You are on page 1of 32

Lecture Notes on Data Engineering

and Communications Technologies 31

A. Pasumpon Pandian
Tomonobu Senjyu
Syed Mohammed Shamsul Islam
Haoxiang Wang Editors

Proceeding of the
International Conference
on Computer Networks,
Big Data and IoT
(ICCBI - 2018)
Lecture Notes on Data Engineering
and Communications Technologies

Volume 31

Series Editor
Fatos Xhafa, Technical University of Catalonia, Barcelona, Spain

pasumponpandian32@gmail.com
The aim of the book series is to present cutting edge engineering approaches to data
technologies and communications. It will publish latest advances on the engineering
task of building and deploying distributed, scalable and reliable data infrastructures
and communication systems.
The series will have a prominent applied focus on data technologies and
communications with aim to promote the bridging from fundamental research on
data science and networking to data engineering and communications that lead to
industry products, business knowledge and standardisation.

** Indexing: The books of this series are submitted to ISI Proceedings,


MetaPress, Springerlink and DBLP **

More information about this series at http://www.springer.com/series/15362

pasumponpandian32@gmail.com
A. Pasumpon Pandian Tomonobu Senjyu
• •

Syed Mohammed Shamsul Islam •

Haoxiang Wang
Editors

Proceeding of the
International Conference
on Computer Networks,
Big Data and IoT
(ICCBI - 2018)

123
pasumponpandian32@gmail.com
Editors
A. Pasumpon Pandian Tomonobu Senjyu
Department of CSE Department of Engineering
Vaigai College of Engineering University of the Ryukyus
Melur, India Okinawa, Japan

Syed Mohammed Shamsul Islam Haoxiang Wang


Edith Cowan University (ECU) Department of Electrical and Computer
Joondalup, WA, Australia Engineering
Cornell University
Ithaca, NY, USA

ISSN 2367-4512 ISSN 2367-4520 (electronic)


Lecture Notes on Data Engineering and Communications Technologies
ISBN 978-3-030-24642-6 ISBN 978-3-030-24643-3 (eBook)
https://doi.org/10.1007/978-3-030-24643-3
© Springer Nature Switzerland AG 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

pasumponpandian32@gmail.com
We are honored to dedicate the proceedings
of ICCBI 2018 to all the participants and
editors of ICCBI 2018.

pasumponpandian32@gmail.com
Foreword

It is with deep satisfaction that I write this Foreword to the proceedings of the
ICCBI 2018 held in Madurai, Tamil Nadu, December 19–20, 2018.
This conference was bringing together researchers, academics, and professionals
from all over the world and experts in computer networks, big data, and Internet of
things.
This conference particularly encouraged the interaction of research students and
developing academics with the more established academic community in an
informal setting to present and to discuss new and current work. The papers con-
tributed the most recent scientific knowledge known in the field of computer net-
works, big data, and Internet of things. Their contributions helped to make the
conference as outstanding as it has been. The local organizing committee members
and their helpers put much effort into ensuring the success of the day-to-day
operation of the meeting.
We hope that this program will further stimulate research in data communication
and computer networks, Internet of things, wireless communication, big data, and
cloud computing and also provide practitioners with better techniques, algorithms,
and tools for deployment. We feel honored and privileged to serve the best recent
developments to you through this exciting program.
We thank all authors and participants for their contributions.

A. Pasumpon Pandian

vii

pasumponpandian32@gmail.com
Preface

This conference proceedings volume contains the written versions of most of the
contributions presented during the conference of ICCBI 2018. The conference
provided a setting for discussing recent developments in a wide variety of topics
including computer networks, big data, and Internet of things. The conference has
been a good opportunity for participants coming from various destinations to
present and discuss topics in their respective research areas.
ICCBI 2018 tends to collect the latest research results and applications on
computer networks, big data, and Internet of things. It includes a selection of 126
papers from 352 papers submitted to the conference from universities and industries
all over the world. All of the accepted papers were subjected to strict
peer-reviewing by 2–4 expert referees. The papers have been selected for this
volume because of quality and the relevance to the conference.
ICCBI 2018 would like to express our sincere appreciation to all authors for their
contributions to this book. We would like to extend our thanks to all the referees for
their constructive comments on all papers; especially, we would like to thank the
organizing committee for their hard work. Finally, we would like to thank the
Springer publications for producing this volume.

A. Pasumpon Pandian

ix

pasumponpandian32@gmail.com
Acknowledgments

ICCBI 2018 would like to acknowledge the excellent work of our conference
organizing committee and keynote speakers for their presentation on December
19–20, 2018. The organizers also wish to acknowledge publicly the valuable ser-
vices provided by the reviewers.
On behalf of the editors, organizers, authors, and readers of this conference, we
wish to thank the keynote speakers and the reviewers for their time, hard work,
and dedication to this conference. The organizers wish to acknowledge
Dr. S. Sugumaran, Dr. R. Thiru Senthuran, Mrs. R. Indra, Mrs. K. Sujatha,
Mrs. S. Senthilvadivoo, Mrs. L. Kirsnaveni, and Dr. K. Maniyasundar for the
discussion, suggestion, and cooperation to organize the keynote speakers of this
conference. The organizers also wish to acknowledge the speakers and participants
who attend this conference. Many thanks are given for all persons who help and
support this conference. ICCBI 2018 would like to acknowledge the contribution
made to the organization by many volunteers. Members contribute their time,
energy, and knowledge at local, regional, and international levels.
We also thank all the chairpersons and conference committee members for their
support.

xi

pasumponpandian32@gmail.com
Contents

A Review: Various Steering Conventions in MANET . . . . . . . . . . . . . . 1


Vaishali V. Sarbhukan and Lata Ragha
End to End Network Connectivity Detection Using SNMP
and CAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
R. Abhishek and N. Shivaprasad
Multimodal Web Content Mining to Filter Non-learning Sites
Using NLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Sangita S. Modi and Sudhir B. Jagtap
Towards Converging Fully Homomorphic Batch Encryption
with Data Integrity Assurance in Cloud Setting . . . . . . . . . . . . . . . . . . . 31
S. Hariharasitaraman and S. P. Balakannan
Network Security: Approach Based on Network Traffic Prediction . . . . 41
Sheetal Thakare, Anshuman Pund, and M. A. Pund
Use of Evolutionary Algorithm in Regression Test Case Prioritization:
A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Priyanka Paygude and Shashank D. Joshi
Efficiency Improvement in Code Emulation by Soft
Computing Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
S. Prayla Shyry, M. Saranya, and M. Mahithaa Sree
Comparative Evaluation of Various Swarm Intelligence Techniques
Designed for Routing in Wireless Sensor Networks . . . . . . . . . . . . . . . . 76
N. Shashank, H. L. Gururaj, and S. P. Pavan Kumar
Spatially Correlated Cluster in a Dense Wireless Sensor Network:
A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Utkarsha S. Pacharaney and Rajiv Kumar Gupta

