introduce Hadoop-Mapreduce (Distributed system) and CUDA (Parallel system) based image processing. In our experiment using satellite images of different dimension we had compared performance or execution speed of canny edge detection algorithm. Performance is compared for CPU and GPU based Time Complexity.
Transmission Control Protocol congestion control is backbone of the Internet stability. TCP Westw... more Transmission Control Protocol congestion control is backbone of the Internet stability. TCP Westwood is sender-side modification of the congestion window algorithm that improves upon the performance of Reno in wired as well as wireless networks. Westwood continuously measure the bandwidth at the TCP sender side via monitoring the rate of returning ACKs. This estimate is then used to compute congestion window and slow start threshold when congestion occurs, after three duplicate acknowledgments or after a timeout. In contrast with TCP Reno which "blindly" halves the congestion window after three duplicate ACKs, TCP Westwood attempts to select a slow start threshold and a congestion window which are consistent with the effective bandwidth used at the time congestion is experienced. We call this mechanism faster recovery. The proposed mechanism is particularly effective over wireless links where sporadic losses due to radio channel problems are often misinterpreted as a sympt...
Intrusion Detection System (IDS) has been developed in order to provide a defense mechanism again... more Intrusion Detection System (IDS) has been developed in order to provide a defense mechanism against the intrusive activities carried over network. This paper discusses an approach of Intrusion detection system using Fuzzy ART technique for clustering with some pre-processing method. From the survey it was found that IDS built using Fuzzy ART has low detection rate and high false alarm rate. Parameters of Fuzzy ART technique such as choice parameter and vigilance parameter have major impact on final outcome. So to overcome the problem of low detection rate and higher false alarm rate we need to optimize these parameters of Fuzzy ART. For optimizing of these parameters external fuzzy controller is used. Experimental results shows the different values of parameters give different detection rates and false alarm rate. And by optimizing the parameters we got reduction in false alarm rate by 2.07%.
Wireless Multimedia S ensor Networks (WMS Ns) are used in many application domains, such as surve... more Wireless Multimedia S ensor Networks (WMS Ns) are used in many application domains, such as surveillance systems, traffic control, process control and so on. In order to ensure a broad and effective deployment of such innovative services, strict requirements on security, privacy, and distributed processing of multimedia contents should be satisfied, taking also into account the limited availability of resources in term of energy, computation, bandwidth, and storage on the sensor nodes. Thus, with respect to classic Wireless S ensor Networks, the achievement of these goals is more challenging due to the presence of multimedia data, which usually requires complex compression and aggregation algorithms. Because of the unprotected nature of wireless communication channel and untrusted transmission medium of wireless sensor networks, it becomes vulnerable to many types of security attacks. Also real-time multimedia streaming poses different challenges due complex nature of the information and the timeliness requireme nts. Also existing security approaches are difficult to implement on WS N due limited availability of the resources. The proposed algorithm will be implemented at application layer so that the packets containing encrypted data can be transmitted seamlessly. Index Terms-Wireless Multimedia S ensor Networks, Quality of S ervice, S ecurity S imulator.
International Journal of Advance Research and Innovative Ideas in Education, 2016
Sequential pattern mining is an important data Mining technique. Mining sequential rules from the... more Sequential pattern mining is an important data Mining technique. Mining sequential rules from the sequence database is an important task with wide application. Its use to find frequently occurring ordered events or sub sequence as pattern from sequence database. Sequence can be called as order list of event. If one item set is completely subset of another item set is called sub sequence. Sequential pattern mining is used in various domains such as medical treatments, natural disasters, customer shopping sequences, DNA sequences and gene structures. The problem is to discover the all sequential pattern who satisfy the user specified constraint, from the given sequence database. There are various Sequential pattern mining algorithm like GSP, SPADE, SPAM, PrefixSpan are mainly used to find the relevant sequential frequent pattern from the sequence. All these sequential pattern mining algorithm are generating large set of frequent sequential pattern which are not time and memory efficie...
