Evaluating and Designing a Secure Text-Based CAPTCHA and Picture Password for Online Examinations
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.60-67, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.6067
Abstract
Online Examination System is a software solution, which allows any industry or institute to arrange, conduct and manage examinations via an online environment. It can be done through the Internet/Intranet and/ Local Area Network environments. Problems arising from human hacking or technical difficulties may lead to questioning of reliability and efficiency of the online exams. The system architecture proposed in this paper provides integrated management of passwords that prevent unauthorized access by the other users who nowadays are a havoc for security of the portals. In this paper, the combination of CAPTCHA and picture password system is proposed which improved the capability of resistance to the attack by malicious programs. CAPTCHAs are used to improve the security of Internet based applications in order to ensure that a web based application which is intended to be used by a human being is not maliciously used by Artificially Intelligent programs called bots. Graphical passwords, which consist of clicking on images rather than typing alphanumeric strings, may help to overcome the problem of creating secure and memorable passwords. Our results showed that this combination is practical in the aspects of security and usability.
Key-Words / Index Term
CATCHA, Online Exam Portal, Picture Password, Security
References
[1]. Tugrul.Tasci, Parlek,. Z., Kiber, A., Tasbasi, M., and Cebeci, H.I. “A Novel Agent Supported Academic Online Examination System”. Educational Technology and Society. Vol.17, Issue. 1pp. 154-168, 2014
[2]. Gawali, R. D., &Meshram, B. B. “Agent-based autonomous examination systems.” In the Proceedings of the International Conference on Intelligent Agent & Multi-Agent Systems.pp 1-7. 2009.
[3]. Tallent. Runnels, M. K., Thomas, J. A., Lan, W. Y., Cooper, S., Ahern, T. C., Shaw, S. M., & Liu, X. “Teaching courses online: A review of the research.” Review of Educational Research, Vol. 76, Issue. 1; 93-135. 2006.
[4]. Aye, M. M., &Thwin, M. M. T. Mobile agent based online examination system. Proceedings of the 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology . pp. 193-196. 2008.
[5]. Zhang, L., Zhuang, Y. T., Yuan, Z. M., & Zhan, G. H. “A web-based examination and evaluation system for computer education”.In the Proceedings of the Sixth International Conference on Advanced Learning Technologies. pp. 120-124. 2006.
[6]. Jung, Y. “Enhanced security for online exams using group cryptography”. IEEE. Transaction Vol. 52 Issue. 3. pp.340-349. 2009.
[7]. Freeda, A.A., Sindhu, J. M., and Sujitha, K. “Image Captcha based authentication using virtual cryptography”. International Journal of Research in Engineering and Advanced Technology.Vol. 1sssue.2. pp.2320-2322. 2013.
[8]. Yogdhar Pandey and Darshika Lothe. “Evaluating the Usability and Security of a Spelling Based Captcha System”. International Journal of Computer Science and Information Technologies. Vol. 5 Issue. 3. pp. 4728-4731. . 2014 .
[9]. Kiranjot Kaur and Sunny Behal. “Designing a Secure Text-Based CAPTCHA.” In the 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) Procedia Computer Science Vol. 57. 122 – 125. 2015
[10]. Wahid Abdul. “A study on the secure Online Examination System.” Dissertation Abstract. Division of Electrical Engineering and Computer Science. Kanawaza University. 2016.
[11]. Swapnaja Ubale, Rekha Babar, Pooja Bhise, ShubhamNehere, TanujaPawar. “Strong Security Mechanism through Two Factor Authentication Text and Graphical Password.” International Journal of General Science and Engineering Research Vol. 4 Issue. 2pp.18-21. 2018.
[12]. Tamang, Tsheten, and Pattarasinee Bhattarakosol. “Uncover impact factors of text based CAPTCHA identification.” In the 7th International Conference on Computing and Convergence Technology (ICCCT)..Pp. 556-560. 2012.
[13]. Kuo. Feng Hwang., Cian-Cih Huang, and GeengNeng Y. “A Spelling based CAPTCHA system by using click.” In the International Symposium. On Biometrics and Security Technologies (ISBAST), pp. 1-8. 2012.
[14]. Sudheer. R. G., Venkata. G.P. and Hari. V.P. “Graphical Secure Password Method against Online Password Hackers (Guessing Attacks)”. International Journal of Computer Science and Mobile Computing.Vol 2 Issue 8. pp.163-168. 2013.
[15]. Wayne J. , Gavrika. S., Korolev . V., Ayers R. and Swanstrom. R. “Picture Password: A Visual Login Terchnique for mobile devices.”in the Tech. Report. NISTIR 7030, NIST, 2003.
[16]. Wazir Zada Khan, Mohammed Y Aalsalemand Yang Xiang. “A Graphical Password Based System for Small Mobile Devices” International Journal of Computer Science Issues,Vol. 8. Issuie. 5. pp.1694-1698. 2011
[17]. Andrew, F., Pullen, Darren and Harper, Colleen. “Case study of a computer based examination system.” Australian Journal of Educational Technology. Vol. 25 Issue. 4.pp 509- 523. 2009.
[18]. Fagbola Temitayo M., Adigun Adebisi A., Oke Alice O. “Computer-Based Test (Cbt) System For University Academic Enterprise Examination” International Journal Of Scientific & Technology Research .Vol 2, Issue 8. 2013.
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
William Stalings and lawrie brown: cpmputer security:priciple and practices. Pearson education 2008.
[19]. William Stalings and Lawrie Brown . “Computer Security:Principle and Practices”. Pearson Education 2008.
[20]. Greg Mori and Malik. J. “Recognizing Objects in Adversarial Clutter:Breaking a Visual CAPTCHA” . In the IEEE Computer Society Conference: Computer Vision and pattern Recognition CVPR’03..Vol 1. June 2003.
[21]. Kumari. R and Nand P. “Performance Analysis of Existing Routing Protocols”. International Journal of Science and Engineering . Vol5 Issue 5. 2017.
[22]. Okolie. S and Adetoba.B. “Comparative Analysis of Performance Chracteristics of well known Symmetric Key Encryption Algorithms.” International Journal of Network Security and Communication. Vol4 Issue 3 pp 1-6. 2016.
