An Automated Approach for Job Scheduling and Work Flow Mining
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Now a day’s work allotment in a software firm become more important and cumbersome. The main objective of this concept is to reduce the work of the software developers in a software company and work allocation. Here the work will be allotted for the each person automatically by splitting the modules into tasks. When developing a big project more confusion and more discussions will occur, and some clauses will arise between modules while splitting into tasks and who the person to develop the particular task And performance evolution will not be in accurate, which confuse with the actual work allotment by the HR. So that still companies are struggling to book multiple software projects at a same time. So that still companies are yielding less works from their employees. In order to reduce these problems, implementing work flow mining, some of them are Group movement pattern, Heterogeneous project details, Ranking model adaptation SVM (RA-SVM), Domain specific search, Distributed clustering etc.
Authors and Affiliations
P. Rijisha , V. Venkatesh
Driving Supportive System for Warning Traffic Sign Classification
Abstract: Traffic signs should be accurately identified in order to prevent vital road accidents and secure lives. The objective of this paper is to detect the warning traffic signs and recognize the message it is design...
Comparative Study of RBFS & ARBFS Algorithm
RBFS is a best-first search that runs in space that is linear with respect to the maximum search depth, regardless of the cost function used. This algorithm allows the use of all available memory. One major ...
Using Ensemble Methods for Improving Classification of the KDD CUP ’99 Data Set
Abstract: The KDD CUP ’99 data set has been widely used for intrusion detection and pattern mining in the last decade or so. Umpteen number of experiments pertaining to classification have been conducted on it.Many resea...
A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR file Authentication
Cloud computing has the great potential to dramatically change the landscape of the current IT industry. Cloud services are provided based on user request. In cloud environment user’s data are usually processed r...
Blueprint on Comparison of WSN Protocols
Abstract: A sensor network is a group of specialized devices that converts energy of one form into another that also designed to monitor and record condition at places of different areas. Commonly monitored parameters ar...