Comparative Analysis of Big Data Technologies
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.49-57, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.4957
Abstract
Recent technological advances and reduction in storage prices has led to accumulation of huge amount of data known as Big Data. This data, belonging to different applications and timelines, is difficult for organisations to process. In order to solve this difficulty, Doug Cutting and Mike Cafarella came up with a framework called Hadoop. Becoming open source in 2012, Hadoop went on to include Pig, Hive and many more products. Following this, Spark was developed by MatieZaharia in 2009 which was open sourced in 2010. Meanwhile, many organisations came up with their own platforms to deal with Big Data. Hence, sprouting from Google`s MapReduce paper, these tools have grown into a wide array of technologies. This project focusses on comparing three main big data technologies which are used widely these days namely Pig, Hive and R. Similar problem statements are executed on all three platforms and performance is judged based upon the query execution time.
Key-Words / Index Term
Hadoop, HDFS, Big Data, Pig, Hive, R
References
[1] SherifSakr, AmalElgammal, Towards a Comprehensive Data Analytics Framework for Smart Healthcare Services, Intl Journal of Big Data Research (Elsevier), Pg:44-58, Vol. 4, (2016)
[2] Zhijiiang Chen, GuobinXu, VivekMahalingam, LinqiangGe, James Nguyen, Wei Yu, Chao Lu, A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures, Pg:44-58, Vol. 4, (2016)
[3] Xiaolong Jin, Benjamin W. Wah, Xueqi Cheng, Yuanzhuo Wang, Signifance and Challenges of Big Data Research, Pg:59-64, Vol. 2, (2015)
[4] Mohammad NaimurRahman, Amir Esmailpour, Junhui Zhao, Machine Learning Generation Forecasting System, Pg:9-15, Vol. 5, (2015)
[5] Yaxiao Liu, Henan Wang, Guoliang Li, JunyangGao, Huiqi Hu, Wen-Syan Li, ELAN: An Efficient Location-Aware Analytics System, , Pg:16-21, Vol. 5, (2016)
[6] SurajitChaudhuri, What Next? A Half-Dozen Data Management Research Goals for Big Data and the Cloud
[7] Daniel Nunan, Maria Di Domenico, Market research & the ethics of big data
[8] Jeffrey Dean, Sanjay Ghemawat, MapReduce Simplified Data Processing on Large Clusters.
[9] Hsinchun Chen, Roger H. L. Chiang, Veda C. Storey, BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT
[10] Kyong-Ha Lee Yoon-Joon Lee, Hyunsik Choi Yon Dohn Chung, Bongki Moon, Parallel Data Processing with MapReduce: A Survey, SIGMOD Record, December 2011 (Vol. 40, No. 4)
[11] AbdelrahmanElsayed, Osama Ismail, and Mohamed E. El-Sharkawi, MapReduce: State-of-the-Art and Research Directions.
[12] Xindong Wu, Xingquan Zhu, Gong-Qing Wu and Wei Ding, Data Mining with Big Data (IEEE), Vol. 26, NO. 1, JANUARY 2014
[13] Michele De Gennaro, Elena Paffumi, Giorgio Martini, Big Data for Supporting Low-Carbon Road Transport Policies in Europe: Applications, Challenges and Opportunities, Intl Journal of Big Data Research (Elsevier), 2 June 2016
[14] Cui Yu, Josef Boyd, FB+- tree for Big Data Management, Intl Big Data Research (Elsevier), Pg: 25-36, Vol. 4, June 2016
[15] Diamantoulakis, P.D., Kapinas, V.M. Karagiannidis, G.K., Big Data Analytics for Dynamic Energy Management in Smart Grids, Intl Big Data Research (Elsevier), Pg: 94-101, Vol. 2, September 01 2015
[16] Paakkonen, P., Pakkala, D., Reference Architecture and Classification of Technologies, Products and Services for Big Data Systems, Intl Big Data Research (Elsevier), Pg: 166-186, Vol. 2, December 01 2015
[17] Bong-Hwa-Hong and Hae-Jong Joo, A Study on The Monitoring Model for Traffic Analysis and Application of Big Data, Intl Research on Big Data (Elsevier), Pg.- 30-35, Vol. 43, 2013
[18] Mikin K. Dagli and Brijesh B. Mehta, Big Data and Hadoop: Review, Intl research on Big Data (Elsevier), Pg.-192-196, Vol.2, February 2014
[19] Thusoo, Ashish, JoydeepSenSarma, Namit Jain, Zheng Shao, Prasad Chakka, Ning Zhang, Suresh Antony, Hao Liu, and Raghotham Murthy. "Hive-a petabyte scale data warehouse using hadoop." In Data Engineering (ICDE), 2010 IEEE 26th International Conference on, pp. 996-1005. IEEE, 2010
[20] Olston, Christopher, Benjamin Reed, UtkarshSrivastava, Ravi Kumar, and Andrew Tomkins. "Pig latin: a not-so-foreign language for data processing." In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pp. 1099-1110. ACM, 2008
[21] Gates, Alan F., Olga Natkovich, Shubham Chopra, PradeepKamath, Shravan M. Narayanamurthy, Christopher Olston, Benjamin Reed, SanthoshSrinivasan, and UtkarshSrivastava. "Building a high-level dataflow system on top of Map-Reduce: the Pig experience." Proceedings of the VLDB Endowment 2, no. 2 (2009): 1414-1425
Citation
C. Jasmine, A. Abinaya, "Comparative Analysis of Big Data Technologies," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.49-57, 2019.
