Journal of Advanced Database Management & Systems
https://computers.stmjournals.com/index.php?journal=JoADMS
<p align="center"><strong>Journal of Advanced Database Management & Systems (JoADMS)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2393-8730</strong></p><p align="center"> </p><p align="center">Click <strong><a href="/index.php?journal=JoADMS&page=about&op=editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 5.844<strong></strong></p><p><strong> </strong></p><p><strong>Journal of Advanced Database Management & Systems (JoADMS)</strong> is a journal focused towards the rapid publication of fundamental research papers on all areas of Advance database Management & systems. It's a triannual journal, started in 2014.</p><p><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoADMS</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Systems Analysis and Design</li><li>Semantic Web and Ontology’s</li><li>Knowledge Modeling and Processing</li><li>Sensor data Management</li><li>Temporal, Spatial and High dimensional databases</li><li>Database System and applications</li><li>Data warehousing and data mining, OLAP</li><li>Distributed ,Parallel , P2P and Grid -based Database</li><li>Emerging trends in XML Technology</li><li>Digital Libraries</li><li>Agile systems development</li><li>Bio-informatics</li><li>Cognitive modeling</li><li>Conceptual modeling</li><li>Data quality</li><li>Database for advanced applications</li><li>Database security and integrity</li><li>E-business and m-commerce models and architectures</li><li>Object oriented methods and methodologies</li><li>Software engineering</li><li>Web design methods and methodologies</li><li>Web database and Web-based information systems</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p><strong> </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong>Abbreviation: JoADMS</strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p><strong><a href="/index.php?journal=JoADMS&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p><strong><span style="text-decoration: underline;"><br /></span></strong></p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=JoADMS&page=about&op=editorialTeam">Editorial Board</a></span></strong></p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p> </p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong>Phone no.:</strong> 0120-4746-214/ Email: nikita@stmjournals.com</p>en-USJournal of Advanced Database Management & Systems2393-8730<p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"> </p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table>Society Management Application based on Flutter
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2694
<p><em><span lang="EN-US">This project is to develop an Android and iOS application to serve as a common platform for performing most of the day-to-day activities of society. Itincludes housing societies as well which have to do their day-to-day activities which include posting notices, reviewing proposals, conducting meetings, sending bills to residents, etc. The functions of the application include but are not limited to sending soft copies of proposals to be reviewed by other committee members.Other committee members can send their approval or disapproval of the considered proposal or document and add remarks, send general or personalized notices to the flat owners, review the complaints of the flat owners, register complaints regarding various matters, read posted notices, etc.</span><span> The application will be developed using Flutter and Google Firebase databases</span></em></p>Shubham ChoughuleSwapnil SonavaneShubham NavaleArti Gore2021-06-012021-06-018Interview Analyser for Remote Interviews
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2695
<em><span lang="EN-US">The project is ideally based on a web-based format and can also be converted into an application format where it is designed for recruitment purposes. It is developed by using theartificial intelligence which consists of TensorFlow libraries and deep learning modules. This project can ease the work of the human resource department by recruiting the right and suitable candidate required by the company. Interview analyser can handle 3 modules namely resume, tone, and face analysis.</span></em>Aditya Khanderao GhugePavan Vijay KhairnarRohit Vijay MhaskeBhagyashree Sonavane2021-06-012021-06-018Fuzzy based Hybrid Genetic Algorithm for Efficient Cloud Job Scheduling
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2668
