Scientist Link Publications is Registered from Intellectual Property Rights, Government of India and Scientist Link Publications Journals is scholarly and peer reviewed journals and we are one of the leading publishers in research articles to encourage scientist, academic researchers, industrial engineers and practitioners in all aspects to share their academic and professional knowledge in the fields of science, engineering and related disciplines in dedicated to the global dissemination of information. We acquire, develop, online promotion and distribute knowledge by disseminating scholarly and professional materials throughout the worldwide with original and current research work completed on the vital issues of the above important disciplines. All SLP journals with permanent free access to full text of papers published by us maintain the unique standards of quality, with International and National Editorial Boards composed of scholars from around the world. Providing links to the world in SLP Multidisciplinary journals Supervisors: Dr.B.Prasanalakshmi Phone: +918870064112 Address: Veena Garden,
Chennai
Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain... more Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. We then develop a probabilistic aspect ranking algorithm to infer the importance of aspects by simultaneously considering aspect frequency and the influence of consumer opinions given to each aspect over their overall opinions. The experimental results on a review corpus of 21 popular products in eight domains demonstrate the effectiveness of the proposed approach. Moreover, we apply product aspect ranking to two real-world applications, i.e., document-level sentiment classification and extractive review summarization, and achieve significant performance improvements, which demonstrate the capacity of product aspect ranking in facilitating real-world applications.
Privacy and security have emerged as an important research issue in mobile Ad Hoc Networks (MANET... more Privacy and security have emerged as an important research issue in mobile Ad Hoc Networks (MANET). I proposed how to discover the communication channels without changing the packet content as plaintext, so we present a novel statistical traffic pattern discovery system. By using this system is to identify the Source/destination anonymity and end-to-end anonymity. MANET systems can achieve very restricted communication anonymity under the attack of STARS. In a MANET protected by anonymity enhancing techniques, it is a difficult task itself to identify an actual destination node as the target due to the ad hoc nature. The adversaries are not able to determine whether a particular node is a destination depending on whether the node sends out traffic.
In adhoc network is the major problem for providing security in the network. For servers, there i... more In adhoc network is the major problem for providing security in the network. For servers, there is no infrastructure A network connection established for a single session and cannot require a router or a wireless base station in computer networking. An adhoc network is created for a specific purpose and adhoc network is a temporary network connection (such as data transferring from one node to another). It is used to without loss of data and to enhance security. Sybil attack, in which an attacker manages and control to more than one identity on a single device. It is strongly desirable to detect and prevent a Sybil attack and eliminate them from the network. In this paper, Sybil attack can detect and prevent from the attackers. It can detect and prevent the information from sender to receiver without loss of information using Neighbor discover distance (NDD) algorithm. An NDD algorithm detects neighbor node and act as a server to send information to destination. In this method passive adhoc identity method and key distribution are used. Detection can be done by a single node or multiple nodes can join to improve the accuracy of detection. It can be used to secure and avoid attacking the system on the network.
Trust is an important factor that is used as a criterion for service selection. It creates servic... more Trust is an important factor that is used as a criterion for service selection. It creates service as well as building block for many real applications. Existing trust model either use properties like transitivity, multi-aspect, bias to do trust evaluation or user preferences for different quality of service is consider for trust evaluation these leads to security bleach in real application. In proposed system a trust model is created to combine both user preferences QOS and important properties of trust evaluation are considered to do trust evaluation this model is applicable to both binary and continuous scenario and works well on trust evaluation, and can reduce the malicious ratings. This method evaluates on data sets show to achieves improvement over several existing benchmark, for both numerical trustworthiness scores and predicting binary and continuous trust/distrust signs.
In MANET decision-making, key-distribution, routing and forwarding packets are usually decentrali... more In MANET decision-making, key-distribution, routing and forwarding packets are usually decentralized and many of them depend on the cooperative participation among all nodes. MANET is particularly susceptible to several attacks ranging from passive eavesdropping to active interfering due to their open medium; this is in contrast to wired networks, where an opposition must gain physical access to the network wires to be able to make such type of attacks. The main contribution in this paper is to increase the efficiency of intrusion detection system in MANET, by decreasing the false-positives. The modules used in proposed system are node generation, clustering of nodes, Route discovery, shortest distance path, attacker detection such as the node is attacker or not. While using Nash Equilibrium in networks to detect multiple attackers present in MANETs. The Nash equilibrium determines various node strategies in clusters of nodes. Simulation results show that the mobile utility, performance, stability of MANET’s, the proposed scheme can enable to prevent attackers with fully distributed nature.