xiii

pasumponpandian32@gmail.com
xiv Contents

Comprehensive Survey on Detection of Living or Dead Humans


and Animals Using Different Approaches . . . . . . . . . . . . . . . . . . . . . . . . 94
C. A. Pooja, P. Vamshika, Rithika B. Jain, Vishal K. Jain,
and H. T. Chethana
A Study on Rough Indices in Information Systems with Fuzzy or
Intuitionistic Fuzzy Decision Attributes-Two Thresholds Approach . . . . 101
B. Venkataramana, L. Padmasree, M. Srinivasa Rao, and G. Ganesan
Proactive Decision Making Based IoT Framework for an Oil Pipeline
Transportation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
E. B. Priyanka, C. Maheswari, and S. Thangavel
Analysis of Mirai Botnet Malware Issues and Its Prediction Methods
in Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
K. Vengatesan, Abhishek Kumar, M. Parthibhan, Achintya Singhal,
and R. Rajesh
Contagious Diseases Prediction in Healthcare Over Big Data . . . . . . . . 127
Nkundimana Joel Gakwaya and S. Manju Priya
Securing Data with Selective Encryption Based DAC Scheme
for MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
J. Nithyapriya, R. Anandha Jothi, and V. Palanisamy
Railway Surface Crack Detection System Based on Intensity Loss
of UV Radiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
S. Aarthi, Aravind Mohan, P. Karthik, and Anurag Thakur
Urban IoT Implementation for Smart Cities . . . . . . . . . . . . . . . . . . . . . 147
Aparna Menon and Rejo Mathew
Review of Cloud-Based Natural Language Processing Services
and Tools for Chatbots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Ayan Ray and Rejo Mathew
Weighted Trilateration and Centroid Combined Indoor Localization
in Wifi Based Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
T. Rajasundari, A. Balaji Ganesh, A. HariPrakash, V. Ramji,
and A. Lakshmi Sangeetha
Comparison of Various Wearable Activity Trackers . . . . . . . . . . . . . . . 173
Tanvi Nikam and Rejo Mathew
Review on Security Problems of Bitcoin . . . . . . . . . . . . . . . . . . . . . . . . . 180
Parmeet Singh Pannu and Rejo Mathew
Review of Security Systems in Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . 185
Kritika Ramawat and Rejo Mathew

pasumponpandian32@gmail.com
Contents xv

Machine Learning Algorithms in Stock Market Prediction . . . . . . . . . . 192


Jayesh Potdar and Rejo Mathew
Review of Data Protection Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Divyang Kaushik and Rejo Mathew
Review of Blind Navigation Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Anubha Mishra and Rejo Mathew
Analyzing DFA Attack on AES-192 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Tadepalli Sarada Kiranmayee, S. P. Maniraj, Aakanksha Thakur,
M. Bhagyashree, and Richa Gupta
A Comparative Study on Data Stream Clustering Algorithms . . . . . . . . 219
Twinkle Keshvani and Madhu Shukla
Biometric Voting System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Abhilash Akula, Jeshwanth Ega, Kalyan Thota, and Gowtham
Implement Improved Intrusion Detection System Using State
Preserving Extreme Learning Machine (SPELM) . . . . . . . . . . . . . . . . . 236
Kunal Singh and K. James Mathai
Address Resolution Protocol Based Attacks:
Prevention and Detection Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
D. Francis Xavier Christopher and C. Divya
Enabling Technologies for Internet of Vehicles . . . . . . . . . . . . . . . . . . . 257
Shridevi Jeevan Kamble and Manjunath R. Kounte
Video Based Silent Speech Recognition . . . . . . . . . . . . . . . . . . . . . . . . . 269
V. Sangeetha, Judith Justin, and A. Mahalakshmi
In Search of the Future Technologies: Fusion of Machine Learning,
Fog and Edge Computing in the Internet of Things . . . . . . . . . . . . . . . . 278
Soumyalatha Naveen and Manjunath R. Kounte
Recognition of Characters in a Securely Transmitted
Medical Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
S. Manisha and T. Sree Sharmila
Educational Data Mining Survey for Predicting Student’s
Academic Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Sharayu N. Bonde and D. K. Kirange
RFID Based Patient Record Management Information System
Using LabVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
A. Mahalakshmi and R. Vanithamani
Client-Controlled HECC-as-a-Service (HaaS) . . . . . . . . . . . . . . . . . . . . . 312
T. Devi, N. Deepa, and K. Jaisharma

pasumponpandian32@gmail.com
xvi Contents

A Non-Adjacent Form (NAF) Based ECC for Scalar Multiplication


that Assure Computation Reduction on Outsourcing . . . . . . . . . . . . . . . 319
R. Menaka and R. S. D. Wahida Banu
Secure and Energy Efficient Based Healthcare Data Transmission
Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
R. Sivaranjani and A. V. Senthil Kumar
IOT Based Demand Side Management of a Micro-grid . . . . . . . . . . . . . 334
Leo Raju, S. Sangeetha, and V. Balaji
Real Time Twitter Sentiment Analysis for Product Reviews Using
Naive Bayes Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Khushboo Gajbhiye and Neetesh Gupta
A Dynamic Security Model for Visual Cryptography
and Digital Watermarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
K. Chitra and V. Prasanna Venkatesan
Systematic Approach Towards Sentiment Analysis
in Online Review’s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Hemantkumar B. Jadhav and Amitkumar B. Jadhav
A Generic Model for Scheduling IoT Jobs at the Edge . . . . . . . . . . . . . 370
S. S. Boomiga and V. Prasanna Venkatesan
A Survey on Different Methodologies Involved in Falling,
Fire and Smoke Detection Using Image Processing . . . . . . . . . . . . . . . . 378
P. Niveditha, S. Manasa, C. A. Nikhitha, Hitesh R. Gowda, and M. Natesh
A Study of Deep Learning: Architecture, Algorithm
and Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
S. T. Shenbagavalli and D. Shanthi
Advanced Access Control Mechanism for Cloud Based E-wallet . . . . . . 392
N. Ch. Ravi, Naresh Babu Muppalaneni, R. Sridevi, V. Kamakshi Prasad,
A. Govardhan, and Joshi Padma
Novel Pentagonal Shape Meander Fractal Monopole Antenna
for UWB Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Sheetal Bukkawar and Vasif Ahmed
Gas Leakage Detection Device [GLDD] Using IoT with SMS Alert . . . . 409
Leena, Monisha, M. Dakshayini, and P. Jayarekha
Detection of Primary Glaucoma in Humans Using Simple Linear
Iterative Clustering (SLIC) Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 417
G. Pavithra, T. C. Manjunath, and Dharmanna Lamani

pasumponpandian32@gmail.com
Contents xvii

Application of Stream Cipher and Hash Function


in Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Aaditya Jain and Neha Mangal
Interactive Video Gaming with Internet of Things . . . . . . . . . . . . . . . . . 436
Yellamma Pachipala, C. Madhav Bharadwaj, Pakalapati Narendra,
G. Leela Sree, and K. Praveen Reddy
Big Data Challenges and Issues: A Review . . . . . . . . . . . . . . . . . . . . . . 446
Akanksha Mathur and C. P. Gupta
Set Based Similarity Measure for User Based Collaborative Filtering
Recommendation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
K. V. Uma, M. Deepika, and Vairam Sujitha
An IOT Based Weather Monitoring System to Prevent and Alert
Cauvery Delta District of Tamilnadu, India . . . . . . . . . . . . . . . . . . . . . . 462
R. Murugan, R. Karthika devi, Anitha Juliette Albert,
and Deepak Kumar Nayak
Summarization of User Reviews on E-Commerce Websites
Using Hidden Markov Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
T. Pradeep, M. R. Sai Shibi, P. Manikandan, Misiriya Shahul Hameed,
and R. Arockia Xavier Annie
Multimedia Data Retrieval Using Data Mining Image Pixle
Comparison Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
D. Saravanan
Generative Adversarial Networks: A Survey of Techniques
and Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Mohammad Omar Khursheed, Danish Saeed, and Asad Mohammed Khan
Natural Language Interface for Relational Database . . . . . . . . . . . . . . . 499
Priyanka More, Bharti Kudale, and Pranali Deshmukh
Security Analysis on Remote User Authentication Methods . . . . . . . . . . 506
Mukesh Soni, Tejas Patel, and Anuj Jain
Human Tracking System Based on GPS and IOT
(Internet of Things) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
Sonam Priyanka, Sandip Dutta, and Soubhik Chakraborty
Review on Mechanisms to Ensure Confidentiality and Integrity
of the Data in Cloud Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
Niharika Srivastav and Rejo Mathew
Review: Cloud Task Scheduling and Load Balancing . . . . . . . . . . . . . . 529
N. Manikandan and A. Pravin