<p align="center"><strong><em>Abstract</em></strong></p><p class="TextBody"><em>These days enterprises need to keep up a lot of uses getting to buy a large number of clients everywhere over the world. Keeping up their own foundation, overseeing programming prerequisites, and taking care of exorbitant excessive internet is difficult. This makes them move towards cloud computing. Cloud computing is a service provisioning strategy where clients can lease any assets like equipment, programming, or stage to build up an application. Clients need to pay just for how much the assets were devoured, and can powerfully increase or decrease the asset limit depending on the situation. Since clients are paying for the administrations, they anticipate the nature of administration from the supplier. Giving the nature of administration and pulling in the clients is a difficult issue for the suppliers. If not, clients will move towards other cloud suppliers. Hence, Service Level Agreement (SLA) is made among suppliers and clients that incorporate assistance quality, assets capacity, versatility, commitments, and outcomes in the event of an infringement. Fulfilling SLA is vital and a difficult issue. In this paper, diverse systems and strategies proposed by the various creators for givingthe nature of administration and keeping up SLA are discussed. We propose a cloud service planning model that is alluded to as the Task Scheduling System (TSS). In the client module, the interaction time of each task is as per an overall distribution. In the task scheduling module, we take a weighted amount of makes skillet and stream time as the target capacity and utilize a fluffy-based Genetic Algorithm (GA) to take care of the issue of cloud task planning. Simulation results show that the convergence speed and output performance of fuzzy-based Ant Colony Optimization (F-ACO) are optimal.</em></p>Jyoti *Hemlata *Gyanender Kumar2021-06-012021-06-018AI Therapist using CBT Module and DNN Algorithm
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2704
<div class="Section1"><p><em>Based on the WHO report, there are various kinds of mental disorders like depression, anxiety disorders, eating disorders, and trauma-related disorders [. Despite having access to competent health care and social services, those suffering from mental illnesses are unable to seek treatment due to the stigma associated with the disease. As a result, we are creating an AI therapist chatbot that aims to be as effective as a human therapist. The first line of support for mental health patients yet provide privacy and anonymity. The solution proposes the use of CBT to analyze the user’s frame of mind. The DNN is used to pre-set weighted words from the user’s response to questions. Our program detects how the user is feeling. He may be feeling depressed, feared, angry, etc. A recommendation system can then be used to demonstrate content based on his current emotions. For instance, the program shows motivating thoughts, blogs, etc. if the user feels depressed. The result will provide guidance to the user.</em></p></div><p><strong> </strong></p>Amey Sirish PoteRohan Pandurang LokhandeSuruchi Narendra RevandkarAbhijeet More2021-06-012021-06-018Pandemic as an Opportunity – A Study on Companies Survival by Innovation
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2705
<p><em>It is said that every problem comes with an opportunity and it is said rightly as this Pandemic also arrives with Bucket full of opportunities. The opportunity to innovate, to create, to grow, to learn, to move forward with calculated risk. In this paper I have analyzed and tried to look for those companies who have done innovations by tapping in the opportunities during this pandemic times and because of it have seen the growth in the last quarters during and after lockdown time period. The Objectives of this Study is to 1). Review about the companies and startups who have found the new normal of doing the work. 2). Acknowledging about the innovations done by various companies during this and after this lockdown 3).Analysis about the growth of various companies in the last quarters. 4).To know about different sectors who has changed or had planned to be change in their process of doing work during this pandemic time.</em></p>Somya Khandelwal2021-05-252021-05-258A Review of Techniques for Securing Big Data Integrated with Cloud
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2488
