Smart Heart Consulting System
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.679-683, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.679683
Abstract
Heart is the major organ comparing to other organs in the human body. It pumps the blood and supplies to all organs of the whole body. It is a significant work to predict the heart disease. Accurate and on time diagnosis of heart disease is important for heart failure prevention and treatment. Detecting heart disease is one of the major issue. Heart disease diagnosis is a very complex task which requires much experience and knowledge. Since heart is the most important part of human body, one should have healthy heart for their lifetime. Heart disease is a prevailing disease nowadays. The cost of diagnosis itself is very large and due to this many people who are not financially affordable step back from early diagnosis. Hospitals and clinic have a huge amount of patient data over years, and these data can be used for analysis of risk factors of many disease. Artificial neural network has emerged as an important tool for classification, they helps for efficient classification of given data. In this SMART HEART CONSULTING SYSTEM, we are proposing a prediction system for heart disease using artificial neural network. The proposed system is using 13 attributes and 80 datasets. Here in the system the user gives results of various clinical tests and the system provides the chances for heart disease.
Key-Words / Index Term
ANN, Backpropagation algorithm, ECG
References
[1]. T. Sayad,P.P.Halkanikarm diagnosis of heart disease using Neural network approach,International journal of advances in science engineering and technology,july 2014
[2]Marimuth,M.Abhinaya,K.S.Hareesh.K.Madhana kumar,V.Pavithra,”A Review on Heart
Disease Prediction using Machine learning and data analytics approach”International journal
of computer applications,september 2018
[3]Mudasir Manzoor Kirmani,Syed Immamaul Anarsullah,”Prediction of heart disease using decision tree a data mining technique”International journal of computer science and social network, December 2016
[4] Mythili T,Dev Mukherjee,Nikita Padalia and Abhiram Naidu,”A heart disease prediction model using SVM-DT-Logistic regression”International journal of computer applications,April 2013
[5] Rasim Assari,Parham Azimi and Mohammed Rezza Taghva,”Heart disease diagnosis using data mining techniques”,International journal of economics and management sciences,2017.
[6]K.Polaraju,D.Durga Prasad”Prediction of Heart Disease using Multiple Linear Regression Model”IJDSR 2017
[7] Atul Kumar Pandey ,Prabhat Pandey ,K.L. Jaiswal ,Ashish Kumar Sen ,”Heart disease prediction using decision tree”, IOSR Journal of Computer Engineering ,August 2013
[8] S.Maheswari et,” Heart disease prediction system using decision tree and naïve bayes algorithm”.
Citation
Raechel Baby, Nisha Elsa Varghese, Anju S James, Athulya Chandran, Anna Liya Mathew, "Smart Heart Consulting System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.679-683, 2019.
Finding Trusted Node in Mobile Ad-Hoc Network
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.684-689, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.684689
Abstract
The mobile ad hoc networks (MANETs) encompassed of a dynamic topology and open wireless medium may lead to MANET affected by several security liabilities. MANET could be set of restricted vary wireless nodes that perform in a cooperative manner thereby increasing the overall range of the network. The performance of ad hoc networks depends on the supportive and trust environment of the distributed nodes. To enhance security in ad hoc networks, it is important to evaluate the trustworthiness of alternative nodes without centralized authorities. In this paper, a study was made based on the trust models such as direct Trust, Indirect Trust and Analytic Network Process (ANP). These trust models are incorporated to reflect the trust relationship`s complexity and uncertainty. Based on the trust factors, the selection of the trusted nodes is obtained by using methods like direct Trust, Indirect Trust, and Analytic Network Process. ANP is used for making trust decisions which replace the traditional methods like direct Trust and Indirect Trust methods. Hence from the study, we analyzed that the selected nodes obtained by using the ANP decision theorem eliminate the malicious nodes and helps to protect the network from any internal attacks.
Key-Words / Index Term
MANET, Trusted Node, Direct Trust, Indirect Trust, Analytic Network Process
References
[1] R. Li, J. Li, P. Liu, and J. Kato, “A Novel Hybrid Trust Management Framework for MANETs,” in Proc. 29th IEEE Int. Conf. Distrib. Comput. Syst. Workshops, 2009, pp.251–256.
[2] J. Luo, X. Liu, and M. Fan, “A Trust Model Based on AFuzzy Recommendation for Mobile Ad-hoc Networks,” Comput. Netw., vol. 53, no. 14, pp. 2396–2407, 2009.
[3] Satty, T.L.: “The Analytic Hierarchy Process” (McGraw-Hill, New York, 1980).
[4] Xia, Hui, et al. "Trust Management Model for Mobile Ad hoc Network Based on Analytic Hierarchy Process and Fuzzy Theory." Wireless Sensor Systems, IET1.4 (2011): 248-266.
[5] Sun, Y. L., Yu, W., Han, Z., Ray, L. K. J.: “Trust Modeling and Evaluation in Adhoc Networks”.Proc. Global Telecommunications, 2005,pp.1–10.
[6] Sun, Y.L., Yu, W., Han, Z., Ray, L. K. J.: “Information Theoretic Framework of Trust Modeling and Evaluation for Ad hoc Networks”, IEEE J. Sel.Areas Commun., 2006, 24, (2), pp.305–319.
[7] Josang, A.: “A Logic for Uncertain Probabilities”, Int. J. Uncertainty, Fuzziness, Knowledge-Based Syst., 2001, 9,(3),pp 179–311 13.
[8] Beth, T., Borcherding, M., Klein, B.:“Valuation of Trust in Open Network”.Proc.ESORICS, 1994, pp.3–15.
