SlideShare a Scribd company logo
1 of 3
Download to read offline
Journal for Research | Volume 03 | Issue 10 | December 2017
ISSN: 2395-7549
All rights reserved by www.journal4research.org 19
Application Wise Innovation on Intelligent
Database Technique
Supreet Kaur Harkiran Kaur
PG Student Lecturer
Department of Computer Science and Engineering Department of Computer Science and Engineering
Thapar Institute of Engineering and Technology, Patiala,
India
Thapar Institute of Engineering and Technology, Patiala,
India
Abstract
Databases are systems, which are used for storing data. With the increase in information at rapid pace, extraction of relevant
information becomes time-consuming using traditional databases. Thus, the need of intelligent or smart databases arises.
Intelligent database is a system in which automation is applied on conventional database in order to enhance its functionality and
efficiency. Intelligent databases help us in making decisions and can respond or act to situations by learning. It has applications
in wide areas such as healthcare, automobile, education, information security, business etc. This paper represents various
intelligent database techniques, which are further used for implementation of applications of this domain.
Keywords: Intelligent Database, Data Marts, Data Analysis Systems, Database with Artificial Intelligence
_______________________________________________________________________________________________________
I. INTRODUCTION
Intelligent Database is made of two words “Intelligent” and “Database”. The word intelligent means Artificial Intelligence-
Artificial Intelligence is counterfeiting of human intelligence in computers. Computers are made to act like humans in certain
situation through learning. Computers are trained by feeding data into them and are evaluated by giving similar to real life test
situations. Database- Database is storehouse of data. It may contain either heterogeneous or homogenous data and includes both
text and graphics. Information is retrieved using queries or simply searching. Thus, intelligent database is smart database which
provides user oriented result.
Applications of Intelligent Database
Smart Backward Dictionary: Reverse dictionary is opposite to forward or traditional dictionary. In this phrases are given as input
and words are received as output. For example: if one writes “someone who is too afraid to do what is right or expected”, the
output will be coward, funk, sissy etc. Reverse or backward dictionary uses forward dictionary by looking up the phrase in it and
then returns matching word.
Egyptian Tourism Based Data-Warehouse
This is data warehouse for tourism in Egyptian sector. The main objective of this application is to provide tourism details at one
place so as to enhance decision making capability in this sector. The methodology used in this system can also help in building
data warehouses for other nations for similar purpose.
Smart Searching Using Keywords
This is an intelligent way of searching using the same basic XML and Relational Databases. In this application object semantics,
relationships and attributes are explored. Further, Object Relationship graph for XML and Object Relationship Mixed Graph for
relational databases are used in this approach.
Smart Web Crawler
Web Mining includes data collection and for this web crawler is required. But due to constant updates in data structures and
databases, smart web crawler is required. Intelligent dynamic web crawler stores extraction rules in Xpath, loads the rules
dynamically and for relevance calculation uses TF-IDF method. Further, intelligent dynamic crawler is used for threat awareness
of public vulnerabilities with the help of data collection and analysis of vulnerability community and the network node search
engine.
Attack Detection
This application uses MinHash based detection system which works by analyzing aggregated process creation events. It used
MinHash algorithm and weighted square matched similarity score for attack detection.
Application Wise Innovation on Intelligent Database Technique
(J4R/ Volume 03 / Issue 10 / 005)
All rights reserved by www.journal4research.org 20
Intelligent Database in Telecommunication
This application proposes the use of CDR files which are used in calling records but here importance is given in analyzing