<p> </p><p align="center"><strong><em>Abstract</em></strong></p><p><em>In the era of big data and cloud computing, which are the most sophisticated technologies individually with enormous potential</em><em>; these technologies when integrated can extend themselves seamlessly to solve complicated problems of day-today life. We generate enormous amount of precious data every second related to personal, business to professional field through our digital lives. Big data perfectly fits in this scenario to help us to store, process and manage this massive data. Cloud computing on the other hand is a technology with its characteristic features like on-demand service, flexibility, rapid scalability, metered usage etc. are very useful in storing and managing big data by catering the needs of broad spectrum of users ranging from individuals, medium scale enterprises to large scale organizations. Cloud computing is bundled with benefits like low cost implementation, globally advanced in technological services with zero maintenance overhead for users. With these alluring benefits there are some issues which we need to focus and fix, like security and privacy of the big data stored and accessed in cloud in order to create foolproof secure solutions. In this study we focus on surveying recently proposed techniques for securing big data over the cloud by iterating through techniques in order to find their intricacies.</em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>Big data, cloud computing, security, privacy, encryption</em></p>Chetan .A. KhadarMohammed Rafi2021-01-082021-01-088A Survey Paper on Big Data and Industry
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2489
<p align="center"><strong><em>Abstract</em></strong></p><p><em>Recent advances in new generation information technologies, cutting-edge digital technologies are being harnessed to optimize and automate production, including upstream supply-chain processes. The ultimate goal of industry is that always-connected sensors embedded in machines, components, and works-in-progress will transmit real-time data to networked IT systems. These, in turn, apply machine learning and artificial intelligence algorithms to analyse and gain insights from this big data and adjust processes automatically as needed. In other words, the pain point is not generating and collecting data but being able to effectively extract value from it.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> Big data, Industry 4.0, data mining, social network analysis, Machine Learning; Artificial Intelligence</em></p>Chaitra K. G.Mohammed Rafi2021-01-082021-01-088Hadoop Yarn Big Data: Review Paper
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2484
<p align="center"><strong><em>Abstract</em></strong></p><p><em>YARN</em><em>, yet another resource negotiator is a large-scale, distributed operating system for big data applications and software rewrite that is capable of decoupling MapReduce's resource management and scheduling capabilities from the data processing component. </em><em>In this study we have briefly described the evolution of YARN for big data analysis from the year 2017 to the recent times.</em></p><p><strong><em> </em></strong></p><strong><em>Keywords: </em></strong><em>Apache HADOOP, HDFS, MapReduce, Apache Samza, Apache Flink</em>Kavyashree T.Mohammed RafiNaveen Kumar2021-01-082021-01-088Business Intelligence and Its Challenges
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2598
<p align="center"><strong><em>Abstract</em></strong></p><p><em>Big data</em><em> is a field that treats ways to analyze, systematically extract information from, or otherwise deal with data sets that are too large or complex to be dealt with by traditional data-processing application software. Huge amount of data produced in business can be processed to get useful information using B</em><em>usiness intelligence (BI).</em><strong><em> </em></strong><em>Business intelligence</em><em> comprises the strategies and technologies used by enterprises for the data analysis of </em><em>business information. BI technologies provide historical, current and predictive views of business operations. Mobile business intelligence (MBI) is the ability to access BI-related data such as Key Performance Indicators (KPIs), business metrics, and dashboards on mobile devices. The MBI provides users with necessary information and content, regardless of their location and time, in order to gain business insights through information analysis using applications optimized for mobile devices. Although in recent years, the business intelligence and analytics has gained an increasing amount of interest among researchers and practitioners, there is a little academic literature available on MBI. This survey is intended to study the adoption of Business Intelligence (BI) with special emphasis on mobile business intelligence in various fields during past 10 years and highlights the challenges faced by users in its implementation. The study also emphasized on relationship between MBI and big data analytics, application of MBI, and difficulties in using the MBI tools.</em></p><p><em> </em></p><p><strong><em>Keywords</em></strong><em>: Mobile business intelligence, business intelligence, big data, analytic</em></p>Umesha D. KFazlulla K.Mohammed Rafi2021-01-082021-01-088The Review on Big Data Sharding and Replication
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2486