[9] H.Yu, S. Liu, A.C.Kot, C.Miao, and C.Leung, ‘’Dynamic Witness Selection for Trustworthy distributed Cooperative Sensing in Cognitive Radio Networks’’, Communication Technology (ICCT), 2011 IEEE 13th International Conference on, pp. 1-6, 2011.
[10] P. B. Velloso, R. P. Laufer, D. de O Cunha, O.C.M.Duarte, and G.Pu-jolle, ‘’Trust Management in mobile ad hoc networks using a scalable maturity-based model,’’Network and Service Management, IEEE Transactions on, 7, (3), pp. 172-185, 2010.
[11] C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, “E-Hermes: A Robust Cooperative trust establishment scheme for mobile Ad-hoc Networks,” Ad Hoc Netw., vol. 7, no. 6,pp. 1156–1168, 2009.
[12] Saaty, Thomas L. "Analytic Network Process." Encyclopedia of Operations Research and Management Science.Springer US, 2001 8-35.
[13] Y. L. Sun, W. Yu, Z. Han, and K. Liu,” Information theoretic framework of trust modeling and evaluation for ad hoc networks, “IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp 305-317, Feb 2006.
[14] X. Li, M. R. Lyu, and J. Liu, “A trust model based routing protocol for secure ad hoc networks,” in Proceedings 2004 IEEE Aerospace Conference, Big Sky, Montana, U.S.A., March 6-13 2004.
[15] Xiao - Lin, LI Xiao - Yong GUI. "Trust Quantitative Model with Multiple Decision Factors in Trusted Network [J]." Chinese Journal of Computers 3 (2009): 004.
[16] Xia, Hui, et al."A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules." Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications. IEEE Computer Society, 2011.
[17] Lubdha M. Bendale, Roshani. L. Jain, Gayatri D. Patil, "Study of Various Routing Protocols in Mobile Ad-Hoc Networks", International Journal of Scientific Research in Network Security and Communication, Vol.06, Issue.01, pp.1-5, 2018.
[18] Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali, "Review Paper on Shallow Learning and Deep Learning Methods for Network security", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.45-54, 2018.
Citation
G. Viswanathan, M. Jayakumar, "Finding Trusted Node in Mobile Ad-Hoc Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.684-689, 2019.
A Survey of Data Hiding methods for data security in Cloud
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.690-694, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.690694
Abstract
In recent years cloud computing has achieved great development as it provides economic and convenient services. Cloud data services are an interesting and the latest way for storing enterprise data as more companies and users are uploading their data to cloud. The problem of data privacy and security needs to be addressed efficiently to fully utilize the power of cloud data services. Data security is a crucial aspect in cloud data storage and transmission. The use of data hiding methods for the security in data transmission and data storage would be very effective in securing cloud data. In this paper, we present a survey of data encryption methods, steganography methods and hybrid methods, that have been extensively applied in this context. However, majority of these methods suffer the overloads involved with encryption techniques and also have heavy computational time. A new method that specifically addresses security of cloud without the usage of encryption process is essential for reducing the overheads of encryption techniques, thereby improving the overall performance. At this juncture, data hiding techniques are considered to be more suitable and potential substitute over the encryption-based cloud data storage security techniques existing in the literature. We propose to build such data hiding techniques as future work.
Key-Words / Index Term
Data Hiding, Cloud data security, Encryption Techniques, Data aggregation
References
[1] Avizienis A, Laprie J C, Randell B and Landwehr C 2004 “Basic concepts and taxonomy of dependable and secure computing”. IEEE Trans. Depend. Secure Comput. 1(1): 11-33
[2] A. Kaur and M. Bhardwaj, “Hybrid encryption for cloud database security”, International Journal of Engineering Science & Advanced Technology, vol. 2, pp. 737 -741, 2012.
[3] A. Rao, “Centralized database security in cloud”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, pp. 544-549, 2012.
[4] D. Manivannan and R. Sujarani, “Light weight and secure database encryption using tsfs algorithm”, in Proceedings of the International Conference on Computing Communication and Networking Technologies (ICCCNT ’10), pp. 17, IEEE, 2010.
[5] Handa, Karun, and Uma Singh. "Data security in cloud computing using encryption and steganography." International Journal of Computer Science and Mobile Computing vol. 4, pp. 786-791, 2015.
[6] E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing”, in Proceedings of the 8th International Conference on Informatics and Systems (INFOS ’12), pp. CC-12CC-17, IEEE, 2012.
[7] K. Huang and R. Tso, “A commutative encryption scheme based on ElGamal encryption”, in Proceedings of the 3rd International Conference on Information Security and Intelligent Control (ISIC 12), pp. 156-159, IEEE, August 2012.
[8] Kevin Skapinetz, "Virtualisation as a Blackhat Tool," in Network Security, Elsevier., 2007, pp. 4-7.
[9] Kini, K., M. Mithani, R. Naik, D. Raut, et M. Kumbar. “Securing cloud data using crypto-stegno based technique”. Journal of Insect Behavior 5, 178-180, 2016
[10] MR KA Sarkar TR Chatterjee.. “Enhancing Data Storage Security in Cloud Computing Through Steganography”. ACEEE Int. J. on Network Security, Vol. 5, No. 1.2014.
[11] Muhammad Usman, Mian Ahmad Jan, Xiangjian He, “Cryptography-based secure data storage and sharing using HEVC and public clouds”, Information Sciences, Volume 387, 2017, Pages 90-102, ISSN 0020-0255, https://doi.org/10.1016/j.ins.2016.08.059.
[12] N. Garg, and K. Kaur, "Hybrid information security model for cloud storage systems using hybrid data security scheme", International Research Journal of Engineering and Technology, Vol. 3, Issue 4, pp.2194-2196, 2016.