The Enhanced M-GEAR Protocol for Wireless Sensor Network LifeTime
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.58-60, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.5860
Abstract
The enhancement of life time in a WSN mainly focus on the clustering and energy of nodes. The concern to select the cluster head in a network works on different techniques, the region based energy efficient technique for the data communication among nodes is one of them in a wireless sensor network. This paper focus on the region based called gateway based energy-efficient routing protocol. This paper mainly focus on distance based cluster head selection and the communication among region nodes with the base station depends upon the positive coordinates of the region following the base station.
Key-Words / Index Term
Gateway node, network region, cluster heads, base station
References
[1] Preeti Jamwal1, Sonam Mahajan2, “Region Refinement Technique In MGEAR Protocol To Enhancing Sensor Node Life Time”, International Journal of Computer Sciences and Engineering, Volume-5, Issue-8 ,2018.
[2] Nazia anjum, Maood ahmed et al,”, Gateway Based Energy Efficient Routing: GEER”, International Journal of Advance Research, Ideas and Innovations in Technology, Volume3, Issue4, 2017.
[3] Q. Nadeem1, M. B. Rasheed1 et al, “M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol for WSNs”, ieee July 2016.
[4] Veena Anand , Deepika Agrawal, Preety Tirkeyb, Sudhakar Pandey, “An energy efficient approach to extend network life time of wireless sensor networks”, Elsevier, Procedia Computer Science, 425 – 430, 2016.
[5] Pallavi Jain1 and Harminder kaur2, ” An Improved Gateway Based Multi Hop Routing Protocol for Wireless Sensor Network”, International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15,pp. 1567-1574, 2014.
[6] Pijus Kumar Pal1, Punyasha Chatterjee2, “ A Survey on TDMA-based MAC Protocols for Wireless Sensor Network”, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 6, June 2014.
[7] Velanati Mohana Gandhi1, M.V.H.Bhaskara Murthy2,M.Lakshmu Naidu3, “ Performance Analysis of Multihop-Gateway Energy Aware Routing (M-Gear) Protocol for Wireless Sensor Networks”, IOSR Journal Of Humanities And Social Science, Volume 21, Issue11,Ver. 9 Nov. 2016.
[8] Shakshi Mehta et al “ Improved Multi-Hop Routing Protocol in Wireless Body Area Networks “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 7, July 2015.
[9] S. Rani and S.H. Ahmed, Multi-hop Routing in Wireless Sensor Networks, Springer Briefs in Electrical and Computer Engineering.
[10] Jung, W. S., Lim, K. W., Ko, Y. B., & Park, S. J. “A hybrid approach for clustering-based data aggregation in wireless sensor networks”, In Digital Society, IEEE, Third International Conference on, 2009.
[11] Li, Hongjuan, Kai Lin, and Keqiu Li. "Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks." Computer Communications, 2011.
[12] Sujata1, Brijbhushan2,” Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network”, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 07 | July-2017.
[13] Jaswant Singh Raghuwanshi,2Neelesh Gupta,3Neetu Sharma, “ENERGY FFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS”, International Journal of Advanced Smart Sensor Network Systems (IJASSN), Vol 4, No.3, July 2014.
Citation
Amandeep Kaur, Sukhbeer Singh, Neelam Chouhan, "The Enhanced M-GEAR Protocol for Wireless Sensor Network LifeTime," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.58-60, 2019.
Particle Swarm Optimization based Feature Selection with Evolutionary Outlay-Aware Deep Belief Network Classifier (PSO-EOA-DBNC) for High Dimensional Datasets
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.61-69, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.6169
Abstract
Data mining research extends its wings to several domains and classification is one of the thrust areas for researchers. The curse of dimensionality is reduced by many optimization techniques and machine learning algorithms. In this research work, a particle swarm optimization based feature selection method is employed to deal with the curse of dimensionality. The PSO algorithm makes use of the fitness function that is obtained from the evolutionary outlay aware deep belief network which conducts classification. 20 datasets are taken for evaluating the conductance of the PSO – EOA – DBNC in terms of classification accuracy and elapsed time. From the results it is significant to notice that PSO-EOA-DBNC out conducts than that of other classifiers.
Key-Words / Index Term
data mining, feature selection, particle swarm optimization, deep belief network, evolutionary algorithm.
References
[1] D. Polat, Z. Çataltepe, “Feature selection and classification on brain computer interface (BCI) data”, in Proceedings of the 2012 20th Signal Processing and Communications Applications Conference (SIU), IEEE, 2012, pp. 1–4.