<p align="center"><strong><em>Abstract</em></strong></p><p><em>Sharding is a partitioning pattern that places each partition in potentially separate servers; potentially all over the world. A shard is managed by a single server. Data replication is the process of storing data in more than one site or node. It is useful in improving the availability of data. It is simply copying data from a database from one server to another server so that all the users can share the same data without any inconsistency. In this survey we briefly describe the evolution of sharding and replication techniques from the year 2018 to the recent times.</em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>Sharding, replication, </em><em>master-slave replication, peer-to-peer replication </em><em></em></p>Raksha K. R.Mohammed RafiM. Ghouse2021-01-082021-01-088Algebraic Cloud Computing and its Applications
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2510
<p>An algebraic cloud computing technique is proposed in this paper. From plane to space is the key transformation studied under the context of computational applications. This paper presents a new idea of cloud computing based on relative concept of group theory. Its algebraic properties are applied to design an e-diagnosis system. This e-administration system performs efficiently and securely than classical cloud computing system. The algebraic analysis is presented in this paper for advancement of the existed system based on classical cloud computing.</p><p>Keywords: Cloud Computing, Group Theory, E-Administration, Computing System, E-Diagnosis System.</p><p>Cite this Article: Sunil Kumar Kashyap, Manju Kushwaha. Algebraic Cloud Computing and its Applications. Journal of Advanced Database Management & Systems. 2020; 7(2): 24–30p.</p>Sunil Kumar KashyapManju Kushwaha2020-08-112020-08-118Fast Data Analysis Technique by Compact Clustering
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2512
<p>In this paper, a new clustering theory is established under the context to analyze the data. Data analysis is a challenging task. The proposed method transforms it into easier. The classical clustering method defines over the probability to design the proposed algorithm in this paper. The data structure sets as the dynamic structure for mapping the optimized and compact analysis.</p><p>Keywords: Data, Probability, Cluster, Data, Algorithm.</p><p>Cite this Article: Sunil Kumar Kashyap, Swati Jain. Fast Data Analysis Technique by Compact Clustering. Journal of Advanced Database Management & Systems. 2020; 7(2): 19–23p.</p>Sunil Kumar KashyapSwati Jain2020-08-112020-08-118Relative Cloud Computing and its Algebraic Application in e-Diagnosis Algorithm
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2513
<p>The theory of cloud computing is applied to develop an e-diagnosis system in this paper. The set of real numbers and the set of patients characterized by the diseases are studied by the isomorphism. This is analyzed by the block matrix. The mapping is defined by the discrete time set. The output time is classified by the cloud space. The patient information and its representation by the block matrix over the cloud space established a new cloud set. The element of this set and its isomorphic correspondence with the time set generates the new e-diagnosis system.</p><p>Keywords: Cloud Computing, E-Diagnosis System, Isomorphism, Block Matrix, Set.</p><p>Cite this Article: Sunil Kumar Kashyap, Manju Kushwaha. Relative Cloud Computing and its Algebraic Application in e-Diagnosis Algorithm. Journal of Advanced Database Management & Systems. 2020; 7(2): 15–18p.</p>Sunil Kumar KashyapManju Kushwaha2020-08-112020-08-118Compact Method for Analyzing Big Data
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2514
<p>Big Data Analysis (BDA) method is proposed in this paper. A compact method (K-Means Cluster, Generalised K-Means Cluster, C-Means, Fuzzy Means, Fuzzy Numbers, Fuzzy Set, Fuzzy Logic, Neural Network, Genetic Algorithm) based big data analysis is presented in this paper. There are four models are presented as, probabilistic model, possibility model, fuzzy model and variance model. A compact algorithm is illustrated also in this paper.</p><p>Keywords: Big Data, K-Means Cluster, Generalised K-Means Cluster, C-Means, Fuzzy Means, Fuzzy Numbers, Fuzzy Set, Fuzzy Logic, Neural Network, Genetic Algorithm, Compact Algorithm.</p><p>Cite this Article: Swati Jain, Vikas Kumar Jain, Sunil Kumar Kashyap. Compact Method for Analyzing Big Data. Journal of Advanced Database Management & Systems. 2020; 7(2): 5–14p.</p>Swati JainVikas Kumar JainSunil Kumar Kashyap2020-08-112020-08-118Cloud Function and Its Applications
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2511