[13] Singla, S. et J. Singh . “Implementing cloud data security by encryption using rijndael algorithm”. Global Journal of Computer Science and Technology Cloud and Distributed 13,19-22.2013
[14] Singla, Surbhi. “Data Embedding Technique for Image Steganography in Cloud Computing”. Diss. 2018.
[15] Suneetha, D., and R. Kiran Kumar. "A Novel Algorithm for Enhancing the Data Storage Security in Cloud through Steganography". Advances in Computational Sciences and Technology,Vol. 10: 2737-2744, 2017
[16] Tirthani, Neha, and R. Ganesan. "Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography" IACR Cryptology ePrint Archive 2014 (2014): 49.
Citation
A Mallareddy, R Sridevi, Ch G V N Prasad, "A Survey of Data Hiding methods for data security in Cloud," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.690-694, 2019.
Towards Better Single Document Summarization using Multi-Document Summarization Approach
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.695-703, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.695703
Abstract
Extractive Single Document Summarization (SDS) is the task of summarizing a single document via extracting importance sentences verbatim and arranging them in a cohesive manner. It is different from Multi-Document Summarization (MDS) where multiple source documents are processed to generate a single summary. This paper proposes a two-stage mechanism to perform single document summarization via multi-document summarization technique. The approach involves the use of popular extractive summarization algorithms to generate summaries which are then further processed as multi-document summarization instance. The MDS approach used is based on word graph based sentence fusion followed by concept-based Integer Linear Programming (ILP) method for maximizing the coverage in sentence selection. The proposed system outperforms each of the single document summarizers by at least 2.6 percent point ROUGE scores, thereby indicating that performing single document summarization via multi-document summarization is a promising venue for further research in summarization.
Key-Words / Index Term
Text Summarization, Single Document Summarization (SDS), Multi-Document Summarization (MDS), Extractive Summarization, Integer Linear Programming (ILP)
References
[1] I. Mani, “Advances in automatic text summarization. “MIT press, 1999.
[2] D.R. Radev, E. Hovy, K. McKeown, “Introduction to the special issue on summarization.“ Computational linguistics, 28(4), pp.399-408, 2002.
[3] H. Saggion, T. Poibeau, “Automatic text summarization: Past, present and future.” In Multi-source, multilingual information extraction and summarization (pp. 3-21). Springer, Berlin, Heidelberg, 2013.
[4] M.Y. Kan, K.R. McKeown, J.L. Klavans, “Applying natural language generation to indicative summarization.” In Proceedings of the 8th European workshop on Natural Language Generation-Volume 8 (pp. 1-9). Association for Computational Linguistics, 2001.
[5] H. Saggion, G. Lapalme, “Generating indicative-informative summaries with sumUM.” Computational linguistics, 28(4), pp.497-526, 2002.
[6] J.L. Klavans, M.Y. Kan, K. McKeown, “Domain-specific informative and indicative summarization for information retrieval.”, In proceedings of the Workshop on text summarization (DUC 2001), 2001.
[7] T. Hirao, M. Nishino, M. Nagata, “Oracle Summaries of Compressive Summarization.” In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers) (Vol. 2, pp. 275-280), 2017.
[8] W. Bosma, “Query-based summarization using rhetorical structure theory.” LOT Occasional Series, 4, pp.29-44, 2005.
[9] H.G. Silber, K.F. McCoy, “An efficient text summarizer using lexical chains.” In Proceedings of the first international conference on Natural language generation-Volume 14 (pp. 268-271). Association for Computational Linguistics, 2000.
[10] R. Barzilay, M. Elhadad, “Using lexical chains for text summarization.” Advances in automatic text summarization, pp.111-121, 1999.
[11] Y. Gong, X. Liu, “Generic text summarization using relevance measure and latent semantic analysis.” In Proceedings of the 24th annual international ACM SIGIR conference on Research and development in information retrieval (pp. 19-25). ACM, 2001.
[12] S. Deerwester, S.T. Dumais, G.W. Furnas, T.K. Landauer, R. Harshman, “Indexing by latent semantic analysis.” Journal of the American society for information science, 41(6), pp.391-407, 1990.
[13] S.M. Harabagiu, F. Lacatusu, “Generating single and multi-document summaries with gistexter.” In Document Understanding Conferences (pp. 11-12), 2002.
[14] G. Erkan, D.R. Radev, “Lexrank: Graph-based lexical centrality as salience in text summarization.” Journal of artificial intelligence research, 22, pp.457-479, 2004.
[15] O. Sornil, K. Gree-Ut, “An automatic text summarization approach using content-based and graph-based characteristics.” In 2006 IEEE Conference on Cybernetics and Intelligent Systems (pp. 1-6). IEEE, 2006.
[16] H. Chen, T. Ng, “An algorithmic approach to concept exploration in a large knowledge network (automatic thesaurus consultation): Symbolic branch and bound search vs. connectionist Hopfield net activation.” Journal of the American Society for Information Science, 46(5), pp.348-369, 1995.
[17] C. Smith, H. Danielsson, A. Jönsson, “A more cohesive summarizer. “ Proceedings of COLING 2012: Posters, pp.1161-1170, 2012.
[18] J. Cheng, M. Lapata, “Neural summarization by extracting sentences and words. “ In proc. Of 54th Annual Meeting of the Association for Computational Linguistics, 2016.
[19] R. Nallapati, F. Zhai, B. Zhou, “Summarunner: A recurrent neural network based sequence model for extractive summarization of documents.“ In Thirty-First AAAI Conference on Artificial Intelligence, 2017.
[20] D.R. Timothy, T. Allison, S. Blair-goldensohn, J. Blitzer, A. Elebi, S. Dimitrov, E. Drabek, A. Hakim, W. Lam, D. Liu, J. Otterbacher, “MEAD a platform for multidocument multilingual text summarization.” In International Conference on Language Resources and Evaluation, 2004.