pasumponpandian32@gmail.com
xviii Contents

Classification of Encryption Algorithms Based on Ciphertext Using


Pattern Recognition Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
T. Kavitha, O. Rajitha, K. Thejaswi, and Naresh Babu Muppalaneni
Smart Garbage Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
G. Akshay, V. Shivakarthika, and M. Dakshayini
AI BOT: An Intelligent Personal Assistant . . . . . . . . . . . . . . . . . . . . . . . 552
A. Shanthini, Chirag Prasad Rao, and G. Vadivu
A Comprehensive Study on Data Management Solutions to Internet
of Things (IoT) Based Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
K. Revathi and A. Samydurai
Traffic Prediction Using Decision Tree Classifier in Hive Metastore . . . 571
D. Suvitha and M. Vijayalakshmi
Preventing Credit Card Fraud Using Dual Layer Security . . . . . . . . . . 579
Johnson Inbaraj, Mukeshkannan, Arun, and Pradeep Kandasamy
A Network Analysis of the Contributions of Kerala in the Field
of Mathematical Research Over the Last Three Decades . . . . . . . . . . . . 585
K. Reji Kumar and Shibu Manuel
SoC Based Acoustic Controlled Semi Autonomous Driving System . . . . 591
A. K. Veeraraghavan and S. Ranga Charan
Deep Incremental Learning for Big Data Stream Analytics . . . . . . . . . . 600
Suja A. Alex and J. Jesu Vedha Nayahi
Internet of Things Based Reliable Real-Time Disease Monitoring
of Poultry Farming Imagery Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . 615
S. Balachandar and R. Chinnaiyan
Impacts of Non-linear Effects in DWDM Based Fiber Optic
Communication System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
S. Esther Jenifa and K. Gokulakrishnan
Envisagation and Analysis of Mosquito Borne Fevers:
A Health Monitoring System by Envisagative Computing Using Big
Data Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
G. Sabarmathi and R. Chinnaiyan
Session Layer Security Enhancement Using Customized Protocol
and Strong Cryptographic Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Aaditya Jain and Sunil Nama
Simulation of VANET Using Pointer Base Replacement Mechanism . . . 645
Aaditya Jain and Adarsh Acharya

pasumponpandian32@gmail.com
Contents xix

Splicing Detection Technique for Images . . . . . . . . . . . . . . . . . . . . . . . . 654


Smita A. Nagtode and Shrutika A. Korde
An Optimized Data Classifier Model Based Diagnosis and Recurrence
Predictions of Gynecological Cancer for Clinical Decision
Support System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
B. Nithya and V. Ilango
Ant Colony Optimization Techniques – An Enhancement to Energy
Efficiency in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
Kalpna Guleria and Anil Kumar Verma
Overview on Cyber Security Threats Involved in the Implementation
of Smart Grid in Countries like India . . . . . . . . . . . . . . . . . . . . . . . . . . 678
Venkatesh Kumar and Prince Inbaraj
“IoT Based Medical Diagnosis Expert System Application” . . . . . . . . . . 685
D. Shanthi, A. Lalitha, and G. Lokeshwari
RGB Component Encryption of Video Using AES-256 Bit Key . . . . . . . 693
N. Geetha and K. Mahesh
A Generic Approach for Video Indexing . . . . . . . . . . . . . . . . . . . . . . . . 701
N. Gayathri and K. Mahesh
Energy Aware Routing Applications for Internet of Things . . . . . . . . . . 709
S. Santiago and L. Arockiam
Methods for Finding Brain Diseases Like Epilepsy and Alzheimers . . . . 715
Sasikumar Gurumurthy, Naresh Babu Muppalaneni,
and G. Chandra Sekhar
Ameliorated Domain Adaptation Using Adaptive
Classification Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
P. Kola Sujatha, S. Swetha, and V. Priyadharshini
Fault Tolerance Clustering of Scientific Workflow with Resource
Provisioning in Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Ponsy R. K. Sathiabhama, B. Pavithra, and J. Chandra Priya
IoT Based Air Quality Monitoring Systems - A Survey . . . . . . . . . . . . . 752
Sumi Neogi, Yugchhaya Galphat, Pritesh Narkar, Harsha Punjabi,
and Manohar Jethani
Cognitive Radio: An NN-PSO Approach Network Selection
and Fast Delivery Handover Route 5G LTE Network . . . . . . . . . . . . . . 759
Shipra Mishra and Swapnil Nema
Bluetooth Enabled Electronic Gloves for Hand Gesture Recognition . . . 771
R. Helen Jenefa and K. Gokulakrishnan

pasumponpandian32@gmail.com
xx Contents

Smart Trolley with Automatic Master Follower and Billing System . . . 778
R Dhianeswar, M Gowtham, and S Sumathi
Biometric Image Processing Recognition in Retinal Eye Using
Machine Learning Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792
J. P. Gururaj and T. A. Ashok Kumar
Energy Efficient Dynamic Slot Allocation of Map Reduce Tasks
for Big Data Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Radha Senthilkumar and S. Saranya
Blockchain Centered Homomorphic Encryption: A Secure Solution
for E-Balloting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
J. Chandra Priya, Ponsy R. K. Sathia Bhama, S. Swarnalaxmi,
A. Aisathul Safa, and I. Elakkiya
Hybrid HSW Based Zero Watermarking for Tampering Detection
of Text Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Fatek Saeed and Anurag Dixit
Secure Two-Phase Decentralized Data Deduplication with Assured
Deletion in Multi User Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Amolkumar N. Jadhav, Pravin B. More, Yogesh S. Lubal,
and Vishal S. Walunj
People, Technologies, and Organizations Interactions in a Social
Commerce Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Maruti Maurya and Milind Gayakwad
Plant Disease Detection System for Agricultural Applications
in Cloud Using SVM and PSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
P. Kumar and S. Raghavendran
Enhanced Data Security Architecture in Enterprise Networks . . . . . . . . 857
V Rashmi Shree, Zachariah C. F. Antony, and N. Jayapandian
Cloud Virtualization with Data Security:
Challenges and Opportunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
Joshua Johnson Abraham, Christy Sunny, Anlin Assisi,
and N. Jayapandian
Data Mining Approach for News Inspection on Social Media:
A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
Yugchhaya Galphat, Heena Banga, Isha Dalvi, Priya Jethmalani,
and Shraddha Talreja
Knowledge Discovery from Mental Health Data . . . . . . . . . . . . . . . . . . 881
Shahidul Islam Khan, Ariful Islam, Taiyeb Ibna Zahangir,
and Abu Sayed Md. Latiful Hoque