information. This information is further used for drawing customer habits and thus helps in enhancing this business.
Smart Flaw Detection System in Hospitals
Databases plays vital in health care units. This application is focused on preventing malfunctions by detecting them and
providing early decisions for solving problems. It uses mathematical tools for checking severity of the problem.
II. LITERATURE SURVEY
It is based on diverse applications of intelligent database implemented using various approaches. It tells us how intelligent
database is evolving in various areas of life with the time.
JIA Wenchao, ZHENG Guojun et al. in [5] designed and implemented intelligent and dynamic web crawler which stores
Xpath rules, loads them dynamically and uses TF-IDF method to check relevance. Apart from this there is also implementation
of threat awareness of public vulnerabilities. It successfully overcomes all the problems faced by traditional web crawler due to
change in data at higher pace.
Soumya Rajan, Kumary R Soumya in [7] proposed a technique called reverse dictionary where phrases can be matched to
words i.e. corresponding to a given phrase there will a word. For e.g. if user enters a phrase ‘a strong feeling of sadness’
heartache will come as result. Reverse dictionary is opposite to forward dictionary. Reverse dictionary is helpful for certain users
like scientist, researchers, students, professional writers, teachers, marketing professionals and many more.
Alin Tisan, Stefan Oniga et al. in [1] represented a health status monitoring system using inertial sensors which can be placed
on human body. These sensors collect information about anything abrupt in human body and further information can be
displayed on cell phones. The use of database for storing information is also proposed. These sensors are low powered. There is
an app for displaying data on cell phone.
Wesal M Abu-Alam, Tamer A. Abdulaziz, Ibrahim F. Moawad, in [9] proposed a data warehouse for Egyptian tourism. This
clubs all the information regarding Egytian tourism at one place and thus helps people in this sector in making decision. The
technique used is OLAP- Online Analytical Processing. In the similar way data warehouse for other tourisms can also be
designed using the methodology presented in this paper.
Kehinde O. Adetiloye in [6] proposed intelligent database using SMS- Short Messaging Service. Further SMS service is used
for poll opinion. The use of triggers and stored procedures is mentioned. Thus, it makes opinion poll system automatic by
reacting according to situations. Here triggers response according to question that is if situation A is there trigger X will get
activated, situation B trigger Y and so on. There is use of secured RDBMS- Relational Database Management System.
Thuy Ngoc Le, and Zhong Zeng, Tok Wang Ling et al. in [10] proposed intelligent keyword search by enhancing XML and
Relational Databases. For achieving this purpose Object Relationship (OR) data graph for XML and Object Relationship Mixed
(ORM) for Relational Database is used. Further aggregate functions are used and there is provision for explicit searching using
relation, attributes and tag names in their search queries.
Himanshu Chandola, Jack W. Stokes et al. in [3] proposed Min Hash based targeted attack detection system. Min Hash
algorithm can detect millions of attacks in a single day. MART is distributed analysis tool which helps in finding malicious
activities in a large computer network using event logging on each host. The system is designed to find another attacks using
information from current ones. The use of weighted squared matched similarity score provides robustness to mimcry and NOOP
attacks.
O.Jukie in [8] proposed the use of CDR files for dimensioning database which further can be used to analyze customer
habits. CDR files contain records being made at each call. For analyzing customer, database is mandatory and here model star
database is used. In telecommunication sector customers play significant role and to serve them better there is need to know
about different customer requirement in depth.
Cesar Quintas, Paulo Silva et al. in [2] proposed fault prevention mechanism in healthcare sector. It monitors the database
continuously and alerts when there is chance of fault occurrence. It uses mathematical techniques and methods for this operation.
This mechanism is highly useful in healthcare as risk of fault cannot be taken.
