3D Game Development Engines and 3D Modelling
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1047-1053, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10471053
Abstract
Game engines are software toolkits which are very helpful in developing games. There are two types of game engines, commercial and free open source. Developers use these for creating and developing games. In this paper a discussion related to 3D game engines is made. Some of these engines are also helpful for creating games for gaming consoles device. Choosing a good game engine is an important decision. While designing a game it is very important to consider the platform for which these are developed. One factor which is also important is scripting language. Various resources which are utilized during the play of the games are also important. Main attention is given to CPU utilization, GPU utilization and RAM used by the games which are developed by these engines.
Key-Words / Index Term
Rendering, Scripting, Physics, 3D Game Engine, 3D Modelling
References
[1] Navarro, Andres, Juan Vicente Pradilla, and Octavio Rios. "Open source 3D game engines for serious games modeling." Modeling and Simulation in Engineering. IntechOpen, 2012.
[2] Finney, Kenneth C. 3D game programming all in one. Cengage Learning, 2013.
[3] https://en.wikipedia.org/wiki/Rendering_(computer_graphics)
[4] https://docs.unity3d.com/Manual/CreatingAndUsingScripts.html
[5] https://hub.packtpub.com/best-game-engines-for-ai-game-development/
[6] https://www.g2.com/categories/physics-engine
[7] https://www.giantbomb.com/profile/michaelenger/blog/game-engines-how-do-they-work/101529/
[8] https://en.wikipedia.org/wiki/3D_modeling
[9] https://unity.com/
[10] https://www.panda3d.org/
[11] http://jmonkeyengine.org/
[12] https://www.unrealengine.com/en-US/
[13] https://www.ogre3d.org/
[14] Remondino, Fabio, and Sabry El‐Hakim. "Image‐based 3D modelling: a review." The photogrammetric record 21.115 (2006): 269-291.
[15] Xie, Jingming. "Research on key technologies base Unity3D game engine." 2012 7th international conference on computer science & education (ICCSE). IEEE, 2012.
[16] Lewis, Michael, and Jeffrey Jacobson. "Game engines." Communications of the ACM 45.1 (2002): 27.
Citation
Rajinder Singh, "3D Game Development Engines and 3D Modelling," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1047-1053, 2019.
An active device-JFET for sensing Jasmine aroma
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1054-1059, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10541059
Abstract
Sensing the aroma of Jasmine and evaluating its quality is an important commercial activity. Aroma of Jasmine has unique fragrance and high economic value. Assessing the quality of such aromas has created lot of interest in researchers. Use of passive sensors in E-noses for floral aroma sensing is available in literature. For the first time, an active device such as FET is tried for Jasmine aroma sensing. A junction field effect transistor (JFET) is fabricated and tested as sensor for jasmine aroma. Sensitivity of JFET to jasmine aroma is found to be 1.5 to 4 times higher than resistive film reported in literature. This paper presents method of fabrication of JFET, experimental procedure for measuring aroma of Jasmine flower, effect of operating in different regions of JFET on aroma sensing; repeatability of the sensor. The sensor developed is useful in evaluating quality of aroma of jasmine flower and to find the time at which flowers can be harvested and taken for extraction.
Key-Words / Index Term
Aroma, Jasmine, quality, evaluation, FET, PEDOT: PSS
References
[1] George F. Fine, Leon M. Cavanagh, Ayo Afonja and Russell Binions, “Metal Oxide Semi-Conductor Gas Sensors in Environmental Monitoring”, Sensors 2010, 10, pp. 5469-5502; ISSN 1424-8220 doi:10.3390/s100605469.
[2] R. Ramamoorthy, P. K. Dutta, S. A. Akbar, “Oxygen sensors: Materials, methods, designs and applications”, Chemical sensors, Journal of Materials Science, 38 (2003), pp. 4271 – 4282.
[3] Haoshuang Gu, Zhao Wang and Yongming Hu, “Hydrogen Gas Sensors Based on Semiconductor Oxide Nanostructures”, Sensors 2012, 12, pp. 5517-5550; ISSN 1424-8220.
[4] Malik Abid Mahmood, Muhammad Saeed and Naveed Ahmad, “Quantitative and Qualitative Analysis of Essential Oil of Arabian Jasmine (Jasminum sambac) Flowers Harvested from Pothohar Region of Pakistan”, Journal of Ornamental Plants, Volume 7, Number 1: 17-24, March, 2017, ISSN(Print): 2251-6433, ISSN(Online): 2251-644117.
[5] Hena Ray, Nabarun Bhattacharyya, Alokesh Ghosh, Bipan Tudu, Rajib Bandyopadhyay, Arunangshu Ghosh, et.al., “Fragrance Profiling of Jasminum Sambac Ait. Flowers Using Electronic Nose”, IEEE Sensors Journal, Vol. 17, No. 1, January 1, 2017.
[6] Sajad Kiani, Saeed Minaee, Mahdi Ghasemi-Varnamkhasti, “A portable electronic nose as an expert systemfor aroma-based classification of saffron”, Chemometrics and Intelligent Laboratory Systems • May 2016.
[7] Sook-Hyun Hwang, Mi-Seon Kim, Pue-Hee Park and So-Young Park, “Scent Analysis Using an Electronic Nose and Flowering Period of Potted Diploid and Tetraploid Cymbidium”, Korean J. Hortic. Sci. Technol. 34(1):163-171, 2016.
[8] Kouki Fujioka, Mika Shirasu et. al., “Objective Display and Discrimination of Floral Odors from Amorphophallus titanum, Bloomed on Different Dates and at Different Locations, Using an Electronic Nose”, Sensors 2012, 12, 2152-2161; ISSN 1424-8220;doi:10.3390/s120202152.
[9] S. Mitachi, K. Sasaki, M. Kondoh and I. Sugimoto, “Odor Sensing in Natural Environment Using Quartz Crystal Resonators: Application to Aroma Sensing of Roses Cultivated in an Outside Garden”, School of Bionics, Tokyo University of Technology 1404-1 Katakura, Hachioji, Tokyo 192-0982, Japan.
[10] Seiichi Fukai, Yoshie Abe, “Discrimination of Lily fragrance by use of an electronic nose”, Proc. XX EUCARPIA Symp. on New Ornamentals II, Eds. J. Van Huylenbroeck et al. Acta Hort. 572, ISHS 2002.
[11] R Paul Wali, “An electronic nose to differentiate aromatic flowers using a real-time information-rich piezoelectric resonance measurement”, 2nd International Conference on Bio-Sensing Technology, Procedia Chemistry 6 ( 2012 ) 194 – 202.
[12] S. Bindu, R. Anil Kumar and M. S. Suresh, “Development of Technique for Making Ohmic Contacts to PEDOT-PSS Films”, Lecture Notes in Electrical Engineering 258, DOI: 10.1007/978-81-322-1524-0_28, Springer India 2013.
