Medical Records Clustering Based on the Text Fetched from Records
|
|
- Harry Atkinson
- 6 years ago
- Views:
Transcription
1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN X IMPACT FACTOR: IJCSMC, Vol. 5, Issue. 5, May 2016, pg Medical Records Clustering Based on the Text Fetched from Records Ms. Ramya.S.Bhat 1, Mrs. A.Rafega Beham 2 ¹M.Tech Scholor, Department of Information Science and Engineering New Horizon College Of Engineering, Bangalore, India ²Asst.Professor, Department of Information Science and Engineering New Horizon College Of Engineering, Bangalore, India 1 bhatramyas@gmail.com, 2 rafeeka.rifa@gmail.com Abstract- This paper describes how the rich available data from patient s medical records can be clustered and hidden information can be retrieved out of it. We first collect the 49 patient s medical records, use annotators to extract the text based on symptom occurred and medical drug name. The fetched text are clustered and stored in a file. When a combination of medical terms taken from medical documents is given as a query through the search engine shows the clustered documents. We use MetaMap and Medex as annotators for extracting the symptom names and the pharmaceutical names. For clustering the fetched data we are using the multi view NMF, which is a clustering technique. Keywords:- multi view NMF, Metamap, Medex, document clustering. I. INTRODUCTION Data mining is a process of extracting the hidden data from the large set of data to extract the feasible pattern. There are many types of data mining. One of the techniques among them is the clustering technique. Clustering is the task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups (clusters). It is a main task of exploratory data mining, and a common technique for statistical data analysis, used in many fields, including machine learning, pattern recognition, image analysis, information retrieval, bioinformatics, data compression, document clustering and computer graphics. Cluster analysis itself is not one specific algorithm, but the general task to be solved. It can be achieved by various algorithms that differ significantly in their notion of what constitutes a cluster and how to efficiently find them. Popular notions of clusters include groups with small distances among the cluster members, dense areas of the data space, intervals or particular statistical distributions. Clustering can therefore 2016, IJCSMC All Rights Reserved 771
2 be formulated as a multi-objective optimization problem. The appropriate clustering algorithm and parameter settings (including values such as the distance function to use, a density threshold or the number of expected clusters) depend on the individual data set and intended use of the results. Cluster analysis as such is not an automatic task, but an iterative process of knowledge discovery or interactive multi-objective optimization that involves trial and failure. It is often necessary to modify data preprocessing and model parameters until the result achieves the desired properties. One application of clustering technique, ie the document clustering is explained in this paper. Document clustering involves the use of descriptors and descriptor extraction. Descriptors are sets of words that describe the contents within the cluster. Document clustering is generally considered to be a centralized process. Examples of document clustering include web document clustering for search users. The application of document clustering can be categorized to two types, online and offline. Online applications are usually constrained by efficiency problems when compared to offline applications. II. RELATED WORK First, we pre-process clinical notes to identify words and sentences from clinical notes. During the preprocessing, we use section annotator to identify different sections for each clinical note. The section annotator depends on the section header information from clinical notes. We also use negation annotator to remove negation symptom and medication names. Pre-negation is negation words like avoid, deny, cannot, without, and so on. Post-negation is negation words like free, was ruled out, and so on. After pre-process, we use symptom annotator based on the Meta Map to extract symptom names from clinical notes. Meanwhile, we use medication annotator based on MedEx System to extract medication names from clinical notes. We use MetaMap to extract symptom names from clinical notes. MetaMap is a program that maps biomedical texts to concepts in the UMLS Meta-thesaurus. Since Meta map returns all types of concepts, we only keep these concepts related to symptom names, such as concept labeled as sosy, which represents sign and symptom. We use MedEx system to extract medication names from clinical notes. Advantages 1. By using symptom names and medication names, the clustering performance can be improved. 