[2] G.P. Zhang, “Neural networks for classification: a survey”, IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 30 (4) (2000) 451–462.
[3] D.D. Lewis, “Naive (Bayes) at forty: the independence assumption in information retrieval, in Machine Learning”: ECML-98, Springer, Berlin, Heidelberg, 1998, pp. 4–15.
[4] Kuan-Cheng Lin, Kai-Yuan Zhang, Yi-Hung Huang, Jason C Hung, Neil Yen, “Feature selection based on an improved cat swarm optimization algorithm for big data classification”, J. Super computer. 72 (8) (2016) 3210–3221.
[5] Kuan-Cheng Lin, Yi-Hung Huang, Jason C. Hung, Yung-Tso Lin, “Feature selection and parameter optimization of support vector machines based on modified cat swarm optimization”, Int. J. Distributed Sensational Network 2015 (2015).
[6] Kuan-Cheng Lin, Sih-Yang Chen, Jason C. Hung, “Feature selection and parameter optimization of support vector machines based on modified artificial fish swarm algorithms”, Mathematical Probability Eng.( 2015 ).
[7] C.A. Pena-Reyes, M. Sipper, “Evolutionary computation in medicine: an overview, Artificial Intelligence”, Med. 19 (1) (2000) 1–23.
[8] S.H. Cha, C. Tappert, “A genetic algorithm for constructing compact binary decision trees”, J. Pattern Recognition. Res. 4 (1) (2009) 1–13.
[9] J. Kennedy, “Particle swarms optimization, in Encyclopaedia of Machine Learning”, Springer, US, 2010, pp. 760–766.
[10] P.P. Brahma, D. Wu, Y. She, “Why Deep Learning Works: A Manifold Disentanglement Perspective”, IEEE Transactions on Neural Networks & Learning Systems, 2016, 27(10):1997-2008.
[11] D. Li, S. Y. Dong, “Deep learning: methods and applications, Foundations & Trends in Information Retrieval”, 2014, 7(3):197-387.
[12] R. Salakhutdinov, G. Hinton,” An efficient learning procedure for deep Boltzmann machines, Neural Computation”, 2012, 24(8):1967.
[13] M.Praveena, Dr.V.Jaiganesh, “Improved Genetic Algorithm Based Feature Selection Strategy Based Five Layered Artificial Neural Network Classifier (IGA – FLANN)”, International Journal of Engineering and Techniques - Volume 3 Issue 5, Sep - Oct 2017, 199-213.
[14] M.Praveena, Dr.V.Jaiganesh, “Routine Correspondence Method with Grey Wolf Optimization based Imperforate Support Vector Machine Classifier (ISVMC) for High Dimensional Datasets”, Journal of Advanced Research in Dynamical & Control Systems, Vol. 11, 01-Special Issue, 2019, 652-660.
[15] M.Praveena, Dr.V.Jaiganesh, “Adaptive Particle Swarm Optimization based Credentialed Extreme Learning Machine Classifier (APSO-CELMC) for High Dimensional Datasets”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-10S, August 2019.
[16] M.Praveena, Dr.V.Jaiganesh, “A Literature Review on Supervised Machine Learning Algorithms and Boosting Process”, International Journal of Computer Applications (0975 – 8887) Volume 169 – No.8, July 2017.
Citation
M. Praveena, V. Jaiganesh, "Particle Swarm Optimization based Feature Selection with Evolutionary Outlay-Aware Deep Belief Network Classifier (PSO-EOA-DBNC) for High Dimensional Datasets," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.61-69, 2019.
Applications of data mining in predicting the stability of Vitiligo
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.70-73, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.7073
Abstract
Vitiligo is growing at a good speed among the population and people have to go repeated surgeries to get rid of this disease. Though it’s not easy to define the stability, but it`s indispensable in the treatment of vitiligo. There have been many cases where people had gone for skin replacement surgery, but after sometime, white patches redeveloped on the skin. So the treatment goes on forever and patients get disheartened. The aim is to help people to identify the saturation of the disease before seeking the remedy which is skin transplantation. In this paper, improved J48 algorithm is used to predict the stability of vitiligo which gives optimal results. This algorithm uses the medical history of patients, Koebner phenomenon and VIDA score of sample data to feed into the systems and draw patterns to predict stability in the patients. We use various algorithms of data mining to extract useful information from data and check the accuracy of their medical history. The data includes the vitiligo patients, healthy people, the ones who have undergone surgery and the patients who haven’t undergone skin replacement and are still experiencing growth in their patches. With the prediction of various parameters, an optimal target value is predicted. In the end, we conclude with the most optimal algorithm which can be used to determine the stability of this disease and help the doctors and patients to determine the precise time of surgery.
Key-Words / Index Term
J48 algorithm, Vitiligo, White patches, Patch development, data mining, prediction
References
[1] Witten, I. H. & Frank, E. (2005). Data Mining: Practical machine learning tools and techniques, (2ndEd.) San Francisco: Morgan Kaufmann.
[2] WEKA: Data Mining Software in Java.
