396 research outputs found

    Directed Graph based Distributed Sequential Pattern Mining Using Hadoop MapReduce

    Get PDF
    Usual sequential pattern mining algorithms experiences the scalability problem when trade with very big data sets. In existing systems like PrefixSpan, UDDAG major time is needed to generate projected databases like prefix and suffix projected database from given sequential database. In DSPM (Distributed Sequential Pattern Mining) Directed Graph is introduced to generate prefix and suffix projected database which reduces the execution time for scanning large database. In UDDAG, for each unique id UDDAG is created to find next level sequential patterns. So it requires maximum storage for each UDDAG. In DSPM single directed graph is used to generate projected database and finding patterns. To improve the scanning time and scalability problem we introduce a distributed sequential pattern mining algorithm on Hadoop platform using MapReduce programming model. We use transformed database to reduce scanning time and directed graph to optimize the memory storage. Mapper is used to construct prefix and suffix projected databases for each length-1 frequent item parallel. The Reducer combines all intermediary outcomes to get final sequential patterns. Experiment results are compared against UDDAG, different values of minimum support, different massive data sets and with and without Hadoop platform which improves the scaling and speed performances. Experimental results show that DSPM using Hadoop MapReduce solves the scaling problem as well as storage problem of UDDAG. DOI: 10.17762/ijritcc2321-8169.15020

    Secure Image Transmission with Secret Fragment Visible Mosaic Images

    Get PDF
    Mosaic means picture or decorative design made by setting small colour pieces, also mosaic is a composite picture made of overlapping images, photos etc. Reshuffle of the fragments of a one image in another image form a new image called mosaic image. To create a mosaic image, secret image is first divided into rectangular shaped fragments, called tile images, which are fitted into a target image called secret fragment visible mosaic image of same size. The mosaic image looks similar to preselected target image, is yield by dividing input image into fragments and transforming their colour into another colour. Greedy heuristic algorithm is proposed to find a related tile image of the secret image to fit into each block in the target image. The information related to the recovery of image is embedding inside target block with the help of lossless substitution scheme. The proposed method, designed for dealing with mosaic images which are useful for hiding secret images. To enhance the security of embed data proposed system also work. DOI: 10.17762/ijritcc2321-8169.15062

    A Review on Numerical Simulation and Comparison of Carbide and HSS Tool Wear Rate while Drilling with Difficult To Cut Super Alloy Titanium Based on Archard Model

    Full text link
    A Carbide and HSS tool wear rate simulation using Archardˊs wear model is proposed, finite element modelling is done using commercial finite element software ABAQUS/explicit. ABAQUS interface was used to simulate the contact pressure. For measuring wear depth of tool's drilling operation is performed experimentally then wear depth is measured on profilprojecter. Comparing the wear rate, based on Archad model

    Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application

    Get PDF
    Today Android has the biggest market share as compared to other operating system for smart phone. As users are continuously increasing day by day the Security is one of the main concerns for Smartphone users. As the features and power of Smartphone are increase, so that they has their vulnerability for attacks by Malwares. But the android is the operating system which is more secure than any other operating systems available for Smart phones. The Android operating system has very few restrictions for developers and it will increase the security risk for end users. In this paper we have reviewed android security model, application level security in android and its security issues

    Malware Defense in Mobile Network using Dynamic Analysis of Android Application

    Get PDF
    Today Android has the biggest market share as compared to other operating system for smart phone. As users are continuously increasing day by day the Security is one of the main concerns for Smartphone users. As the features and power of Smartphone are increase, so that they has their vulnerability for attacks by Malwares. But the android is the operating system which is more secure than any other operating systems available for Smart phones. The Android operating system has very few restrictions for developers and it will increase the security risk for end users. I am proposing an android application which is able to perform dynamic analysis on android program. To perform this analysis i have to deploy the android application, In this proposed system I am going to deploy android application on a cloud. This application executes automatically without any human interaction. It automatically detects malware by using pattern matching algorithm. If malware get detected then user get inform that particular application is malicious and restrict the user from installing application. DOI: 10.17762/ijritcc2321-8169.150315

    Ionic liquid catalyzed one pot green synthesis of isoxazolone derivatives via multicomponent reaction

    Get PDF
    459-464A series of 3-methyl-4-((3-aryl-1-phenyl-1H-pyrazol-4-yl)methylene)isoxazol-5(4H)-one derivatives have been efficiently synthesized by environmentally benign, one-pot three component condensation of substituted 1,3-diaryl-1H-pyrazole-4-carboxyaldehyde, β-keto ester and hydroxyl amine hydrochloride in the presence of ionic liquid [HNMP][HSO4] as a catalyst in ethanol. These derivatives have been synthesized by conventional, ultrasound and microwave irradiation methods. The combination of ionic liquid with ultrasound as well as microwave irradiation makes the protocol fascinating and environmentally benign. In addition, it has several benefits such as simple work-up procedure, clean reaction profile, short reaction time and good yields

    PHYTOCHEMICAL STUDY OF GOKSHUR (TRIBULUS TERRESTRIS LINN.) AND EVALUATION OF ITS ANTIBACTERIAL ACTIVITY WITH SPECIAL REFERENCE TO MUTRAKRUCHCHA

    Get PDF
    Infection of the urinary tract is the second commonest site after respiratory tract infection. It is more frequent in women than men. Almost 50% women suffer UTI. In our classical texts, urinary tract infection is described as Mutrakruchcha. A great Acharya Charak has mentioned it in Chikitsa sthana, Trimarmiya adhyay, its 8 types and Basti as a Marma. For the treatment of all types of Mutrakruchcha, Gokshur is mentioned. Gokshur is diuretic, aphrodisiac, tonic and rejuvenating herb with the ability to build lean muscle and strength. Gokshur possess Madhur rasa, Madhur vipaka and sheet Virya which causes diuresis by increasing Kleda in the body. So in this study 30 patients complaining of urinary tract infection were taken. 50 ml of Gokshur decoction, twice a day was given orally for 30 days. Weekly assessment was done on the basis of sign and symptoms like Mutra daha (burning micturition), Sashula mutrapravruti (painful micturition), Bastishul (suprapubic pain), Mutrapravruti (frequency of micturition), Jwaraprachiti (fever with chills), Sarakta mutrapravruti (haematuria), Sapuya mutrapravruti (pyuria). Objective improvement was done on the basis of reduction in pus cells in urine and serum creatinine at initial and after 30 days. Subjective improvement was shown in percentage it was 67.71%. The observations were found to be significant. Paired t test was found to be highly significant at 1 % level of significance i. e. p < 0. 01
    corecore