Improved Software Cost Estimation Model Using Cost Driver Reduction Based on Water Cycle Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.64-72, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.6472
Abstract
Software cost estimation considered to be the critical, is equally vital tasks in software project management. In a highly challenging environment, software project managers are always in a need of robust estimation models inorder to predict the cost of upcoming software development projects accurately. Software cost estimation is the prediction of development effort and calendar time required to develop a software project. It is considered to be the key task as accurate estimation of any software not only accurately estimates development effort, cost, time and growth of a software development project but also yields delivery exactness and correctness vis a viz return an organization in a better schedule of its futuristic software projects. In this paper, software cost estimation is done by proposing a cost driver selection model which is based on an optimization technique called as water cycle algorithm. The proposed cost driver selection model selects only relevant set of cost drivers as an input to estimation process and ignores the very irrelevant cost drivers. In step second, these relevant set of cost drivers originating from step first are assigned to an Artificial Neural Network as its input for the purpose of getting the accurate estimation of software development project cost that needs to be developed. For evaluation purposes, Magnitude of Relative Error, Mean of Magnitude of Relative Error and Median of Magnitude of Relative Error are used as three performance measures to simply weigh the obtained quality of estimation as accuracy. The obtained results were compared with the results of a benchmark study of COCOMO model and another artificial neural network based model. From the comparative result, it becomes evident that the proposed model outperforms the rest of the two existing models.
Key-Words / Index Term
Artificial Neural Network, Cost Driver Reduction, Software Cost Estimation, Water Cycle Algorithm
References
[1] Auer, Martin, et al. "Optimal project feature weights in analogy-based cost estimation: Improvement and limitations." IEEE Transactions on Software Engineering 32.2 (2006): 83-92.
[2] Baskeles, Bilge, Burak Turhan, and Ayse Bener. "Software effort estimation using machine learning methods" Computer and information sciences, 2007. iscis 2007. 22nd international symposium on. IEEE, 2007.
[3] Boehm, Barry W. “Software engineering economics” Vol. 197. Englewood Cliffs (NJ): Prentice-hall, 1981.
[4] Heemstra, Fred J. "Software cost estimation" Information and software technology 34.10 (1992): 627-639.
[5] Huang, Sun-Jen, and Nan-Hsing Chiu. "Optimization of analogy weights by genetic algorithm for software effort estimation" Information and software technology 48.11 (2006): 1034-1045.
[6] Li, Jingzhou, and Guenther Ruhe. "A comparative study of attribute weighting heuristics for effort estimation by analogy" Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering. ACM, 2006.
[7] Li, Jingzhou, et al. "A flexible method for software effort estimation by analogy" Empirical Software Engineering 12.1 (2007): 65-106.
[8] Li, Jingzhou, and Guenther Ruhe. "Decision support analysis for software effort estimation by analogy" Proceedings of the Third International Workshop on Predictor Models in Software Engineering. IEEE Computer Society, 2007.
[9] Shepperd, Martin, and Chris Schofield. "Estimating software project effort using analogies" IEEE Transactions on software engineering 23.11 (1997): 736-743.
[10] Chiu, Nan-Hsing, and Sun-Jen Huang. "The adjusted analogy-based software effort estimation based on similarity distances" Journal of Systems and Software 80.4 (2007): 628-640.
[11] Costagliola, Gennaro, et al. "Effort estimation modeling techniques: a case study for web applications" Proceedings of the 6th international conference on Web engineering. ACM, 2006.
[12] Jørgensen, Magne. "A review of studies on expert estimation of software development effort" Journal of Systems and Software 70.1-2 (2004): 37-60.
[13] Menzies, Tim, et al. "Selecting best practices for effort estimation" IEEE Transactions on Software Engineering 32.11 (2006): 883-895.
[14] Rush, Christopher, and Rajkumar Roy. "Expert judgement in cost estimating: Modelling the reasoning process" Concurrent Engineering 9.4 (2001): 271-284.
[15] Mair, Carolyn, and Martin Shepperd. "The consistency of empirical comparisons of regression and analogy-based software project cost prediction" Empirical Software Engineering, 2005. 2005 International Symposium on. IEEE, 2005.
[16] Chen, Zhihao, et al. "Finding the right data for software cost modeling" IEEE software 22.6 (2005): 38-46.
[17] Zhang, Mi, and J. T. Yao. "A rough sets based approach to feature selection" Fuzzy Information, 2004. Processing NAFIPS`04. IEEE Annual Meeting of the. Vol. 1. IEEE, 2004.
[18] Turhan, Burak, Onur Kutlubay, and Ayse Bener. "Evaluation of feature extraction methods on software cost estimation" Empirical Software Engineering and Measurement, 2007. ESEM 2007. First International Symposium on. IEEE, 2007.
[19] Mendes, Emilia, et al. "A comparative study of cost estimation models for web hypermedia applications" Empirical Software Engineering 8.2 (2003): 163-196.
[20] Azzeh, Mohammad, Daniel Neagu, and Peter Cowling. "Improving analogy software effort estimation using fuzzy feature subset selection algorithm" Proceedings of the 4th international workshop on Predictor models in software engineering. ACM, 2008.
[21] Mittal, Mamta, et al. "Monitoring the Impact of Economic Crisis on Crime in India Using Machine Learning" Computational Economics (2018): 1-19.
[22] Venkatachalam, A. R. "Software cost estimation using artificial neural networks" Neural Networks, 1993. IJCNN`93-Nagoya. Proceedings of 1993 International Joint Conference on. Vol. 1. IEEE, 1993.
[23] Mamta Mittal, Lalit Mohan Goyal, Sumit Kaur, Iqbaldeep Kaur, Amit Verma, D. Jude Hemanth, “Performance Enhanced Growing Convolutional Neural Network Based Approach for Brain Tumor Segmentation in Magnetic Resonance Brain Images”, Applied Soft Computing.
[24] Gray, Andrew R. "A simulation-based comparison of empirical modeling techniques for software metric models of development effort" Neural Information Processing, 1999. Proceedings. ICONIP`99. 6th International Conference on. Vol. 2. IEEE, 1999.
[25] Malav Shastri, Sudipta Roy, Mamta Mittal, (2019) “Stock Price Prediction using Artificial Neural Model : An Application of Big Data”, SIS, EAI, ( ESCI Indexed) DOI: 10.4108/eai.19-12-2018.156085.
[26] Xu, Zhiwei, and Taghi M. Khoshgoftaar. "Identification of fuzzy models of software cost estimation" Fuzzy Sets and Systems145.1 (2004): 141-163.
[27] Hughes, R. T. "An evaluation of machine learning techniques for software effort estimation" University of Brighton (1996): 1-15.
[28] Jorgensen, Magne. "Experience with the accuracy of software maintenance task effort prediction models" IEEE Transactions on software engineering 21.8 (1995): 674-681.
[29] Samson, Bill, David Ellison, and Pat Dugard. "Software cost estimation using an Albus perceptron (CMAC)" Information and Software Technology 39.1 (1997): 55-60.
[30] Heiat, Abbas. "Comparison of artificial neural network and regression models for estimating software development effort" Information and software Technology 44.15 (2002): 911-922.
[31] Serluca, C. "An investigation into software effort estimation using a back propagation neural network" Mémoire de maîtrise, Bournemouth University, Grande-Bretagne (1995).
