Smart Recruitment System
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.823-828, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.823828
Abstract
Nowadays a lot of organizations are in a constant lookout to simplify their hiring process so that they can scout the best talent in a minimum time frame. The proposed system tries to simplify the manual work by automating the entire hiring process. The system helps to clean, parse and classify the large amount of resumes, that the hiring managers’ receive on a daily basis, using SVM (support vector machine algorithm in python).The system would cover some repetitive manual procedures like the aptitude test using JavaScript and the audio HR interview using natural language processing and sentiment analysis. This would ensure that the HR managers would not have to ask the same questions repeatedly thus preventing them from losing good candidates due to lack of interest towards the end of the interview. The system also provides detailed analysis in the form of a bar graph which gives a score count of the analysed tone parameters on the basis of the audio interview provided by the candidate.
Key-Words / Index Term
Natural Language Processing, Support Vector Machine, Tone Analysis, Resume, Classification, Sentiment Analysis.
References
[1] Prarthita Das and Amala Deshpande,” Automated Filtering of Relevant Resumes” International Journal of Computer Applications Volume 154 – No.6, November 2016
[2] Sunil Kumar Kopparapu, “Automatic Extraction of Usable Information from Unstructured Resumes to Aid Search”, published in IEEE 2010.
[3] Mayuri Verma “Cluster based Ranking Index for Enhancing Recruitment Process using Text Mining and Machine Learning” International Journal of Computer Applications (0975 – 8887) Volume 157 – No 9, January 2017
[4] Apoorv Agarwal, Boyi Xie Ilia Vovsha, Owen Rambow Rebecca Passonneau, “Sentiment Analysis of Twitter Data” IEEE ICASSP journal
[5] Lakshmish Kaushik, Abhijeet Sangwan, John H. L. Hansen,” SENTIMENT EXTRACTION FROM NATURAL AUDIO STREAMS ”, CP-ICASSP13
[6] Mishne and Glance, “Predicting movie sales fromblogger sentiment," in AAAI 2006 Spring Symposiumon Computational Approaches to Analyzing Weblogs, 2006.
[7] Online paper reviews using sentiment analysis, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 6, No. 9
[8] White paper-pymetrics: Using Neuroscience and Data Science
to Revolutionize talent Management.
[9] Ketan Sarvakar and Urvashi K Kuchara,” Sentiment Analysis of movie reviews: A new feature-based sentiment classification” International Journal of Scientific Research in Computer Sciences and Engineering Vol.6, Issue.3, pp. 8-12 , June (2018).
[10] Amit Palve, Rohini D.Sonawane ,Amol D. Potgantwar,” Sentiment Analysis of Twitter Streaming Data for Recommendation using Apache Spark” International Journal of Scientific Research in Network Security and Communication Volume-5, Issue-3, June 2017.
Citation
Siddhi Khanvilkar, Suparna Shetty, Disha Solanki, Sarika Davare , "Smart Recruitment System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.823-828, 2019.
A Study on Applications of Wi-Vi Technology
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.829-834, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.829834
Abstract
A popular technology called Wi-Fi is nothing but the information carrier between transmitter and receiver. Through this paper, we show that Wi-Fi can also extend our senses, enabling us to see moving objects through walls and behind closed doors. So can we use Wi-Fi signals to identify people in a closed room with their relative location? Yes, we can achieve the identification of objects in closed rooms through a technology called Wi-Vi. One can also identify simple gestures and combine a sequence of gestures behind the wall to communicate messages. This introduces two main innovations. Initially, it uses MIMO interference nulling to eliminate the static object reflections and target the focus on moving objects. Next, it shows how one can track a human by treating the motion of a human body as an antenna array and tracking the resulting RF beam. It helps in various applications which are given in the papers that helps the human to save life in critical conditions.
Key-Words / Index Term
MIMO
References
[1] Sudarshan Adeppa, “Detection of Objects across the Walls with Wi-Fi Technology”, International Journal on Emerging Technologies, 2015.
[2] K. Chetty, G. Smith, and K. Woodbridge, “Through-the-wall sensing of personnel using passive bistatic Wi-Fi-radar at standoff distances,” IEEE Trans. Geoscience and Remote Sensing, 2012.
[3] Adib, Fadel, and Dina Katabi, “See through Walls with Wi-Fi,” Proceedings of the ACM SIGCOMM Conference, 2013.
[4] S. Ram and H. Ling, “through-wall tracking of human movers using join doppler and array processing,” IEEE Geoscience and Remote Sensing Letters, 2008
[5] G. Char vat, L. Keppel, E. Rothwell C. Coleman, and E. Mohole. An ultra-wideband (UWB) switched-antenna-array radar imaging system in IEEE ARRAY, 2010
[6] M Murugan, Mr. G Sathish “See-through wall using Wi-Vi” International Journal of Scientific & Engineering Research Volume 9, Issue 4, April-2018
[7] Manupalli Uma Maheshwar Rao, Bala Brahmeswara kadaru” A study on future scope of Wi-Vi technology” International Research Journal of Engineering and Technology (IRJET), 2017
[8] Arpitha Shankar S I “MIMO Cognitive Radio with Low-Cost Reception Using Beam Forming and Antenna Sub Array Formation” International Journal of Computer Sciences and Engineering (IJCSE), 2016
Citation
Vidyasagar S D, Seema, "A Study on Applications of Wi-Vi Technology," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.829-834, 2019.
