Survey Paper on Quaternion-Based Encryption
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.978-990, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.978990
Abstract
Nowadays, delivering sensitive digital multimedia contents confidentially over vulnerable public networks is a matter of high importance and encryption is a technique which is widely used for secure communication. An improved and extended version of a lossless encryption technique used for digital images is quaternion based encryption. The quaternion based encryption scheme, significantly improves speed of images encryption in comparison with those originally embedded advanced encryption standard (AES) and triple data encryption standard (3-DES) algorithms. It utilizes extraordinarily properties of quaternion’s to perform rotations of information in 3D space for each of the cipher rounds. In this paper it has been surveyed about existing works on quaternion based encryption technique for both gray toned and color images as well as its application for secure transmission of medical images.
Key-Words / Index Term
Quaternion rotation, lossless scheme, security, DICOM, image processing, key sensitivity.
References
[1] T. Nagase, R. Koide, T. Araki, Y. Hasegawa, A new Quadripartite Public-Key Cryptosystem", in Proc. Int. Symp. Commun. lnfom. Technol. ISCIT 2004, Sapporo, Japan, 2004, pp. 74-79.
[2] Jongchan Baek, Hayeong Jeon, Gwangjin Kim, And Soohee Han, “Visualizing Quaternion Multiplication,” IEEE Access, Volume 5, 2017
[3] M. Dzwonkowski, and R. Rykaczewski, “Secure Quaternion Feistel Cipher for DICOM Images,” IEEE Trans. Image Process., vol. 28, no.1, Jan. 2019.
[4] M. Dzwonkowski, M. Papaj, and R. Rykaczewski, “A new quaternion based encryption method for DICOM images,” IEEE Trans. Image Process., vol. 24, no. 11, pp. 4614–4622, Nov. 2015.
[5] T. Nagase, M. Komata, and T. Araki, “Secure signals transmission based on quaternion encryption scheme,” in Proc. IEEE Adv. Inf. Netw. Appl. (AINA), vol. 2, Mar. 2004, pp. 35–38.
[6] B. Czaplewski, M. Dzwonkowski, and R. Rykaczewski, “Digital fingerprinting based on quaternion encryption scheme for gray-tone images,” J. Telecommun. Inf. Technol., vol. 2, pp. 3–11, Jul. 2014.
[7] M. Dzwonkowski and R. Rykaczewski, “Quaternion feistel cipher with an infinite key space based on quaternion Julia sets,” J. Telecommun. Inf. Technol., vol. 4, pp. 15–21, Dec. 2015.
[8] B. Czaplewski, M. Dzwonkowski, and R. Rykaczewski, “Digital fingerprinting for color images based on the quaternion encryption scheme,” Pattern Recognit. Lett., vol. 46, pp. 11–19, Sep. 2014.
[9] B. Czaplewski, “Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining,” J. Vis. Commun. Image Represent., vol. 40, pp. 1–13, Oct. 2016.
[10] H. Liu, Z. Zhu, H. Jiang, and B. Wang, “A novel image encryption algorithm based on improved 3D chaotic cat map,” in Proc. Young Comput. Sci. (ICYCS), Nov. 2008, pp. 3016–3021.
[11] M. Dzwonkowski and R. Rykaczewski , “Quaternion encryption methods for multimedia transmission, a survey of existing approaches,” Telecommun. Rev. Telecommun. News, vol. 7, pp. 668–671, Jul. 2016.
[12] F. Zhang, “Quaternions and matrices of quaternions,” in Linear Algebra and Its Applications. New York, NY, USA: Elsevier, 1997, pp. 21–57.
Citation
Garima Mathur, Anjana Pandey, "Survey Paper on Quaternion-Based Encryption," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.978-990, 2019.
A Survey on Salient Object Detection
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.991-994, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.991994
Abstract
Distinguishing and segmenting salient objects in like manner scenes, every now and again implied as salient object detection, has pulled in a huge amount of eagerness for PC vision. While various models have been proposed and a couple of utilizations have risen, yet a profound comprehensionof issues is insufficient. We hope to give a broad study of progressing in salient object identification and mastermind this area among other immovably related domains, for instance, regular picture segmentation, object recommendation age, and saliency for obsession forecast. Covering 228 distributions, we review i. Roots, key ideas, and assignments, ii.Center methods and principle displaying patterns, and iii.Datasets and assessment measurements in salient object identification. We likewise talk about open issues, for example, assessment measurements and dataset predisposition in model execution and propose future research bearings.
Key-Words / Index Term
Video-saliency, Spatio-temporal constraints, Reliableregions, global saliencyoptimization
References
[1] M. Cheng, N. J. Mitra, X. Huang, P. H. Torr, and S. Hu,“Global contrast based salient region detection,” IEEE TPAMI,vol. 37, no. 3, pp. 569–582, 2015.
[2] Z. Bylinskii, T. Judd, A. Borji, L. Itti, F. Durand, A. Oliva, andA. Torralba, “Mit saliency benchmark (2015),” 2015.
[3] Z. Bylinskii, A. Recasens, A. Borji, A. Oliva, A. Torralba, andF. Durand, “Where should saliency models look next?” inEuropean Conference on Computer Vision. Springer, 2016, pp.809–824.
[4] M. Spain and P. Perona, “Measuring and predicting objectimportance,” IJCV, vol. 91, no. 1, pp. 59–76, 2011.
[5] A. C. Berg, T. L. Berg, H. Daume, J. Dodge, A. Goyal,X. Han, A. Mensch, M. Mitchell, A. Sood, K. Stratoset al.,“Understanding and predicting importance in images,” inCVPR, 2012, pp. 3562–3569.
[6] B. M’t Hart, H. C. Schmidt, C. Roth, and W. Einh¨auser, “Fixationson objects in natural scenes: dissociating importancefrom salience,” Frontiers in psychology, vol. 4, 2013.
[7] P. Isola, J. Xiao, A. Torralba, and A. Oliva, “What makes animage memorable?” in CVPR, 2011, pp. 145–152.
[8] R. Rosenholtz, Y. Li, and L. Nakano, “Measuring visualclutter,” J. Vision, vol. 7, no. 2, 2007.
