False Positive and False Negative Authentication System
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.922-924, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.922924
Abstract
Weak passwords, default passwords in combination with bruteforce attack and dictionary attack are one of the most dangerous combination for security of systems across the globe. False Positive and False Negative Password Authentication System is an attempt to decrease the efficiency of Dictionary, Bruteforce Attack which can be implemented in any authentication system without any significant changes.
Key-Words / Index Term
Bruteforce, Dictionary, Attacks, Botnets, Authentication System
References
[1] Kolias, Constantinos, et al. "DDoS in the IoT: Mirai and other botnets." Computer 50.7 (2017): 80-84.
[2] “‘BrickerBot’ Results in PDoS Attack,” Radware, 5 Apr. 2017; security.radware.com/ddos-threats-attacks/brickerbot-pdos-permanent-denial-of-Service.
[3] S. Edwards and I. Profetis, “Hajime: Analysis of a Decentralized Internet Worm for IoT Devices,” Rapidity Networks; 16 Oct. 2016; security.rapiditynetworks.com/publications/2016-10-16/hajime.pdf.
[4] Antonakakis, Manos, et al. "Understanding the mirai botnet." USENIX Security Symposium. 2017.
[5] De Donno, Michele, et al. "Analysis of DDoS-capable IoT malwares." Computer Science and Information Systems(FedCSIS), 2017 Federated Conference on. IEEE, 2017.
[6] Sharaf-Dabbagh, Y., & Saad, W. “On the authentication of devices in the Internet of things” 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks .
[7] Pinkas, Benny, and Tomas Sander. "Securing passwords against dictionary attacks." Proceedings of the 9th ACM conference on Computer and communications security, ACM, 2002.
[8] John the Ripper password cracker, http://www.openwall.com/john/
Citation
Arun Malik, Suman Sangwan, Devender Rathee, Vineet Nandal, Payal, "False Positive and False Negative Authentication System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.922-924, 2019.
E-Voting using Block Chain Technology
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.925-931, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.925931
Abstract
The inflaming use of current digital technology has transformed the life of people. Unlike the current electoral system, there are various applications as such. Security is an outmost priority which is predominant in the election with the offline system. The existing electoral system still uses a Centralized system in which an organization has full access grant. The problems encountered are mostly due to outdated electoral systems with the organization that has total control over the system as well as the database. Database tampering is a major reason which causes huge problems in the system. Our answer to this problem is Block Chain Technology. Block chain Technology is an ideal solution as it holds a decentralized system and the database is owned by various users. Examples like Bit coin can be taken as a good example of Block Chain Technology application as it uses a decentralized bank system. By applying the concept of block chain in the existing electoral system, it can reduce the deceitful sources of database action. Our project aims to apply voting results using block chain algorithms from all place of election. Unlike Bitcoin, this process based on a pre-set turn on the system for each node in the built of block chain.
Key-Words / Index Term
Block Chain, Crypto Currency, E-Voting, Decentralized, Consensus, Marklee Tree.
References
[1] Yash G. Gupta, Arun kushwaha, Amar S. Rajeevan, Govind Mhala and Bhagyashree Dhakulka, "Survey On E-Voting using Block Chain Technology",CiiT International Journal of Software Engineering and Technology, Vol 11, No 1, January 2019.
[2] Ahmed Ben Ayed,”A Conceptual Secure Block Chain-Based Electronic Voting System”,2017 IEEE International Journal of network &Its Applications(IJNSA),03 May 2017.
[3] RifaHanifatunnisa, Budi Rahardjo,” Blockchain Based E-Voting Recording System Design”,IEEE 2017.
[4] KejiaoLi, HuiLi,HanxuHou,KedanLi,YongleChen,” Proof of Vote:A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain”, 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems.
[5] AliKaanKoç, EmreYavuz, UmutCanÇabuk, GökhanDalkilic,” abcccTowards Secure E-Voting Using Ethereum Blockchain”, 2018 cccccIEEE.
[6] Supriya Thakur Aras, Vrushali Kulkarni,” Blockchain andItsApplications– A Detailed Survey”, International Journal of Computer Applications (0975 – 8887) Volume 180 – No.3, December 2017.
[7] Freya Sheer Hardwick, ApostolosGioulis, RajaNaeemAkram,KonstantinosMarkantonakis,” E-Voting with Blockchain: An E-Voting Protocolwith Decentralisation and Voter Privacy”,IEEE 2018,03 July 2018.
[8] KashifMehboob Khan, Junaid Arshad, Muhammad Mubashir Khan,” Secure Digital Voting System based on BlockchainTechnology”, IEEE 2017.
[9] Huaiqing Wang, Kun Chen and DongmingXu. 2016. A maturity abcccmodel for blockchain adoption. Financial nnovation,Springer,OpenAccess,DOI10.1186/s40854-016-0031-z
[10] Buterin, Vitalik. 2015, On Public and Private Blockchains.[Online]https://blog.ethereum.org/2015/08/07/on-public-sand-private-blockchains
[11] Pilkington Mark. 2016 Blockchain Technology: Principles and saassaApplications, Research Handbook on Digital Transformations, casasaSocial Science Research Network
[12]BitFury group.2015. Public versus Private asassSBlockchainsPart1:PermissionedBlockchains,BitFury.comwhitepape sasas[O nline]:http://bitfury.com/content/5-whitepapers-research/public-aAaavs-private-pt1-1.pdf
[13] Cachin etal. 2017. Blockchain, cryptography, and consensus,IBMResearch,Jun2017,https://www.itu.int/en/ITU- T/Workshop and seminars.
