- Journal of Information and Knowledge (Formerly SRELS Journal of Information Management)
- Indian Journal of Science and Technology
- Data Mining and Knowledge Engineering
- The Indian Journal of Nutrition and Dietetics
- Nature Environment and Pollution Technology
- Asian Journal of Nursing Education and Research
- International Journal of Nursing Education and Research
- International Journal of Advances in Nursing Management
- Indian Journal of Innovations and Developments
- International Journal of Forestry and Crop Improvement
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Shanthi, P.
- Discovering Frequent Access Patterns in a Digital Library Using Association Mining
Authors
1 Department of Computer Science, Madurai Kamaraj University, Madurai 625 021, Tamil Nadu, IN
Source
Journal of Information and Knowledge (Formerly SRELS Journal of Information Management), Vol 42, No 2 (2005), Pagination: 131-138Abstract
Data Mining, also known as knowledge discovery in databases, has been recognized as a promising new area for database research. Mining frequent item sets in transactional databases, binary transaction tables, time series databases and many other kinds of databases have been an active research topic over the past few years. Frequent access pattern is a special case of sequential pattern in an application database which helps to make effective decisions in the respective problem domain.
Given a large database of book transactions in the library, where each transaction consists of book-id, name of the book, author, and other related fields, the problem is to mine the frequent access patterns of the user from the library databases. The outcome of the findings will help the management to take effective steps that will cater the needs of the user.
Apriori and FP-growth algorithms can mine the complete sets of frequent item sets. These two algorithms were implemented and the performance of the algorithms was studied. The result shows that FP-growth algorithm performs well compared to Apriori.
Keywords
Digital Library, Access Patterns, Apriori, FP-Growth, Algorithm, Mining.References
- Srikant (R); Agrawal. (R). Mining Sequential Patterns: Generalizations and Performance Improvements. Research Report RJ 9994, IBM Almaden Research Center, San Jose, California, December 1995.
- Mining Association Rules with Item Constraints. IBM Almaden Research Centre, San Jose, USA.
- Helen Pinto; Jiawei Han; Jian Pei; Ke Wang. Multi-dimensional Sequential Pattern Mining, Work Report, Intelligent Database Systems Research Lab, School of Computing Science, Simon Fraser University, Canada.
- Mobasher (B); Cooley (R); Srivastava (J). Automatic Personalization based on Web Usage Mining. In Communications of the ACM. (43) 8, Aug. 2000.
- Agrawal (R); Srikant (R). Mining Sequential Patterns. Research Report RJ 9910, IBM Almaden Research Centre, San Jose, California, October 1994.
- Jiawei Han; Micheline Kamber. Data Mining - Concepts and Techniques. Morgan Kaufmann Publishers, 2001.
- Optimizing Cloud Bandwidth and Cost using Content Aware Chunk Prediction to Improve Efficiency of Retrieval
Authors
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 16 (2015), Pagination:Abstract
Bandwidth, an important most demanding computing resource is mainly focused on backup service in cloud computing technology. In addition to backup solutions, communication and transferring of data also involves a considerable amount of bandwidth for efficient throughput. Management of wide area network bandwidth provision and cost is a major challenge in recent periods. Due to enormous content in cloud, cost effective bandwidth provisioning solution should be adopted by the cloud providers for better user satisfaction. Here we use a min chunk hashing technique based on the content for preserving all chunks in order to reduce the overall transfer time for individuals as well as to reduce the resource allocation load on the cloud servers. Thus, content based chunking along with the metadata considerably reduces the cost of bandwidth utilization for individuals. The bandwidth usage is predicted using cloudsim simulator through BwProvisioner class provided in the cloudbus package. A sample of large text files with redundant data is refined, chunked and hashed using Message Digest5 to measure the transfer time and cost performance metrics for experimental values in a dynamic work load environment.Keywords