2. It also indicates that multi-view NMF can achieve better results than NMF. Unsupervised learning algorithms such as principal components analysis and vector quantization can be understood as factorizing a data matrix subject to different constraints. Depending upon the constraints utilized, the resulting factors can be shown to have very different representational properties. Principal components analysis enforces only a weak orthogonality constraint, resulting in a very distributed representation that uses cancellations to generate variability. On the other hand, vector quantization uses a hard winner- takeall constraint that results in clustering the data into mutually exclusive prototypes. It has been shown that non negativity is a useful constraint for matrix factorization that can learn a parts representation of the data.the nonnegative basis vectors that are learned are used in distributed, yet still 2016, IJCSMC All Rights Reserved 772
3 sparse combinations to generate expressiveness in the reconstructions.in this submission, we analyze in detail two numerical algorithms for learning the optimal nonnegative factors from data. We formally consider algorithms for solving the following problem: Non-negative matrix factorization (NMF) Given a non-negative matrix V, find non-negative matrix factors Wand H such that: V~WH (1) NMF can be applied to the statistical analysis of multivariate data in the following manner. Given a set of of multivariate n-dimensional data vectors, the vectors are placed in the columns of an n x m matrix V where m is the number of examples in the data set. This matrix is then approximately factorized into an n x r matrix Wand an r x m matrix H. Usually r is chosen to be smaller than nor m, so that Wand H are smaller than the original matrix V. This results in a compressed version of the original data matrix. What is the significance of the approximation in Eq. (1)? It can be rewritten column by column as v ~ Wh, where v and h are the corresponding columns of V and H. In other words, each data vector v is approximated by a linear combination of the columns of W, weighted by the components of h. Therefore W can be regarded as containing a basis that is optimized for the linear approximation of the data in V. Since relatively few basis vectors are used to represent many data vectors, good approximation can only be achieved if the basis vectors discover structure that is latent in the data. Some of the applications of Non matrix factorization are:- Text Mining for Surveillance Electronic Mail Sub collections Term Weighting Document clustering. Our contributions in this paper are: 1) We present a system for extracting symptom/medication names from clinical notes. 2) We apply multi-view NMF to evaluate the effects of using medication/symptom names to improve the clinical documents clustering results. 3) We fetch the data from search engine by sending the query. Fig 1.Overview of Designed System 2016, IJCSMC All Rights Reserved 773
4 The execution of the methodology is shown below: In this paper 49 set of patient s records were taken to extract the symptoms occurred and medical drug name. The extraction of the data is shown below: Fig 2. Extraction of medical drug name and symptom(record 0-5) Fig 3.Extraction of medical drug name and symptom(record 6-11) 2016, IJCSMC All Rights Reserved 774
5 Fig 4. Extraction of medical drug name and symptom(record 12-17) Fig 5. Extraction of medical drug name and symptom(record 18-23) 2016, IJCSMC All Rights Reserved 775
6 Fig 6. Extraction of medical drug name and symptom(record 24-29) Fig 7. Extraction of medical drug name and symptom(record 30-35) 2016, IJCSMC All Rights Reserved 776
7 Fig 8. Extraction of medical drug name and symptom(record 36-41) Fig 9. Extraction of medical drug name and symptom(record 42-48) 2016, IJCSMC All Rights Reserved 777
8 Clustering of the documents Fig 10.Clustering of documents(cluster 0-31) It shows that the first record is in the first cluster, second record in the third cluster and so on. Fig 11. Clustering of documents(cluster 32-48) After the documents are clustered the query is sent through a search engine so as to retrieve the clustered data on the basis of symptom occurred and medical drug name from the patient s medical record. 2016, IJCSMC All Rights Reserved 778
9 Fig 12. Home page to enter credentials Login credentials are entered. Fig 13. Credentials Entered 2016, IJCSMC All Rights Reserved 779
10 Fig 14. Search Terms sent as query A search terms are the medical terms observed from the medical records which are sent as an query.in the above the search terms given are diabetes mellitus and glaucoma. Fig 15.Clusterd data on the basis of medication and symptom for a given query. 2016, IJCSMC All Rights Reserved 780