[32] Srinivasan, Krishnamoorthy, and Douglas Fisher. "Machine learning approaches to estimating software development effort" IEEE Transactions on Software Engineering 21.2 (1995): 126-137.
[33] Wittig, Gerhard, and Gavin Finnie. "Estimating software development effort with connectionist models" Information and Software Technology 39.7 (1997): 469-476.
[34] Schofield, Chris. "Non-algorithmic effort estimation techniques" ESERG, TR98-01 (1998).
[35] Eskandar, Hadi, et al. "Water cycle algorithm–A novel metaheuristic optimization method for solving constrained engineering optimization problems" Computers & Structures110 (2012): 151-166.
[36] David, S. "The water cycle, illustrations by John Yates" New York: Thomson Learning (1993).
[37] Mair, Carolyn, Martin Shepperd, and Magne Jørgensen. "An analysis of data sets used to train and validate cost prediction systems" ACM SIGSOFT software engineering notes. Vol. 30. No. 4. ACM, 2005.
[38] Menzies, Tim, et al. "Selecting best practices for effort estimation" IEEE Transactions on Software Engineering 32.11 (2006): 883-895.
[39] S.D. Conte, H.E. Dunsmore, and V.Y. Shen, “Software Engineering Metrics and Models”. The Benjamin/Cummings Publishing Company, Inc., 1986.
[40] Port, Dan, and Marcel Korte. "Comparative studies of the model evaluation criterions mmre and pred in software cost estimation research" Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement. ACM, 2008.
[41] Rao, B. Tirimula, et al. "A novel neural network approach for software cost estimation using Functional Link Artificial Neural Network (FLANN)" International Journal of Computer Science and Network Security 9.6 (2009): 126-131.
Citation
Zahid Hussain Wani, Kaiser Javeed Giri, Rumaan Bashir, "Improved Software Cost Estimation Model Using Cost Driver Reduction Based on Water Cycle Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.64-72, 2019.
A Novel Software Reliability Prediction Algorithm Using Fuzzy Attribute Clustering and Naïve Bayesian Classification
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.73-82, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.7382
Abstract
In current times, ubiquitous computing has given massive rise to research work in artificial intelligence, machine learning, software engineering and to research development in telecommunication, medicine, and image / audio / video processing. Due to the vastness of software being developed, software fault prediction is a very pertinent area for ensuring software quality and has so much scope to work. Machine learning now a days is one of the most promising way to deal with software fault prediction problems. The assumptions considered in a testing case need to be different from those in other testing cases because of the varying complexity of software testing. Although, there are software fault prediction models who can effectively assess software reliability in specific testing scenarios, no single model can accurately predict the fault numbers in a software in all testing conditions due to the fact that the modern software being developed are bigger and complex in both size and functions and thus, assessing the software reliability is a daunting task. Some popular approaches of Software fault prediction models use General Bayesian network and Augmented Naive Bayes classifiers, which do not impose any restriction on network architecture and are able to learn appropriate network architecture. An algorithm combining Fuzzy Attribute Clustering with Naive Bayes Classification has been worked out in this paper. The proposed Fuzzy Attribute Cluster Net Bayes (FACNB) algorithm is a machine learning-based prediction algorithm for software reliability prediction (using soft computing methods). It focusses on all data types in the area of software analytics. The prediction accuracy of the proposed algorithm shows improvement over other such algorithms.
Key-Words / Index Term
FACNB, Fuzzy Attribute Clustering, Software reliability model, Software reliability prediction, Bayes classifier, Machine learning algorithm.
References
[1] G. R. Choudhary, S. Kumar, K. Kumar, A. Mishr & C. Catal., “Empirical analysis of change metrics for software fault prediction” Journal of Computers and Electrical Engineering, Vol. 67, pp. 15-24, 2018.
[2] D. Amara & L. B. A. Rabai, “Towards a New Framework of Software Reliability Measurement Based on Software Metrics” Procedia Computer Science Vol. 109C, pp. 725–730, 2017
[3] R. Rana, M. Staron, C. Berger, J. Hansson, M. Nilsson & W. Meding, “Analyzing Defect Inflow Distribution and Applying Bayesian Inference Method for Software Defect Prediction in Large Software Projects”, Journal of Systems & Software, pp. 1-29, 2016
[4] E. Erturk & E. A. Sezer, “Iterative software fault prediction with a hybrid approach” Journal of Applied Soft Computing Vol. 49, pp. 1020–1033, 2016.
[5] P. Kumar & Y. Singh, “A study on software reliability prediction models using soft computing techniques”, Journal of Information and Communication Technology, Vol. 5(2), pp. 187-204, 2013
[6] J. Wang & C. Zhang, “Software Reliability Prediction Using a Deep Learning Model based on the RNN Encoder-Decoder”, Journal of Reliability Engineering and System Safety, pp. 1-17, 2018
[7] N. P. Padhy, R. P. Singh & S. C. Satapathy, “Software reusability metrics estimation: Algorithms, models and optimization techniques”, Journal of Computers and Electrical Engineering, pp.1-16, 2018
[8] P. Roy, G. S. Mahapatra and K. N. Dey, “Neuro-genetic approach on logistic model-based software reliability Prediction”, Journal of Expert Systems with Applications, pp. 1-10, 2015
[9] F. Febrero, C. Caler and M. Ángeles Moraga, “Software reliability modeling based on ISO/IEC SQuaRE”, Journal of Information and Software Technology, Vol. 70, pp. 18-29, 2016
[10] M. Zhu, X. Zhang & H. Pham, “A comparison analysis of environmental factors affecting software reliability”, Journal of Systems and Software, Vol. 109, pp. 150-160, 2015.
[11] N. Jazdi, N. Oppenlaender & M. Weyrich, “Quantification of the quality characteristics for the calculation of software reliability”, IFAC-PapersOnLine, Vol. 49-30, pp. 001–005, 2016
[12] D. Srdjana, C. Stipe & T. Mili, “Bayesian Network Model for Task Effort Estimation in Agile Software Development”, Journal of Systems and Software, pp. 1-16, 2017
[13] O. F. Arar & K. Ayan, “A Feature Dependent Naive Bayes Approach and its Application to the Software Defect Prediction Problem”, Journal of Applied Soft Computing, pp. 1-39, 2017
[14] I. Lakshmanan & S. Ramasamy, “An artificial neural network approach to software reliability growth Modeling”, Procedia Computer Science, Vol. 57, pp. 695 – 702, 2015.
[15] E. U. Warriach, K. Tei, “A comparative analysis of machine learning algorithms for fault’s detection in wireless sensor networks”, International Journal of Sensor Networks, Vol. 24(1), pp. 1-13, 2017
[16] J. Nagpal & A. Khuteta, “Software Fault Estimation using Fuzzy C-Means and Neuro-Fuzzy Classification”, Journal of Digital Application & Contemporary Research, Vol. 2(10), pp. 1-8, 2014
[17] Sankar, Kannan & Jennifer, “Prediction of Code Fault Using Naive Bayes and SVM Classifiers”, Journal of Scientific Research, Vol. 20 (1), pp. 108-113, 2014
[18] Pushpavathi, Suma & Ramaswamy, “Analysis of Software Fault and Defect Prediction by Fuzzy C-Means Clustering and Adaptive Neuro-Fuzzy C-Means Clustering”, Journal of Scientific & Engineering Research, Vol. 5(9), pp. 292-297, 2014
[19] M. Patel, “A Survey on Software Fault Prediction Technique based on Clustering Algorithm and Artificial Intelligence” International Journal of Innovative Research in Technology, Vol. 2 (7), pp. 623-627, 2015.