<p>To optimize the computing is the key objective of this paper. The abstractness of cloud computing is studied under the context to present the result into applications. The probabilistic application is presented in this paper. The new cloud domain is proposed over the discrete structure of the set by the probabilistic distribution. The stochastic process, distortion and permutation based methodology are applied to propose this new cloud model.</p><p>Keywords: Cloud Computing, Stochastic Process, Probabilistic Distribution, Distortion, Permutation.</p><p>Cite this Article: Sunil Kumar Kashyap, Manju Kushwaha. Cloud Function and Its Applications. Journal of Advanced Database Management & Systems. 2020; 7(2): 1–4p.</p>Sunil Kumar KashyapManju Kushwaha2020-08-112020-08-118Unique Approach towards Data Certainty for Data Hiding
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2427
<p>With an ongoing connection to web and advancement in digital communication, data redemption has been the major concern of this contemporary society. To some extent cryptography combined with steganography serves one such purpose. Cryptography works on various aspects of information security such as data confidentiality, data integrity, authentication and non-repudiation. This technique encrypts the message, but do not hide the message whereas steganography even conceals the existence of the message. Steganography can be used to hide almost any type of digital content, including text, image, video or audio content. Therefore, in this paper, we propose the Unique Approach Towards Data Certainty (UATDC) model in which encryption and decryption of the message in *.doc,*.rtf, email/message body format takes place. Text steganography offers a benefit of minimum manipulation in the original data. Also, Text Steganography avoids storing data at multiple locations.</p><p>Keywords: Steganography, data certainty, encryption, data hiding, UATDC</p><p>Cite this Article Kritika Jain, Puneet Aggarwal. Unique Approach towards Data Certainty for Data Hiding. Journal of Advanced Database Management & Systems. 2020; 7(1): 27–31p.</p>Kritika JainPuneet Aggarwal2020-05-042020-05-048Recent Strategies for Bug Triaging Techniques
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2386
<p>Nowadays, there are many emerging software companies. As they develop software, they have to deal with large number of software bugs. It is well expensive and unavoidable too so these bugs are needed to be fixed. The bug triaging process is nothing but to assign effective and proper developer for bug fixing. There are various techniques are used for this process earlier. Human triaging was not a time worth process and was not successful in the case of proper assignment of developers. There are many techniques developed those aims to assign correct developers for bug triage which will save cost as well as time.</p><p>Keywords: Software repositories, bug repositories, bug data reduction, feature selection, instance selection, bug triage</p><p>Cite this Article Pranoti Shende, Vaishali Bhujade, Prashant Shende. Recent Strategies for Bug Triaging Techniques. Journal of Advanced Database Management & Systems. 2020; 7(1): 23–26p.</p>Pranoti Prashant ShendeVaishali BhujadePrashant Shende2020-05-042020-05-048Data Hiding Techniques Using Steganography Algorithms
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2426
<p>Steganography is the method of hiding information or data in a very peculiar manner using cover objects and various techniques. In the last two decades, the adaptability of the digital communication and information sharing arouses the need for data susceptibility and thus steganography comes into play. Derived from Greek word “steganos” meaning hidden, comes steganography or “concealed writing”. It focuses on creating a safe and secure communication link between the parties. It aims at hiding the existence of the message as opposed to its complement cryptography, which deals with making the message illegible through encryption. It is very useful in various fields and might be a crucial key in countries where public use of cryptography is prohibited. Here, we brush upon current techniques and ideas that are used along with the algorithms and future scope of study in this area. This review paper touches each point primarily with the intention of creating awareness. The main objective of this review paper is to briefly understand the present methods used in steganography and to compare them with the old cryptography methods and then to wonder of an approach that could learn from the mistakes of cryptography and work on the present methods in such a manner that would lead towards the growth of the field.</p><p>Keywords: Steganography, data hiding technique, algorithms, cryptography, communication</p><p>Cite this Article Ashi Tyagi, Rahul Veer Singh, Srishti Sharma. Data Hiding Techniques using Steganography Algorithms. Journal of Advanced Database Management & Systems. 2020; 7(1): 12–14p.</p>Ashi TyagiRahul Veer SinghSrishti Sharma2020-05-042020-05-048Fraudulent Data Detection of Credit Card by Using Random Forest Method to Calculate ROC and Confusion Matrix