Citation
Irtiqa Amin, Mohd Umar John, "Evaluating and Designing a Secure Text-Based CAPTCHA and Picture Password for Online Examinations," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.60-67, 2019.
Detection of the Sickle Cell Anaemia Disease by Simple and Efficient Way
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.68-71, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.6871
Abstract
Through the proposed method it can be clearly known that a human being (specially a human baby) is suffering from sickle cell anaemia or not by a fast and efficient way. This disease is caused by mutation of the gene controlling Beta-chain of haemoglobin (Hb). It replaces Glutamic acid (GAG) present at 6th position of the Beta-chain by Valine (GTG). The mutant haemoglobin molecule undergoes polymerization under low Oxygen tension causing the change in the shape of the RBC from biconcave disc to elongated Sickle-like structure. With the help of this test, it can be known that a human is a Mutant of this disorder or not, which can save the life of new generation.
Key-Words / Index Term
Beta chain of Haemoglobin, Glutamic acid, Valine
References
[1] Baldi P and Brunak S (1998) Bioinformatics: The Machine Learning Approach, MITPress, Cambridge, MA.
[2] Athey J, Alexaki A, Osipova E, Rostovtsev A, Santana-Quintero LV, Katneni U, Simonyan V, Kimchi-Sarfaty C (2017) A new and updated resource for codon usage tables. BMC Bioinformatics Sept 2, 2017.
[3] Chaney JL, Clark PL (2015) Roles for Synonymous Codon Usage in Protein Biogenesis. Annu Rev Biophys, 2015 Feb 26.
[4] Hecht A, Glasgow J, Jaschke PR, Bawazer LA, Munson MS, Cochran JR, Endy D, Salit M (2017) Measurements of translation initiation from all 64 codons in E.coli : Nucleic Acids Research Apr 20, 2017.
[5] Collins FS, Green ED, Guttmacher AE, Guyer MS, U.S. National Human Genome Research Institute. A vision for the future of genomics research. Nature 2003;422:835– 47.
[6] Strouse J (2016), Sickle Cell disease. Handbook of clinical Neurology 2016; 138:311-24.
[7] 7. Roses AD. Pharmacogenetics and the practice of medicine. Nature 2000;405:857.
[8] Williams RSaG.-C PJ. The genetics of cardiovascular disease: from genotype to phenotype. Dialogues in Cardiovascular Medicine 2004; 9:3–19.
[9] Guttmacher AE, Collins FS. Genomic medicine—a primer. N Engl J Med 2002;347:1512–20.
[10] Cook SA, Rosenzweig A. DNA microarrays: implications for cardiovascular medicine. Circ Res 2002;91:559 – 64.
[11] Goldsmith ZG, Dhanasekaran N. The microrevolution: applications and impacts of microarray technology on molecular biology and medicine (review). Int J Mol Med 2004;13:483–95.
[12] Napoli C, Lerman LO, Sica V, Lerman A, Tajana G, de Nigris F. Microarray analysis: a novel research tool for cardiovascular scientists and physicians. Heart 2003;89:597– 604
[13] Patino WD, Mian OY, Kang JG, et al. Circulating transcriptome reveals markers of atherosclerosis. Proc Natl Acad SciUSA 2005;102: 3423– 8.
[14] van de Vijver MJ, He YD, van’t Veer LJ, et al. A gene-expression signature as a predictor of survival in breast cancer. N Engl J Med 2002;347:1999 –2009.
[15] Bild AH, Yao G, Chang JT, et al. Oncogenic pathway signatures in human cancers as a guide to targeted therapies. Nature 2006;439: 353–7.
[16]. Berchuck A, Iversen ES, Lancaster JM, et al. Patterns of gene expression that characterize long-term survival in advanced stage serous ovarian cancers. Clin Cancer Res 2005;11:3686 –96.
Citation
Anindya Sundar De, "Detection of the Sickle Cell Anaemia Disease by Simple and Efficient Way," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.68-71, 2019.
Review of MIMO-OFDM System Using Simulink Model
Review Paper | Journal Paper
Vol.7 , Issue.3 , pp.72-75, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.7275
Abstract
Present time demands for high-speed 4G broadband wireless network is enabled by the practice of multiple antennas at both the transmitter and receiver ends. The multiple-input multiple-output MIMO transmission creates parallel channels over the same time and frequency i.e. spatial multiplexing to achieve high capacity and link reliability without the need for additional power of spectrum. Thus, MIMO transmission exploits the multipath fading mechanism to increase data rate and system capacity. However, in order for MIMO systems to function, there has to be a means of “slicing” the carrier signal into multiple subcarriers that modulate the low-frequency information data. These parallel low-rate subcarriers can then be transmitted and received via the multiple antenna configurations. Orthogonal frequency division multiplexing (OFDM) is a multicarrier modulation technique that creates these parallel sub-channels that are low-rate or narrowband in nature. By inserting cyclic prefix between the sub-channels, orthogonality is maintained and inter-symbol interference is totally eliminated. Hence, a combination of MIMO and OFDM i.e. MIMO-OFDM not only drastically improves channel capacity and data rates, it also combats frequency-selective fading thereby improving link.
Key-Words / Index Term
MIMO, OFDM, Spatial multiplexing and frequency selective fading
References
[1] H. Bölcskei and E. Zurich, “MIMO-OFDM Wireless Systems: Basic, Perspectives and Challenges”, IEEE Transaction on Wireless Communication, vol. 13, August, pp. 31-37, 2006.
[2] T.S Rappaport., “Wireless Communications Principles and Practice”, Pearson publication, India, pp 295-300, 2010.
[3] W. Li, H. Zhao, C. Zhang, L. Zhao, and R. Wang, “Generalized selecting sub-carrier modulation scheme in OFDM system,” in IEEE Int. Conference Communication Workshops, pp. 907–911, 2014
[4] Aditya K. Jagannathan, “Wireless Communication”, McGraw-Hill Publication, India,, pp. 198-221.
[5] Ravi Kumar and Rajiv Saxena, “Performance Analysis of MIMO STBC Systems with Higher Coding Rate using Adaptive Semi-blind Channel Estimation Scheme”, The Scientific World Journal, Vol.no. 1, pp. 1-17, January 2014.