[20] S. S. Maddipati, Pradeepini, & Yesubabu, “Software Defect Prediction using Adaptive Neuro Fuzzy Interference System”, International Journal of Applied Engineering Research, 13 (1), 394-397, 2018
[21] Y. Jiang, B. Cukic, & Y. Ma, “Techniques for evaluating fault prediction models”, Empirical Software Engineering, Vol. 13(5), pp. 561–595, 2008
[22] R. Sehgal., & D. Mehrotra, “Analysis of Software Fault Prediction Metrics”, World Applied Sciences Journal, Vol. 32(3), pp. 368-378, 2014
[23] S. K. Pandey, R. B. Mishra, A. K. Tripathi, “Software Bug Prediction Prototype using Bayesian Network Classifier: A Comprehensive Model” Procedia Computer Science, 2018
[24] C. Bustamante, L. Garrido, R. Soto, “Fuzzy Naïve Bayesian Classification in RoboSoccer 3D: A Hybrid Approach to decision making”, Lecture notes in Computer Science, Vol. 4434, pp. 507-515, Springer Verlag, 2007.
[25] A. Hammouri, M. Hammad, M. Alnabhan, F. Alsarayrah, “Software Bug prediction using Machine Learning approach” International Journal of Advanced Computer Science and Applications, Vol. 9(2), pp. 78-83, 2018
[26] D. Karel, T. Verbraken & B. Baesene, “Towards comprehensible Software Fault Prediction Models using Bayesian Network Classifiers”, IEEE Transactions on Software Engineering, Vol 39(2), pp 237-257, 2013
[27] A. M. Mansour Mansour, “Decision tree-based expert system for adverse drug reaction detection using Fuzzy Logic and Genetic algorithm”, International Journal of Advanced Computer Research, Vol. 8(36), pp. 110-128, 2018
[28] K. Gusmanov, “On the adoption of neural networks in modeling software reliability”, Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering – ESEC/SIGSOFT FSE, Lake Buena Vista, Florida, USA, pp. 962-964, 2018
[29] R. Marcos de Moraes, L. S. Machado, “Simultaneous assessment of teams in collaborative virtual environments using Fuzzy Naïve Bayes” Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS 2013), Edmonton Canada, pp. 1343-1348, 2013
[30] R. Peng, Y. Li, Y. Liu, “Software Fault Detection and Correction: Modeling and Applications”, Springer Nature America Inc., Springer Verlag, 2018
[31] A. Azadeh, P. Pourreza, M. Saberi, O. Khadeer Hussain, E. Chang, “An integrated fuzzy cognitive map-Bayesian network model for improving HSEE in energy sector”, IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2017), pp. 1-7, 2017
[32] I. M. D. Aguila, “Requirement Risk level forecast using Bayesian Network Classifiers”, International Journal of Software Engineering and Knowledge Engineering, 2011
[33] S. Kumar, S. S. Rathore, “Software Fault Prediction: A roadmap”, Springer Singapore, 2018
[34] Neeta Rastogi, Shishir Rastogi, Manuj Darbari, “Survey on Software Reliability Prediction using Soft Computing” International Journal of Computer Engineering and Technology, Vol. 9(4), pp. 212-216, 2018
[35] N. K. Rao, R. M. Reddy, B. K. Rao, “Defect prediction in software entities classified in terms of level dependencies”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 1(1), pp. 20-25, 2013
[36] T. Senthilselvi, R. Parimala, “Improving clustering accuracy using Feature Extraction Method”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 6(2), pp. 15-19, 2018
Citation
Neeta Rastogi, Shishir Rastogi, Manuj Darbari, "A Novel Software Reliability Prediction Algorithm Using Fuzzy Attribute Clustering and Naïve Bayesian Classification," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.73-82, 2019.
An Insight into Educational Data Mining
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.83-90, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.8390
Abstract
Education lays foundation for the development of the country. Enhancements in the educational technologies has improved educational process. Educational institutes are now capable to store large volumes of data related to student admissions, course attendance, examination results and so forth which need to be analysed for the progress of institutes. Data mining provides techniques to explore educational data. Educational Data Mining (EDM) is such an emerging multidisciplinary research field which deals with developing methods to explore the educational data to gain knowledge. The knowledge gained can be used to improve teaching- learning process and decision making process of higher educational institutes. It also helps in detecting student behaviour and their learning outcomes which can be used for their future betterment. This paper puts forth an effort to study EDM, its environment and components including tools and techniques used. It also gives an insight into the Education Data Mining process of knowledge discovery. The present study also puts forth challenges involved in EDM which represents opportunities for future research work to be carried out.
Key-Words / Index Term
Educational Data Mining (EDM), Data Mining (DM), Knowledge Discovery, EDM process, Student performance
References
[1]. C. Romero, S. Ventura,” Data mining in education”, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, Vol.-3, Issue-1, pp. 12-27, 2013
[2]. S. R. Barahate, & M.S.Vijay, "A survey and future vision of data mining in educational field", In IEEE Advanced Computing & Communication Technologies (ACCT), Second International Conference on Advanced Computing & Communication Technologies, India, pp. 96-100, 2012.
[3]. R. S. J. d. Baker, ”Data Mining for Education”, International Encyclopaedia of Education, Elsevier, UK, 3rd ed., edited by B. McGaw, P. Peterson, and E. Baker. Oxford, 2011.
[4]. R. S. J. D. Baker, K. Yacef., “The State of Educational Data Mining in 2009: A Review and Future Visions”, Journal of Educational Data Mining, Vol. 1, Issue.1, pp. 3–17, 2009,
[5]. B. Bakhshinategh, O. R. Zaiane, S. ElAtia, D. Ipperciel, "Educational data mining applications and tasks: A survey of the last 10 years." Education and Information Technologies, Vol.23, Issue. 1, pp. 537-553, 2018.
[6]. J. Kumar, “A Comprehensive Study of Educational Data Mining”, International Journal of Electrical Electronics & Computer Science Engineering, Special Issue-TelMISR, pp. 58-63, 2015.
[7]. R. Jindal, B.M. Dutta, “A Survey on Educational Data Mining and Research Trends”, International Journal of Database Management Systems (IJDMS), Vol. 5, Issue-3, pp. 53-73, 2013.
[8]. C. Romero,” Educational Data Mining: A Review of the State of the Art”, IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, Vol. 40, Issue- 6, pp. 601-618, NOVEMBER 2010.
[9]. C. Romero , S. Ventura, “Educational data mining: A survey from 1995 to 2005”, Expert Systems with Applications, Volume- 33, pp. 135–146, 2007.
[10]. D Baker, S.J. Ryan, "Mining data for student models.", In Advances in intelligent tutoring systems, Springer, Berlin, Heidelberg, pp. 323-337, 2010.
[11]. S.J Ryan, D. Baker, “Learning analytics and educational data mining”, Proceedings of the 2nd International Conference on Learning Analytics and Knowledge - LAK `12, Year-2012
[12]. M. Anoopkumar, A. M. J. M. Z. Rahman, “A Review on Data Mining Techniques and Factors Used in Educational Data Mining to Predict Student Amelioration”, Proceedings of 2016 International Conference on Data Mining and Advanced Computing, SAPIENCE, pp. 122-133,2016.