Maximum Power Extraction from PV System Using Fuzzy Logic
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.835-840, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.835840
Abstract
One of the most popular renewable energy is solar energy due to its large availability. Major benefit of PV system for adopting solar energy is due to less maintenance cost, no moving parts and small limitations for installation. However, photovoltaic system has poor conversion efficiency as output performance of PV system is dependent on solar irradiation and temperature which are not consider as constant input source to system. The main objective is to extract maximum power from PV system Various techniques are to be used as mechanically as well as electrically to extract maximum power. Conventional Perturb and Observation (P&O), incremental conductance, adaptive Perturb and Observation, fuzzy logic based algorithm has implemented for extraction of maximum power. Boost converter is used for power interface as well as to step up the output voltage. Fuzzy logic based algorithms finds successful role to track maximum power even in rapidly changing climatic conditions. The proposed model has been implemented in MATLAB/Simulink and validated with experimental data of commercial PV panels.
Key-Words / Index Term
PV(photovoltaic) module, Mathematical Modeling, Maximum power extraction, Perturb & Observation, Incremental conductance, Adaptive Perturb and Observation, Fuzzy logic algorithm, Simulation.
References
[1] Trishan Esram, Patrick L. Chapman, “Comparison of Photovoltaic Array Maximum Power Point Tracking Techniques”, IEEE Transaction on Energy conversion, 22(2), 439–449, 2007.
[2] Marcelo Gradella Villalva, Jonas Rafael Gazoli, Ernesto Ruppert Filho, “Comprehensive Approach to Modeling and Simulation of Photovoltaic Arrays”, IEEE Transaction On Power Electronics, 24(5), 1198–1208, MAY 2009.
[3] N. Pandiarajan, Ranganath Muthu, “Mathematical Modeling of Photovoltaic Module with Simulink”, 1st International conference on Electrical Energy Systems, March 2011.
[4] Javier Cubas, Santiago Pindado,Carlos de Manuel, “Explicit Expressions for Solar Panel Equivalent Circuit Parameters Based on Analytical Formulation and the Lambert W-Function”, 1st International e-Conference on Energies, 2014.
[5] Jaw-Kuen Shiau, Yu-Chen Wei and Bo-Chih Chen, “A Study on the Fuzzy-Logic-Based Solar Power MPPT Algorithms Using Different Fuzzy Input Variables”, April 2015.
[6] Md Tofae l Ahmed, Teresa Gonçalves, Mouhaydine Tlemcani, “Single Diode Model Parameters Analysis of Photovoltaic Cell”, IEEE 5th International Conference on Renewable Energy Research and Applications , Nov2016.
[7] H.A.Mohamed, H.A.Khattab, A.Mobarka, G.A.Morsy, “Design, Control and Performance Analysis of DC-DC Boost Converter for Stand-Alone PV System”, Eighteenth International Middle East Power Systems Conference (MEPCON), Dec 2016.
[8] Pooja Sahu, Deepak Verma, Dr.S Nema, “Physical Design and Modelling of Boost Converter for Maximum Power Point Tracking in Solar PV systems”, International Conference on Electrical Power and Energy Systems (ICEPES), Dec 2016.
[9] S Narendiran, Sarat Kumar Sahoo, Raja das, Ashwin Kumar Sahoo, “Fuzzy Logic Controller based Maximum Power Point Tracking for PV systems”,3rd International Conference on Electrical Energy Systems(ICEES)-2016.
[10] Maria C. Argyrou, Paul Christodoulides, Soteris A. Kalogirou, “Modeling of a photovoltaic system with different MPPT techniques using MATLAB/Simulink”, IEEE International Energy Conference(ENERGYCON), June 2018.
Citation
Dhruv M. Dhivar, M.B. Jhala, M. K. Kathiria, "Maximum Power Extraction from PV System Using Fuzzy Logic," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.835-840, 2019.
Innovative Idea for Playerelection using Support Vector Machine(Svm)
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.841-843, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.841843
Abstract
Player Selection is one of the most important tasks for any sport. The success or failure of any team lies in the skills and abilities of the players that comprise the team. The performance of the players depends on various factors and characteristics of a player. The team management select required players for each match from a squad of 7-20 players. Depending on different sports they analyze different characteristics and the statistics of the players to select the best players for each match who can shine on international stage. The process of player selection and team formation in multilayer sports is a complex multi-criteria problem where the ultimate success is determined by how the collection of individual players forms an effective team. The proposed system is formulated that takes into account various available performance data of players gives an optimize and balance team without any human interference which is limited to entering performance data. This system proposes Machine learning technology by implementing Support Vector Machine(SVM) algorithm for efficient player selection. Our system thus can effectively take into account all factors involved and give the optimal team, without human interference.
Key-Words / Index Term
Machine Learning, SVM (SUPPORT VECTOR MACHINE), Player Selection.
References
[1] V. Vapnik. The Nature of Statistical Learning Theory. NY: Springer-Verlag. 1995.
[2]https://www.ibm.com/support/knowledgecenter/en/SS3RA7_15.0.0/com.ibm.spss.modeler.help/svm_howwork.htm
[3]http://www.idi.ntnu.no/emner/it3704/lectures/papers/Bennett_2000_Support.pdf-•
[4]http://aya.technion.ac.il/karniel/CMCC/SVM-tutorial.pdf
[5]http://www.ecs.soton.ac.uk/~srg/publications/pdf/SVM.pdf
[6]http://en.wikipedia.org/wiki/Support_vector_machine
[7]https://data-flair.training/blogs/svm-kernel-function
[8]https://www.sciencedirect.com/science/article/pii/S2210832717301485
[9]https://www.imperial.ac.uk/media/imperial-college/faculty-of-engineering/computing/public/1718-ug-projects/Corentin-Herbinet-Using-Machine-Learning-techniques-to-predict-the-outcome-of-profressional-football-matches.pdf
Citation
Farhana Siddiqui, Hasan Phudinawala, Chetan Davale , Soham Pawar, "Innovative Idea for Playerelection using Support Vector Machine(Svm)," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.841-843, 2019.