[13] Rekha P, M S Suresh, Vrunda Kusanur, “SENSOR FOR MEASURING AROMA OF JASMINE”, International Conference IEEE SENSORS 2018, 28th October to 31st October 2018, 978-1-5386-4707-3/18/$31.00 ©2018 IEEE.
Citation
Rekha P, Bindu S, Subodh Kumar Panda, "An active device-JFET for sensing Jasmine aroma," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1054-1059, 2019.
Credit Card Fraud Detection using Local Outlier Factor and Isolation Forest
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1060-1064, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10601064
Abstract
Today technology is increasing at very rapid pace, which can be used for good as well as for bad purposes. So with this growing technology e-commerce and online transactions also grown up which mostly contain transactions through credit cards. Credit cards help People to enjoy buy now and pay later for both online and offline purchases. It provides cashless shopping at every shop in all countries. As the usage of credit cards is increasing more, the chances of credit card frauds are also increasing dramatically. Credit card system is most vulnerable for frauds. These credit card frauds costs financial companies and consumers a very huge amount of money annually, fraudsters always try to find new methods and tricks to commit these illegal and outlaw actions. Online transaction fraud detection is most challenging issue for banks and financial companies. So it is much essential for banks and financial companies to have efficient fraud detection systems to reduce their losses due to these credit card fraud transactions. Various approaches have been found by many researchers till date to detect these frauds and to reduce them. Comparison of Local Outlier Factor and Isolation Factor algorithms using python and their detailed experimental results are proposed in this paper. After the analysis of the dataset we got the accuracy of 97% by Local Outlier Factor and 76% by Isolation Forest.
Key-Words / Index Term
Fraud Detection, Isolation Forest, Local Outlier Factor, Credit card, Dataset
References
[1] Nilsonreport.com. (2019). [online] Available at: https://nilsonreport.com/upload/content_promo/The_Nilson_Report_10-17-2016.pdf [Accessed 6 May 2019].
[2].Machine Learning Group, “Credit Card Fraud Detection,” Kaggle,23-Mar-2018. [Online].Available:https://www.kaggle.com/mlgulb/creditcardfraud. [Accessed: 06-May-2019].
[3]. I. Trivedi, M. M, and M. Mridushi, “Credit Card Fraud Detection,” Ijarcce, vol. 5, no. 1, pp. 39–42, 2016.
[4]. R. Banerjee, G. Bourla, S. Chen, S. Purohit, and J. Battipaglia, “Comparative Analysis of Machine Learning Algorithms through Credit Card Fraud Detection,” pp. 1–10, 2018.
[5]. T. Patel and M. O. Kale, “A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model,” vol. 3, no. 5, pp. 1576–1583, 2014.
[6]. D. Tripathi, T. Lone, Y. Sharma, and S. Dwivedi, “Credit Card Fraud Detection using Local Outlier Factor,” Int. J. Pure Appl. Math., vol. 118, no. 7, pp. 229–234, 2018.
[7]. C. P. Lim, M. Seera, A. K. Nandi, K. Randhawa, and C. K. Loo, “Credit Card Fraud Detection Using AdaBoost and Majority Voting,” IEEE Access, vol. 6, no. 11, pp. 14277–14284, 2018.
[8]. I. Sohony, R. Pratap, and U. Nambiar, “Ensemble learning for credit card fraud detection,” vol. 13, no. 24, pp. 289–294, 2018.
[9]. D. Sánchez, M. A. Vila, L. Cerda, and J. M. Serrano, “Association rules applied to credit card fraud detection,” Expert Syst. Appl., vol. 36, no. 2 PART 2, pp. 3630–3640, 2009.
[10]. J. T. S. Quah and M. Sriganesh, “Real time credit card fraud detection using computational intelligence,” IEEE Int. Conf. Neural Networks - Conf. Proc., vol. 35, pp. 863–868, 2007.
[11]. H. A. Shukur, “Credit Card Fraud Detection Using Machine Learning methodologies,” vol. 8, no. 3, pp. 257–260, 2019.
[12] "Local outlier factor", En.wikipedia.org, 2019. [Online]. Available:https://en.wikipedia.org/wiki/Local_outlier_factor.[Accessed: 06- May- 2019].
[13]. "Isolation forests for anomaly detection improve fraud detection.", Blog Total Fraud Protection, 2019. [Online]. Available: https://blog.easysol.net/using-isolation-forests-anamoly-detection/. [Accessed: 12- Apr- 2019].
Citation
Hyder John, Sameena Naaz, "Credit Card Fraud Detection using Local Outlier Factor and Isolation Forest," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1060-1064, 2019.
Chronic Kidney Disease Prediction
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1065-1069, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10651069
Abstract
Chronic kidney Disease (CKD), also known as chronic renal disease, which is continuous malfunction of kidney for months or even years. Identified based on the kidney damage or decrease in glomerular filtration rate (GFR). People with CKD are more prone to cardiovascular death than actual kidney failure. CKD is progressively predominant in patients with CVD or factors such as dyslipidemia, diabetes mellitus, hypertension and metabolic disorder. Classification models are built and are called classifiers. These classifiers will group the entered data set information to prominent classes. Chronic kidney disorder means the damage lasts and it only worsens over the period of time if not taken care of properly. This illness commonly known as kidney failure does not have any symptoms specific to the disease also sometimes the symptoms are not present and is diagnosed only by a lab test. The illness is highly diagnosed in the age of range 19-40 and higher in ages >40, here the waste starts accumulating over time as the Glomerular Filtration Rate(GFR) decreases overtime leading to increase in impurity of the blood. In this paper we are predicting the severity of kidney stage with the help of patients test report and using prediction algorithms, also we are doing a cross validation using C4.5 algorithms.
Key-Words / Index Term
Naïve Bayes, C4.5, Chronic Kidney Disease, Cross-Validation, Pre-processing
References
[1] Kunwar Singh Vaisla and Sithu D Sudarsan, “Role of attributes selection in classification of Chronic Kidney Disease patients”, International Conference on Computing, Communication and Security (ICCCS), 4-5 Dec, 2015, pp 1-6.
[2] M.M. Rahman, D.N. Davis, "Addressing the class imbalance problem in medical datasets", International Journal of Machine Learning and Computing, vol. 3, no. 2, 2013.
[3] S. Vijayarani S. Dhayanand "KIDNEY DISEASE PREDICTION USING SVM AND ANN ALGORITHMS" International Journal of Computing and Business Research (IJCBR) vol. 6 no. 2 2015.
[4] G. Kaur Er. N. Oberai "A REVIEW ARTICLE ON NAIVE BAYES CLASSIFIER WITH VARIOUS SMOOTHING TECHNIQUES" International Journal of Computer Science and Mobile Computing vol. 3 no. 10 pp. 864-868 october 2014.
[5] T. R. Patil S.S. Sherekar "Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification" International Journal of Computer Science and Applications vol. 6 no. 2 pp. 256-261 April 2013.
[6] "Country Statistics and Global Health Estimates. 2015" in World Health Organization (WHO)
[7] "Chronic Kidney Disease" World Kidney Day 2015 [online] Available: http://www.worldkidneyday.org/fags/chronic-kidney-disease/.