[13]. G. Siemens, R.S.J.D Baker. "Learning analytics and educational data mining: towards communication and collaboration." In Proceedings of the 2nd international conference on learning analytics and knowledge, pp. 252-254, ACM, 2012.
[14]. A. Algarni, “Data mining in education", International Journal of Advanced Computer Science and Applications, Vol. 7, Issue. 6, pp. 456-461, 2016.
[15]. J. Han, J. Pei, M. Kamber, “Data mining: concepts and techniques”, Elsevier, 2011.
[16]. K. Rangra, K. L. Bansal. "Comparative study of data mining tools", International journal of advanced research in computer science and software engineering, Vol. 4, Issue 6, pp. 216-223, 2014.
[17]. H.A.A. Hamza, P. Kommers, ”A Review of Educational Data Mining Tools & Techniques”, International Journal of Educational Technology and Learning, Vol. 3, Issue 1, pp. 17-23, 2018.
[18]. Dakić Dušanka, Stefanović Darko, Sladojević Srdjan, Arsenović Marko, Lolić Teodora , “A Comparison of Contemporary Data Mining Tools”, XVII International Scientific Conference on Industrial Systems (IS`17) Novi Sad, Serbia, October 4 – 6, 2017.
[19]. J. Srivastava, A. K. Srivastava, “Data Mining in Education Sector: A Review”, Special Conference Issue, National Conference on Cloud Computing & Big Data,India, pp 184-190, 2013.
[20]. R. Llorente, M. Morant. "Data mining in higher education", In New fundamental technologies in data mining. InTech, 2011
[21]. O. Moscoso-Zea,S. Luján-Mora, A. Sampedro, “Datawarehouse design for educational data mining”, IEEE 15th International Conference on Information Technology Based Higher Education and Training (ITHET 2016), Istanbul, Turkey, pp. 1-6, 2016.
[22]. E. García, C. Romero, S. Ventura, C. De Castro. "A collaborative educational association rule mining tool", The Internet and Higher Education, Vol. 14, Issue. 2, pp. 77-88, 2011.
[23]. A. Peña-Ayala, “Educational data mining: applications and trends”, Vol. 524, Springer, 2013
[24]. A. Dutt, M.A. Ismail, T.Herawan, "A systematic review on educational data mining", IEEE Access, Vol. 5, pp. 15991-16005, 2017.
[25]. S. L. Prabha, A.R.M. Shanavas, “Elate – A New Student Learning Model Utilizing EDM for Strengthening Math Education”, International Journal of Computer Sciences and Engineering, Vol. 4, Issue. 3, pp. 10-14, 2016.
Citation
Balwinder Kaur, Anu Gupta, R.K.Singla, "An Insight into Educational Data Mining," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.83-90, 2019.
Content-Based Image Retrieval Using Extended Local Tetra Patterns
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.91-96, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.9196
Abstract
In this modern world, finding the desired image from huge databases has been a vital problem. Content Based Image Retrieval is an efficient method to do this. Many textures based CBIR methods have been proposed so far, for better and efficient image retrieval. We aim to give a better image retrieval method by extending the Local Tetra Patterns (LTrP) for CBIR using texture classification by using extended version of LTrP. These features give additional information about the color and rotational invariance. So an improvement in the efficiency of image retrieval using CBIR is expected.
Key-Words / Index Term
Local binary Patterns, Content Based Image Retrieval (CBIR), Local Ternary Patterns (LTP), Local Tetra Patterns (LTrP), Extended Local Tetra Pattern (ELTrP), Histogram Equalization
References
[1] E. Hayman, B. Caputo, M. Fritz, and J.-O. Eklundh, “On the significance of real-world conditions for material classification," in European conference on computer vision. Springer, 2004, pp. 253-266.
[2] J. Sivic and A. Zisserman, “Video google: A text retrieval approach to object matching in videos," in Ninth IEEE International Conference on Computer Vision (ICCV 2003) 2003, p. 1470.
[3] H. Jegou and O. Chum, “Negative evidences and co-occurrences in image retrieval: The benefit of pca and whitening," in European conference on Computer Vision-ECCV 2012. Springer, 2012, pp. 774-787.
[4] Y. Rui, T. S. Huang, and S.-F. Chang, “Image retrieval: Current techniques, promising directions, and open issues," Journal of visual communication and image representation, vol. 10, no. 1, pp. 39-62, 1999.
[5] A. W. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain, “Content based image retrieval at the end of the early years," IEEE Transactions on Pattern Analysis & Machine Intelligence, no. 12, pp. 1349-1380, 2000.
[6] O. Marques and B. Furht, “Content-based image and video retrieval. Springer Science & Business Media, 2002, vol. 21.
[7] A. Diaz, “Through the google goggles: Sociopolitical bias in search engine design," in Web search. Springer, 2008, pp. 11- 34.
[8] A. J. Afifi and W. M. Ashour, “Image retrieval based on content using color feature," International Scholarly Research Notices, vol. 2012, 2012.
[9] S. Banerji, A. Verma, and C. Liu, “Novel color lbp descriptors for scene and image texture classification," in Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV). Citeseer, 2011, p. 1.
[10] J. R. Smith and S.-F. Chang, “Tools and techniques for color image retrieval," in Storage and Retrieval for Still Image and Video Databases IV, vol. 2670 International Society for Optics and Photonics, 1996, pp. 426-438.
[11] R. Polana and R. Nelson, “Temporal texture and activity recognition" in Motion-based recognition. Springer, 1997, pp. 87-124.
[12] R. C. Nelson and R. Polana, “Qualitative recognition of motion using temporal texture," CVGIP: Image understanding, vol. 56, no. 1, pp. 78-89, 1992.
[13] T. Ojala, M. Pietikainen, and D. Harwood, “A comparative study of texture measures with classification based on featured distributions," Pattern recognition, vol. 29, no. 1, pp. 51-59, 1996.
[14] T. Leung and J. Malik, Representing and recognizing the visual appearance of materials using three-dimensional textons," International journal of computer vision, vol. 43, no. 1, pp. 29-44, 2001.
[15] A. K. Jain and F. Farrokhnia, “Unsupervised texture segmentation using gabor filters," Pattern recognition, vol. 24, no. 12, pp. 1167-1186, 1991.
[16] S. Murala, R. Maheshwari, and R. Balasubramanian, “Local tetra patterns: a new feature descriptor for content-based image retrieval," IEEE Transactions on Image Processing, vol. 21, no. 5, pp. 2874-2886, 2012.
[17] B. Zhang, Y.Gao “Local Derivative Pattern Versus Local Binary Pattern: Face Recognition With High-Order Local Pattern Descriptor” IEEE Transactions on Image Processing, vol. 19, no. 2, pp. 533-544, 2010.
[18] Priyanka R R, Mahesh M, Pallavi S S, Jayapala G and Pooja M R “Crop Protection by an alert Based System using Deep Learning Concept,” International Journal of Scientific Research in Computer Science and Engineering, vol 6, no 6, 2018.
[19] R. Zade, N. Khadgi, M. Kasbe and T. Mujawar “Online Garbage Monitoring System Using Arduino and LabVIEW,” International Journal of Scientific Research in Computer Science and Engineering, vol 6, no 6, 2018.
Citation
Deepika Choudhary, Amit, Suraj malik, Pankaj Pratap Singh, "Content-Based Image Retrieval Using Extended Local Tetra Patterns," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.91-96, 2019.