In the current technology world, data transmission of various multimedia like sensitive images, v... more In the current technology world, data transmission of various multimedia like sensitive images, video, text is very important and security is major concern in the fields of medical, commercial and military fields. Security is very important, as illegal users may hack the sensitive data. Currently, many techniques are available for Visual data Security.In this proposed system, describes an approach to hide valuable secret information inside the different file formats without losing it by using Steganography and Visual Cryptography techniques.The main objective is to never leave anyone to know that information is already hidden in the file.Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secrets such as printed or pictures, etc. These secrets are fed into the system in a digital (image) form. The digital form of the secr...
Various transaction activities like air ticket reservation, online banking, distance learning, gr... more Various transaction activities like air ticket reservation, online banking, distance learning, group discussion and so on are carried out using Internet. Carrying out such activities include exchange of useful data which is to be protected from malicious attacks. If some malicious activities are taking place in the network, it is essential to alert the user about it. Detection of malicious activities is of prime importance to protect our data. To protect the data that are exchanged on the network, we need to implement a system that realizes faster attack detection and response accordingly. For detecting malicious activities, we use Intrusion Detection System (IDS) for security purpose. This paper focuses on IDS using Support Vector Machine (SVM). During the survey, the major challenges found are low detection rate and more response time. To overcome these challenge, parallel implementation of SVM classifier and appropriate feature reduction technique should be applied to achieve hig...
Visual secret sharing scheme is mostly used for secret communication technique. visual secret sha... more Visual secret sharing scheme is mostly used for secret communication technique. visual secret sharing technique Used for secret sharing that encrypt a secret image into many shares These share are encoded or are transparencies and stored into digital form. There are various criteria which decide the performance of visual secret sharing scheme like type and number of shares pixel expansion, security accuracy, computational complexity, share generated is meaningful or meaningless, type and numbers of secret images encrypted by the scheme. These share are reveal the secret image to supposed to be printed on transparences and after stacking them to each other. This paper focus and analyze of different visual secret sharing technique with respect to application and pros and cons of technique is also present.
Cloud computing a new paradigm in the field of distributed computing after Grid computing. Cloud ... more Cloud computing a new paradigm in the field of distributed computing after Grid computing. Cloud computing seems to me more promising in term of request failure, security, flexibility and resource availability. Its main feature is to maintain the Quality of service (QoS) provided to the end user in term of processing power, failure rate and many more .So Resource management and request scheduling are important and complex problems in cloud computing, Since maintaining resources and at the same time scheduling the request becomes a complex problem due to distributed nature of cloud. Many algorithms are been proposed to solve this problem like Ant colony based, cost based, priority based algorithms but all these algorithm consider cloud environment as non fault, which leads to degrade in performance of existing algorithms. So a load and fault aware Honey Bee scheduling algorithm is proposed for cloud infrastructure as a service(IaaS). This algorithm takes into consideration fault rate...
Mobile Ad hoc NETwork (MANET) is a collection of self-organizing mobile nodes without any help of... more Mobile Ad hoc NETwork (MANET) is a collection of self-organizing mobile nodes without any help of centralized administration or established infrastructure. Due to this characteristic, MANETs are particularly vulnerable to various security threats. Different routing protocols are developed for communication in MANET. Moreover in MANETs security is the major concern because it widely used in applications such as communication and data sharing .Secure routing protocols are developed as one of security mechanisms. This paper attempts to provide a comprehensive overview of secure routing protocols and some other techniques to secure, routing process in MANET.
Vehicular ad hoc network (VANET) is suffering from the frequent link breakage and low packet deli... more Vehicular ad hoc network (VANET) is suffering from the frequent link breakage and low packet delivery rate, which challenges routing protocols. Greedy forwarding is widely adopted in geographic routing protocols for VANETs since it selects the neighbour that is geographically closer to the destination as the next hop and is considered efficient. Because of the highly dynamic network topology and various impairment of radio signal, the link chosen according to the greedy algorithm regardless of the link state is unstable to a large extent, and frequent retransmissions lead to a waste of the network bandwidth and longer end to end delay. so that we can improve the result with the use of different technique that demonstrates significant reductions of end to end delay , PDR and increases throughput.