[8] “Symptoms, causes and treatment of Chronic Kidney Disease” news article 2017 [online] Available: https://www.medicalnewstoday.com/articles/172179.php
[9] Sahana B.J, “Prediction of Chronic Kidney Disease using Data Mining Classification Techniques and ANN”. International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, NCETEIT - 2017 Conference Proceedings.
Citation
Kumar Gaurav, Darshana A. Naik, Visesh Kumar Jaiswal, Manollas M, Ankitha V, "Chronic Kidney Disease Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1065-1069, 2019.
Disease Prediction Using Data Mining Techniques – A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1070-1075, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10701075
Abstract
The healthcare industry generates huge data that cannot be handled manually. Using data mining methods, valuable information is extracted from this data to create a relationship between attributes. Machine learning algorithms and data mining techniques are used from data sets to predict the disease. Data mining techniques are used to study disease occurrence. One of the most frequently encountered problems in medical centres is that not all specialists are equally qualified and can give their own conclusion, which can cause the patient to die. Data mining techniques and machine learning algorithms play a dynamic role in the automatic diagnosis of diseases in health care centres to overcome such glitches prediction of diseases. The purpose of this survey paper is to analyse the prior health care research work and advanced disease analysis technologies. Support Vector Machine, Decision Tree, Naïve Bayes, K-Nearest Neighbour, and Artificial Neural Network are some machine algorithms used to predict the occurrence of diseases. Our study concludes that Support Vector Machine shows approximately 85% accuracy and has the potential to be considered as one of the disease prediction capable algorithms.
Key-Words / Index Term
Data mining , Machine Learning, Support Vector Machine, Decision Tree, Naïve Bayes, K-Nearest Neighbor, and Artificial Neural Network
References
[1] Kampouraki, A., Manis, G., & Nikou, C. “Heartbeat Time Series Classification with Support Vector Machines,” IEEE Transactions on Information Technology in Biomedicine, 13(4), 512–518, 2009.
[2] Kurt, I., Ture, M., & Kurum, A. T. “Comparing performances of logistic regression, classification and regression tree, and neural networks for predicting coronary artery disease,” Expert Systems with Applications, 34(1), 366–374, 2008.
[3] Manish Kumar, “Prediction of Chronic Kidney Disease Using Random Forest Machine Learning Algorithm,” International Journal of Computer Science and Mobile Computing, Vol.5 Issue.2, pg. 24-33, Feb.2016.
[4] Dwivedi, A. K. “Analysis of computational intelligence techniques for diabetes mellitus prediction,” Neural Computing and Applications, 2017.
[5] Do, B. H., Langlotz, C., & Beaulieu, C. F. “Bone Tumor Diagnosis Using a Naïve Bayesian Model of Demographic and Radiographic Features,” Journal of Digital Imaging, 30(5), 640–647, 2017.
[6] Hlaudi Daniel Masethe, Mosima Anna Masethe, “Prediction of Heart Disease using Classification algorithms”. Proceedings of the World Congress on Engineering and Computer Science 2014 Vol. II,WCECS San Francisco, USA, 22-24 October, 2014
[7] Sellappan Palaniappan, Rafiah Awang, “Intelligent Heart Disease Prediction System Using Data Mining Techniques,” IJCSNS International Journal of Computer Science and Network Security, Vol.8 No.8, August 2008
[8] K.R. Lakshmi , M.Veera Krishna and S.Prem Kumar, “Performance Comparison of Data Mining Techniques for Predicting of Heart Disease Survivability ”,International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013.
[9] Carlos Ordonez, “Improving Heart Disease Prediction Using Constrained Association Rules,” Seminar Presentation at University of Tokyo, 2004.
[10] Mastoi, Q., Wah, T. Y., Gopal Raj, R., & Iqbal, U. “Automated Diagnosis of Coronary Artery Disease: A Review and Workflow”. Cardiology Research and Practice, 2018
[11] Lahsasna, A., Ainon, R. N., Zainuddin, R., & Bulgiba, A. “Design of a Fuzzy-based Decision Support System for Coronary Heart Disease Diagnosis”. Journal of Medical Systems, 36(5), 2012
[12] Sultana, M., Haider, A., & Uddin, M. S. “Analysis of data mining techniques for heart disease prediction,” 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), 2016.
[13] Colak, C., Karaman, E., & Turtay, M. G. “Application of knowledge discovery process on the prediction of stroke,” Computer Methods and Programs in Biomedicine, 119(3), 181–185, 2015.
[14] Megha Shahi1, Er. Rupinder Kaur Gurm., “Heart Disease Prediction System Using Data Mining Techniques - A Review,” International Journal of Technology and Computing (IJTC) ISSN-2455-099X, Volume 3, Issue 4, April 2017.
[15] Naraei, P., Abhari, A., & Sadeghian, A. “Application of multilayer perceptron neural networks and support vector machines in classification of healthcare data”. Future Technologies Conference (FTC), 2016.
[16] M. Shahi and R. Kaur Gurm, “Heart disease prediction system using data mining techniques,” Orient. J. Computer Science Technology, vol. 6, no. 4, pp. 457–466, 2013.
[17] Kumar, P., & Wasan, S. K. “Analysis of X-means and global k-means using tumor classification,” The 2nd International Conference on Computer and Automation Engineering (ICCAE), 2010.
[18] Hashi, E. K., Zaman, M. S. U., & Hasan, M. R. “An expert clinical decision support system to predict disease using classification techniques,” International Conference on Electrical, Computer and Communication Engineering (ECCE), 2017.
[19] D.Sindhuja,R. Jemina Priadarsini, “A Survey on Classification Techniques in Data Mining for Analyzing Liver Disease Disorder,” International Journal of Computer Science and Mobile Computing. Vol.5 Issue.5, pg. 483-488, May 2016.
[20] K.Srinivas B.Kavihta Rani Dr. A.Govrdhan. “Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks,” International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 250-255
[21] Shelly Gupta, Dharminder Kumar, Anand Sharma, “Data mining Classification Techniques Applied for Breast Cancer Diagnosis and Prognosis”, Indian Journal of Computer Science and Engineering (IJCSE).
Citation
Ovias Tajdar, Bhavya Alankar, "Disease Prediction Using Data Mining Techniques – A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1070-1075, 2019.
A Perspective Study on Pattern Discovery of Web Usage Mining
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1076-1081, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10761081
Abstract
Web usage mining is the application of data mining techniques to discover usage patterns from Web data, in order to understand and better serve the needs of Web-based applications. Web usage mining consists of three phases, namely preprocessing, pattern discovery, and pattern analysis. This paper describes each of these phases in detail. Given its application potential, Web usage mining has seen a rapid increase in interest, from both the research and practice communities. This paper provides a detailed taxonomy of the work in this area, including research efforts as well as commercial offerings. An up-to-date survey of the existing work is also provided. Finally, a brief overview of the WebSIFT system as an example of a prototypical Web usage mining system is given.