[3] Falabella R. Surgical treatment of Vitiligo: Why, when and how. J Eur Acad Dermatol Venereol. 2003;17:518–20.
[4] Yusuf Perwej, Md. Husamuddin, Fokrul Alom Mazarbhuiya ,“An Extensive Investigate the MapReduce Technology”, International Journal of Computer Sciences and Engineering (IJCSE), E-ISSN : 2347-2693, Volume-5, Issue-10, Page no. 218-225, Oct-2017, DOI : 10.26438/ijcse/v5i10.218225
[5] M. Mohammad, “Performance Impact of Addressing Modes on Encryption Algorithms”, In the Proceedings of the 2001 IEEE International Conference on Computer Design (ICCD 2001), Indore, USA, pp.542-545, 2001.
[6] H.R. Singh, “Randomly Generated Algorithms and Dynamic Connections”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.231-238, 2014.
[7] Rao A, Gupta S, Dinda AK, Sharma A, Sharma VK, Kumar G, et al. Study of clinical, biochemical and immunological factors determining stability of disease in patients with generalized vitiligo undergoing melanocyte transplantation. Br J Dermatol. 2012;166:1230–6.
[8] A. Mardin, T. Anwar, B. Anwer, “Image Compression: Combination of Discrete Transformation and Matrix Reduction”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.1-6, 2017.
[9] H.R. Singh, “Randomly Generated Algorithms and Dynamic Connections”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.231-238, 2014.
[10] Ines D, Sonia B, Riadh BM, Amel el G, Slaheddine M, Hamida T, et al. A comparative study of oxidant-antioxidant status in stable and active vitiligo patients. Arch Dermatol Res. 2006;298:147–52.
[11] V. Krishnaiah, G. Narsimha, N. Subhash Chandra, “Heart Disease Prediction System using Data Mining Techniques and Intelligent Fuzzy Approach: A Review”, International Journal of Computer Applications, February 2016.
[12] Pattekari SA, Parveen A, “Prediction system for heart disease using naive bayes”, International Journal of Advanced Computation.
[13] R. Alizadehsani, J. Habibi, B. Bahadorian, et al., “Diagnosis of coronary artery stenosis using data mining”,J MED Signals Sens, vol. 2, pp. 153-9,2012.
[14] Upasana Juneja et. al., “Multi Parametric Approach Using Fuzzification on Disease Analysis”, IJESRT, Juneja et al., 3(5) ISSN: 2277-9655, Page No.492-497,2014.
[15] Hann SK, Shin HK, Park SH, Reynolds SR, Bystryn JC. Detection of antibodies to melanocytes in vitiligo by western immunoblotting. Yonsei Med J. 1996;37:365–70.
[16] Thirumal, P. C., & Nagarajan, N. (2015). Utilization of data mining techniques for diagnosis of diabetes mel-litus - A case study. ARPN Journal of Engineering and Applied Sciences, January, 10(1), 8-13.
[17] Naughton GK, Reggiardo D, Bystryn JC. Correlation between vitiligo antibodies and extent of depigmentation in vitiligo. J Am Acad Dermatol. 1986;15:978–81.
[18] Baharav E, Merimski O, Shoenfeld Y, Zigelman R, Gilbrund B, Yecheskel G, et al. Tyrosinase as an autoantigen in patients with vitiligo. Clin Exp Immunol. 1996;105:84–8.
[19] Xie Z, Chen D, Jiao D, Bystryn JC. Vitiligo antibodies are not directed to tyrosinase. Arch Dermatol. 1999;135:417–22.
[20] Hann SK, Park YK, Lee KG, Choi EH, Im S. Epidermal changes in active vitiligo. J Dermatol. 1992;19:217–22.
[21] Kumar R, Parsad D, Kanwar AJ. Role of apoptosis and melanocytorrhagy: A comparative study of melanocyte adhesion in stable and unstable vitiligo. Br J Dermatol. 2011;164:187–91.
[22] Ahn SK, Choi EH, Lee SH, Won JH, Hann SK, Park YK. Immunohistochemical studies from vitiligo: Comparison between active and inactive lesions. Yonsei Med J. 1994;35:404–10.
Citation
Gagandeep Singh, Kavita Rathi, "Applications of data mining in predicting the stability of Vitiligo," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.70-73, 2019.
Real Time System for Vehicle Scheduling, Tracking and Monitoring and Analysis
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.74-78, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.7478
Abstract
An advanced vehicle scheduling, monitoring and tracking system is to be designed and implemented for booking and monitoring the vehicles from one location to other location in real time and provide safety environment to the traveller. The proposed system has to use GPS/GPRS/GSM Modules which includes all the three things namely GPS GPRS GSM. The GPS provides current location of the vehicle; GPRS sends the tracking information to the server and the GSM is used for sending alert message to vehicle allotted person mobile. The booking of vehicle is done through priority scheduling algorithm The proposed system would place inside the vehicle whose position is to be determined on the web page and monitored in real time. The system will compare the current trajectory of the vehicle with the predefined path specified. If any deviation is observed, it will send an alert message to the related person. The cost analysis is done and cost is estimated based on the distance travelled.