BwProvisioner, Chunk prediction, CloudSim, Message Digest 5, Min Chunk Hashing- The Assessment of E-Learning Tools Using Feature Based Assessment Algorithm
Authors
1 Sri Krishna College of Engineering and Technology, Coimbatore-641 008, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 8 (2010), Pagination: 196-200Abstract
Information technology has been used in various forms in today’s education. A course Management system takes an important role in the enterprise of teaching and learning systems. In this aspect a various e-Learning Tools have been developed for student community in order to give better quality of education. This paper describes the assessment of some e-Learning Tools using FBAA (Feature Based Assessment Algorithm). This algorithm makes the users to evaluate the e-Learning tools to choose a better Course Management System.Keywords
E-Learning, CMS, LCMS, eTools, Feature Based Assessment.- Studies on Wheat Based Composite Flour for Pasta Products
Authors
1 Tamil Nadu Agricultural University, Coimbatore-641 043, IN
2 McGill University, CA
Source
The Indian Journal of Nutrition and Dietetics, Vol 42, No 11 (2005), Pagination: 503-508Abstract
The challenges directed towards the food industry will be to fulfil the needs of the changing world markets and to meet new consumer product needs. Nowadays many pasta products flood the market. All the pasta and Asian noodles are generally wheat based products. The functional properties of wheat protein fractions are well defined for bread making and pasta cooking quality.- Evaluating the Physico-Chemical Characteristics of Municipal Solid Waste in Coimbatore City, Tamilnadu
Authors
1 Department of Civil Engineering, Karpagam University, Coimbatore, T. N., IN
2 Department of Chemistry, Jansons Institute of Technology, Coimbatore, T. N., IN
3 Department of Civil Engineering, Government College of Technology, Coimbatore, T. N., IN
Source
Nature Environment and Pollution Technology, Vol 12, No 1 (2013), Pagination: 69-74Abstract
Municipal solid waste management (MSWM) is one of the major environmental problems of Indian cities. Improper management of municipal solid waste (MSW) causes hazards to inhabitants. Various studies reveal that about 90% of MSW is disposed of unscientifically in open dumps and landfills, create problems to public health and the environment. This paper presents an assessment of the existing situation of municipal solid waste management (MSWM) in Coimbatore city. The quantity and composition of MSW vary from place to place, and bear a rather consistent correlation with the average standard of living. Field investigations were carried out for quantification, analysis of physico chemical composition, and characterization in disposal site. Studies carried out in these places have revealed that there are many shortcomings in the existing practices used in managing the MSW. These shortcomings pertain mainly to inadequate manpower, financial resources, implements and machinery required for effectively carrying out various activities for MSWM. Various adopted treatment technologies for MSW are critically reviewed, along with their advantages and limitations. The study is concluded with a few fruitful suggestions, which may be beneficial to encourage the competent authorities/researchers to work towards further improvement of the present system.Keywords
Municipal Solid Waste, Waste Characterization, Organic Matter.- Assess the Level of Coping, Family Support and Quality of Life of Women who had Undergone Hysterectomy in selected Hospitals, at Madurai
Authors
1 Maternity Health Nursing Department, C.S.I. Jeyaraj Annapackiam College of Nursing and Allied Sciences, Pasumalai, Madurai, Tamil Nadu, IN
2 C.S.I. Jeyaraj Annapackiam College of Nursing and Allied Sciences, Pasumalai, Madurai, Tamil Nadu, IN
Source
Asian Journal of Nursing Education and Research, Vol 6, No 3 (2016), Pagination: 347-350Abstract
This study is indented to assess the level of coping, family support and quality of life by using the standardized Likert's scale on coping, family support and WHO scale on quality of life to assess the women health based on all dimensions. The study was based on the Sister Callista Roy's Adaptation Model (1996).