Key-Words / Index Term
Data Preprocessing, Pattern Analysis, Pattern Discovery, Web Usage Mining
References
[1] K. Sharma, G.Shrivastava, and Vional Conference of Electronics Computer Technology (ICECT), 2011, pp. 399403.
[2] Ng incremental fuzzy clustering National Conference on Soft Computing and Pattern Recognition, 2009, pp. 653658.
[3] Commerce site using 0th International conference onService systems andservice management (ICSSSM), 2013, pp.124129.
[4] ancing search-result delivery and helping users to find interesting web conteInternational conference on Web search and data mining, 2013, pp. 765770.
[5] S.-P. Ma and D.-on-Based Web Service Delivery: Data Mining-Based A Symposium on Computer, Consumer and Control (IS3C), 2012, pp. 666669.
[6] Frequent Pattern Generation using Association Rule Mining and Eng. Res. Technol., vol. 4, no. 4, pp. 12431246,2015
[7] Mining association rules ACM SIGMOD Rec., vol. 22, no. 2, pp. 207216, 1993.
[8] IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014, pp. 730735.
[9] Ming-Syan Chen, Jong Soo Park, and Philip S. Yu. Efficient data mining for path traversal patterns. IEEE Transactions on Knowledge and Data Engineering, 8(6):866-883, 1996.
[10] Mike Perkowitz and Oren Etzioni. Towards adaptive Web sites: Conceptual framework and case study. Artificial Intelligence, 118:245-275, 2000.
[11] Badrul Sarwar, George Karypis, Joseph Konstan, and John Riedl. Analysis of recommender algorithms for ecommerce. In Proceedings of the ACM Electronic Commerce Conference, pages 158-167, October 2000.
[12] J. Ben Schafer, Joseph Konstan, and John Riedl. Electronic commerce recommender applications. Journal of Data Mining and Knowledge Discovery, 5(1/2):115-
[13] GroupLens Research. Retrieved May 12, 2003 from http://www.cs.umn.edu/Research/GroupLens/
[14] Bamshad Mobasher, Robert Cooley, and Jaideep Srivastava. Automatic personalization based on Web usage mining. Communications of the ACM, 43(8):142-151, 2000.
[15] Myra Spiliopoulou. Web usage mining for site evaluation: Making a site better fit its users. Communications of ACM, 43(8):127-134, August 2000.
[16] Bamshad Mobasher, Honghua Dai, Tao Luo, and Miki Nakagawa. Discovery and evaluation of aggregate usage profiles for Web personalization. Data Mining and Knowledge Discovery, Kluwer Publishing, 6(1):61-82, January 2002
[17] Honghua Dai and Bamshad Mobasher. A road map to more effective Web personalization: Integrating domain knowledge with Web usage mining. In Proceedings of the International Conference on Internet Computing (IC), Las Vegas, Nevada, June 2003.
[18] Gediminas Adomavicius and Alexander Tuzhilin. Using data mining methods to build customer profiles. IEEE Computer, 34(2):74-82, February 2001.
[19] Yongjian Fu, Kanwalpreet Sandhu, and Ming-Yi Shih. A generalization-based approach to clustering of Web usage sessions. In Brij M. Masand and Myra Spiliopoulou,
[20] Brian D. Davison. A Web caching primer. IEEE Internet Computing, 5(4):38-45, July/August 2001.
[21] Bin Lan, Stephane Bressan, and Beng Chin Ooi. Making Web servers pushier. In Proceedings of the Workshop on Web Usage Analysis and User Profiling, pages 112-125, San Diego, California, August 1999.
[22] Alexandros Nanopoulos, Dimitris Katsaros, and Yannis Manolopoulos. Effective prediction of Web-user accesses: A data mining approach. In Proceedings of the Workshop on Mining Log Data Across All CustomerTouchpoints (WEBKDD), San Francisco, California, 2001.
[23] Stuar t E. Schechter, Murali Krishnan, and Michael D.Smith. Using path profiles to predict HTTP requests. In Proceedings of the 7th International World Wide Web Conference, Brisbane, Australia, April 1998.
Citation
G. Ragupathy, M.K. Prakash, "A Perspective Study on Pattern Discovery of Web Usage Mining," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1076-1081, 2019.
Web Usage Mining Using Fuzzy Approach – A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1082-1087, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10821087
Abstract
The World Wide Web, also called the Web, behaves as an information space where documents, web pages, graphics, audio, video files and other widespread web resources are identified and accessible at real time. Due to vast and varied information on the web, the web users cannot access the relevant information very effectively and easily. A web user spends a lot of time over the Internet. For understating web users’ interest area, it is necessary to analyse the surfing pattern of user’s internet access. Web usage mining is a tool to discover and perform analysis of interesting web usage patterns from web log data. The methodology requires to identify the usage from the web proxy log files. It also includes techniques for Noise Removal from log files; determine the Client, determine the Client Session, Access Path Enhancement, determine the Transaction, Path investigation, and association rule investigation, Consecutive Pattern, Fuzzy Clustering and Fuzzy Classification. For imprecise, vague and uncertainty in data items we must use fuzzy approach. Fuzzy C-Means (FCM) is an unsupervised clustering algorithm based on fuzzy approach that permits an element to belong to more than one cluster. Here fuzzy means “unclear” or “not defined” and C denotes “clustering”. In this paper, we have reviewed and discussed latest Web Usage Mining Fuzzy Cluster techniques, issues and challenges.
Key-Words / Index Term
Web Usage Mining, Cluster, Fuzzy Set, Cluster, K-Means, FCM, FPCM, MFPCM, EMFPCM, KFCM, YKFCM, KFCM
References
[1] G.Kiran Kumar, T. Bala Chary and P.Premchand, “A New and Efficient K-Means Clustering Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 3, Issue 11, November 2013.
[2] Zahid Ansari, Mohammad Fazle Azeem, A. Vinaya Babu and Waseem Ahmed, “A Fuzzy Clustering Based Approach for Mining Usage Profiles from Web Log Data”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 6, 2011.
[3] R. Khanchana and M. Punithavalli, “Web Usage Mining for Predicting Users’ Browsing Behaviors by using FPCM Clustering”, IACSIT International Journal of Engineering and Technology, Vol. 3, No. 5, October 2011.
[4] Mohamed Fadhel Saad and Adel M. Alimi, “Modified Fuzzy Possibilistic C-means”, Proceedings of the International Multiconference of Engineers and Computer Scientists, 2009 Vol. I, March 18 – 20, 2009.
[5] M. Gomathi and Dr. P. Thangaraj, “Parameter Based Modified Fuzzy Possibilistic C-Means Clustering Algorithm for Lung Image Segmentation”, Global Journal of Computer Science and Technology, Vol. 10 Issue 4 Ver. 1.0 June 2010,
[6] Sarab M. Hameed, Sumaya Saad, and Mayyadah F. Al Ani, “An Extended Modified Fuzzy Possibilistic C-Means Clustering Algorithm for Intrusion Detection”, Lecture Notes on Software Engineering, Vol. 1, No. 3, August 2013.