pasumponpandian32@gmail.com
Contents xxi

Factors Influencing the Scholars Acceptance of Course Recommender


System: A Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 889
Zameer Gulzar, L. Arun Raj, and A. Anny Leema
Secure User Authentication Using Honeywords . . . . . . . . . . . . . . . . . . . 896
S. Palaniappan, V. Parthipan, S. Stewart kirubakaran, and R. Johnson
A Secured Architecture for IoT Healthcare System . . . . . . . . . . . . . . . . 904
A. Vithya Vijayalakshmi and L. Arockiam
Topic Based Temporal Generative Short Text Clustering . . . . . . . . . . . 912
E. S. Smitha, S. Sendhilkumar, G. S. Mahalakshmi,
and S. Krithika Sanju
Review of Reinforcement Learning Techniques . . . . . . . . . . . . . . . . . . . 923
Mohit Malpani and Rejo Mathew
Machine Learning Algorithms for Diagnosis of Breast Cancer . . . . . . . 928
Richaa Negi and Rejo Mathew
Review of Data Security Frameworks for Secure Cloud Computing . . . 933
Kunaal Umrigar and Rejo Mathew
Review of Convolutional Neural Network in Video Classification . . . . . 942
Gaurav Talreja and Rejo Mathew
Smart Home Automation Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 948
Ritik Hinger and Rejo Mathew
A Survey on Attacks of Bitcoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953
Janhvi Joshi and Rejo Mathew
Enotes: Note Taking Tool for Online Learners . . . . . . . . . . . . . . . . . . . 960
R. Sujatha, R. Vijayalakshmi, Surya Santhosh Prabhakar,
and Prabhakar Krishnamoorthy
Biometric Passport Security Using Encrypted Biometric Data
Encoded in the HCC2D Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 968
Ziaul Haque Choudhury and M. Munir Ahamed Rabbani
Survey and Analysis of Pest Detection in Agricultural Field . . . . . . . . . 976
Yugchhaya Galphat, Vedika R. Patange, Pooja Talreja, and Somil Singh
Object Detection Using Convex Clustering – A Survey . . . . . . . . . . . . . 984
Madhura P. Divakara, Keerthi V. Trimal, Adithi Krishnan, and V. Karthik
Advanced Load Balancing Min-Min Algorithm in Grid Computing . . . 991
Menka Raushan, Annmary K. Sebastian, M. G. Apoorva,
and N. Jayapandian

pasumponpandian32@gmail.com
Educational Data Mining Survey
for Predicting Student’s
Academic Performance

Sharayu N. Bonde1(&) and D. K. Kirange2


1
KBCNMU University, Jalgaon, India
sharayu_bonde3@yahoo.in
2
JTMGCOE, Faizpur, India
dkirange@gmail.com

Abstract. In Era of 21st Century, Competition in Education Field is becoming


major topic to be discussed and should be focused by the teacher as student’s
career decision is depending on their major discipline they are studying. It is the
responsibility to judge the students and help them to develop their career path.
Data Mining is the most suitable technique to analyze the student’s performance.
Lots of work is already done in this direction, but still there are many parameters
to be considered. This paper presents the survey on Educational Data Mining.
Also presents the finding of that research on student performance. Provided
information is very helpful for the research scholar to get existing methods for
EDM.

Keywords: Educational data mining  Students profile 


Performance analysis  Affecting factors

1 Introduction

Like the business associations, Today’s Universities are working in an exceptionally


powerful and firmly aggressive condition. The instruction globalization prompts
increasingly and better open doors for understudies to get fantastic training at foun-
dations everywhere throughout the world. Colleges are stood up to with a serious
rivalry among one another, attempting to pull in the most proper understudies who will
effectively go through the college instructive process, and trying endeavours to adapt to
understudy maintenance. College administration is all the time compelled to take
rapidly imperative choices, and in this manner opportune and great data is required.
The most complex task as a teacher is to understand and analyze the student and
find out those with poor performance. Predicting the students’ performance will require
to analyze the students completely considering their surroundings [57]. If University
would be able to identify the factors affecting students’ performance and predict the
behaviour of a student, then appropriate actions could be taken by the department and
consequently this will be helpful to increase the quality of university by side. This
become the win-win situation for all the stake holders of university (Table 1).

© Springer Nature Switzerland AG 2020


A. P. Pandian et al. (Eds.): ICCBI 2018, LNDECT 31, pp. 293–302, 2020.
https://doi.org/10.1007/978-3-030-24643-3_35
pasumponpandian32@gmail.com
294 S. N. Bonde and D. K. Kirange

Table 1. Survey of educational data mining systems


Author Method used Findings
Saranya, Ayyappan Naïve Bayes Algorithm, Student performance were analyzed for
and Kumar [1] Linear Regression identifying probability of their job
placement, Academic performance,
Category of student as Elite, average or
poor
Sembiring [2] SSVM, Kernel K-means Using 10 fold CV dataset author
clustering identified CGPA of student using their
Area of interest, behavior, family
support, engagement time and believe
Waiyamai [3] Classification Author focused on the major (field)
suitable for a student for a successful
career by considering student’s profile
Archer [4] Shadow match pilot tool By matching Toper and individual
data categorized them as Involved-
Unaggressive, Involved-Assertive/
Aggressive, Uninvolved-Assertive/
Aggressive And Uninvolved-
Unaggressive
Kabakchieva [5] Classification By analyzing student’s personal, pre-
university and university data author
developed a model for classifying
student as successful or unsuccessful
Luan [6] Classification By comparing higher education
equivalent of critical business questions
answers author developed a model for
predicting student’s performance
Kotsiantis [7] Machine Learning Researcher focused on distance
Algorithm learning and using attributes Registry
Class, Tutor Class, and Exam Test
Results a model is developed to help
tutor
Kavacic [8] Tree, CHID, For early prediction of a student
Exhaustive CHAID, researcher Build a model and presented
QUEST a result for easy understanding by user
(staff, teacher)
Cairns, Gueni, Clustering Using PHIDIAS architecture researcher
Fhima, David, proposed a two-step clustering
Khelifa [9] approach and examine the interaction
between training Providers and training
courses.
Badal and Association analysis Using Graduation and post-Graduation
Arora [10] Algorithm marks Author found out the set of weak
students
(continued)

pasumponpandian32@gmail.com
Educational Data Mining Survey for Predicting Student’s Academic Performance 295

Table 1. (continued)
Author Method used Findings
Osmanbegovic [11] Naïve Bayes, MLP By conducting chi-square test, one-R-
algorithm, C4.5 algorithm test Info gain test, Gain-ratio test the
verified a built model for predicting
academic performance
El-Halees [12] Association rule, For extracting the knowledge
Clustering, Classification, describing student’s behavior
Outlier detection researcher used various data mining
techniques
Kotsiantis [13] Clustering, Classification Author implemented appropriate MS
rule algorithm for predicting student’s
academic performance
Suknya, Classification Author analysed and assisted weak
Birutha [14] academic students during their higher
education period
Ying, Qussena [15] NLP, DMT Focusing on student’s retention the
researcher developed model to improve
student retention on studies
Jansen, Torenbeek Correlation matrix, For predicting student’s first year
and Hofman [16] Structural Equation achievement author examined first 10
Modelling week of enrolment using Correlation
matrix, Structural Equation Modelling
Hassel and Clustering Techniques In accordance to improve the ability of
Ridout [17] first year students, the author tries to
find out the relation between student’s
and lecturer’s expectations via
questionnaires
HEFCE Questionnaires The foundation surveyed only for the
England [18] information considering students
change their subject each year than
switching between universities and find
out student’s performance with their
subject
Fraser, Killen [19] ANOVA Study identified factors affecting
positive and negative impact and
determine whether there are significant
differences in rating of FY student and
lecturer on each time
He [20] Association rule Study focused on students quality
evaluation index and described the
characteristics for specific category of
index
Sakurai [21] Storyboard technique To predict the success chance of a
student, storyboarding technique where
the paired the set of code of courses
taken by student and the level of
success with every course code is used
(continued)