Itorobong A. Inam, Ambrose A. Azeta et al. in [4] proposed a framework for enhancement of voice based system for
examination in open and distant learning (ODL). This mechanism is proposed for visually impaired students. For achieving the
objective proposed-system design, algorithm, server side scripting, data management, rule based reasoning, voice-based system
development is explained in the paper. Further, its usability is tested.
III. COMPARATIVE ANALYSIS OF METHODOLOGIES USED IN DIFFERENT APPLICATIONS OF INTELLIGENT DATABASE
Parameters Application Methodology/ Components
Reliable
Voice based e- examination system for visually challenged students in
open and distant learning.
VUI Framework, Fisher yates shuffling
algorithm
Accuracy Intelligent Systems based in Hospital malfunction scenario MEWS-
Application Wise Innovation on Intelligent Database Technique
(J4R/ Volume 03 / Issue 10 / 005)
All rights reserved by www.journal4research.org 21
Forecasting model used in medicines
Economical,
Performance
Intelligent Dynamic Crawler for Web Data Mining Xpath , TF-IDF
User oriented Intelligent Database Driven Reverse Dictionary
Sentence extraction using Vanilla approach,
stemming,
POS tagging
User friendly Activity and Health Status Monitoring System Sensors, 3 layer IOT structure
Generic Design Building data warehouse system for Tourism Sector OLAP
Swift in finding
intrusions
MART: Targeted Attack Detection on Compromised Network. Min-Hash algorithm
Efficient Smart search using Keywords
Object Relationship (OR) Object
Relationship Mixed (ORM)
Intelligent, Data
Oriented
Intelligent Database in Telecommunication
Modal Star Database ,
CDR files
Robust
Smart Polling System using Triggers and
Stored Procedures
Triggers,
Stored Procedures,
RDBMS
IV. CONCLUSION
The comparative analysis of Intelligent Database represents that there are different techniques or methodologies of intelligent
database which can be classified on certain parameters and there are different applications implemented using these techniques.
The conclusion drawn out of this comparative analysis is that intelligent database has different applications in diverse areas,
implemented using varied techniques/ approaches but all of them lead to efficient and improved results. One of the application
Data warehouse for Egyptian Tourism uses OLAP – Online Analytical Processing Tool and similarly there is another application
Business Intelligence solutions for personal use which is also implemented using OLAP. In the same manner both smart reverse
dictionary and application of Examination of gene drug in relation to diabetic gene both are implemented using stemming.
Intelligent Web crawler and Enhanced query processing both uses Xpath for their implementation. Intelligent billboard and
Smart flaw detection in hospitals both are based on IOT. Thus, there are different applications of Intelligent Database which are
implemented using similar techniques for their desired results. Implementation of similar techniques in different applications
varies but all produces optimal solutions.
REFERENCES
[1] Alin Tisan et al. Stefan Oniga, "Activity and Health Status Monitoring System," IEEE, 2017.
[2] Cesar Quintas et al. Paulo Silva, "Intelligent Systems based in Hospital Database Malfunction Scenarios," IEEE, 2014.
[3] Himanshu Chandola et al. Jack W. Stokes, "MART: Targeted Attack Detection on a Compromised Network," IEEE, 2016.
[4] Itorobong A. Inam et al. Ambrose A. Azeta, "Developing e- Examination Voice interface for Visually Impaired students in Open and Distant Learning
Context ," IEEE, 2017.
[5] JIA Wenchao et al. ZHENG Guojun, "Design and Application of Intelligent Dynamic Crawler for Web Data Mining," IEEE, 2017.
[6] Kehinde O. Adetiloye, "Design of Intelligent Database Program for an Interactive Auto Responsive SMS based Opinion Poll System using Triggers and
Stored Procedures," IEEE, 2014.
[7] Kumary R Soumya Soumya Rajan, "Intelligent Database-Driven Reverse Dictionary," IEEE, 2016.
[8] O. Jukie, "The use of call detail records and data mart dimentioning for telecommunication companies," IEEE, 2012.
[9] Wesal M Abu-Alam,Tamer A. Abdulaziz,Ibrahim F. Moawad, "Building Data Warehouse System for the Tourism Sector," IEEE, 2015.
[10] Thuy Ngoc Le, Zhong Zeng et.al Tok Wang Ling, "Towards an Intelligent Keyword Search over XML and Relational Database," IEEE, 2014.