Predictive Analysis on Heart Disease Using Different Machine Learning Techniques
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.97-101, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.97101
Abstract
Heart Disease is the one of the major cause of death especially in developed countries. Some of its types include Arrhythmia, Stroke, High Blood pressure, Cardiac Arrest etc. Thus to help clinicians for early diagnose disease related conditions, some medical decision support system are also designed. Data mining plays an essential role in analyzing huge amount of data. These quick predicting techniques helps medical practitioners to analyze the same. Classification is the most common Machine Learning algorithm used to classify the disease/non-disease patient. In this paper we will analyze and predict the occurrence of heart disease by applying some of the machine learning algorithms like K-Nearest Neighbor , Decision Trees , Random Forest , Adaptive boosting, SVM and Logistic Regression. It will help physicians to estimate the risk in different age groups. The dataset used is taken from Heart Disease database of UCI Machine Learning Datasets. Factors like blood pressure, heart rate, sugar level, cholesterol, age, gender etc. highly affects the result of the algorithm. The accuracy has been improved by working on high-contributing attributes found using feature importance technique.
Key-Words / Index Term
Heart Disease, Predictive Analysis, Data Mining, SVM, Classification, Decision Tree
References
[1] Sellappan Palaniappan, Rafiah Awang, "Intelligent Heart Disease Prediction System Using Data Mining Techniques", (IJCSNS), Vol.8 No.8, August 2008.
[2] Amit Kamra, Jagdeep Singh, Harbhag Singh, “Prediction of Heart Diseases Using Associative Classification”, International Conference on Wireless Networks and Embedded Systems, pp.1-7, 2016.
[3] M. Sultana, A. Haider and M. S. Uddin, "Analysis of data mining techniques for heart disease prediction," 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), Dhaka, 2016, pp. 1-5
[4] R, J. Thomas, Theresa Princy, “Human Heart Disease Prediction System using Data Mining Techniques”, In the Proceedings of the 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) ,pp.1-5
[5] Prof. Dhomse Kanchan B. ,Mr. Mahale Kishor M. “Analysis of Supervised Machine Learning Algorithms for Heart Disease Prediction with Reduced Number of Attributes using Principal Component Analysis”, International Journal of Computer Applications (0975 – 8887) ,Volume 140 – No.2, April 2016
[6] Mrs.S.Radhimeenakshi, “Classification and Prediction of Heart Disease Risk Using Data Mining Techniques of Support Vector Machine and Artificial Neural Network” IEEE-2016.
[7] T. J. Peter and K. Somasundaram, "An empirical study on prediction of heart disease using classification data mining techniques," IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012), Nagapattinam, Tamil Nadu, 2012, pp. 514-518.
[8] Sana Bharti Dr.Shaliendra Narayan Singh, “Analytical Study of heart Disease Prediction Comparing with different algorithms”, , Proceedings published by IEEE Xplore Digital Library 1st International Conference on Computing, Communication and Automation (ICCA-2015), Greater Noida, India,pp-1-12.
[9] Monika Gandhi, Dr. Shailendra Narayan Singh “Predictions in Heart Disease Using Techniques of Data Mining” 2015 IEEE.
[10] AH Chen,SY Huang,PS Hong,CH Cheng,EJ Lin, “HDPS:Heart Disease Prediction System”,Computing in Cardiology 2011, Department of Medical Informatics,Tzu Chi University,Hualien City,Taiwan.
[11] Wu R, Peters W, Morgan MW. The next generation clinical decision support: linking evidence to best practice. J Healthc Inf Manag, 2002;16:50-5
[12] Ho, T. J.: “Data Mining and Data Warehousing”, Prentice Hall, 2005.
[13] Giudici, P.: “Applied Data Mining: Statistical Methods for Business and Industry”, New York: John Wiley, 2003.
[14] M.C. Tu and D. Shin, “Effective diagnosis of heart disease through bagging approach,” IEEE 2nd Int. Conf. on Biomedical Engineering and Informatics `09, Tianjin, China, 2009, pp. 1-4.
[15] W. Li, J. Han, J. Pei, “CMAR: Accurate and efficient classification based on multiple class association rules,” in Proc. of IEEE Int. Conf. on Data Mining, Washington, DC, USA, 2001, pp. 369–376.
[16] Beant Kaur h, Williamjeet Singh, “Review on Heart Disease Prediction System using Data Mining Techniques”, International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 2 Issue: 10, pp.3003-08,October 2014.
Citation
Niraj Kalantri, Kumar R, "Predictive Analysis on Heart Disease Using Different Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.97-101, 2019.
Experimental and Regression Analysis on Human Hair Fibered Concrete
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.102-105, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.102105
Abstract
Everywhere throughout the world part of waste materials is making issue as far as contamination and different issues. So is the human hair, hairdressers trim the hair of individuals and discard in sewage channels or some stream or in open, this straightforwardly influences human solace by blocking channel pipes or making contamination of land or water and even in some cases amid blowing air causes air contamination too. To acquire this waste material into utilization this examination the human hair is included in conventional concrete with no substitution. Five distinct rates of human hair by weight of cement are utilized. Human hair is effectively accessible wherever free of cost henceforth not any more additional expense is used. Human hair utilized in the concrete was right off the bat cleaned by evacuating additional rubbish and was then washed in a container utilizing cleanser at that point dried and utilized in concrete. We as a whole realize that the concrete is good in compression and weak in tension and the beneficial thing on utilizing hair in cement is that, on investigations it was discovered that the compressive quality of the solid increments on expanding the level of human hair and it was additionally discovered that the rigidity of the mortar increments by including human hair in cement. Furthermore regression examination was done on the outcomes got to fine the numerical condition which can be utilized in future to know the quality.
Key-Words / Index Term
Waste material, human hair, compressive strength, tensile strength, regression analysis
References
[1]. Nila, V. M., Raijan, K. J., *Susmitha Antony, Riya Babu M. and Neena Rose Davis (2015) [5] stated that Human hair waste can be effectively managed to be utilized in fibre reinforced concrete constructions.
[2]. Khansaheb A. P.(2015) Experimental Investigation on Properties of Concrete Using Human Hair & Sugarcane Bagasse Ash, Volume 2, Issue 5.
[3]. Jain D. and Kothari A (2012), “Hair Fiber Reinforced Concrete”, Research Journal of Recent Sciences ISSN 2277 – 2502 Vol. 1(ISC-2011), PP.128-133
[4]. Riya Babu M, Neena Rose Davis(2015),“Hair Fibre Reinforced Concrete”, International Journal of Research in Advent Technology (E-ISSN: 2321-9637).
[5]. Dr. R.C.Reddy and Shweta kaushik (2015), “An Experimental Study on Mechanical Properties of Human Hair Fibre Reinforced Concrete (M-40 Grade)”, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684.
[6]. Vinayak Awasar, Prof. M. V. Nagendra (2014), “Analysis of Strength Characteristic of GGBS Concrete”. International Journal of Advanced Engineering Technology ,E-ISSN 0976-3945.
[7]. Meghwar S.L., Kheskheli G.B., Kumar Aneel, Mahar R.B., “Recycling of Human Scalp Hair as Environmental Friendly Material in Cement Concrete”; In: Harijan, K. ed., Proceedings of the 4th International Conference on Energy, Environment and Sustainable Development, Mehran UET Jamshoro, Sindh, Pakistan: Energy and Environment Engineering Research Group, November 01-03, 2016, Paper ID: EESD_2016_54.
