Statistical Evaluation of Image Quality Measures for Improving Iris Recognition Performance
Research Paper | Journal Paper
Vol.9 , Issue.9 , pp.1-5, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.15
Abstract
Iris image quality assessment is a strategy of estimating data substance of iris imagery at the phase of iris acquisition or at early preprocessing stage. The information substance might be taken to be utilized for iris identification dependent on a single image. The image might be disposed of, or joined with other imagery to improve recognition abilities of an iris system. Evaluate quality metrics would be the rules in settling on choices with respect to additional means regarding gained imagery. Implement this algorithm on open source iris databases (IIT Delhi, UBIRIS and UPOL Iris Database). We compare with the support of quality measure parameters with both original iris image and enhanced iris images. The consequential images quality is tested by using quality measures like PSNR, MSE, MAXERR, L2RAT, it is found that quality has been enhanced. Hence it is shown that the recognition rate is rises.
Key-Words / Index Term
Quality Measure, Iris Recognition System, Biometric, PSNR, MSE, MAXERR, L2RAT
References
[1] Feddaoui N, Mahersia H, & Hamrouni K, “Improving Iris Recognition Performance Using Quality Measures.”, Advanced Biometric Technologies, 2012.
[2] Inmaculada Tomeo-Reyes, Iván Rubio Polo, Judith Liu-Jimenez, Belen Fernandez-Saavedra, “Quality metrics influence on iris recognition systems performance”, IEEE International Carnahan Conference on Security Technology (ICCST), 2011.
[3] R. Hentati, B. Dorizzi, Y. Aoudni and M. Abid, "Measuring the Quality of IRIS Segmentation for Improved IRIS Recognition Performance", Eighth International Conference on Signal Image Technology and Internet Based Systems, Naples, 2012, pp. 110-117, doi: 10.1109/SITIS.2012.27.
[4] E. Krichen, S. Garcia-Salicetti and B. Dorizzi, "A new probabilistic Iris Quality Measure for comprehensive noise detection", First IEEE International Conference on Biometrics: Theory, Applications, and Systems, Crystal City, VA, 2007, pp. 1-6, doi: 10.1109/BTAS.2007.4401906.
[5] Nathan D. Kalka, Jinyu Zuo, Natalia Schmid, Bojan Cukic, “Image quality assessment for iris biometric”, 6Proceedings of SPIE - The International Society for Optical Engineering 6202, DOI: 10.1117/12.666448, 2006.
[6] N. Nelufule, A. de Kock, G. Mabuza-Hocquet and Y. Moolla, "Image Quality Assessment for Iris Biometrics for Minors", Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 2019, pp. 1-6, doi: 10.1109/ICTAS.2019.8703520, 2019.
[7] Makinana S., Malumedzha T., Nelwamondo F.V., “Iris Image Quality Assessment Based on Quality Parameters”, Intelligent Information and Database Systems. Lecture Notes in Computer Science, vol 8397. Springer, Cham. https://doi.org/10.1007/978-3-319-05476-6_58, 2014.
[8] Starovoitov V., Goli?ska A.K., Predko-Maliszewska A., Goli?ski M., “Image Quality Assessment for Iris Biometrics”. Processing and Communications Challenges 4. Advances in Intelligent Systems and Computing, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32384-3_12, 2013.
[9] Archana Hombalimath, Manjula H T, Amreen Khanam, Krishna Girish, “Image Quality Assessment for Iris Recognition”, International Journal of Scientific and Research Publications, Volume 8, Issue 6, ISSN 2250-3153, 2018.
[10] Jenadeleh, M.; Pedersen, M.; Saupe, D. Blind Quality Assessment of Iris Images Acquired in Visible Light for Biometric Recognition. Sensors 1308, 2020.
[11] Schmid N.A. “Iris Image Quality”, In: Li S.Z., Jain A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_166, 2009.
Citation
Sonali S. Gaikwad, Jyotsna S. Gaikwad, Ramesh R. Manza, "Statistical Evaluation of Image Quality Measures for Improving Iris Recognition Performance," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.1-5, 2021.
An Intelligent Mirror for Parenting, Supporting Aid and Personal Agent
Research Paper | Journal Paper
Vol.9 , Issue.9 , pp.6-15, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.615
Abstract
Everybody loves to be in front of the mirror at least once a day. Such a mirror can also be used as an intelligent device that can enable lot of opportunities. Intelligent mirror can help in effective parenting. Looking after child needs and keeping track of their activities like homework, eating, tuitions, sports/dance classes and others is difficult. The intelligent mirror can help by communicating child different alerts and messages, as soon as the child stands in front of mirror. Parents can keep updating instructions to mirror. Disabled people find difficulty in checking daily updates, keeping reminder systems and receiving notifications of their friends/relatives. They have to depend on someone to support all these tasks. Such people just need to be visible in front of the smart mirror and get all the required updates and notifications. Apart from these, every individual has lot of reminders, updates, and tasks to be done every day. Daily news, weather forecasts, streaming of desired videos, user interest driven advertisements need to be displayed as soon as user comes in front of mirror. The proposed intelligent mirror is developed using Raspberry Pi, two-way mirror, camera module, face recognition and server side technologies. An easy to use Android App has been developed in Kotlin to facilitate updating activity schedules, record and upload Audio messages, user to customize their interest and profile settings and view the history of schedules.
Key-Words / Index Term
Smart Mirror, Convolution Neural Networks, Raspberry PI, IoT, Android
References
[1] Marianna Saba, “Smart mirror where I stand, who is the leanest in the sand?”, 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech), At Split, Croatia, pp. 12-20, 2016.
[2] Vaibha Kannari et.al., “DESIGN AND DEVELOPMENT OF A SMART MIRROR USING RASPBERRY PI”, International Journal Of Electrical, Electronics And Data Communication, ISSN: 2320-2084, Vol. 5, No. 7, pp. 63-68, 2017.
[3] Oihane et.al., “SmiWork: An interactive smart mirror platform for workplace health promotion”, 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech), pp. 10-14, 2017.
[4] P. O’Donovan, “The tv’s vanishing act: radical new display and content-delivery technologies will doom the television set.,” IEEE Spectrum, vol. 53, pp. 48–53, May 2016.
[5] Chidambaram Sethukkarasi, Vijayadharan, “Interactive Mirror for Smart Home”, International Journal on Advances in Intelligent Systems, vol 9, No. 2, pp. 148-160, 2016.
[6] Acampora, Giovanni & Cook, Diane & Rashidi, Parisa & Vasilakos, Athanasios A Survey on Ambient Intelligence in Health Care. Proceedings of the IEEE. Institute of Electrical and Electronics Engineers. 101. 2470-2494, 2013.
[7] V. Gupta and D. Sharma, “A Study of Various Face Detection Methods,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, Issue 5, pp. 6694-6697, May 2014.
[8] C. Sethukkarasi, V. S. Harikrishnan, and R. Pitchiah, “Design and Development of Interactive Mirror for Aware Home,” The First International Conference on Smart Systems, Devices and Technologies, pp. 1-8, 2012.