[14] Gareth W. Peters, Efstathios Panayi, 2015. Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective, Aug 2015
[15] Trevor Kiviat. 2015. Beyond Bitcoin: Issues in Regulating Blockchain Transactions, HeinOnline.org.
[16] CNBCNews,2017,https://www.cnbc.com/2017/10/10/bitcoin-price-fallsafter-russia-proposes-ban-on-exchanges.html.
[17] AustralianTaxationOffice,https://www.ato.gov.au/General/Gen/Tax-treatment-ofcrypto-currencies-in-Australia---specifically-bitcoin/
[18] The magic of mining, 8 January 2015, https://www.economist.com/news/business/21638124- minting-digital-currency-has-become-big-ruthlesslycompetitive-business-magic.
[19] Wei Xin, et.al. 2017. On Scaling and Accelerating Decentralized Private Blockchains, 2017 IEEE 3rd International Conference on Big Data Security on Cloud,https://doi.org/10.1109/BigDataSecurity.2017.5
[20] Peters, G, Vishnia, Guy. 2016. Overview of Emerging Blockchain Architectures and Platforms for Electronic Trading Exchanges, Nov 2016, Elsevier, [Online]. http://dx.doi.org/10.2139/ssrn.2867344
[21] Rimba et.al. , 2017. Comparing Blockchain and Cloud Services for Business Process Execution, https://doi.org/10.1109/ICSA.2017.44
[22] Gencer et.al. Service-Oriented Sharding for Blockchains.[Online].http://fc17.ifca.ai/preproceedings/paper_73.pdf
Citation
Yash G. Gupta, Arun kushwaha, Amar S. Rajeevan, Bhagyashree Dhakulkar, "E-Voting using Block Chain Technology," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.925-931, 2019.
Electrical Characterization of (70PEO:30AgNO3)(1-x)(TiO2)x Nanocomposite Polymer Electrolyte for Energy Storage Devices used in HEV
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.932-936, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.932936
Abstract
Poly (ethylene oxide) (PEO) based Nano-Composite Polymer Electrolyte (NPE) membranes (70PEO:30AgNO3)(100-x)(TiO2)x, where x = 0≤x≤10 wt% have been casted by hot-press/solution free technique. Solid Polymer Electrolyte (SPE) composition 70PEO:30AgNO3 (wt. %), has highest conducting film with room temperature conductivity σrt ~ 3.6 x 10-6 Scm-1, has been used as the first phase host matrix and TiO2 filler particles of nano-dimension (< 100 nm) as second phase dispersion. The fractional dispersal of TiO2 filler (viz. x = 3 wt. %) in SPE host results increase in room temperature conductivity. This NPE film (70PEO:30AgNO3)97(TiO2)3 referred as Optimum Conducting Composition NPE(OCC) film. The morphological analysis performed by Scanning Electron Microscopy (SEM) techniques. The ionic transport properties characterized by basic ionic parameters viz. conductivity (σ), mobility(µ), mobile ion concentration (n), ionic transference number (tion) and cationic transport number (t+). Using these electrolytes a thin symmetric capacitor has been prepared which shows capacitance about 5 F/g of in the cycling in the range of 0−1.5 V at 0.5 A g−1 .
Key-Words / Index Term
Solid polymer electrolyte, Energy Storage devices, Supercapacitor, Hybrid electric Vehicle
References
[1] D. E. Fenton, J. M. Parker, P. V. Wrigth, Polymer 14 (1973) 589.
[2] M. P. Armand, J. M. Chabagno, M. Diadat, „Fast Ion Transport in Solids‟ (Eds.) Vashistha P., Mundy J. M. and Sheny G. K. (North Holland 1979) p. 135.
[3] M. B. Armand, Ann. Rev. Mater. Sci. 16 (1986) 245.
[4] M. A. Ratner, D. F. Shriver, Int. J. Electrochem. Sci., Vol. 6, 2011 881
[5] J. R. Mac Callum, C. A. Vincent, (Eds.) Polymer Electrolyte Reviews, Vol. 1, 2 (Elsevier Applied Science Publisher, London 1987 & 1989).
[6] K. Murata, Electrochimica Acta, 40 (1995) 2177.
[7] P. G. Bruce, Solid State Chemistry, (Cambridge University Press, Cambridge 1995).
[8] F. M. Gray, Polymer Electrolytes (Royal Society of Chemistry Monographs, Cambridge 1997).
[9] F. Capuano, F. Croce, B. Scrosati, J. Electrochem. Soc. 138 (1991) 1918.
[10] F. Croce, G. B. Appetecchi, L. Persi, B. Scrosati, Nature 394 (1998) 456.
[11] G. B. Appetecchi, F. Croce, et al., Electrochem. Acta 45 (2000) 1481.
[12] G. B. Appetecchi, J. Hassoun, B. Scrosati et al., J. Power Sources 124 (2003) 246.
[13] R. C. Agrawal, Angesh Chandra, J. Physics D: Appl. Phys. 40 (2007) 7024.
[14] G. P. Pandey, S. A. Hashmi, R. C. Agrawal, Solid Sttae Ionics 179 (2008) 543.
[15] R. C. Agrawal, A. Bhatt, Y. K. Mahipal, New J. Phys. 10 (2008) 043023.
[16 G. P. Pandey, S. A. Hashmi, et al., J. Phys. D: Appl. Phys. 41 (2008) 055409.
[17] A. Chandra, R. C. Agrawal, et al., J. Phys. D: Appl. Phys. 42 (2009) 135107.