Key-Words / Index Term
Arduino, GPS/GPRS/GSM, python, priority scheduling algorithm, cost estimation
References
[1]. R. Surender Reddy, M. Hymavathi, E. Shilpa. Real Time Vehicle Monitoring and Tracking System based on Embedded Linux Board -Vol. 4, Issue 10, October 2016
[2]. Prashant A. Shinde ,Y.B. Mane. Advanced vehicle monitoring and tracking system based on Raspberry Pi - - 2015 IEEE 9th ISCO-9-10 Jan. 2015
[3]. Omar Abdulwahabe Mohamad , Rasha Talal Hameed. Design and Development of Real time Vehicle Tracking System- -2016 8th ECAI
[4]. Kunal Maurya Mandeep Singh Neelu Jain Real time vehicle tracking system using GSM and GPS technology- an anti-theft tracking system, IJECSE,Volume1,Number 3
[5]. Pankaj Verma , J.S Bhatia .Design and development of GPS-GSM based tracking system with google map based monitoring, International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.3, No.3, June 2013
[6]. SeokJu Lee, Girma Tewolde, Jaerock Kwon. Design and implementation of vehicle tracking system using GPS/GSM technology and smartphone application. Internet of Things (WF-IoT), IEEE World Forum. 6-8 March 2014
Citation
T.Swetha Reddy, K.Venkateswara Rao, Pullanna Satri, "Real Time System for Vehicle Scheduling, Tracking and Monitoring and Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.74-78, 2019.
Application Development of E-Commerce Business Intelligence Dashboard
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.79-83, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.7983
Abstract
Application of Business intelligence produces information that can be used as decision support. Companies in the E-Commerce require business intelligence applications to manage existing data to be useful. Manager using this information for decision in strategy or staff for operational support. In this study, researchers created a business intelligence dashboard application that can be used as a reference for e-Commerce companies in processing raw data to become useful information for decision. Development of business intelligence application based on business intelligence architecture. The business intelligence architecture consists of data source, ETL, data warehouse, Dashboard and BI users. Business Intelligence Application is created using Dashboard to display information. The results of this study are business intelligence dashboard application which has four dashboard options for e-Commerce companies. The summary dashboard displays a summary of information. The customer dashboard displays information based on the customer. The product dashboard displays information based on the product. Transaction dashboard displays information based on transaction. Module testing on dashboard is done using black box testing, the test results on four dashboards in the application, can function correctly.
Key-Words / Index Term
Business Intelligence, Dashboard, Decision, E-Commerce
References
[1] N. Fatma, S. Jain, and M.A. Alam, “Visualisation and Analysis of Big Data through Business Intelligence”, IJCSE, Vol.7, Issue.4, pp.629-636, 2019.
[2] E.N.S. Yuliani, H. Subawanto, and A. Oktaviani, “Business Intelligence Dashboard Implementation on a Travel Agency in Jakarta”, IJAERS, Vol.4, Issue.6, pp.63-68, 2017.
[3] B. Hansoti, “Business Intelligence Dashboard in Decision Making”, Purdue University, Indiana, 2010.
[4] Kendall and Kendall, "System Analysis and Design 8th edition, 2010.
[5] R. Sherman, “Business intelligence guidebook : from data integration to analytics”, Elsevier, USA, 2015.
[6] I.L. Ong, P.H. Siew, and S.F. Wong, “A Five-Layered Business Intelligence Architecture”, Communications of the IBIMA, Vol.2011, pp.1-11.
Citation
Muhammad Naufal Prakoso, Nuryuliani, "Application Development of E-Commerce Business Intelligence Dashboard," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.79-83, 2019.
Detecting the Phishing sites by using Machine Learning with Random Forest and Decision tree
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.84-87, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.8487
Abstract
This paper the detection from the phishing web site and URLs. The aim is to realize the detection of URLs and websites. The technique will be classified to understand the spoofing attack and also the phishing techniques and techniques as follows the random forest and decision tree. Phishing detection strategies do endure low detection accuracy and high warning particularly once novel phishing methodologies are introduced. The best mutual technique used random forest and decision tree by that has to seek out the accuracy of the phishing dataset. These two strategies, have to seek out the accuracy of the real and faux phishing web site dataset.
Key-Words / Index Term
random forest, decision tree, phish tank, confusion matrix, dataset
References
[1] Padmawati Soni, Dr. Mahesh Pawar, Dr. Sachin Goyal, A Survey on detection and defense from phishing.
[2] Mahmoud khon, Andrew jones, Phishing detection: A literature Survey.
[3] phish tank http://www.phishtank.com/what_is_phishing.php.
[4] Cybersecurity, Nina Godbole, Sunit Belapure foreword by Dr.Kamlesh Bajaj, Data Security Council of India.
[5] APWG can be visited at http://www.antiphishing.org/reports/apwg_report_Q4_2009.pdf
[6] A.-P.W.G 2010. Global phishing survey: Domain name use and trends in 2h2010.
