Traditional pattern growth-based approaches for sequential pattern mining derive length- (k + 1) patterns based on the projected databases of length-k patterns recursively. At each level of recursion, they unidirectionally grow the length of detected patterns by one along the suffix of detected patterns, which needs k levels of recursion to find a length-k pattern. In this paper, a novel...
Paper Information
Authors Dr. P.Raguraman,Mr. S.Hariharan, Dr. J.Jaya A Celin
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 8

The objective of this study is to assess the feasibility of a data mining association analysis technique in early prediction of esophageal varices in cirrhotic patients and prediction of risky groups candidates for urgent interventional procedure. A manuscript titled “Detection of Risky Esophageal varices using 2D U/S: when to perform Endoscopy”, published in...
Paper Information
Authors Abd Elrazek Mohammad Aly Abd Elrazek, Hamdy Mahfouz
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

Content Based Image Retrieval in Medical (CBIRM) a technique for retrieving image on the basis of automatically derived features such as color, texture and shape to index images with minimal human intervention. This document is based on the research work done in the field of Content based image retrieval. Color, texture and shape information have been the primitive image descriptors in c...
Paper Information
Authors Ekta Rajput, Hardeep Singh Kang
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 32

Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. There are many successful E-commerce organizations presently run in the whole world, but E-commerce has not reached its full potential. The main reason behind this is lack of Trust of people in e-commerce. Again, proper models are still absent for calculating trust of ...
Paper Information
Authors Kawser Wazed Nafi, Tonny Shekha Kar, Md. Amjad Hossain, M. M. A. Hashem
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

Accuracy in the estimation of software Effort/Cost is one of the desirable criteria for any software cost estimation model. The estimation of effort or cost before the actual development of any software is the most crucial task of the present day software development project managers. Software project attributes are often measured in terms of linguistic values such as very low, low, Aver...
Paper Information
Authors Sanjay Kumar, Jaya Pal, Vandana Bhattacherjee
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 14

Internet userscontinuously make queries over web to obtain required information. They need information about various tasks and sub tasks for which they use search engines. Over a period of time they make plenty of related queries. Search engines save these queries and maintain user’s search histories. Users can view their search histories in chronological order. However,...
Paper Information
Authors Ravi Kumar Yandluri
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 14

Today, attributable to the vulnerability of normal authentication system, crime has accumulated among the past few years. Identity authentication in web banking depends on biometric feature like face, iris, voice, hand mathematics, handwriting, retina; fingerprints can significantly decrease the fraud. in order that they unit being replaced by biometric authentication mechanisms. Among n...
Paper Information
Authors N.Subbarao, S.M.Riyazoddin, M. Janga Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 30

Several studies in recent years have considered the use of mobile elements for data gathering in wireless sensor networks, so as to reduce the need for multi-hop forwarding among the sensor nodes and thereby prolong the network lifetime. Since, typically, practical constraints preclude a mobile element from visiting all nodes in the sensor network, the solution must involve a combination...
Paper Information
Authors Khaled Almiani, Ahmad A. Twaissi, Mohammed A. Abuhelaleh, Bassam A. Alqaralleh, Albara Awajan
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 30

The Proposed System Analyses the scopes introduced by Web 2.0 and collaborative tagging systems, several challenges have to be addressed too, notably, the problem of information overload. Recommender systems are among the most successful approaches for increasing the level of relevant content over the “noise.” Traditional recommender systems fail to address t...
Paper Information
Authors Marutha Veni .R, Kavipriya.P
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 31

Today, because of the vulnerability of standard authentication system, law-breaking has accumulated within the past few years. Identity authentication that relies on biometric feature like face, iris, voice, hand pure mathematics, handwriting, retina, fingerprints will considerably decrease the fraud. so that they square measure being replaced by identity verification mechanisms. Among b...
Paper Information
Authors Kakde Sachin, V. Anandam, S.M.Riazoddin, M.Janga Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 12