[9] M. A. Hossain, P. K. Atrey, and A. E. Saddik, “Smart Mirror for Ambient Home Environment,” 3rd IET International Conference on Intelligent Environments, pp. 589-596, 24-25 Sep 2007.
[10] Bujnowski, Adam & Wtorek, Adam & Palinski, Arkadiusz., Intelligent bathroom.. Federated Conference on Computer Science and Information Systems, FedCSIS 2011. 381-386. K. Ushida, Y. Tanaka,, 2011
[11] T. Naemura, and H. Harashima, “i-mirror: An interaction/information environment based on a mirror metaphor aiming to install into our life space,” Proceedings of the 12th International Conference on Artificial Reality and Telexistence (ICAT2002), pp. 113-118, 2002.
[12] Athira S, Frangly Francis, Radwin Raphel, Sachin N. S, Snophy Porinchu, Ms. Seenia Francis, Smart Mirror: A Novel Framework for Interactive Display, International Conference on Circuit, Power and Computing Technologies (ICCPCT), March 2016.
[13] Muhammed Mu’izzudeen, Yusri Shahreen Kasim, Rohayanti Hassan, Zubaile Abdullah Husni Ruslai, Kamaruzzaman Jahidin, Mohammad Syafwan Arshad, "Smart Mirror for Smart Life", in IEEE Conference publication, 2017.
[14] N. Vani, M. Varatharaj, P. Jayanthi, P.S. Vishal kumar, S. Maheswari, R. Nishanthakumar, "Opulent Futuristic Smart Sensing Garden," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.35-38, 2020.
[15] V. Jebasheeli, R. Vadivel, "Implementation of Automated Criminal Face Detection System Using Facial Recognition Approach," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.38-42, 2020.
Citation
Chetan K.R., "An Intelligent Mirror for Parenting, Supporting Aid and Personal Agent," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.6-15, 2021.
Emotion Analysis and Performance Perdiction Using Cluster Based LDA
Research Paper | Journal Paper
Vol.9 , Issue.9 , pp.16-24, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.1624
Abstract
Kajal Devi, Harjinder Kaur, for a productive life, Marketing plays a critical role to fill individual life with value and excellence. Marketing is compulsory to provide things that individuals partake in to compete in the modern world. Predicting the academic performance of the Business is the most successive research in this era. A different set of approaches and methods are incorporated to increase Business performance. However, this is a challenging task due to the wrong course selection. In this paper, we have used the Cluster-based Linear Discriminant Analysis (CLDA) and Artificial Neural Network (ANN) based approaches for the prediction and classification of Business performance. The proposed study will provide the prospective business with the motivational comments and the video recommendations by which Business can choose the right subject and the comments will facilitate the Business with the insight reasons of dropout opted by other Business for this course. The outcomes of this study will help in the reduction of the number of dropouts. The Business will be able to choose an appropriate course for performance enhancement and carrier excel.
Key-Words / Index Term
Cluster-based Linear Discriminant Analysis (CLDA), Business performance, Dropouts, Classification, Prediction, and machine learning
References
[1]. Aleman, L., & Garza, D. E. L. A.. RESEARCH ANALYSIS ON MOOC COURSE DROPOUT AND. IEEE Access, April, 3–14, 2016.
[2]. Battin-Pearson, S., Newcomb, M. D., Abbott, R. D., Hill, K. G., Catalano, R. F., & Hawkins, J. D. (2000). Predictors of early high school dropout: A test of five theories. Journal of Marketingal Psychology, 92(3), 568–582, 2000. https://doi.org/10.1037/0022-0663.92.3.568
[3]. Chen, J., Feng, J., Sun, X., Wu, N., Yang, Z., & Chen, S. (2019). MOOC Dropout Prediction Using a Hybrid Algorithm Based on Decision Tree and Extreme Learning Machine. IEEE Access, 2019.
[4]. De Santos, K. J. O., Menezes, A. G., De Carvalho, A. B., & Montesco, C. A. E. (2019). Supervised learning in the context of Marketingal data mining to avoid university Businesss dropout. Proceedings - IEEE 19th International Conference on Advanced Learning Technologies, ICALT 2019, 207–208. https://doi.org/10.1109/ICALT.2019.00068
[5]. Feng, W., Tang, J., & Liu, T. X. (2015). Understanding Dropouts in MOOCs. IEEE Access.
[6]. Fortin, L., Lessard, A., & Marcotte, D. (2010). Comparison by gender of Businesss with behavior problems who dropped out of school. Procedia - Social and Behavioral Sciences, 2(2), 5530–5538. https://doi.org/10.1016/j.sbspro.2010.03.902
[7]. Fox, C. K., Barr-Anderson, D., Neumark-Sztainer, D., & Wall, M. (2010). Physical activity and sports team participation: Associations with academic outcomes in middle school and high school Businesss. Journal of School Health, 80(1), 31–37. https://doi.org/10.1111/j.1746-1561.2009.00454.x
[8]. Haraty, R. A., Dimishkieh, M., & Masud, M. (2014). An Enhanced k -means Clustering Algorithm for Pattern Discovery in Healthcare Data. International Journal of Distributed Sensor Networks, 1–18, 2015.
[9]. Hasbun, T., Araya, A., & Villalon, J. (2016). Extracurricular activities as dropout prediction factors in higher Marketing using decision trees. Proceedings - IEEE 16th International Conference on Advanced Learning Technologies, ICALT 2016, 242–244. https://doi.org/10.1109/ICALT.2016.66
[10]. Kingdom, U. (2015). DROPOUT RATES OF MASSIVE OPEN ONLINE COURSES?: BEHAVIOURAL PATTERNS MOOC Dropout and Completion?: Existing Evaluations. IEEE Access.
[11]. Kizilcec, R. F., Piech, C., & Schneider, E. (2013). Deconstructing disengagement: Analyzing learner subpopulations in massive open online courses. ACM International Conference Proceeding Series, 170–179. https://doi.org/10.1145/2460296.2460330
[12]. Kloft, M., Stiehler, F., Zheng, Z., & Pinkwart, N. (2014). Predicting MOOC Dropout over Weeks Using Machine Learning Methods. IEEE Access, 60–65.
[13]. Kuo, J. Y., Pan, C. W., & Lei, B. (2017). Using Stacked Denoising Autoencoder for the Business Dropout Prediction. Proceedings - 2017 IEEE International Symposium on Multimedia, ISM 2017, 2017-January, 483–488. https://doi.org/10.1109/ISM.2017.96
[14]. Liang, J., Yang, J., Wu, Y., Li, C., & Zheng, L. (2016). Big data application in Marketing: Dropout prediction in Marketing MOOCs. Proceedings - 2016 IEEE 2nd International Conference on Multimedia Big Data, BigMM 2016, 440–443. https://doi.org/10.1109/BigMM.2016.70
[15]. Limsathitwong, K., Tiwatthanont, K., & Yatsungnoen, T. (2018). Dropout prediction system to reduce discontinue study rate of information technology Businesss. Proceedings of 2018 5th International Conference on Business and Industrial Research: Smart Technology for Next Generation of Information, Engineering, Business, and Social Science, ICBIR 2018, 110–114. https://doi.org/10.1109/ICBIR.2018.8391176
[16]. Liu, F., Wang, L., Qian, Y., & Wu, Y.. Analysis of MOOCs Courses Dropout Rate Based on Businesss ’ Studying Behaviors. IEEE Access, 83(Hss), 139–144, 2017.