[7] SHREE RAM, V., SUBAN, M., SHANTHI, P.andMANJULA, K. Anti-phishing detection of phishing attacks using a genetic algorithm. Communication Control and Computing Technologies (ICCCCT), 2010 IEEE International Conference on, 2010. IEEE, 447-450.
Citation
Padmawati Soni, Mahesh Pawar, Sachin Goyal, "Detecting the Phishing sites by using Machine Learning with Random Forest and Decision tree," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.84-87, 2019.
Smart Approach for Finding Indoor Navigation Using BLE for Visually Impaired Person
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.88-93, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.8893
Abstract
In todays’ life, the problems faced by the visually impaired persons are increases due to the huge growth in urbanization in cities. Even a normal person also gets confused, if they come across to the new locations. To handle this problem, in this paper, we have proposed a new robust system, which provide help to user while navigating in big industrial buildings. This system uses BLE (bluetooth low energy) devices to communicate with the hardware present at user and then it will direct the route to the user. The process includes user interaction through voice for the input location after that system will find desired location of user by connecting the hardware to various BLE devices and depending upon the signal strengths from each BLE user will be get navigated. If the range of BLE devices get less than that means, that user is going away from that BLE device and similarly if the range of particular device is getting increase then it means that user going towards the BLE device. Now to get accurate result we are implementing Three Dimensional Triangulation Technique where the hardware present at user will simultaneously connect with multiple BLE devices and then find the required route for navigation. Along with this we are providing IR(infra-red) SONAR sensors through which we can find any obstacle that comes between the user and its navigation. We have added buzzer and LED lights to notify the obstacle to others.
Key-Words / Index Term
Indoor navigation, BLE beacons technology for triangulation. Blind navigation, wayfinding, robotic navigation aid, pose estimation
References
[1] He Zhang ; Cang Ye, "An Indoor Wayfinding System Based on Geometric Features Aided Graph SLAM for the Visually Impaired" IEEE Transactions on Neural Systems and Rehabilitation Engineering (Volume: 25 , Issue: 9 , Sept. 2017 )
[2] D. Yuan and R. Manduchi, “A Tool for Range Sensing and Environment Discovery for the Blind,” in Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2004.
[3] K. Tsukada and M. Yasumura, “Activebelt: Belt-type wearable tactile display for directional navigation,” in Proc. Ubiquitous Comput., 2004, pp. 384–399.
[4] F. Endres, J. Hess, N. Engelhard, J. Sturm, D. Cremers, and W. Burgard, “An evaluation of the RGB-D SLAM system,” in Proc IEEE Int. Conf.Robotics and Automation, 2012, pp. 1691-1696.
[5] A. Tamjidi, C. Ye, and S. Hong, “6-DOF pose estimation of a portable navigation aid for the visually impaired,” in Proc. IEEE international symposium on robotic and sensors environments, 2013, pp. 178-183.
[6] C. Ye, S. Hong, and A. Tamjidi, “6-DOF pose estimation of a robotic navigation aid by tracking visual and geometric features,” IEEE Trans. Autom. Sci. Eng., vol. 12, no. 4, pp. 1169-1180, Oct. 2015.
[7] V. Kulyukin, C. Gharpure, J. Nicholson, and G. Osborne, “Robot-assisted wayfinding for the visually impaired in structured indoor environments,” Auton. Robot., vol. 21, no. 1, pp. 29-41, 2006.
[8] J. A. Hesch and S. I. Roumeliotis, “Design and analysis of a portable indoor localization aid for the visually impaired,” Int. J. Robot. Res., vol. 29, no. 11, pp. 1400-1415, 2010.
[9] T. Bailey and H. Durrant-Whyte, “Simultaneous Localization and Mapping (SLAM): Part II,” IEEE Robotics Automation Magazine, vol. 13, no. 3, pp. 108-117, 2006.
[10] M. Kaess, A. Ranganathan, and F. Dellaert, “iSAM: Incremental smoothing and mapping. Robotics,” IEEE Transactions on Robotics, vol. 24, no.6, pp.1365-1378, 2008.
[11] G. Klein and D. Murray, “Parallel tracking and mapping for small AR workspaces,” in Proc. IEEE and ACM International Symposium on Mixed and Augmented Reality, 2007, pp. 225-234.
[12] R. A. Newcombe, S. J. Lovegrove and A.J. Davison, “DTAM: Dense tracking and mapping in real-time,” in Int. Conf. Computer Vision, 2011, pp. 2320-2327.
[13] J. Engel, T. Schöps, and D. Cremers, “LSD-SLAM: Large-scale direct monocular SLAM,” in Proc. European Conference on Computer Vision, 2014, pp. 834–849.
Citation
Kalyani Mule, J. V. Shinde, "Smart Approach for Finding Indoor Navigation Using BLE for Visually Impaired Person," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.88-93, 2019.