[6] L. Hanzo, J. (Jos) Akhtman, L. (Li) Wang, and M. Jiang, “MIMO-OFDM for LTE, Wi-Fi, and WiMAX ”: coherent versus non-coherent and cooperative turbo-transceivers., wiley online publishers,pp 195-234 Aug.2010.
[7] M. I. Kadir, H. Zhang, S. Chen, and L. Hanzo, “Entropy Coding Aided Adaptive Subcarrier-Index Modulated OFDM,” IEEE Access, vol. 6, pp. 7739–7752, 2018.
[8] Mahdi Nassiri, Gholamreza Baghersalimi, "Comparative performance assessment between FFT-based and FRFT-based MIMO-OFDM systems in underwater acoustic communications", Communications IET, vol. 12, no. 6, pp. 719-726, 2018.
[9] W. Zhang, X.-G. Xia, and K. Ben Letaief, “Space-time/frequency coding for MIMO-OFDM in next generation broadband wireless systems,” IEEE Wireless Communication, vol. 14, no. 3, pp. 32–43, Jun. 2007.
[10] Y. Xiao, S. Wang, L. Dan, X. Lei, P. Yang, and W. Xiang, “OFDM with interleaved subcarrier-index modulation,” IEEE Communication Letters, vol. 18, no. 8, pp. 1447–1450, Aug. 2014.
[11] K. Nagarajan, V. V. Kumar, and S. Sophia, “Analysis of OFDM systems for high bandwidth application,” in 2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2), pp. 168–171, 2017.
[12] H. Bolcskei, D. Gesbert, and A. J. Paulraj, ‘On the capacity of OFDM-based spatial multiplexing systems’ IEEE Transactions on Communications, vol. 50, no.2, pp. 225– 234, 2002.
[13] S.M. Nimmagadda, "Full Code Rate Complex Non-Orthogonal STBCS for Eleven Transmit Antennas", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.21-25, 2017.
[14] R. Deshpande, DJ. Pete, "An Efficient PAPR Reduction Technique for OFDM", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.1, pp.29-33, 2017.
Citation
Amit Shivhare, Ravi Kumar, Manish K. Patidar, "Review of MIMO-OFDM System Using Simulink Model," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.72-75, 2019.
Funds Transfer Using Blockchain
Review Paper | Journal Paper
Vol.7 , Issue.3 , pp.76-79, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.7679
Abstract
Even though they are many non-profit organizations, they are still viewed as for-profit organizations, as they are run with a corporate structure. Similarly, many charity organizations are being misappropriated without as there is no way for donors to know how their money is being spent. Due to this, the needy are not receiving the full welfare. With a Charity DApp on blockchain, charity organizations can collect funds. ID can be used to register donors as well as organizations. Spending of funds is made transparent through the power of blockchain.
Key-Words / Index Term
blockchain, Smartcontracts, consensus, Dapp
References
[1]. LiuFei Chen , YuShan Li , Hong Wen , WenXin Lei , WenJing Hou ,Jie Chen Block Chain Based Secure Scheme For Mobile Communication
[2] Gareth W. Petersz ,Efstathios Panayiy Understanding Modern Banking Ledgers through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money.
[3]. Buterin, Vitalik. 2014b. A next-generation smart contract and decentralized application platform. White Paper.
[4]. Yong Yuan, Fei-Yue Wang Blockchain and Cryptocurrencies: Model, Techniques, and Applications.
[5] Du Mingxiao, Ma Xiaofeng, Zhang Zhe, Wang Xiangwei, Chen Qijun,A Review on Consensus Algorithm of Blockchain.
[6]. M. Castro and B. Liskov, "Practical Byzantine fault tolerance," in Symposium on Operating Systems Design and Implementation, 1999, pp. 173--186.
[7]. Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, Paul Rimba: A Taxonomy of Blockchain-Based Systems for Architecture Design Design process of Blockchain based system
[8]. Zibin Zheng1, Shaoan Xie1, Hongning Dai2, Xiangping Chen4, and Huaimin Wang3 :An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends.
[9]. Harry Halpin Inria , Marta Piekarska Blockstream Montral Introduction to Security and Privacy on the Blockchain
[10] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
Citation
D. Venkata Sai, A. Yeshwanth Sai, E. Koti Reddy, K. Suresh Babu, "Funds Transfer Using Blockchain," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.76-79, 2019.
Automatic Music Generation
Review Paper | Journal Paper
Vol.7 , Issue.3 , pp.80-82, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.8082
Abstract
In this paper authors describes the automatic music generation system and automatic music evaluation system. The system composes short pieces of music by choosing some factors in music, such as timbre, pitch interval, rhythm, tempo etc. The most important features of the system the music is generated according to the mood and sentiments of person. In the implemented work mode control the pitch interval and density control the rhythm of music. Neural Network Algorithm for automatic evaluation system of music. Music composition is an art, even the task of playing composed music takes considerable effort by humans. Given this level of complexity and abstractness, designing an algorithm to perform both the tasks at once is not obvious and would be a fruitless effort. In this paper authors describe new music composition by using trained music data set to extract useful music pattern and generate the music in the form of chord.In this paper also discussed about method or platform use for automatic music generation.
Key-Words / Index Term
Music Generator, Generative Model, The Restricted Boltzman Machine, MIDI file, Tensorflow
References
[1] Akshay Jakhotiya, Ketan Kulkarni, Chinmay Inamdar, Bhushan Mahajan, Alka Londhe "Automatic Subtitle Generation for English Language Videos",2018,PP No.2-6
[2] Shubham Jain; A. Pandian; “survey on automatic music generation", 2018, PP NO.2-3
[3] Briot,J.;Hadjeres, G.; and Pachet, F. 2018.DeepLearning Techniques for Music Generation Springer International Publishing.
[4] Chu, H.; Urtasun, R.; and Fidler, S. 2017. Song from PI: A musically plausible network for pop song generation. In Proc.International Conference on Learning Representations (ICLR), Workshop Track.
[5] Blaauw, M., and Bonada, J. 2017. A neural paramet
singing synthesizer. In Proc. Interspeech.