[18] G. P. Pandey, R. C. Agrawal, et al.,, J. Phys. D: Appl. Phys. 43 (2010) 25550;
[19] R. C. Agrawal, Y. K. Mahipal, Rehana Ashrafi, Solid State Ionics (2010) (in press).
[20] R. C. Agrawal, G. P. Pandey , J. Phys. D: Appl. Phys. 41 (2008) 223001.
[21] M. L. Verma,. and N. K. Singh, CSVTU Reaserch Journal. (2012). 5: 22-26.
[22] M. L. Verma M Minakshi, and N K Singh , Electrochimica Acta 137 (2014) 497–503.
[23] M. L. Verma M Minakshi, and N K Singh ‘American Chemical Society’ 2014.
[24] J. B. Wager, C. Wagner, J. Chem. Phys. 26 (1957) 1597.
[25]. J. Evans, C. A. Vincent, P. G. Bruce, Polymer 28 (1987) 2324.
[26] A. Lewandowski, P. Jakobczyk, M. Galinski, M. Biegun, Self-discharge of elec-trochemical double layer capacitors, Phys. Chem. Chem. Phys. 15 (2013) 8692.
[27] J. Kang, J. Wen, S.H. Jayaram, A. Yu, X. Wang, Development of an equivalentcircuit model for electrochemical double layer capacitors (EDLCs) with distinctelectrolytes, Electrochim. Acta 115 (2014) 587.
[28] C. Meng, C. Liu, L. Chen, C. Hu, S. Fan, Highly flexible all solid state paper likepolymer supercapacitors, Nano Lett. 10 (2010) 4025.
[29] J. Black, H.A. Andreas, Effects of charge redistribution on self-discharge of elec-trochemical capacitors, Electrochim. Acta 54 (2009) 3568.
Citation
Manish Kurrey, Satpreet Singh Gill, Nirbhay K Singh, Ggandeep Singh Gill, O. P. Verma, "Electrical Characterization of (70PEO:30AgNO3)(1-x)(TiO2)x Nanocomposite Polymer Electrolyte for Energy Storage Devices used in HEV," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.932-936, 2019.
"Fuzzy Expert System for Prediction of Indian General Election Results"
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.937-943, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.937943
Abstract
A fuzzy expert system is a form of artificial intelligence that uses a collection of membership functions as fuzzy logic and rules to reason about data. India is being the largest democracy in the world; therefore rule based fuzzy expert system for prediction of Indian General Election results has applicable importance. For proper growth and development of any country there is need of democratic governance. Election is very famous in same way the prediction of election results is also has great importance. Authors has designed & developed the fuzzy expert system which predicts election results in India. Authors studied the voting behavior of voters of India by survey. System accepts input as behavioral parameter those are linguistic variables considered for prediction of chances of winning candidate or party. Fuzzy logic toolbox from MATLAB is used for designing and development of fuzzy expert system. The Fuzzy Expert System “FuzzyExitPoll” also works like exit poll as well as opinion poll. This research help to predict the election results so respective action should done by that particular party or candidate to win the elections.
Key-Words / Index Term
Election Prediction, Fuzzy Expert System, Membership Function, Linguistic Variable, Fuzzy logic Toolbox
References
[1] Rehana Ali “The working of Election Commission of India
”, Jnanada Prakashan, 2001 - History -10- 239
[2] Barnabas Bede “Mathematics of Fuzzy Sets and Fuzzy Logic
”,Springer,1-5
.[3] GODFREY H. “FUZZY LOGIC WITH MATLAB”, CREATESPACE INDEPENDENT PUBLISHING PLATFORM, 12-NOV-2016 – 1-328
[4] Zadeh, L. A. (1965). Fuzzy sets. Information and Control. 8, 338-353.
[5] Mamdani, E.H. and S. Assilian, "An experiment in linguistic synthesis with a fuzzy logic controller," International Journal of Man-Machine Studies, Vol. 7, No. 1, pp. 1-13, 1975, pp. 1-13.
[6]Abraham, A. (2005). Adaptation of fuzzy inference system using neural learning. Fuzzy System Engineering: Theory and Practice. N. Nedjah, Ed. et al. Berlin, Germany: Springer-Verlag, 3, 53–83.
[7]Yue Jiao, Yu-Ru Syau, E. Stanley Lee, Fuzzy adaptive network in presidential elections, Volume 43, Issues 3–4, February 2006, Pages 244-253
[8] Kumar, S., Bhatia, N., and Kapoor, N. (Feb 2011). Fuzzy logic based tool for loan risk prediction. In Proceedings of International Conference on Communication and Computing Technologies (ICCCT-2011), 180-183.
[9] Luis Teran, A Fuzzy-Based Advisor for Elections and the Creation of Political Communities, IEEE, 978-0-9564263-8/3
[10] Harmanjit Singh, Gurdev Singh, Nitin Bhatia, International Journal of Computer Applications (0975 – 8887) Volume 53– No.9, September 2012
[11] Manjiri M. Mastoli, R.V.Kulkarni, A Review: Role of Fuzzy Expert System for Prediction of Election Results. Reviews of Literature, 2013
[12] Masaharu Mizumoto, “Fuzzy Sets and Their Operations”, Information And Control 48, 30-48 (1981)
[13] Sugeno, M., Industrial applications of fuzzy control, Elsevier Science Pub. Co., 1985.
[14]https://docs.google.com/forms/d/e/1FAIpQLSeesMLD0mSGpyzuMOXPZy6Ura_pRHk7XEeTMamemtN2r8lElg/viewform?usp=pp_url
[15] Fuzzy Logic ToolboxTM User’s Guide: MATLAB
[16] S.N. Sivanandam, S. Sumathi, S. N. Deepa “Introduction to Fuzzy Logic using MATLAB”,Springer,128
Citation
Manjiri M. Mastoli, R.V. Kulkarni, Urmila R. Pol, ""Fuzzy Expert System for Prediction of Indian General Election Results"," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.937-943, 2019.