[7] Samarjit Das and Hemanta K. Baruah (2014), “A New Kernelized Fuzzy C-Means Clustering Algorithm with Enhanced Performance”, International Journal of Research in Advent Technology, E-ISSN: 2321-9637, Vol. 2, No.6, June 2014.
[8] Neha Singla and Er. Navroz Kahlon (2016), “Extracting Knowledge from Web Server Log Files and Future Prediction of Web Pages Using Kernel Based Fuzzy Clustering Method”, Imperial Journal of Interdisciplinary Research (IJIR) , ISSN: 2454-1362, Vol.2, Issue.8, 2016.
[9] Rehna Kalam, Dr Ciza Thomas and Dr M Abdul Rahiman, “GAUSSIAN KERNEL BASED FUZZY C-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION” 2016.
[10] Zui Zhang, Hua Lin, Kun Liu, Dianshuang Wu, Guangquan Zhang and Jie Lu (2013), “A hybrid fuzzy-based personalized recommender system for telecom products/services, ELSEVIER”, Information Sciences Volume 235, 20 June 2013,
[11] D. Jayalatchumy, Dr. P.Thambidurai, “Web Mining Research Issues and Future Directions – A Survey”, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 3, PP.20-27, Sep. - Oct. 2013.
[12] D.A. Adeniyi, Z. Wei, Y. Yongquan, “Automated web usage data mining and recommendation system using K-Nearest Neighbor (KNN) classification method”, Applied Computing and Informatics, Received 3 August 2014; revised 29 September 2014; accepted 17 October 2014.
[13] Srivastava, Mitali & Srivastava, Atul & Rakhi Garg, Dr & K. Mishra, “ANALYSIS OF USER IDENTIFICATION METHODS IN WEB USAGE MINING”, International Journal of Computer Engineering and Applications, ISSN 2321-3469, Volume 9, Issue 8, Sep. 2015.
[14] G.D.Praveenkumar,R.Gayathri, “A Process of Web Usage Mining and Its Tools”, International Journal of Advanced Research in Science, Engineering and Technology, ISSN: 2350-0328, Vol. 2, Issue.11, November 2015.
[15] Vinod Kumar and Ramjeevan Singh Thakur, “Jaccard Similarity based Mining for High Utility Webpage Sets from Weblog Database”, International Journal of Intelligent Engineering and System, 2017.
[16] Ashish Gupta, Anil Khandekar, “Development of Web Log Mining Based On Improved Fuzzy C-Means Clustering Algorithm Hermitition Distance”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 5, Issue 3, March 2016.
[17] D. Uma Maheswari A and Dr. A. Marimuthu (2016), “An Ensemble Fuzzy Rough Set Jaccard Similarity measure-based Approach on User Session Clustering”, International Journal of Computer Systems (ISSN: 2394-1065), Volume 03– Issue 04, April 2016.
[18] V. Chitraa and Dr. Antony Selvadoss Davamani “An Efficient Path Completion Technique for web log mining”, 2010 IEEE International Conference on Computational Intelligence and Computing Research, 2010.
[19] K. Gayathri, D. Vasanthi, "Brain Tumor Segmentation Using K-Means Clustering and Fuzzy C-Means Algorithms", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2 Issue 2, pp. 704-707, March-April 2017.
[20] U. S. Patki, Dr. S. B. Kishor, Dr. P. G. Khot, "Fuzzy Document Clustering based on Frequent Features and Feature Length", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3 Issue 1, pp. 1418-1422, January-February 2018.
[21] Shafalika Vijayal, Mohit Mittal, "Intrusion Detection in IoT based on Neuro-Fuzzy Approach", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2 Issue 7, pp. 113-120, September 2017.
[22] Hemina Bhavsar, Dr. Jeegar Trivedi, "Image Based Sign Language Recognition using Neuro - Fuzzy Approach", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3 Issue 1, pp. 487-491, January-February 2018.
Citation
Hardik A. Gangadwala, Ravi M. Gulati, "Web Usage Mining Using Fuzzy Approach – A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1082-1087, 2019.
Segmenting RGB Image Using Fuzzified Pixel
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1088-1091, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10881091
Abstract
Images have always been an attraction and our existence depends on them. Without images world would be an empty canvass. Our eyes capture thousands of images each day and our brain processes them. Interestingly we human can identify images in a micro second, a wink of an eye and we know what the object is, be it moving or static. Artificial intelligence is designed to let the computers think and behave like human beings, fuzzy logic is one of its important technique which has been used in the proposed thesis to segment and image. The proposed algorithm reads the image, pre-process it, then fuzzy rules are applied over it and finally de- fuzzification is carried over it to get the segmented image. The algorithm is compared with existing K-Mean and Modified K-Mean to access the viability of the proposed algorithm. The algorithm is tested for number of segments, segmented area, and time taken, it is observed that the proposed algorithm improves K-Mean, by 60%, 1.6%, 94% respectively and Modified K-Mean by 43%, 1.2%, 13.5% respectively. The results indicate that the proposed algorithm works better than the previous two algorithms. There is a marked improvement in number of segments maintaining the time taken. In this proposed worked has been overcome in MATLAB features.
Key-Words / Index Term
Segmenting pixels images, Trim function, di-fuzzification, centroids methods, modified k means ,fuzzyfication
References
[1] Gurbinder Kaur , Balwinder Singh" Intensity Based image segmentation using wavelet analysis and clustering techniques" published in ijcse indian journol of computer science and engineering vol 2, no 3,2011.
[2] Navneet Kaur, Gagan Jindal, “A Survey Of K Means
Clustering With Modified Gradient Magnitude Region Growing Technique For Lesion Segmentation”, International Journal Of Innovations In Engineering And Technology, 2013.
[3] X. Cui, G. Yang, Y. Deng and S. Wu, “An Improved Image Segmentation Algorithm Based on the Watershed
Transform”, IEEE, pp. 428—431, 2014.
[4]Savita Agrawal et al “Survey of image segmentation techniques and color models” vol 5(3),2014, / (IJCSIT) International Journal of Computer Science and Information Technologies.
[5]Chenhang Zhou, Liwei Tian*,Hongwei Zhao, Kai Zhao,"A Method of Two-Dimensional Otsu Image Threshold Segmentation Based on Improved Firefly Algorithm"2015
[6] P.M.K. Prasad, D.Y.V. Prasad, G. Sasibhushana Rao Prof.,“Performance analysis of orthogonal and biorthogonal
wavelets for edge detection of xray images”, Procedia Computer Science, International Conference on Recent Trends in Computer Science & Engineering, Vol. 87, pp
116-121, 2016.
[6] Divya, Mr Pawan Kumar Mishra "Frequency Domain Digital Image Segmentation based on a Modified k Means" (ijircst) issn:2347-5552,vol 5,issue 4 ,2017.
Citation
Anju Bhatt, Pawan Kumar Mishra, "Segmenting RGB Image Using Fuzzified Pixel," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1088-1091, 2019.