[21] A. Celikyilmaz, D. Hakkani-Tur, “A hybrid hierarchical model for multi-document summarization.” In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics (pp. 815-824). Association for Computational Linguistics, 2010.
[22] M.A. Fattah, “A hybrid machine learning model for multi-document summarization.” Applied intelligence, 40(4), pp.592-600, 2014.
[23] Z. Cao, F. Wei, L. Dong, S. Li, M. Zhou, “Ranking with recursive neural networks and its application to multi-document summarization. “ In Twenty-ninth AAAI conference on artificial intelligence, 2015.
[24] T. Hirao, M. Nishino, M. Nagata, “Oracle Summaries of Compressive Summarization.” In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers) (Vol. 2, pp. 275-280), 2017.
[25] F. Galgani, P. Compton, A. Hoffmann, “Combining different summarization techniques for legal text.” In Proceedings of the Workshop on Innovative Hybrid Approaches to the Processing of Textual Data (pp. 115-123). Association for Computational Linguistics, 2012.
[26] K. Hong, M. Marcus, A. Nenkova, “System combination for multi-document summarization.” In Proceedings of the 2015 conference on empirical methods in natural language processing (pp. 107-117), 2015.
[27] S. Dutta, V. Chandra, K. Mehra, A.K. Das, T. Chakraborty, S. Ghosh, “Ensemble Algorithms for Microblog Summarization.” IEEE Intelligent Systems, 33(3), pp.4-14, 2018.
[28] S. Kullback, “Information theory and statistics.” Courier Corporation, 1997.
[29] A. Haghighi, L, Vanderwende, “Exploring content models for multi-document summarization.” In Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics (pp. 362-370). Association for Computational Linguistics, 2009.
[30] J. Steinberger, K. Jezek, “Using latent semantic analysis in text summarization and summary evaluation.” Proc. ISIM, 4, pp.93-100, 2004.
[31] H.P. Luhn, “The automatic creation of literature abstracts.” IBM Journal of research and development, 2(2), pp.159-165, 1958.
[32] A. Nenkova, L. Vanderwende, “The impact of frequency on summarization.” Microsoft Research, Redmond, Washington, Tech. Rep. MSR-TR-2005, 101, 2005.
[33] R. Mihalcea, P. Tarau, “Textrank: Bringing order into text.” In Proceedings of the 2004 conference on empirical methods in natural language processing, 2004.
[34] S. Robertson, H. Zaragoza, “The probabilistic relevance framework: BM25 and beyond. “ Foundations and Trends® in Information Retrieval, 3(4), pp.333, 2009.
[35] F. Barrios, F. López, L. Argerich, R. Wachenchauzer, “Variations of the similarity function of textrank for automated summarization.”, In Proc. Argentine Symposium on Artificial Intelligence, ASAI, 2016.
[36] K. Filippova, “Multi-sentence compression: Finding shortest paths in word graphs.” In Proceedings of the 23rd International Conference on Computational Linguistics(pp. 322-330). Association for Computational Linguistics, 2010.
[37] D. Gillick, B. Favre, “A scalable global model for summarization.” In Proceedings of the Workshop on Integer Linear Programming for Natural Language Processing (pp. 10-18). Association for Computational Linguistics, 2009.
[38] C. Li, X. Qian, Y. Liu, “Using supervised bigram-based ILP for extractive summarization.” In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) (Vol. 1, pp. 1004-1013), 2013.
[39] C.Y. Lin, “Rouge: A package for automatic evaluation of summaries.” Text Summarization Branches Out, 2004.
[40] R. Garcia, R. Lima, B. Espinasse, H. Oliveira, “Towards coherent single-document summarization: an integer linear programming-based approach.” In Proceedings of the 33rd Annual ACM Symposium on Applied Computing (pp. 712-719). ACM, 2018.
[41] K. Filippova, M. Strube, ”Sentence fusion via dependency graph compression.” In Proceedings of the Conference on Empirical Methods in Natural Language Processing (pp. 177-185). Association for Computational Linguistics, 2008.
[42] K.S. Kumar, S. Prasad, S. Banwral, V.B. Semwal, V.B., “Sports video summarization using priority curve algorithm.” International Journal on Computer Science & Engineering, 2(9), pp.2996-3002, 2010.
[43] S. Saraswathi, M. Hemamalini, S. Janani, V. Priyadharshini, “Multi-document Summarization for Query Answering E-learning System.” International Journal on Computer Science and Engineering (IJCSE), 3(3), pp.1147-1154, 2011.
Citation
Sandhya Singh, Kevin Patel, Krishnanjan Bhattacharjee, Hemant Darbari, Seema Verma, "Towards Better Single Document Summarization using Multi-Document Summarization Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.695-703, 2019.
Federated AI lets a team imagine together: Federated Learning of GANs
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.704-709, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.704709
Abstract
Envisioning a new imaginative idea together is a popular human need. Imagining together as a team can often lead to breakthrough ideas, but the collaboration effort can also be challenging, especially when the team members are separated by time & space. What if there is a AI that can assist the team to collaboratively envision new ideas?. Is it possible to develop a working model of such an AI? The contribution of this paper is to develop such an intelligence. This paper proposes a formula to design such a creative & collaborative intelligence by employing a form of distributed machine learning approach called Federated Learning along with Generative Adversarial Network (GAN) fusion. This paper demonstrates this novel deep learning architectural paradigm by developing a practical working prototype. The outputs of the prototype of this novel AI paradigm in showcased in this paper. This collaborative creative AI presents a new paradigm in AI, one that lets a team of two or more to come together to imagine and envision ideas that is mutual liked by all team members as well one that synergies well with each other’s likes. This was possible by a completely new way to combine federated learning with an interesting new way to combine multiple GAN together. In short, this paper contributes a novel type of AI paradigm, called Federated AI Imagination one that lets geographically distributed teams to collaboratively imagine new possibilities.