Securing Cloud Data by Using Multi Keyword Search System
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.94-98, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.9498
Abstract
Securing Cloud data is a major task in current ongoing world. Now a days Cloud playing a major role in every technical aspect, for data storage. Here secure data management in Cloud is the major challenge to achieve. Attribute based encryption (ABE) is the most commonly used algorithm for circulated registering, where a data provider redistributes the data that is encoded, to a cloud master association, and can grant the data to customers having express accreditations (or qualities). Regardless, the standard ABE structure doesn’t reinforce secure Deduplication, the basic rule for discarding multiple copies of undefined data to save additional room and framework information move limit. Here a trademark based limit structure is presented with checked duplication in a cream cloud setting, where a private cloud is responsible for duplicate disclosure and an open cloud manages the limit. Differentiating the previous systems which support data deduplication, our structure has bi-ideal conditions. Generally it might be used in a rapid manner to secretly give data to customers by choosing access plans as opposed to sharing translating keys. However, it is very helpful in acquiring the thought of semantic security which follows standard mechanism for data protection while the previous mechanism just simply achieved it by describing a flimsier security thought. Also, we put forward a framework to change a figure message more than one access system into figure works of the identical plaintext yet under various access courses of action without revealing the major plaintext.
Key-Words / Index Term
ABE, Storage, Deduplication
References
[1] D. Quick, B. Martini, and K. R. Choo, Cloud Storage Forensics. Syngress Publishing / Elsevier, 2014. [Online]. Available: http://www.elsevier.com/books/cloud-storageforensics/quick/978-0-12-419970-5
[2] K. R. Choo, J. Domingo-Ferrer, and L. Zhang, “Cloud cryptography:Theory, practice and future research directions,” Future Generation Comp. Syst., vol. 62, pp. 51–53, 2016.
[3] K. R. Choo, M. Herman, M. Iorga, and B. Martini, “Cloud forensics:State-of-the-art and future directions,” Digital Investigation,vol. 18, pp. 77–78, 2016.
[4] Y. Yang, H. Zhu, H. Lu, J.Weng, Y. Zhang, and K. R. Choo, “Cloud Based data sharing with fine-grained proxy re-encryption,” Pervasive And Mobile Computing, vol. 28, pp. 122–134, 2016.
[5] D. Quick and K. R. Choo, “Google drive: Forensic analysis of data remnants,” J. Network and Computer Applications, vol. 40, pp. 179–193, 2014.
[6] Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3494. Springer, 2005, pp. 457–473.
[7] B.Zhu, K. Li, and R. H. Patterson, “Avoiding the disk bottleneck in the data domain deduplication file system,” in 6th USENIXConference on File and Storage Technologies, FAST 2008, February 26-29, 2008, San Jose, CA, USA. USENIX, 2008, pp. 269–282.
[8] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Advances in Cryptology- EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, ser. Lecture Notes in Computer Science, vol. 7881. Springer, 2013, pp. 296–312.
[9] M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev,“Message-locked encryption for lock-dependent messages,” in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I, ser. Lecture Notes in Computer Science, vol. 8042. Springer, 2013, pp. 374–391.
[10] S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for DEduplicated storage,” in Proceedings of the22th USENIX Security Symposium, Washington, DC, USA, August14-16, 2013. USENIX Association, 2013, pp. 179–194.
[11] M. Bellare and S. Keelveedhi, “Interactive message-locked encryption and secure deduplication,” in Public-Key Cryptography - PKC2015 - 18th IACR International Conference on Practice and Theory in Public KeyCryptography,Gaithersburg, MD, USA, March 30 - April1, 2015, Proceedings, ser. Lecture Notes in Computer Science, vol.9020. Springer, 2015, pp. 516–538.
[12] S. Bugiel, S. N ̈ urnberger, A. Sadeghi, and T. Schneider, “Twinclouds: Secure cloud computing with low latency - (full version),”in Communications and Multimedia Security, 12th IFIP TC 6 / TC11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings, ser. Lecture Notes in Computer Science, vol.7025. Springer, 2011, pp. 32–44.
Citation
A. Prasannakumar Reddy, M. Vikram, N. Sudhakar Reddy, "Securing Cloud Data by Using Multi Keyword Search System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.94-98, 2019.
Particle Swarm Optimized Voltage Stability Analysis Of IEEE 14 Bus System with SVC and TCSC
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.99-115, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.99115
Abstract
Over a last few decade’s voltage instability is a concern phenomenon in power industry. The main cause of voltage instability is the deficit of reactive power in the system and the Active Power losses due to increased inductive reactance of transmission line. Flexible AC transmission system (FACTS) devices can improve the line losses by varying inductive reactance there by increasing Active Power in the system and controlling reactive power by Facts devices which tends to control voltage within the specific limit. In this paper the work is proposed with the help of IEEE 14 bus system in Power World Simulator and comparison have been made in MATLAB. The index of voltage stability Fast Voltage Stability Index (FVSI) gives information about the line which is prone to voltage collapse. At last the location and rating of SVC and TCSC are optimized with help of Particle Swarm Optimization Algorithm to get the voltage within a specific range at all the load buses.