Analysis the Breast Cancer using Back Propagation with Deep Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.844-847, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.844847
Abstract
Breast cancer is one of the leading diseases among the worldwide disease; the breast cancer is occur will both gender but it is very rare for man. The breast cancer is an unwanted tissue is growth on the breast. The survival rate has increased above 500,000 around the world. When detected early, the five-year continued existence rate for breast cancer exceeds 80% of cases. Early analysis of breast cancer is serious for the continued existence of the patient. It is formed the multiple cells which may it occur on benign and malignant. The malignant is a cluster of cells and it is irregular shape. The benign tumor is oval shaped and smooth surface. In our approach, the medical microwave imaging technique is an innovative technology for detecting cancer it is avoiding for the patient uncomfortable feelings and screening is very easy. It is analysis the tissue by using the radio-frequencies and differentiates either benign or malignant. The deep learning is an important role for bio-medical images, classification and gains the human approaches. The grey level co-occurrence matrix is a feature extraction to reduce the noise detection and apply the grey color for differentiate the cancerous tissue and non-cancerous tissue . The back propagation algorithm is trained the network randomly and minimized the error rate. For each classifier, the presentation factor such as sensitivity, specificity and accuracy are computed. It is observed that the proposed scheme with classifier outperforms specificity to classify microwave images as normal or abnormal.
Key-Words / Index Term
breast cancer, medical microwave images, grey level co-occurrence matrix(GLCM), Back propagation.
References
[1].Qi, H., & Diakides, N. A. (n.d.). Thermal infrared imaging in early breast cancer detection-a survey of recent research. Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439). doi:10.1109/iembs.2003.1279442
[2]. Lehman CD, Schnall MD. Imaging in breast cancer: Magnetic resonance imaging. Breast Cancer Res. 2005
[3] Dan Ciresan, Alessandro Giusti, Luca M Gambardella, and J¨urgenSchmidhuber, “Deep neural networks segment neuronal membranes in electron microscopy images,” In Advances in neural information processing systems, vol 2012, pp. 2843–2851
[4].Avril N, Mather SJ, Roylance R. FDG-PET and PET/CT in breast cancer staging. Breast Care, vol 2007; page:372–377.
[5].Fahssi KE, Elmoufidi A, Abenaou A, Jai-Andaloussi S, Sekkaki A (2016) Novel approach to classification of Abnormalities in the mammogram image. International Journal of Biology and Biomedical Engineering.
[6]. Bozek J, Mustra M, Delac K, Grgic M (2009). A survey of image processing algorithms in digital mammography. Recent Advances in Multimedia Signal Processing and Communications, SCI, 231, 631–657.
[7]Yifan Chen, Ian James Craddock, and Panagiotis Kosmas, “Feasibility study of lesion classification via contrast-agent-aided uwb breast imaging,”IEEE Transactions on Biomedical Engineering, vol. 57, no. 5, pp.1003–1007, 2010.
[8].Rangaraj M Rangayyan, Nema M El-Faramawy, JE Leo Desautels, and Onsy Abdel Alim, “Measures of acutance and shape for classification of breast tumors,” IEEE Transactions on medical imaging, vol. 16, no.6, pp. 799–810, 1997.
[9]. C. Tobias Charistian Cahoon, Melanie A.Sutton, “Three-class mammogram classification based on descriptive cnn features,” 2000.
[10].Steven P. Poplack,MDTor D. Tosteson et. al, ScDElectromagnetic Breast Imaging:Results of a Pilot Study in Women with Abnormal Mammograms. Volume 243: Number 2—May 2007
[11].Rangaraj M Rangayyan, Nema M El-Faramawy, JE Leo Desautels, and Onsy Abdel Alim, “Measures of acutance and shape for classification of breast tumors,” IEEE Transactions on medical imaging, vol. 16, no.6, pp. 799–810, 1997.
[12] Sreedevi S, Sherly E (2015) A novel approach for removal of pectoral muscles in digital mammogram. Procedia Computer Science, 46: 724-1731.
[13] Pereira DC, Ramos R.P, Nascimento MZ (2014) “Segmentation and detection of breast cancer in mammograms combining wavelet analysis and genetic algorithm Computer Methods and Programs Biomedicine” vol 114 (1): 88-101.
[14] Anuradha.PV, Jose BR, Mathew J (2015) “Improved Segmentation of Suspicious Regions of Masses in Mammograms by Watershed Transform”. Procedia Computer Science 46:1483-1490.
[15] Kaur J, Kaur M (2016) “Automatic cancer detection in mammographic images.” International Journal of advanced Research in Computer Communications in Engineering (5) 7:473-476.
[16] Pam Stephan (2017) The basics on benign and cancerous breast lumps.
[17] Salazar-Licea LA, Pedraza-Ortega JC, Pastrana-Palma A, Marco A, Aceves-Fernandez (2017) Location of mammograms ROI’s and reduction of false-positive. Computer methods and Programs in Biomedicine 143:97-111.
[18].Li Y, Chen H, Yang Y, Yang N (2013) Pectoral muscle segmentation in mammograms based on homogenous texture and intensity deviation. Pattern Recognition. (46): 681 – 691
[19]. D. S. Shumakov, D. Tajik, A. S. Beaverstone, and N. K. Nikolova, “Study of practical limitations of real-time microwave imaging of tissue,”in Proc. IEEE Int. Symp. Antennas Propag., San Diego, CA, USA, Jul. 2017.
[20]. Timo Ojala, KimmoValkealahti, ErkkiOja, MattiPietikaKinen, “Texture discrimination with multidimensional distributions of signed gray-level differences”,Pattern Recognition, vol. 34, pp.727-739, 2001.