Popularity of wireless sensor networks (WSNs) is increasing continuously in different fields, as ... more Popularity of wireless sensor networks (WSNs) is increasing continuously in different fields, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to the base station, while considering the severe energy constraint and the limitations of computational and storage resources. Indeed, this functionality may be vulnerable and must be in itself secured, since conventional routing protocols in WSNs provide efficient routing techniques with low power consumption, but they do not take into account the possible attacks. As sensor nodes may be easily captured and compromised, the classical cryptographic solutions become insufficient to provide optimal routing security, especially, for cluster-based WSNs, where cluster heads can be still among the compromised nodes. In this survey paper, we have studied few different Intrusion detection systems which provide secure routing in IDS.
Vehicular Ad-hoc Network is a distributed and self-organized network, have emerged as a new power... more Vehicular Ad-hoc Network is a distributed and self-organized network, have emerged as a new powerful technology to improve driving safety and traffic management. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. Because of constraint roads and very high speed of vehicles routing is an issue in VANET. So we are analyzed the performance of topology based on routing protocol. Routing Overhead Load and End-to-End Delay metrics are considered for analysis of Cross-layer Design in routing protocol using SUMO tool and NS2 simulation
With the technology innovation in electronic devices, the rising demand for high-quality multimed... more With the technology innovation in electronic devices, the rising demand for high-quality multimedia content will continually grow. Over the last years, there is a shift from the traditional approach of streaming the media content to the modern approach of adaptive bit-rate streaming, which offers the benefit of switching to the best quality video according to varying network conditions or available bandwidth thus providing the enriched user experience. The adaptive streaming methods are more or less wholly based on HTTP, so can efficiently work over large distributed networks. This paper aims to deploy HLS (HTTP Live Streaming) for streaming of real-time multimedia, to support mobile as well as desktop browsers without the use of any plugin and also to deliver multimedia with reduced latency, therefore allowing rich quality media content to be delivered over a large number of CDN (content delivery networks). Few added advantages of using HLS are: it can easily traverse through any f...
The Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile nodes. These Mobile... more The Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile nodes. These Mobile nodes are connected by wireless link. This network do not required any infrastructure or centralized access point such as base station. MANETS are highly venerable for Passive and Active Attacks because of their open medium, rapidly changing topology and lack of centralized monitoring. Discussions regarding attacks and intrusion detection techniques on MANET are presented inclusively in this paper, and then the comparison among several intrusion detection techniques is evaluated based on this parameter.
There is good potential for practical applications such as encrypted image authentication, conten... more There is good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection, reversible data hiding in encrypted image has attracted increasing attention in recent year. Data hiding is the technique by which some data is hidden into a cover media. Data hiding can be done in audio, video, image, text, and picture. we use image for data hiding especially digital images. The data may be any text related to the image such as authentication data or author information. At the receiver side it must be able to extract the hidden data and original image. A data hiding technique satisfying this requirement is known as reversible data hiding. Reversible data hiding is a type of data hiding techniques whereby the host image can be recovered exactly. Being lossless makes this technique suitable for medical, military applications and cloud storage. In cloud storage, a content owner can encrypt an image to preserve his/her privacy,...
Sequential pattern mining and sequential rules mining are important data mining task for wide app... more Sequential pattern mining and sequential rules mining are important data mining task for wide application. Its use to find frequently occurring ordered events or sub sequence as pattern from sequence database. Sequence can be called as order list of event. If one item set is completely subset of another item set is called sub sequence. Sequential pattern mining is used in various domains such as medical treatments, natural disasters, customer shopping sequences, DNA sequences and gene structures. The problem is to discover the all sequential pattern who satisfy the user specified constraint, from the given sequence database. Sequential pattern mining algorithm are mainly classified in to two part. Apriori based and pattern growth based algorithm. These are basic sequential pattern mining algorithm and mine full set sequential pattern mining algorithm which mean these algorithm are generate all frequent sequential pattern. Index Terms Sequential pattern mining, Sequence database, apr...