[9] H. Katti, K. Y. Bin, T. S. Chua, and M. Kankanhalli, “Preattentivediscrimination of interestingness in images,” in IEEEICME, 2008, pp. 1433–1436.
[10] M. Gygli, H. Grabner, H. Riemenschneider, F. Nater, andL. Van Gool, “The interestingness of images,” ICCV, 2013.
[11] S. Dhar, V. Ordonez, and T. L. Berg, “High level describableattributes for predicting aesthetics and interestingness,” inCVPR, 2011, pp. 1657–1664.
[12] Y.-G. Jiang, Y. Wang, R. Feng, X. Xue, Y. Zheng, and H. Yang,“Understanding and predicting interestingness of videos,”AAAI, 2013.
[13] L. Itti and P. Baldi, “Bayesian surprise attracts human attention,”in NIPS, 2005, pp. 547–554.
[14] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli,“Image quality assessment: From error visibility to structuralsimilarity,” IEEE TIP, vol. 13, no. 4, pp. 600–612, 2004.
[15] Z. Wang, A. C. Bovik, and L. Lu, “Why is image qualityassessment so difficult?” in IEEE ICASSP, vol. 4, 2002.
[16] W. Zhang, A. Borji, Z. Wang, P. Le Callet, and H. Liu,“The application of visual saliency models in objective imagequality assessment: A statistical evaluation,” IEEE transactionson neural networks and learning systems, vol. 27, no. 6, pp. 1266–1278, 2016.
[17] J. Vogel and B. Schiele, “A semantic typicality measure fornatural scene categorization,” in Pattern Recognition, 2004.
[18] K. A. Ehinger, J. Xiao, A. Torralba, and A. Oliva, “Estimatingscene typicality from human ratings and image features,” inAnnual Cognitive Science Conference, 2011.
[19] A. Farhadi, I. Endres, D. Hoiem, and D. Forsyth, “Describingobjects by their attributes,” in CVPR, 2009, pp. 1778–1785.
[20] H. Liu, S. Jiang, Q. Huang, C. Xu, and W. Gao, “Regionbasedvisual attention analysis with its application in imagebrowsing on small displays,” in ACM Multimedia, 2007.
[21] A. K. Mishra, Y. Aloimonos, L. F. Cheong, and A. Kassim,“Active visual segmentation,” IEEE TPAMI, vol. 34, 2012.
[22] Y. Li, X. Hou, C. Koch, J. M. Rehg, and A. L. Yuille, “Thesecrets of salient object segmentation,” in CVPR, 2014.
[23] A. Borji, “What is a salient object? a dataset and a baselinemodel for salient object detection,” in IEEE TIP, 2014.
[24] L. Itti, C. Koch, and E. Niebur, “A model of saliency-basedvisual attention for rapid scene analysis,” IEEE TPAMI, no. 11,pp. 1254–1259, 1998.
[25] T. Liu, J. Sun, N. Zheng, X. Tang, and H.-Y.Shum, “Learningto detect a salient object,” in CVPR, 2007, pp. 1–8.
[26] A. Borji, D. N. Sihite, and L. Itti, “What stands out in a scene?a study of human explicit saliency judgment,” Vision research,vol. 91, pp. 62–77, 2013.
[27] F. Perazzi, P. Kr¨ahenb ¨ uhl, Y. Pritch, and A. Hornung,“Saliency filters: Contrast based filtering for salient regiondetection,” in CVPR. IEEE, 2012, pp. 733–740.
[28] D. Comaniciu and P. Meer, “Mean shift: A robust approachtoward feature space analysis,” IEEE TPAMI, vol. 24, 2002.
[29] R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, andS. S ¨ usstrunk, “Slicsuper-pixels compared to state-of-the-artsuper-pixel methods,” IEEE TPAMI, vol. 34, no. 11, 2012
[30] M.-M. Cheng, Z. Zhang, W.-Y. Lin, and P. H. S. Torr, “BING:Binarized normed gradients for objectness estimation at300fps,” in CVPR, vol. 2, 2014, p. 4.
[31] A. Borji and L. Itti, “State-of-the-art in visual attention modeling,”IEEE TPAMI, vol. 35, no. 1, pp. 185–207, 2013.
[32] A. Borji, H. R. Tavakoli, D. N. Sihite, and L. Itti, “Analysis ofscores, datasets, and models in visual saliency prediction,” inICCV, 2013, pp. 921–928.
[33] J. Hosang, R. Benenson, P. Doll´ar, and B. Schiele, “Whatmakes for effective detection proposals?” IEEE transactionson pattern analysis and machine intelligence, vol. 38, no. 4, pp.814–830, 2016.
[34] B. Alexe, T. Deselaers, and V. Ferrari, “What is an object?” inCVPR, 2010, pp. 73–80.
[35] P. Siva, C. Russell, T. Xiang, and L. Agapito, “Looking beyondthe image: Unsupervised learning for object saliency anddetection,” in CVPR, 2013, pp. 3238–3245.
[36] H.-D. Cheng, X. Jiang, Y. Sun, and J. Wang, “Color imagesegmentation: advances and prospects,” Pattern Recognition,vol. 34, no. 12, pp. 2259–2281, 2001.
[37] R. Achanta, S. Hemami, F. Estrada, and S. S ¨ usstrunk,“Frequency-tuned salient region detection,” in CVPR, 2009.
[38] M.-M. Cheng, G.-X. Zhang, N. J. Mitra, X. Huang, and S.-M. Hu, “Global contrast based salient region detection,” inCVPR, 2011.
[39] S. Goferman, L. Zelnik-Manor, and A. Tal, “Context-awaresaliency detection,” IEEE TPAMI, vol. 34, no. 10, 2012.
[40] H. Jiang, J. Wang, Z. Yuan, Y. Wu, N. Zheng, and S. Li,“Salient object detection: A discriminative regional featureintegration approach,” in IEEE CVPR, 2013, pp. 2083–2090.
Citation
T. Hemanth Kumar, P. Chandra Sekhar Reddy, "A Survey on Salient Object Detection," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.991-994, 2019.
Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.995-1005, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.9951005
Abstract
Mobile ad-hoc networks (MANET) are a collection of mobile nodes that communicate with each other without any infrastructure. MANET is one of the temporary network, and it can establish anywhere anytime. Security is an necessary requirement in mobile ad-hoc networks to establish protected communication between mobile nodes. MANET are vulnerable to various types of attacks. One of main attacks is cosmic dust attack and black hole attack, it is a denial of service attack and it drops entire incoming packets between one source to destination. In this paper, it introduced new technique for avoiding both attacks with AODV routing protocol. This technique is tested and evaluated by using OmNetpp tool.
Key-Words / Index Term
Mobile ad hoc network (MANET), AODV, cosmic dust attack, Black hole attack
References
[1]. Qussai M. Yaseena, Monther Aldwairi, “An Enhanced AODV Protocol for Avoiding Black Holes in MANET”, Science Direct, Procedia Computer Science , Volume :134,2018, pp. 371–376.
[2]. G. Stephanie Vianna,,T. Vishnu Priya, M. Sathya, “Trust Based Approach To Overcome Black Hole Attack in MANET”, International Journal of Pure and Applied Mathematics, ISSN: 1314-3395,Volume 118 No. 22, 2018, pp. 1763-1769,
[3] Sweta Tarale and Dr. Abha Choubey,” Black Hole Attack Implementation and Detection in Mobile Ad Hoc Networks”, International Journal on Recent and Innovation Trends in Computing and Communication, ISSN: 2321-8169, Volume: 6, Issue: 5, May 2018, pp. 117 - 120.
[4]. Vikram Narayandas, Sujanavan Tiruvayipati, Madusu Hanmandlu and Lakshmi Thimmareddy. “Anomaly Detection System in a Cluster Based MANET”, Computer Communication, Networking and Internet Security, Lecture Notes in Networks and Systems 5,DOI 10.1007/978-981-10-3226-4_2, 2017,pp. 11-21.
[5]. Rashmi and Ameeta Seehra, “Detection and Prevention of Black-Hole Attack in MANETS”, International Journal of Computer Science Trends and Technology (IJCST), ISSN: 2347-8578, Volume 2, Issue 4, Jul-Aug 2014, pp.204-209.
[6]. Minoti Puray and Priyanka Palod, “Black-Hole Attack in MANET: A Study”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323, Volume 5 Issue 3, March 2016, pp. 597- 601.
[7]. VeerpalKaur and Simpel Rani, “A Hybrid and Secure Clustering Technique for Isolation of Black hole Attack in MANET”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323, Volume 7, Issue 3, March 2018, pp. 230-237.
[8]. Niranjan Panda1 and Binod Kumar Pattanayak, “Defense Against C-Operative Black-Hole Attack and Gray-hole Attack in MANET”,International Journal of Engineering & Technology, ISSN: 2227-524X, Volume 7, Issue 3.4, 2018, pp. 84-89.
[9]. Asha Ambhaikar, H.R. Sharma, V. K. Mohabey, “Improved AODV Protocol For Solving Link Failure In Manet, International Journal of Scientific & Engineering Research, ISSN 2229-5518, Volume 3, Issue 10, October-2012,pp. 1-6.
[10]. Salman M. Al-Shehri and Pavel Loskot, “Enhancing Reliability of Tactical MANETs by Improving Routing Decisions”, Journal of Low Poer Electrinics and Applications, Volume 8, Issue 49, 2018, pp.1-15.
[11]. S.Gayathri Devi and Dr.A.Marimuthu, “Forwarding Node Reduction with Link Break Time Prediction”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 24,2017, pp. 14441-14446.
[12]. Amanpreet Singh, Bhupinder Kaur, “To Propose a Novel Technique for Link Recovery in MANET”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 5 Issue 2, February 2016.
[13]. B.Karthikeyan and Dr.S.Hari Ganesh, “Analysis of Reactive AODV Routing Protocol for MANET”, IEEE Xplore, Digital Library,ISBN:978-1-4799-2876-7, Oct 2014, pp. 264-267, Scopus Index, Impact Factor :5.629.
[14]. B.Karthikeyan and Dr.S.Hari Ganesh, “Security and Time Complexity in AODV Routing Protocol”, International Journal of Applied Engineering Research (ISSN:0973-4562), Vol. 10, No.20,June 2015, pp.15542- 155546.
[15]. B. Karthikeyan and Dr.S.Hari Ganesh, “Encrypt - Security Improved Ad Hoc On Demand Distance Vector Routing Protocol (En-SIm AODV)”, ARPN Journal of Engineering and Applied Sciences (ISSN: 1819-6608), Vol. 11, No. 2, January 2016,pp. 1092-1096.
[16]. B. Karthikeyan,Dr.S.Hari Ganesh and Dr. JG.R. Sathiaseelan, “ Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (OpTiB-AODV)”, International Journal of Computer Applications (ISSN:0975 – 8887), Vol. 140, No.6, April 2016,pp 7-11.
[17]. B. Karthikeyan, Dr.S.Hari Ganesh and Dr. JG.R. Sathiaseelan , “High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OpTiB AODV)”,International Journal of Computer Science Engineering(E-ISSN: 2347-2693),Vol. 4, No. 4, April 2016, pp.156-164.
Citation
D. Shanmugasundaram, A. R. Md. Shanavas , "Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.995-1005, 2019.
Regression Technique to Predict Stages of Basal Cell Carcinoma
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1006-1010, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10061010
Abstract
With the advent of Artificial Intelligence and Machine learning, healthcare is not limited to mere scans and tests, but also caters to doctors helping them diagnose the medical disorder at hand. One such field of healthcare is diagnosis of skin cancer which is also called as Basal cell carcinoma. This is often caused due to deficiency of a skin pigment called melanin, which may deplete due to harsh environmental conditions. This paper concentrates on a machine learning algorithm to detect skin cancer. The accuracy is found to be 90%.