Key-Words / Index Term
Artificial Intelligence, Distributed Machine Leaning, Generative Deep Learning, Generative Adversarial Networks, Federated learning, Creative AI, AI based Collaboration, AI planning
References
[1] Smith, Virginia, Chao-Kai C, Maziar S, and Ameet S, “Federated multi-task learning”, Advances in Neural Information Processing Systems, pp. 4424-4434. 2017.
[2] Bonawitz et al., “Towards Federated Learning at Scale: System Design.”, arXiv:1902.01046, 2019
[3] Goodfellow Ian et al., “Generative adversarial nets.”, Advances in neural information processing systems, pp. 2672-2680, 2014
[4] Kurakin, Alexey, I. Goodfellow, S. Bengio. “Adversarial machine learning at scale.” arXiv:1611.01236, 2016
[5] Konecny J, H. Brendan, Daniel R, and Peter R, “Federated optimization: Distributed machine learning for on-device intelligence”, arXiv:1610.02527, 2016.
[6] Hard at el., “Federated learning for mobile keyboard prediction”, arXiv:1811.03604 , 2018.
[7] Zhang, H., Goodfellow, I., Metaxas, D. and Odena, A., “Self-attention generative adversarial networks”. arXiv:1805.08318, 2018
[8] Wang, Xiaofei, Yiwen H, Chenyang W, Qiyang Z, Xu C, Min C, “In-edge AI: Intelligentizing mobile edge computing, caching and communication by federated learning.”, arXiv:1809.07857, 2018
[9] Ma, Jiayi, Wei Yu, Pengwei Liang, Chang Li, and Junjun Jiang, “FusionGAN: A generative adversarial network for infrared and visible image fusion.” Information Fusion 48, pp. 11-26, 2019
[10] Bonawitz at el., “Practical secure aggregation for privacy-preserving machine learning.” Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175-1191, ACM, 2017
[11] Andrew Y. Ng et al, “Multimodal deep learning.”, Proceedings of the 28th international conference on machine learning, ICML-11, pp. 689-696, 2011
[12] Zhang at el, “Stackgan: Text to photo-realistic image synthesis with stacked generative adversarial networks.”. Proceedings of the IEEE International Conference on Computer Vision, pp. 5907-5915, 2017
[13] Jarrahi, M. Hossein. “Artificial intelligence and the future of work: human-AI symbiosis in organizational decision making.”, Business Horizons 61, no. 4 , pp 577-586, 2018
[14] Nie et al., “Medical image synthesis with context-aware generative adversarial networks.”, International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 417-425. Springer, Cham, 2017
[15] N.S. Lele “Image Classification Using Convolutional Neural Network”, International Journal of Scientific Research in Computer Science and Engineering 6.3, Pp. 22-26, 2018
[16] Bala , Sudhakar, “Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.132-135, 2017
[17] Mishra et al, “A generative approach to zero-shot and few-shot action recognition.”, IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 372-380. IEEE, 2018
Citation
Rajagopal. A, Nirmala. V, "Federated AI lets a team imagine together: Federated Learning of GANs," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.704-709, 2019.
Phishing URL Classification Using ARM Based Association Rules
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.710-717, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.710717
Abstract
The usages of internet and increasing volume of internet users force us to think about the current cyber security and its infrastructure. There are a number of different kinds of attack deployed using the internet among the phishing is one of the most serious attack conditions. In this condition an innocent user can lose their financial status or social credibility. The phishing attacker still the users private, sensitive and confidential information, additionally usages these data to harm the target person. Therefore it is a serious criminal offence. In this context a number of techniques are developed for resolving the issues of phishing attacks, but most of them are not much effective due to changing strategies of the phishing attackers. The phishing attacks are mostly deployed using the malicious and forged URLs. Thus the pattern recognition of these URLs can help us to resolve the phishing attacks. In this presented work a data mining based phishing URL classification technique is proposed for design and implementation. The proposed technique usages the phish tank database for obtaining the knowledge about the phishing URL properties and then using these properties the data mining system prepare the rules for identifying the target phishing URLs. In this context the ARM algorithm is employed. The Arm algorithm first prepares the association rules using the apriori algorithm. After generation of association rules the confidence based score are used to label each rule to a score values. Finally on the basis of score threshold the unfruitful rules are pruned. The remaining rules are used for classification task. The proposed technique is implemented and their performance is measured, according to the gained performance the proposed technique is accurate and efficient as compared to the traditional apriori algorithm based classification technique.
Key-Words / Index Term
phishing attack, malicious URL classification, association rule mining, rule based classification, ARM algorithm, outlier removal
References
[1] S. Carolin Jeeva and Elijah Blessing Rajsingh, “Intelligent phishing url detection using association rule mining”, Hum. Cent. Comput. Inf. Sci. (2016) 6:10, DOI 10.1186/s13673-016-0064-3
[2] Gorunescu, F, Data Mining: Concepts, Models, and Techniques, Springer, 2011.
[3] Han, J., and Kamber, M., Data mining: Concepts and techniques, Morgan-Kaufman Series of Data Management Systems San Diego: Academic Press, 2001.