E-Learning Empowering through efficient system of Cloud Computing
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.944-947, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.944947
Abstract
E-learning stands for a form of electronically designed, distributed, and facilitated learning activities. It includes instruction delivered via all electronic media, such as the Internet, intranet, satellite broadcasts, audio/video tape and etc. E-learning is empowered in five dimensions: a new tool that incorporates equipment, hardware, and software; a facilitator of interaction; learning; a reduction in distance; and a collaborative enterprise. The primary advantage is that it enables learners to participate in learning activities from anywhere in the world and at any time provided a computer and internet connection are available. An efficient cloud computing technologies have changed the way applications are developed and accessed. They are aimed at running applications as services over the Internet on a scalable infrastructure. Now, Cloud computing that introduces efficient scale mechanism can let construction of E-learning system be entrusted to suppliers and provide a new mode for E-learning. Therefore, an E-learning system based on Cloud computing infrastructure is feasible and it can greatly improve the efficiency of investment and the power of management, which can make E-learning system empowerment.
Key-Words / Index Term
Cloud computing, e-learning, electronically, media, empowerment
References
[1] Armstrong J Scott (2012). "Natural Learning in Higher Education". Encyclopedia of the Sciences of Learning.
[2] Atif Nazir, Saqib Raza, Chen-Nee Chuah, (2008) “Unveiling Facebook: A Measurement Study of Social Network Based Applications”, IMC’08, Vouliagmeni, Greece, pp. 43 56. October 20–22.
[3] Auer, Sören. (2013). "First Public Beta of SlideWiki.org" "Opensource community-based tools for learning". Moodle.org. Retrieved 2012-10-24.
[4] F. Jian, “Cloud computing based distance education outlook”, China electronic education, 2009.10, Totally 273, pp.39-42.
[5] R. Hua, “Teaching Information System Based on Clou d Computing”, Computer and Telecommunications, 2010.02, pp. 42-43.
[6] Y. Juan, S. Yi-xiang, “The Initial Idea of New Lear ning Society which Based on Cloud Computing”, Modern Educational Techn ology, Vol.20, No.1, 2010, pp.14-17.
[7] T. Jian, F. Lijian, G. Tao, “Cloud computing-based Design of Network Teaching System”, Journal of TaiYuan Urban Vocation al college, Mar. 2010, pp.159-160.
[8] Y. Zhongze, “The basic principles of cloud computin g and its impact on education”, Satellite TV and Broadband Multimedia, 2010.6, pp.67-70.
[9] W. Xiaomei, J. Xiaoqiang, “Cloud computing on the Impact of Higher Education”, Science & Technology Information, 2010. 10, pp.397-398.
[10] Z. Zhong-ping, L. Hui-cheng , “The Development and Exploring of E- Learning System on Campus Network” ,Journal of Shanxi Teacher’s University (Natural Science Edition), Vol .18, No.1, Mar. 2004, pp.36-40.
[11] W. Jianmin, “Campus Network`s E-learning Mode”, New Curriculum Research, 2007.08, pp.84-86.
[12] Y. Wei, Y. Rong, “Research of an E-learning System Model Based on Agent”, Computer Engineering and Applications, Nov. 2004, pp.156-158.
[13] A. Gladun, J. Rogushina, F. Garcı′a-Sanchez, R. Martı′nez-Be′jar, J. Toma′s Ferna′ndez-Breis, “An application of intelligent techniqu es and semantic web technologies in e-learning environments”, Expert Systems with Applications 36, 2009, 922-1931.
[14] Y. Li, S. Yang, J. Jiang, M. Shi, “Build grid-enab led large-scale collaboration environment in e-learning grid”, Expe rt Systems with Applications 31,2006, 742-754.
[15] Z. Chengyun, “Cloud Security: The security risks o f cloud computing, models and strategies”, Programmer, May.2010, pp.71 -73.
[16] B. Hayes, "Cloud computing," Comm. Acm, vol. 51, no. 7, pp. 9– 11, 2008.
[17] E. Tuncay, "Effective use of Cloud computing in educational institutions," Procedia Social Behavioral Sciences, p. 938–942, 2010.
[18] R. Buyya, C.S. Yeo & S.Venugopal, "Market-oriented Cloud computing: Vision, hype, and reality of delivering IT services as computing utilities," 10th Ieee Int. Conf. High Performance Comput. Comm., p. 5–13, 2009.
[19] M. Lijun, W.K. Chan & T.H. Tse, "A tale of Clouds: Paradigm comparisons and some thoughts on research issues," Ieee Asia-pasific Services Comput. Conf., Apscca08, pp. 464–469, 2008 .
Al-Zoube, M., El-Seoud, S.A., Wyne, M.F.: Cloud computing based e-learning system.and Behavioral Sciences 2(2), 938–942 (2010)
Citation
Mohammad Ibrar, Bharat Bhushan, "E-Learning Empowering through efficient system of Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.944-947, 2019.
Image-Based Vehicle Recognition using Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.948-954, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.948954
Abstract
Vehicle recognition finds wide-spread applications in analyzing traffic data, collecting electronic tolls and identifying unauthorized vehicles on roads, etc. Diverse methods have been developed for vehicle recognition and these methods give good results in controlled environment. However, variations of illumination, vehicle geometry and occlusion are frequent phenomena in real-world scenarios. Neural network proves effective in handling such variations. In this paper, we have investigated the effectiveness of single-layer neural network, multi-layer neural network and convolutional neural network (CNN) and deep CNN for vehicle detection using a standard Madrid dataset.