Key-Words / Index Term
Skin cancer, melanoma, melanin, benign, machine learning
References
[1] Detection skin cancer using SVM and snake model. Bumrungkun, P., Chamnongthai, K., & Patchoo, W. 2018 International Workshop on Advanced Image Technology
[2] Deep Convolution Pixel-wise Labeling for skin lesion Image Segmentation ,Ali Youssef ;Domenico D. Bloisi ;Mario Muscio ; Andrea Pennisi ; Daniele Nardi ; Antonio Facchiano IEEE International Symposium on Medical Measurements and Applications (MeMeA) Year: 2018
[3] A SVM based diagnosis of melanoma using only useful image features, Suleiman Mustafa; Akio Kimura , International Workshop on Advanced Image Technology (IWAIT) Year-2018
[4] Early Detection of Melanoma Skin Cancer Using Classifiers, VS. Sabeera, P. Vamsi Krishna PG Scholar, Dept. of ECE, R. K. College of Engineering, Vijayawada, Andhra Pradesh Assistant Professor, Dept. of ECE, R.K. College of Engineering, Vijayawada, Andhra Pradesh, Year-2016
[5] Skin Cancer Detection and classification Pratik Dubal, Sankirtan Bhatt, Chaitanya Joglekar, Dr. Sonali Patil, and Department of Information Technology K. J. Somaiya College of Engineering Vidyavihar, Year-2017
[6] Skin Cancer Detection using Artificial Neural Network,
Ekta Singhal M.Tech II Year, Dept of Computer Science Engineering, MUST – FET, Lakshmangarh, India Shamik Tiwari, Assistant Professor, Dept of Computer Science Engineering, MUST – FET, Lakshmangarh, India, Year-2015
[7] Detection of Skin Cancer Using Image Processing Techniques, Chandrahasa M, Varun Vadigeri and Dixit Salecha, Computer Science and Engineering, The National Institute of Engineering, Year-2016
[8] Image Processing for Skin Cancer Features Extraction Md.Amran Hossen Bhuiyan, Ibrahim Azad, Md.Kamal Uddin, Department of Computer Science & Telecommunication Engineering, Noakhali Science & Technology University, Bangladesh, International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013
Citation
Sanjana M, V. Hanuman Kumar, "Regression Technique to Predict Stages of Basal Cell Carcinoma," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1006-1010, 2019.
Optimizing Error Function of Backpropagation Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1011-1016, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10111016
Abstract
Backpropagation algorithm (BP) is one of the most popularized and effective learning algorithm for learning neural networks, starting with Multilayer perceptron’s (MLP’s) to today’s Deep learning models in the domain of Artificial Intelligence (AI). Backpropagation algorithm works on two phases. The forward phase feed the network with input and communication links with synaptic weights, the activation function decides whether the hidden neurons fire or not. The primary focus of the present work is on the backpropagation error, which decides the amount of weight updating based on the errors. The driving force of the algorithm is to minimize the error by gradient descent where we differentiate the error function to get the gradient of the error and update the weights to reduce the error. In this paper, our approach is to reduce the error of Backpropagation neural network (BPNN) based on constraints using swarm intelligence based optimization method. For this, the optimization problem has been formulated mathematically with subjected constraints under the acceptable range of network parameters. This research investigation presents a comparison of results obtained from solving the minimization problem with different variants of swarm intelligence technique such as PSO, HBPSO, and ALCPSO.
Key-Words / Index Term
Backpropagation, Deep learning, PSO, HBPSO, ALCPSO
References
[1] S. I. Gallant, “Perceptron-based learning algorithms”, IEEE Trans. on Neural Networks, vol. 1, no. 2, pp. 179-191, 1990.
[2] K. Hornik, M. Stinchcombe, H. White, “Multilayer feedforward networks are universal approximators”, Neural Networks, vol. 2, no. 5, pp. 359-366, 1989.
[3] D. P. Kingma, S. Mohamed, D. J. Rezende, and M. Welling, “Semi-supervised learning with deep generative models”, in Advances in Neural Information Processing Systems, pp. 3581–3589, 2014.
[4] D. E. Rumelhart , G.E Hinton, R. J. Williams, “Learning internal representations by error propagation”, in Parallel Distributed Processing: Explorations in the Microstructure of Cognition, 1986.
[5] Saduf, M.A. Wani, A. Wani. "Comparative study of back propagation learning algorithms for neural networks" ,International Journal of Advanced Research in Computer Science and Software Engineering 3.12 ,2013.
[6] Y. Le Cun, Y. Bengio,G. Hinton, “Deep Learning”, Nature. 521. P.436, 2015.
[7] N.S. Lele, “Image Classification Using Convolutional Neural Network”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.22-26, 2018. .
[8] G. E Hinton, S. Osindero, Y. W. The, “A fast learning algorithm for deep belief nets”, Neural computation, vol. 18, no. 7, pp. 1527-1554.
[9] G.E. Hinton, and R.R Salakhutdinov, “Reducing the dimensionality of data with neural networks”, Science, vol. 313, no. 57, pp.504-507, 2006.
[10] P, Chandra, Y. Singh, “An activation function adapting training algorithm for sigmoid feed forward networks”, Neurocomputing vol. 61, pp. 429–437, 2004.
[11] N. K. Bose and P. Liang, “Neural Network Fundamentals with Graph Algorithms and Applications”, McGraw-Hill, 1996
[12] Y. H. Zweiri, L D. Seneviratne, K. Althoefer, “Stability analysis of three term back propagation algorithm”, Neural Networks, vol. 18, pp. 1341-1347, 2005.
[13] S. Haykin, “Neural Networks: A Comprehensive Foundation”, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1999.
[14] C. C. Yu, Bin Da Liu, “A backpropogation algorithm with adaptive learning rate and momentum coefficient”, in IEEE International Joint Conference on Neural Networks, vol. 2, pp. 1218-1223, 2002.
[15] H. Shao, H. Zheng, “A new bp algorithm with adaptive momentum for FNNs training”, in: GCIS 2009, Xiamen, China, pp. 16—20, 2009.
[16] M. Z. Rehman, N. M. Nawi, M. I. Ghazali, “Noise-induced hearing loss (NIHL) prediction in humans using a modified back propagation neural network,” in 2nd International Conference on Science Engineering and Technology, pp. 185—189, 2011.
[17] Y. Bengio, P. Lamblin, D. Popovici, H. Larochelle, “Greedy layer-wise training of deep networks”, in Advances in neural information processing systems, pp. 153-160, 2007.