With the advancement in digitalization vast amount of Image data is uploaded and used via Interne... more With the advancement in digitalization vast amount of Image data is uploaded and used via Internet in today’s world. With this revolution in uses of multimedia data, key problem in the area of Image processing, Computer vision and big data analytics is how to analyze, effectively process and extract useful information from such data. Traditional tactics to process such a data are extremely time and resource intensive. Studies recommend that parallel and distributed computing techniques have much more potential to process such data in efficient manner. To process such a complex task in efficient manner advancement in GPU based processing is also a candidate solution. This paper we introduce Hadoop-Mapreduce (Distributed system) and CUDA (Parallel system) based image processing. In our experiment using satellite images of different dimension we had compared performance or execution speed of canny edge detection algorithm. Performance is compared for CPU and GPU based Time Complexity.
Transmission Control Protocol congestion control is backbone of the Internet stability. TCP Westw... more Transmission Control Protocol congestion control is backbone of the Internet stability. TCP Westwood is sender-side modification of the congestion window algorithm that improves upon the performance of Reno in wired as well as wireless networks. Westwood continuously measure the bandwidth at the TCP sender side via monitoring the rate of returning ACKs. This estimate is then used to compute congestion window and slow start threshold when congestion occurs, after three duplicate acknowledgments or after a timeout. In contrast with TCP Reno which "blindly" halves the congestion window after three duplicate ACKs, TCP Westwood attempts to select a slow start threshold and a congestion window which are consistent with the effective bandwidth used at the time congestion is experienced. We call this mechanism faster recovery. The proposed mechanism is particularly effective over wireless links where sporadic losses due to radio channel problems are often misinterpreted as a sympt...
Intrusion Detection System (IDS) has been developed in order to provide a defense mechanism again... more Intrusion Detection System (IDS) has been developed in order to provide a defense mechanism against the intrusive activities carried over network. This paper discusses an approach of Intrusion detection system using Fuzzy ART technique for clustering with some pre-processing method. From the survey it was found that IDS built using Fuzzy ART has low detection rate and high false alarm rate. Parameters of Fuzzy ART technique such as choice parameter and vigilance parameter have major impact on final outcome. So to overcome the problem of low detection rate and higher false alarm rate we need to optimize these parameters of Fuzzy ART. For optimizing of these parameters external fuzzy controller is used. Experimental results shows the different values of parameters give different detection rates and false alarm rate. And by optimizing the parameters we got reduction in false alarm rate by 2.07%.
Wireless Multimedia S ensor Networks (WMS Ns) are used in many application domains, such as surve... more Wireless Multimedia S ensor Networks (WMS Ns) are used in many application domains, such as surveillance systems, traffic control, process control and so on. In order to ensure a broad and effective deployment of such innovative services, strict requirements on security, privacy, and distributed processing of multimedia contents should be satisfied, taking also into account the limited availability of resources in term of energy, computation, bandwidth, and storage on the sensor nodes. Thus, with respect to classic Wireless S ensor Networks, the achievement of these goals is more challenging due to the presence of multimedia data, which usually requires complex compression and aggregation algorithms. Because of the unprotected nature of wireless communication channel and untrusted transmission medium of wireless sensor networks, it becomes vulnerable to many types of security attacks. Also real-time multimedia streaming poses different challenges due complex nature of the information and the timeliness requireme nts. Also existing security approaches are difficult to implement on WS N due limited availability of the resources. The proposed algorithm will be implemented at application layer so that the packets containing encrypted data can be transmitted seamlessly. Index Terms-Wireless Multimedia S ensor Networks, Quality of S ervice, S ecurity S imulator.
International Journal of Advance Research and Innovative Ideas in Education, 2016
Sequential pattern mining is an important data Mining technique. Mining sequential rules from the... more Sequential pattern mining is an important data Mining technique. Mining sequential rules from the sequence database is an important task with wide application. Its use to find frequently occurring ordered events or sub sequence as pattern from sequence database. Sequence can be called as order list of event. If one item set is completely subset of another item set is called sub sequence. Sequential pattern mining is used in various domains such as medical treatments, natural disasters, customer shopping sequences, DNA sequences and gene structures. The problem is to discover the all sequential pattern who satisfy the user specified constraint, from the given sequence database. There are various Sequential pattern mining algorithm like GSP, SPADE, SPAM, PrefixSpan are mainly used to find the relevant sequential frequent pattern from the sequence. All these sequential pattern mining algorithm are generating large set of frequent sequential pattern which are not time and memory efficie...