More Related Content

What's hot

Evidence Data Preprocessing for Forensic and Legal Analytics
Evidence Data Preprocessing for Forensic and Legal AnalyticsEvidence Data Preprocessing for Forensic and Legal Analytics
Evidence Data Preprocessing for Forensic and Legal AnalyticsCSCJournals
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...ijtsrd
 
IRJET- Machine Learning
IRJET- Machine LearningIRJET- Machine Learning
IRJET- Machine LearningIRJET Journal
 
IRJET- Road Traffic Prediction using Machine Learning
IRJET- Road Traffic Prediction using Machine LearningIRJET- Road Traffic Prediction using Machine Learning
IRJET- Road Traffic Prediction using Machine LearningIRJET Journal
 
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET Journal
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET Journal
 
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmA Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmvivatechijri
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...IJMTST Journal
 
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...IJMTST Journal
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
An overview of information extraction techniques for legal document analysis ...
An overview of information extraction techniques for legal document analysis ...An overview of information extraction techniques for legal document analysis ...
An overview of information extraction techniques for legal document analysis ...IJECEIAES
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET Journal
 
Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...IJECEIAES
 
AUTOMATED PHARMACY
AUTOMATED PHARMACYAUTOMATED PHARMACY
AUTOMATED PHARMACYIJSRED
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018ijesajournal
 
Ci2004-10.doc
Ci2004-10.docCi2004-10.doc
Ci2004-10.docbutest
 
"Challenges for AI in Healthcare" - Peter Graven Ph.D
"Challenges for AI in Healthcare" - Peter Graven Ph.D"Challenges for AI in Healthcare" - Peter Graven Ph.D
"Challenges for AI in Healthcare" - Peter Graven Ph.DGrid Dynamics
 

What's hot (20)

Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
 
Evidence Data Preprocessing for Forensic and Legal Analytics
Evidence Data Preprocessing for Forensic and Legal AnalyticsEvidence Data Preprocessing for Forensic and Legal Analytics
Evidence Data Preprocessing for Forensic and Legal Analytics
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 
IRJET- Machine Learning
IRJET- Machine LearningIRJET- Machine Learning
IRJET- Machine Learning
 
IRJET- Road Traffic Prediction using Machine Learning
IRJET- Road Traffic Prediction using Machine LearningIRJET- Road Traffic Prediction using Machine Learning
IRJET- Road Traffic Prediction using Machine Learning
 
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
 
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmA Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithm
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
An overview of information extraction techniques for legal document analysis ...
An overview of information extraction techniques for legal document analysis ...An overview of information extraction techniques for legal document analysis ...
An overview of information extraction techniques for legal document analysis ...
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...
 
AUTOMATED PHARMACY
AUTOMATED PHARMACYAUTOMATED PHARMACY
AUTOMATED PHARMACY
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018
 
Ci2004-10.doc
Ci2004-10.docCi2004-10.doc
Ci2004-10.doc
 
"Challenges for AI in Healthcare" - Peter Graven Ph.D
"Challenges for AI in Healthcare" - Peter Graven Ph.D"Challenges for AI in Healthcare" - Peter Graven Ph.D
"Challenges for AI in Healthcare" - Peter Graven Ph.D
 

Similar to APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES

Performance analysis of data mining algorithms with neural network
Performance analysis of data mining algorithms with neural networkPerformance analysis of data mining algorithms with neural network
Performance analysis of data mining algorithms with neural networkIAEME Publication
 
A new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender systemA new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender systemIJNSA Journal
 
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEMA NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEMIJNSA Journal
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligencevivatechijri
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)Shahbaz Anjam
 
1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)Aida Harun
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesIJASRD Journal
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
 
A Survey of Agent Based Pre-Processing and Knowledge Retrieval
A Survey of Agent Based Pre-Processing and Knowledge RetrievalA Survey of Agent Based Pre-Processing and Knowledge Retrieval
A Survey of Agent Based Pre-Processing and Knowledge RetrievalIOSR Journals
 
Classification with R
Classification with RClassification with R
Classification with RNajima Begum
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsIOSR Journals
 
A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data MiningIOSR Journals
 
Emerging Technologies in Healthcare
Emerging Technologies in HealthcareEmerging Technologies in Healthcare
Emerging Technologies in HealthcareVirendra Prasad
 
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVALUML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVALijcsit
 
Mining Big Data using Genetic Algorithm
Mining Big Data using Genetic AlgorithmMining Big Data using Genetic Algorithm
Mining Big Data using Genetic AlgorithmIRJET Journal
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGCarrie Romero
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate worldEr. rahul abhishek
 

Similar to APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES (20)

Performance analysis of data mining algorithms with neural network
Performance analysis of data mining algorithms with neural networkPerformance analysis of data mining algorithms with neural network
Performance analysis of data mining algorithms with neural network
 