[8]. G. Sreevani, Smt.B. Ajitha, “Human hair as fiber reinforcement in concrete”, IJESC volume 7 (2017) Issue No. 5. Pp. 11358-11364.
[9]. Colin D. Johnston, “Fiber reinforced cements and concretes” Advances in concrete technology volume 3 – Gordon and Breach Science publishes – 2001.
[10]. Satyanarayana K.G., Sukumaran K., Mukherjee P.S., Pavithran C., Pillai S.G.K., (1990). Natural Fiber-Polymer Composites, Cement and Concrete Composites 12 (2), pp. 117-136.
[11]. C. Selin Ravikumar1*, Dr. V. Ramasamy2 , Dr. T.S. Thandavamoorthy3 “Effect of Fibers In Concrete Composites, ISSN 0973-4562 Volume 10, Number 1 (2015) pp. 419-430”
[12]. Ajna Manaf, Adarsh M V, Alphy Jomichan George, M Varghese, “Human Hair Fibre Reinforced Concrete” International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 6 Issue 03, March-2017, pp. 460-465.
Citation
Nadeem Gulzar Shahmir, "Experimental and Regression Analysis on Human Hair Fibered Concrete," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.102-105, 2019.
Classification of Breast Cancer Proteins Using DRNN Method
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.106-109, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.106109
Abstract
Classification of large amount data is one of the major difficult tasks in data science. This problem can be solved by using deep learning techniques like CNN and RNN. In computational bio informatics, protein sequence classification plays a crucial role to determine the accuracy. The proposed approach uses the RNN based architecture with GRU, LSTM, and basic LSTM and find the accuracy of training data and testing data by considering mean value of three methods. In this method the top fifteen proteins which are obtained by using preprocessing and sequence analyzer methods as one set of input and TCGA breast cancer dataset as second input to this proposed method. Every sequence in test dataset will compare with sequences in train dataset to get accurate classification results. Supervised learning requires complete labeled data where as unsupervised learning requires unlabelled data. In this approach semi supervised learning is used to get high throughput.
Key-Words / Index Term
Deep Learning, Accuracy, Protein Sequence, Classification
References
[1] A. Bhola, S. K. Yadav, A. K. Tiwari, Machine Learning Based Approach For Protein Function Prediction Using Sequence Derived Properties, International Journal Of Computer Applications 105 (12).
[2] ABDALRAOUF HASSAN,AUSIF MAHMOOD,” Convolutional Recurrent Deep Learning Model For Sentence Classification”, VOLUME XX, 2017, 2169-3536,IEEE,2017
[3] B Madhav Rao, V Srinivasa Rao,” Preprocessing Of Breast Cancer Protein Expressions Using Correlation Co-Efficient Factors”, JASC: Journal Of Applied Science And Computations, Volume VI, Issue I, January/2019,Pp. 2198-2207,2019
[4] Chaitanya Gupte and Shruti Gadewar, “Diagnosis of Parkinson’s Disease using Acoustic Analysis of Voice”, International Journal of Scientific Research in Network Security and Communication, Vol 5, Issue 3, pp.14-18, June 2017
[5] Dr. S.Vijayarani And Ms. S.Deepa,” PROTEIN SEQUENCE CLASSIFICATION IN DATA MINING– A STUDY”, International Journal Of Information Technology, Modeling And Computing (IJITMC) Vol. 2, No.2, May 2014
[6] Deepika mallampati,”An efficient spam filtering using supervised learning techniques”, International Journal of Scientific Research in Science and Engineering, vol.6 ,issue.2 , pp. 33-37, April 2018.
[7] H. Nielsen, S. Brunak, G. Von Heijne, Machine Learning Approaches For The Prediction Of Signal Peptides And Other Protein Sorting Signals, Protein Engineering 12 (1) Pp:3–9, 1999.
[8] I. Krasteva, N. Inglis, F. Sacchini, R. Nicholas, R. Ayling, C. Churchward, Et Al., Proteomic Characterisation Of Two Strains Of Mycoplasma Mycoides Subsp. Mycoides Of Differing Pathogenicity, J Proteomics Bioinform S 13, 2014 .
[9]Matthew D. Zeiler And Rob Fergus,” Visualizing And Understanding Convolutional Networks”, D. Fleet Et Al. (Eds.): ECCV 2014, Part I, LNCS 8689, Pp. 818–833, 2014. ,Springer International Publishing Switzerland 2014.
[10] P. Johansson, M. Ringner, Classification Of Genomic And Pro- ´ Teomic Data Using Support Vector Machines, In: Fundamentals Of Data Mining In Genomics And Proteomics, Springer, Pp. 187–202, 2007.
[11] S. Saha, R. Chaki, Application Of Data Mining In Protein Sequence Classification, Arxiv Preprint Arxiv:1211.4654.
[12] Sofia Edström Josefin Ondrus,” Sequence Classification Applied To User Log Data”,Pp.9-12,2016,SOFIA EDSTRÖM, JOSEFIN ONDRUS, June 2017.
[13] Timothy K. Lee, Tuan Nguyen,” Protein Family Classification With Neural Networks”, Pp: 1-9.
[14] Xingyou Wang , Weijie Jiang , Zhiyong Luo,” Combination Of Convolutional And Recurrent Neural Network For Sentiment Analysis Of Short Texts”, Proceedings Of COLING 2016, The 26th International Conference On Computational Linguistics: Technical Papers, Pages 2428–2437, Osaka, Japan, December 11-17 2016.
[15]Y. Lecun, Y. Bengio, G. Hinton, “Deep Learning”, Nature International Journal of Science,521 (7553) (2015) pp. 436-444, 2015.
Citation
B Madhav Rao, V Srinivasa Rao, K Srinivasa Rao, "Classification of Breast Cancer Proteins Using DRNN Method," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.106-109, 2019.
Multi - Objective Genetic Algorithm based Study for Energy Efficient Routing in MANET
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.110-114, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.110114
Abstract
Mobile Ad hoc Networks (MANET) possess dynamic topology and have no fixed infrastructure. Numerous challenges in routing in MANETs exist because of its frequent and unpredictable topology. One of the major constraints in designing of these protocols is the battery power. Various routing protocols have been implemented for finding optimal path from source to destination considering the cost and efficient use of energy. This paper explores different types of routing protocols, their merits and demerits, approach of routing protocols and implementation of one such energy efficient routing protocol technique using Genetic Algorithm to determine the shortest path between the source and the destination. Routing protocols based on Genetic Algorithm gives us the insight that how the concepts of genetics are applied to MANETs and is used to determine an optimal route taking into account the optimization of battery power. Genetic Algorithm takes less computational time, provides multiple optimal paths in case of failure of one path as well as increases the throughput of the network. In addition it covers the significance of Genetic Algorithm in MANETs.
Key-Words / Index Term
Mobile Ad hoc Network (MANET), Routing Protocol, Efficient Routing Protocols, Genetic Algorithm(GA)
References
[1] Arun Biradar, Ravindra C. Thool, Vijaya R. Thool, “Genetic Algorithm Based Unipath and Multipath Intelligent Routing for Mobile Ad-hoc Networks”, International Journal of Advances in Computer Science and Technology, Vol.3, Issue.4, pp.276-282, 2014.
[2] Shipra Gautam, Rakesh Kumar, “A Review of Energy-Aware Routing Protocols in MANETs”, International Journal of Modern Engineering Research, Vol.2, Issue.3, pp.1129-1133, 2012.