In the current technology world, data transmission of various multimedia like sensitive images, v... more In the current technology world, data transmission of various multimedia like sensitive images, video, text is very important and security is major concern in the fields of medical, commercial and military fields. Security is very important, as illegal users may hack the sensitive data. Currently, many techniques are available for Visual data Security.In this proposed system, describes an approach to hide valuable secret information inside the different file formats without losing it by using Steganography and Visual Cryptography techniques.The main objective is to never leave anyone to know that information is already hidden in the file.Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secrets such as printed or pictures, etc. These secrets are fed into the system in a digital (image) form. The digital form of the secr...
Various transaction activities like air ticket reservation, online banking, distance learning, gr... more Various transaction activities like air ticket reservation, online banking, distance learning, group discussion and so on are carried out using Internet. Carrying out such activities include exchange of useful data which is to be protected from malicious attacks. If some malicious activities are taking place in the network, it is essential to alert the user about it. Detection of malicious activities is of prime importance to protect our data. To protect the data that are exchanged on the network, we need to implement a system that realizes faster attack detection and response accordingly. For detecting malicious activities, we use Intrusion Detection System (IDS) for security purpose. This paper focuses on IDS using Support Vector Machine (SVM). During the survey, the major challenges found are low detection rate and more response time. To overcome these challenge, parallel implementation of SVM classifier and appropriate feature reduction technique should be applied to achieve hig...
Visual secret sharing scheme is mostly used for secret communication technique. visual secret sha... more Visual secret sharing scheme is mostly used for secret communication technique. visual secret sharing technique Used for secret sharing that encrypt a secret image into many shares These share are encoded or are transparencies and stored into digital form. There are various criteria which decide the performance of visual secret sharing scheme like type and number of shares pixel expansion, security accuracy, computational complexity, share generated is meaningful or meaningless, type and numbers of secret images encrypted by the scheme. These share are reveal the secret image to supposed to be printed on transparences and after stacking them to each other. This paper focus and analyze of different visual secret sharing technique with respect to application and pros and cons of technique is also present.
Cloud computing a new paradigm in the field of distributed computing after Grid computing. Cloud ... more Cloud computing a new paradigm in the field of distributed computing after Grid computing. Cloud computing seems to me more promising in term of request failure, security, flexibility and resource availability. Its main feature is to maintain the Quality of service (QoS) provided to the end user in term of processing power, failure rate and many more .So Resource management and request scheduling are important and complex problems in cloud computing, Since maintaining resources and at the same time scheduling the request becomes a complex problem due to distributed nature of cloud. Many algorithms are been proposed to solve this problem like Ant colony based, cost based, priority based algorithms but all these algorithm consider cloud environment as non fault, which leads to degrade in performance of existing algorithms. So a load and fault aware Honey Bee scheduling algorithm is proposed for cloud infrastructure as a service(IaaS). This algorithm takes into consideration fault rate...
Mobile Ad hoc NETwork (MANET) is a collection of self-organizing mobile nodes without any help of... more Mobile Ad hoc NETwork (MANET) is a collection of self-organizing mobile nodes without any help of centralized administration or established infrastructure. Due to this characteristic, MANETs are particularly vulnerable to various security threats. Different routing protocols are developed for communication in MANET. Moreover in MANETs security is the major concern because it widely used in applications such as communication and data sharing .Secure routing protocols are developed as one of security mechanisms. This paper attempts to provide a comprehensive overview of secure routing protocols and some other techniques to secure, routing process in MANET.
Vehicular ad hoc network (VANET) is suffering from the frequent link breakage and low packet deli... more Vehicular ad hoc network (VANET) is suffering from the frequent link breakage and low packet delivery rate, which challenges routing protocols. Greedy forwarding is widely adopted in geographic routing protocols for VANETs since it selects the neighbour that is geographically closer to the destination as the next hop and is considered efficient. Because of the highly dynamic network topology and various impairment of radio signal, the link chosen according to the greedy algorithm regardless of the link state is unstable to a large extent, and frequent retransmissions lead to a waste of the network bandwidth and longer end to end delay. so that we can improve the result with the use of different technique that demonstrates significant reductions of end to end delay , PDR and increases throughput.
