[1] |
Enlightening Enactment Of Routing Protocols Using MRP Framework Dr.P.Rizwan Ahmed In 3rd International Conference on Recent Advances in Management and Technology , Invertis University, Bareilly, Utter Pradesh, Jan 2021.
Abstract [+]
These days MANET (Mobile Ad-hoc Network) is an amazing remarkably altering or rising technology, for the reason that of its elite nature of scattered mobile devices and self-motivated network topology. The mobile ad-hoc routing protocol follows several principles in wireless MANET’s. The up to date and novel applications based on wireless technology are being produced in the private as well as commercial sectors. A lot of challenges which are facing wireless MANETs like network stability, security, energy efficiency and performance analysis etc. At present wireless ad-hoc network get much more attention because of its accessibility everywhere. As a result researchers produce several routing protocols. In this paper first of all we analyzed the performance investigation of wireless routing protocols on the basis of ROH (Routing Overhead), throughput, end-2-end delay and PDR (Packet Delivery Ratio). After that we proposed an MRP (Mixed Routing Protocol) framework which improve performance.
|
[2] |
Convinced Enhancements in Feature Diversity For Data Mining and its Applications in Opinion Mining Dr.P.Rizwan Ahmed In International Virtual Conference on Applied Science , Technology Management and Language Studies (ASTMLS-2020), Sona College of Technology, Salem, Dec 2020.
Abstract [+]
Opinion Mining (OM), which is also known as Sentiment classification or a
Polarity classification, is that binary classification of task labelling of an
opinionated text/document that expresses either a positive or an overall
opinion that is negative. Several technique of analysis of a subjective
information in the classification of sentiment is available. The extraction of feature chooses sufficient features for characterizing the opinion. The feature
selection (FS) that is also known as the variable selection, subset selection or
attribute reduction available in machine learning. It does select an input of
dataset which closely defines its specific outcome. Here in this research a
feature selection mechanism that is wrapper based is used based on a heuristic
algorithm. The experiments demonstrate that the proposed method improves
the efficiency of the classifiers and achieve higher accuracy.
|
[3] |
Improving Cluster Based Feature Selection using Modified Minimum Spanning Tree Dr.P.Rizwan Ahmed In Sixth International Conference on Computing Paradigm , Don Bosco College, Yeligiri , Dec 2020.
Abstract [+]
The issue of feature subset selection for data of high dimensionality in classifying opinions has been investigated in this paper. Feature selection schemes select the crucial feature subset producing similar or superior classification outcomes compared to the original feature set obtained. Despite their higher efficiencies, wrapper-based feature selection schemes have high overheads of computation. However, the issue is the problem is Non-deterministic Polynomial (NP) hard. This work suggests the clustering scheme based on MST optimized by the Group Search Optimization (GSO) for efficient selection of features. The Amazon camera review dataset is used for evaluating the suggested scheme. Experiments are conducted to evaluate the proposed method and compared with the MRMR feature selection, FCM clustering, and MST based clustering.
|
[4] |
Learning on Reliable and Secure Routing Protocol on MANET Dr.P.Rizwan Ahmed In International E-Conference on Recent Development in Science , Engineering, and Information Technology , Madurai Kamaraj University, Madrai, Sep 2020.
Abstract [+]
This survey article intent presents knowledge into the security execution issues related to
steering in wireless networking like MANET’s (Mobile Ad hoc Networks).The mobile adhoc
networks are exposed to attacks at all the layers especially at the network layer. This study
specially provides a set of solutions for the issues of various attacks like attacks on
modifications, impersonation attacks, fabrication and rushing attacks. A few methodologies are
analysed for prevention, detection and reaction on various attacks by malicious nodes. The
study of this article has examined the methodologies meant for fathoming the implementation
issues like, changes in topology, vitality utilization of stations, delay, throughput, transmit time,
packet transmission ratio, systems or nodes security and administration.
|
[5] |
A basic interchange methodology for Skillful and Protected Routing in Mobile Adhoc Network Dr.P.Rizwan Ahmed In International E-Conference on Recent Development in Science , Engineering, and Information Technology , Madurai Kamaraj University, Madrai, Sep 2020.