pasumponpandian32@gmail.com
296 S. N. Bonde and D. K. Kirange

Table 1. (continued)
Author Method used Findings
Aher [22] Classification The study analyses the performance of
the last year students subject wise with
the help of Weka tool DBSCAN, Zero-
R Classifier classification technique
Sheela, Tasleem K-Mean Clustering The student learning behavior was
and Ahsan [23] analyzed during this study and
predicted the weak student
Kovacic [24] CART, Quest, exhaustive Researcher focused on socio
CHAID demographic variables and study
environment and to predict the study
outcome early, built a model
Penchenizkiy and Clustering and Research aims toward prediction of
Dekker [25] Classification student dropout. Also Study
demonstrate the usefulness of cost-
sensitive learning and analysis of
misclassification
Asma, Nusari and K-Mean, Apriori, The study focused on academic
Al-Shargabi [26] Decision Trees achievement as successful or failure
and predicted students’ dropout using
student’s financial behavior
Ogar [27] Linear regression, By deriving the performance prediction
classification indicator to deploy student
performance assessment, model is
developed for monitoring system
within teaching and learning
environment
Yan, Shenm [28] Rough set theory Study analyses student’s grade and
manage missing data by introducing
algorithm using rough set theory
approach
Duan, Yang and Li Rough set theory, Knowledge of introduction entropy is
[29] Clustering integrated and define a new
dissimilarity measure and improved
clustering technique results
Sakurai, Knauf [30] Storyboarding, Decision The study developed a model for
Tree analyzing success path of student and
applied the decision tree to the planned
curricula
Wu, Zhag [31] Classification Study evaluates the performance of
student using multi index system by
dividing and composing multi index for
a course as compulsory, specialized,
elective
(continued)

pasumponpandian32@gmail.com
Educational Data Mining Survey for Predicting Student’s Academic Performance 297

Table 1. (continued)
Author Method used Findings
Liu, Zhang [32] Decision algorithm Researcher forecasts the result by
considering sample data as marks of
students in each subject and the
compare subject to subject relation of a
student and generate the rule
Lijuan [33] Clustering, K-Mean Using density parameter, researcher
developed a improved K-Mean
algorithm and identified students in low
performance cluster
Wang, Shi, Bai and Apriori algorithm The researcher aimed at improving
Zhao [34] association rules based on support,
confidence and interestingness using
minsupport and misconfidence and
misinterestingness
Zyakutti, Rough set Theory, Analyzing academic, non-academic
Ramasubramanian Clustering and human behavior relationship of a
[35] student the proposed method identifies
the set of weak student
Ring and Novel Spatial Mining Study discovered association rule for
Shangping [36] Algorithm, Genetic predicting final grade based on features
algorithm extracted from log data in web based
system
Punch, Minai Genetic Algorithm The researcher Find out the classes of
Bidgoli [37] students, classify the problem used by
students, and recorded path through
web of educational resources
Bresfelean [38] Farthest Fast Clustering Study worked toward predicting and
algorithm preventing academic failure for
decision taking progression
Bresfelean [39] Decision tree Study differentiate and predicted
student’s choice in continuing their
education with post university studies
Velmurugan, Clustering Algorithm Researcher mentioned all clustering
Anandavally and algorithm and experimented on
Anuradha [40] Educational data for predicting students
academic performance..
Vijitha, Clustering Algorithm, Model is developed and find out the
Durairaj [41] Naive bayes relationship between learning
behaviour of the student and their
academic performance.
Garg, Rana [42] Clustering Algorithm, Student performance is calculated
Naive Bayes and Logistic according to their level of marks and
Regression various combination of classification
and clustering algorithms were tried out
(continued)

pasumponpandian32@gmail.com
298 S. N. Bonde and D. K. Kirange

Table 1. (continued)
Author Method used Findings
Kadijala, Potturi Clustering and Decision Study used K-means clustering
[43] tree algorithm and divided the students
according to their grades
Periyasamy, Clustering Algorithm Study is demonstrating various
Veeramuthu [44] clustering algorithm and their result
about predicting student’s performance
Zhang, Liu [45] Association Rule Pattern Analysis of curricula is done for
Recognition proving the dependence and
relationship among pre-warning
courses by discovering the patterns
helpful for decision making
Calvo and Concept Map Contents are mapped using documents
Villalon [46] such as essay and implemented concept
identification, relationship and
summarization
Haddawy and 10 fold cross validation, Researcher developed a model to make
Hien [47] Bayesian Network model a decision regarding admission of
international students for the master
and doctoral degree
Al-Radaideh [48] CRISP Classification, This study focused on understanding
Rough Set Theory student enrolment pattern and helps in
decision making to utilize necessary
action needed to provide extra basic
courses skill and counselling
Sheb, Kairul [49] Fuzzy Set theory, SBA They proves Law’s approach and Chen
and Fuzzy QSBA and Lee’s approach for evaluating
student performance
Janeek, Thai and Decision tree and Author compared two university
Haddawy [50] Bayesian Network student’s performance using 3 classes
and 2 classes and found accuracy using
10 fold cross validation
Ventura, Statistics Here the author has done survey about
Romero [51] educational data mining from 1995 to
2005
Prasong, Pathom Bayesian network, Author proposed CRRM model from
and Srivinok [52] NBTree, C4.5 history of dataset of student profiles
from different braches
Murray [53] Statistics The study aims at 2 types of students
voluntary dropout and involuntary
dropout and incorporate socio-
economic and university based factors
Suljic, Agic and Classification algorithm Using student dominant factors
Osmanbegovic [54] affecting their academic performance,
author compare the result of different
category student
(continued)

pasumponpandian32@gmail.com
Educational Data Mining Survey for Predicting Student’s Academic Performance 299

Table 1. (continued)
Author Method used Findings
Rahman and Dash Association rule mining, Author analyzed the student final grade
[55] Apriori algorithm according to post education and
discipline and according to location
and discipline
Singh, Malik and Regression Analysis This study proved that learning
Singh [56] facilities, communication skill and
proper guidance from parents have no
significant impact on students
performance

This Paper represents the detail of researches which was carried out in the field of
educational data mining using various tools of Data Mining Techniques and Psycho-
logical techniques. The research findings are presented in tabular format.

2 Conclusion

Here, above table gives the details of some of researches already done in the field of
educational data mining. Some of more significant areas like Students performance
prediction, the factors affecting their academic career path, are considered and identi-
fied. Some of the researcher developed model to find out the way to calculate the
behaviour of students, and determined student’s satisfaction and their progress level.
Some of gives the collaborative activities and found significant differences in skill
ratings suggesting prominent skill gap between academia and corporate. Lots of work
is already done in this direction, but still there are many parameters to be considered
and a more parametric approach is still required.

Acknowledgement. Author thanks all colleagues who provided insight and expertise that
greatly assisted the given research, also thanks to guide for assistance with JTM COE, Faizpur for
comments that greatly improved the manuscript. Author also Thanking to KBCNMU Jalgaon for
providing us facilities as requirements.