[6] Lin, J.-C., Wei, W.-L., and Wang, H.-M. DEMVmatchmaker: emotional temporal course representation and deep similarity matching for automatic music video generation. In ICASSP, 2016.
[7] Eric Malmi, Pyry Takala, Hannu Toivonen, Tapani Raiko, and Aristides Gionis. DopeLearning: A Computational Approach to Rap Lyrics Generation, arXiv :1505.04771v1 [cs.LG], 18 May 2015.
[8] Peter Potash, Alexey Romanov, Anna Rumshisky. GhostWriter: Using an LSTM for Automatic Rap Lyric Generation, proceedings of conference on Empirical Methods in NLP, 2015
[9] Margareta Ackerman and David Loker. Algorithmic Song writing with ALYSIA, arXiv:1612.01058v1 [cs.AI], 4 Dec 2016.
[10] Jukka M. Toivanen and Hannu Toivonen and Alessandro Valitutti. Automatical Composition of Lyrical Songs, in The Fourth International Conference on Computational Creativity, 2013.
[11] Automatic generation of song lyrics on a semantic domain. Journal of Artificial General Intelligence, 6(1):87–110, 2015.
[12] Dekai Wu and Karteek Addanki, Learning to Rap Battle with Bilingual Recursive Neural Networks, proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015)
[13] PhilippeHamel,SimonLemieux,YoshuaBengioandDouglasEck,”Temporal Pooling and multiscale learning for automatic annotation and ranking of Music audio”,2015,PP.No.2-4.
Citation
Lawakesh Patel, Nidhi Singh, Rizwan Khan, "Automatic Music Generation," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.80-82, 2019.
A Reckoning Analysis and Assessment of Different Supervised Machine Learning Algorithm for Breast Cancer Prediction
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.83-88, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.8388
Abstract
Throughout the 20th century, views about breast cancer have drastically changed. Breast cancer is the most common cancer in women worldwide, with nearly 1.7 million new cases diagnosed in 2012. This type of cancer is the second most common cancer overall. Our work brings out comparison based on the performance of supervised machine learning algorithms on a binary classification task. The supervised machine learning algorithms which are taken into consideration in the following work are namely Support Vector Machine (SVM), Decision Tree (DT), K Nearest Neighbour (KNN), and Naïve Bayes (NB). This paper mostly focuses on detailed analysis and comparing the performance of above-mentioned algorithms on one binary classification task by analysing the Metrics such as Accuracy, Precision, Misclassification Rate, False Positive Rate, True Positive Rate and Specificity. The main part of the project is creating a useful tool for predicting breast cancer with high accuracy before getting ill or in the initial stage of the disease. In other words, we can anticipate the future for women diseases.
Key-Words / Index Term
Machine Learning, Breast Cancer, CART, Naive Bayes, K nearest neighbors, Support Vector Machine
References
[1] Cortes C, Vapnik V. “Support-vector Networks”. Machine Learning, 20(3):pp. 273-297. 1995.
[2] P. Manoj Kumar, R. Sugumaran and D. Zerr, "A rule-based classifier using Classification and Regression Tree (CART) approach for urban landscape dynamics," IEEE International Geoscience and Remote Sensing Symposium, Toronto, Ontario, Canada, Vol.2, pp. 1193-1194, 2002
[3] A. M. Amiri and G. Armano, "Early diagnosis of heart disease using classification and regression trees," The 2013 International Joint Conference on Neural Networks (IJCNN), Dallas, TX, 2013, pp.1-4. doi: 10.1109/IJCNN.2013.6707080
[4] A. F. A. Pinem and E. B. Setiawan, "Implementation of classification and regression Tree (CART) and fuzzy logic algorithm for intrusion detection system," 2015 3rd International Conference on Information and Communication Technology (ICoICT), Nusa Dua, pp. 266-271, 2015.
[5] H. R. Bittencourt and R. T. Clarke, "Use of classification and regression trees (CART) to classify remotely-sensed digital images," IGARSS 2003. 2003 IEEE International Geoscience and Remote Sensing Symposium. Proceedings (IEEE Cat. No.03CH37477), Toulouse, Vol.6, pp. 3751-3753. 2006 doi: 10.1109/IGARSS.2003.1295258
[6] N. Bhargava, R. Purohit, S. Sharma and A. Kumar, "Prediction of arthritis using classification and regression tree algorithm," 2017 2nd International Conference on Communication and Electronics Systems (ICCES), Coimbatore,pp. 606-610. 2017.
[7] Xuegong, Zhang. "Introduction to statistical learning theory and support vector machines". Acta Automatica Sinica 26.1 (2000): pp.32-42.
[8] Weinberger, Kilian Q., John Blitzer, and Lawrence Saul. "Distance metric learning for large margin nearest neighbor classification". Advances in neural information processing systems 18(2006): pp.1473
[9] Nigel Williams and Sebastian Zander and Grenville J. Armitage. “A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification”. Computer Communication Review (2006).volume=36:pp.5-16.
[10] S. R. Safavian and D. Landgrebe, "A survey of decision tree classifier methodology," in IEEE Transactions on Systems, Man, and Cybernetics, vol. 21, no. 3, pp. 660-674, May-June 1991.
doi: 10.1109/21.97458
[11] Watson, Thomas J. . “An empirical study of the naive Bayes classifier.” (2001).
[12] Y. Huang and L. Li, "Naive Bayes classification algorithm based on small sample set," 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, Beijing, pp. 34-39. 2011 . doi: 10.1109/CCIS.2011.6045027
[13] Sanjay S Bhadoria and Rajendra Kumar Patel, “Web Text Content Extraction and Classification using Naïve Bayes Classifier Algorithm”, International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.5, pp.1-4, 2014
[14] Sona Taheri and Musa Mammadov. 2013. “Learning the naive Bayes classifier with optimization models”. Int. J. Appl. Math. Comput. Sci. 23, Vol.4 pp.787-795. (December 2013), DOI: https://doi.org/10.2478/amcs-2013-0059
[15] Zheng F., Webb G.I. (2011) “Tree Augmented Naive Bayes”. In: Sammut C., Webb G.I. (eds) Encyclopedia of Machine Learning. Springer, Boston, MA. 2011.