Key-Words / Index Term
Vehicle recognition, Neural network, Convolutional neural network, Deep network
References
[1] Z. Chen, N. Pears, M. Freeman, and J. Austin, “Road vehicle classification using Support Vector Machines,” IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 4, pp. 214–218, 2009.
[2] N. S. Tadayuki Okada, “Development of preceding vehicle recognition algorithm for lead vehicle of autonomous platooning system based on multi sensor fusion and digital map," SICE Annual Conference, Tokyo, Japan, September 13-18, 2011.
[3] G. Z. Sun and R. Miller, “On-road vehicle detection using Gabor filters and support vector machines,” IEEE 14th International Conference on Digital Signal Processing, Santorini, Greece, 1-3 July 2002.
[4] Z. Xiao, B. Dai, T. Wu, L. Xiao, T. Chen, "Dense Scene Flow Based Coarse-to-Fine Rigid Moving Object Detection for Autonomous Vehicle, "IEEE Access, vol. 5, pp. 23492-23501, 2017.
[5] A. Petrovskaya and S. Thrun, "Model based vehicle detection and tracking for autonomous urban driving," Autonomous Robot, vol. 26, pp. 123-139, 2009.
[6] X. Zhang, N. Zheng, Y. He, F. Wang, "Vehicle detection using an extended hidden random field model," 14th IEEE International Conference on Intelligent Transportation Systems (ITSC), pp. 1555-1559, Washington DC, USA, 5-7 October 2011.
[7] F. M. Kazemi, "Vehicle recognition using curvelet transform and SVM, "IEEE 4th International Conference on Information Technology, pp. 516-521, Las Vegas, NV, USA, 2-4 April 2007.
[8] F. M. Kazemi, "Vehicle recognition based on Fourier, wavelet and curvelet transforms - a comparative study," IEEE Fourth International Conference on Information Technology, Las Vegas, NV, USA, 2-4 April 2007.
[9] W. Wang, "Research on Sobel operator for vehicle recognition," 1st IITA International Joint Conference on Artificial Intelligence, Hainan Island, China, 25-26 April 2009.
[10] Y. Freund, R. E. Schapire, "Large margin classification using the perceptron algorithm,” Machine Learning. 37 (3): 277–296, 1999.
[11] D. Gwala, V. Shrivastava and P. S. Parihar , “Secure Images for Copyright by Watermarking in Transform Sphere using Bidirectional Neural Network”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1 , Issue.5 , pp.21-25, Sep-2013 (ISSN: 2320-7639).
[12] D. He, C. Lang, S. Feng, X. Du, and C. Zhang, "Vehicle detection and classification based on convolutional neural network," 7th International Conference on Internet Multimedia Computing and Service, Hunan, China, August 19-21, 2015.
[13] N. S. Lele, “Image Classification Using Convolutional Neural Network”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 6, Issue 3 , pp.22-26, Jun-2018 (ISSN: 2320-7639).
[14] Alex Krizhevsky, I. Sutskever, G.E. Hinton, "ImageNet classification with deep convolutional neural networks," Twenty-sixth Annual Conference on Neural Information Processing Systems (NIPS), pp. 1097-1105, Nevada, USA, 2012.
[15] "Vehicle image database," Polytechnic University of Madrid, [Online]. Available: http://www.gti.ssr.upm.es/data/Vehicle_database.html
Citation
Md. Golam Moazzam, Mohammad Reduanul Haque, Mohammad Shorif Uddin, "Image-Based Vehicle Recognition using Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.948-954, 2019.
Survey on Activation Functions in Convolution Neural Network
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.955-960, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.955960
Abstract
The Recognition of handwritten digits is helpful in various domains such as Banking(For Fraudery), Writer Recognition(In Criminal Suspicion), Autonomous cars(For reading and identifying speed limits and Numeric signs), License Plate readers(For parking structures/security cameras). Deep Learning which serves as a subfield of Machine Learning is used for the task of classification of images. Deep Learning makes use of neural networks to accomplish this task. Among these, the most suitable neural network that is used for image classification is known as Convolutional Neural Network. Convolutional Neural Networks are very similar to ordinary Neural Networks, they are made up of layers of neurons that have learnable weights along with Activation Functions and biases. Activation Functions are used to control the output of each neuron at every layer. In this paper, we have studied the role of Sigmoid and Relu(Rectified Linear Unit) Activation Functions in Convolutional Neural Network, and we compare among these which one provides the highest accuracy for the image classification task.
Key-Words / Index Term
Artificial Intelligence, convolutional neural networks, Deep learning, Activation function, Sigmoid, Relu
References
[1].http://www.academia.edu/28025198/Handwritten_Digit_Recognition_by_Combining_SVM_Classifiers
[2].Dr.J.Arunadevi and M.Devaki “The impact of Activation functions in Deep Neural net algorithm on Classification performance parameters”.
International Journal of Pure and Applied Mathematics.Volume 119 No. 12 2018, 16305-16312. ISSN: 1314-3395 (online version)
URL: http://www.ijpam.eu
[3].Dabal Pedamonti Comparison of non-linear activation functions for deep neural networks on MNIST classification task. arXiv:1804.02763v1 [cs.LG] 8 Apr 2018
[4] Serwa A, Studying the Effect of Activation Function on Classification Accuracy Using Deep Artificial Neural Networks, Journal of Remote Sensing & GIS 6: 203., July 2017.