References
1. Saranya, S., Ayyappan, R., Kumar, N.: Student progress analysis and educational
institutional growth prognosis using data mining. Int. J. Eng. Sci. Res. Technol. (2014)
2. Sembiring, S.: Prediction of student academic performance by an application of data mining.
In: International Conference on Management and Artificial Intelligence (2011)
3. Waiyamai, K.: Improving Quality of Graduate Students by Data Mining. Department of
Computer Engineering, Faculty of Engineering, Kasetsart University, Bangkok, Thailand
(2003)

pasumponpandian32@gmail.com
300 S. N. Bonde and D. K. Kirange

4. Archer, E.: Benchmarking the habits and behaviours of successful students: a case study of
academic-business collaboration. Int. Rev. Res. Open Distance Learn. 15(1) (2014)
5. Kabakchieva, D.: Student performance prediction by using data mining classification
algorithms. Int. J. Comput. Sci. Manag. Res. 1(4), 686–690 (2012)
6. Luan, J.: Data mining applications in higher education. SPSS Inc. (2004)
7. Kotsiantis, S.P.: Prediction of student’s performance in distance learning using machine
learning techniques. Appl. Artif. Intell. 18(5), 411–426 (2004)
8. Kavacic, Z.J.: Early prediction of student success: mining students enrolment data. In:
Proceedings of Informing Science and IT Education Conference, pp. 647–665 (2010)
9. Cairns, A.H., Gueni, B., Fhima, M., David, S., Khelifa, N.: Towards custom designed
professional training contents and curriculums through educational process mining. In: The
Fourth International Conference on Advances in Information Mining and Management
(2014)
10. Badal, D., Arora, R.: Mining association rules to improve academic performance. Int.
J. Comput. Sci. Mobile Comput. 3(1), 428–433 (2014)
11. Osmanbegovic, E., Suljic, M.: Data mining approach for predicting student performance.
Econ. Rev. 10(1) (2012)
12. El-Halees, A.M.: Mining student data to analyze learning behaviour: a case study.
Department of Computer Engineering, Islam University, Kushtia (2009)
13. Kotsiantis, P.: Predicting students’ marks in Hellenic Open University. In: Proceedings of
the Fifth IEEE International Conference on Advanced Learning Technologies (ICALT’05)
(2005)
14. Suknya, M., Birutha, S.: Data mining: performance improvement in education sector using
classification and clustering algorithm. In: International Conference on Computing and
Control Engineering, vol. 12 (2012)
15. Ying, Z., Qussena, S.: Use data mining to improve student retention in higher education—a
case study. In: ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise
Information Systems, vol. 1, Portugal, 8–12 June 2008 (2010)
16. Jansen, E.P.W.A., Torenbeek, M., Hofman, W.H.A.: Predicting first-year achievement by
pedagogy and skill development in the first weeks at university. Teach. High. Educ. 16, 655–
668 (2011)
17. Hassel, S., Ridout, N.: An investigation of first-year students’ and lecturers expectations of
university education. Front. Psychol. (2018)
18. HEFCE England.: Year one outcomes for first degree students. In: Heads of HEFCE-Funded
Higher Education Institutions (2017)
19. Fraser, W.J., Killen, R.: Factors influencing academic success or failure of first-year and
senior university students: do education students and lecturers perceive things differently? S.
Afr. J. Educ. 23, 254–263 (2003)
20. He, Y.Q.: Application of data mining on students’ quality evaluation. In: 3rd International
Workshop on Intelligent Systems and Applications. IEEE (2011)
21. Sakurai, Y.: Success chances estimation of university curricula based on educational history,
self-estimated intellectual traits and vocational ambitions. In: 11th IEEE International
Conference, Advanced Learning Technologies (ICALT) (2011)
22. Aher, S.B.: Data mining in educational system using weka. In: IJCA Proceedings on
International Conference on Emerging Technology Trends (ICETT), vol. 3 (2011)
23. Sheela, A., Tasleem, A.M., Ahsan, M.: Data mining model for higher education system. Eur.
J. Sci. Res. 43, 24–29 (2010)
24. Kovacic, Z.: Early prediction of student success: mining students’ enrolment data. In:
Informing Science & IT Education Conference (InSITE) (2010)

pasumponpandian32@gmail.com
Educational Data Mining Survey for Predicting Student’s Academic Performance 301

25. Penchenizkiy, M., Dekker, G.W.: Predicting student drop out: a case study. In: Proceedings
of the 2nd International Conference on Educational Data Mining (EDM’09), pp. 41–50
(2009)
26. Asma, A., Nusari, A.N., Al-Shargabi, AA.: Discovering vital patterns from UST students
data by applying data mining techniques. In: IEEE The 2nd International Conference
Computer and Automation Engineering (ICCAE), vol. 2 (2010)
27. Ogar, E.N.: Student academic performance monitoring and evaluation using data mining
techniques. In: Fourth Congress of Electronics and Automotive Mechanics, pp. 354–359
(2007)
28. Yan, Z.M., Shenm, Q.: The analysis of student’s grade based on rough sets. In: 3rd IEEE
International Conference, Ubi-Media Computing (U-Media) (2010)
29. Duan, Q., Yang, Y.L., Li, Y.: Rough K-modes clustering algorithm based on entropy.
IAENG Int. J. Comput. Sci. 44, 13–18 (2017)
30. Sakurai, Y., Knauf, R.: Empirical evaluation of a data mining method for success chance
estimation of university curricula. In: IEEE International Conference in Systems Man and
Cybernetics (SMC), pp. 1127–1133. IEEE (2010)
31. Wu, Z., Zhag, H.: Study of comprehensive evaluation method of undergraduates based on
data mining. In: IEEE International Conference in Intelligent Computing and Integrated
Systems (ICISS), pp. 541–543 (2010)
32. Liu, Z., Zhang, X.: The application of data mining technology in analysis of college
student’s performance Information Science (2010)
33. Lijuan, Y.C.: Improved Data Mining Algorithm Based on an Early Warning System of a
College Students. Academy Publisher, Chicago (2013)
34. Wang, P.-J., Shi, L., Bai, J.-N., Zhao Y.-L.: Mining association rules based on apriori
algorithm and application. In: IEEE International Forum, In Computer Science-Technology
and Applications, vol. 1, pp. 141–143 (2009)
35. Ramasubramanian, P., Iyakutti, P.: Enhanced data mining analysis in higher educational
system using rough set theory. Afr. J. Math. Comput. Sci. Res. 2, 184–188 (2009)
36. Ring, Z., Shangping, D.: A data mining algorithm in distance learning. In: 12th International
Conference on Computer Supported Cooperative Work in Design. IEEE (2008)
37. Punch, W.F., Minai Bidgoli, B.: Using genetic algorithm for data mining optimization in an
educational web system (2009). http://www.lon-copa.org
38. Bresfelean, V.P., Bresfelean, M., Ghisoiu, N.: Determining students’ academic failure profile
founded on data mining methods. In: IEEE 30th International Conference on Information
Technology Interfaces, pp. 317–322 (2008)
39. Bresfelean, V.P.: Analysis and predictions on students’ behavior using decision trees in
Weka environment. In: IEEE 29th International Conference on Information Technology
Interfaces (2007)
40. Velmurugan, T., Anandavally, R., Anuradha, C.: Clustering algorithm in educational data
mining. Int. J. Power Control Comput. (IJPCSC) 7(1), 47–52 (2015)
41. Vijitha, C., Durairaj, M.: Educational data mining for prediction of students performance
using clustering algorithms. Int. J. Comput. Sci. Inf. Technol. 5, 5987–5991 (2014)
42. Garg, R., Rana, S.: Application of hierarchical clustering algorithm to evaluate students
performance of an institute. In: 2nd International Conference Computational intelligence and
Communication Technology (2016)
43. Kadijala, S., Potturi, C.S.: Analyzing the student’s academic performance by using
clustering methods in data mining. Int. J. Sci. Eng. Res. 5(6), 198–202 (2014)
44. Periyasamy, R., Veeramuthu, P.: Analysis of student result using clustering techniques. Int.
J. Comput. Sci. Inf. Technol. 5(4), 5092–5094 (2015)