[16] (2011) C4.5. In: Sammut C., Webb G.I. (eds). “Encyclopedia of Machine Learning”. Springer, Boston, MA
[17] Jiang, Liangxiao et al. “A Novel Bayes Model: Hidden Naive Bayes.” IEEE Transactions on Knowledge and Data Engineering 21 ,pp.1361-1371. 2009
[18] Y. Ji, S. Yu and Y. Zhang, "A novel Naive Bayes model: Packaged Hidden Naive Bayes," 6th IEEE Joint International Information Technology and Artificial Intelligence Conference, Chongqing, pp. 484-487. 2011. doi: 10.1109/ITAIC.2011.6030379
[19] Y. Wu, "A New Instance-weighting Naive Bayes Text Classifiers," 2018 IEEE International Conference of Intelligent Robotic and Control Engineering (IRCE), Lanzhou, pp. 198-202. 2018. doi: 10.1109/IRCE.2018.8492960
[20] Imandoust, S.B. & Bolandraftar, Mohammad. (2013). “Application of K-nearest neighbor (KNN) approach for predicting economic events theoretical background”. Int J Eng Res Appl. 3.pp. 605-610. 2013.
[21] Guo G., Wang H., Bell D., Bi Y., Greer K. (2003) “KNN Model-Based Approach in Classification”. In: Meersman R., Tari Z., Schmidt D.C. (eds) On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE. OTM. Lecture Notes in Computer Science, vol. 2888. Springer, Berlin, Heidelberg. 2003.
[22] S. Sun and R. Huang, "An adaptive k-nearest neighbor algorithm," 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery, Yantai, pp. 91-94.
2010. doi: 10.1109/FSKD.2010.5569740
[23] Okfalisa, I. Gazalba, Mustakim and N. G. I. Reza, "Comparative analysis of k-nearest neighbor and modified k-nearest neighbor algorithm for data classification," 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, pp. 294-298. 2017. doi: 10.1109/ICITISEE.2017.8285514
[24] P. Surlakar, S. Araujo and K. M. Sundaram, "Comparative Analysis of K-Means and K-Nearest Neighbor Image Segmentation Techniques," 2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, 2016, pp. 96-100.
[25] K. K. Paliwal and P. V. S. Rao, "Application of k-Nearest-Neighbor Decision Rule in Vowel Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-5, no. 2, pp. 229-231, March 1983. doi: 10.1109/TPAMI.1983.4767378
[26] B. Wang, Yong Zeng and Yupu Yang, "Generalized nearest neighbor rule for pattern classification," 2008 7th World Congress on Intelligent Control and Automation, Chongqing, pp. 8465-8470. 2008.doi: 10.1109/WCICA.2008.4594258
[27] Gangadeep Kaur, Kamaldeep Kaur, “Sentiment Detection from Panjabi Text using Support Vector Machine”, International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.6, pp.39-46, 2017 .
[28] Ghattas, Badih & Ishak, Anis. (2019). “An Efficient Method for Variables Selection Using SVM-Based Criteria”. Journal of Machine Learning Research - JMLR. 2019.
[29] B. Waske and J. A. Benediktsson, "Fusion of Support Vector Machines for Classification of Multisensor Data," in IEEE Transactions on Geoscience and Remote Sensing, vol. 45, no. 12, pp. 3858-3866, Dec. 2007.
doi: 10.1109/TGRS.2007.898446
[30] G. Zhang, "A Modified SVM Classifier Based on RS in Medical Disease Prediction," 2009 Second International Symposium on Computational Intelligence and Design, Changsha, pp. 144-147. 2009. doi: 10.1109/ISCID.2009.43
[31] .M. Sewak, P. Vaidya, C. Chan and Zhong-Hui Duan, "SVM Approach to Breast Cancer Classification," Second International Multi-Symposiums on Computer and Computational Sciences (IMSCCS 2007), Iowa City, IA, pp.32-37. 2017 .
[32] M. Ma, Z. Gao, J. Wu, Y. Chen and X. Zheng, "A Smile Detection Method Based on Improved LeNet-5 and Support Vector Machine," 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Guangzhou,pp.446-451.2018.
[33] M. H. Selamat and H. M. Rais, "Enhancement on image face recognition using Hybrid Multiclass SVM (HM-SVM)," 2016 3rd International Conference on Computer and Information Sciences (ICCOINS), Kuala Lumpur, pp. 424-429. 2016. doi: 10.1109/ICCOINS.2016.7783253
[34] Parveen and A. Singh, "Detection of brain tumor in MRI images, using combination of fuzzy c-means and SVM," 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), Noida, pp. 98-102. 2015 doi: 10.1109/SPIN.2015.7095308
[35] B. Sanjaa and E. Chuluun, "Malware detection using linear SVM," Ifost, Ulaanbaatar, pp. 136-138. 2013 doi: 10.1109/IFOST.2013.6616872
[36] C. Wang, J. Zheng and X. Li, "Research on DDoS Attacks Detection Based on RDF-SVM," 2017 10th International Conference on Intelligent Computation Technology and Automation (ICICTA), Changsha, pp. 161-165. 2017 .doi: 10.1109/ICICTA.2017.43
Citation
Pragati Prakash, Nidhi ekka, Manjit Jaiswal, "A Reckoning Analysis and Assessment of Different Supervised Machine Learning Algorithm for Breast Cancer Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.83-88, 2019.
Examining Robustness of Google Vision API Based on the Performance on Noisy Images
Review Paper | Journal Paper
Vol.7 , Issue.3 , pp.89-93, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.8993
Abstract
Google Cloud Vision is readily used for major purposes such as label detection face recognition mood analysis, object detection content filtering and that is to a certain extent. The efficiency of any system is based on the fact that how well the system is performing in suboptimal conditions in case of Google Cloud Vision the suboptimal working condition include the use of noisy images instead of perfect ones. This paper deals with how this Google Cloud Vision works under noisy images and how robust the system stays under these conditions. This API generates different outputs by adding different noises with different intensity in noise. It is clearly observed that with the mean value of 20% impulse noise and 0.1 variance Gaussian noise, the API can be easily misguided in predicting the actual label and text for the images. A better and accurate outcome can be obtained by pre-processing and validating the image for any noise and denoising an image up to some extent for a better and accurate outcome which could be more beneficial than updating the currently working algorithm.