The namespace management is based on hierarchical directory trees. This tree-based namespace sche... more The namespace management is based on hierarchical directory trees. This tree-based namespace scheme is prone to severe performance bottlenecks and often fails to provide real time response to complex data lookups. This paper proposes a semantic-aware namespace scheme, called sane, which provides dynamic and adaptive namespace management for ultra-large storage systems with billions of files. Associative access on the files is provided by an initial extension to existing tree structured file system protocols, and by the use of these protocols that are designed specifically for content based file system access. Access on the file details such as versions or any other concepts were interpreted as queries applied on our container engine, and thus provides flexible associative access to files. Indexing of key properties of file system objects and indexing/ caching on the file system is one of the fantastic features of our system. The automatic indexing of files and grouped based on relativity is called “semantic” because user programmable nature of the system uses information about the semantics of updated file system objects to extract the properties for indexing. The semantic correlations and file groups identified in sane can also be used to facilitate file perfecting and data de-duplication, among other system-level optimizations.
International Journal of Computer Science and Engineering Communications, Apr 20, 2015
Many security primitives are based on hard mathematical problems. One the problem use of password... more Many security primitives are based on hard mathematical problems. One the problem use of passwords is a major point of vulnerability in computer security, as passwords are often easy to guess by automated programs running dictionary attacks. Passwords remain the most widely used authentication method despite their well-known security weaknesses. CAPTCHA authentication is clearly a practical problem. In a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology is call Captcha as graphical passwords. CaRP is both a Captcha and a graphical password scheme the authentication scheme that preserves the advantages of conventional password authentication. The proposed scheme is easy to implement and overcomes some of the difficulties of previously suggested methods of improving the security of user authentication schemes CaRP also offers protection against relay attacks, an increasing threat to bypass Captchas protection. An artificial image which contains some vital information, able to observe by Human but not by computer as automated task, is known as CAPTCHA image. The captcha will be used to prevent the task automation in performing repeated re try task in authentication process. The proposed scheme CAPTCHA also provides better protection against denial of service attacks against user accounts.
The main objective of this project is to provide free banking services through USSD application o... more The main objective of this project is to provide free banking services through USSD application on a basic mobile phone without use of internet which will be helpful mainly for tribal and hill station people. In Hill station and tribal areas, unavailability of ATM leads people to depend on ‘BC’ persons to transact money from banks. But the BC person visits people only once or twice in a week and people cannot contact them instantly. So the drawback is, those people cannot transact money instantly. Although USSD system exists in some banks, it provides only limited services through USSD in only TRS, while regional languages and IVRS are not available. In proposed system, this USSD code service can be used to access additional banking services through both TRS and IVRS modules. The modules used in proposed system are USSD Code generation Module, Interface Module, Database Repository Module, Transactions Module such as IVRS- Integrated Voice Response System and TRS- Transaction Response System. User’s voice and 25 questions for security and login settings will be registered initially. By accessing the USSD code, people can select their regional language and provide account details, and after few seconds they will get a call from bank asking for password match in voice keyword and to answer any three random questions from the 25 registered questions. The successful login then proceeds to access services. The proposed system is toll free with regional languages options, additional banking services and IVRS facilities. Hence by implementing this system, people can instantly do their money transfer, bill payment, top up and contact BC persons easily. Only mobile phone with GSM network is enough for this application. No internet connection is required. No charges are applicable for the transaction. The BC person’s time for delivering cash is also reduced to 1 day. The regional language service in IVRS will be very useful to hill station and tribal people who contacts only orally and does not have authorized symbols in their language for TRS.
Software Cost Estimation is used for large-scaled and complex software systems leads managers to ... more Software Cost Estimation is used for large-scaled and complex software systems leads managers to settle SCE as one of the most vital activities that is closely related to predicate the success or failure of the whole development process. Propose a statistical framework based on a multiple comparisons algorithm in order to rank several cost estimation models, identifying those which have significant differences in accuracy, and clustering them in non-overlapping groups. In the existing work Scott-Knott test was used to rank and cluster the software estimation models. The test proposed by Scott Knott, a procedure of means grouping, is an effective alternative to perform procedures of multiple comparisons without ambiguity. This study aimed to propose a modification related to the partitioning and means grouping in the said procedure, to obtain results without ambiguity among treatments, organized in more homogeneous groups. In the proposed methodology, treatments that did not participate in the initial group are joined for a new analysis, which allows for a better group distribution. The proposed methodology is considered effective, aiming at the identification of elite cultivar groups for recommendation.