pasumponpandian32@gmail.com
302 S. N. Bonde and D. K. Kirange

45. Zhang, X., Liu, G.: Score data analysis for pre-warning students in university. In: IEEE 4th
International Conference on Wireless Communications, Networking and Mobile Computing
(2008)
46. Calvo, R.A., Villalon, J.: Concept map mining: a definition and a framework for its
evaluation. In: IEEE International Conference on Web Intelligence and Intelligent Agent
Technology, vol. 3 (2008)
47. Hien, N.T.N., Haddawy, P.: A decision support system for evaluating international student
applications. In: 37th Annual Frontiers in Education Conference IEEE Global Engineering:
Knowledge Without Borders, Opportunities Without Passports (2007)
48. Al-Radaideh, Al-Shawakfa, E.M., Al-Najjar, M.I.: Mining student data using decision trees.
In: International Arab Conference on Information Technology, Jordan (2006)
49. Sheb, Q., Kairul, A.: Subsethood based fuzzy rule models and their application to student
performance classification. In: The 14th IEEE International Conference on Fuzzy Systems.
IEEE (2005)
50. Janeek, P., Thai, N., Haddawy, P.: A comparative analysis of techniques for predicting
academic performance. In: Education Conference-Global Engineering: Knowledge Without
Borders, Opportunities Without Passports. IEEE (2007)
51. Ventura, S., Romero, C.: Educational data mining: a survey from 1995 to 2005. Expert Syst.
Appl. 33, 135–146 (2007)
52. Prasong, P., Pumpuang, P., Srivinok, A.: Comparisons of classifier algorithms: Bayesian
network, C4. 5, decision forest and NBTree for course registration planning model of
undergraduate students. In: IEEE International Conference on Systems, Man and Cyber-
netics (2008)
53. Murray, M.: Factors affecting graduation and student dropout rates at the University of
KwaZulu-Natal. S. Afr. J. Sci. 110(11/12) (2014)
54. Suljic, M., Agic, H., Osmanbegovic, E.: Determining dominant factor for students
performance prediction by using data mining classsification algorithm. In: Tuzla (2014)
55. Rahman, A., Dash, S.: Data mining for student’s tend analysis using Apriori algorithm. Int.
J. Control Theory Appl. 10, 18 (2017)
56. Singh, S.P., Malik, S., Singh, P.: Research paper factors affecting academic performance of
students. PARIPEX Indian J. Res. 5(4), 176–178 (2016)
57. Bonde, S.N., Kirange, D.K.: Survey on evaluation of student’s performance in educational
data mining. In: IEEE 2nd International Conference on Inventive Communication and
Computational Technologies, pp. 209–213 (2018)

pasumponpandian32@gmail.com
Author Index

A C
Aarthi, S., 140 Chakraborty, Soubhik, 514
Abhishek, R., 12 Chandra Priya, J., 737, 811
Abraham, Joshua Johnson, 865 Chandra Sekhar, G., 715
Acharya, Adarsh, 645 Chawla, Tarun, 1005
Ahmed, Vasif, 400 Chethana, H. T., 94
Ahuja, Varkha, 1005 Chinnaiyan, R., 615, 630
Aisathul Safa, A., 811 Chitra, K., 351
Akshay, G., 546 Choudhury, Ziaul Haque, 968
Akula, Abhilash, 231
Albert, Anitha Juliette, 462 D
Alex, Suja A., 600 Dakshayini, M., 409, 546
Anandha Jothi, R., 133 Dalvi, Isha, 873
Anil Kumar, B., 1046 Deepa, N., 312
Anny Leema, A., 889 Deepika, M., 453
Antony, Zachariah C. F., 857 Deshmukh, Pranali, 499
Apoorva, M. G., 991 devi, R. Karthika, 462
Arockia Xavier Annie, R., 470 Devi, T., 312
Arockiam, L., 709, 904 Dhianeswar, R, 778
Arun Raj, L., 889 Divakara, Madhura P., 984
Arun, 579 Divya, C., 247
Ashok Kumar, T. A., 792 Dixit, Anurag, 820
Assisi, Anlin, 865 Dutta, Sandip, 514

B E
Babu, Rajesh M, 1054 Ega, Jeshwanth, 231
Balachandar, S., 615 Elakkiya, I., 811
Balaji Ganesh, A., 163 Esther Jenifa, S., 621
Balaji, V., 334
Balakannan, S. P., 31 F
Banga, Heena, 873 Francis Xavier Christopher, D., 247
Bhagyashree, M., 211
Bhatia, Sahil, 1017 G
Bonde, Sharayu N., 293 Gajbhiye, Khushboo, 342
Boomiga, S. S., 370 Gakwaya, Nkundimana Joel, 127
Bukkawar, Sheetal, 400 Galphat, Yugchhaya, 752, 873, 976

© Springer Nature Switzerland AG 2020


A. P. Pandian et al. (Eds.): ICCBI 2018, LNDECT 31, pp. 1075–1078, 2020.
https://doi.org/10.1007/978-3-030-24643-3

pasumponpandian32@gmail.com
1076 Author Index

Ganesan, G., 101 K


Gayakwad, Milind, 836 Kamakshi Prasad, V., 392
Gayathri, N., 701 Kamble, Shridevi Jeevan, 257
Geetha, N., 693 Kandasamy, Pradeep, 579
Gokulakrishnan, K., 621, 771 Karthik, P., 140
Govardhan, A., 392 Karthik, V., 984
Gowda, Hitesh R., 378 Kaushik, Divyang, 198
Gowtham, 231 Kavitha, T., 540
Gowtham, M, 778 Keshvani, Twinkle, 219
Guleria, Kalpna, 670 Khan, Asad Mohammed, 490
Gulzar, Zameer, 889 Khan, Shahidul Islam, 881
Gupta, C. P., 446 Khursheed, Mohammad Omar, 490
Gupta, Neetesh, 342 Kirange, D. K., 293
Gupta, Rajiv Kumar, 86 Kiranmayee, Tadepalli Sarada, 211
Gupta, Richa, 211 Kola Sujatha, P., 720
Gurumurthy, Sasikumar, 715 Korde, Shrutika A., 654
Gururaj, H. L., 76 Kotalwar, Ganesh, 998
Gururaj, J. P., 792 Kounte, Manjunath R., 257, 278
Krishnamoorthy, Prabhakar, 960
H Krishnan, Adithi, 984
Hameed, Misiriya Shahul, 470 Krithika Sanju, S., 912
Hariharasitaraman, S., 31 Kudale, Bharti, 499
HariPrakash, A., 163 Kumar, Abhishek, 120, 1065
Helen Jenefa, R., 771 Kumar, P., 850
Hinger, Ritik, 948 Kumar, Venkatesh, 678

