A Study on Wireless Communication for Radon Concentration Monitoring IJTSRD
As well as the output of radon data using LCDs on pin photodiode radon counters, the stored data is printed on the PC using wired communication, and the data is saved and verified by the server using Wi-Fi communication. WCDMA wireless communication module was also installed to enable radon concentration monitoring in areas where Wi-Fi […]
A Review Study of various Data Mining Classification & Clustering Techniques IJTSRD
Data mining application includes a variety of methodologies that have been developed by commercial & research centers. This technique has been used for industrial, commercial and scientific purposes. It is most useful in an exploratory analysis scenario in which there are no prearranged notions about what will compose an “interesting” outcome. The WEKA contains a […]
Improved Clustering Technique in Marketing Sector ijtsrd
Cluster analysis divides data into meaningful or useful groups (clusters). One of the most important problems in modern finance is finding efficient ways to summarize and visualize the stock market data to give individuals or institutions useful information about the market behaviour for investment decisions. Clustering techniques that are being used in Data Mining is […]
Design Pattern Classifiers under Attack for Security Evaluation using Multimodal System ijtsrd
Pattern classification is a branch of machine learning that focuses on recognition of patterns and regularities in data. This Pattern classification system are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is […]
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Streams ijtsrd
Documents created and distributed on the Internet are ever changing in various forms. Most of existing works are devoted to topic modeling and the evolution of individual topics, while sequential relations of topics in successive documents published by a specific user are ignored. In order to characterize and detect personalized and abnormal behaviors of Internet […]