Analyzing Feedback Patterns Using Data Mining Techinque
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
This paper presents a data mining technique that can be used to study which courses a student will more likely be interested in, during his graduation. The raw data was collected from feedback forms of an institution offering various courses. We processed the raw data available and performed t-weight calculations to present useful results.
Authors and Affiliations
Shaunak Chheda, Prof. Lynette D’mello
Secure and Privacy Approach in Mobile-Healthcare emergency Using PPSPC technique
In this paper, we proposing a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be op...
An Attack-Resilient Computation Algorithm To Compute Successful Aggregates In The Presence Of Attacks
In-network data aggregation can decrease the amount of communication and hence the energy consumed especially in large WSNs. The main idea is to unite partial results at intermediate nodes during message routing. One...
Load Shedding in Mobile Systems with MobiQual
In location-based, mobile continual query (CQ) systems, two key measures of quality-of-service (QoS) are: freshness and accuracy. To achieve freshness, the CQ server must perform frequent query reevaluations. To atta...
Content-based image retrieval using DWT based feature extraction and texture, shape and color features
Content Based Image Retrieval (CBIR) is the retrieval of images based on visual features such as colour, texture and shape. In this paper, we propose the algorithm on the basis of extraction and matching of color and...
Construction of Covert Channel Using Data Hiding Mechanism In Ipv4
Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert techniqu...