11 Fig 16. Clustered data on the basis of medication and symptom for a given query obesity and insomnia. The above screen shot depicts the clustered data for the search terms obesity and insomnia. III. CONCLUSION This paper explains about the document clustering done by the technique Multi-view NMF based on the symptom occurred and medical drug name taken from the patient s medical records. The medical records which are of rich text are taken into account in order to find the hidden information from them. In this approach we first extract the nouns by removing the negation annotators and fetch the nouns. The text fetched is further for clustering using the NMF clustering technique. The clustered data is stored which can be used further to find the symptoms occurred and the medical drug name with similarity when a query is passed through the search engine which is useful in the healthcare sector especially at medical transcription sector. REFERENCES [1] K. Roberts and S. M. Harabagiu, A flexible framework for deriving assertions from electronic medical records, J. Amer. Med. Informat. Assoc., vol. 18, no. 5, pp , [2] M.-Y. Kim et al., Patient information extraction in noisy tele health texts, in Proc. IEEE Int. Conf. Bioinformat. Biomed. (BIBM 13). [3] F.S.Roqueetal., Using electronic patient records to discover disease correlations and stratify patient cohorts, PLoS Comput. Biol., vol. 7, no. 8, p. E , [4] G. Hripcsak et al., Mining complex clinical data for patient safety research: a framework for event discovery, J. Biomed. Informat., vol. 36, no. 1, pp , [5] S. V. Pakhomov, A. Ruggieri, and C. G. Chute, Maximum entropy modelling for mining patient medication status from free text, inproc. AMIA Symp. Amer. Med. Informat. Assoc., [6] A. Henriksson, Semantic spaces of clinical text: Leveraging distributional semantics for natural language processing of electronic health records, Lic. degree, Dept. Comput. Syst. Sci., Stockholm Univ., Stockholm, Sweden, [7] S. Kushinka, Clinical documentation: EHR deployment techniques, in California HealthCare Found., 2010 [Online]. Available: C/PDF%20ClinicalDocumentationEHRDeploymentTechniques.pdf 2016, IJCSMC All Rights Reserved 781
12 [8] K. Chaudhuri, S. Kakade, K. Livescu, and K. Srid- haran. Multi-view clustering via canonical correlation analysis. In ICML, pages , [9] C. Ding, T. Li, and W. Peng. On the equivalence be- tween non-negative matrix factorization and probabilis- tic latent semantic indexing. Computational Statistics Data Analysis, 52: , [10] C. Ding, T. Li, W. Peng, and H. Park. Orthogonal nonnegative matrix t-factorizations for clustering. In KDD, pages , [11] E. Gaussier and C. Goutte. Relation between PLSA and NMF and implications. In SIGIR, pages , [12] G. Greco, A. Guzzo, and L. Pontieri. Coclustering multiple heterogeneous domains: Linear combinations and agreements. TKDE, 22: , [13] D. Greene and P. Cunningham. A matrix factorization approach for integrating multiple data views. In ECML PKDD, pages , [14] T. Hofmann. Probabilistic latent semantic indexing. In SIGIR, pages 50 57, [15] A. Kumar and H. Daum e III. A co-training approach for multi-view spectral clustering. In ICML, pages , , IJCSMC All Rights Reserved 782
REMOVAL OF REDUNDANT AND IRRELEVANT DATA FROM TRAINING DATASETS USING SPEEDY FEATURE SELECTION METHOD
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationA Supervised Method for Multi-keyword Web Crawling on Web Forums
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationCorrelation Based Feature Selection with Irrelevant Feature Removal
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationFUFM-High Utility Itemsets in Transactional Database
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationText Document Clustering Using DPM with Concept and Feature Analysis
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 10, October 2013,
More informationAn Overview of various methodologies used in Data set Preparation for Data mining Analysis
An Overview of various methodologies used in Data set Preparation for Data mining Analysis Arun P Kuttappan 1, P Saranya 2 1 M. E Student, Dept. of Computer Science and Engineering, Gnanamani College of
More informationPrivacy Preserving Health Data Mining
IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Privacy Preserving Health Data Mining 1 Somy.M.S, 2 Gayatri.K.S, 3 Ashwini.B 1,2,3 Dept. of CSE, Mar Baselios
More informationINFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationEFFECTIVE EFFICIENT BOOLEAN RETRIEVAL
EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL J Naveen Kumar 1, Dr. M. Janga Reddy 2 1 jnaveenkumar6@gmail.com, 2 pricipalcmrit@gmail.com 1 M.Tech Student, Department of Computer Science, CMR Institute of Technology,