[18] C. Poultney, S. Chopra, Y. L. Cun, “Efficient learning of sparse representations with an energy-based model”, in Advances in neural information processing systems, pp. 1137-1144, 2007.
[19] X. Kai, “Research on the Improvement of BP Neural Network Algorithm and its Application”, Advanced Materials Research, vol. 926, pp. 3216-3219, 2014
[20] Z. Boger, H. Guterman, “Knowledge extraction from artificial neural network models”, in IEEE international conference on Systems, Man, and Cybernetics Orlando, FL, USA 1997.
[21] M.J.A. Berry, G. Linoff, “Data Mining Techniques”, NY: John Wiley & Sons 1997.
[22] S. Marsland “Machine Learning an Algorithmic Prospective” CRC Press,Tylor and Francis group, London, Newyork 2009.
[23] J. Kennedy and R. C. Eberhart, “Particle swarm optimization”, in Proceedings of the IEEE International Conference on Neural Networks, pp 1942-1948, Dec. 1995.
[24] J. Kennedy, “Particle swarm optimization”, Encyclopedia of machine learning. Springer US, pp. 760-766, 2011.
[25] S. S. Rao “Engineering optimization: theory and practice”, John Wiley and Sons, 2009.
[26] K. Kamiyama, “Particle Swarm Optimization-A Survey”, ICICE transactions on information and systems”., vol. 92, no. 7, 2009.
[27] L. Hao, “Human behavior-based particle swarm optimization”, The Scientific World Journal 2014.
[28] Wei-Neng Chen, “Particle swarm optimization with an aging leader and challengers”, IEEE Transactions on Evolutionary Computation 17.2 (2013): 241-258.
[29] A. J. Gogoi, N. M. LASKAR, Ch L.Singh, K. L. Baishnab, and K. Guha, “Throughput Optimization in Multi-user Cognitive Radio Network using Swarm Intelligence Techniques”, Journal of Information Science & Engineering, vol.34, no. 4, 2018.
Citation
Munmi Gogoi, Ashim Jyoti Gogoi, Shahin Ara Begum, "Optimizing Error Function of Backpropagation Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1011-1016, 2019.
Homology Modeling:Protein Structure Prediction
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.1017-1023, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10171023
Abstract
Homology Modeling is an advance technique for the determination of protein structure. Here, we describe the necessary steps of computational technique for prediction of three dimensional protein structure and discuss various tools and techniques which are used for the same. Homology Modeling has an important role in Drug designing against various disease and we illustrate this by one example of ZIKA virus Protein. This article aims to introduce effortless technique for prediction of protein structure and the importance of known structure of ZIKA protein for drug discovery and ultimately for betterment of society.
Key-Words / Index Term
Homology Modeling,Computational Technique,ZIKA protein
References
[1]. J. C.Fuller, N. Burgoyne,R. Jackson “Predicting druggable binding sites at the protein–protein interface”, Drug Discovery Today,vol.14,issue.3-4,pp.155-161,2009.
[2]. H.M. Berman,J. Westbrook, Z. Feng, L. Chen, H.Yang, “The Protein Data Bank and structural genomics”, Nucleic Acids Research,vol.31,issue.1,pp.489-491,2003.
[3]. A. Ozlem Tastan Bishop, Tjaart A. P. de Beer,Fourie Joubert, “Protein homology modelling and its use in South Africa”, South African Journal of Science,Vol.14,2008.
[4]. W.C. Wong, S.Stroh, F. Eisenhaber “Not all transmembrane helices are born equal: Towards the extension of the sequence homology concept to membrane proteins”, Biology Direct, Vol.6, pp.57, 2011.
[5]. M.Hilbert ,G.Böhm,R.Jaenicke, “Structural relationships of homologous proteins as a fundamental principle in homology modelling”, Proteins,Vol.17,issue.2pp.138-151,1993.
[6]. K.Joo,J. Lee,J. Lee, “Methods for Accurate Homology Modeling by Global Optimization”, Methods Mol Biol,Vol.857,pp.175-188,2011.
[7]. M. Laureti , D. Narayanan,et.al., “Flavivirus Receptors: Diversity, Identity, and Cell Entry”,frontiers in immunology,Vol.9,pp.1-11,2018..
[8]. A.S. Fauci, D. Morens, “Zika Virus in the Americas — Yet Another Arbovirus Threat”, The NEW ENGLAND JOURNAL of MEDICINE,Vol.374,issue.7,pp.601-604,2016.
[9]. O. Faye, C. Freire, A. Iamarino, et al., “Molecular evolution of Zika virus during its emergence in the 20 th century”, PLoS Negl Trop Dis,Vol.8,issue.1,2014.
[10]. M.M.Alen, S.J.F.Kaptein, T. Burghgraeve, ET. “Antiviral activity of carbohydrate-binding agents and the role of DC-SIGN in dengue virus infection”, Virology,Vol.387,issue.1,pp.67-75,2009.
[11]. S. F.Altschul, W. Gish1W.Miller, E.Myers,D.Lipman, “Basic local alignment search tool”,Journal of Molecular Biology,Vol.215,issue.3,pp.403-410,1990.
[12]. E.L. Sonnhammer, R. Eddy, R. Durbin, “Pfam: a comprehensive database of protein domain families based on seed alignments”, Proteins,Vol.28,issue.3,pp.405-420,1997.
[13]. J.M. Sauder, J.W. Arthur, R. Dunbrack, “Large-scale comparison of protein sequence alignment algorithms with structure alignments”, Proteins,Vol.40,issue.1,pp.6-22,2000.
[14]. K. Karplus, C. Barrett, R. Hughey, “Hidden Markov models for detecting remote protein homologies”, Bioinformatics,Vol.14,issue.10,pp.846-856,1998.
[15]. M. A. Marti-Renom, M. Madhusudhan, A.Sali, “Alignment of protein sequences by their profiles”, Protein Science, Vol.13, issue.4, pp.1071-1087, 2004.
[16]. M. Levitt, “Accurate modeling of protein conformation by automatic segment matching”,Journal of Molecular Biology,Vol.226,issue.2,pp.507-533,1992.