[5] Yuriy Kochura, Sergii Stirenko, Yuri Gordienko, Comparative Performance Analysis of Neural Networks Architectures on H2O Platform for Various Activation Functions, 2017 IEEE International Young Scientists Forum on Applied Physics and Engineering YSF-2017.
[6].A.Bhattacharjee Cluster-Then-Predict and Predictive Algorithms (Logistic Regression) International Journal of Computer Sciences and Engineering. Volume-6, Issue-2 E-ISSN: 2347-2693
Citation
Sandeep Gond, Gurneet Bhamra, Jyoti Kharade, "Survey on Activation Functions in Convolution Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.955-960, 2019.
Smart E-Commerce Recommendation System for Handling Limited Resource and Cold Start Problem
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.961-964, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.961964
Abstract
With the development of E-commerce, Recommendation Systems are applied more widely to guide the customers to search for their interested products. A recommendation system includes a user model, a recommended model and a recommendation algorithm. Limited resource, data valid time and cold start problems are not well considered in existing E-commerce recommendation system. This paper proposes a limited resource based algorithm to provide an improvement to the existing product recommendation algorithm and also provides a solution to cold start problem.
Key-Words / Index Term
Limited resource, cold start, recommendation system.
References
[1] B.Sarwar, G.Karypis, J.Konstan, J.Riedl, “Analysis of recommendation algorithms for E-commerce”, In: ACM Conference on Electronic Commerce, pp.158-167, 2000.
[2] Billsus D., and Pazzani M. J., “Learning Collaborative Information Filters”, In Proceedings of ICML ’98, pp. 46-53, 1998.
[3]ZhiminChen, Yi Jiang, Yao Zhao, “A Collaborative Filtering Recommendation Algorithm Based on User Interest Change and Trust Evaluation”,International Journal of Digital Content Technology and its Application,vol.4,November 9, December2010.
[4] G.Karypis, “Evaluation of item-based top-N recommendation algorithms,” in Proc. of CIKM 2001, pp. 247–254, 2001.
[5] ShikharKesarwani,AsthaGoel and Dr.NeetuSardana,”MSD-Apriori:Discovering Borderline-rare items using Association Mining”,In proceedings of 2017 Tenth International Conference on Contemporary Computing (IC3),10-12 August 2017,Noida,India.
[6] Herlocker L. J,KonstanA.J,Terveen G. L,et a1, “Evaluating collaborative filtering recommender systems”, ACM Transactionon Information Systems,vol. 22, no.1, pp. 5-53, 2004.
[7]Basu, C., Hirsh, H., and Cohen, W. (1998). Recommendation as Classification: Using Social and Content-based Information in Recommendation. In Recommender System Workshop ’98. pp. 11-15.
[8] Goldberg, D., Nichols, D., Oki, B. M., and Terry, D. (1992). Using Collaborative Filtering to Weave an Information Tapestry.Communications of the ACM.December.
[9]Xue, W., B. Xiao, et al. (2015). Intelligent mining on purchase information and recommendation system for e-commerce.2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).
[10] Goldberg D, Nichols D, Oki B M,et a1, “Using collaborative filtering to weave fin information Tapestry”, Communications of the ACM,vol. 35, no.12, pp. 61-70, 1992.
[11] Li, D., G. Zhao, et al. (2015). A Method of Purchase Prediction Based on User Behavior Log. 2015 IEEE International Conference on Data Mining Workshop (ICDMW).
[12] Ramezani, M. and F. Yaghmaee (2016). "A novel video recommendation system based on efficient retrieval of human actions."Physica a-Statistical Mechanics and Its Applications 457: 607-623.
[13] Yi, Z., D. Wang, et al. (2015). Purchase Behavior Prediction in MCommercewith an Optimized Sampling Methods. 2015 IEEE International Conference on Data Mining Workshop (ICDMW).
[14] Schafer, J. B., Konstan, J., and Riedl, J. (1999). Recommender Systems in E-Commerce. In Proceedings of ACM E-Commerce 1999 conference.
[15] Hill, W., Stead, L., Rosenstein, M., and Furnas, G. (1995). Recommending and Evaluating Choices in a Virtual Community of Use. In Proceedings of CHI ’95
Citation
Thejaswini N, Aditya C R, "Smart E-Commerce Recommendation System for Handling Limited Resource and Cold Start Problem," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.961-964, 2019.
Geographical Zone Clustered Multi-Objective Glowworm Swarm Optimization for Routing In VANET
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.965-975, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.965975
Abstract
Routing in vehicular ad hoc networks (VANETs) where the group of vehicles is moved randomly in any direction without any central coordination. The movements of the vehicle nodes are highly dynamic, therefore ensuring data delivery with small overhead and less delay is a challenging issue. In order to improve the routing, Geographical Zone clustered Multi-objective Glowworm swarm optimized Routing (GZMGR) technique is introduced. Initially, ‘n’ numbers of glowworms (i.e., vehicle nodes) are arbitrarily distributed in search space (i.e. network). In this proposed technique, the source vehicle node sends the data packet to the master node within the zone and it sends the data packet to a master node in another zone. Then the master node in another zone transmits to the destination (i.e. cluster member). Therefore, the routing of the data packet is performed via the master node since it collects the network status and location, direction, information of its cluster members. As a result, the master node reduces the overall traffic in the network and minimizes the delay. The master node is selected based on distance, high signal strength and direction of the node. After that, the source node initiates the data packets to transmit to the destination through the neighboring node. Initially, each glowworm has luminescence quantity called luciferin (i.e., objective function). The objective functions used for neighboring node selection are nodes speed, distance and link lifetime. Then the fitness is computed based on the objective functions to find the nodes for the optimization process. Due to the mobility, the luciferin value of the node is updated and finds the neighbor node through the probability. Finally, the source node takes a local decision for selecting the optimal neighboring node with minimum distance and high link lifetime. By this way, the optimal neighboring nodes are selected to forward the data packets. Followed by, a stable routing path from source to destination is established by considering the optimal one-hop vehicle. After that, the data packets are transmitted along the route path to the destination node. The simulation is conducted with different parameters such as collision rate, packet delivery ratio, normalized routing load and average end to end delay with respect to a number of vehicle nodes.