[21]. Goutam Barman, Babulal Seal “Survival Analysis of Breast Cancer Patients Using Additive Hazards Regression Models” ISROSET Volume-3 , Issue-6 Research Paper Page No : 7-10
Citation
K. Anastraj, T. Chakravarthy, "Analysis the Breast Cancer using Back Propagation with Deep Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.844-847, 2019.
Extended Information Hiding Procedure in Cloud Computing Environment using Random Security Codes
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.848-853, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.848853
Abstract
Growth in the cloud computing evidenced in the recent past has accentuated the need for higher levels of security for obvious reasons. Various algorithms and techniques have been developed by the researchers to provide the security at multiple ends in multiple locations of the cloud data. The researchers have attempted to provide the security using various methodologies developed over time. However, there are frequent breaches of security in the recent times observed globally. Though the use of finger reference key in the security of data over the cryptography algorithm has enhanced the level of security, yet there are still loopholes in the framework providing opportunity for hackers for unauthorized access. In this paper, we propose a methodology to enhance the security by introducing the random security codes on the existing security framework. We establish that this procedure is more robust as compared to only using the finger reference key suggested by previous researchers and analysts.
Key-Words / Index Term
Cloud Computing, Random Security Code, Data Hiding
References
[1] Flaherty K.O., “Breaking Down Five 2018 Breaches -- And What They Mean For Security In 2019”, Forbes Report, 2019.
[2] Siddharth V., “Seven Cyber security trends that India will witness in 2019”, PWC Report, 2018.
[3] Mudasir Ahmed Muttoo, Pooja Ahlawat, ” A Secure Information Hiding Approach in Cloud Using LSB”, International Journal of Science and Research, Vol. 4, Issue.,7, pp.1171-1776,2013.
[4] Nazir Mohsin, “Cloud Computing: Overview & Current Research Challenges “,IOSR Journal of Computer Engineering, Vol. 8, Issue.,1, pp. 14-22,2012.
[5] Ashik Mohamed M., Sankara Nayanan A., Nithyananda Kumari, ”Typical Security Measures Of Cloud Computing”,International Journal of Computer Trends and Technology, Vol. 5, No.,6, pp.299-304, 2013.
[6] Geeta C. M., RaghavendraS, RajkumarBuyya, Venugopal K R, S SIyengar, L M Patnaik,“Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions”, International Journal of Computer, Vol. 28, No.,1,pp.8-57, 2018.
[7] Kiran, Sandeep Sharma, “A Comparative Review Of Various Approaches To Ensure Data Security In Cloud Computing “, International Journal of Engineering Research and General Science, Vol.5, Issue.,2, pp.124-130, 2017.
[8] Ayman Ibaida, Ibrahim Khalil, ”Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems” , IEEE Transactions on Biomedical Engineering ,Vol. 60 , Issue., 12, pp.3322-3330, 2013.
[9] Ahmed Monjur, Mohammad Ashraf Hossain,“Cloud Computing and Security Issues in the Cloud” International Journal of Network Security & Its Applications, Vol.6, No., 1, pp.25-36,2014.
[10] Mudasir Ahmed Muttoo, Pooja Ahlawat,” A Secure Information Hiding Approach in Cloud Using LSB”, International Journal of Science and Research, Vol. 4, Issue.,7, pp.1171-1776,2013.
[11] C.-C. Chang, C.-C. Lin, C.-S. Tseng, W.-L. Tai, “Reversible hiding in DCT-based compressed images”, Information Sciences, Vol. 177, Issue., 13, pp. 2768–2786, 2007.
[12] Deepika,” Enhancement of Data Security for Cloud Environment Using Cryptography and Steganography Technique” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue.,1, pp.225-237, 2017.
[13] Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham,” Security Issues for Cloud Computing”, International Journal of Information Security and Privacy, Vol. 4, Issue.,2, pp. 39-51, 2010.
[14] Wid A. Awadh, Ali S. Hashim,” Using Steganography for Secure Data Storage in Cloud Computing”, International Research Journal of Engineering and Technology, Vol. 4, Issue., 4, pp. 3668-3772, 2017.
[15] Lubacz Józef; Wojciech Mazurczyk ; Krzysztof Szczypiorski,” Principles and overview of network steganography”, INSPEC, Vol. 52 , Issue., 5 , pp. 225 – 229,2014.
[16] Athanasios Vasilakos, Muhammad Baqer Mollah, Md. Abul Kalam Azad, “Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things”, IEEE Cloud Computing, Vol. 4, Issue.,1,pp. 34-43, 2017.
[17] Pankaj Arora, RubalChaudhry, Wadhawan Er. Satinder Pal Ahuja,” Cloud Computing Security Issues in Infrastructure as a Service”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2, Issue.,1, 2012.
[18] Ramalingam Sugumar, K. Arul Marie Joycee, “FEDSACE: A Framework for Enhanced user Data Security algorithms in Cloud Computing Environment”, International Journal on Future Revolution in Computer Science & Communication Engineering, Vol. 4, Issue., 3, pp. 49-52, 2018.
[19] Baowei Wang,Zhihua Xia ,Xinhui Wang and Xingming Sun, ”Steganalysis of least significant bit matching using multi order differences”, Wiley online liabrary,2013; https://doi.org/10.1002/sec.864.
[20] Mandy Douglas, Karen Bailey, Mark Leeney, Kevin Curran,” An overview of Steganography techniques applied to the protection of biometric data” July 2018, Volume 77, Issue 13, pp 17333–17373.
[21] Balaji. S, Mandy Sonio Newcastle,”SECURE DATA TRANSMISSION BY STEGANOGRAPHY USING PRIVATE KEY IN CLOUD” International Journal of Pure and Applied Mathematics,Vol. 119, No., 14, pp. 1653-1660, 2018.