A quantitative approach was used and survey approach was selected for this study. Research design for the study, that is non- experimental descriptive design. Pretesting of the tools was done to test the simplicity of the tools. It was found to be simple and applicable. Pilot study was carried out to find out the feasibility. Findings of the study: Majority of women who had undergone hysterectomy (98%) had moderate level of coping. 66 percentage of the women who had undergone hysterectomy had high level of family support, 34% had moderate level of family support. There was a significant association between QOL and demographic variables such as age, education, occupation, family monthly income and residence of women who had undergone hysterectomy. There was a significant association between QOL and selected variables such as number of children, sex of living children, indication for surgery and surgery approach of women who had undergone hysterectomy.
Keywords
Coping, Family Support, Quality of Life of Women (QOL), Women Undergone Hysterectomy, Hormone Replacement Therapy (HRT) And Scatter Diagram.- A Single Case Study on Menstrual Disorder and with Yoga Therapy
Authors
1 CSI Jeyaraj Annapackiam College of Nursing, Pasumalai, Madurai, Tamil Nadu, IN
2 Sacred Heart College of Nursing, Madurai, Tamil Nadu, IN
Source
International Journal of Nursing Education and Research, Vol 3, No 1 (2015), Pagination: 64-69Abstract
Ms. X is a MSc(N) student with 23 years of age, facing difficulties due to dysmenorrhea and has the complaint of amenorrhea since 4 months. She states that her menstrual cycle has been irregular. Her symptoms make her difficult to concentrate at work. She feels tired most of the day, due to lack of sleep and also she expressed that she is not able to reproduce in her future. She needs effective treatment but she is confused about the right therapy for her symptoms. She is also anxious about her irregular menstruation and the effect of complementary therapy (yoga therapy). Her friends suggested that complementary therapy could be useful.
She has put on 6 Kg weight (92 to 98kgs) within 4 months. She was experiencing of pain in lower abdomen, low back pain and intolerant pain in both the thighs and knees. Pain character was twisting and sharp over two days during menstruation, she has attended 2 weeks yoga class, there after she started practicing yoga since six months with the duration of 15 - 30 mts twice in a day, such as Baddhakonasana (Butterfly Pose), Viparita Karani (Legs Up the Wall Pose and on lying pose), Bhujangasana, Pranayma, Dhanurasana, Paschimottanasana, Vajrasana and yoga nidtra.
After practicing yoga for 6 months, she had better results in her menstrual cycle, followed by continuous menstruation for 3/28 days regularly with in minimal difficulties. Now the pain location is only on the lower abdomen and character of pain is twisting. She experiences pain only on the first day of menstruation and absence pain on 2nd day onwards. She felt that yoga is very effective and useful for her in all the aspects such as reduction of weight from 98 to 95 kgs along with hip, thighs and abdominal circumference and also reduced stress. If the women practice regularly one or two above said yoga from the adolescent period onwards, definitely they will feel comfortable during menstruation, pregnancy, postpartum period and menopausal period. In olden days women use to do all kind of house hold activities, now a days which are replaced by technology.