Abstract [+]
Mobile ad hoc networks (MANETs) are a collection of wireless mobile devices with restricted
broadcast range and resources. Communication is achieved by relaying data along appropriate
routes that are dynamically discovered and maintained through collaboration between the nodes.
Discovery of such routes is a major task, both from efficiency and security point of view.
This paper presents a proficient and secure routing, based on asymmetric authentication using
key exchange approach (KEA). The proposed mechanism ensures secure routing and quality of
service in MANETs and minimizes the network overhead. The KEA mechanism can be
effectively used to develop a new routing protocol for Mobile Adhoc Networks which will
provide maximum security against all kinds of attacks. In this paper, KEA is compared with
other secure routing protocols like EEACK, AODV, and ARIADANE, to evaluate the efficiency
of KEA in Ad Hoc Networks. The empirical results show that
|
[6] |
Virtual Reality Based Study Of Cluster-Based Protocol In Wireless Sensor Network Dr.P.Rizwan Ahmed In International Conference on Research Developments in Applied Science, Engineering and Management (AEM-2018) , The Indian Coouncil of Social Science Research (ICSSR), Panjab University Campus, Chandigarh, Aug 2018.
Abstract [+]
The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way
to systematize WSN in applications like surveillance, industrial monitoring, traffic monitoring,
habitat monitoring, cropping monitoring, crowd including etc. The rising use of these networks is
making engineers evolve novel and efficient ideas in this field. A group of research in data
routing, data density and in network aggregation has been proposed in recent years. The energy
consumption is the main apprehension in the wireless sensor network. There are many protocols
in wireless sensor network to diminish the energy consumption and to put in to the network
lifetime. Among a range of types of techniques, clustering is the most efficient technique to
diminish the energy expenditure of network. In this effort, LEACH protocol has been secondhand
for clustering in which cluster heads are nominated on the basis of distance and energy. The
LEACH protocol is been implemented in a simulated environment and analyze their performance
graphically.
|
[7] |
A Study on Effective Data Mining Techniques with Unstructured of Big Data Dr.P.Rizwan Ahmed In 5th International Conference on “Latest Innovations in Science, Engineering and Management†(ICLISEM - 2017) , International Centre Goa, India , Sep 2017.
Abstract [+]
Big data is collection of data which is vast range and composite data.. Data obtain created from each and every way, from various fields. These big data has structured semi-structured and unstructured kind of data. In today period data is been gathered on great scale. Social media sites, digital images and videos and countless other. Entire world is going so as to near the digitalization. All this kinds of data is well known as big data. Data mining is a process for uncovering a design which is convenient from huge scale data sets. We gather the healthcare information which comprise all the particulars of the sufferer, their symptoms, ill health etc. Formally we gather the information then there will be pre-managing on that information as we require only strain information for our study. Convenient and significant data can be withdraw from this big information with the assist of data mining by managing on that data. The data will be saved in Hadoop. User can access the data by symptoms, disease etc.
|
[8] |
Big Data and Cloud Computing Dr.P.Rizwan Ahmed In International Conference on Recent Innovations in Science, Engineering, Humanities and Management (ICRISEHM-17) , Chhatrapati Shahu Maharaj Shikshan Sanstha’s (CSMSS ) College of Polytechnic, Kanchanwadi,Aurangabad – Maharashtra, Sep 2017.
Abstract [+]
Big data can bring huge benefits to businesses of all size. However, as with any business project, proper preparation and planning is essential, especially when it comes to infrastructure. Until recently it was hard for companies and organizations to get into big data without making heavy infrastructure investments (expensive data warehouses, software, analytics staff, etc.). But times have changed. Now cloud computing has opened up a door to the companies to avoid investing lot of money for infrastructure.
|
[9] |
A Study of Events Logs from Elevated Volume of Logistics Information in Spatio-Temporal Data Mining Dr.P.Rizwan Ahmed In 10th International Conference on Recent Trends in Engineering Science and Management (ICRTESM-17), Newton’s Institute of Science and Technology, Guntur Dist, Andhra Pradesh, India. , Aug 2017.