Wireless Sensor Network (WSN) is a wireless communication System based on embedded system and sen... more Wireless Sensor Network (WSN) is a wireless communication System based on embedded system and sensor system, which is equipped with lots of low-cost micro low-power sensor nodes. Nowadays, WSN has been widely applied in various fields for their merits, such as smart home, environmental monitoring, and military surveillance, disaster relief operations etc .The wireless sensor network checks physical and environmental status, data is collected and sent to the base station via network. Clustering combines several sensor nodes to form a cluster and elects a head for the clusters formed. Cluster formation and cluster head selection plays major role in Wireless Sensor Networks (WSNs).In order to select a Cluster Head various parameter such as residual energy, centrality, number of neighbors, distance to base station etc., can be considered. . This paper focuses on coordination of sensor nodes in a network and selection of best node which keeps information of affiliated sensor node for communication with cluster head of other clusters using fuzzy logic.BFO algorithm also used for optimization .This model improves the network lifetime and efficiency of the Cluster Head.
Personal Health Records (PHRs) is based on cloud virtual machine in web oriented application in w... more Personal Health Records (PHRs) is based on cloud virtual machine in web oriented application in which the lifelong health data of patients, who should be able to show them conveniently and securely to selected disables in an institution. The MyPHRMachines, a cloud-based PHR system taking a radically new architectural solution to health record portability. In MyPHR Machines, health-related data and the application software to view and analyze it are separately deployed in the PHR system. After uploading their medical data to MyPHRMachines, patients can access them again from remote virtual machines that contain the right software to visualize and analyze them without any need for conversion. Patients can share their remote virtual machine session with selected caregivers, my aim at providing patients (and their trusted caregivers) remote desktop or tablet computer access to all their PHR data, and support this access by the software that matches the data format. Since do not tackle semantic data integration in the paper, one can more specifically label this as health record mobility and portability. The person will need only a Web browser to access the pre-loaded fragments of their lifelong PHR.
Major security issues for banking and financial institutions are Phishing. Phishing is a webpage ... more Major security issues for banking and financial institutions are Phishing. Phishing is a webpage attack, it pretends a customer web services using tactics and mimics from unauthorized persons or organization. It is an illegitimate act to steals user personal information such as bank details, social security numbers and credit card details, by showcasing itself as a truthful object, in the public network. When users provide confidential information, they are not aware of the fact that the websites they are using are phishing websites. This paper presents a technique for detecting phishing website attacks and also spotting phishing websites by combines source code and URL in the webpage.
Cancer is one of the major problem today, diagnosing cancer in earlier stage is still challenging... more Cancer is one of the major problem today, diagnosing cancer in earlier stage is still challenging for doctors. Breast cancer is one of the major death causing diseases of the women today all over the world. Every year more than million women are diagnosed with breast cancer worldwide over half of them will die because of the late diagnosing of the disease. So many researches have undergone for detecting the cancer based on data mining technology each approach has its own limitations. This makes us to take up this problem and to implement the Data mining based cancer prediction System (DMBCPS). We have proposed this cancer prediction system based on data mining technology. This system estimates the risk of the breast cancer in the earlier stage. This system is validated by comparing its predicted results with patient’s prior medical information and it was analyzed by using weka system. The main aim of this model is to provide the earlier warning to the users, and it is also cost efficient to the user.
Relevance feedback is a technique that takes advantage of human-computer interaction to refine hi... more Relevance feedback is a technique that takes advantage of human-computer interaction to refine high level queries represented by low level features. Among RF schemes, the most popular technique is SVM based RF scheme. When SVM is used as a classifier in RF, there are two strategies. One strategy is to display the most positive images and use them as the training samples. The most-positive images are chosen as the ones farthest from the boundary on the positive side, plus those nearest from the boundary on the negative side if necessary. Another strategy is that most of SVM based RF scheme does not consider the unlabeled samples even though they are useful in constructing a good classifier. To overcome these drawbacks, in this paper we propose a biased maximum margin analysis (BMMA) and semi supervised BMMA (semiBMMA) for integrating the distinct properties of feedbacks and also to utilize the information of unlabeled samples. The BMMA differentiates positive from negative feedbacks, whereas semiBMMA takes into account the information of unlabeled samples by the introduction of Laplacian regularizer to BMMA. To validate the efficacy of the proposed approach, we test it on both synthesized data and real-world images. Promising results are achieved and this can significantly improve the performance of CBIR systems.
Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain... more Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. We then develop a probabilistic aspect ranking algorithm to infer the importance of aspects by simultaneously considering aspect frequency and the influence of consumer opinions given to each aspect over their overall opinions. The experimental results on a review corpus of 21 popular products in eight domains demonstrate the effectiveness of the proposed approach. Moreover, we apply product aspect ranking to two real-world applications, i.e., document-level sentiment classification and extractive review summarization, and achieve significant performance improvements, which demonstrate the capacity of product aspect ranking in facilitating real-world applications.
Privacy and security have emerged as an important research issue in mobile Ad Hoc Networks (MANET... more Privacy and security have emerged as an important research issue in mobile Ad Hoc Networks (MANET). I proposed how to discover the communication channels without changing the packet content as plaintext, so we present a novel statistical traffic pattern discovery system. By using this system is to identify the Source/destination anonymity and end-to-end anonymity. MANET systems can achieve very restricted communication anonymity under the attack of STARS. In a MANET protected by anonymity enhancing techniques, it is a difficult task itself to identify an actual destination node as the target due to the ad hoc nature. The adversaries are not able to determine whether a particular node is a destination depending on whether the node sends out traffic.
In adhoc network is the major problem for providing security in the network. For servers, there i... more In adhoc network is the major problem for providing security in the network. For servers, there is no infrastructure A network connection established for a single session and cannot require a router or a wireless base station in computer networking. An adhoc network is created for a specific purpose and adhoc network is a temporary network connection (such as data transferring from one node to another). It is used to without loss of data and to enhance security. Sybil attack, in which an attacker manages and control to more than one identity on a single device. It is strongly desirable to detect and prevent a Sybil attack and eliminate them from the network. In this paper, Sybil attack can detect and prevent from the attackers. It can detect and prevent the information from sender to receiver without loss of information using Neighbor discover distance (NDD) algorithm. An NDD algorithm detects neighbor node and act as a server to send information to destination. In this method passive adhoc identity method and key distribution are used. Detection can be done by a single node or multiple nodes can join to improve the accuracy of detection. It can be used to secure and avoid attacking the system on the network.
Trust is an important factor that is used as a criterion for service selection. It creates servic... more Trust is an important factor that is used as a criterion for service selection. It creates service as well as building block for many real applications. Existing trust model either use properties like transitivity, multi-aspect, bias to do trust evaluation or user preferences for different quality of service is consider for trust evaluation these leads to security bleach in real application. In proposed system a trust model is created to combine both user preferences QOS and important properties of trust evaluation are considered to do trust evaluation this model is applicable to both binary and continuous scenario and works well on trust evaluation, and can reduce the malicious ratings. This method evaluates on data sets show to achieves improvement over several existing benchmark, for both numerical trustworthiness scores and predicting binary and continuous trust/distrust signs.
In MANET decision-making, key-distribution, routing and forwarding packets are usually decentrali... more In MANET decision-making, key-distribution, routing and forwarding packets are usually decentralized and many of them depend on the cooperative participation among all nodes. MANET is particularly susceptible to several attacks ranging from passive eavesdropping to active interfering due to their open medium; this is in contrast to wired networks, where an opposition must gain physical access to the network wires to be able to make such type of attacks. The main contribution in this paper is to increase the efficiency of intrusion detection system in MANET, by decreasing the false-positives. The modules used in proposed system are node generation, clustering of nodes, Route discovery, shortest distance path, attacker detection such as the node is attacker or not. While using Nash Equilibrium in networks to detect multiple attackers present in MANETs. The Nash equilibrium determines various node strategies in clusters of nodes. Simulation results show that the mobile utility, performance, stability of MANET’s, the proposed scheme can enable to prevent attackers with fully distributed nature.