Keywords
Menstrual Cycle, Dysmenorrhea, Amenorrhea, Yoga Therapy.- Lightweight Security Algorithm For Wireless Node Connected with IoT
Authors
1 Embedded Systems, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 30 (2016), Pagination:Abstract
Objective: The enhancement of wireless technology and sensory device has brought to the introduction towards IoT (Internet of Things). Here security is taken as one of the major issues, as they operate in unlicensed bandwidth. Since most of the device is resource constrained the lightweight security is driven to these devices. Implementation of security is also tedious and selective as the conventional security algorithm degrades the network performance due to the high computational complexity and inherent delays that are incurred for execution of these algorithms. Method: In this work, a novel approach is made with new hybrid lightweight security algorithm named PRESENT-GRP which is derived in Intel Galileo Gen 2 board. This methodology helps to secure data during transmission and control process. Findings: This hybrid algorithm is an enhancement of the GRP permutation algorithm because it lags an S-box. This proposed algorithm is for low power devices which consumes relatively less memory. Thus, in Internet of Things (IoT) applications this algorithm may help to provide end to end privacy to share data securely. Improvement: In future works, this algorithm can be improved with still more security level by having a trade off between performance and memory usage. It can also be enhanced by implementing it in real time military related and health related applications for end to end security for smaller size datum.Keywords
Hybrid Algorithm, IoT, Lightweight, Security, Wireless Network.- Effects of Yoga on Menopausal Symptoms Faced by the Women
Authors
1 CSI Jeyaraj Annapackiam College of Nursing, Jones Puram, Pasumalai, Madurai, IN
2 Sacred Heart College of Nursing, Madurai, IN
Source
International Journal of Advances in Nursing Management, Vol 2, No 3 (2014), Pagination: 166-170Abstract
Menopause is a part of every woman's life, they spend a significant part of their lives. It is the stage when menstrual period permanently stops, which usually occur between the age of 40 to 60 associated with hormonal, physical and psychological changes. These changes can occur gradually or abruptly. It can start as early as the age of 30 and last until as late as the age of 60, due to when the ovaries stop functioning or removed. Menopause is not an illness but a natural biological process, though the risk foruro- genital and heart disease and osteoporosis rises after menopause,that may impair personal or social interactions and diminish the overall quality of life.- Features based Opinion Mining on Online Mobile Products using Data Mining Classification Techniques
Authors
1 Department of Computer Science, Sri Jayendra Saraswathy Maha Vidyalaya College of Arts and Science, Coimbatore, Tamil Nadu, IN
Source
Indian Journal of Innovations and Developments, Vol 5, No 9 (2016), Pagination: 1-9Abstract
Objective: To extract sentiment or opinion words using repository of lexicons, to calculate overall polarity score for the product, to extract the aspects in the reviews, to devise polarity score for each aspects of the product and to develop a summary of the product aspects(targets) with its polarity score from the reviews.
Methods: There are several methods built up for sentiment analysis and opinion mining. In order to increase the recall, accuracy and precision openNLP parser with naïve bayes classifier is proposed. The opinion lexicons are used to produce summary about the reviews.
Findings: Opinion mining is a challenging Natural Language Processing or text mining problem. The reason behind this is we can’t exactly decide what user says about particular product. Because each one’s writing style would be different. All the reviews expressed in the websites cannot be processed directly. The reviews must be preprocessed in order to eliminate unnecessary characters. Many techniques were proposed for opinion mining but it lacks in accuracy, precision and recall.
Applications/improvements: To enhance the accuracy of opinion mining openNLP parser with naïve bayes classifier is proposed.
Keywords
OpenNLP Parser, Polarity Classification, Sentiment Analysis, Opinion Mining.References
- Bing Liu. Sentiment analysis and opinion mining. synthesis lectures on human language technologies. Morgan & Claypool Publishers. 2012.
- S. A. Mulay, S. J. Joshi, M. R. Shaha, H. V. Vibhute, M. P. Panaskar. Sentiment analysis and opinion mining with social networking for predicting box office collection of movie. International Journal of Emerging Research in Management and Technology. 2016; 5(1), 74-79.
- J. S. Modha, G. S. Pandi, S. J. Modha. Automatic sentiment analysis for unstructured data. International Journal of Advanced Research in Computer Science and Software Engineering. 2013; 3(12), 91-97.
- T. SivaKumar, Amitha Joseph. A survey on different approaches for sentiment analysis of people. Indian Journal of Innovations and Developments. 2016; 5(6), 1-4.
- L. L. Dhande, G. K. Patnaik. Analyzing sentiment of movie review data using Naive Bayes neural classifier. International Journal of Emerging Trends and Technology in Computer Science. 2014; 3(3), 313-320.
- V. Jain, Prediction of movie success using sentiment analysis of tweets. The International Journal of Soft Computing and Software Engineering. 2013; 3(3), 308-313.