[3] Upasna, Jyoti Chauhan, Manisha, “Minimized Routing Protocol in Ad-Hoc Network with Quality Maintenance Based on Genetic Algorithm: A Survey”, International Journal of Scientific and Research Publications, Vol.3, Issue.1,pp.1-5, 2013.
[4] Anjum Asma, Gihan Nagib, “Energy Efficient Routing Algorithms for Mobile Ad Hoc Networks –A Survey”, International Journal of Emerging Trends & Technology in Computer Science, Vol.1, Issue.3, pp.218-222, 2012.
[5] N. Kumar, Dr.C.Suresh, Gnana Dhass, “Power Aware Routing Protocols in Mobile Adhoc Networks-Survey”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2, Issue.9, pp.121-128,2012.
[6] Ravi G, Reemlus Jacob D, “Energy Aware Routing For Ad-hoc Networks Using Dynamic Path Switching”, International Journal of Ad hoc, Sensor & Ubiquitous Computing, Vol.5, Issue.3, pp.1-11, 2014.
[7] Kewal Vora, Jugal Shah, Shreyas Parmar, Shivani Bhattacharjee “MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.26-31 2015.
[8] N. Kohila, R. Gowthami, “Routing Protocols in Mobile Ad-Hoc Network”, International Journal of Computer Science and Mobile Computing, Vol.4, Issue.1, pp.159-167, 2015.
[9] Sonam Jain, Sandeep Sahu, “The Application of Genetic Algorithm in the design of Routing Protocols in MANETs: A Survey”, International Journal of Computer Science and Information Technologies, Vol.3, Issue.3, pp.4318-4321, 2012.
[10] Sumathy S, Sri Harsha E, Yuvaraj Beegala, “Survey of Genetic Based Approach for Multicast Routing in MANET”, International Journal of Engineering and Technology, Vol.4, Issue.6, pp.474-485, 2013.
[11] Lubdha M. Bendale, Roshani. L. Jain, Gayatri D. Patil, “Study of Various Routing Protocols in Mobile Ad-Hoc Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.1-5, 2018.
[12] Rajeev Ranjan, P.J. Pawar, “Assembly Line Balancing Using Real Coded Genetic Algorithm”, International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.4, pp.1-5, 2014.
Citation
Arpit Kumar Jain, Manish Kumar, "Multi - Objective Genetic Algorithm based Study for Energy Efficient Routing in MANET," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.110-114, 2019.
Hiding Sensitive Itemsets at Multiple Support Thresholds without Side Effects
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.115-120, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.115120
Abstract
Mining Frequent pattern is a common technique of data mining and used as a preliminary step to mine association rules. Some frequent patterns are sensitive as they may disclose confidential information to adversaries and needs to be hidden in the data before sharing. Many of the existing techniques hide sensitive itemsets at a single sensitive support threshold. Also, these techniques generate various side effects and suffer from unexpected information loss. In this paper, a novel approach to hide sensitive itemsets at multiple sensitive support thresholds is proposed. The database is modeled as a set of closed itemsets which are selectively sanitized to hide sensitive itemsets. The proposed Recursive Pattern Sanitization algorithm for Personalized Itemsets Hiding (RPS-PIH) sanitizes the closed itemsets to hide sensitive itemsets at multiple sensitive support thresholds without generating any side effects. The sanitized model represents privacy preserved patterns of the database which may be shared to the third party for further data analysis without disclosing private information. Experimental results indicate that the proposed approach is efficient in hiding sensitive itemsets at multiple sensitive support thresholds. The effectiveness of the proposed approach is measured using popular metrics for side effects and information loss. The proposed approach is effective in reducing information loss and eliminating the generation of side effects compared with existing state-of-the-art techniques.
Key-Words / Index Term
Itemset Hiding, Multiple Support Threshold, Privacy Preserved Data Publishing (PPDP), Personalized Privacy Preservation, Pattern Sharing, Pattern Sanitization, Sensitive Knowledge
References
[1] Clifton C, Marks D, “Security and privacy implications of data mining”. In Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, pp 15-19, 1996.
[2] Clifton C, Kantarcioglu M, Vaidya J, “Defining privacy for data mining”. National Science Foundation Workshop on Next Generation Data Mining (WNGDM), pp 126-133, 2002.
[3] Agrawal R and Srikant R, "Privacy-preserving data mining".In Proceedings of the ACM SIGMOD, ACM: 439-450, 2000.
[4] S. Sathyamoorthy, "Data Mining and Information Security in Big Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.86-91, 2017.
[5] G. Pannu, S. Verma, U. Arora, and A. K. Singh, "Comparison of various Anonymization Technique", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.16-20, 2017
[6] Agrawal R, Srikant R, "Fast algorithms for mining association rules in large databases". In Proceedings of the20th International Conference on Very Large Databases, pp. 487-499, 1994.
[7] Bodon F, “A fast APRIORI implementation”. Workshop Frequent Itemset Mining Implementations (FIMI03), vol.90, pp. 56-65, 2003.
[8] Brijs, T., Swinnen, G., Vanhoof, K., Wets, G., “Using association rules for product assortment decisions: a case study”. In Knowledge Discovery and Data Mining, pp.254-260, 1999.
[9] Zheng Z, Kohavi R, Mason L, “Real world performance of association rule algorithm”. In Proceedings of 7thACM-SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 401-406, 2001.
[10] Atallah M, Bertino E, Elmagarmid A, Ibrahim M, Verykios VS, “Disclosure limitation of sensitive rules”. In Workshop on Knowledge and Data Engineering Exchange, pp. 45-52, 1999.
[11] Pontikakis E D, Tsitsonis A A, Verykios V S, “An experimental study of distortion-based techniques for association rule hiding”. In Proceedings of the 18th Conference on Database Security (DBSEC 2004), pp. 325-339, 2004.
[12] Dasseni E, Verykios V, Elmagarmid A, Bertino E, “Hiding association rules by using confidence and support”. In Proceedings of the 4th International Workshop on Information Hiding, IHW, pp. 369-383, 2001.
[13] Oliveira S R M, Zaiane O R, "Privacy-preserving frequent itemset mining". In Proceedings of the IEEE International Conference on Privacy, Security and Data Mining, CRPIT, pp. 43-54, 2002.
[14] Oliveira S R M, Zaiane O R, “Protecting sensitive knowledge by data sanitization”. In Proceedings of the Third IEEE International Conference on Data Mining (ICDM2003), pp. 211-218, 2003.
[15] Verykios V S, Emagarmid A K, Bertino E, Saygin Y, Dasseni E, “Association rule hiding”. IEEE Transactions on Knowledge and Data Engineering, 16(4), pp. 434-447, 2004.
[16] Wu Y H, Chiang C M, Chen A L P, “Hiding sensitive association rules with limited side effects”. IEEE Transactions on Knowledge and Data Engineering, 19(1), pp.29-42, 2007.
[17] Aniket Patel, Patel Shreya, Kiran Amin, "A Survey on Heuristic Based Approach for Privacy Preserving in Data Mining", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.21-25, 2017.
[18] Mohnish Patel, Aasif Hasan and Sushil Kumar, "A Survey: Preventing Discovering Association Rules For Large Data Base", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.35-38, 2013
[19] Moustakides G V, Verykios V S, “A max-min approach for hiding frequent itemsets”. In Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), pp. 502-506, 2006.