A new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender systemA new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender system
 
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEMA NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligence
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
 
1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
A Survey of Agent Based Pre-Processing and Knowledge Retrieval
A Survey of Agent Based Pre-Processing and Knowledge RetrievalA Survey of Agent Based Pre-Processing and Knowledge Retrieval
A Survey of Agent Based Pre-Processing and Knowledge Retrieval
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
Classification with R
Classification with RClassification with R
Classification with R
 
Eckovation Machine Learning
Eckovation Machine LearningEckovation Machine Learning
Eckovation Machine Learning
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data Mining
 
Emerging Technologies in Healthcare
Emerging Technologies in HealthcareEmerging Technologies in Healthcare
Emerging Technologies in Healthcare
 
Unit IV.pdf
Unit IV.pdfUnit IV.pdf
Unit IV.pdf
 
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVALUML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
 
Mining Big Data using Genetic Algorithm
Mining Big Data using Genetic AlgorithmMining Big Data using Genetic Algorithm
Mining Big Data using Genetic Algorithm
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
 

More from Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES

  • 1. Journal for Research | Volume 03 | Issue 10 | December 2017 ISSN: 2395-7549 All rights reserved by www.journal4research.org 19 Application Wise Innovation on Intelligent Database Technique Supreet Kaur Harkiran Kaur PG Student Lecturer Department of Computer Science and Engineering Department of Computer Science and Engineering Thapar Institute of Engineering and Technology, Patiala, India Thapar Institute of Engineering and Technology, Patiala, India Abstract Databases are systems, which are used for storing data. With the increase in information at rapid pace, extraction of relevant information becomes time-consuming using traditional databases. Thus, the need of intelligent or smart databases arises. Intelligent database is a system in which automation is applied on conventional database in order to enhance its functionality and efficiency. Intelligent databases help us in making decisions and can respond or act to situations by learning. It has applications in wide areas such as healthcare, automobile, education, information security, business etc. This paper represents various intelligent database techniques, which are further used for implementation of applications of this domain. Keywords: Intelligent Database, Data Marts, Data Analysis Systems, Database with Artificial Intelligence _______________________________________________________________________________________________________ I. INTRODUCTION Intelligent Database is made of two words “Intelligent” and “Database”. The word intelligent means Artificial Intelligence- Artificial Intelligence is counterfeiting of human intelligence in computers. Computers are made to act like humans in certain situation through learning. Computers are trained by feeding data into them and are evaluated by giving similar to real life test situations. Database- Database is storehouse of data. It may contain either heterogeneous or homogenous data and includes both text and graphics. Information is retrieved using queries or simply searching. Thus, intelligent database is smart database which provides user oriented result. Applications of Intelligent Database Smart Backward Dictionary: Reverse dictionary is opposite to forward or traditional dictionary. In this phrases are given as input and words are received as output. For example: if one writes “someone who is too afraid to do what is right or expected”, the output will be coward, funk, sissy etc. Reverse or backward dictionary uses forward dictionary by looking up the phrase in it and then returns matching word. Egyptian Tourism Based Data-Warehouse This is data warehouse for tourism in Egyptian sector. The main objective of this application is to provide tourism details at one place so as to enhance decision making capability in this sector. The methodology used in this system can also help in building data warehouses for other nations for similar purpose. Smart Searching Using Keywords This is an intelligent way of searching using the same basic XML and Relational Databases. In this application object semantics, relationships and attributes are explored. Further, Object Relationship graph for XML and Object Relationship Mixed Graph for relational databases are used in this approach. Smart Web Crawler Web Mining includes data collection and for this web crawler is required. But due to constant updates in data structures and databases, smart web crawler is required. Intelligent dynamic web crawler stores extraction rules in Xpath, loads the rules dynamically and for relevance calculation uses TF-IDF method. Further, intelligent dynamic crawler is used for threat awareness of public vulnerabilities with the help of data collection and analysis of vulnerability community and the network node search engine. Attack Detection This application uses MinHash based detection system which works by analyzing aggregated process creation events. It used MinHash algorithm and weighted square matched similarity score for attack detection.