Key-Words / Index Term
VANET, Geographical Zone, cluster-based routing, master node selection, Multi-objective Glowworm Swarm optimization
References
[1] S.Suguna Devi and A. Bhuvaneswari “An Ethical Survey on Non-Delay Tolerant Routing Protocols for VANET” International Journal of Computer Science and Engineering, Vol. 6, Issue 9, pp. 705-711, 2018.
[2] R. Brendha and V. Sinthu Janita Prakash, “Geographical Zone-Based Cluster Head for Routing in Sparse vehicular networks”, International Journal of Engineering & Technology, Vol. 7, Issue 3, pp. 1910-1914, 2018.
[3] R. Brendha and V. Sinthu Janita Prakash, “Geographical Zone-Based Cluster Head for Routing in Urban Vehicular Network”, Information and Communication Technology for Intelligent Systems, Springer, Vol. 2, pp. 149-160, 2018.
[4] Deepak Rewadkar and Dharmpal Doye, “Multi-objective auto-regressive whale optimization for traffic-aware routing in urban VANET”, IET Information Security ,Vol. 12, Issue 4, pp. 293 – 304, 2018.
[5] Dan Lin , Jian Kang , Anna Squicciarini, Yingjie Wu , Sashi Gurung , Ozan Tonguz, “MoZo: a moving zone-based routing protocol using pure V2V communication in VANETs,” IEEE Transactions on Mobile Computing, Vol. 16, Issue 5, pp. 1357–1370,2017.
[6] Saifullah Khan, Muhammad Alam, Martin Fränzle, Nils Müllner, Yuanfang Chen, “A Traffic-Aware Segment-based Routing protocol for VANETs in urban scenarios”, Computers & Electrical Engineering, Elsevier , Vol. 68, pp. 447-462, 2018.
[7] Tasneem Darwish and Kamalrulnizam Abu Bakar, “Lightweight intersection-based traffic-aware routing in urban vehicular networks”, Computer Communications, Elsevier, Vol. 87, pp. 60-75, 2016.
[8] Mahmoud Hashem Eiza and Qiang N, “An evolving graph-based reliable routing scheme for VANETs,” IEEE Transactions on Vehicular Technology, Vol. 62, Issue 4, pp. 1493 – 1504, 2013.
[9] Yong Xiang, Zheng Liu, Ruilin Liu, Weizhen Sun, Wei Wang, “GeoSVR: A map-based stateless VANET routing”, Ad Hoc Networks, Elsevier, Vol. 11, Issue 7, pp. 2125-2135, September 2013.
[10] Neeraj Kumar and Mayank Dave, “BIIR: A Beacon Information Independent VANET Routing Algorithm with Low Broadcast Overhead”, Wireless Personal Communications, Springer, Vol. 87, Issue 3, pp. 869–895, 2016.
[11] Huma Ghafoor, Insoo Koo, and Nasir-ud-Din Gohar, “Neighboring and Connectivity-Aware Routing in VANETs”, The Scientific World Journal, Hindawi Publishing Corporation, Vol. 2014, pp. 1-10, 2014.
[12] Kashif Naseer Qureshi, Abdul Hanan Abdullah, Jaime Lloret, and Ayman Altameem, “Road-Aware Routing Strategies for Vehicular Ad Hoc Networks: Characteristics and Comparisons”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Vol. 2016, pp. 1-19, February 2016.
[13] Nori M. Al-Kharasani , Zuriati Ahmad Zulkarnain , Shamala Subramaniam andZurina Mohd Hanapi, “An Efficient Framework Model for Optimizing Routing Performance in VANETs”, Sensors, Vol. 18, Issue 2, pp. 1-21 , 2018.
[14] Yu ding, ya-zhi liu, xiang-yang gong, wen-dong wang, “Road traffic and geography topology based opportunistic routing for VANETs”, The Journal of China Universities of Posts and Telecommunications, Elsevier, Vol. 21, Issue 4, pp. 32-39, 2014.
[15] Kayhan Zrar Ghafoor , Jaime Lloret, Ali Safa Sadiq, Marwan Aziz Mohammed, “Improved Geographical Routing in Vehicular Ad Hoc Networks” Wireless Personal Communications, Springer, Vol. 80, Issue 2, pp. 785–804, 2015.
[16] Xuelian Cai, Ying He, Chunchun Zhao, Lina Zhu, Changle Li, “LSGO: Link State aware Geographic Opportunistic routing protocol for VANETs”, EURASIP Journal on Wireless Communications and Networking, Springer, Vol. 96, pp. 1-10, 2014.
[17] Yingcheng Xu, Li Wang, and Yuexiang Yang, “Dynamic Vehicle Routing Using an Improved Variable Neighborhood Search Algorithm”, Journal of Applied Mathematics, Hindawi Publishing Corporation, Vol. 2013, pp. 1-12, December 2012.
[18] Peppino Fazio, Floriano De Rango, Cesare Sottile, and Amilcare Francesco Santamaria, “Routing Optimization in Vehicular Networks: A New Approach Based on Multiobjective Metrics and Minimum Spanning Tree”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Vol. 2013, pp. 1-13, September 2013.