[17]. Manhães, L. M. B., Da Cruz, S. M. S., & Zimbrão, G. (2014). WAVE: An architecture for predicting dropout in undergraduate courses using EDM. Proceedings of the ACM Symposium on Applied Computing, 243–245. https://doi.org/10.1145/2554850.2555135
[18]. Márquez-Vera, C., Cano, A., Romero, C., & Ventura, S. (2013). Predicting Business failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data. Applied Intelligence, 38(3), 315–330. https://doi.org/10.1007/s10489-012-0374-8
[19]. Mohan, A., Sun, H., Lederman, O., Full, K., & Pentland, A. (2018). Measurement and Feedback of Group Activity Using Wearables for Face-to-Face Collaborative Learning. 2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT), 163–167. https://doi.org/10.1109/ICALT.2018.00046
[20]. Onah, D., & Sinclair, J. (2014). Dropout Rates of Massive Open Online Courses?: Behavioural Patterns DROPOUT RATES OF MASSIVE OPEN ONLINE COURSES?: BEHAVIOURAL PATTERNS. IEEE Access, July. https://doi.org/10.13140/RG.2.1.2402.0009
[21]. Osmanbegovic, E., Suljic, M. (2012). Data mining approach for predicting Business performance. Journal of Economics and Business, X(1), 3–12.
[22]. Pal, S. (2012). Mining Marketingal Data to Reduce Dropout Rates of Engineering Businesss. International Journal of Information Engineering and Electronic Business, 4(2), 1–7. https://doi.org/10.5815/ijieeb.2012.02.01
[23]. Romero, C., & Ventura, S. (2007). Marketingal data mining: A survey from 1995 to 2005. Expert Systems with Applications, 33(1), 135–146. https://doi.org/10.1016/j.eswa.2006.04.005
[24]. Tinto, V. (1975). Dropout from Higher Marketing: A Theoretical Synthesis of Recent Research. Review of Marketingal Research, 45(1), 89–125. https://doi.org/10.3102/00346543045001089
[25]. Tsiakmaki, M., Kostopoulos, G., Kotsiantis, S., & Ragos, O. (2019). Implementing AutoML in Marketingal Data Mining for Prediction Tasks. Applied Sciences, 10(1), 90. https://doi.org/10.3390/app10010090
[26]. Wang, W., & Graduate, I. (2015). Deep Model for Dropout Prediction in MOOCs. IEEE Access.
[27]. Wibisono, A., Jatmiko, W., Wisesa, H. A., Hardjono, B., & Mursanto, P. (2016). Knowledge-Based Systems Traffic big data prediction and visualization using Fast Incremental Model Trees-Drift Detection ( FIMT-DD ). Knowledge-Based Systems, 93, 33–46. https://doi.org/10.1016/j.knosys.2015.10.028
[28]. Zepke, N., Leach, L., & Prebble, T. (2006). Being learner-centered: One way to improve Business retention? Studies in Higher Marketing, 31(5), 587–600. https://doi.org/10.1080/03075070600923418
[29]. Zheng, X., Member, S., Chen, C., Hung, J., He, W., Hong, F., & Lin, Z. (2015). A Hybrid Trust-based Recommender System for Online Communities of Practice. IEEE Transactions on Learning Technologies, 1382(c), 1–13. https://doi.org/10.1109/TLT.2015.2419262
[30]. Hector Varga, Ruben Heradio, Jesus Chacon, Luis LA Torre, Gonzalo Faria (2019)"Automated Assessment and Monitoring Support for Competency-Based Courses" IEEE.
[31]. Cios, K.J., Pedrycz W., Swiniarski, R.W. & Kurgan, L.A. (2007), Data Mining: A Knowledge Discovery Approach, Springer, New York.
[32]. Klosgen, W. & Zytkow, J. (2002), Handbook of data mining and knowledge discovery oxford university press, New York.
[33]. Edin Osmanbegovi? , Mirza Sulji? DATA MINING APPROACH FOR PREDICTING BUSINESS PERFORMANCE
[34]. Kalpesh P. Chaudhari1, Riya A. Sharma2, Shreya S. Jha3, Rajeshwari J. Bari4 Business Performance Prediction System using Data Mining Approach.
[35]. Hector Varga, Ruben Heradio, Jesus chacon, Luis LA Torre, Gonzalo Faria,"Automated Assessment and Monitoring Support for Competency-Based Courses" IEEE,2019.
Citation
Kajal Devi, Harjinder Kaur, "Emotion Analysis and Performance Perdiction Using Cluster Based LDA," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.16-24, 2021.
Movies Reviews Sentiment Analysis using Improved Random Forest Algorithm and ACO (Ant Colony Optimization) Approach
Research Paper | Journal Paper
Vol.9 , Issue.9 , pp.25-30, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.2530
Abstract
Data mining, text mining and opinion mining have occurred in one form or another since modern record keeping began. As the number of online shopping users is increasing, access to social media sites produces vast quantities of information in the form of user feedback, comments, blogs and tweets tests. For this reason, Sentimental analysis is required, which classifies these reviews to gain insights into the data generated by the user. The main problem with the analysis of the feeling is the uncertain mood of the user, such that the interpretation of what the user has written and what he actually thought is somewhat different. The problem analysed in the existing work is that the decision-making trees, particularly when a tree is very large, are likely to parallelize. Random forest classification is used to eliminate both errors due to bias and variance. In the proposed research, the improved technology is implemented with Random forest and optimization of the Ant colony search is hybridised with the proposed classifier in order to accomplish the classification of film screens by studying the sentiments.
Key-Words / Index Term
Sentiment Analysis, Social Media, Movie Reviews, Data Mining
References
[1] C. Ouyang, L. Yongbin, Z. Shuqing, and Y. Xiaohua, "Features- level Sentiment Analysis of Movie reviews``, Advance Science and Technology Letters, pp. 110-113, 2016.
[2] S. Kumar Yadav, “Sentiment Analysis and Classification: A Survey”, International Journal of Advance Research in Computer Science and Management Studies, Vol. 3, Issue. 3, 2015.
[3] R. Baldania, “Sentiment analysis approaches for movie reviews forecasting: A survey”, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017.
[4] A. Tripathi, S. K. Trivedi, “Sentiment analysis of Indian movie review with various feature selection techniques”, IEEE International Conference on Advances in Computer Applications (ICACA), 2016.
[5] C. Catal, M. Nangir, “A Sentiment Classification Model Based On Multiple Classifiers”, Applied Soft Computing Elsevier, vol. 50, pp. 135–141, 2017.