[22] Nancy Garg, Kamalinder Kaur, ”Data Storage Security Using Steganography Techniques”, International Journal of Technical Research and Applications, Vol. 4, Issue.,6, pp. 93-98, 2016.
[23] A. Mahesh Babu, G.A. Ramachandra, M. Suresh Babu, “Implementation of Security in Cloud Systems Based using Encryption and Steganography”, International Journal of Electrical, Electronics and Computer Systems, Vol. 3, Issue., 11, 80-84, 2015.
[24] Shelly, Rajesh Kumar Bawa,” Secure Image Transmission for Cloud Storage System Using Hybrid Scheme”, International Journal of Engineering Research and Development, Vol. 11, Issue., 9, pp. 18-26, 2015.
[25] Gowthami Garikapati, Yakobu D, Gnaneswara Rao Nitta, Amudhavel J,” AN ANALYSIS OF CLOUD DATA SECURITY ISSUES AND MECHANISMS”, International Journal of Pure and Applied Mathematics, Vol. 116, No. 6, pp. 141-147,2017.
[26] Ayush Gupta, Arvind Kumar, “Information Security using the ensemble approach of Steganography and Cryptography”, in the proceedings of International Conference on Sustainable Computing in Science, Technology & Management, SUSCOM-2019, pp. 66-73, 2019, http://dx.doi.org/10.2139/ssrn.3350895.
[27] Pramod Ambadas Rao Pawar, Aparna G. Korde, “A Solution to Cloud Security: Image Steganography”, International Journal of Multidisciplinary Research, Vol. 2, Issue. ,2, pp.83-90, 2016.
[28] Mohammad Obaidur Rahman, Muhammad Kamal Hossen, Md. GolamMorsad, Animesh Chandra Roy, Md. Shahnur Azad Chowdhury, “An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique “, IJCSNS International Journal of Computer Science and Network Security, Vol. 18, No.9, pp.85-93, 2018.
[29] Adamu Ismail Abdulkarim, Boukari Souley, “An Enhanced Cloud Based Security System Using RSA as Digital Signature and Image Steganography”, International Journal of Scientific & Engineering Research, Vol. 8, Issue.,7, pp. 1512-1517, 2017.
[30] Anuradha Porwal, “Hybrid Protocol Employing Steganography &Cryptography for Cloud Storage Security”, International Journal of Advanced Research in Computer Science & Technology, Vol. 4, Issue.,2, pp. 208-209, 2016.
[31] Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier, “Hidden and Uncontrolled – On the Emergence of Network Steganography Threats”, ISSE 2014 Securing Electronic Business Processes Conference Proceedings, pp. 123-133.
[32] Dhivyaprabha E. , R. Madhubala, M. Abarna, “Security Framework for Cloud Data Sharing”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol.3,Issue.3, pp. 665-671, 2018.
[33] Mishra Ajeet , Umesh Kumar Lilhore, Nitesh Gupta, “Review of Various Data Storage and Retrieval Method for Cloud Computing”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol.2,Issue.5, pp. 584-588, 2017.
[34] Varsha Yadav, Preeti Aggarwal,” Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue., 5, pp. 702 – 707, 2014.
Citation
Arvind Kumar, Ayush Gupta, "Extended Information Hiding Procedure in Cloud Computing Environment using Random Security Codes," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.848-853, 2019.
Active Authentication on Mobile Device using Stylometry
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.854-858, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.854858
Abstract
Behavioural biometrics takes the authentication one step further, requiring the user to not only have the right fingerprint to logon, but to prove that they are the same person whom they claim to be throughout the duration of the session. This takes into account the way in which a person interacts with a device, such as the force with which they hit a key, the angle they use to swipe a touch screen, or their typing speed. Tracking and analyzing these areas allows users to safely use the same password their behaviour for every login. We need to change the way we think about security across passwords, static and behavioural biometrics. Since virtually every authentication technique can be compromised, user should not rely solely on any single control for authorizing, but adopt a layered approach to security, combining the various available authentication technologies to improve both accuracy and user experience.
Key-Words / Index Term
Android, Sensors, API, SQLite, Java
References
[1] M. Duggan, “Cell phone activities 2013,” Pew ResearchCenter, Washington, DC, USA, 2013.
[2] S. Egelman et al., “Are you ready to lock?” in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2014, pp. 750–761.
[3] M. Harbach, E. von Zezschwitz, A. Fichtner, A. De Luca, and M. Smith, “Its a hard lock life: A field study of smartphone (un) locking behavior and risk perception,” in Proc. SOUPS, 2014, pp. 1–18.
[4] D. Van Bruggen et al., “Modifying smartphone user locking behavior,” in Proc. 9th Symp. Usable Privacy Security, 2013, pp. 1–14.
[5] C. Shen, Z. Cai, X. Guan, and J. Wang, “On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study,” in Proc. IEEE 5th IAPR ICB, 2012, pp. 378–383.
[6] A. Fridman et al., “Decision fusion for multimodal active authentication,” IEEE IT Professional, vol. 15, no. 4, pp. 29–33, Jul. 2013.
[7] M. O. Derawi, C. Nickel, P. Bours, and C. Busch, “Unobtrusive user-authentication on mobile phones using biometric gait recognition,” in Proc. IEEE 6th Int. Conf. IIH-MSP, 2010, pp. 306–311.
[8] F. Li, N. Clarke, M. Papadaki, and P. Dowland, “Active authentication for mobile devices utilising behaviour profiling,” Int. J. Inf. Security, vol. 13, no. 3, pp. 229–244, Jun. 2014.