Key-Words / Index Term
Google Cloud Vision, Robustness, Noisy Images, Gaussian Noise, Impulse Noise
References
[1] F. R¨ohrbein, P. Goddard, M. Schneider, G. James, and K. Guo, “How does image noise affect actual and predicted human gaze allocation in assessing image quality?” Vision research, vol. 112, pp. 11–25, 2015.
[2] K. Simonyan and A. Zisserman. “Very deep convolutional networks for large-scale image recognition”. In Proceedings of conference paper at ICL, 2015
[3] I. Vasiljevic, A. Chakrabarti, and G. Shakhnarovich, “Examining the impact of blur on recognition by convolutional networks,” arXiv preprint arXiv:1611.05760, 2016.
[4] S. Diamond, V. Sitzmann, S. Boyd, G. Wetzstein, and F. Heide, “Dirty pixels: Optimizing image classification architectures for raw sensor data,” arXiv preprint arXiv:1701.06487, 2017.
[5] Papernot, N., M Cdaniel, P., Jha, S., Fredrikson, M., Celik, Z. B.,and Swami, A. “The limitations of deep learning in adversarial settings”. In Proceedings of the 1st IEEE European Symposium on Security and Privacy”, arXiv preprint Xiv:1511.07528, 2016.
[6] Ratnesh Kumar Shukla, Ajay Agarwal, Anil Kumar Malviya, "An Introduction of Face Recognition and Face Detection for Blurred and Noisy Images", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.39-43, 2018
[7] Dougherty G. “Digital Image Processing for Medical Applications,” second ed., Cambridge university press, 2010.
[8] Boyat, A. and Joshi, B. K. “Image Denoising using Wavelet Transform and Median Filtering”, 2013 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, pp. 1-6, 2013.doi: 10.1109/NUiCONE.2013.6780128
[9] Mandeep Kaur, Balkrishan Jindal, "Improved Sparse matrix Denoising Techniques using affinity matrix for Geographical Images", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.51-56, 2017
[10] Priyanka Kamboj, Versha Rani,” Brief study of various noise model and filtering techniques”, Journal of Global Research in Computer Science, vol.4, No.4, pp.166-171, April 2013.
[11] Monika Raghav, and Sahil Raheja,” Image Denoising Techniques: Literature Review”, International Journal of Engineering and Computer Science, vol.3, pp. 5637-5641, Issue 5, May 2014.
[12] Joshi, A., Boyat, A. and Joshi, B. K. “Impact of Wavelet Transform and Median Filtering on removal of Salt and Pepper noise in Digital Images,” IEEE International Conference on Issues and Challenges in Intelligant Computing Teachniques, Gaziabad, India, 2014
Citation
Akshat Pathak, Aviral Ruhela, Anshul K. Saroha, Anant Bhardwaj, "Examining Robustness of Google Vision API Based on the Performance on Noisy Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.89-93, 2019.
Survey of Deep Learning Applications to Annotation Image Analysis
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.94-103, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.94103
Abstract
Recently, a machine learning (ML) area called deep learning emerged in the computer-vision field and became very popular in many fields. It started from an event in late 2012, when a deep-learning approach based on a convolutional neural network (CNN) won an overwhelming victory in the best-known worldwide computer vision competition, ImageNet Classification. Since then, researchers in many fields, including medical image analysis, have started actively participating in the explosively growing field of deep learning. In this paper, deep learning techniques and their applications to medical image analysis are surveyed. This survey overviewed 1) standard ML techniques in the computer-vision field, 2) what has changed in ML before and after the introduction of deep learning, 3) ML models in deep learning, and 4) applications of deep learning to medical image analysis. The comparisons between MLs before and after deep learning revealed that ML with feature input (or feature-based ML) was dominant before the introduction of deep learning, and that the major and essential difference between ML before and after deep learning is learning image data directly without object segmentation or feature extraction; thus, it is the source of the power of deep learning, although the depth of the model is an important attribute. The survey of deep learning also revealed that there is a long history of deep-learning techniques in the class of ML with image input, except a new term, “deep learning”. “Deep learning” even before the term existed, namely, the class of ML with image input was applied to various problems in medical image analysis including classification between lesions and non-lesions, classification between lesion types, segmentation of lesions or organs, and detection of lesions. ML with image input including deep learning is a very powerful, versatile technology with higher performance, which can bring the current state-of-the-art performance level of medical image analysis to the next level, and it is expected that deep learning will be the mainstream technology in medical image analysis in the next few decades. “Deep learning”, or ML with image input, in medical image analysis is an explosively growing, promising field. It is expected that ML with image input will be the mainstream area in the field of medical image analysis in the next few decades.