[6] K. Naik, A. Joshi, P. Khanna, N. Shekokar, “A Model to Analyse Social Media Data to Gain a Competitive Edge”, International Conference on Computing, Communication, Control and Automation (ICCUBEA), 2017.
[7] R. Wankhede, A. N. Thakare, “Design approach for accuracy in movies reviews using sentiment analysis”, International Conference of Electronics, Communication and Aerospace Technology (ICECA), 2017.
[8] S. Pandey, S. Sagnika, B. S. P Mishra, “A Technique to Handle Negation in Sentiment Analysis on Movie Reviews”, International Conference on Communication and Signal Processing (ICCSP), 2018.
[9] C. Nanda, M. Dua, G. Nanda, “Sentiment Analysis of Movie Reviews in Hindi Language Using Machine Learning”, International Conference on Communication and Signal Processing (ICCSP)”, 2018.
[10] T. Dholpuria, Y. Rana, C. Agrawal, “A Sentiment analysis approach through deep learning for a movie review”, 8th International Conference on Communication Systems and Network Technologies (CSNT), 2018.
[11] F. Yin, Y. Wang, X. Pan, P. Su, “A Word Vector Based Review Vector method for Sentiment Analysis of Movie Reviews Exploring the Applicability of the Movie Reviews”, 3rd International Conference on Computational Intelligence and Applications (ICCIA), 2018.
[12] O. Hourrane, N. Idrissi, E. H Benlahmar, “Sentiment Classification on Movie Reviews and Twitter: An Experimental Study of Supervised Learning Models”, 1st International Conference on Smart Systems and Data Science (ICSSD), 2019.
[13] M. Yasen, S. Tedmori, “Movies Reviews Sentiment Analysis and Classification”, IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 2019.
[14] S. Tiwari, A. Verma, P. Garg, D. Bansal, “Social Media Sentiment Analysis on Twitter Datasets”, 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020.
Citation
N.K. Deol, V. Thapar, J. Singh, "Movies Reviews Sentiment Analysis using Improved Random Forest Algorithm and ACO (Ant Colony Optimization) Approach," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.25-30, 2021.
Process Improvement in the Criteria of Investment on Stock Market Using Data Mining Techniques
Research Paper | Journal Paper
Vol.9 , Issue.9 , pp.31-38, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.3138
Abstract
Exact expectation of stock trade returns could be a difficult undertaking in view of unpredictable and non-direct nature of the monetary securities exchanges. The financial exchange information, as S&P500 Index is gigantic, perplexing, non-straight and noised. Foreseeing stock costs is a difficult undertaking as it relies upon different elements including however not restricted to worldwide economy, political conditions, organization`s monetary reports and execution and so on The speculation models utilizing this data have been a test. Along these lines, to augment the benefit and limit the misfortunes, procedures to anticipate estimations of the stock in advance by examining the pattern over the past couple of years, could end up being exceptionally valuable for making securities exchange developments [42,43]. This investigation proposes the accompanying momentary bit by bit technique: to consolidate two data sources that the financial backers can break down to settle on a choice. In the first place, the file information comprises the contribution for Profound Learning Neural Organization preparing, for addressing and estimating following day stock worth. Second, this exploration distinguishes the principal delegate endeavors, remembered for File, which address the List social inclination, utilizing Highlight Determination Investigation. At long last, the yields are supplemented and verified; the technique shows promising outcomes to upgrade the financial backer`s choice. Especially, for stock trade investigation, the data size is enormous and furthermore non-direct. To influence such an information proficient model is required which will recognize the secret examples and muddled relations during this huge informational index. AI strategies during this region have demonstrated to improve efficiencies by 60-86 percent when contrasted with the past techniques.
Key-Words / Index Term
Stock Exchange, Machine Learning, Predict, Feature Selection and Forecasting
References
[1] F. Mostafa, T. Dillon, and E. Chang, "Computational intelligence applications to option pricing, volatility forecasting and value at risk, Studies in Computational Intelligence," Springer International Publishing, vol. 697, 2017.
[2] Y. Fang, "Feature selection, deep neural network, and trend prediction," Journal of Shanghai Jiaotong University (Science), vol. 23, no. 2, pp. 297–307, 2018.
[3] X. Zheng and B. Chen, "Stock market modeling and forecasting," LNCIS, Vol. 442, pp. 1–11, London: Springer-Verlag, 2013.
[4] M. Olden, "Predicting stocks with machine learning," Master’s Thesis, 2016.
[5] X.-Y. Qian and S. Gao, "Financial series prediction: Comparison between precision of time series models and machine learning methods," Mathematics, Computer Science, Economics, 2017.
[6] S. Banik and A. Khan, "Forecasting US NASDAQ stock index values using hybrid forecasting systems," in Porc. 18th International Conference on Computer and Information Technology (ICCIT), 2015 [6].
[7] Z. Cao, L. Wang, and G. Melo, "Multiple-weight recurrent neural networks," in Proc. the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17), 2017.
[8] R. Singh and S. Srivastava, "Stock prediction using deep learning," Multimedia Tools Application, vol. 76, pp. 18569–18584, 2017.
[9] B. Yong, M. Rahim, and A. Abdullah, "A stock market trading system using deep neural network," AsiaSim 2017, Part I, Singapore, 2017.
[10] B. Yang, Z. Gong, and W. Yang, "Stock market index prediction using deep neural network ensemble," in Proc. the 36th Chinese Control Conference, Dalian, 2017.
[11] J. Ma, M. Yu, S. Fong, K. Ono, E. Sage, B. Demchak, R. Sharan, and T. Ideker, "Using deep learning to model the hierarchical structure and function of a cell," Nature Methods, pp. 1-12, 2018.
[12] P. Addo, D. Guegan and B. Hassani, "Credit risk analysis using machine and deep learning models," Documents de Travail du Centre d’Economie de la Sorbonne, 2018.
[13] T. Fischer and C. Krauss, "Deep learning with long short-term memory networks,” FAU Discussion Papers in Economics, 2017.
[14] H. Abdou, "Prediction of financial strength ratings using machine learning and conventional techniques," Investment Management and Financial Innovation, vol. 14, no. 4, pp. 194-211, 2017.
[15] S. Edet., Recurrent Neural Networks in Forecasting S&P 500 Index, 2017.
[16] V. Gavrishchaka, Z. Yang, R. Miao, and O. Senyukova, "Advantages of hybrid deep learning frameworks in applications with limited Data," International Journal of Machine Learning and Computing, vol. 8, no. 6, pp. 549-558, 2018.
[17] V. Sze, Y. Chen, T. Yang, and J. Emer, "Efficient Processing of Deep Neural Networks: A Tutorial and Survey," Proceedings of the IEEE, vol. 105, no. 12, pp. 2296-2329, 2017.
[18] T. Cook and A. Hall, Macroeconomic Indicator Forecasting with Deep Neural Networks, 2017.
[19] M. Abe and H. Nakayama, Deep Learning for Forecasting Stock Returns in the Cross-Section, 2017.