[9] T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “Continuous verification using multimodal biometrics,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 687–700, Apr. 2007. [10] J. Kittler, M. Hatef, R. Duin, and J. Matas, “On combining classifiers,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 3, pp. 226–239, Mar. 1998.
Citation
Shikha Agarawal, Ashwin Gujarathi, Abhilash Dhumane, Pramil Bhosure, Mangesh Vinchankar, "Active Authentication on Mobile Device using Stylometry," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.854-858, 2019.
Blood Group Detection using Image Processing Techniques: A Review
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.859-863, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.859863
Abstract
Assurance of blood classification is critical before managing a blood transfusion in a crisis circumstance. Right now, these tests are performed physically by specialists in the lab, when the test is taken care of with a substantial number of tests, it is dreary to do and it might prompt human mistakes. In this paper, the proposed thought is to supplant the manual work in clinical research centers for distinguishing the blood gathering. The proposed framework expects to build up an inserted framework which utilizes Image preparing calculation to perform blood tests dependent on ABO and Rh blood composing frameworks. The proposed framework intends to build up an implanted framework which utilizes Image handling calculation to perform blood tests dependent on ABO and Rh blood composing frameworks. In this paper different existing methods are reviewed and their performance are evaluated so that it can help the researchers in their work.
Key-Words / Index Term
Antigen, Blood Samples, GPU, Histogram, LBP (nearby paired example), Nearest Neighbor Classifier, Image Processing, Pattern Matching.
References
[1] Automatic system for determining of blood type using image processing technique -23, 2013.
[2] Selvak Blood Group Detection Using Fiber optics3, pp.165-168,2011.
[3] A. Dada, D. Beck, G. Schmitz. (2007). "Automation andData Processing in Blood Banking Using the OrthoAutoVue® Innova System". Transfusion MedicineHemotherapy, vol. 34, pp. 341-346. Available:Kargerwww.karger.com/tmh
[4] E. A. Henneman, G. S. Avrunin, L. A. Clarke, L. J. Osterweil, C. Jr. Andrzejewski, K. Merrgan, R. Cobleigh,K. Frederick, E. Katz-Bassett, P. L. Henneman."Increasing patient safety and effiency in transfusion therapy using formal process defamations," Transfuse Med Rev, vol. 21, 2007, pp. 49-57.
[5] "What Are Blood Tests?" National Heart, Lung, and Blood Institute (NHLBn, [Online]. Available: http://www.nhlbi.nih.gov/healthlhealth-topics/topics/bdtl. [Accessed 2 May 2012].
[6] F. Ana, C. Vitor, S. Filomena and L. P. Celina, "Characterization of Blood Samples Using Image Processing Techniques", Sensors & Actuators: A. vol. year pp.
[7] Ferraz, Ana. "Automatic system for determination of blood types using image processing techniques." Bioengineering (ENBENG), 2013 IEEE 3rd Portuguese Meeting in. IEEE, 2013. 8
[8] IP. Sturgeon, "Automation: its introduction to the field ofblood group serology," Immunohematology Journal ofBlood Group Serology and Education, vol. 17, no. 4,2001.
[9] Characterization of blood samples using image processingtechniques [Online] Availablehttp://www.olympusglobal.comlenlmagazine/techzone/voI67_e/page5.cfm [Accessed on 22nd January 2013].
[10] Olympus, "Formulated for use in Automated SystemOlympus® PK® Systems", December 2007
[11] A. Dada, D. Beck, G. Schmitz. (2007). "Automation andData Processing in Blood Banking Using the OrthoAutocued® In nova System". Transfusion MedicineHemotherapy, vol. 34, pp. 341-346. Available:Kargerwww.karger.comltrnh
[12] Anti-Human Globulin [Online] Available:http://www.fda.gov/downloadslBiologicsBloodVaccineslBloodProductslApprovedProductslLicensedProductsBLAsIBIoodDonorScreeningIBIoodGroupingReagentlucm080763.pdf[Accessed in 22, January 2015].
[13] G. W. Ewing, "Analytical Instrumentation Handbook,"2nd ed., Ed. New York: Marcel Dekker, pp.152
[14] S. Y. Shin, K. C. Kwon, S. H. koo, J. W. Park, C. S. Ko,J.H.Song, J. Y. Sung, "Evaluation of two automated instruments for pre-transfusion testing: Auto VueInnovaand Techno Twin Station", Korean j Lab Med., vol. 3,
Jun.2008, pp. 214-220.
[15] G. Wittmann, J. Frank, W. Schram, M. Spannagl.(2007)."Automation and Data Processing with tbeImmucorGalileo® System in a University Blood Bank,"TransfusionMedicineHemotherapy. vol. 34, pp. 347-352.
[16] A. Dada, D. Beck, G. Schmitz. (2007). "Automation and Data Processing in Blood Banking Using the OrthoAutoVue® Innova System". Transfusion MedicineHemotherapy, vol. 34, pp. 341-346.
[17] Paridhi Bhandari, Tanya Narahari and DhananjayaDendukuri, “FabChips: a versatile, fabric-based platform for low-cost, rapid and multiplexed diagnostics,” in Lab on a Chip, 2011, no. 15, 2493-2499.
[18]http://www.wma.net/en/30publications/10policies/b3/, “WMA Declaration of Helsinki – Ethical Principles for Medical Resarch Involving Human Subjects”.
Citation
Ruchi Jogi, Avinash Dhole, "Blood Group Detection using Image Processing Techniques: A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.859-863, 2019.