[4] Neelam adhab Padhy, Dr. Pragnyaban Mishra and Rasmita Panigrahi, “The Survey of Data Mining Applications and Feature Scope, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)”, vol.2, no.3, June
[5] Manoj and Jatinder Singh, “Applications of Data Mining for Intrusion Detection”, International Journal of Educational Planning & Administration. Volume 1, Number 1 (2011), pp. 37-42
[6] M. Rajalakshmi, M. Sakthi, “Max-Miner Algorithm Using Knowledge Discovery Process in Data Mining”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 11, November 2015
[7] Smriti Srivastava & Anchal Garg, “Data Mining For Credit Card Risk Analysis: A Review”, International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Vol. 3, Issue 2, Jun 2013, 193-200
[8] Dipti Verma and Rakesh Nashine, “Data Mining: Next Generation Challenges and Future Directions”, International Journal of Modeling and Optimization, Vol. 2, No. 5, October 2012
[9] Neelamadhab Padhy, Dr. Pragnyaban Mishra, “The Survey of Data Mining Applications and Feature Scope”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), PP. 43-58 Vol.2, No.3, June 2012.
[10] Watson, D., Holz, T., and Mueller, S. (2005) Know your enemy: Phishing, behind the scenes of Phishing attacks, The Honeynet Project & Research Alliance
[11] Jagatic, T., Johnson, N., Jakobsson, M., and Menczer, F. (2007) Social Phishing, Community. ACM, Vol. 50, No. 10 (pp. 94-100).
Citation
Rahul Patel, Anand Rajavat, "Phishing URL Classification Using ARM Based Association Rules," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.710-717, 2019.
Video Text Detection and Recognition Based on a Transferred Deep Convolutional Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.718-723, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.718723
Abstract
The text presented in videos contains important information for content analysis, indexing, and retrieval of videos. The key technique for extracting this information is to find, verify, and recognize video text in various languages and fonts against complex backgrounds. In this paper, we propose a novel method that transferred deep convolutional neural networks for detecting and recognizing video text. We partition the candidate text regions into candidate text lines by projection analysis using two alternative methods. We develop a novel fuzzy c-means clustering-based separation algorithm to obtain a clean text layer from complex backgrounds so that the text is correctly recognized by commercial optical character recognition software. The proposed method is robust and has good performance on video text detection and recognition, which was evaluated on three publicly available test data sets and on the high-resolution test data set we constructed.
Key-Words / Index Term
Video Text Detection, Recognition, Transferred convolutional neural network, Fuzzy c-means Clustering.
References
[1] Y. A. Aslandogan and C. T. Yu, ‘‘Techniques and systems for image and video retrieval,’’ IEEE Trans. Knowl. Data Eng., vol. 11, no. 1, pp. 56–63, Jan. 1999.
[2] H. Bhaskar and L. Mihaylova, ‘‘Combined feature-level video indexing using block-based motion estimation,’’ in Proc. Conf. Inf. Fusion, Jul. 2010, pp. 1–8.
[3] W. Hu, N. Xie, L. Li, X. Zeng, and S. Maybank, ‘‘A survey on visual content-based video indexing and retrieval,’’ IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 41, no. 6, pp. 797–819, Nov. 2011.
[4] K. Jung, K. I. Kim, and A. K. Jain, ‘‘Text information extraction in images and video: A survey,’’ Pattern Recognit., vol. 37, no. 5, pp. 977–997, 2004.
[5] M. Khodadadi and A. Behrad, ‘‘Text localization, extraction and inpainting in color images,’’ in Proc. Iranian Conf. Elect. Eng., May 2012, pp. 1035–1040.
[6] A. Mosleh, N. Bouguila, and A. B. Hamza, ‘‘Automatic inpainting scheme for video text detection and removal,’’ IEEE Trans. Image Process., vol. 22, no. 11, pp. 4460–4472, Nov. 2013.
[7] M. Cai, J. Song, and M. R. Lyu, ‘‘A new approach for video text detection,’’ in Proc. Int. Conf. Image Process., vol. 1, Sep. 2002, pp. I-117–I-120.
[8] T. Yusufu, Y. Wang, and X. Fang, ‘‘A video text detection and tracking system,’’ in Proc. IEEE Int. Symp. Multimedia, Dec. 2013, pp. 522–529.
[9] X. Huang, ‘‘A novel video text extraction approach based on Log–Gabor filters,’’ in Proc. Int. Congr. Image Signal Process., vol. 1, Oct. 2011, pp. 474–478.
[10] P. Shivakumara, W. Huang, and C. L. Tan, ‘‘Efficient video text detection using edge features,’’ in Proc. Int. Conf. Pattern Recognit., Dec. 2008, pp. 1–4.
[11] X. Zhao, K.-H. Lin, Y. Fu, Y. Hu, Y. Liu, and T. S. Huang, ‘‘Text from corners: A novel approach to detect text and caption in videos,’’ IEEE Image Process., vol. 20, no. 3, pp. 790–799, Mar. 2011.
Citation
Namrata Choudhary, Kirti Jain, "Video Text Detection and Recognition Based on a Transferred Deep Convolutional Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.718-723, 2019.
Use of Social Media in e-Governance: A Study Towards Special Reference to India
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.724-733, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.724733
Abstract
This paper attempts to analyze the current use of social networks and their promising advantages for electronic governance in governmental organizations. Discuss potential problems, especially issues related to the security and privacy of people, Employees, infrastructure and data that prevent the successful implementation of social networks for electronic governance. Examine India`s governance framework project to integrate social media into the organizational structure and examine those issued guidelines for the platform to be used, authorization to participate on behalf of the government organization, scope and extent of said commitment, etc. Compare these guidelines with similar patterns from other nations in terms of access, account management, acceptable use, employee conduct, content, security, legal issues and citizen behavior list its merits, demerits and scope for future improvements.