I L
Ilango, V., 661 Lakshmi Sangeetha, A., 163
Inbaraj, Johnson, 579 Lalitha, A., 685
Inbaraj, Prince, 678 Lamani, Dharmanna, 417
Islam, Ariful, 881 Latiful Hoque, Abu Sayed Md., 881
Leela Sree, G., 436
J Leelavathi, B, 1054
Jadhav, Amitkumar B., 358 Leena, 409
Jadhav, Amolkumar N., 827 Liu, Yifan, 1035
Jadhav, Hemantkumar B., 358 Lokeshwari, G., 685
Jagan Mohana Rao, N., 1046 Lubal, Yogesh S., 827
Jagtap, Sudhir B., 23
Jain, Aaditya, 429, 637, 645 M
Jain, Anuj, 506 Madhav Bharadwaj, C., 436
Jain, Rithika B., 94 Madnani, Sagar, 1017
Jain, Vishal K., 94 Mahalakshmi, A., 269, 303
Jaisharma, K., 312 Mahalakshmi, G. S., 912
James Mathai, K., 236 Mahesh, K., 693, 701
Jayapandian, N., 857, 865, 991 Maheswari, C., 108
Jayarekha, P., 409 Mahithaa Sree, M., 67
Jethani, Manohar, 752 Malpani, Mohit, 923
Jethmalani, Priya, 873 Manasa, S., 378
Jewani, Kajal, 998 Mangal, Neha, 429
Johnson, R., 896 Manikandan, N., 529
Joshi, Janhvi, 953 Manikandan, P., 470
Joshi, Shashank D., 56 Maniraj, S. P., 211
Justin, Judith, 269 Manisha, S., 286

pasumponpandian32@gmail.com
Author Index 1077

Manju Priya, S., 127 Patil, Sharayu, 998


Manjunath, T. C., 417 Pavan Kumar, S. P., 76
Manuel, Shibu, 585 Pavithra, B., 737
Mathew, Rejo, 147, 156, 173, 180, 185, 192, Pavithra, G., 417
198, 204, 522, 923, 928, 933, 942, 948, Paygude, Priyanka, 56
953 Pooja, C. A., 94
Mathur, Akanksha, 446 Potdar, Jayesh, 192
Maurya, Maruti, 836 Prabhakar, Surya Santhosh, 960
Menaka, R., 319 Pradeep, T., 470
Menon, Aparna, 147 Prajapati, Jigisha, 998
Mishra, Anubha, 204 Prasanna Venkatesan, V., 351, 370
Mishra, Shipra, 759 Praveen Reddy, K., 436
Modi, Sangita S., 23 Pravin, A., 529
Mohammed, Arif, 1065 Prayla Shyry, S., 67
Mohan, Aravind, 140 Priyadharshini, V., 720
Monisha, 409 Priyanka, E. B., 108
Moralwar, Dilip, 998 Priyanka, Sonam, 514
More, Pravin B., 827 Pund, Anshuman, 41
More, Priyanka, 499 Pund, M. A., 41
Mukeshkannan, 579 Punjabi, Harsha, 752
Muppalaneni, Naresh Babu, 392, 540, 715
Murugan, R., 462 R
Rabbani, M. Munir Ahamed, 968
N Ragha, Lata, 1
Nagtode, Smita A., 654 Raghavendran, S., 850
Nama, Sunil, 637 Rajasundari, T., 163
Narendra, Pakalapati, 436 Rajesh, R., 120
Narkar, Pritesh, 752 Rajitha, O., 540
Natesh, M., 378 Raju, Leo, 334
Naveen, Soumyalatha, 278 Ramawat, Kritika, 185
Nayahi, J. Jesu Vedha, 600 Ramji, V., 163
Nayak, Deepak Kumar, 462 Ranga Charan, S., 591
Negi, Richaa, 928 Rao, Chirag Prasad, 552
Nema, Swapnil, 759 Rashmi Shree, V, 857
Neogi, Sumi, 752 Raushan, Menka, 991
Nikam, Tanvi, 173 Ravi, N. Ch., 392
Nikhitha, C. A., 378 Ravinder, T., 1032
Nithya, B., 661 Ray, Ayan, 156
Nithyapriya, J., 133 Reji Kumar, K., 585
Niveditha, P., 378 Revathi, K., 560

P S
Pacharaney, Utkarsha S., 86 Sabarmathi, G., 630
Pachipala, Yellamma, 436 Saeed, Danish, 490
Padma, Joshi, 392 Saeed, Fatek, 820
Padmasree, L., 101 Sahu, Sunita, 1017
Palaniappan, S., 896 Sai Shibi, M. R., 470
Palanisamy, Ramaraj, 1035 Samydurai, A., 560
Palanisamy, V., 133 Sangeetha, S., 334
Pannu, Parmeet Singh, 180 Sangeetha, V., 269
Parthibhan, M., 120 Santiago, S., 709
Parthipan, V., 896 Saranya, M., 67
Patange, Vedika R., 976 Saranya, S., 801
Patel, Tejas, 506 Saravanan, D., 483

pasumponpandian32@gmail.com
1078 Author Index

Sarbhukan, Vaishali V., 1 T


Sathia Bhama, Ponsy R. K., 811 Talreja, Gaurav, 942
Sathiabhama, Ponsy R. K., 737 Talreja, Pooja, 976
Sayyad, Samee, 1065 Talreja, Shraddha, 873
Sebastian, Annmary K., 991 Thakare, Sheetal, 41
Sendhilkumar, S., 912 Thakur, Aakanksha, 211
Sengupta, Sharmila, 1005 Thakur, Anurag, 140
Senthil Kumar, A. V., 327 Thangavel, S., 108
Senthilkumar, Radha, 801 Thejaswi, K., 540
Shaga, Vikrant, 1065 Thota, Kalyan, 231
Shanthi, D., 385, 685 Trimal, Keerthi V., 984
Shanthini, A., 552
Sharmila, T. Sree, 286 U
Shashank, N., 76 Uma, K. V., 453
Shenbagavalli, S. T., 385 Umrigar, Kunaal, 933
Shivakarthika, V., 546
Shivaprasad, N., 12 V
Shukla, Madhu, 219 Vadivu, G., 552
Singh, Kunal, 236 Valecha, Hitesh, 1005
Singh, Somil, 976 Valechha, Labhesh, 1005
Singh, Sukhwinder, 1017 Vamshika, P., 94
Singhal, Achintya, 120 Vanithamani, R., 303
Sivaranjani, R., 327 Veeraraghavan, A. K., 591
Smitha, E. S., 912 Vengatesan, K., 120, 1065
Sonawane, Kajal, 1017 Venkataramana, B., 101
Soni, Mukesh, 506 Verma, Anil Kumar, 670
Sridevi, R., 392 Vijayalakshmi, M., 571
Srinivasa Rao, M., 101 Vijayalakshmi, R., 960
Srivastav, Niharika, 522 Vijetha, T., 1032
Stewart kirubakaran, S., 896 Vithya Vijayalakshmi, A., 904
Sujatha, R., 960
Sujitha, Vairam, 453 W
Sumathi, S, 778 Wahida Banu, R. S. D., 319
Sunny, Christy, 865 Walunj, Vishal S., 827
Suvitha, D., 571
Swarnalaxmi, S., 811 Z
Swetha, S., 720 Zahangir, Taiyeb Ibna, 881

pasumponpandian32@gmail.com

You might also like