[17]. A.Sali, T. Blundell, “Comparative protein modelling by satisfaction of spatial restraints”, Journal of Molecular Biology,Vol.234,issue.3,pp.779-815,1993.
[18]. J. Greer, “Comparative modeling methods: application to the family of the mammalian serine proteases”, Proteins, Vol.7,issue.4,pp.317-334,1990.
[19]. B. Rost, “Twilight zone of protein sequence alignments”, Protein Engineering, Design and Selection, Vol.12, Issue.2, pp. 85–94, 1999.
[20]. R.E. Bruccoleri, M. Karplus, “Conformational sampling using high-temperature molecular dynamics”,Biopolymers,Vol.29, issue.14,pp.1847-1862,1990.
[21]. M. Levitt, “Accurate modeling of protein conformation by automatic segment matching”,journal of Molecular Biology, Vol.226,issue.2,pp.507-533,1992.
[22]. P. Benkert, S. Tosatto, D. Schomburg, “QMEAN: A comprehensive scoring function for model quality assessment”,Proteins,Vol.71, issue.1,pp.261-277,2008.
[23]. . R. Han,A. Leo-Macias , D. Zerbino,et.al, “ An efficient conformational sampling method for homology modeling”, Proteins,Vol.71,pp.175–88,2008.
[24]. M. Biasini, S. Bienert, A. Waterhouse, et al, “SWISS-MODEL: modelling protein tertiary and quaternary structure using evolutionary information” Nucleic Acids Res.,Vol.42,pp.252-258,2014.
[25]. K. Arnold, L. Bordoli, J. Kopp, T. Schwede, “The SWISS-MODEL workspace: a web-based environment for protein structure homology modeling”,Bioinformatics,Vol.22,issue.2,pp.195-201,2006.
[26]. N. Guex, M. Peitsch, T. Schwede, “Automated comparative protein structure modeling with SWISS-MODEL and Swiss-PdbViewer: a historical perspective”, Electrophoresis,Vol.30,issue.1,pp.162-173,2009.
[27]. D. Baker, A. Sali, “Protein structure prediction and structural genomics”,Science,Vol.294,issue.5540,2011.
[28]. A. Hillisch, L. Pineda F, R. Hilgenfeld, “Utility of homology models in the drug discovery process”, Drug Discov. Today,Vol.9,issue.15,pp.659-669,2004.
[29]. V. A. Kostyuchenko, P. Chew,S.Lok,et.al, “Near-atomic resolution cryo-electron microscopic structure of dengue serotype 4 virus”, J Virology,vol.88,issue.1,pp.477-482,2014
[30]. C.S.Ring,E. Sun, J. McKerrow, et.al., “Structure-based inhibitor design by using protein models for the development of antiparasitic agents”, Proc Natl Acad Sci U S A,Vol.90,issue.8,pp. 3583–3587,1993.
[31]. M.T.Mas, K.C.Smith, D.L.Yarmush, et.al, “Modeling the anti-CEA antibody combining site by homology and conformational search”, Proteins, Vol.14, issue.4, pp.483-498, 1992.
[32]. I.Vakser, “Evaluation of GRAMM low-resolution docking methodology on the hemagglutinin-antibody complex”, Proteins,Vol.29.issue.1,pp.226-230,1997.
[33]. T. Weber, “ Evaluation of homology modeling of HIV protease”, Proteins,vol.7,pp.172–84,1990.
[34]. Y. Sheng, A. Sali, H. Herzog, J. Lahnstein, S. Krilis, “Modeling, expression and site-directed mutagenesis of human â2- glycoprotein I.Identification of the major phospholipid binding site”, J Immunol,Vol.157,issue.8,pp. 3744-51,1996.
Citation
Nehal V.Rami, Jil Dedania, "Homology Modeling:Protein Structure Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1017-1023, 2019.
Movie Recommendation System
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1024-1028, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10241028
Abstract
In this hustling world, enjoyment is a need for every one of us to refresh our temper and energy. Entertainment regains our self-assurance for work and we can work extra enthusiastically. For revitalizing ourselves, we are able to pay attention to our preferred music or can watch films of our preference. For looking favorable movies online, we will make use of movie recommendation systems, that are extra dependable, when you consider that searching of preferred films would require more and more time which one can ‘t have the funds to waste. In this paper, to improve the quality of a movie recommendation system, a deep learning-based approach is presented to find out what exactly was being talked about in the user`s review and the sentiments that people are expressing.
Key-Words / Index Term
Deep Learning , Recommendation System, Review Sentiment Analysis
References
[1] S. M. Taheri and I. Irajian, "DeepMovRS : A unified framework for deep learning-based movie recommender Systems," 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), Kerman, 2018, pp. 200-204. DOI: 10.1109/CFIS.2018.8336633
[2] H.-T. Cheng, L. Koc, J. Harmsen, T. Shaked, T. Chandra, H.Aradhye, G.Anderson, G. Corrado, W. Chai, M. Ispir, R Anil, Z. Haque, L. Hong,V. Jain, X. Liu and H. Shah, Wide & Deep Learning for Recommender Systems, In Proceedings of the 1st Workshop on Deep Learning for Recommender Systems (DLRS 2016), (2016). ACM, New York, NY, USA, 7-10.
[3] P. Covington, J. Adams and E. Sargin, Deep Neural Networks for YouTube Recommendations, In Proceedings of the 10th ACM Conference on Recommender Systems, (2016). ACM, New York, NY, USA, 191-198.
[4] X. He, L. Liao, H. Zhang, L. Nie, X. Hu and T.-S. Chua, Neural Collaborative Filtering, In Proceedings of the 26th International Conference on World Wide Web (WWW ’17), (2017). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 173-182.
[5] Y. Koren, R. Bell and C. Volinsky, Matrix Factorization Techniques for Recommender Systems, Computer, 42, 8 (August 2009), 30-37.
[6]Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, Jeffrey Dean and G. Hinton, Distributed Representations of Words and Phrases and their Compositionality,NIPS`13 Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2.
[7] H. Wang, N. Wang and D.-Y. Yeung, Collaborative Deep Learning for Recommender Systems, In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’15), (2015). ACM, New York, NY, USA, 1235-1244.