Key-Words / Index Term
e-Governance; Social Media; Social Media Policy; Social Media Framework
References
[1]. M.T. Banday, M.M. Mattoo “Scientific Research: Social Networking” http://dx.doi.org/10.4236/sn.2013.22006 Published Online April 2013 2013 2, 47-56 (http://www.scirp.org/journal/sn)
[2]. Human Capital Institute, “Social Networking in Govern- ment: Opportunities and Challenges,” 2012. http://www.hci.org/files/field_content_file/SNGovt_SummaryFINAL.pdf
[3]. T. D. Susanto and R. Goodwin, “Factors Influencing Citi- zen Adoption of SMS-Based e-Government Services,” Electronic Journal of E-Government, Vol. 8, No. 1, 2010, pp. 55-71.
[4]. United Nations, “e-Government Survey,” 2012. http://unpan1.un.org/intradoc/groups/public/documents/un/unpan048065.pdf. ISBN: 978-92-1-123190-8
[5]. R. Reffat, “Developing a Successful e-Government,” Work- ing Paper, School of Architecture, Design Science and Planning, University of Sydney, Sydney, 2003.
[6]. Z. Fang, “e-Government in Digital Era: Concept, Practice and Development,” International Journal of the Com- puter, the Internet and Information, Vol. 10, No. 2, 2002, pp. 1-22.
[7]. W. Darrell, “US State and Federal e-Government Full Report,” 2002. http://www. insidepolitics.org/egovt02us.pdf
[8]. N. Sampson, “Bank Marketing International: Simplifying in (Form)ation,” 2002. http://www.mandoforms.com/news/coverage/bankmarketing.html
[9]. A. Kurunananda and V. Weerakkody, “e-Government Im- plementation in Sri Lanka: Lessons from the UK,” Pro- ceedings of 8th International Information Technology Conference, Colombo, 12-13 October 2006, pp. 53-65.
[10]. F. Bélanger and L. Carter, “The Effects of the Digital Divide on e-Government: An Empirical Evaluation,” Pro- ceedings of the 39th Hawaii International Conference on System Sciences, Vol. 4, 2006, pp. 1-7.
[11]. D. H. McKnight and N. L. Chervany, “What Trust Means in e-Commerce Customer Relationships: An Interdisci- plinary Conceptual Typology,” International Journal of Electronic Commerce, Vol. 6, No. 2, 2001-2002, pp. 35- 59.
[12]. F. V. Morgeson, D. Van Amburg and S. Mithas, “Mis- placed Trust? Exploring the Structure of the e-Govern- ment-Citizen Trust Relationship,” Journal of Public Ad- ministration Research and Theory, 2010. http://www.terpconnect.umd.edu/~smithas/papers/morgesonetal2010jpart.pdf
[13]. T. S. H. Teo, S. C. Srivastava and L. Jiang, “Trust and Electronic Government Success: An Empirical Study,” Journal of Management Information Systems, Vol. 25, No. 3, 2008-2009, pp. 99-132.
[14]. E. W. Welch, C. C. Hinnant and M. J. Moon, “Linking Citizen’s Satisfaction with e-Government and Trust in Government,” Journal of Public Administration Research and Theory, Vol. 15, No. 3, 2005, pp. 371-391. doi:10.1093/jopart/mui021
[15]. B. Shah, “Increasing e-Government Adoption through Social Media: A Case of Nepal,” Örebro University, Swedish Business School at Örebro University, Örebro, Sweden, 2010. http://oru.diva-portal.org/smash/get/diva2:372485/FULLTEXT01
[16]. Y. Charalabidis and E. Loukis, “Transforming Government Agencies’ Approach to e-Participation through Efficient Exploitation of Social Media,” ECIS 2011 Proceedings, Paper 84, 2011. http://aisel.aisnet.org/ecis 2011/84.
[17]. J. Michael Magro, “A Review of Social Media Use in e-Government,” Administrative Science, Vol. 2, No. 2, 2012, pp. 148-161. doi:10.3390/admsci2020148
[18]. J. Hrdinova, N. Helbig and C. S. Peters, “Designing So
cial Media Policy for Government: Eight Essential Ele- ments,” Center for Technology in Government, University at Albany, 2010. www.ctg.Albany.edu
[19]. D. Landsbergen, “Government as Part of the Revolution Using Social Media to Open Government,” Ohio State University, Columbus, 2010.
[20]. D. Landsbergen, “Government as Part of the Revolution: Using Social Media to Achieve Public Goals,” Electronic Journal of e-Government, Vol. 8, No. 2, 2010, pp. 135- 147.
[21]. C. I. O. Council, “Guidelines for Secure Use of Social Media by Federal Departments and Agencies,” Federal CIO Council ISIMC NISSC Web 2.0 Security Working Group, 2009, pp. 1-19.
[22]. P. Trudel, “Web 2.0 Regulation: A Risk Management Process,” Canadian Journal of Law and Technology, Vol. 7, No. 2, 2010, pp. 243-265. http://cjlt.dal.ca/vol7_ no2/pdf/trudel.pdf
[23]. DEIT, “Framework & Guidelines for Use of Social Media for Government Organizations,” Department of Electron- ics and Information Technology, Government Of india, 2012. http:// www. negp. gov. in / pdfs / Social % 20Media%20Framework%20and%20Guidelines.pdf
[24]. Nilamadhab Mishra , "Internet of Everything Advancement Study in Data Science and Knowledge Analytic Streams", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.30-36, 2018
Citation
M. I. Sandhi, D. Hiran, N. I. Modi, "Use of Social Media in e-Governance: A Study Towards Special Reference to India," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.724-733, 2019.
Automated Query handling system based on Deep Learning Technique
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.734-738, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.734738
Abstract
From data extraction to movie recommendation, spam filtrating to bank fraud detection and object detection to self-driving cars these are all being possible due to the term Deep Learning. This term is being a buzz word in the tech industry. Deep Learning is based on Machine Learning and Artificial Intelligent models, which helps in building the model more efficiently and access the data accurately. The buzz word is always seeming to be in news, many types of research and inventions are going on. People are not aware of the term Deep Learning. This technique takes decisions so preciously to make our day to day life so easy and efficient. In this research paper, we will elaborate the term Deep Learning, what it is, what is going on at the backend, how it works, what are its potential, how it helping the people’s life to industry world and what is the application of it.