Key-Words / Index Term
FACTS devices, Fast voltage stability index, Power World Simulator , SVC, TCSC, Particle Swarm Optimization
References
[1] P.Kundur, “Power System Stability and Control”, Mc Graw-Hill, 1993.
[2] C.W. Taylor, “Power System Voltage Stability”, McGraw-Hill,1994.
[3] R.Mohan.Mathur, “Thyristor Based FACTS Controllers For Electrical Transmission System” IEEE Press Student Edition.
[4] S.N.Singh, “Electrical Power Generation,Transmission and Distribution, PHI Learning Pvt. Ltd, 2004.
[5] Y.Ma,S Lv,X Zhou,Z Gao, “Review Analysis of Voltage Stability in Power System”, In Proceeding of 2017 IEEE International Conference on Mechatronics and Automation on Aug 6-9, Taksumostu, Japan.
[6] M.Amroune,H.Sebaa, T.Bouktir, “Static Voltage Stability Margin Enhancement Using SVC and TCSC” World Academy of Science,Engineering and Technology.International Journal of Electrical and Computer Engineering. Vol:7, No:10,2013.
[7] S.Singh, J.Hanumant, A.Kashiv, “Application of SVC on IEEE 6 Bus System for Optimization of Voltage Stability” Indonesian Journal of Electrical engineering and Informatics(IJEEI) Vol 3, No.1, pp 1-6,March 2015.
[8] Z.Fei,G.Chunlin,J.Lingyun,Y.Lin,Z Jian, “The Multiple Objective Voltage Stability Coordinated Control Stratergy of FACTS” IEEE proceeding 2013
[9] F.B.K Mahmood,S.Ahmad,G.Mukit. “Weakest Location Exploration in IEEE-14 Bus System for Voltage Stability Improvement Using STATCOM, Synchronous Condenser and Static Capacitor” International Conference on Electrical,Computer and Communication Engineering(ECCE) Buzar,Bangladesh 2013.
[10] H.Jmii,A.Meddeb,S.Chebbi. “An Approach for Improving Voltage Stability by Combination of SVC and TCSC” 7th International Conference on Science of Electronics, Technologies of Information and Telecommunication (SETIT) 2016.
[11] K.G.Damor,D.M.Patel,V.Agrawal,H.G.Patel, “Comparison of Different FACTS Devices. International Journal of Science Technology and Engineering Vol.1, July 2014 ISSN:2349-784X.
[12] V.Preethi,S.Muralidharan,S.Rajasekar. “Application of Genetic Algorithm to Power System Voltage Stability Enhancement Using FACTS Devices”. International Conferences on Recent Advancement in Electrical, Electronics and Control Engineering IEEE 2011.
[13] A.Sheth,C.D.Kotwal,S Pujara, “Optimal Placement of TCSC for Improvement of Static Voltage Stability” Nirma University International Conference on Engineering(NUiCone) , 2015.
[14] R.Yadav,S.Varshney,L.Srivastava, “Enhancement of Voltage stability through optimal placement of TCSC” International Journal of Power System operation and Energy Management, Vol. I, pp39-47, 2011.
[15] P.K.Tiwari,Y.R.Sood. “Optimal Location Of FACTS Devices in Power System Using Genetic Algorithm” Nature and Biologically Inspired Computing, 2009 , NABIC 2009 World Congress.
[16] N.Ismail,A.Zin,A.Khairuddin,S.Khokhar. “A Comparison of Voltage Stability Indices” 8th International Power Engineering and Optimization Conference (PEOCO2014), Malaysia 24-25 March 2014.
[17] C.Reis,F.P.Barbosa “Line Indices for voltage stability assessment,” IEEE Power Tech conference, Bucharest Romania, pp 1-6, 2009.
[18] A.Ahmed,A.Esmin,G.Lambert. “Application of Particle Swarm Optimization to optimal Power System” International Journal of Innovative Computing, Information and Control, Vol:8 No 3-A,March 2012.
[19] N.Sahu,A.Dubey. “Optimal location of Statcom Using Particle Swarm Optimization in IEEE-14 Bus System to Improve voltage Profile and THD Reduction.International journal of Science and Research(IJSR) ISSN : 2319-7064.
[20] S.Kiran,S.Dash,C.Subramani,S.pathy, “An Efficient Swarm Optimization Techniques for Stability Analysis in IEEE-14 Bus System.International Journal of Science and Technology ISSN-0974-5645 April 2016.
[21] C.Kumar,P.Raju, “Constrained Optimal Power Flow using Particle Swarm Optimization” International journal of Emerging Technology and Advanced Engineering” ISSN 2250-2459 Vol 2 February 2012.
[22] D.Gaur,L.Mathew, “Optimal placement of FACTS devices using optimization techniques: A Review” 3rd International Conference on Communication Systems (ICCS-2017).
[23] Appendix A – Standard IEEE 14 bus System data.
Citation
Rahul Pradip, Chetan D. Kotwal, Shital M. Pujara, "Particle Swarm Optimized Voltage Stability Analysis Of IEEE 14 Bus System with SVC and TCSC," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.99-115, 2019.