- S. Asur, B. A. Huberman. Predicting the future with social media. In 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT). 2010; 1, 492-499.
- Y. Lu, C. Zhai, N. Sundaresan. Rated aspect summarization of short comments. In Proceedings of the 18th international conference on World wideweb, ACM. 2009; 131-140.
- J. Khairnar, M. Kinikar. Machine learning algorithms for opinion mining and sentiment classification. International Journal of Scientific and Research Publications. 2013; 3(6), 1-6.
- B. Ohana, B. Tierney. Sentiment classification of reviews using SentiWordNet. In 9th. IT & T Conference. Ireland. 2009; 13.
- S. S. Minab, M. Jalali, M. H. Moattar. A new sentiment classification method based on hybrid classification in twitter. 2015 International Congress on Technology, Communication and Knowledge (ICTCK),IEEE. 2015; 295-298.
- Multilevel Threshold Secret Sharing Scheme to Secure MapReduce Computations in Cloud Computing Environment
Authors
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Cloud computing has evolved in recent days and is applied in various fields for effective resources and infrastructure in a distributed environment. Data analysis is the core functionality in cloud computing where large amount of data called Big Data is processed over clusters. Methods: MapReduce is one of the solutions for handling big data in the cloud environment because of its scalability and fault tolerance in a phased manner. Multiple data sets are joined to do complex data analysis for computation on certain aggregates. A common problem is whether MapReduce could be customized to get a scalable system, when the jobs are split and reduced. Also most of the systems do not consider the issue of security in MapReduce phases. Findings: The proposed solution uses multilevel threshold secret sharing to perform MapReduce operations providing secure processing. The solution extends MapReduce framework to improve security and also results in higher efficiency. The mechanism presents lower overhead costs when compared to the existing ones and has essential application in Big Data cloud environment. Applications: These approaches are lower cost and higher efficiency in cloud environment.Keywords
Big Data, Cloud Computing, MapReduce, Security.- Securing Data in Cloud Storage by using Steganography and Merkle Hash Tree Algorithm
Authors
1 School of Computing, SASTRA University, Thanjavur, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Cloud computing is incomprehensible creating innovation, the testing issue is the way to successfully share encoded information in cloud computing. Cloud server randomly produces primary, secondary and access keys, after record is made in the server for specific information proprietor. Methods: Data proprietor encodes the record and conceal the data into a picture called steganography. Picture is split and is stored in cloud. Cloud server creates shared key utilizing the primary and secondary keys of data user and data owner in order to avoid unauthorized sharing of data. Data proprietor can share the information to different users by sending mutual key to users by means of e-mail safely. Mutual key is likewise covered into a picture for securing that key. Original information is downloaded strictly to check the mutual key. Findings: The exchange of secret data to the authorized user effectively promotes data confidentiality and integrity. By giving mutual key to the cloud server, the user can see the document. Applications: The method can be applied to share confidential data stored in cloud with small cipher text expansion.Keywords
Cloud Computing, Data Security, Image Splitting, Key Generation, Steganography.- Secure Retrieval of Sub-Trees over Encrypted Data Stored in Cloud Storage for Prediction
Authors
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: A tremendous growth in adoption of cloud storage services is observed since 2010. Shifting towards the services however leads to some security concerns like data leakage, unauthorized access and data privacy etc. The main objective is to develop a subtree retrieval method that securely that is further used for prediction without impacting performance. Methods: Cryptographic methods are used to secure data. In our approach the dataset is partitioned based on classification and encrypted before uploading to cloud. Retrieval query returns a subtree from the partitions only when the secret key is matched. Findings: Our proposed novel approach results in better performance compared to other methods of partitioning. Also securely retrieves subtree over the encrypted data. Application/Improvements: This approach can be applied to classify patient electronic health records in cloud storage and query the encrypted data in order to make decisions.Keywords
Classification, Cloud Storage, Cryptography, Subtree Retrieval.- Variability, Heritability and Genetic Advance Studies in F2 Population of Rice (Oryza sativa L.)