[20] Leloglu E, Ayav T, Ergenc B, “Coefficient-based exact approach for frequent itemset hiding”. In eKNOW2014: The 6th international conference on information, process, and knowledge management, pp. 124-130, 2014.
[21] Sun X, Yu PS, “A border-based approach for hiding sensitive frequent itemsets”. In Proceedings of the Fifth IEEE International Conference on Data Mining (ICDM2005), pp. 426-433.
[22] Sun X, Yu PS, “Hiding sensitive frequent itemsets by a border-based approach”. Computing Science and Eng.,1(1), pp. 74-94, 2007.
[23] Gkoulalas-Divanis A and Verykios VS, “An integer programming approach for frequent itemset hiding”. In Proceedings of the 15th ACM International Conference on Information and Knowledge Management, CIKM, pp.748-757, 2006.
[24] Menon S, Sarkar S, Mukherjee S, “Maximizing accuracy of shared databases when concealing sensitive patterns”. Info. Sys. Research 16, 3, pp. 256-270, 2005.
[25] Kantarcioglu M, Jin J, Clifton C, “When do data mining results violate privacy?” In Proceedings of the 10th ACMSIGKDD international conference on knowledge discovery and data mining (KDD04), pp. 599-604, 2004.
[26] Elias C. Stavropoulos, Vassilios S. Verykios, and Vasileios Kagklis. “A transversal hyper-graph approach for the frequent itemset hiding problem.” Knowledge and Information Systems 47, 3, pp. 625-645, 2016.
[27] Akbar Telikani and Asadollah Shahbahrami. “Optimizing association rule hiding using combination of border and heuristic approaches”. Applied Intelligence 47, 2, pp. 544-557, 2017.
[28] Surendra H and Mohan H S, “Hiding sensitive itemsets without side effects”. Applied Intelligence.10.1007/s10489-018-1329-5, 2018.
[29] Gkoulalas-Divanis A, Verykios VS, “Hiding sensitive knowledge without side effects”. Knowledge and Information Systems20(3), pp. 263-299, 2009.
[30] Ahmet Cumhur ztrk and Belgin Ergen Bostanolu, “Itemset Hiding under Multiple Sensitive Support Thresholds”. In Proceedings of 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2017) – vol 3: KMIS, pp, 222-231, 2017.
[31] Ztrk, Ahmet Cumhur, Belgin Ergen, “Dynamic Itemset Hiding Algorithm for Multiple Sensitive Support Thresholds”.IJDWM 14.2, pp 37-59, 2018.
[32] Mohammed J. Zaki and Ching-Jui Hsiao, “CHARM: An efficient algorithm for closed itemset mining”. In Proceedings of International Conference on Data Mining, pp. 457-473, 2002.
[33] Bayardo R, “Efficiently mining long patterns from databases”. In Proceedings of the 1998 ACM-SIGMOD International Conference on Management of Data (SIGMOD98), pp 85-93, 1998.
[34] Bertino E, Lin D, Jiang W, “A Survey of Quantification of Privacy Preserving Data Mining Algorithms”. In Aggarwal C.C., Yu P.S. (eds) Privacy-Preserving Data Mining. Advances in Database Systems, vol 34. Springer, Boston, MA, 2008.
Citation
Surendra H, Mohan H S, "Hiding Sensitive Itemsets at Multiple Support Thresholds without Side Effects," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.115-120, 2019.
FPGA Realization of PWM using HDL
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.121-125, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.121125
Abstract
Pulse Width Modulation (PWM) is an essential technique for many electrical applications. It is mainly used for controlling DC power to an electrical device. It can be used in applications where its duty cycle is used to convey information over a communication channel. Though many software designs and hardware models are available for PWM, FPGA modules are reliable in terms of speed and complexity. Hardware optimization is possible in FPGAs. Hence work is focused to realize the PWM on FPGA. In this paper hardware model of PWM using HDL is presented. This model is designed using VHDL and implemented on VIRTEX FPGA Device. Simulation is carried using Xilinx ISE. The RTL Design is synthesized using Xilinx XST and the generated bit stream file is implemented on Virtex FPGA board.
Key-Words / Index Term
PWM, RTL, VHDL, FPGA
References
[1] Srivastava, Rohan, Yogesh K. Chauhan, and Bhavnesh Kumar. "Generation of PWM using verilog In FPGA." In h, Electronics, and Optimization Techniques (ICEEOT), International Conference on, pp. 4593-4597. IEEE, 2016.
[2] Barr, Michael. "Pulse width modulation." Embedded Systems Programming 14, no. 10 (2001): 103-104.
[3] Holmes, D. Grahame, and Thomas A. Lipo. Pulse width modulation for power converters: principles and practice. Vol. 18. John Wiley & Sons, 2003.
[4] Sun, Jian. "Pulse-width modulation." In Dynamics and Control of Switched Electronic Systems, pp. 25-61. Springer London, 2012.
[5] Loh, Poh Chiang, D. Mahinda Vilathgamuwa, Yue Sen Lai, Geok Tin Chua, and Yunwei Li. "Pulse-width modulation of Z-source inverters." In Industry Applications Conference, 2004. 39th IAS Annual Meeting. Conference Record of the 2004 IEEE, vol. 1. IEEE, 2004.
[6] Henze, C. P., H. C. Martin, and D. W. Parsley. "Zero-voltage switching in high frequency power converters using pulse width modulation." In Applied Power Electronics Conference and Exposition, 1988. APEC`88. Conference Proceedings 1988., Third Annual IEEE, pp. 33-40. IEEE, 1988.
[7] Doherty, Donald B., Robert J. Gove, Mark L. Burton, and Rodney D. Miller. "Pulse width modulation for spatial light modulator with split reset addressing." U.S. Patent 5,497,172, issued March 5, 1996.
[8] Tew, Claude E. "Analog pulse width modulation cell for digital micromechanical device." U.S. Patent 6,466,358, issued October 15, 2002.
[9] Jacobina, Cursino Brandão, AM Nogueira Lima, Edison Roberto Cabral da Silva, Raimundo Nazareno Cunha Alves, and Paulo Fernando Seixas. "Digital scalar pulse-width modulation: a simple approach to introduce nonsinusoidal modulating waveforms." IEEE Transactions on Power Electronics 16, no. 3 (2001): 351-359.
[10] Arrillaga, J., Y. H. Liu, and N. R. Watson. "Pulse Width Modulation." Flexible Power Transmission: The HVDC Options: 127-140.
[11] Trzynadlowski, Andrzej M., Stanislaw Legowski, and R. LYNN KIRLIN. "Random pulse-width modulation technique for voltage-controlled power inverters." International Journal of Electronics Theoretical and Experimental 68, no. 6 (1990): 1027-1037.
[12] M.Vidhya Lakshmi, P.Radha, "An Enlarged and efficient Hash-tagger++ Framework for News Stream in Social Tagging issues", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.6, pp.1-11, 2018.
[13] Kumar R., "Candidate Job Recommendation System", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.6, pp.12-15, 2018.
[14] Mutkule Prasad R., "Interactive Clothing based on IoT using QR code and Mobile Application", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.6, pp.1-4, 2018.
[15] R. Zade, N. Khadgi, M. Kasbe, T. Mujawar, "Online Garbage Monitoring System Using Arduino and LabVIEW", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.6, pp.5-9, 2018.
Citation
V.V.S.Vijaya Krishna, "FPGA Realization of PWM using HDL," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.121-125, 2019.