Abstract [+]
In logistics, software aids for transportation planning and scheduling are often based in approximations and abstractions that do not take into account real-world data. The aim of this work is to provide an analysis and methodology, based on real-world data, on how to obtain probability density functions for prediction of activity duration. Such information can be used in planning algorithms, like vehicle routing problem, capable of dealing with stochastic time-windows.
|
[10] |
Hiking Robots in Natural Territory Dr.P.Rizwan Ahmed In International Conference on Augmented ContemporaryIdeas and Innovation in Business Interventions (ICACIIBI-2017) , Marudhar Kesari Jain College for Women, Vaniyambadi , Aug 2017.
Abstract [+]
This paper presents a general framework for planning the quasi-static motion of climbing robots. The framework is instantiated to compute climbing motions of a three-limbed robot in vertical natural terrain. An example resulting path through a large simulated environment is presented. The planning problem is one of five fundamental challenges to the development of real robotic systems able to climb real natural terrain. Each of the four other areas—hardware design, control, sensing, and grasping—is also discussed.
|
[11] |
ERP Systems and Competitive Advantage: Some Initial Results Dr.P.Rizwan Ahmed In International Conference on Augmented ContemporaryIdeas and Innovation in Business Interventions (ICACIIBI-2017) , Marudhar Kesari Jain College for Women, Vaniyambadi, Aug 2017.
Abstract [+]
Enterprise Resource Planning (ERP) systems have become a de facto standard for integrating business functions. But an obvious question arises: if every business is using the same so-called ―Vanilla‖ software (e.g. an SAP ERP system) what happens to the competitive advantage from implementing IT systems? If we discard our custom-built legacy systems in favour of enterprise systems do we also jettison our valued competitive advantage from IT? While for some organisations ERPs have become just a necessity for conducting business, others want to exploit them to outperform their competitors. In the last few years, researchers have begun to study the link between ERP systems and competitive advantage. This link will be the focus of this paper. We outline a framework summarizing prior research and suggest two researchable questions. In conclusion, we present some initial findings from two empirical case studies derived from part of the European food industry.
|
[12] |
The Embryonic Classification of Dementia: Inclusion the DSM-5 in a Consequential Historical and Cultural Environment and Contemplative the Expectations of ‘‘Alzheimer’ Dr.P.Rizwan Ahmed In 3rd International Conference on “ Emerging Trends in Engineering and Management Research– (ICETEMR-17) , Institutions of Electronics and Telecommunications Engineers, Pune, India, Jul 2017.
Abstract [+]
Alzheimer’s disease is a 100-year-old concept. As a diagnostic label, it has evolved over the 20th and 21st centuries from a rare diagnosis in younger patients to a worldwide epidemic common in the elderly, said to affect over 35 million people worldwide. In this opinion piece, we use a constructivist approach to review the early history of the terms ‘‘Alzheimer’s disease’’ and related concepts such as dementia, as well as the more recent nosological changes that have occurred in the four major editions of the Diagnostic and Statistical Manual since 1952. A critical engagement of the history of Alzheimer’s disease and dementia, specifically the evolution of those concepts in the DSM over the past 100 years, raises a number of questions about how those labels and emergent diagnoses.
|
[13] |
Computerized Technique for Computer-Aided Diagnosis of Dementia based on structural MRI data Dr.P.Rizwan Ahmed In 3rd International Conference on “ Emerging Trends in Engineering and Management Research– (ICETEMR-17) , Institutions of Electronics and Telecommunications Engineers, Pune, India, Jul 2017.
Abstract [+]
Neurodegenerative diseases are frequently associated with structural changes in the brain. Magnetic Resonance Imaging (MRI) scans can show these variations and therefore be used as a supportive feature for a number of neurodegenerative diseases. The hippocampus has been known to be a biomarker for Alzheimers disease and other neurological and psychiatric diseases. However, it requires accurate, robust and reproducible delineation of hippocampal structures. This work utilises a datasets consisting of MR images shared by EADC-ADNI working group . Hippocampus volume is a feature used in this analysis. For the other features we used publicly available brain segmentation package FreeSurfer v.5.1 (FS) (freesurfer.nmr.mgh.harvard.edu) [17] to process the structural brain MRI scans and compute morphological measurements. The FreeSurfer pipeline is fully automatic and provides 184 features per MRI scan in total. Volumes of cortical and sub-cortical structures such as the caudate and average thickness measurements within cortical regions, such as the precuneus. We use the FS features but for hippocampus volume we use the segmentation proposed in [16]. For the diagnosis classification we passed all the features to a C-Support Vector Classifier (C-SVC) with a linear kernel on a 5-fold cross validation. The goal is evaluating the performance of an algorithms for multi-class classification: AD, MCI and controls. Methods that are developed for binary classification can be used for three-way classification by using either a one-vs-one (ovo) or one-vs-all (ova) strategy. In this approach, three classifiers are trained for the three binary problems using the ovo methodology and thereafter their outputs are combined into three predictions.
|
[14] |
Enlargement of a Cloud Based Seclusion Monitoring Framework for the Health Division Dr.P.Rizwan Ahmed In 4th International Conference on “ Emerging Trends in Engineering and Management Research– (ICETEMR-17) , Institutions of Electronics and Telecommunications Engineers, Pune, India, Jul 2017.
Abstract [+]
Cloud computing is growing in popularity due to its ability to offer dynamically scalable resources provisioned as services regardless of user or location device. However, moving data to the cloud means that the control of the data is more in the hands of the cloud provider rather than the data owner. This is a great challenge that continues to hinder cloud computing from successfully achieving its potential. This is due to the fact that with cloud computing, the storage and processing of private information is done on remote machines that are not owned or even managed by the cloud consumers. This brings about significant security and data privacy concerns that impede the broader adoption of cloud computing, which compromises the vision of cloud computing as a new IT procurement model.
|
[15] |
Large Scale Data Analytics of User Performance for Humanizing Substance Deliverance Dr.P.Rizwan Ahmed In 4th International Conference on “ Emerging Trends in Engineering, Technology, Science and Management – (ICETETSM-17) , Institutions of Electronics and Telecommunication Engineers, Pune, India, Jul 2017.
Abstract [+]
The Internet is fast becoming the de facto content delivery network of the world, supplanting TV and physical media as the primary method of distributing larger files to ever-increasing numbers of users at the fastest possible speeds. Recent trends have, however, posed challenges to various players in the Internet content delivery ecosystem. These trends include exponentially increasing traffic volume, increasing user expectation for quality of content delivery, and the ubiquity and rise of mobile traffic.
|
[16] |
Using Compound Vision Geometry for Diffusion Tower Re-Enactment Dr.P.Rizwan Ahmed In 4th International Conference on “ Emerging Trends in Engineering, Technology, Science and Management – (ICETETSM-17) , Institutions of Electronics and Telecommunications Engineers, Pune, India, Jul 2017.
Abstract [+]
Automated platforms that conduct power line inspections need to have a vision system which is robust for their harsh working environment. State-of-the-art work in this field focuses on detecting primitive shapes in 2D images in order to isolate power line hardware. Recent trends are starting to explore 3D vision for autonomous platforms, both for navigation and inspection. However, expensive options in the form of specialized hardware is being researched. A cost effective approach would begin with multiple view geometry. Therefore, this study aims to provide a 3D context in the form of a reconstructed transmission pylon that arises from image data. To this end, structure from motion techniques are used to understand multiple view geometry and extract camera extrinsic.
|
[17] |
A Survey on Secure Data Relocate & File Distribution use of Cloud Service for Mobile Application Dr.P.Rizwan Ahmed In 3rd International Conference on “Latest Innovations in Science, Engineering and Management – (ICLISEM-17) , International Centre, Goa, India, Feb 2017.
Abstract [+]
Smart phones are basic needs of our daily life. It’s like a small computer which gives you many facilities such as web browsing, downloading and many more but small data storage space and backup are major problem. On the other hand cloud computing provides efficient computational resources and secure data hosting services. But the data transmission among two secure networks is performed over unsecured network. So need a design to secure data transfer.
|
[18] |
Challenges in Backing Up and Restoring Enterprise Applications Dr.P.Rizwan Ahmed In International Conference on Recent Trends in Engineering Science, Humanities and Management (RTESHM-17) , Sri Ramasamy Naidu Memorial College, Sattur, Tamil Nadu, Feb 2017.
Abstract [+]
Backing up and restoring enterprise applications (EAs) are essential operations that are usually done manually by an administrator or semi-automatically by tools. Backing up an enterprise application (EA) consists of backing up all its components together with the environments and operating systems in a consistent way so that the application can be restored and function properly later. There are many challenges for backing up and restoring EAs. This paper proposes a framework for automating the process of backing up and restoring EAs deployed in a cloud environment to ensure the continuous running of these enterprise applications and prevent the loss of data in case failure of applications
|
[19] |
Join Indices for Relational Database Management System Dr.P.Rizwan Ahmed In 9th International Conference on Recent Innovations in Science, Engineering and Management (RISEM-17) , Dhurva Institute of Engineering and Technology, Nalgonda, Telangana , Jan 2017.
Abstract [+]
In new application areas of relational database systems, the join operator is used more than in conventional applications. We propose a simple data structure called join index, for improving the performance of joins in the context of complex queries. For most of the joins, updates to join indices incur very little overhead.
|
[20] |
Cryptographic Application Programming Interfaces Dr.P.Rizwan Ahmed In 6th International Conference on Recent Trends in Engineering, Science & Management (ICRTESM-17) , Indian Federation of United Nations Associations, New Delhi(India) , Jan 2017.
Abstract [+]
The significance of security devices that protect the numerous transactions, which take place in today‘s distributed virtual environment, cannot be underestimated. The importance of such devices will increase as our society continues to evolve into a cashless electronic society. The continuing increase in the number and size of electronic transactions, the advances in the technology utilized and the growing sophistication of the adversary have led to significant resources being invested in the evaluation and analysis of security devices. There has been a transformation of the traditional security analysis from one focused on mathematical primitives and physical engineering solutions to a holistic approach that seeks to protect against subtle interactions between the cryptographic, logical and physical aspects of such devices that can collude to compromise the security thereof.
|
[21] |
Architectural Support for Security Managementâ€, proceedings Dr.P.Rizwan Ahmed In 6th International Conference on Recent Trends in Engineering, Science & Management (ICRTESM-17) , Indian Federation of United Nations Associations, New Delhi(India), Jan 2017.
Abstract [+]
This paper presents a principled approach to network redesign that creates more secure and manageable networks. We propose a new network architecture in which a global security policy defines all connectivity. The policy is declared at a logically centralized Controller and then enforced directly at each switch. All communication must first obtain permission from the Controller before being forwarded by any of the network switches. The Controller manages the policy namespace and performs all routing and access control decisions, while the switches are reduced to simple forwarding engines that enforce the Controller’s decisions.
|
[22] |
Security Techniques for Protecting Data In Cloud Computing Dr.P.Rizwan Ahmed In 3rd International Conference on Recent Innovative in Science, Technology, Management and Environment (ICRISTME-16) , ) Indian Federation of United Nations Associations, New Delhi(India) , Dec 2016.
Abstract [+]
From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. The main aim of this research is to understand the security threats and identify the appropriate security techniques used to mitigate them in Cloud Computing.
|
[23] |
Applying Big Data Analytics for Energy Efficiency Dr.P.Rizwan Ahmed In 3rd International Conference on Recent Innovative in Science, Technology, Management and Environment (ICRISTME-16) , Indian Federation of United Nations Associations, New Delhi(India) , Dec 2016.
Abstract [+]
Global energy requirements are continuously increasing. Conventional methods of producing more energy to meet this growth pose a great threat to the environment. CO2 emissions and other bi-products of energy production and distribution processes have dire consequences for the environment. Efficient use of energy is one of the main tools to restrain energy consumption growth without compromising on the customer’s requirements. Improving energy efficiency requires understanding of the usage patterns and practices. Smart energy grids, pervasive computing, and communication technologies have enabled the stakeholders in the energy industry to collect large amounts of useful and highly granular energy us-age data. This data is generated in large volumes and in a variety of different formats depending on its purpose and systems used to collect it. The volume and diversity of data also increase with time. All these data characteristics refer to the application of Big Data.
|
[24] |
Applying Big Data Analytics on Integrated Cyber Security Datasets Dr.P.Rizwan Ahmed In 2nd International Conference on Innovative Trends in Science, Engineering and Management (ICITSEM-16) , YMCA, Connaught Place, New Delhi(India) , Nov 2016.
Abstract [+]
With the growing prevalence of cyber threats in the world, various security monitoring systems are being employed to protect the network and resources from the cyber attacks. The large network datasets that are generated in this process by security monitoring systems need an efficient design for integrating and processing them at a faster rate. In this research, a storage design scheme has been developed using HBase and Hadoop that can efficiently integrate, store, and retrieve security-related datasets. The design scheme is a value-based data integration approach, where data is integrated by columns instead of by rows. Since rowkeys are the most important aspect of HBase table design and performance, a rowkey design was chosen based on the most frequently accessed columns associated with use cases for the retrieval of the dataset statistics. Tests conducted on various schema design alternatives prove that the rate at which the datasets are stored and retrieved using the model designed as part of this research is higher than that of the standard method of storing data in HBase.
|
[25] |
Text Mining With Enriched Text For Entity Oriented Retrieval And Text Clustering Dr.P.Rizwan Ahmed In 2nd International Conference on Innovative Trends in Science, Engineering and Management (ICITSEM-16) , YMCA, Connaught Place, New Delhi(India), Nov 2016.
Abstract [+]
Text mining has become a popular research area for discovering knowledge from unstructured text data. A fundamental process and one of the most important steps in text mining is representation of text data into feature vector. Majority of text mining methods adopt a keyword-based approach to construct text representation which consists of single words or phrases. These representation models such as vector space model, do not take into account semantic information since they assume all words are independent. The performance of text mining tasks, for instance Information Retrieval (IR), Information Extraction (IE) and text clustering, can be improved when the input text data is enhanced with semantic information.
|
[26] |
Discovering Unseen Values with Predictive Data Mining Dr.P.Rizwan Ahmed In 2nd International Conference on Latest Innovations in Science, Engineering and Management (ICLISEM-16) , The International Center Goa, Panjim, Goa (India), Oct 2016.
Abstract [+]
Data Mining is an analytic process to explore data (usually large amounts of data - typically business or market related) in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new sets of data. The main target of data mining application is prediction. Predictive data mining is important and it has the most direct business applications in world. The paper briefly explains the process of data mining which consists of three stages: (1) the Initial exploration, (2) Pattern identification with validation, and (3) Deployment (application of the model to new data in order to generate predictions). Data Mining is being done for Patterns and Relationships recognitions in Data analysis, with an emphasis on large Observational data bases. From a statistical perspective Data Mining is viewed as computer automated exploratory data analytical system for large sets of data and it has huge Research challenges in India and abroad as well. Machine learning methods form the core of Data Mining and Decision tree learning. Data mining work is integrated within an existing user environment, including the works that already make use of data warehousing and Online Analytical Processing (OLAP). The paper describes how data mining tools predict future trends and behaviour which allows in making proactive knowledge-driven decisions.
|
[27] |
Analysis of Data Mining Application in Education Domain Dr.P.Rizwan Ahmed In 2nd International Conference on Latest Innovations in Science, Engineering and Management (ICLISEM-16) , The International Center Goa, Panjim, Goa(India), Oct 2016.
Abstract [+]
Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data warehouses can provide the information required by the decision makers. Developing a data warehouse for educational institute is the less focused area since educational institutes are non-profit and service oriented organizations. In present day scenario where education has been privatized and cut throat competition is prevailing, institutes needs to be more organized and need to take better decisions. Institute’s enrollments are increasing as a result of increase in the number of branches and intake. Now a day, any reputed Institute’s enrollments count in to thousands. In view of these factors the challenges for the management are meeting the diverse needs of students and facing increased complexity in academic processes. The complexity of these challenges requires continual improvements in operational strategies based on accurate, timely and consistent information. The cost of building a data warehouse is expensive for any educational institution as it requires data warehouse tools for building data warehouse and extracting data using data mining tools from data warehouse. The present study provides an option to build data warehouse and extract useful information using data warehousing and data mining open source tools. In this paper we have explored the need of data warehouse / business intelligence for an educational institute, the operational data of an educational institution has been used for experimentation. The study may help decision makers of educational institutes across the globe for better decisions.
|
[28] |
An Iterative Approach to Exploratory the Usefulness Of Data Sanitization Dr.P.Rizwan Ahmed In International Conference on Recent Innovations in Sciences, Management, Education and Technology (ICRIMET-16) , JCD Vidyapeeth, Sirsa, Haryana (India) , Aug 2016.
Abstract [+]
When data is shared and/or published, the need for revealing data must be balanced with the need for sanitizing it. This is because some information considered “sensitiveâ€, if revealed may cause damaging consequences, for example, privacy violations, legal and financial liabilities, embarrassment, national security risks, and loss of reputation. Although many techniques for sanitizing data have been developed and used over the years, attackers have still managed to de-sanitize data. One of the reasons for this problem is the tremendous growth of publicly available information. Data like telephone numbers, date of birth, movie ratings, personal preferences like favorite movies and favorite food recipes, property records, real-time geolocation information through social media content and photo metadata can now be easily found on the Internet. This has enabled attackers to gather an immense amount of information about a user or a group of users and correlate it with sanitized datasets. Such correlations can lead to many methods of inferring sensitive information. In this dissertation, we show a method by which data can be evaluated to see if it can be sanitized effectively, while maintaining needed utility from the data, and if so, how can it be done optimally.
|
[29] |
Performance Evaluation of New Encryption Algorithms With Emphasis On Probabilistic Encryption Dr.P.Rizwan Ahmed In International Conference on Recent Innovations in Sciences, Management, Education and Technology (ICRIMET-16), JCD Vidyapeeth, Sirsa, Haryana (India) , Aug 2016.
Abstract [+]
The necessity of information security within an organization has undergone major changes in the past and present times. In the earlier times physical means is used to provide security to data. With the advent of computers in every field, the need for software tools for protecting files and other information stored on the computer became important. The important tool designed to protect data and thwart illegal users is computer security. Security mechanisms usually involve more than a particular algorithm or protocol for encryption & decryption purpose and as well as for generation of sub keys to be mapped to plain text to generate cipher text. It means that participants be in possession of some secret information (Key), which can be used for protecting data from unauthorized users. Thus a model has to be developed within which security services and mechanisms can be viewed. With the introduction and revolution in communications, one more change that affected security is the introduction of distributed systems which requires carrying of data between terminal user and a set of computers. Network security measures are needed to protect data during their transmission. The mechanisms used to meet the requirements like authentication and confidentiality are observed to be quite complex. As the importance of information systems is ever growing in all most all fields, electronic information takes on many of the roles, earlier they being done on papers. Few information integrity functions that the security mechanism has to support are security and confidentiality of the data to be transmitted and authentication of users.
|
[30] |
Secure Web Mining Dr.P.Rizwan Ahmed In Two Days International Conference on Recent Innovations in Engineering, Science, Humanities and Management (ICRIESHM) , Gayatri Vidya Parishad College for Degree & PG Courses, Rushikonda, Visakhapatnam (India) , Aug 2016.
Abstract [+]
Data mining technology has emerged as a means of identifying patterns and trends from large quantities of data. Data mining and data warehousing go hand-in-hand: most tools operate by gathering all data into a central site, then running an algorithm against that data. However, privacy concerns can prevent building a centralized warehouse – data may be distributed among several custodians, none of which are allowed to transfer their data to another site. This project addresses the problem of computing association rules within such a scenario. We assume homogeneous databases: All sites have the same schema, but each site has information on different entities. The goal is to produce association rules that hold globally, while limiting the information shared about each site. In this project, a new protocol is proposed which combines the advantages of the existing approaches to perform privacy preserving in distributed mining of association rules. Both the privacy and performance characteristics of the proposed protocol are studied and compared with the mining and cryptographic approaches.
|
[31] |
Data Prefetching Framework for mobile behavior Mining Dr.P.Rizwan Ahmed In International Conference on Innovations in Science, Engineering, Technology and Management(ICISETM-2014), , Paavai College of Engineering, Namakkal, Apr 2014.