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2428
<p>Credit card fraud defaults in trillions of dollars online merchants. Researchers have more and more complex methods of detecting fraud using algorithms for machine learning, but there are rare reports of hands-on implementations. We describe the implementation of an extortion discovery framework in a huge e-tail retailer. The paper looks at the combination of manual and robotized classification and offers experiences into the whole handle of advancement. The paper can thus support the development and implementation of data mining tools to detect fraud or similar problems. The project helped improve their manual review process by providing not only an automatic system, but also an overview of fraud analysts, leading to overall superior performance. This project uses the Pit tool to create the required GUI. The Peruvian tool is used for automatic coding generation. This project consists of three modules: the frontend module is used to create the necessary GUI screens for the project. Payments are continuously monitored by the monitoring module.</p><p>Keywords: CVV, time distribution, information processing, arbitrary forests, GUI (graphical user interface)</p><p>Cite this Article A. Viswanathan, Sara Chandana, S. Kavya, T. Siddharth Reddy. Fraudulent Data Detection of Credit Card by using Random Forest Method to Calculate ROC and Confusion Matrix. Journal of Advanced Database Management & Systems. 2020; 7(1): 15–22p.</p>A. ViswanathanSara ChandanaS. KavyaT. Siddharth Reddy2020-05-042020-05-048A Review on Bus Protocols and Conversion/Translator between Different Protocols
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2408
<p>A computer consists of different components/modules and different communication protocols are used among them. These protocols are needed to achieve the interoperability between two devices/modules. Different protocols cannot communicate directly, there is a need for conversion. A protocol converters block is needed. These compact protocol converters create low power, low voltage connection as well as smaller chip area, making it easy to add multiple devices or components. This paper gives a brief description of various bus protocols such as serial peripheral interface (SPI), inter-integrated circuit (I2C), advanced microcontroller bus architecture (AMBA), universal serial bus (USB), peripheral component interconnect express (PCIe) and ethernet. A review of some protocol converter/translator are done with a view to explore their usability.</p><p>Keywords: I2C, SPI, USB, AMBA, PCIe, ethernet, bus protocols</p><p>Cite this Article: Naorem Akshay Kumar, Shuma Adhikari, Loitongbam Surajkumar Singh. A Review on Bus Protocols and Conversion/Translator between Different Protocols. Journal of Advanced Database Management & Systems. 2020; 7(1): 1–11p.</p>Naorem Akshay KumarShuma AdhikariLoitongbam Surajkumar Singh2020-05-022020-05-028An Empirical Study on Evaluating Graph Based Clustering for HD Data Using Attribute Selection
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=105
<p>An attribute subset selection can be showed as a process of identifying and eliminating or removing a number of irrelevant and surplus attributes (features) because irrelevant attributes do not give predictive accuracy and the surplus attributes provide the information that is already present in the other attributes. Attribute selection involves identifying a subset of the most useful attributes that produces the similar results as the final set of results. An attribute (feature) selection algorithm may be evaluated from two points of view. First one concerns the time required to get the subset of attributes and the second one concerns quality of the subset of attributes. Based on these criteria, graph-based clustering for attribute selection algorithm, GRACE is proposed. This algorithm works in two steps. In the first step, attributes are divided into clusters by using graph-theoretic clustering methods. In the second step, most similar attributes that are strongly related to the object classes are selected from each cluster from a subset of attributes. Attributes in different clusters are relatively independent. To ensure the efficiency of this algorithm, the authors implemented the minimum spanning tree clustering method.</p><p><strong>Keywords</strong>: Graph-based clustering, filter method, attribute subset selection</p>V. HemapriyaK.P.N.V. Satya SreeK.V. Narasimha Reddy2020-01-302020-01-308The Survey on the Methods of Data Analysis and its Effectiveness under the Perspective of Student’s Academic Performance: From Classical to Current
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2228