More informationCS249: ADVANCED DATA MINING
CS249: ADVANCED DATA MINING Recommender Systems II Instructor: Yizhou Sun yzsun@cs.ucla.edu May 31, 2017 Recommender Systems Recommendation via Information Network Analysis Hybrid Collaborative Filtering
More informationChapter 1, Introduction
CSI 4352, Introduction to Data Mining Chapter 1, Introduction Young-Rae Cho Associate Professor Department of Computer Science Baylor University What is Data Mining? Definition Knowledge Discovery from
More informationInternational Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at
Performance Evaluation of Ensemble Method Based Outlier Detection Algorithm Priya. M 1, M. Karthikeyan 2 Department of Computer and Information Science, Annamalai University, Annamalai Nagar, Tamil Nadu,
More informationInternational Journal of Advance Engineering and Research Development. A Survey on Data Mining Methods and its Applications
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 5, Issue 01, January -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 A Survey
More informationExplore Co-clustering on Job Applications. Qingyun Wan SUNet ID:qywan
Explore Co-clustering on Job Applications Qingyun Wan SUNet ID:qywan 1 Introduction In the job marketplace, the supply side represents the job postings posted by job posters and the demand side presents
More informationPowering Knowledge Discovery. Insights from big data with Linguamatics I2E
Powering Knowledge Discovery Insights from big data with Linguamatics I2E Gain actionable insights from unstructured data The world now generates an overwhelming amount of data, most of it written in natural
More informationDeveloping A Semantic Web-based Framework for Executing the Clinical Quality Language Using FHIR
Developing A Semantic Web-based Framework for Executing the Clinical Quality Language Using FHIR Guoqian Jiang 1, Eric Prud Hommeax 2, and Harold R. Solbrig 1 1 Mayo Clinic, Rochester, MN, 55905, USA 2
More informationA New Technique to Optimize User s Browsing Session using Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationReview on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationAnomaly Detection. You Chen
Anomaly Detection You Chen 1 Two questions: (1) What is Anomaly Detection? (2) What are Anomalies? Anomaly detection refers to the problem of finding patterns in data that do not conform to expected behavior
More informationInverted Index for Fast Nearest Neighbour
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationKeywords: clustering algorithms, unsupervised learning, cluster validity
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Clustering Based
More informationDesign and Implementation of Search Engine Using Vector Space Model for Personalized Search
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationPrecise Medication Extraction using Agile Text Mining
Precise Medication Extraction using Agile Text Mining Chaitanya Shivade *, James Cormack, David Milward * The Ohio State University, Columbus, Ohio, USA Linguamatics Ltd, Cambridge, UK shivade@cse.ohio-state.edu,
More informationRetrieval of Highly Related Documents Containing Gene-Disease Association
Retrieval of Highly Related Documents Containing Gene-Disease Association K. Santhosh kumar 1, P. Sudhakar 2 Department of Computer Science & Engineering Annamalai University Annamalai Nagar, India. santhosh09539@gmail.com,
More informationMining Trusted Information in Medical Science: An Information Network Approach
Mining Trusted Information in Medical Science: An Information Network Approach Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign Collaborated with many, especially Yizhou
More informationRelevance Feature Discovery for Text Mining
Relevance Feature Discovery for Text Mining Laliteshwari 1,Clarish 2,Mrs.A.G.Jessy Nirmal 3 Student, Dept of Computer Science and Engineering, Agni College Of Technology, India 1,2 Asst Professor, Dept
More informationCollaborative Framework for Testing Web Application Vulnerabilities Using STOWS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationData Clustering With Leaders and Subleaders Algorithm
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 11 (November2012), PP 01-07 Data Clustering With Leaders and Subleaders Algorithm Srinivasulu M 1,Kotilingswara
More informationISSN: , (2015): DOI:
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 6 June 2017, Page No. 21737-21742 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i6.31 A
More informationComparison of Online Record Linkage Techniques
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 Dec-2015 p-issn: 2395-0072 www.irjet.net Comparison of Online Record Linkage Techniques Ms. SRUTHI.