  • 2. Application Wise Innovation on Intelligent Database Technique (J4R/ Volume 03 / Issue 10 / 005) All rights reserved by www.journal4research.org 20 Intelligent Database in Telecommunication This application proposes the use of CDR files which are used in calling records but here importance is given in analyzing information. This information is further used for drawing customer habits and thus helps in enhancing this business. Smart Flaw Detection System in Hospitals Databases plays vital in health care units. This application is focused on preventing malfunctions by detecting them and providing early decisions for solving problems. It uses mathematical tools for checking severity of the problem. II. LITERATURE SURVEY It is based on diverse applications of intelligent database implemented using various approaches. It tells us how intelligent database is evolving in various areas of life with the time. JIA Wenchao, ZHENG Guojun et al. in [5] designed and implemented intelligent and dynamic web crawler which stores Xpath rules, loads them dynamically and uses TF-IDF method to check relevance. Apart from this there is also implementation of threat awareness of public vulnerabilities. It successfully overcomes all the problems faced by traditional web crawler due to change in data at higher pace. Soumya Rajan, Kumary R Soumya in [7] proposed a technique called reverse dictionary where phrases can be matched to words i.e. corresponding to a given phrase there will a word. For e.g. if user enters a phrase ‘a strong feeling of sadness’ heartache will come as result. Reverse dictionary is opposite to forward dictionary. Reverse dictionary is helpful for certain users like scientist, researchers, students, professional writers, teachers, marketing professionals and many more. Alin Tisan, Stefan Oniga et al. in [1] represented a health status monitoring system using inertial sensors which can be placed on human body. These sensors collect information about anything abrupt in human body and further information can be displayed on cell phones. The use of database for storing information is also proposed. These sensors are low powered. There is an app for displaying data on cell phone. Wesal M Abu-Alam, Tamer A. Abdulaziz, Ibrahim F. Moawad, in [9] proposed a data warehouse for Egyptian tourism. This clubs all the information regarding Egytian tourism at one place and thus helps people in this sector in making decision. The technique used is OLAP- Online Analytical Processing. In the similar way data warehouse for other tourisms can also be designed using the methodology presented in this paper. Kehinde O. Adetiloye in [6] proposed intelligent database using SMS- Short Messaging Service. Further SMS service is used for poll opinion. The use of triggers and stored procedures is mentioned. Thus, it makes opinion poll system automatic by reacting according to situations. Here triggers response according to question that is if situation A is there trigger X will get activated, situation B trigger Y and so on. There is use of secured RDBMS- Relational Database Management System. Thuy Ngoc Le, and Zhong Zeng, Tok Wang Ling et al. in [10] proposed intelligent keyword search by enhancing XML and Relational Databases. For achieving this purpose Object Relationship (OR) data graph for XML and Object Relationship Mixed (ORM) for Relational Database is used. Further aggregate functions are used and there is provision for explicit searching using relation, attributes and tag names in their search queries. Himanshu Chandola, Jack W. Stokes et al. in [3] proposed Min Hash based targeted attack detection system. Min Hash algorithm can detect millions of attacks in a single day. MART is distributed analysis tool which helps in finding malicious activities in a large computer network using event logging on each host. The system is designed to find another attacks using information from current ones. The use of weighted squared matched similarity score provides robustness to mimcry and NOOP attacks. O.Jukie in [8] proposed the use of CDR files for dimensioning database which further can be used to analyze customer habits. CDR files contain records being made at each call. For analyzing customer, database is mandatory and here model