[20] A. Moghaddama, M. Moghaddamb, and M. Esfandyaric, "Stock market index prediction using artificial neural network," Journal of Economics, Finance and Administrative Science, vol. 21, pp. 89–93, 2016.
[21] I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," Journal of Machine Learning Research, vol. 3, pp. 1157-1182, 2003.
[22] G. Chandrashekar and F. Sahin, "A survey on feature selection methods," Computers and Electrical Engineering, vol. 40, pp. 16–28, 2014.
[23] Y. Saeys, I. Inza, and P. Larrañaga, "A review of feature selection techniques in bioinformatics," Bioinformatics Review, vol. 23, no. 19, pp. 2507–2517, 2007.
[24] J. Miao and L. Niub, "A survey on feature selection," Information Technology and Quantitative Managemen, 2016.
[25] J. Dy and C. Brodley, "Feature selection for unsupervised learning," Journal of Machine Learning Research, vol. 5, pp. 845–889, 2004.
[26] M. Law, M. Figueiredo, and A. Jain, "Simultaneous feature selection and clustering using mixture models.," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 26, no. 9, pp. 1154-1166, 2004.
[27] R. Kohavi and G. John, "Wrappers for feature subset selection," Artificial Intelligence, vol. 97, pp. 273-324, 1997.
[28] V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos, Feature Selection for High-Dimensional Data, Switzerland: Springer International Publishing, 2015.
[29] H. Abusamra, "A comparative study of feature selection and classification methods for gene expression data of glioma," Procedia Computer Science, vol. 23, pp. 5-14, 2013.
[30] R. Kaur, M. Sachdeva, and G. Kumar, "Study and comparison of feature selection approaches for intrusion detection," International Journal of Computer Applications, 2016.
[31] E. Mahsereci, S. Ay?e, and T. ?brikçib, "A comparative study on the effect of feature selection on classification accuracy," Procedia Technology, vol. 1, pp. 323-327, 2012.
[32] W. Puch, E. Goodman, M. Pei, L. Chia-Shun, P. Hovland and R. Enbody, "Further research on feature selection and classification using genetic algorithm," in Porc. International Conference On Genetic Algorithm, 1993.
[33] B. Arguello, "A survey of feature selection methods: Algorithms and software," Austin, 2015.
[34] The University of Waikato, WEKA Manual for Version 3-7-8, Hamilton: New Zealand, 2013.
[35] I. Witten, F. Eibe and M. Hall, "Data Mining: Practical machine learning tools and techniques," The Morgan Kaufmann Series in Data Management Systems, 2011.
[36] E. Barnard and L.Wessels, "Extrapolation and interpolation in neural network classifiers," IEEE Control Systems Magazine, vol. 12, no. 5, pp. 50-53, 1992.
[37] P. Haley and D. Soloway, "Extrapolation limitations of multilayer feedforward neural networks," in Proc. International Joint Conference on Neural Networks, Baltimore, 1992.
[38] A. Pektas and H. Cigizoglu, "Investigating the extrapolation performance of neural network models in suspended sediment data," Hydrological Sciences Journal, vol. 62, no. 10, pp.1694-1703, 2017.
[39] P. Hettiarachchi, M. Hall and A. Minns, "The extrapolation of artificial neural networks for the modeling of rainfall-runoff relationships," Journal of Hydroinformatics, vol. 07, no. 4, pp. 291-296, 2005.
[40] MathWorks, Neural Network Toolbox™. User’s Guide. R2014a, The MathWorks, Inc., 2014.
[41] A. Prastyo, D. Junaedi, and M. Sulistiyo, "Stock price forecasting using artificial neural network," in Proc. Fifth International Conference on Information and Communication Technology (ICoICT), 2017.
[42] MH. Najeb, Masoud, “The impact of stock market performance upon economic growth.” International Journal of Economics and Financial Issues 3 (4) : 788–798, 2017.
[43] Murkute, Amod, and Tanuja Sarode, “Forecasting market price of stock using artificial neural network.” International Journal of Computer Applications 124 (12) : 11-15, 2015.
[44] C. Montenegro and M. Malina, “Improving the Criteria of the Investment on Stock Market Using Data Mining Techniques: The Case of S&P500 Index,” International Journal of Machine Learning and Computing, Vol. 10, No. 2, 2020.
Citation
S.K. Sharma, "Process Improvement in the Criteria of Investment on Stock Market Using Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.31-38, 2021.
A Critical Analysis of Techniques Used For Learning Analytics Corresponding to Buiness
Review Paper | Journal Paper
Vol.9 , Issue.9 , pp.39-44, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.3944
Abstract
Data Mining plays an important role in the Business world and it helps to the marketing institution to predict and make decisions related to the business’ academic status. Predicting business’ performance becomes more challenging due to the large volume of data in marketing databases. Currently in Malaysia, the lack of existing system to analyse and monitor the performance of the business is not being addressed. There are two main reasons of why this is happening. First, the study on existing prediction methods is still insufficient to identify the most suitable methods for predicting the performance of the business in Malaysian’s institutions. Second, Due to the lack of investigations on the factors affecting student’s achievements in particular courses within Malaysian context. Therefore, a systematically literature review on predicting student performance by the proposed system is a web based which makes use of the mining techniques for the extraction of useful information. This work is dig insight into state and event-based approaches for predicting student performance. Comparative analysis is conducted to suggest regression-based algorithms of state-based framework lack accuracy and correlation-based algorithms under event driven approach outperforms classical regression algorithms. It is also concluded from pedagogical point of view, higher engagement with social media leads to higher final grades
Key-Words / Index Term
Performance Prediction, Learning Analytics, Regression algorithm, correlation algorithms, social media
References
[1] Amra IAA (2017) Business performance prediction using KNN and Naïve Bayesian. Res Gate. doi: 10.1109/ICITECH.2017.8079967
[2] Bekele R, Menzel W (2017) A BAYESIAN APPROCH TO PREDICT PERFORMANCE OF STUDENT(BAPPS): A CASE WITH ETHIOPIAN BUSINESS. IJAER
[3] Carter BJ (2017) An ANOVA Analysis of Education Inequities Using Participation and Representation in Education Systems This is to certify that the doctoral dissertation by. IEEE Access
[4] Chen J, Feng J, Sun X, Wu N, Yang Z, Chen S (2019) MOOC Dropout Prediction Using a Hybrid Algorithm Based on Decision Tree and Extreme Learning Machine. IEEE Access 2019:
