Internet of Things (IoT) for Detecting, Monitoring and Measuring Water Quality
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1114-1119, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11141119
Abstract
According to latest survey of world health organization 77 million people face problem of unsafe water in allover the India. Despite the advancement in global technology, still there are not sufficient tools to measure the quality of water. Keeping in mind on this major issue we have proposed a model of water pollution detection system which is based on internet of things as well as it is cost efficient too. This model has capacity to measure and detect the pollution level as well as turbidity, temperature and many parameters. Turbidity measures the large no of suspended particles in water which is fully invisible and can’t be able to see with naked eyes. If water contains higher number of turbidity then it can cause various diseases like diarrhea, and cholera, while if turbidity is in low amount the water will consider pure and drinkable. PH is another important measure which measures the acidic and basic level of water. Temperature sensor measures the temperature of water that how much cold or hot it is.
Key-Words / Index Term
Water quality monitoring, internet of things, rural development, machine learning, cloud computing, ESP8266, arduino micro-controller, RFID
References
[1] Anjana S, Sahana M N, Ankith S, K NAtarajan, K R Shobha “An IOT based 6LoWPAN enablesd Experient for Water Management”IEEE ANTS 2015 1570192963
[2] K. GOPAVANITHA “ALow Cost System for Real Time Water Quality Monitoring and Controlling using IoT”978-1-5386-1887-5/17/©2017IEEE
[3] Nikhil Kumar Koditala, “Water Quality Monitoring System using IoT and Machine Laarning,”978-1-5386-2599-6/18/ ©2018IEEE
[4] N Vijayakumar“A Real Time Monitoring of Water Quality IN IoT Evironment”978-1-4799-6818-3/15/©2015IEEE
[5] Ricardo Yauri, Milton Rios, Jinmi Lezama“Water Quality Monitoring of Peruvian Amazon Based in the Internet of Things”978-1-5090-6363-5/17/©2017IEEE
[6] R.Karthik Kumar, M.Chandra Mohan, S.Vengateshapandiyan, M.Mathan Kumar, R.Eswaran. ”Solar based advanced water quality monitoring system using wireless sensor network” 2014, International Journal of Science, Engineering and Technology Research, 2014
[7] S. Zhuiykov, “Solid-state sensors monitoring parameters of water quality for the next generation of wireless sensor networks,” Sens. Actuators B, Chem., vol. 161, no. 1, pp. 1–20, 2012
[8] T. P. Lambrou, C. G. Panayiotou, and C. C. Anastasiou, “A low-cost system for real time monitoring and assessment of potable water quality at consumer sites,” in Proc. IEEE Sensors, Oct. 2012, pp. 1–4.
[9] Uferah Shafi, Rafia Mumtaz, Hirra Anwar, Ali Mustafa Qamar “Surafce Water Pollution Detection Using Inter of Things”978-1-5386-8354-5/18/©2018IEEE
[10] Vaishnavi V. Daigavane, Dr. M.A Gaikwad. “Water Quality Monitoring System Based on IOT” 2017 Advances in Wireless and Mobile Com- munications, Nov 2017 ISSN 0973-6972
[11] http://circuitdigest.com/microcontroller projects/sending-email-using-arduino-and-esp8266-wi-fi-module
[12] http://circuitdigest.com/microcontroller-projects/arduino-humidity-measurement
Citation
A.Gupta, B.Gupta, K.K. Gola, "Internet of Things (IoT) for Detecting, Monitoring and Measuring Water Quality," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1114-1119, 2019.
A Low Power SEU Resilient 13T SRAM using MTCMOS
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1120-1125, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11201125
Abstract
There has been an increasing interest in the radiation immunity of circuits in recent years as modern integrated circuits operating in high radiation environment require careful attention to the soft errors resulting in bit upsets. These events are referred to as single-event upsets (SEUs). SEUs will become more severe as a result of technology scaling and play a pivotal role in memory system stability. Memory systems with lower sensitivity to SEUs offer better stability and reliability if ignored lead to catastrophic situations in fields such as medicine, aerospace, etc. Therefore, it has become crucial that the design of the memory arrays is SEU resilient. The proposed design achieves high soft-error tolerance for robust low power operation in high-radiation environments making use of the MTCMOS technique. Less leakage power consumption is an important reason why this technology is incorporated into larger systems such as memories. This, in turn, leads to improved efficacy along with reduced susceptibility to single-event upsets and lower power consumption.
Key-Words / Index Term
Single Event Upset (SEU), rad-hardening (radiation hardening), Static Random Access Memory (SRAM), low power, Multi-threshold CMOS (MTCMOS)
References
[1] R. C. Baumann, “Radiation-induced soft errors in advanced semiconductor technologies,” IEEE Trans. Device Mater. Rel., vol. 5, no. 3, pp. 305–316, Sep 2005.
[2] J. L. Barth, C. Dyer, and E. Stassinopoulos, “Space, atmospheric, and terrestrial radiation environments,” IEEE Transactions on Nuclear Science, vol. 50, no. 3, pp. 466–482, 2003.
[3] Todd. R. Weatherford “Radiation effects in high speed III-V integrated circuits,” International Journal of High Speed Electronics and Systems Vol. 13, No.1 (2003) 277-292.
[4] P. E. Dodd and F. W. Sexton, “Critical charge concepts for CMOS SRAMs,” IEEE Trans. Nucl. Sci., vol. 42, no. 6, pp. 1764–1771, Dec. 1995.
[5] E.G. