336 research outputs found

    Directed Graph based Distributed Sequential Pattern Mining Using Hadoop MapReduce

    Get PDF
    Usual sequential pattern mining algorithms experiences the scalability problem when trade with very big data sets. In existing systems like PrefixSpan, UDDAG major time is needed to generate projected databases like prefix and suffix projected database from given sequential database. In DSPM (Distributed Sequential Pattern Mining) Directed Graph is introduced to generate prefix and suffix projected database which reduces the execution time for scanning large database. In UDDAG, for each unique id UDDAG is created to find next level sequential patterns. So it requires maximum storage for each UDDAG. In DSPM single directed graph is used to generate projected database and finding patterns. To improve the scanning time and scalability problem we introduce a distributed sequential pattern mining algorithm on Hadoop platform using MapReduce programming model. We use transformed database to reduce scanning time and directed graph to optimize the memory storage. Mapper is used to construct prefix and suffix projected databases for each length-1 frequent item parallel. The Reducer combines all intermediary outcomes to get final sequential patterns. Experiment results are compared against UDDAG, different values of minimum support, different massive data sets and with and without Hadoop platform which improves the scaling and speed performances. Experimental results show that DSPM using Hadoop MapReduce solves the scaling problem as well as storage problem of UDDAG. DOI: 10.17762/ijritcc2321-8169.15020

    Secure Image Transmission with Secret Fragment Visible Mosaic Images

    Get PDF
    Mosaic means picture or decorative design made by setting small colour pieces, also mosaic is a composite picture made of overlapping images, photos etc. Reshuffle of the fragments of a one image in another image form a new image called mosaic image. To create a mosaic image, secret image is first divided into rectangular shaped fragments, called tile images, which are fitted into a target image called secret fragment visible mosaic image of same size. The mosaic image looks similar to preselected target image, is yield by dividing input image into fragments and transforming their colour into another colour. Greedy heuristic algorithm is proposed to find a related tile image of the secret image to fit into each block in the target image. The information related to the recovery of image is embedding inside target block with the help of lossless substitution scheme. The proposed method, designed for dealing with mosaic images which are useful for hiding secret images. To enhance the security of embed data proposed system also work. DOI: 10.17762/ijritcc2321-8169.15062

    Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application

    Get PDF
    Today Android has the biggest market share as compared to other operating system for smart phone. As users are continuously increasing day by day the Security is one of the main concerns for Smartphone users. As the features and power of Smartphone are increase, so that they has their vulnerability for attacks by Malwares. But the android is the operating system which is more secure than any other operating systems available for Smart phones. The Android operating system has very few restrictions for developers and it will increase the security risk for end users. In this paper we have reviewed android security model, application level security in android and its security issues

    Malware Defense in Mobile Network using Dynamic Analysis of Android Application

    Get PDF
    Today Android has the biggest market share as compared to other operating system for smart phone. As users are continuously increasing day by day the Security is one of the main concerns for Smartphone users. As the features and power of Smartphone are increase, so that they has their vulnerability for attacks by Malwares. But the android is the operating system which is more secure than any other operating systems available for Smart phones. The Android operating system has very few restrictions for developers and it will increase the security risk for end users. I am proposing an android application which is able to perform dynamic analysis on android program. To perform this analysis i have to deploy the android application, In this proposed system I am going to deploy android application on a cloud. This application executes automatically without any human interaction. It automatically detects malware by using pattern matching algorithm. If malware get detected then user get inform that particular application is malicious and restrict the user from installing application. DOI: 10.17762/ijritcc2321-8169.150315

    PHYTOCHEMICAL STUDY OF GOKSHUR (TRIBULUS TERRESTRIS LINN.) AND EVALUATION OF ITS ANTIBACTERIAL ACTIVITY WITH SPECIAL REFERENCE TO MUTRAKRUCHCHA

    Get PDF
    Infection of the urinary tract is the second commonest site after respiratory tract infection. It is more frequent in women than men. Almost 50% women suffer UTI. In our classical texts, urinary tract infection is described as Mutrakruchcha. A great Acharya Charak has mentioned it in Chikitsa sthana, Trimarmiya adhyay, its 8 types and Basti as a Marma. For the treatment of all types of Mutrakruchcha, Gokshur is mentioned. Gokshur is diuretic, aphrodisiac, tonic and rejuvenating herb with the ability to build lean muscle and strength. Gokshur possess Madhur rasa, Madhur vipaka and sheet Virya which causes diuresis by increasing Kleda in the body. So in this study 30 patients complaining of urinary tract infection were taken. 50 ml of Gokshur decoction, twice a day was given orally for 30 days. Weekly assessment was done on the basis of sign and symptoms like Mutra daha (burning micturition), Sashula mutrapravruti (painful micturition), Bastishul (suprapubic pain), Mutrapravruti (frequency of micturition), Jwaraprachiti (fever with chills), Sarakta mutrapravruti (haematuria), Sapuya mutrapravruti (pyuria). Objective improvement was done on the basis of reduction in pus cells in urine and serum creatinine at initial and after 30 days. Subjective improvement was shown in percentage it was 67.71%. The observations were found to be significant. Paired t test was found to be highly significant at 1 % level of significance i. e. p < 0. 01

    Online Advertising An Outlook and Emerging Scenario

    Get PDF
    This paper gives an overview of online advertising, discusses the global andIndian online trends. It examines the online industry in terms of market size, segments,growth forecasts, drivers, and resistors. It also discusses about the emerging scenario ofthe industries in terms of the competitive positioning of major players and their businessmodels, strategies, and strengths, weaknesses, opportunities, and threats. The study triesto analyze the emerging models that are likely to dominate the industry.The onlineadvertising industry, which has a major dominance by Google, is likely to see a lot ofhot action in the near future. While this industry will continue to grow and be popular inthe developed world, it is likely to gain a fast growth in the emerging economies ofAsia, especially India and China.Based on the analysis, it is forecasted that the online advertising industry willalmost double from 42billionin2007to 42 billion in 2007 to 72 billion in 2012 which is a growth ofCompounded Annual Growth Rate (CAGR) 11.4%, within which North America willdominate the industry. Internet use can be expected to exceed time spent on watchingTV over period of time.The online advertising industry is expected to see a major battle with Microsoftemerging a challenger to Google‟s dominance. The web analytics tool provided bysearch engines provides an effective online marketing tool for online advertisingcompanies.Key words: Online advertising, Internet marketing, New media marketing
    • …
    corecore