[5] Eashwar KB, Venkatesan R (2017) STUDENT PERFORMANCE PREDICTION USING SVM. IJMET 8:649–662
[6] Feng W, Tang J, Liu TX (2015) Understanding Dropouts in MOOCs. IEEE Access
[7] Gitinabard N, Khoshnevisan F, Lynch CF, Wang EY (2014) Your Actions or Your Associates?? Predicting Certification and Dropout in MOOCs with Behavioral and Social Features. IEEE Access
[8] Hoic-Bozic N, Holenko Dlab M, Mornar V (2015) Recommender System and Web 2.0 Tools to Enhance a Blended Learning Model. IEEE Trans Educ 1–1 . doi: 10.1109/TE.2015.2427116
[9] Ix DQG, Dojrulwkp J, Dpvd D, Kdnnhwkrwwdp QL (2016) student academic performance prediction model using decision tree and fuzzy genetic algorithm. Elsevier 25:326–332 . doi: 10.1016/j.protcy.2016.08.114
[10] Jasmer AM (2015) DISPOSITIONAL EMPLOYABILITY AND THE RELATIONSHIP TO CAREER SUCCESS?: A META-ANALYSIS. CSUSB Sch Work
[11] Kabra RR, Bichkar RS (2016) BUSINESS ’ PERFORMANCE PREDICTION USING GENETIC ABSTRACT?: IJCEA VI:19–29
[12] Kakkar H (2016) The Dispositional Antecedents of Promotive and Prohibitive Voice. J Appl Psychol 101:1342–1351
[13] Kaur A, Umesh N, Singh B (2018) Machine Learning Approach to Predict Student Academic Performance. IJRASET 6:734–742
[14] Khder M (2018) A Classification and Prediction Model for Student ’ s Performance in University A Classification and Prediction Model for Student ’ s Performance in University Level. Res Gate. doi: 10.3844/jcssp.2017.228.233
[15] Kloft M, Stiehler F, Zheng Z, Pinkwart N (2014) Predicting MOOC Dropout over Weeks Using Machine Learning Methods. IEEE Access 60–65
[16] Loh W-Y (2006) Logistic Regression Tree Analysis. Handb Eng Stat 537–549
[17] Lopes AP (2017) LEARNING MANAGEMENT SYSTEMS IN HIGHER EDUCATION. Res Gate
[18] Osmanbegovic, E., Suljic M (2012) Data mining approach for predicting student performance. J Econ Bus X:3–12
[19] Pinjuh A (2015) Learning Management system logs. Res Gate. doi: 10.1109/SOFTCOM.2015.7314114
[20] Popescu E, Leon F (2018) Predicting Academic Performance Based on Learner Traces in a Social Learning Environment. IEEE Access 6:72774–72785 . doi: 10.1109/ACCESS.2018.2882297
[21] Rosenfeld A, Sina S, Sarne D, Avidov O, Kraus S (2018) A Study of WhatsApp Usage Patterns and Prediction Models without Message Content. IEEE Access 1–24
[22] Thai-Nghe N, Drumond L, Krohn-Grimberghe A, Schmidt-Thieme L (2010) Recommender system for predicting student performance. Procedia Comput Sci 1:2811–2819 . doi: 10.1016/j.procs.2010.08.006
[23] Wang W, Graduate I (2015) Deep Model for Dropout Prediction in MOOCs. IEEE Access
[24] Zhang S, Yao L, Sun A, Tay YI (2018) Deep Learning based Recommender System?: A Survey and New Perspectives. CSIR 1:1–35
Citation
Kajal Devi, Harjinder Kaur, "A Critical Analysis of Techniques Used For Learning Analytics Corresponding to Buiness," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.39-44, 2021.
Review on Extraction and Classification of Skin Lesion towards Melanoma Cancer Using Machine Learning Techniques
Review Paper | Journal Paper
Vol.9 , Issue.9 , pp.45-47, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.4547
Abstract
In recent days, skin cancer is one of the most dangerous form of the cancers found in humans. Skin cancer is found in various types such as Melanoma, Basal and Squamous Cells Carcinoma among which Melanoma is the most unpredictable. The diagnosis of Melanoma cancer in early stage will be helpful to cure it. Melanoma is type of skin cancer that evolve from melanocytic cells. Because of Malignancy feature melanoma skin cancer is also defined as Malignant Melanoma. Melanoma cancers have so many stages which will increase the death rate of patients. So early diagnosis and treatment of Melanoma implicate higher chances of cure. Traditional methods to diagnose skin cancer are excruciating, invasive and time consuming. So to overcome this problem different techniques used for skin cancer detection. These techniques use Machine learning and image processing tools for the detection of Melanoma skin cancer. The input to the system is the skin lesion image and then by applying image processing techniques, it analyses to conclude about the presence of skin cancer. The lesion image analysis tools checks for various Melanoma parameters which are like Asymmetry, Border, Colour and Diameter (ABCD) by texture, size and shape analysis for image segmentation and feature stages. The extricated feature parameters are used to classify the image as Normal skin and Melanoma cancer lesion.
Key-Words / Index Term
Melanoma, Image processing, Classification, Machine Learning
References
[1] R. S. Gound, Priyanka S. Gadre, Jyoti B. Gaikwad, Priyanka K. Wagh, “Skin Disease Diagnosis System Using Image Processing and Data Mining”, International Journal of Computer Applications (0975-8887), Volume 179, No.16, p.p.38-40, January 2018.
[2] Er. Shrinidhi Gindhi, Ansari Nausheen, Ansari Zoya, Shaikh Ruhin, “An Innovative Approach for Skin Disease Detection Using Image Processing and Data Mining”, International Journal of Innovative Research in Computer and Ctional Journal and Communication Engineering, Vol. 5, Issue 4, April 2017.
[3] O. Abuzaghleh, B. D. Barkana and M. Faezipour, “Noninvasive Real- Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention”, IEEE Journal of Translational Engineering in Health and Medicine, vol. 3, 2015.
[4] Nisha Yadav, Virender Kumar Narang,Utpal Shrivastava,”Skin Diseases Detection Models using Image
[5] Processing: A Survey”, International Journal of Computer Applications (0975-8887), Volume 137-No.12, March 2016, 34-39
[6] MohdAnas, Ram Kailash Gupta, Dr. Shafeeq Ahmad, ”Skin Cancer Classification Using K-Means Clustering”, International Journal of Technical Research and Applications, Volume 5, Issue 1, 2017. [2] T.Y. Satheesha, D. Dr, D.r. Satyanaray
[7] S. Mohan Kumar, J. Ram Kumar, K. Gopalakrishnan, Skin cancer diagnostic using machine learning techniques –
[8] shearlettransform and naïve bayes classifier, Int. J. Eng. Adv. Technol. (IJEAT) 9 (2) (2019) 2249–8958. VedantiChintawar, JignyasaSanghavi, ‘‘Improving Feature Selection Capabilities in Skin Disease Detection System”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume 8, Issue 8S3, June, 2019
[9] Tschandl, C. Rosendahl, H. Kittler, The HAM10000 dataset, a large collection of multi-source dermatoscopic images of common pigmented skin lesions, Sci. Data 5 (2018), https://doi.org/10.1038/sdata.2018.161 180161.
Citation
A.S. Solanke, Y.M. Rajput, P.D. Deshmukh, "Review on Extraction and Classification of Skin Lesion towards Melanoma Cancer Using Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.45-47, 2021.