Popularity of wireless sensor networks (WSNs) is increasing continuously in different fields, as ... more Popularity of wireless sensor networks (WSNs) is increasing continuously in different fields, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to the base station, while considering the severe energy constraint and the limitations of computational and storage resources. Indeed, this functionality may be vulnerable and must be in itself secured, since conventional routing protocols in WSNs provide efficient routing techniques with low power consumption, but they do not take into account the possible attacks. As sensor nodes may be easily captured and compromised, the classical cryptographic solutions become insufficient to provide optimal routing security, especially, for cluster-based WSNs, where cluster heads can be still among the compromised nodes. In this survey paper, we have studied few different Intrusion detection systems which provide secure routing in IDS.
Vehicular Ad-hoc Network is a distributed and self-organized network, have emerged as a new power... more Vehicular Ad-hoc Network is a distributed and self-organized network, have emerged as a new powerful technology to improve driving safety and traffic management. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. Because of constraint roads and very high speed of vehicles routing is an issue in VANET. So we are analyzed the performance of topology based on routing protocol. Routing Overhead Load and End-to-End Delay metrics are considered for analysis of Cross-layer Design in routing protocol using SUMO tool and NS2 simulation
With the technology innovation in electronic devices, the rising demand for high-quality multimed... more With the technology innovation in electronic devices, the rising demand for high-quality multimedia content will continually grow. Over the last years, there is a shift from the traditional approach of streaming the media content to the modern approach of adaptive bit-rate streaming, which offers the benefit of switching to the best quality video according to varying network conditions or available bandwidth thus providing the enriched user experience. The adaptive streaming methods are more or less wholly based on HTTP, so can efficiently work over large distributed networks. This paper aims to deploy HLS (HTTP Live Streaming) for streaming of real-time multimedia, to support mobile as well as desktop browsers without the use of any plugin and also to deliver multimedia with reduced latency, therefore allowing rich quality media content to be delivered over a large number of CDN (content delivery networks). Few added advantages of using HLS are: it can easily traverse through any f...
The Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile nodes. These Mobile... more The Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile nodes. These Mobile nodes are connected by wireless link. This network do not required any infrastructure or centralized access point such as base station. MANETS are highly venerable for Passive and Active Attacks because of their open medium, rapidly changing topology and lack of centralized monitoring. Discussions regarding attacks and intrusion detection techniques on MANET are presented inclusively in this paper, and then the comparison among several intrusion detection techniques is evaluated based on this parameter.
There is good potential for practical applications such as encrypted image authentication, conten... more There is good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection, reversible data hiding in encrypted image has attracted increasing attention in recent year. Data hiding is the technique by which some data is hidden into a cover media. Data hiding can be done in audio, video, image, text, and picture. we use image for data hiding especially digital images. The data may be any text related to the image such as authentication data or author information. At the receiver side it must be able to extract the hidden data and original image. A data hiding technique satisfying this requirement is known as reversible data hiding. Reversible data hiding is a type of data hiding techniques whereby the host image can be recovered exactly. Being lossless makes this technique suitable for medical, military applications and cloud storage. In cloud storage, a content owner can encrypt an image to preserve his/her privacy,...
Sequential pattern mining and sequential rules mining are important data mining task for wide app... more Sequential pattern mining and sequential rules mining are important data mining task for wide application. Its use to find frequently occurring ordered events or sub sequence as pattern from sequence database. Sequence can be called as order list of event. If one item set is completely subset of another item set is called sub sequence. Sequential pattern mining is used in various domains such as medical treatments, natural disasters, customer shopping sequences, DNA sequences and gene structures. The problem is to discover the all sequential pattern who satisfy the user specified constraint, from the given sequence database. Sequential pattern mining algorithm are mainly classified in to two part. Apriori based and pattern growth based algorithm. These are basic sequential pattern mining algorithm and mine full set sequential pattern mining algorithm which mean these algorithm are generate all frequent sequential pattern. Index Terms Sequential pattern mining, Sequence database, apr...
Uploads
Papers by KRUNAL PANCHAL