The namespace management is based on hierarchical directory trees. This tree-based namespace sche... more The namespace management is based on hierarchical directory trees. This tree-based namespace scheme is prone to severe performance bottlenecks and often fails to provide real time response to complex data lookups. This paper proposes a semantic-aware namespace scheme, called sane, which provides dynamic and adaptive namespace management for ultra-large storage systems with billions of files. Associative access on the files is provided by an initial extension to existing tree structured file system protocols, and by the use of these protocols that are designed specifically for content based file system access. Access on the file details such as versions or any other concepts were interpreted as queries applied on our container engine, and thus provides flexible associative access to files. Indexing of key properties of file system objects and indexing/ caching on the file system is one of the fantastic features of our system. The automatic indexing of files and grouped based on relativity is called “semantic” because user programmable nature of the system uses information about the semantics of updated file system objects to extract the properties for indexing. The semantic correlations and file groups identified in sane can also be used to facilitate file perfecting and data de-duplication, among other system-level optimizations.
International Journal of Computer Science and Engineering Communications, Apr 20, 2015
Many security primitives are based on hard mathematical problems. One the problem use of password... more Many security primitives are based on hard mathematical problems. One the problem use of passwords is a major point of vulnerability in computer security, as passwords are often easy to guess by automated programs running dictionary attacks. Passwords remain the most widely used authentication method despite their well-known security weaknesses. CAPTCHA authentication is clearly a practical problem. In a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology is call Captcha as graphical passwords. CaRP is both a Captcha and a graphical password scheme the authentication scheme that preserves the advantages of conventional password authentication. The proposed scheme is easy to implement and overcomes some of the difficulties of previously suggested methods of improving the security of user authentication schemes CaRP also offers protection against relay attacks, an increasing threat to bypass Captchas protection. An artificial image which contains some vital information, able to observe by Human but not by computer as automated task, is known as CAPTCHA image. The captcha will be used to prevent the task automation in performing repeated re try task in authentication process. The proposed scheme CAPTCHA also provides better protection against denial of service attacks against user accounts.
The main objective of this project is to provide free banking services through USSD application o... more The main objective of this project is to provide free banking services through USSD application on a basic mobile phone without use of internet which will be helpful mainly for tribal and hill station people. In Hill station and tribal areas, unavailability of ATM leads people to depend on ‘BC’ persons to transact money from banks. But the BC person visits people only once or twice in a week and people cannot contact them instantly. So the drawback is, those people cannot transact money instantly. Although USSD system exists in some banks, it provides only limited services through USSD in only TRS, while regional languages and IVRS are not available. In proposed system, this USSD code service can be used to access additional banking services through both TRS and IVRS modules. The modules used in proposed system are USSD Code generation Module, Interface Module, Database Repository Module, Transactions Module such as IVRS- Integrated Voice Response System and TRS- Transaction Response System. User’s voice and 25 questions for security and login settings will be registered initially. By accessing the USSD code, people can select their regional language and provide account details, and after few seconds they will get a call from bank asking for password match in voice keyword and to answer any three random questions from the 25 registered questions. The successful login then proceeds to access services. The proposed system is toll free with regional languages options, additional banking services and IVRS facilities. Hence by implementing this system, people can instantly do their money transfer, bill payment, top up and contact BC persons easily. Only mobile phone with GSM network is enough for this application. No internet connection is required. No charges are applicable for the transaction. The BC person’s time for delivering cash is also reduced to 1 day. The regional language service in IVRS will be very useful to hill station and tribal people who contacts only orally and does not have authorized symbols in their language for TRS.
Software Cost Estimation is used for large-scaled and complex software systems leads managers to ... more Software Cost Estimation is used for large-scaled and complex software systems leads managers to settle SCE as one of the most vital activities that is closely related to predicate the success or failure of the whole development process. Propose a statistical framework based on a multiple comparisons algorithm in order to rank several cost estimation models, identifying those which have significant differences in accuracy, and clustering them in non-overlapping groups. In the existing work Scott-Knott test was used to rank and cluster the software estimation models. The test proposed by Scott Knott, a procedure of means grouping, is an effective alternative to perform procedures of multiple comparisons without ambiguity. This study aimed to propose a modification related to the partitioning and means grouping in the said procedure, to obtain results without ambiguity among treatments, organized in more homogeneous groups. In the proposed methodology, treatments that did not participate in the initial group are joined for a new analysis, which allows for a better group distribution. The proposed methodology is considered effective, aiming at the identification of elite cultivar groups for recommendation.