More informationA Framework for Securing Databases from Intrusion Threats
A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:
More informationImplementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105
More informationA REVIEW ON CLASSIFICATION TECHNIQUES OVER AGRICULTURAL DATA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.491
More informationProbabilistic Graphical Models Part III: Example Applications
Probabilistic Graphical Models Part III: Example Applications Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2014 CS 551, Fall 2014 c 2014, Selim
More informationDeveloping A Semantic Web-based Framework for Executing the Clinical Quality Language Using FHIR
Developing A Semantic Web-based Framework for Executing the Clinical Quality Language Using FHIR Guoqian Jiang 1, Eric Prud Hommeaux 2, Guohui Xiao 3, and Harold R. Solbrig 1 1 Mayo Clinic, Rochester,
More informationQuery Disambiguation from Web Search Logs
Vol.133 (Information Technology and Computer Science 2016), pp.90-94 http://dx.doi.org/10.14257/astl.2016. Query Disambiguation from Web Search Logs Christian Højgaard 1, Joachim Sejr 2, and Yun-Gyung
More informationInfrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset
Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset M.Hamsathvani 1, D.Rajeswari 2 M.E, R.Kalaiselvi 3 1 PG Scholar(M.E), Angel College of Engineering and Technology, Tiruppur,
More informationAn Efficient Methodology for Image Rich Information Retrieval
An Efficient Methodology for Image Rich Information Retrieval 56 Ashwini Jaid, 2 Komal Savant, 3 Sonali Varma, 4 Pushpa Jat, 5 Prof. Sushama Shinde,2,3,4 Computer Department, Siddhant College of Engineering,
More informationDensity Based Clustering using Modified PSO based Neighbor Selection
Density Based Clustering using Modified PSO based Neighbor Selection K. Nafees Ahmed Research Scholar, Dept of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli, India nafeesjmc@gmail.com
More informationA Study on Association Rule Mining Using ACO Algorithm for Generating Optimized ResultSet
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 11, November 2013,
More informationDENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE
DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE Sinu T S 1, Mr.Joseph George 1,2 Computer Science and Engineering, Adi Shankara Institute of Engineering
More informationAN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH
AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH Sai Tejaswi Dasari #1 and G K Kishore Babu *2 # Student,Cse, CIET, Lam,Guntur, India * Assistant Professort,Cse, CIET, Lam,Guntur, India Abstract-
More informationSEMANTIC WEBSERVICE DISCOVERY FOR WEBSERVICE COMPOSITION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationMining User - Aware Rare Sequential Topic Pattern in Document Streams
Mining User - Aware Rare Sequential Topic Pattern in Document Streams A.Mary Assistant Professor, Department of Computer Science And Engineering Alpha College Of Engineering, Thirumazhisai, Tamil Nadu,
More informationAn Approach for Finding Frequent Item Set Done By Comparison Based Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationA Patent Retrieval Method Using a Hierarchy of Clusters at TUT
A Patent Retrieval Method Using a Hierarchy of Clusters at TUT Hironori Doi Yohei Seki Masaki Aono Toyohashi University of Technology 1-1 Hibarigaoka, Tenpaku-cho, Toyohashi-shi, Aichi 441-8580, Japan
More informationCross Reference Strategies for Cooperative Modalities
Cross Reference Strategies for Cooperative Modalities D.SRIKAR*1 CH.S.V.V.S.N.MURTHY*2 Department of Computer Science and Engineering, Sri Sai Aditya institute of Science and Technology Department of Information
More informationImage Similarity Measurements Using Hmok- Simrank
Image Similarity Measurements Using Hmok- Simrank A.Vijay Department of computer science and Engineering Selvam College of Technology, Namakkal, Tamilnadu,india. k.jayarajan M.E (Ph.D) Assistant Professor,
More informationDocument Clustering using Correlation Preserving Indexing with Concept Analysis
IJCST Vo l. 4, Is s u e 1, Ja n - Ma r c h 2013 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Document Clustering using Correlation Preserving Indexing with Concept Analysis 1 M. Mohanasundari, 2
More informationOntology and Hyper Graph Based Dashboards in Data Warehousing Systems
Ontology and Hyper Graph Based Dashboards in Data Warehousing Systems Gitanjali.J #1, C Ranichandra #2, Meera Kuriakose #3, Revathi Kuruba #4 # School of Information Technology and Engineering, VIT University
More informationRedefining and Enhancing K-means Algorithm
Redefining and Enhancing K-means Algorithm Nimrat Kaur Sidhu 1, Rajneet kaur 2 Research Scholar, Department of Computer Science Engineering, SGGSWU, Fatehgarh Sahib, Punjab, India 1 Assistant Professor,
More informationAnswering XML Query Using Tree Based Association Rule