Intention Mining for Introspective Behavior Modelling in Business Intelligence
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.1092-1106, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10921106
Abstract
Mining user-intents has been a core platform in semantic web search and intelligent test mining. Prior art on these arena lacks infeasibility in materialization of theoretical foundations on factual viewpoints. Literatures and artifacts are needed to twitch conceptualization of formalism and methodologies on distinct domains under user-intent mining. This chapter provides a basis formulation of automata, theories and algorithm design approach for user-intent mining on social networks. The aim and the scope of this chapter is introspection of user’s aspiration in online search mechanics symbolizing business intelligence. A concrete approach to retrieve named entities from live social networks has been modelled in this chapter. The source for retrieval are public logs, blog, social channels and web-o-media has been constructed as an activity model which is modelled as transient in nature. Formulation of automata to recognize intent-keywords and the algorithm to reason the context of dialogue on live –talks have been described. This chapter describes principles and mathematical approach to design ontologies for intelligent mining for reasoning in live-talks overcoming the problem of out-of-vocabulary (OOV).
Key-Words / Index Term
opinion mining, social networks, ontology, live-talk reasoning, out-of-vocabulary (OOV)
References
[1]. Agrawal R.D, Gunopulos and F. Leymann (1998), “Mining Process Models from Workflow Logs”, Sixth International Conference on Extending Database Technology, pp. 469-483.
[2]. H. Yin et al, “A Temporal Context-Aware Model for User Behavior Modelling in Social Media Systems,” Proc.2014 ACM SIGMOD Int`l Conf.Management of Data(SIGMOD),2014,pp. 1543-1554.
[3]. A.Ferraz Cotsa et al., “RSC: Mining and Modeling Temporal Activity in Social Media,” Proc.21th ACM SICKDD Int`l Conf. knowledge Discovery and Data Mining(SIGKDD), 2015,pp.269-278.
[4]. R.Hinami and S.Satoh, “Audience Behavior Mining by Integratig TV Rating with Multimedia Contents”, IEEE Int`l Symp.Multimedia(ISM), 2016, pp.44-51.
[5]. J.Machajdik and A.Hanbury, “Affective image Classification Using Features Inspired by psychology and Art Theory”, Proc.18th ACM Int`l Cont.Multimedia(MM),2010,pp,83-92
[6]. A.Krizhevsky,I,Sutskever, and G.E. Hinton, “ImageNet Classification with Deep Convolutional Neural Network Systems(NIPS)”, 2012,2012,PP.1097-1105.
[7]. X.Wu and S.Satoh, “Ultrahigh-Speed TV Commercial Detection, Extraction, and Matching”, IEE J.of forecasting, Vol.27, no. 4, 2011, pp.
[8]. N.Katayama et al., “Mining large-Scale Brodcast Video Archives Towards Inter-Video Structuring”, Advances in Multimedia Information Processing-PCM 2004,LNSC 3332, Springer,2005,pp489-496.
[9]. C.Rolland, N.Prakash, and A.Benjamen, “A Multi-Model View of Process Modelling,” Req.Eng.,Vol.4,N.4.Springer-Verlag,1999.
[10]. W.M.P.Van der Aalst, “Process Mining: Discovery, Conformance and Enhancement of Business Process”, Ist Ed.,2011,pp.184-352.
[11]. C.Hug.R.Deneckere, and C. Salinensi, “Map-TBS: Map process enactment traces and analysis”, RCIS,2012,pp.204-209.
[12]. L.Maruster, “Machine Learning Approach to Understand Business Process”, PhD Thesis, Tech.Univ.Eindhoven,The Nrtherlands,2006.
[13]. C.Rolland, “A Comprensive View of Process Engineerng”, CAiSE98, LNCS 1413, Springer, Pisa, Itly, June 1998.
[14]. H.Schonberg, B.Weber and B.V.,Dongen, “Suporting Flexile Process through Recommendation baised on History”, Springer, BPM, vol 5240, pp.51-66. 2008
[15]. A.Rozinat, M.Veloso, and W.M.P. van der Aalst, “Evaluating the quality of discovered Process Models”, Antewrp, Belgium, 2008, pp 45-52.
[16]. R.Agrawwal, D.Gunopulos, and F.Leymann, “Minng Process Models from Workflow Longs”, EDBT,LNCS 1377, pp. 469-483, Springer. 1998.
[17]. J. Herbist and D. Karaginnis, “Integrating Machine Learning and Workflow Management to Support Acquisition and Adaptation of Workflow Models”, Workshop and database and Expert System Applications, 1998.
[18]. G.Khodabandelou, C. Hug, R. Deneckere, and C. Salinei, “Supervised International Process Models Discovery Using Hidden Markov Models”, 7th IEEE RCIS conference, Parice, France, 2013.
[19]. J. Cook, and A. wolf, “Automating Process Discovery through Event- Data Analysis,” Int. Conf. on soft. Eng, ACM process 1995, pp. 73-82
[20]. F. van der Aalst, A. Weijters, "Generic Process Mining." Application and Theory of Petri Nets, LNCS 3536, 2005.
[21]. W. Van Der Aalst, A. Weijters and L. Maruster, “WorkFlow Mining: Discovering Process Model from Event Logs,” IEEE Trans, on Knowledge and Data Eng Vol. 16 N.6, 1996, pp. 47-60.
[22]. J. Laflaquiere, “A Web Service Composition System Based on Fuzzy Dominance for Preference Query,” PhD thesis, University de technologies de Troyes, Campus France, 2009
[23]. T.K. Moon, “The Expectation Maximization Algorithm”, Signal Process Magazine, IEEE, Vol 12, N.6, 1996, pp. 47-60.
[24]. G. Greco, A. Guzzo, and L. Pontieri, “Mining Hierachies of Models: From abstract Views to Concrete Specifications,” BPM, 2005, pp. 32-47.
[25]. I.vanderfesten, H. Reijers, W. van der Aalst, “Product-based workflow support Information Systems,” Vol.36, No.2, pp. 517-
[26]. G. Greco, A. Guzzo, and L. Pontieri, “Mining Hierarchies of Models: From Abreact Views to Concrete Specifications,” BPM, 2005, pp.32-47.
[27]. Vanderfeesten, H. Reijers, W. van der Aalst, "Product- baised Workflow Support Information Systems." Vol. 36, No.2, pp.517-535, 2011.
[28]. G. Grosz, C.Rolland, S.Schwer, C. Souuveryet, V. Plihon, S. Si-Said, C. Ben Ashour and C. Gnho, “Modelling the Requirements Engineering Process: An Overview of the Nature Approach,” RE`97, London, Vol.2,1997.
[29]. J. Cook and A. Wolf, “Discovering Models of Software Process from Event-Based data,” ACM Trans. on Soft. Eng. and Methodology, Vol.7, No. 3, 1998, pp.215-249.
[30]. S. Minscok, C.W. Gunther, and W.M.P. Van der Aalst, “Trace Clustering in Process Mining Business Process Management Workshops,” LNBIP 2009, Vol.17. pp 109-120.