[8] F. Zhang, N. J. Yuan, D. Lian, X. Xie and W.-Y. Ma, Collaborative Knowledge Base Embedding for Recommender Systems, In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’16), (2016). ACM, New York, NY, USA, 353-362.
Citation
Kunal Raj, Atulya Abhinav Das, Antariksh Guha, Parth Sharma, Mohana Kumar S, "Movie Recommendation System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1024-1028, 2019.
Evaluation of Classifiers Performance in Cervical Cancer Detection
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1029-1035, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10291035
Abstract
Artificial Intelligence (AI) plays an important role in many medical diagnosis systems. AI techniques uses for classifying the normal and abnormal cells are present in the cervix in the region of uterus. The classification of cancerous and non-cancerous cervical cells is detected by using AI techniques which gives accurate results. Compare to manual screening techniques like Pap smear test, the AI techniques gives better results and less time consuming. This paper presents several classifiers are used to classifies the normal and abnormal cells of Pap smear images.
Key-Words / Index Term
Cervical cancer, Support Vector Machine, Discriminant analysis, Decision tree, K-nearest neighbor
References
[1] Rajeev Gupta, Abid Sarwar, Vinod Sharma, “Screening of cervical cancer by Artificial Intelligence based Analysis of Digitized Papanicolaou-Smear Images”, International Journal of Contemporary Medical Research 2017; 4(5): 1108-1113.
[2] Priyanka K Malli, Dr.Suvarna Nandyal, “Machine learning technique for detection of cervical cancer using KNN and Artificial neural network”, International journal of Emerging Trends and Technology in Computer Science(IJETICS), volume 6, Issue 4, July-Aug 2017.
[3] M.Anousouya Devi, S.Ravi, et.al, “Classification of cervical cancer using Artificial Neural Network”, IMCIP-2016, Procedia computer science, 89 (2016), 465-472.
[4] Chandraprabha R, Seema singh, “Artificial Intelligent System for diagnosis of cervical cancer: A Brief Review and Future outline”, IJLRET, NC3PS-2016, pp.38-41.
[5] Abid sarwar, Vinod sharma, Rajeev gupta, “Hybrid ensemble learning technique for screening of cervical cancer using Papanicolaou smear image analysis”, Medicine Universe, July 2015, vol-4, p.54-62.
[6] Dr.N.Ganesan, Dr.K.Venkatesh, et.al, “Application of Neural Networks in Diagnosing Cancer Disease using Demographic Data”, International Journal of Computer Application, 2010, volume 1-No.26.
[7] Miao wu, Chuanboyan, Huiquiang Liu, et.al, “Automatic Classification of Cervical Cancer rom Cytological images by using Convolutional Neural Network”, Portland press, Bioscience Reports (2018), 38, BSR20181769.
[8] M.K.Soumya, K.Snwha and C.Arunvinodh, “Cervical Cancer Detection and Classification using Texture Analysis”, Biomedical and Pharmacology Journal, vol.9 (2), 663-671 (2016).
[9] Masakazu Sato, Koji Horie, Aki Hara, “Application of Deep Learning to the Classification of images from Colposcopy”,Oncology letters, 15:3518-3523, 2018.
[10] Yessi Jusman, Siti Noraini Sulaiman, Nor Ashidi, “ Capability of New Features from FTIR Spectral of Cervical Cells for Cervical Precancerous
Diagnostic System using MLP Networks”, IEEE, 978-1-4244-4547-9/09, TENCON 2009.
[11] A. S. Phatak and B, P. A., Classification of MR Images of Cervical Cancer Using SVM and ANN Engineering, issue 2277, (2015).
[12] B.Ashok, Dr.Aruna “comparison of Feature selection methods for Diagnosis of Cervical cancer using SVM classifier” Journal of Engineering Research Applications IISN:2248-9622,vol.6,Issue 1,(Part-1) January2016 pp.94-99
[13] Y. Marinakis, G. Dounias, and J. Jantzen, “Pap smear diagnosis using a hybrid intelligent scheme focusing on genetic algorithm based feature selection and nearest neighbor classification,”Computers in Biology and Medicine,vol.39,no.1,pp.69–78,2009
[14] P.K.Malli,S.Nandyal,“Machine learning Technique for detection of Cervical Cancer using k-NN and Artificial Neural Network”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 2017
[15] Y. LeCun, Y. Bengioand, and G. E. Hinton. “Deep learning”, Nature, 521:436–444, 2015
[16] M.A.Devi,S.Ravi,J.Vaishnavi and S.Punitha,“Classification of Cervical Cancer using Artificial Neural Networks”, Procedia Computer Science 89, pp.465 – 472, 2016.
[17] B.Sharma and K.K.Mangat, “Various Techniques for Classification and Segmentation of Cervical Cell Images - A Review”, International Journal of Computer Applications (0975 – 8887), vol 147, 2016.
[18] L.Thampi and V.Paul,“Automatic Segmentation and Classification in Cervical Cancer Images: Evaluation and Challenges”, International Journal of Pure and Applied Mathematics, vol 119, 2018
[19] Kitchener HC, Blanks R, Cubie H, Desai M, Dunn G, Legood R, Gray a, Sadique Z, Moss S. MAVARIC “A comparison of automation-assisted and manual cervical screening: A randomised controlled trial”, Health technology assessment (Winchester, England) [Internet]. 2011 Jan;15:iii–iv, ix–xi, 1–170. pubmed/21266159.
[20] Trevisan J, Angelov PP, Carmichael PL, Scott AD, Martin FL. “Extracting biological information with computational analysis of Fourier-transform infrared (FTIR) bio-spectroscopy datasets: current practices to future perspectives”, The Analyst. 2012 Jul; 137:3202-3215.
Citation
Rajpriya.R, Saravanan.M.S, "Evaluation of Classifiers Performance in Cervical Cancer Detection," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1029-1035, 2019.