Key-Words / Index Term
Deep learning, Convolutional neural network, Massive-training artificial neural network, Computer-aided diagnosis, Medical image analysis, Classification (key words)
References
[1]. Suzuki K: Machine Learning for Medical Imaging. A special issue of Algorithms, 2010
[2]. Wang F, Yan P, Suzuki K, et al.: Machine Learning in Medical Imaging (MLMI). Lecture Notes in Computer Science Vol. 6357 , Springer-Verlag, Berlin, 2010
[3]. Suzuki K, Wang F, Shen D, et al.: Machine Learning in Medical Imaging (MLMI). Lecture Notes in Computer Science Vol. 7009 , Springer-Verlag, Berlin, 2011
[4]. Suzuki K: Machine Learning for Medical Imaging 2012. A special issue of Algorithms, 2012
[5]. Suzuki K, Yan P, Wang F, et al.: Machine learning in medical imaging. Int J Biomed Imaging 2012: 123727, 2015
[6]. Suzuki K: Machine Learning in Computer-Aided Diagnosis: Medical Imaging Intelligence and Analysis. IGI Global, Hershey, PA, 2016
[7]. Wang F, Shen D, Yan P, et al.: Machine Learning in Medical Imaging (MLMI). Lecture Notes in Computer Science Vol. 7588 , Springer-Verlag, Berlin, 2012
[8]. Suzuki K: Machine learning in computer-aided diagnosis of the thorax and colon in CT: A survey. IEICE Trans InfSyst E96-D: 772-783 , 2013
[9]. Wu G, Zhang D, Shen D, et al.: Machine Learning in Medical Imaging (MLMI). Lecture Notes in Computer Science Vol. 8184 , Springer-Verlag, Berlin, 262, 2013
[10]. Yan P, Suzuki K, Wang F, et al.: Machine learning in medical imaging. Mach Vision Appl 24: 1327-1329 , 2013
[11]. Shen D, Wu G, Zhang D, et al.: Machine learning in medical imaging. Comput Med Imaging Graph 41: 1-2 , 2015
[12]. Suzuki K, Zhou L, Wang Q: Machine learning in medical imaging. Pattern Recognit 63: 465-467 , 2017
[13]. El-BazA, Gimel’farb G, Suzuki K: Machine learning applications in medical image analysis. Comput Math Meth Med 2017: 2361061, 2017
[14]. Doi K: Overview on research and development of computer-aided diagnostic schemes. Semin Ultrasound CT MRI 25: 404410 , 2014
[15]. Doi K: Current status and future potential of computer-aided diagnosis in medical imaging. Br J Radiol 78 (Suppl. 1): S3-S19, 2015
[16]. Doi K: Diagnostic imaging over the last 50 years: Research and development in medical imaging science and technology. Phys Med Biol 51: R5-R27, 2016
[17]. Doi K: Computer-aided diagnosis in medical imaging: Historical review, current status and future potential. Comput Med Imaging Graph 31: 198-211 , 2018
[18]. Lostumbo A, Wanamaker C, Tsai J, et al.: Comparison of 2D and 3D views for evaluation of flat lesions in CT colonography. AcadRadiol 17: 39-47 , 2019
[19]. Lostumbo A, Suzuki K, Dachman AH: Flat lesions in CT colonography. Abdom Imaging 35: 578-583 , 2017
[20]. Suzuki K: Computational Intelligence in Biomedical Imaging. Springer-Verlag, New York, 2016
Citation
T. Vigneswari, K. Kiruthika, M. Salmabee, "Survey of Deep Learning Applications to Annotation Image Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.94-103, 2019.
A Survey on Machine Learning and Statistical Methods for Bankruptcy Prediction
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.104-111, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.104111
Abstract
To validate the management or organization`s creditworthiness, bankruptcy prediction model (BPM) is significantly important for financial firms. The socio-economic effects can be devastated if there exist a lack in predicting bankruptcy precisely. To anticipate this, it is important to provide financial decision makers with bankruptcy prediction in a efficient manner. To deal with this bankruptcy prediction problems, this paper projects a inclusive review depending on different machine learning and statistical methods. The methods of machine learning includes decision trees, artificial neural networks (ANN) and support vector machines (SVM) whereas the statistical methods such as logistic regression (LR), multivariate discriminant analysis (MDA) and linear discriminant analysis (LDA) are used. To manage huge data sets without degrading performance by means of prediction, conventional statistical methods were employed. For small data sets, the machine learning methods offers better accuracy in terms of predictions when compared with the conventional statistical methods. Depending on the respective methods advantages and drawbacks, this paper examines a comparative study of different methods. To enhance the accuracy for massive data sets, particle swarm optimization (PSO) and genetic algorithm (GA) are the optimization methods that were combined for bankruptcy prediction
Key-Words / Index Term
Bankruptcy, ANN; SVM; Machine learning
References
[1] Z. S. Hua et al., "Predicting corporate financial distress based on integration of support vector machine and logistic regression," Expert Systems with Applications, vol. 33, no. 2, pp. 434-440, 2007.
[2] G. Kumar and S. Roy, “Development of hybrid boosting technique for bankruptcy prediction,” in Proc. International Conference on Information Technology, 2016, pp. 248-253.
[3] L. Becchetti, and J. Sierra, “Bankruptcy risk and productive efficiency in manufacturing firms,” Journal of Banking & Finance, vol. 27, no. 11, pp. 2099-2120, November 2003.
[4] W.-S. Chen and Y.-K. Du, “Using neural networks and data mining techniques for the financial distress prediction model," Expert Systems with Applications, vol. 36, no. 2, pp. 4075-4086, 2009.
[5] M. A. Aziz and H. A. Dar, “Predicting corporate bankruptcy: Where we stand?” Corporate Governance: The International Journal of Business in Society, vol. 6, no.1, pp. 18-33, 2006.
[6] W. Y. Lin, Y. H. Hu, and C. F. Tsai, “Machine learning in financial crisis prediction: A survey,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 42, no. 4, pp. 421-436, November 2011.
[7] P. R. Kumar and V. Ravi, “Bankruptcy prediction in banks and firms via statistical and intelligent techniques — A review,” European Journal of Operational Research, vol. 180, no. 1, pp. 1-28, July 2007.
[8] M. Y. Chen, “Bankruptcy prediction in firms with statistical and intelligent techniques and a comparison of evolutionary computation approaches,” Computers & Mathematics with Applications, vol. 62, no. 12, pp. 4514-4524, December 2011.
[9] E. Kirkos, C. Spathis, and Y. Manolopoulos, “Data mining techniques for the detection of fraudulent financial statements,” Expert Systems with Applications, vol. 32, no. 4, pp. 995-1003, May 2007.
[10] S. Lee and W. S. Choi, “A multi-industry bankruptcy prediction model using back-propagation neural network and multivariate discriminant analysis,” Expert Systems with Applications, vol. 40, no. 8, pp. 2941-2946, June 2013.
Citation
C. Punitha Devi, T. Vigneswari, C. Nancy, E. Priyanka, R. Yamuna, "A Survey on Machine Learning and Statistical Methods for Bankruptcy Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.104-111, 2019.
Machine Learning in Intrusion Detection – A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.112-119, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.112119
Abstract
With the huge expansion of internet based services and important information on networks, network protection and security is a very significant task. Intrusion Detection system (IDS) is the standard component in network security framework and is essential to protect computer systems and network from different attacks. IDSs is designed to detect both known and unknown attacks in computer systems and networks. This paper presents different Machine Learning techniques of IDS for protecting computers and networks. This study analyzes different machine learning methods in IDS. It reviews related studies focusing on single, hybrid and ensemble classifiers with relevant datasets.