[31]. F.Fibre and I.H. Witten, “Data Mining: Practical Machine Learning Tools and Techniques”, 3rd Ed., Morgan Kaufmann Publishers Inc. San Francisco, USA, 2005.
[32]. Dardenne, A. Van Lamsweerde and S. Fickasu, “Goal-Directed Requirements Acquisition”, Sci. Comput. Program, Vol.77, No.2, 1989, pp.257-286.
[33]. Van Dingen, and W, Van Der Aalst, “Multi- Phase Process Mining: Building Instance Graphs,” Int. Conf. on Conceptual Modelling, LNCS 3288, Springer, 2004, pp. 362-376.
[34]. L.E. Baum, T. Petrie, G. Soules, and N. Wess, “A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains,” AT&T Technical Journal, Vol.64, No.2, 1985, pp.391-408.
[35]. G. Khodabandeleou, C. Hug. R. Deneckere, C. Salinesi, M. Bajec, E. Kornyshova and M. Jankovie, “Cots Products to Trace Method Enactment: Review and Selection”, 21st Ecis, Utrecht, Netherland, 2013.
[36]. E. Yu, “Modelling Strategic Relationship for Process Re-Engineering”, PhD thesis, University of Toronto, Dept of Computer Science, 1995.
[37]. T. Joachims, “Text Categorization with Support Vector Machines”, Technical Report, LS VIII No. 23, University of Dortmund, 1997.
[38]. Event Log Analyser IEEE Conference viewed October 2012.
[39]. J.Aranda, And G. Venolia, “The Secret Life of Bugs: Going Apart the Errors and Omissions in Software Repositories”, in Proceedings of the 31st International Conference on Software Engineering (ICSE), 2009, pp. 298-308.
[40]. G.Antoniol, K. Ayari, M. Di Penta, F. Khomh, Y. Guhneuc, “Is It a Bug or An Enhancement? A Text-Based Approach to Classify Change Requests”. CASCON. 2008:23.
[41]. J. Anvik, L. Hiew, and G.C. Murohy, “Who Should Fix This Bug?” In Proceeding of the 28th International Conference on Software Engineering (ICSE), 2006, pp. 361-370.
[42]. Bacchelli, T. dal sasso, M.D` Ambros, and M. Lanza. “Contest Classification of Development Emails”, In Proceedings of the 34th International Conference on Software Engineering (ICSE), 2012, pp. 375-385.
[43]. C.Vasallo, S. Panichella, M. Di Penta, And G. Canfora, CODES: “Mining Source Code Description From Developers Discussions”, In Proceedings of The 22th IEEE International Conference on Program Comprehension (ICPC), 2014, Pp. 106-109.
[44]. R. A. Baeza- yates, B. Ribiro-Neto, “Modern Information Retrieval”, Addison- Wesley Longman Publishing Co., Inc. Boston, MA, USA, 1999.
[45]. V.R.Basili, L.C. Briand, and W.L. Mlo, “A Validation Of Object Oriented Design Matrices As Quality Indicators”, In IEEE Trans. Software Eng., Vol.22, No. 10, 1996, pp. 751-761.
[46]. Begel and N. Nagappan, Global Software Development. “Who Does It?” In Proceedings of the 2008 IEEE International Conference on Global Software Engineering (ICGSE), 2008, pp. 195-199.
[47]. D. M. Blei, A.Y. Ng, and M.I. Jorden, “Latent Dirichlet Allocation. In Journal of Machine Learning Research (JMLR)”, Vol. 3, 2003, pp. 993-1022.
[48]. G.Confora, M. Di Penta, R. Oliveto, and S. Panchella, “Who Is Going To Mentor Newcomers in Open Source Projects?” In Proceedings of ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering (FSE), 2012:44.
[49]. D. Cer, M.C. de Marneffe, D. Jurafsky, and C.D. Manning, “Parsing to Stanfold Dependencies: Trade-Offs between Speed and Accuracy”, in Proceeding of the 7th International Conference Language Resources and Evaluation (LREC), 2010.
[50]. L. Cerulo, M. Ceccarelli, M. Di Penta, and G. Canfora, “A Hidden Markov Model to Detect Coded Information Islands in Free Text” in Proceeding of 13th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), 2014, pp. 157-166.
[51]. E.Ceylan, F. Kutlubay, and A. Bener, “Software Defect Identification Using Machine Learning Techniques”, in Software Engineering and Advanced Applications, 2006. SEAA 06, 32nd EUROMICRO Conference on, 2006, pp. 240-247.
[52]. A. M. Jehad Sarkar. "Hidden Markov Mined Activity Model for Human Activity Recognition" , International Journal of Distributed Sensor Networks, 2014
[53]. hal-paris1.archives-ouvertes.fr
[54]. Kinam Park, Taemin Lee, Soonyoung Jung, Sangyep Nam, Heuiseok Lim. "Extracting Search Intentions from Web Search Logs" , 2010 2nd International Conference on Information Technology Convergence and Services, 2010
[55]. Khodabandelou, Ghazaleh, Charlotte Hug, Rebecca Deneckère, and Camille Salinesi. "Process Mining Versus Intention Mining" , Lecture Notes in Business Information Processing, 2013.
[56]. mlsc.lboro.ac.uk
[57]. Kithmi Ashangani, K. U. Wickramasinghe, D. W. N. De Silva, V. M. Gamwara, Anupiya Nugaliyadde, Yashas Mallawarachchi. “Semantic video search by automatic video annotation using TensorFlow” , 2016 Manufacturing & Industrial Engineering Symposium (MIES), 2016.
[58]. Tingting Lu, Shifeng Hou, Zhenxiang Chen, Lizhen Cui, Lei Zhang. "An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic Mining" , 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015
[59]. Lecture Notes in Computer Science, 2004.
[60]. Submitted to The University of Manchester
[61]. G. Murray, E. Hoque, G. Carenini. “Opinion Summarization and Visualization”, Elsevier BV, 2017.
[62]. Submitted to Universiti Tunku Abdul Rahman
[63]. S. Bansal, “Data Security by Steganography: A Review”, IJSRNC, Vol 7, Issue-1 Mar-2019
[64]. Submitted to University of Johannsburg
[65]. Santanu Mandal, Sumit Gupta, “A novel dictionary-based classification algorithm for opinion mining”, 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 2016
[66]. “Enterprise, Business-Process and Information Systems Modeling", Springer Nature, 2013
[67]. Sirisha Aguru, Batteri Madhavrao, “Data Security in Cloud Computing Using RC6 Encryption and Steganography Algorithms”, IJSRCSE, Vol 7, Issue 1 Feb 2019.
[68]. Kinam Park. "Automatic extraction of user’s search intention from web search logs",
Multimedia Tools and Applications, 01/13/2011.
[69]. export.arxiv.org
[70]. Process Mining, 2011
[71]. Song, B. L., Liao, and J.Lee -. “Intelligent Collaborative Quality Assurance System for Wind Turbine Supply Chain Management”, International Journal of Advanced Computer Science and Applications, 2013.