[19] Samira Harrabi, Walid Chainbi, Khaled Ghedira, “A Multi-Agent Approach For Routing On Vehicular Ad-Hoc Networks”, Procedia Computer Science, Vol. 19, pp. 578 – 585, 2013.
[20] Si-Ho Cha, Keun-Wang Lee, and Hyun-Seob Cho, “Grid-Based Predictive Geographical Routing for Inter-Vehicle Communication in Urban Areas”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation , Vol. 2012, pp. 1-7, January 2012.
[21] Yusor Rafid Bahar Al-Mayouf , Mahamod Ismail, Nor Fadzilah Abdullah, Ainuddin Wahid Abdul Wahab, Omar Adil Mahdi, Suleman Khan, Kim-Kwang Raymond Choo, “Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network”, PLoS ONE, Vol. 11, Issue 11, pp. 1-24, 2016.
[22] Haojing Huang and Shukui Zhang, “A Routing Algorithm Based on Dynamic Forecast of Vehicle Speed and Position in VANET”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Vol. 2013, pp. 1-9, May 2013.
[23] Jacek Rak, “LLA: A New Anypath Routing Scheme Providing Long Path Lifetime in VANETs”, IEEE Communications Letters, Vol. 18, Issue 2, pp. 281 – 284, 2014.
Citation
R. Brendha, V. Sinthu Janita Prakash, "Geographical Zone Clustered Multi-Objective Glowworm Swarm Optimization for Routing In VANET," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.965-975, 2019.
Paddy Leaf Disease Identification and Classification System: A Review
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.976-979, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.976979
Abstract
In many of the developing countries economy greatly depend on the agricultural productivity. The most common form of detecting the plant disease infection is recognized from the leaves color and texture. The researchers with the help of information and communication enabled technology, automated the farmers traditional process of plant disease identification. To enhance the agricultural crop production, plant disease detection should be done at early stage in an automatic manner that helps in spreading the infection to other plants. This paper focus to analyze the previous studies in identifying paddy plant disease detection system. The manuscript summarizes various available paddy leaf diseases, and discusses techniques employed in the classification of healthy and infected paddy plant. The survey would help the researchers to understand the challenges involved in dataset collection and highlights several points in future research directions.
Key-Words / Index Term
Edge detection, Image processing, Internet of Things, K-means clustering and K Nearest neighbor
References
[1] Pragya Lariya and Mukul Srivastava, “Review Paper on Crops Disease Diagnosing Using Image-Based Deep Learning Mechanism”,
International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.306-312, 2019.
[2] Shiddalingappa Kadakol and Jyothi B Maned, “Intelligence System for Leaf Extraction and Disease Diagnostic”,International Journal of Computer Sciences and Engineering, Vol.4, SpecialIssue.3, pp.62-66, 2016.
[3] C.Nandini and G.L. Anoop, “Classification and Grading the Level of Paddy Leaf Diseases Using Multi Classifiers”, International Journal of Advances in Science Engineering and Technology, ISSN: 2321-9009 Vol. 4, Issue.4, pp.124-128, 2016.
[4] N.Neelaveni and S.Rajeswari, “Paddy Leaf Disease Detection Classification and Remedy Finder Using K means Clustering and Image Mining”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue.12, pp.20859-20864, 2016.
[5] M.Suresha, Shreekanth K.N, HarishaNaik, T., “Identification of Healthy and Diseased Paddy Leaves using KNN classifier”, International Journal of Advanced Research in Computer Science, Vol.8, No. 9,pp.705-710, 2017.
[6] Toran verma and Sipi Dubey, “Paddy Disease Recognition using Image Processing and Radial basis Function Network”, Indian Journal of Science and Technology, Vol.10(46), pp.1-7,2017.
[7] K. Jagan Mohan, M. Balasubramanian and S. Palanivel, “Detection and Recognition of Diseases from Paddy Plant Leaf Images”, International Journal of Computer Applications, Vol. 144, No.12, pp.34-41, 2016.
[8] R.P.Narmadha and G.Arulvadivu, “Disease Symptoms Identification In Paddy Leaf Using Image Processing”, Advances in Computational Sciences and Technology,Vol. 10, No. 8, pp. 2213-2223, 2017.
[9] G. Anthonys and N. Wickramarachchi, “An Image Recognition System for Crop Disease Identification of Paddy fields in Sri Lanka”, In the Proceedings of Fourth International Conference on Industrial and Information Systems, ICIIS 2009 pp. 28 - 31, December2009, Sri Lanka.
[10] Manoj Mukherjee, Titan Pal and Debabrata Samanta, “Damaged Paddy Leaf Detection Using Image Processing” , Journal of Global Research in Computer Science, Vol.3, No. 10, pp.7-10, 2012.
[11] K. Jagan Mohan and M. Balasubramanian, “Recognition of Paddy Plant Diseases Based on Histogram Oriented Gradient Features”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, Issue.3, pp.1071-1074, 2016.
[12] S.Ramesh and Bharghava Rajaram, “IoT based Crop Disease Identification System using Optimization Techniques”, ARPN Journal of Engineering and Applied Sciences, Vol.13, No.4, pp.1392-1395, 2018.
[13] Sukhvir Kaur, Shreelekha Pandey and Shivani Goel, “Plants Disease Identification and Classification through Leaf Images: A Survey “, Archives of Computational Methods in Engineering, 2018.
Citation
P. Iswarya, D. Maheswari, "Paddy Leaf Disease Identification and Classification System: A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.976-979, 2019.