Study of Leaf Disease using Deep Learning
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1036-1040, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10361040
Abstract
Indian economy is largely dependent on the crop produce provided by the farmers. The agricultural output is affected by the condition of the plants which will be baring the consumable products. Diseased plants show stunted growth and are way below the optimal output which needs to be generated. Thus, such plants need to be treated in timely manner so such diseases could be treated before the health of the plant deteriorates further. The project is aimed at solving this problem by detecting the disease which the plant is facing by using concepts of image classification and deep learning. A camera is used to take a picture of the leaf and image is passed through a pre calibrated weighted neural network which uses alexnet architecture. the Output neuron which the plant ends up after passing through neural network is disease identified by the Neural network and measures are suggested to improve the condition for helping the plant get rid of the disease and provide optimal results in agricultural output. Thus, focus is on detecting the disease preventing the plants growth and thus provide precautionary measures to solve the problem.
Key-Words / Index Term
Agriculture, leaf disease, deep learning, alexnet architecture,CNN
References
[1] V. Singh and A. Misra, “Detection of plant leaf diseases using image segmentation and soft computing techniques,” Information Processing in Agriculture, vol. 4, no. 1, pp. 41–49, 2017.
[2] D. A. Bashish, M. Braik, and S. Bani-Ahmad, “Detection and Classification of Leaf Diseases using K-means-based Segmentation and Neural-networks-based Classification,” Information Technology Journal, vol. 10, no. 2, pp. 267–275, 2011.
[3] Sankaran, Sindhuja, et al. "A review of advanced techniques for detecting plant diseases." Computers and Electronics in Agriculture 72.1 (2010): 1-13.
[4] Sujatha, R., Sravan Kumar, Y., & Akhil, G. U. (2017). Leaf disease detection using image processing. J. Chem. Pharm. Sci, 670-672.
[5] Zhou, Zhiyan, et al. “Color-Based Corner Detection Algorithm for Rice Plant-Hopper Infestation Area on Rice Stem Using the RGB Color Space.” 2011 Louisville, Kentucky, August 7 - August 10, 2011, 2011, doi:10.13031/2013.37803
[6] Chaudhary, Piyush, et al. "Color transform based approach for disease spot detection on plant leaf." International Journal of Computer Science and Telecommunications 3.6 (2012): 65-70.
[7] Muthukannan, Kanthan, and Pitchai Latha. "A PSO model for disease pattern detection on leaf surfaces." Image Analysis & Stereology 34.3 (2015): 209-216.
[8] Nardari, Guilherme Vicentim, et al. "Crop Anomaly Identification with Color Filters and Convolutional Neural Networks." 2018 Latin American Robotic Symposium, 2018 Brazilian Symposium on Robotics (SBR) and 2018 Workshop on Robotics in Education (WRE). IEEE, 2018.
Citation
Sadhvik Reddy, Saumit Sandesh C, Srividya KA, Sandeep Reddy, Mohana Kumar S, Mallegowda M, "Study of Leaf Disease using Deep Learning," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1036-1040, 2019.
IDS Vehicle Attack Detection and Prevention using Network Environment
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1041-1046, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10411046
Abstract
We have been witnessing a continual transformation of the automotive industry, whereby new technologies are integrated into the vehicles, changing the traditional concept as we know it and improving safety, performance and efficiency. The vehicular revolution is fuelling the automotive industries, most significant transformation seen in decades. However, as modern vehicles become more connected they also become much more vulnerable to cyber-attacks. A fully working Intrusion Detection System approach is proposed to protect connected vehicles (fleets and individuals) against such attacks. We present a new approach for detecting anomalies, tailored to the temporal nature of our domain. However, as vehicles become more connected, they also become more vulnerable to remote cyber-attacks, as researchers have recently been pointing out. It is demonstrated how, in cases where it is possible to compromise cars internal network, it becomes possible to control a wide range of essential functions: disabling the brakes, selectively braking individual wheels, stopping the engine, etc.
Key-Words / Index Term
Intrusion Detection, Anomaly Detection, IDS systems and platforms, Vehicle Network Security
References
[1] Bayrem Triki, Slim Rekhis, Mhamed Chammem, Noureddine Boudriga, “A privacy preseriving solution for the protection against Sybil attacks in vehicular adhoc networks”, Wireless and Mobile Networking Conference, 2013.
[2] Chen Chen, Xin Wang, Weili Han, Binyu Zang, “A robust detection of the Sybil attack in urban VANETs”, ICDCS Workshop 2009.
[3] W. Chang, J. Wu, “A survey of Sybil attack in Networks”, .Sensor Networks for Sustainable Development, CRC Press.
[4] S. Park, B. Aslam, D. Turgut, Cliff C. Zou, “Defence Against Sybil Attack in Vehicular Ad-hoc Network Based on Roadside Unit Support”, In MILCOM, pages
1-7, 2009.
[5] Bo Yu, Chang-Zhong Xu, Bin Xiao, “Detecting Sybil Attacks in VANETs”, In: Journal of Parallel and Distributed Computing 73.6 (2013), pp. 746 –756.
[6] Mina Rahbari, Mohammad Ali Jabreil Jamali, “Efficient Detection of Sybil Attack Based on Cryptography in VANET”, International Journal of Network Security &
Its Applications (IJNSA) (November 2011).
[7] Shan Chang, Yong Qi, Hongzi Zhu,Jizhong Zhao, Xuemin(Sherman) Shen, “Footprint: Detecting Sybil Attacks in Urban Vehicular Networks”, Parallel and
Distributed Systems, IEEE Transactions on, vol. 23. no. 6, 2012, pp. 1103-1114; DOI 10.1109/tpds.2011.263.
[8] Kenza Mekliche, Dr. Samira Moussaoui, “L-P2DSA: Location-based Privacy-Preserving Detection of Sybil Attacks”, 11th international symposium on programming
and systems (April 2013), pp. 187-192.
[9] Rasheed Hussain, Heekuck oh, “On Secure and Privacy Aware Sybil Attack Detection in Communication”, In Journal of Wireless Personal Communication, DOI: 10.1007/s11277-014-1659-5.
[10] Tong Zhou, Romit R. Choudhury, P. Ning, K. Chakrabarty, “P2DAP- Sybil Attacks Detection in Vehicular Ad-hoc Networks”, IEEE Journal on Selected Areas in Communications 29(3), 582–594 (2011).
Citation
Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi, "IDS Vehicle Attack Detection and Prevention using Network Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1041-1046, 2019.