Authors
1 Tamil Nadu Rice Research Institute (TNAU), Aduthurai (T.N.), IN
Source
International Journal of Forestry and Crop Improvement, Vol 7, No 1 (2016), Pagination: 57-60Abstract
An investigation was carried out in F<sub>2</sub> population of eight crosses with 160 single plants to estimate the variability, heritability, genetic advance and genetic advance as percentage. The results showed that PCV values in general was higher than GCV for various characters studied. The high PCV and GCV values was obtained for single plant yield followed by number of productive tillers per plant and low PCV and GCV was observed for plant height and panicle length. The small difference observed between GCV and PCV indicate the presence of high genetic variability for the traits which may facilitate selection. The traits thousand grain weight and number of fertile spikelet per panicle and single plant yield had high heritability along with high genetic advance as per cent of mean indicate that these characters attributable to additive gene effects which are fixable revealing that improvement in these characters would be possible through direct selection.Keywords
Rice, Genotypic Co-Efficient of Variation, Phenotypic Co-Efficient of Variation, Heritability, Genetic Advance as a Per Cent of Mean.- A Study to Assess the Effectiveness of Yoga Therapy on Menopausal Symptoms among the Postmenopausal Women in Selected Rural Areas at Madurai District
Authors
1 Meenakshi College of Nursing, Madurai, IN
Source
Asian Journal of Nursing Education and Research, Vol 9, No 2 (2019), Pagination: 169-173Abstract
A study to assess the effectiveness of yoga therapy on menopausal symptoms. To find out the pre and posttest level of menopausal symptoms among the postmenopausal women in the experimental and the control group. To evaluate the effect of yoga therapy on menopausal symptoms among postmenopausal women. The conceptual framework for the study was derived from general system theory. It was developed by Von Ludwig Bertanlaffy (1972), credited with originating the idea of general system. Methodology -The research design selected for the study was experimental pre and posttest design control group. The posttest II mean score was significantly lesser in the experimental group than the posttest II mean score of the control group. Findings - T here was a significant reduction in posttest II than the posttest I score in the experimental group than the control group. Therefore, there was a significant reduction on menopausal symptoms among postmenopausal women in the experimental group, it is inferred that the intervention was effective in reducing the menopausal symptoms. There is a significant association between the menopausal symptoms and the demographic variables namely, educational status (X2value= 9.12 at p ’value 0.26).There is a significant association between the pretest level of menopausal symptoms and the demographic variable namely, when the menstrual cycle first became irregular (x2-value= 14.20 at p ’ value 0.002), sterilization (x2-value=4.43 at p ’ value 0.035). Recommendations -The researcher suggested that regular practice of yoga therapy were effective in minimizing the menopausal symptoms. A comparative study can be conducted between rural and urban women.Keywords
Quality of Life of Women (QOL), Women Undergone Hysterectomy, Hormone Replacement Therapy (HRT), Menopausal Symptoms, Postmenopausal Women, World Menopause Day, Hot Flash, Yoga Therapy-Vitamin Y And Line Diagram.References
- http://timesofindia.indiatimes.com / Indian Menopause Society (2016)
- http://www.indian menopause society.org (2015)
- Yoga Therapy and Menopause "Mit freundlicher Genehmigung von Maimu Opmann, Estonia und Lia Lappalainen, Finland 2010
- US Census Bureau. Population survey, female population March 2002. Available at: http://www. Census.gov/population. Joann E. and Manson, 2002
- Journal of Yoga - Ontogenetic and Therapeutic Investigation, Sept 2010 (Volume 02, Issue 01), Page -14
- J. Midlife Health. 2013 Journal of midlife health Indian menopausal society. Jul-Sep; 4(3): 182-187.
- Shah Rashmi, Menopausal symptoms in urban Indian women. Obstetrics and Gynecology today: 667-670.