A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.864-869, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.864869
Abstract
In Wireless Local Area Networks (WLANs), the clients can speak each other by using the Access Point [AP] easily. Since it uses wireless medium for words there are lots of security challenges exists. WLANs provide speed equal to wired LANs and allow wireless devices to be mobile. Even though it is very useful, there are lots of security attacks specially it is vulnerable to distributed Denial of Service (DDOS) attacks, this leads to unavailability of a service or resource by how of either crashes a service or by flooding the network with unwanted traffic to slowing down the delivery of service to the client. A distributed denial of service attack is the one in which the attacker attacks the victim by many sources. In this paper, we deployed WLANs in infrastructure mode as the extension of wired local area network. It was done in experimental approach to detect and prevent DDoS attack by using Intrusion Detection and Prevention System (IDPS) and Machine Authentication Code(MAC) with Service Set Identifier (SSID) was studied and simulated utilizing OPNET 17.5 simulator. The IDPS on the server distinguishes legitimate users from the illegal user by the registered MAC. If the client is illegal, then it withdraws the user from the connection. And the access point will not show SSID. The SSID should be hidden by the Admin and will be given to only the registered users with MAC Address. Our Proposed solution can enhance the security of DDoS and can secure the WLAN from the Attackers.
Key-Words / Index Term
Distributed Denial of Service (DDOS), Intrusion Detection and Prevention System( IDPS), OPNET ,Service Set Identifier (SSID), Machine Authentication Code(MAC) and Wireless Local Area Networks (WLANs).
References
[1] D. Tepsic, M. Veinović, and D. Uljarević, “Performance evaluation of WPA2 security protocol in modern wireless networks,” in the Proceedings of the2014 1st International Science Conference on Science, Sintaza, pp. 600–605, 2014.
[2] C. Yang, J. Ma, and X. Dong, “A new evaluation model for security protocols,” Journal of Communication, vol. 6, no. 6, pp. 485–494, 2011.
[3] D. Dhiman, “WLAN Security Issues and Solutions,” IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), vol. 16, no. 1, pp. 67–75, 2014.
[4]. M. D. G. Waliullah, “Wireless LAN Security Threats & Vulnerabilities,” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 1, 2014.
[5] Y. Xiao and X. J. Du, “Security mechanisms , attacks and security enhancements for the IEEE 802 . 11 WLANs Chaitanya,Bandela,Edilbert,Kamal Dass”,International Journal of Wireless and Mobile Computing, vol. 1, pp. 276–288, 2006.
[6] A. B. M. M. and M. S. R. Md Waliullah, “An Experimental Study Analysis of Security Attacks at IEEE 802 . 11 Wireless Local Area Network”, International Journal of Future Generation Communication and Networking Vol. 8, No. 1 (2015), pp. 9-18
[7] “Investigation Of The Impact Of Ddos Attack On Network”, Journal University of Zakho, vol. 3, no. 2, pp. 275–280, 2015.
[8] W. Alosami, M. Alshamrani, and K. Al-Begain, “Simulation-Based Study of Distributed Denial of Service Attacks Counteract in the Cloud Services, WSEAS Transactions on Co Simulation-Based Study of Distributed Denial of Service Atta”,The University of Nattingham,ePrints,vol. 4, no. 7, pp. 19–30, 2016.
[9] Hrishikesh Arun Deshpande, “HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots”, International Journal of Engineering Research & Technology (IJERT),Vol. 4 ,Issue 08, pp. 263–267, 2015.
[10] Sunil Kumar, Kamalesh Dutta, “Securing Mobile Ad Hoc Networks: Challenges and Solutions”, International Journal of Handheld Computing Research, Vol. 7, Issue 1, PP. 26-76,January 2016
[11] Manmohan Dagar, Rashmi Popli “Honeypots: Virtual Network Intrusion Monitoring System”, International Journal of Science Research in Network Security and Communication(IJSRNSC), Vol.6,Issue 2, April 2018..
[12] A.Prathap and R.Sailaja, “Detection and Prevention of Denial of Service Attacks Using Distributed Denial-of-Service Detection Mechanism”, International Journal of Computer Science and Information Technologies (IJCSIT), vol. 3, no. 6, pp. 5434–5438, 2012.
[13] Usha G, Goudar R H., “ICMPv6 : A Mechanism to Detect and Prevent DDoS Attack”, International Journal of Science Technology & Engineering (IJSTE), Vol. 2 ,Issue 12, pp. 420–423, 2016.
[14] S. Behal and K. Kumar, “Trends in Validation of DDoS Research,” Procedia Comput. Sci., vol. 85, no. Cms, pp. 7–15, 2016.
[15] R. Niranchana, N. Gayathri Devi, H. Santhi, and P. Gayathri, “Securing internet by eliminating DDOS attacks,” IOP Comference Series. Materials Science and Engineering, vol. 263, no. 4, 2017.
Citation
Feven Teferi, J. Sebastian Nixon , "A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.864-869, 2019.
A Hybrid System Using CNN and AE for Noisy Image Classification
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.870-875, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.870875
Abstract
With the use of deep learning networks image processing tasks has improved due to the development of learning feature illustration from images. Generally, in the real world scenario, these images available to classify is prone to noise and other deformities. According to many types of research in the past, the deep neural networks (DNNs) are found effective for image classification problems, but they suffer from the same real-life problem of noise and other deformities in an image. Noise is common occurrences in real life situations and many studies have been carried out in the past few decades with the purpose to remove the effect of noise in the image data. In this paper, the aim was to examine the DNN-based improved noisy image classification model. We have used a hybrid of denoising autoencoder, convolutional denoising autoencoder then using a classifier which is a combination of two different architectures one is Convolutional Neural Network (CNN) and the other is extreme Gradient Boosting (XGBOOST). This technique gives progressively better outcome by incorporating CNN as a trainable element for feature extraction from the image in input and XGBoost used as an identifier at the last stage of the model for outcomes.