Data Mining Techniques for Estimation of Wind Speed Using Weka
Survey Paper | Journal Paper
Vol.9 , Issue.9 , pp.48-51, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.4851
Abstract
Now a day’s neural network plays a vital role in analyzing, interpreting and fitting models. In this paper by taking wind speed as dependent variable and minimum temperature, maximum temperature, visibility, temperature date and time as independent variables, we fitted. M5P, SMO Regression and zero regression models and CV parameter selection criteria is also used for above three models. For computational purpose WEKA Software is used. By measures of accuracy like mean absolute error, root mean square. Relative absolute error, root relative squared error are used to select the best model and also rank them.
Key-Words / Index Term
Wind speed, Zero regression, M5P, SMO regression, WEKA
References
[1] Zeynab Ramedani, Mahmoud Omid and Alireza Keyhani “Modeling solar energy potential in a Tehran province using artificial neural networks”, International Journal of Green Energy, Vol.10, No.4, pp.427-442, 2013.
[2] M Cucumo, A. De Rosa, V. Ferraro, D. Kaliakatsos, V. Marinelli, “Experimental testing of models for estimation of hourly solar radiation an vertical surfaces Arcavancata. Di Rende”, Solar energy, Vol. 81, No.5, pp. 692-695, 2007.
[3] Somaieh Ayalvary, Zohreh Jahani, Morteza Babazadeh, “Select the most relevant input parameters using WEKA for models forecast Solar radiation based on Artificial Neural Networks”, ACSIJ Advances in Computer Science: an International Journal, Vol. 4, No.6(18), pp.38-44, 2015.
[4] T. Khatib, A.Mohamed, and K. Sopian, “A review of solar energy modeling techniques”, Renewable and Sustainable Energy Reviews, Vol. 16 No.5, pp. 2864-2869, 2012.
[5] M. A. Abdul Azeez, Artificial Neural Network Estimation of Global Solar Radiation Using Meteorological Parameters in Gusau, Nigeria, Archives of Applied Science Research, Vol.3, No.2, pp. 586-595, 2011.
[6] P. Usha Sri and B.Narasimha Swamy, Wireless Atmospheric Data Logger for a Sensor Network, International Journal of Computer Sciences and Engineering, Vol.3, No.9, PP. 157-161,2015.
[7] K.V. Shende, V.S.Shirsat , M. R. Ramesh Kumar , K.V. Kale, Artificial Neural Network Model for Prediction of Latent Heat Flux over Bay of Bengal, International Journal of Computer Sciences and Engineering, Vol.7, No-5, PP.901-905, 2019
Citation
B. Hari Mallikarguna Reddy, S. Venkatramana Reddy, B. Sarojamma, "Data Mining Techniques for Estimation of Wind Speed Using Weka," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.48-51, 2021.
Techniques for Future Enhancement for Security of Cloud Computing
Survey Paper | Journal Paper
Vol.9 , Issue.9 , pp.52-58, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.5258
Abstract
In cloud computing data and applications have been maintained using remote servers that is distributed and it utilizes internet. The main advantage of using cloud computing is that it allow user to use applications over the internet and also share files at any computer over the internet. The use of cloud computing has tremendous impact over the IT industry and also it provides efficient use of resources like bandwidth, storage and processing. As the growth of cloud computing increases many users interact with each other and security issues are arising. The cloud computing growth is hampered by these security issues. There are risks of data breach, data loss, unauthorized access, denial of services etc. In this paper the analysis cloud computing security issues and also surveyed various techniques that are used to handle cloud security.
Key-Words / Index Term
cloud computing, security
References
[1]. Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017). Blockchain Technology Innovations, (2016).
[2]. Bharadwaj, D. R., Bhattacharya, A., & Chakkaravarthy, M. (2019). Cloud Threat Defense - A Threat Protection and Security Compliance Solution. Proceedings - 7th IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2018, 95–99. https://doi.org/10.1109/CCEM.2018.00024
[3]. Biswas, K., & Technology, A. B. (2016). Securing Smart Cities Using Blockchain Technology. 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 1392–1393. https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198
[4]. Chang, J. (2012). Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction. https://doi.org/10.1109/IS3C.2012.179
[5]. Cui, A., Member, S., Chang, C. H., & Member, S. (2008). IP Watermarking Using Incremental Technology Mapping at Logic Synthesis Level, 27(9), 1565–1570.
[6]. D, F. J. (2017). Advanced Encryption Standard ( AES ) Security Enhancement using Hybrid Approach, 647–652.
[7]. Dai, Y., Zhang, L., & Yang, Y. (1845). A New Method of MPEG Video Watermarking Technology, 1(4), 1845–1847.
[8]. Deshpande, H. S., Karande, K. J., & Mulani, A. (2014). EFFICIENT IMPLEMENTATION OF AES ALGORITHM ON FPGA, 1895–1899.
[9]. Ecosystems, D. (2010). Design and Implementation of an Improved RSA Algorithm Yunfei Li, 390–393.
[10]. Egwutuoha, I. P., Chen, S., Levy, D., Selic, B., & Calvo, R. (2012). A proactive fault tolerance approach to High Performance Computing (HPC) in the cloud. Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012, 268–273. https://doi.org/10.1109/CGC.2012.22
[11]. Egwutuoha, I. P., Cheny, S., Levy, D., Selic, B., & Calvo, R. (2013). Energy efficient fault tolerance for high performance computing (HPC) in the cloud. IEEE International Conference on Cloud Computing, CLOUD, 762–769. https://doi.org/10.1109/CLOUD.2013.69
[12]. Elhouni, A., Elfgee, E., Isak, M. A., & Ben Ammer, K. (2014). Study of security mechanisms implemented in Cloud computing. 2014 World Congress on Computer Applications and Information Systems, WCCAIS 2014, (2). https://doi.org/10.1109/WCCAIS.2014.6916631
[13]. Galla, L. K., Koganti, V. S., & Nuthalapati, N. (2016). Implementation of RSA, 81–87.
[14]. Gordin, I., Graur, A., Potorac, A., & Balan, D. (2018). Security assessment of OpenStack cloud using outside and inside software tools. 2018 14th International Conference on Development and Application Systems, DAS 2018 - Proceedings, 170–174. https://doi.org/10.1109/DAAS.2018.8396091
[15]. Hahn, C., Kwon, H., & Hur, J. (2018). Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. IEEE International Conference on Cloud Computing, CLOUD, 2018–July, 920–923. https://doi.org/10.1109/CLOUD.2018.00136
[16]. Halpin, H., & Piekarska, M. (2017). 2017 European Introduction to Security and Privacy on the Blockchain. https://doi.org/10.1109/EuroSPW.2017.43
[17]. Hsu, F., & Wang, S. (2012). Dual-watermarking by QR-code Applications in Image Processing, 638–643. https://doi.org/10.1109/UIC-ATC.2012.91
[18]. Kong, W., Lei, Y., & Ma, J. (2018). Data security and privacy information challenges in cloud computing. International Journal of Computational Science and Engineering, 16(3), 215–218. https://doi.org/10.1504/IJCSE.2018.091772
[19]. Koo, J., Kim, Y. G., & Lee, S. H. (2019). Security Requirements for Cloud-based C4I Security Architecture. 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings, 1–4. https://doi.org/10.1109/PlatCon.2019.8668963
[20]. Liu, J., & Zhao, J. (2016). Providing Proactive Fault Tolerance as a Service for Cloud Applications, 1–2. https://doi.org/10.1109/SERVICES.2016.26
[21]. Manzoor, S., Zhang, H., & Suri, N. (2018). Threat modeling and analysis for the cloud ecosystem. Proceedings - 2018 IEEE International Conference on Cloud Engineering, IC2E 2018, 278–281. https://doi.org/10.1109/IC2E.2018.00056
[22]. Matt, L. (1953). ELECTRONIC WATERMARKING?: THE FIRST 50 YEARS, 225–230.