<p>Abstract: This study presents a survey on the methods of data analysis applied for studying the academic performance of the students. Those researches are surveyed in this study whose results carried with the following objectives: to predict the data about the next event, to set the plan on the next experiment, to design the system of the next evaluation, to decide the trend of the further draft, to establish the generalize rule for the new training and similar type of prediction for any new examination. Student’s academic performances-based data and its analytical methods are selected as the key domain of this survey.</p><p>Keywords: Data analysis, student’s academic performance, big data</p><p>Cite this Article: Sunil Kumar Kashyap, Swati Jain, Vikas Kumar Jain. The Survey on the Methods of Data Analysis and its Effectiveness under the Perspective of Student’s Academic Performance: From Classical to Current. Journal of Advanced Database Management & Systems. 2019; 6(3): 21–26p.</p>Sunil Kumar KashyapSwati JainVikas Kumar Jain2019-12-302019-12-308Scheduling Algorithms in Cloud Computing: A Review
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2227
<p>Abstract: Cloud computing is one of the emanate computer technologies in information technology that provide shared resources like databases, storage, servers, and software to the users according to need on rental basis, which results in no initial setup cost. Scheduling is one of the critical aspects that influence the system performance. Scheduling algorithm is said to be efficient if it minimizes the completion time of the task, with limited resource usage and is also cost effective. There is hardly any algorithm that provides optimal results in less time. In this study, various scheduling algorithms like FCFS (first come first serve), genetic algorithm, particle swarm optimization, ant colony optimization, etc. are analyzed and discussed. Comparative study is done among these algorithms based on different factors like execution time, cost, makespan, etc.</p><p>Keywords: Cloud computing, scheduling, ant colony optimization, genetic algorithm, particle swarm optimization</p><p>Cite this Article: Paridhi Naithani, Anu. Scheduling Algorithms in Cloud Computing: A Review. Journal of Advanced Database Management & Systems. 2019; 6(3): 16–20p.</p>Paridhi NaithaniAnu .2019-12-302019-12-308A Research Paper on Web Development Using HTML5 and CSS3
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2175
<p align="center"><strong><em>Abstract</em></strong></p><p><em>The future of web development is the HTML and CSS language. HTML5 is a new standard in every place for web users. CSS3 is a modern standard, which exemplifies the record in HTML5 language.<strong> </strong>In this paper, we are providing knowledge about the HTML5 and CSS3 languages. We also discuss the strategy and approach for web development. This paper tells about the various type of technology used in web development and understanding the</em><em> methodology to describe the objectives, scope, architect and applications with the brief modification analysis of front-end web development.</em></p><p><strong><em>Keywords</em></strong><em>: CSS, HTML5, web modification, web technology</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Mohit Bajpai, Ayush Jain, Chandan Kumar, Bhawani Shankar Purohit. A Research Paper on Web Development Using HTML5 and CSS3. Journal of Advanced Database Management & Systems. 2019; 6(3): 1–4p. <strong></strong></em></p><p><em><br /></em></p>Mohit BajpaiAyush JainChandan KumarBhawani Shankar Purohit2019-11-142019-11-148Review on Cloud Trust Protocol
https://computers.stmjournals.com/index.php?journal=JoADMS&page=article&op=view&path%5B%5D=2226
<p align="center"><strong><em>Abstract</em></strong><strong><em></em></strong></p><p><em>Cloud computing is one of the creative spaces available in the market. There are a couple of security issues that occur, while in the meantime, clouds are being used in the organizations. In this document, we address the issue of trust in cloud registration. We propose a new structure for cloud security in the on-board system in which various sources of information relating to trust are used and special trust instruments are added. This union uses the latest trusted cloud protocol (CTP). Trust information is presented and organized to the extent that feelings are formalized in a passionate reasoning method.<em></em></em></p><p><strong><em>Keywords: </em></strong><em>Cloud computing, CTP (cloud trust protocol), trust,</em> <em>trust and reputation (TR)</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Rahul Patni. Review on Cloud Trust Protocol. Journal of Advanced Database Management & Systems. 2019; 6(3): 12–15p.</em> <strong></strong></p><p><em><br /></em></p><p> </p>Rahul Patni2019-11-142019-11-148