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationUniversity of Florida CISE department Gator Engineering. Data Preprocessing. Dr. Sanjay Ranka
Data Preprocessing Dr. Sanjay Ranka Professor Computer and Information Science and Engineering University of Florida, Gainesville ranka@cise.ufl.edu Data Preprocessing What preprocessing step can or should
More informationImproving the Reverse Dictionary Using Scalable Dataset
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 11 Nov. 2016, Page No. 18827-18831 ABSTRACT Improving the Reverse Dictionary Using Scalable Dataset
More informationEfficient Map Reduce Model with Hadoop Framework for Data Processing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationSK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher
ISSN: 2394 3122 (Online) Volume 2, Issue 1, January 2015 Research Article / Survey Paper / Case Study Published By: SK Publisher P. Elamathi 1 M.Phil. Full Time Research Scholar Vivekanandha College of
More informationImplementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10647-10651 Implementation of Clustering With Meta Information Using Improved
More informationData Preprocessing. Data Preprocessing
Data Preprocessing Dr. Sanjay Ranka Professor Computer and Information Science and Engineering University of Florida, Gainesville ranka@cise.ufl.edu Data Preprocessing What preprocessing step can or should
More informationSensor Based Time Series Classification of Body Movement
Sensor Based Time Series Classification of Body Movement Swapna Philip, Yu Cao*, and Ming Li Department of Computer Science California State University, Fresno Fresno, CA, U.S.A swapna.philip@gmail.com,
More informationAnomaly Detection on Data Streams with High Dimensional Data Environment
Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationENHANCEMENT OF METICULOUS IMAGE SEARCH BY MARKOVIAN SEMANTIC INDEXING MODEL
ENHANCEMENT OF METICULOUS IMAGE SEARCH BY MARKOVIAN SEMANTIC INDEXING MODEL Shwetha S P 1 and Alok Ranjan 2 Visvesvaraya Technological University, Belgaum, Dept. of Computer Science and Engineering, Canara
More informationCost Based Efficient Routing for Wireless Body Area Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationCouncil for Innovative Research
AN AMELIORATED METHODOLOGY FOR RANKING THE TUPLE Ajeet A. Chikkamannur, Shivanand M. Handigund Department of Information Science and Engg, New Horizon College of Engineering, Bangalore 562157, India ac.ajeet@gmail.com
More informationQuery- And User-Dependent Approach for Ranking Query Results in Web Databases
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 6, Issue 6 (Nov. - Dec. 2012), PP 36-43 Query- And User-Dependent Approach for Ranking Query Results in Web Databases
More informationImage Retrieval System Based on Sketch
Image Retrieval System Based on Sketch Author 1 Mrs. Asmita A. Desai Assistant Professor,Department of Electronics Engineering, Author 2 Prof. Dr. A. N. Jadhav HOD,Department of Electronics Engineering,
More informationDiagnosticating and Propagating Health Maintenance Information Using Machine Learning Based Methodology
Diagnosticating and Propagating Health Maintenance Information Using Machine Learning Based Methodology P.Deepa, M.Baskar Abstract:-The Machine Learning field has gained its thrust in almost any domain
More informationMultimodal Information Spaces for Content-based Image Retrieval
Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due
More informationA Better Approach for Horizontal Aggregations in SQL Using Data Sets for Data Mining Analysis
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 8, August 2013,
More informationApplication of Clustering as a Data Mining Tool in Bp systolic diastolic
Application of Clustering as a Data Mining Tool in Bp systolic diastolic Assist. Proffer Dr. Zeki S. Tywofik Department of Computer, Dijlah University College (DUC),Baghdad, Iraq. Assist. Lecture. Ali
More informationOptimizing Query results using Middle Layers Based on Concept Hierarchies
Optimizing Query results using Middle Layers Based on Concept Hierarchies G.Kumari,I.Gayathri Devi G.Kumari Asst.Professor, CSE Department I.Gayathri Devi Asst.Professor, CSE Department Pragati Engineering
More informationKeyword: PCA, LCM, Lattice, Heterogeneous, Clustering
Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com PCA based Lattice
More informationEfficient Clustering of Web Documents Using Hybrid Approach in Data Mining
Efficient Clustering of Web Documents Using Hybrid Approach in Data Mining Pralhad Sudam Gamare 1, Ganpati A. Patil 2 1 P.G. Student, Computer Science and Technology, Department of Technology-Shivaji University-Kolhapur,
More informationA Semantic Multi-Field Clinical Search for Patient Medical Records
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0014 A Semantic Multi-Field Clinical
More informationExploring the Query Expansion Methods for Concept Based Representation