Key-Words / Index Term
Blurry Images, Image Classification, Noisy Images, Supervised Classification, Unsupervised Classification, Image Denoising
References
[1] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, ‘‘Gradient-based learning applied to document recognition,’’ Proc. IEEE, vol. 86, no. 11, pp. 2278--2324, Nov. 1998.
[2] A. Krizhevsky, I. Sutskever, and G. Hinton, ‘‘ImageNet classification with deep convolutional neural networks,’’ in Proc. NIPS, 2012, pp. 1097--1105
[3] J. Schmidhuber, ‘‘Deep learning in neural networks: An overview,’’ Neural Netw., vol. 61, pp. 85--117, Jan. 2015.
[4] Mayur Thakur, Prof. S. K. Pillai” A Review on Various Methods for Classification of Massive Noisy Image”, 2ndInternational Conference on Intelligent Sustainable Systems (ICISS 2019)
[5] Scherer, D., M¨ uller, A., Behnke, S.:” Evaluation of pooling operations in convolutional architectures for object recognition”. In Proc of International Conference on Artificial Neural Networks ,2010.
[6] Mackey, L., Bryan, J., Mo, M.Y.: Weighted classification cascades for optimizing discovery significance in the HIGGSML challenge. In: NIPS 2014 Workshop on High-energy Physics and Machine Learning, pp. 129–134 (2015).
[7] Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015).
[8] Song, R., Chen, S., Deng, B., Li, L.: eXtreme gradient boosting for identifying individual users across different digital devices. In: Cui, B., Zhang, N., Xu, J., Lian, X., Liu, D. (eds.) WAIM 2016, Part I. LNCS, vol. 9658, pp. 43–54. Springer, Cham (2016). doi:10.1007/978- 3-319-39937-9_4
[9] Bekkerman, R.: The present and the future of the KDD cup competition: an outsider’s perspective
[10] Perona, Pietro, and Jitendra Malik. ”Scale-space and edge detection using anisotropic diffusion.” IEEE Transactions on pattern analysis and machine intelligence , vol. 12, pp 629-639, 1990.
[11] Rudin, Leonid I., and Stanley Osher. ’’Total variation based image restoration with free local constraints.’’ , In Proc of Image Processing, 1994. Proceedings. ICIP-94., IEEE International Conference. Vol. 1. Nov, 1994
[12] Subakan, Ozlem, et al. ’’Feature preserving image smoothing using a continuous mixture of tensors.’’ 2007 IEEE 11th International Conference on Computer Vision. Oct. 2007.
[13] Coifman, Ronald R., and David L. Donoho. Translation-invariant denoising. Springer New York, vol. 103, pp. 125-150, 1995.
[14] Elad, Michael, and Michal Aharon. ’’Image denoising via sparse and redundant representations over learned dictionaries.’’ IEEE Transactions on Image processing , vol. 15, pp. 3736-3745, 2006.
[15] Olshausen, Bruno A., and David J. Field. ’’Sparse coding with an overcomplete basis set: A strategy employed by V1?.’’ Vision research, vol. 37 pp. 3311-3325, 1997.
[16] Mairal, Julien, et al. ’’Online dictionary learning for sparse coding.’’ , In Proc. of the 26th annual international conference on machine learning. ACM, pp. 689-696 June 2009.
[17] Bengio, Yoshua, et al. ’’Greedy layer-wise training of deep networks.’’ , In Proc of Advances in 19 th neural information processing systems, pp. 153-160, Dec 2006.
[18] Glorot, Xavier, Antoine Bordes, and Yoshua Bengio. ’’Deep Sparse Rectifier Neural Networks.’’ , In Proc of the Fourteenth International Conference on Artificial Intelligence and Statistics (AISTATS-11). Vol. 15. pp. 315-323, 2011.
[19] Jain, Viren, and Sebastian Seung. ’’Natural image denoising with convolutional networks.’’ , In Proc of Advances in Neural Information Processing Systems 21. pp. 769-776, 2008.
[20] Burger, Harold C., Christian J. Schuler, and Stefan Harmeling. ’’Image denoising: Can plain neural networks compete with BM3D?.’’ In Proc of Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on. IEEE, June 2012.
[21] Vincent, Pascal, et al. ’’Extracting and composing robust features with denoising autoencoders.’’, In Proc. of the 25th international conference on Machine learning. ACM, pp. 1096-1103, July 2008.
[22] Lecun, Y., Boser, B., Denker, J.S., et al.: Handwritten digit recognition with a back-propagation network. In: Advances in Neural Information Processing Systems, pp. 396–404 (1990)
[23] Masci, Jonathan, et al. ’’Stacked convolutional auto-encoders for hierarchical feature extraction.’’ , In Proc. International Conference on Artificial Neural Networks. Springer Berlin Heidelberg, pp. 52-59, 2011.
[24] Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang and Jianhua Li. A Novel Image Classification Method with CNN-XGBoost Model.’’, C. Kraetzer et al. (Eds.): IWDW 2017, LNCS 10431, pp. 378–390, 2017.
[25] Sudipta Singha Roy, Mahtab Ahmed and M. A. H. Akhand, ‘‘Classification of Massive Noisy Image Using Autoencoders and Convolutional Neural Network’’, In 2017 8th International Conference on Information Technology (ICIT), pp. 971-979, 2017.
[26] Roy, S. S., Ahmed, M., & Akhand, M. A. H. (2018). Noisy image classification using hybrid deep learning methods. Journal of Information and Communication Technology, 17 (2), 233–269.
Citation
Mayur Thakur, Sofia K. Pillai , "A Hybrid System Using CNN and AE for Noisy Image Classification," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.870-875, 2019.