Wireless Sensor Network (WSN) is a wireless communication System based on embedded system and sen... more Wireless Sensor Network (WSN) is a wireless communication System based on embedded system and sensor system, which is equipped with lots of low-cost micro low-power sensor nodes. Nowadays, WSN has been widely applied in various fields for their merits, such as smart home, environmental monitoring, and military surveillance, disaster relief operations etc .The wireless sensor network checks physical and environmental status, data is collected and sent to the base station via network. Clustering combines several sensor nodes to form a cluster and elects a head for the clusters formed. Cluster formation and cluster head selection plays major role in Wireless Sensor Networks (WSNs).In order to select a Cluster Head various parameter such as residual energy, centrality, number of neighbors, distance to base station etc., can be considered. . This paper focuses on coordination of sensor nodes in a network and selection of best node which keeps information of affiliated sensor node for communication with cluster head of other clusters using fuzzy logic.BFO algorithm also used for optimization .This model improves the network lifetime and efficiency of the Cluster Head.
Personal Health Records (PHRs) is based on cloud virtual machine in web oriented application in w... more Personal Health Records (PHRs) is based on cloud virtual machine in web oriented application in which the lifelong health data of patients, who should be able to show them conveniently and securely to selected disables in an institution. The MyPHRMachines, a cloud-based PHR system taking a radically new architectural solution to health record portability. In MyPHR Machines, health-related data and the application software to view and analyze it are separately deployed in the PHR system. After uploading their medical data to MyPHRMachines, patients can access them again from remote virtual machines that contain the right software to visualize and analyze them without any need for conversion. Patients can share their remote virtual machine session with selected caregivers, my aim at providing patients (and their trusted caregivers) remote desktop or tablet computer access to all their PHR data, and support this access by the software that matches the data format. Since do not tackle semantic data integration in the paper, one can more specifically label this as health record mobility and portability. The person will need only a Web browser to access the pre-loaded fragments of their lifelong PHR.
Major security issues for banking and financial institutions are Phishing. Phishing is a webpage ... more Major security issues for banking and financial institutions are Phishing. Phishing is a webpage attack, it pretends a customer web services using tactics and mimics from unauthorized persons or organization. It is an illegitimate act to steals user personal information such as bank details, social security numbers and credit card details, by showcasing itself as a truthful object, in the public network. When users provide confidential information, they are not aware of the fact that the websites they are using are phishing websites. This paper presents a technique for detecting phishing website attacks and also spotting phishing websites by combines source code and URL in the webpage.
Cancer is one of the major problem today, diagnosing cancer in earlier stage is still challenging... more Cancer is one of the major problem today, diagnosing cancer in earlier stage is still challenging for doctors. Breast cancer is one of the major death causing diseases of the women today all over the world. Every year more than million women are diagnosed with breast cancer worldwide over half of them will die because of the late diagnosing of the disease. So many researches have undergone for detecting the cancer based on data mining technology each approach has its own limitations. This makes us to take up this problem and to implement the Data mining based cancer prediction System (DMBCPS). We have proposed this cancer prediction system based on data mining technology. This system estimates the risk of the breast cancer in the earlier stage. This system is validated by comparing its predicted results with patient’s prior medical information and it was analyzed by using weka system. The main aim of this model is to provide the earlier warning to the users, and it is also cost efficient to the user.
Relevance feedback is a technique that takes advantage of human-computer interaction to refine hi... more Relevance feedback is a technique that takes advantage of human-computer interaction to refine high level queries represented by low level features. Among RF schemes, the most popular technique is SVM based RF scheme. When SVM is used as a classifier in RF, there are two strategies. One strategy is to display the most positive images and use them as the training samples. The most-positive images are chosen as the ones farthest from the boundary on the positive side, plus those nearest from the boundary on the negative side if necessary. Another strategy is that most of SVM based RF scheme does not consider the unlabeled samples even though they are useful in constructing a good classifier. To overcome these drawbacks, in this paper we propose a biased maximum margin analysis (BMMA) and semi supervised BMMA (semiBMMA) for integrating the distinct properties of feedbacks and also to utilize the information of unlabeled samples. The BMMA differentiates positive from negative feedbacks, whereas semiBMMA takes into account the information of unlabeled samples by the introduction of Laplacian regularizer to BMMA. To validate the efficacy of the proposed approach, we test it on both synthesized data and real-world images. Promising results are achieved and this can significantly improve the performance of CBIR systems.
Uploads