Exploring the Query Expansion Methods for Concept Based Representation Yue Wang and Hui Fang Department of Electrical and Computer Engineering University of Delaware 140 Evans Hall, Newark, Delaware, 19716,
More informationTDT- An Efficient Clustering Algorithm for Large Database Ms. Kritika Maheshwari, Mr. M.Rajsekaran
TDT- An Efficient Clustering Algorithm for Large Database Ms. Kritika Maheshwari, Mr. M.Rajsekaran M-Tech Scholar, Department of Computer Science and Engineering, SRM University, India Assistant Professor,
More informationKeywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advanced Preferred
More informationTGI Modules for Social Tagging System
TGI Modules for Social Tagging System Mr. Tambe Pravin M. Prof. Shamkuwar Devendra O. M.E. (2 nd Year) Department Of Computer Engineering Department Of Computer Engineering SPCOE, Otur SPCOE, Otur Pune,
More information[Gidhane* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AN EFFICIENT APPROACH FOR TEXT MINING USING SIDE INFORMATION Kiran V. Gaidhane*, Prof. L. H. Patil, Prof. C. U. Chouhan DOI: 10.5281/zenodo.58632
More informationKeywords Clustering, Goals of clustering, clustering techniques, clustering algorithms.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey of Clustering
More informationNonnegative Matrix Factorization with Orthogonality Constraints
Nonnegative Matrix Factorization with Orthogonality Constraints Jiho Yoo and Seungjin Choi Department of Computer Science Pohang University of Science and Technology San 31 Hyoja-dong, Nam-gu, Pohang 790-784,
More informationA Survey on k-means Clustering Algorithm Using Different Ranking Methods in Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationQuery Reformulation for Clinical Decision Support Search
Query Reformulation for Clinical Decision Support Search Luca Soldaini, Arman Cohan, Andrew Yates, Nazli Goharian, Ophir Frieder Information Retrieval Lab Computer Science Department Georgetown University
More informationA Methodology for Assigning Access Control to Public Clouds
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationSecure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER
SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER P.Radhabai Mrs.M.Priya Packialatha Dr.G.Geetha PG Student Assistant Professor Professor Dept of Computer Science and Engg Dept
More informationVIDEO MINING AND ANOMALY DETECTION SURVEY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSecuring WMSN using SHAREMIND
Securing WMSN using SHAREMIND Prof. Dhanshri Patil 1, Priyanka Kanse 2, Priyanka Kakade 3, Ketaki Sortur 4, Akshata Nalawade 5 1, 2,3,4,5 UG Student Department of Computer Engineering, PCET s Nutan Maharashtra
More informationData Mining for XML Query-Answering Support
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 5, Issue 6 (Sep-Oct. 2012), PP 25-29 Data Mining for XML Query-Answering Support KC. Ravi Kumar 1, E. Krishnaveni
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN:
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 20131 Improve Search Engine Relevance with Filter session Addlin Shinney R 1, Saravana Kumar T
More informationAn Endowed Takagi-Sugeno-type Fuzzy Model for Classification Problems
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationA WAVELET BASED BIOMEDICAL IMAGE COMPRESSION WITH ROI CODING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.407
More informationCPSC 340: Machine Learning and Data Mining. Multi-Dimensional Scaling Fall 2017
CPSC 340: Machine Learning and Data Mining Multi-Dimensional Scaling Fall 2017 Assignment 4: Admin 1 late day for tonight, 2 late days for Wednesday. Assignment 5: Due Monday of next week. Final: Details
More informationThe NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets
The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets Jeffrey Brown, Lesley Curtis, and Rich Platt June 13, 2014 Previously The NIH Collaboratory:
More informationEfficient Rule Set Generation using K-Map & Rough Set Theory (RST)
International Journal of Engineering & Technology Innovations, Vol. 2 Issue 3, May 2015 www..com 6 Efficient Rule Set Generation using K-Map & Rough Set Theory (RST) Durgesh Srivastava 1, Shalini Batra
More informationImproving Recognition through Object Sub-categorization
Improving Recognition through Object Sub-categorization Al Mansur and Yoshinori Kuno Graduate School of Science and Engineering, Saitama University, 255 Shimo-Okubo, Sakura-ku, Saitama-shi, Saitama 338-8570,
More informationFace Image Retrieval Using Pose Specific Set Sparse Feature Representation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationDOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationA HYBRID APPROACH FOR HANDLING UNCERTAINTY - PROBABILISTIC THEORY, CERTAINTY FACTOR AND FUZZY LOGIC
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 11, November 2013,
More information