[72]. file.allitebooks.com
[73]. Ghazaleh Khodabandelou, Charlotte Hug, Rebecca Deneckère, Camille Salinesi. "Chapter- 33 Process Mining versus Intention Mining”, Springer Nature, 2013.
[74]. Tao Mei, Xian-Sheng Hua, He-Qin Zhou, Shipeng Li, “Modeling and Mining of Users Capture Intention for Home Videos”, IEEE Transactions on Multimedia, 2007.
[75]. Andrea Di Sorbo, Sebastiano Panichella, Corrado A. Visaggio, Massimiliano Di Penta, Gerardo Canfora, Harald Gall. “DECA”, Proceedings of the 38th International Conference on Software Engineering Companion - ICSE `16, 2016
[76]. xin-xia.github.io
[77]. “Conceptual Modeling – ER 2005”, Springer Nature, 2005
[78]. www.engineering.wright.edu
Citation
Deepali N. Pande, Kaushik R. Roy, Satyajit S. Uparkar, "Intention Mining for Introspective Behavior Modelling in Business Intelligence," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1092-1106, 2019.
Routing Protocols in Airborne Ad-hoc Networks (AANETs): A Study
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1107-1113, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11071113
Abstract
With the expansion of wireless technologies, the ad-hoc networking between aircraft has become possible. This kind of networks is known as Airborne Ad hoc Networks (AANETs). These networks have emerged as one of the highly challenging areas of research due to the unique flight dynamics of the aircraft being used as nodes. The cruising speed of an aircraft (around 400-500 mph) is the major reason behind the intermittent link quality between two communicating aircraft. As a result, the routing between aircraft has emerged as a major threat for research in this field. This paper presents a study of different routing solutions provided recently by the research community for AANETs. A simulation analysis of the two well-known routing protocols i.e. OLSR and GPSR has also been provided here to identify their suitability in the airborne environment.
Key-Words / Index Term
AANET, Cruising Speed, OLSR, GPSR
References
[1] Neeraj Chhabra, "Comparative Analysis of Different Wireless Technologies", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.13-17, 2013
[2] Frodigh, Magnus, Per Johansson, and Peter Larsson. "Wireless ad hoc networking: the art of networking without a network", Ericsson review Vol.4, Issue.4, pp. 249, 2000.
[3] Perkins, Charles E. “Ad hoc networking”, Vol. 1, Reading: Addison-wesley, 2001.
[4] Toh, Chai K. “Ad hoc mobile wireless networks: protocols and systems”, Pearson Education, 2001.
[5] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
[6] Hartenstein, Hannes, and L. P. Laberteaux. "A tutorial survey on vehicular ad hoc networks", IEEE Communications magazine, Vol.46, Issue.6, pp. 164-171, 2008.
[7] Toor, Yasser, Paul Muhlethaler, Anis Laouiti, and Arnaud De La Fortelle. "Vehicle ad hoc networks: Applications and related technical issues", IEEE communications surveys & tutorials, Vol. 10, Issue.3, pp 74-88, 2008.
[8] Sahingoz, Ozgur Koray. "Networking models in flying ad-hoc networks (FANETs): Concepts and challenges", Journal of Intelligent & Robotic Systems, Vol. 74, Issue.1-2, pp. 513-527, 2014.
[9] Bekmezci, Ilker, Ozgur Koray Sahingoz, and Şamil Temel. "Flying ad-hoc networks (FANETs): A survey", Ad Hoc Networks, Vol.11, Issue.3, pp. 1254-1270, 2013.
[10] Wang, Yang, and Yiyuan J. Zhao. "Fundamental issues in systematic design of airborne networks for aviation", In 2006 IEEE Aerospace Conference, pp. 8-pp, 2006.
[11] Kiwior, Diane, Elizabeth G. Idhaw, and Steven V. Pizzi. "Quality of service (QoS) sensitivity for the OSPF protocol in the airborne networking environment", In MILCOM 2005- IEEE Military Communications Conference, pp. 2366-2372, 2005.
[12] A. S. Abhishek Tiwari, Anurag Ganguli, “Towards a mission planning toolbox for the air-borne network: Optimizing ground coverage under connectivity constraints”, IEEE Aerospace Conference, pp. 1-9, 2008.
[13] Ki-Il Kim, “Automated generation of movement trace for aircraft networks”, The First International Conference on Communications, Computation, Networks and Technologies, pp. 1-4, 2012.
[14] Pudlewski, Scott, Nirmala Shenoy, Yamin Al-Mousa, Yin Pan, and John Fischer. "A hybrid Multi Meshed Tree routing protocol for wireless ad hoc networks", In 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 635-640, 2008.
[15] Rosati, Stefano, Karol Krużelecki, Gregoire Heitz, Dario Floreano, and Bixio Rimoldi. "Dynamic routing for flying ad hoc networks", IEEE Transactions on Vehicular Technology, Vol.65, Issue.3, pp.1690-1700, 2016.
[16] Wang, Shangguang, Cunqun Fan, Cao Deng, Wenzhe Gu, Qibo Sun, and Fangchun Yang. "A-GR: A novel geographical routing protocol for AANETs", Journal of Systems Architecture, Vol.59, Issue.10, pp.931-937, 2013.
[17] Karp, Brad, and Hsiang-Tsung Kung. "GPSR: Greedy perimeter stateless routing for wireless networks", Proceedings of the 6th annual international conference on Mobile computing and networking, ACM, pp. 243-254, 2000.
[18] Li, Yi, Marc St-Hilaire, and Thomas Kunz. "Improving routing in networks of UAVs via scoped flooding and mobility prediction", In 2012 IFIP Wireless Days, IEEE, pp. 1-6, 2012.
[19] Peters, Kevin, Abdul Jabbar, Egemen K. Cetinkaya, and James PG Sterbenz. "A geographical routing protocol for highly-dynamic aeronautical networks", In 2011 IEEE Wireless Communications and Networking Conference, pp. 492-497, 2011.
[20] Basagni, Stefano, Imrich Chlamtac, Violet R. Syrotiuk, and Barry A. Woodward. "A distance routing effect algorithm for mobility (DREAM)", In Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, pp. 76-84, 1998.
[21] Ko, Young‐Bae, and Nitin H. Vaidya. "Location‐Aided Routing (LAR) in mobile ad hoc network.", Wireless networks Vol.6, Issue.4, pp. 307-321, 2000.
[22] Su, William, Sung‐Ju Lee, and Mario Gerla. "Mobility prediction and routing in ad hoc wireless networks", International Journal of Network Management , Vol. 11, Issue.1, pp. 3-30, 2001.
Clausen, Thomas, and Philippe Jacquet. “Optimized link state routing protocol (OLSR)” , No. RFC 3626, 2003.
Citation
Pardeep Kumar, Seema Verma, "Routing Protocols in Airborne Ad-hoc Networks (AANETs): A Study," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1107-1113, 2019.