Key-Words / Index Term
Deep Learning, Neural Network, A.I, Machine Learning, chatbot, LSTM, CNN, RNN
References
[1] J K Gupta and S Agarwal ― An Epitome of Chatbot: A Review Paper Vol.-7, Issue-1, Jan 2019
[2] Bhagwat, Vyas Ajay, "Deep Learning for Chatbots" (2018)
[3] Fundamentals of Deep Learning – Activation Functions and When to Use Them? (OCTOBER 23, 2017). Retrieved from https://www.analyticsvidhya.com/blog/2017/10/fundamentals-deeplearning-activation-functions-when-to-use-them/
[4] Greg Surma ―Leveraging Convolutional Neural Networks (CNNs) and Google Colab’s Free GPU Nov 19, 2018
[5] Yann LeCun, Leon Bottou, Genevieve B. Orr, and Klaus-Robert Muller "Efficient BackProp" (1998)
[6] Adam Gibson, Josh Patterson ― https://www.oreilly.com/library/view/deep-learning/9781491924570/assets/dpln_0401.png August 2017
[7] Prabhu, Understanding of Convolutional Neural Network (CNN) — Deep Learning, Mar 4, 2018
[8] Sumit Saha, A Comprehensive Guide to Convolutional Neural Networks — the ELI5 way, Dec 15, 2018
[9] J. L. Chen, Z. P. Li, J. Pan, G. G. Chen, Y. Y. Zi, J. Yuan, B. Q. Chen, Z. J. He, "Wavelet transform based on inner product in fault diagnosis of rotating machinery: a review", Mechanical Systems and Signal Processing, vol. 70-71, pp. 1-35, 2016
[10] Niklas Donges, Recurrent Neural Networks and LSTM, Feb 26, 2018 [online] https://towardsdatascience.com/recurrent-neural-networks-and-lstm-4b601dd822a5
[11] Neural Networks and Deep Learning, "Why are deep neural networks hard to train?," [Online]. Available: http://neuralnetworksanddeeplearning.com/chap5.html
[12] Deeksha Singh, Sohit Agarwal, IMAGE ENHANCEMENT OF BREAST CANCER MEDICAL IMAGES, VOLUME 4, ISSUE 1, 2018
[13] Garg, Mahima and Agrawal, Sohit and Goyal, Dinesh, Theoretical Study on Big Data with Data Mining (May 7, 2018). Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018. Available at SSRN: https://ssrn.com/abstract=3174732 or http://dx.doi.org/10.2139/ssrn.3174732
Citation
Jeetu Kumar Gupta, Sohit Agarwal, "Automated Query handling system based on Deep Learning Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.734-738, 2019.
A Robust Multi-Channel Digital Image Watermarking Technique with SVD, DWT, DCT
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.739-751, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.739751
Abstract
in this paper, watermark is to hide information in cover image. This paper represents a reliable digital image watermarking. It provides high imperceptibility and robustness for copyright protection. In this proposed method, combination of Discrete Wavelet Transform, Singular Value Decomposition, and Discrete Cosine Transform are used for robust watermarking. A multi-channel image watermarking technique is used in this work. It means multiple watermarks are embedded. In this method, initially first level of three watermark images are embedded in the second RGB watermark image and then this second level RGB image watermark is embedded in the RGB cover image to obtain the watermarked image. This process increases the robustness of watermark. An embedded watermark is retrieved by using reverse process of embedding. The second level of watermark is retrieved and then first levels of watermarks are retrieved. Experimental results show that, as compared to existing method, it shows that proposed multi-channel watermarking method is highly robust against attacks. The experiment result having high Peak Signal to Noise Ratio after different types of attacks. Bit Error Rate and normalized Cross-Correlation shows fidelity of retrieved watermark is very good.
Key-Words / Index Term
Embedding process, extraction process, Peak signal to noise ratio, normalized cross correlation and Bit Error Rate.
References
[1]. Nazir A. Loani, Nasir N. Hurrah, Shabir A. Parah, Jong Weon Lee, Javid A. Sheikh and G. Mohiuddun Bhat “Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption” IEEE access, vol. 6, pp.19876-19897, 2018.
[2]. Nazir A. Loani, Nasir N. Hurrah, Shabir A. Parah, Jong Weon Lee, Javid A. Sheikh and G. Mohiuddun Bhat “Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption” IEEE access, vol. 6, pp.19876-19897, 2018.
[3]. Ferda Ernawan and Muhammad Nomani Kabiara “Robust Image Watermarking Technique with an Optimal DCT-Psych visual Threshold” IEEE, 2018.
[4]. Patrick Schuch, Simon Schulz and Christoph Busch “Survey on the impact of fingerprint image enhancement” IET Biome, Vol. 7 Iss. 2, pp. 102-115, 2018.
[5]. Yahya AL-Nabhani, Hamid A. Jalab, Ainuddin Wahid and Rafidah Md Noor “Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network” computer and information science, vol. 27, pp.393-401, 2015.
[6]. Amit Phadikar, Santi P. Maity, Bhupendra Verma “Region-based QIM digital watermarking scheme for image data base in DCT domain” computer an electric engineering, vol. 37, pp.339-355, 2011.
[7]. https://www.cl.cam.ac.uk/fapp2/watermarking/stirmark.
Citation
Foram R. Suratwala, S. G. Kejgir, "A Robust Multi-Channel Digital Image Watermarking Technique with SVD, DWT, DCT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.739-751, 2019.