[23]. Nie, W., Xiao, X., Wu, Z., Wu, Y., Shen, F., & Luo, X. (2018). The research of information security for the education cloud platform based on appscan technology. Proceedings - 5th IEEE International Conference on Cyber Security and Cloud Computing and 4th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud/EdgeCom 2018, 185–189. https://doi.org/10.1109/CSCloud/EdgeCom.2018.00040
[24]. Noorbasha, F., Divya, Y., Poojitha, M., Navya, K., Bhavishya, A., Rao, K. K., & Kishore, K. H. (2019). FPGA Design and Implementation of Modified AES Based Encryption and Decryption Algorithm, (6), 132–136.
[25]. Pir, R. M. (2016). Security improvement and Speed Monitoring of RSA Algorithm, 4(1), 195–200.
[26]. Ramamoorthy, S., & Poorvadevi, R. (2018). Security solution for hybrid cloud information management using fuzzy deductive systems. Proceedings of the International Conference on Smart Systems and Inventive Technology, ICSSIT 2018, (Icssit), 457–462. https://doi.org/10.1109/ICSSIT.2018.8748395
[27]. Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., & Xiang, Y. (2017). Block Design-based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Transactions on Dependable and Secure Computing, 5971(c), 1–15. https://doi.org/10.1109/TDSC.2017.2725953
[28]. Soliman, S. M., Magdy, B., Abd, M. A., & Ghany, E. (2016). Efficient Implementation of the AES Algorithm for Security Applications, 206–210.
[29]. Vishal, V., & Johari, R. (2018). SOAiCE: Simulation of Attacks in Cloud Computing Environment. Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering, Confluence 2018, 152–157. https://doi.org/10.1109/CONFLUENCE.2018.8442733
[30]. Wei, W. (2012). An Implementation of AES Algorithm Based on FPGA, (Fskd), 1615–1617.
[31]. Zhou, X., & Tang, X. (2011). Research and Implementation of RSA Algorithm for Encryption and Decryption, 1118–1121.
Citation
Diksha Sagotra, Harjinder Kaur, "Techniques for Future Enhancement for Security of Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.52-58, 2021.
Analysis of Cryptographic Libraries(SSL/TLS)
Research Paper | Journal Paper
Vol.9 , Issue.9 , pp.59-62, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.5962
Abstract
Secure communication in Computer Network is very important which can be achieved by Transport Layer Security (TLS) protocol. Various libraries have been created for the implementation of TLS functions by the researchers, of which each has wide support of the encryption algorithms, key exchange mechanism from which one can implement TLS for secure communications. In this paper, to find the best suitable SSL/TLS library, relative analysis of the six widely used libraries has been done based on various affecting parameter such Languages, Cryptographic Token Interface - PKCS#11, Thread Safety, and CPU Assisted Cryptography with AES-NI. Any organization can use an effective and efficient library that will provide the appropriate security and fulfill the expectation of the application.
Key-Words / Index Term
Thread Safety, TLS, AES-NI
References
[1] E. Rescorla, and N. Modadugu. "Datagram transport layer security version 1.2." 2012.
[2] Mozilla Developer Network, "Network Security Services", Aug 10, 2021.https://developer.mozilla.org/enUS/docs/Mozilla/Projects/NSS#Documentation.
[3] OpenSSL, Cryptography and SSL/TLS Toolkit - Threads, 1.0.2 manpages, 10 August 2021 https://www.openssl.org/docs/man1.0.2/crypto/threads.html
[4] GnuTLS, Transport Layer Security Library for the GNU system, for version 3.7.1, March 2021. https://www.gnutls.org/manual/gnutls.html
[5] Gutmann, Peter, "Downloading", cryptlib, University of Auckland School of Computer Science, 07 July 2021
[6] Google. "BoringSSL." Google, 29 July 2021. https://boringssl.googlesource.com/boringssl/
[7] A. Chudnov, N. Collins, B. Cook, J. Dodds, B. Huffman, C. MacCárthaigh, S. Magill, "Continuous formal verification of Amazon s2n", In International Conference on Computer Aided Verification, pp. 430-446, Oxford, UK, 2018.
[8] B. Bond, C. Hawblitzel, M. Kapritsos, K. R. M. Leino, J. R. Lorch, B. Parno, A. Rane, S. Setty, and L. Thompson, "Vale: Verifying high-performance cryptographic assembly code", In 26th {USENIX} Security Symposium ({USENIX} Security 17), pp. 917-934, VANCOUVER, BC, CANADA 2017.
[9] Fromherz, Aymeric, N. Giannarakis, C. Hawblitzel, B. Parno, A. Rastogi, and N. Swamy, "A verified, efficient embedding of a verifiable assembly language", Proceedings of the ACM on Programming Languages 3, pp. 1-30, New York, United States, 2019
[10] T. Bingmann, "Speedtest and comparsion of open-source cryptography libraries and compiler flags", Timo Bingmann–2008. https://panthema. net/2008/0714-cryptography-speedtest-comparison (2008), 2018.
[11] J.K Zinzindohoué, K. Bhargavan, J. Protzenko, and B. Beurdouche, "HACL*: A verified modern cryptographic library", In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1789-1806,New York, United States 2017.
[12] J. P. Lim, and S. Nagarakatte, "Automatic equivalence checking for assembly implementations of cryptography libraries", In 2019 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), pp. 37-49, Washington, DC, USA, 2019.
[13] A. Erbsen, J. Philipoom, J. Gross, R. Sloan, and A. Chlipala, "Simple high-level code for cryptographic arithmetic-with proofs, without compromises", In 2019 IEEE Symposium on Security and Privacy (SP), pp. 1202-1219, San Francisco, CA, USA , 2019.
[14] V. Gopal, J. Guilford, E. Ozturk, S. Gulley, W. Feghali, “Improving OpenSSL* Performance”, in IA Architects Intel Corporation, October 2011, https://software.intel.com/sites/default/files/open-sslperformance-paper.pdf
[15] B. Boston, S. Breese, J. Dodds, M. Dodds, B. Huffman, A. Petcher, and A. Stefanescu, "Verified Cryptographic Code for Everybody", In International Conference on Computer Aided Verification, pp. 645-668, Springer, Cham, 2021.
Citation
Suresh Prasad Kannojia, Jitendra Kurmi, "Analysis of Cryptographic Libraries(SSL/TLS)," International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.59-62, 2021.