star database is used. In telecommunication sector customers play significant role and to serve them better there is need to know about different customer requirement in depth. Cesar Quintas, Paulo Silva et al. in [2] proposed fault prevention mechanism in healthcare sector. It monitors the database continuously and alerts when there is chance of fault occurrence. It uses mathematical techniques and methods for this operation. This mechanism is highly useful in healthcare as risk of fault cannot be taken. Itorobong A. Inam, Ambrose A. Azeta et al. in [4] proposed a framework for enhancement of voice based system for examination in open and distant learning (ODL). This mechanism is proposed for visually impaired students. For achieving the objective proposed-system design, algorithm, server side scripting, data management, rule based reasoning, voice-based system development is explained in the paper. Further, its usability is tested. III. COMPARATIVE ANALYSIS OF METHODOLOGIES USED IN DIFFERENT APPLICATIONS OF INTELLIGENT DATABASE Parameters Application Methodology/ Components Reliable Voice based e- examination system for visually challenged students in open and distant learning. VUI Framework, Fisher yates shuffling algorithm Accuracy Intelligent Systems based in Hospital malfunction scenario MEWS-
  • 3. Application Wise Innovation on Intelligent Database Technique (J4R/ Volume 03 / Issue 10 / 005) All rights reserved by www.journal4research.org 21 Forecasting model used in medicines Economical, Performance Intelligent Dynamic Crawler for Web Data Mining Xpath , TF-IDF User oriented Intelligent Database Driven Reverse Dictionary Sentence extraction using Vanilla approach, stemming, POS tagging User friendly Activity and Health Status Monitoring System Sensors, 3 layer IOT structure Generic Design Building data warehouse system for Tourism Sector OLAP Swift in finding intrusions MART: Targeted Attack Detection on Compromised Network. Min-Hash algorithm Efficient Smart search using Keywords Object Relationship (OR) Object Relationship Mixed (ORM) Intelligent, Data Oriented Intelligent Database in Telecommunication Modal Star Database , CDR files Robust Smart Polling System using Triggers and Stored Procedures Triggers, Stored Procedures, RDBMS IV. CONCLUSION The comparative analysis of Intelligent Database represents that there are different techniques or methodologies of intelligent database which can be classified on certain parameters and there are different applications implemented using these techniques. The conclusion drawn out of this comparative analysis is that intelligent database has different applications in diverse areas, implemented using varied techniques/ approaches but all of them lead to efficient and improved results. One of the application Data warehouse for Egyptian Tourism uses OLAP – Online Analytical Processing Tool and similarly there is another application Business Intelligence solutions for personal use which is also implemented using OLAP. In the same manner both smart reverse dictionary and application of Examination of gene drug in relation to diabetic gene both are implemented using stemming. Intelligent Web crawler and Enhanced query processing both uses Xpath for their implementation. Intelligent billboard and Smart flaw detection in hospitals both are based on IOT. Thus, there are different applications of Intelligent Database which are implemented using similar techniques for their desired results. Implementation of similar techniques in different applications varies but all produces optimal solutions. REFERENCES [1] Alin Tisan et al. Stefan Oniga, "Activity and Health Status Monitoring System," IEEE, 2017. [2] Cesar Quintas et al. Paulo Silva, "Intelligent Systems based in Hospital Database Malfunction Scenarios," IEEE, 2014. [3] Himanshu Chandola et al. Jack W. Stokes, "MART: Targeted Attack Detection on a Compromised Network," IEEE, 2016. [4] Itorobong A. Inam et al. Ambrose A. Azeta, "Developing e- Examination Voice interface for Visually Impaired students in Open and Distant Learning Context ," IEEE, 2017. [5] JIA Wenchao et al. ZHENG Guojun, "Design and Application of Intelligent Dynamic Crawler for Web Data Mining," IEEE, 2017. [6] Kehinde O. Adetiloye, "Design of Intelligent Database Program for an Interactive Auto Responsive SMS based Opinion Poll System using Triggers and Stored Procedures," IEEE, 2014. [7] Kumary R Soumya Soumya Rajan, "Intelligent Database-Driven Reverse Dictionary," IEEE, 2016. [8] O. Jukie, "The use of call detail records and data mart dimentioning for telecommunication companies," IEEE, 2012. [9] Wesal M Abu-Alam,Tamer A. Abdulaziz,Ibrahim F. Moawad, "Building Data Warehouse System for the Tourism Sector," IEEE, 2015. [10] Thuy Ngoc Le, Zhong Zeng et.al Tok Wang Ling, "Towards an Intelligent Keyword Search over XML and Relational Database," IEEE, 2014.