Abstract [+]
Data Mining is a widely used technique for discovering valuable information in a complex data set. In this paper we discussed the main issues about Mobile User Behavior Mining. In mobile transaction database, users in the different user groups may have different behaviors. So that we proposed parameter-less clustering algorithm named CO-Smart-CAST. This behavior mining can produce better accuracy of predicting the mobile user information using that algorithm and to provide efficient mining of sequential access in mobile patterns. Here, the clustering method provides a way to calculate the time interval between one transaction to another transaction. We have predicted the behavior of mobile user using CO-Smart-CAST method. This method of process can be done by following ways. 1. Movements and transaction time measurements, 2. Discovering sequence patterns during transaction using clustering and classification. The behavior using communication model can be classified as following three ways. 1. Angry chat, 2. Happy chat, 3. Chat with deep thoughts. To our best knowledge, this work on mining and prediction of mobile behavior with user relation are done simultaneously. Finally, the methods in proposed system will deliver the better performance.
|
[32] |
Distributed Trends in Mining and clustering group movement patterns for tracking mining objects Dr.P.Rizwan Ahmed In International Conference on Innovations in Science, Engineering, Technology and Management(ICISETM-2014), Paavai College of Engineering, Namakkal, Apr 2014.
Abstract [+]
In biological research domain like “Study of animal social behavior†and “Wild life migration†object tracking sensor networks are used. In this application concentrating on finding the group of object with similar movement pattern using distributed mining techniques. But generally WSN concentrating on finding moving patterns of single object or all objects. Tracking moving objects having two phases i.e. mining phase and cluster ensembling phase. In first phase of algorithm we find movement patterns based on local data then we are identifying new term of similarity measure of to computing the similarity of moving objects and find relationship between them. In second phase algorithm combine the local grouping results to derive the group relationship from global view. We hope that the final output shows that the proposed mining algorithm achieves good grouping quality and the mining technique helps reduce the energy consumption by reducing the amount of data to be transmitted.
|
[33] |
Mining user’s behavior and environments for semantic place prediction Dr.P.Rizwan Ahmed In International Conference on Innovations in Science, Engineering, Technology and Management(ICISETM-2014), , Paavai College of Engineering, Namakkal, Apr 2014.
Abstract [+]
In this work, we propose a novel prediction framework, which takes into account the spatial property, temporal property, users’ behavior and environment at the same time, for semantic place prediction. The core idea of our proposal is to extract features to represent end users’ behaviors in each place related to its semantic. To achieve this goal, we define 54 features to represent end users’ behaviors to capture the key properties of places recorded in MDC Data Set. In our framework, we propose a novel model, namely Multi-Level Classification Model , to solve the imbalanced data problem. Based on the Multi-Level Classification Model, we make semantic prediction of a place by combining several classification models. To our best knowledge, this is the first work on predicting semantic label of places through integrating sub-classification models into a multi-level structure.
|
[34] |
Data Mining Applications in Telecommunications Dr.P.Rizwan Ahmed In International Conference on Innovations in Science, Engineering, Technology and Management(ICISETM-2014), , Paavai College of Engineering, Namakkal,, Apr 2014.
Abstract [+]
Telecommunication companies today are operating in highly competitive and challenging environment. Huge volume of data is generated from various operational systems and these are used for solving many business problems that required urgent handling. These data include call detail data, customer data and network data. Data Mining methods and business intelligence technology are widely used for handling the business problems in this industry. The main application areas of BI and Data Mining in telecommunication industry include fraud detection, network fault isolation and improving market effectiveness.
|
[35] |
Assessing the Awareness and Perceptions of Academic Staff in Using E-learning Tools for Instructional Delivery in a Post-Secondary Institution: A Case Study Dr.P.Rizwan Ahmed In International Conference on Quality Changes through Research Experiences, Expectations & Enhancement†QCRE3 - 2014, Dr. NGP College of Education & Dr. NGP College of Arts and Science, Coimbatore, Mar 2014.
Abstract [+]
Assessing the Awareness and Perceptions of Academic Staff in Using E-learning Tools for Instructional Delivery in a Post-Secondary Institution: A Case Study
|