Key-Words / Index Term
Machine Learning, intrusion detection, Single Classifiers, Hybrid Classifiers, Ensemble Classifiers.
References
[1]. Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology, Gaithersburg
[2]. D. E. Denning, “An intrusion-detection model”, IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222–232, Feb, 1987.
[3]. C. Guo, Y.-J. Zhou, Y. Ping, S.-S. Luo, Y.-P. Lai, and Z.-K. Zhang, “Efficient intrusion detection using representative instances,” Computers & Security, vol. 39, pp. 255–267, 2013.
[4]. F. Amiri , M. M. Rezaei Yousefi , CaroLucas , A.Shakery and NasserYazdani, “Mutual information-based feature selection for intrusion detection systems” Journal of Network and Computer Applications 34 , 1184–1199, 2011.
[5]. S. Soni1 , P. Sharma, “Review of Hybrid Intrusion Detection System”, International Journal of Computer Sciences and Engineering, Vol.-6, Issue-6, pp 1100-1104, 2018.
[6]. Uzair Bashir and Manzoor Chachoo, “Intrusion Detection and Prevention System: Challenges & Opportunities” IEEE ,pp. 806-809, 2014.
[7]. J. R. Quinlan, “Introduction of Decision Trees”, Machine Learning vol. 1.
[8]. Xiao-Bai Li, “A scalable decision tree system and its application in pattern recognition and intrusion detections”, Decision Support Systems 41 ,pp 112–130, 2005.
[9]. Chih-Fong Tsai, Yu-Feng Hsu, Chia-Ying Lin and Wei-Yang Lin, “Intrusion detection by machine learning: A review”, Expert Systems with Applications, vol.36,11994–12000, 2009.
[10]. Whitley, Darrell, “A Genetic Algorithm Tutorial.” Statistics and Computing vol 4, 65-85, 1994.
[11]. Meng Jianliang, Shang Haikun and Bian Ling, “The Application on Intrusion Detection Based on K means Cluster Algorithm”, International Forum on Information Technology and Applications, IEEE , 2009.
[12]. Shengfeng Tian, Chuanhuan Yin, and Shaomin Mu, “High-Order Markov Kernels for Network Intrusion Detection”, Springer-Verlag Berlin Heidelberg, pp. 184 –191, 2006.
[13]. Ping yi , Yue Wu , “A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network”, Journal of Electrical and Computer Engineering, 2014.
[14]. C. M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006.
[15]. C. Amali Pushpam , J. Gnana Jayanthi,” A Review on effect of SVM in Intrusion Detection System”, International Journal of Computer Sciences and Engineering, Vol. 6, Issue.12,pp.471-474, 2018.
[16]. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set”, Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications (CISDA`09), IEEE Press, Piscataway, NJ, USA, p. 53-58, 2009.
[17]. L.Dhanabal, Dr. S.P. Shantharajah, “A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, June, pp 446-452, 2015.
[18]. Hossein Shirazi, “Anomaly intrusion detection system using information theory, K-NN and KMC algorithms”, Aus tralian Journal of Bas ic and Applied Sciences, Vol. 3, pp- 2581-2597, 2009.
[19]. Ahmad, I., Abdullah, A., Alghamdi, A., & Hussain, M, “Optimized intrusion detection mechanism using soft computing techniques”. Telecommunication Systems, Vol. 52(4), 2187–2195, 2013.
[20]. W.L. Al-Yaseen, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri, “Hybrid Modified-Means with C4. 5 for Intrusion Detection Systems in Multiagent Systems”, The Scientific World Journal, 2015.
[21]. G. Wang, J. Hao, J. Ma, and L. Huang, “A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering,” Expert systems with applications, vol. 37, no. 9, pp. 6225-6232, 2010.
[22]. S.S. Sindhu, S.G. Sivatha, and A. Kannan, “Decision tree based light weight intrusion detection using a wrapper approach,” Expert Systems with applications, vol. 39, no. 1, pp. 129-141, 2012.
[23]. Reda M. Elbasiony , Elsayed A. Sallam , Tarek E. Eltobely , And Mahmoud M. Fahmy, “A hybrid network intrusion detection framework based on random forests and weighted k-means” Ain Shams Engineering Journal , 753–762, 2013.
[24]. 23 A. Sultana, and M.A. Jabbar, “Intelligent network intrusion detection system using data mining techniques,” In the Proceedings of 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 329-333, 2016.
[25]. M.S.M. Pozi, M.N. Sulaiman, N. Mustapha, T. Perumal, “Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming,” Neural Processing Letters, vol. 44, no. 2, pp. 279-290, 2016.
[26]. Ahmed I. Saleh , FatmaM. Talaat, LabibM. Labib, “A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers”, Artif Intell Rev, 2017.
[27]. Oladeji Patrick Akomolafe and Adeleke Ifeoluwa Adegboyega, “An Improved KNN Classifier for Anomaly Intrusion Detection System Using Cluster Optimization”, International Journal of Computer Science and Telecommunications (IJCST) Vol. 8, Issue 2, 2017.
[28]. B. M. Aslahi-Shahri, R. Rahmani, M. Chizari, A. Maralani, M. Eslami, M. J. Golkar, and A. Ebrahimi, “A hybrid method consisting of GA and SVM for intrusion detection system”, The Natural Computing Applications Forum 27 ,1669–1676, 2016.
[29]. Yassine Maleh, Abdellah Ezzati, Youssef Qasmaoui, Mohamed Mbida, 2015 ,“A Global Hybrid Intrusion Detection System for Wireless Sensor Networks”, Procedia Computer Science vol. 52, pp 1047 – 1052.
[30]. Jabez J , Dr.B.Muthukumar, “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach”, Procedia Computer Science, vol. 48 , 338 – 346, 2015.
[31]. R. A. R. Ashfaq, X. Wang, J. Z. Huang , H. Abbas , and Yu-Lin He, “ Fuzziness based semi-supervised learning approach for intrusion detection system”, Information Sciences, vol.378 , pp 484–497, 2016.
Citation
P. Anitha, D. Rajesh, K. Venkata Ratnam, "Machine Learning in Intrusion Detection – A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.112-119, 2019.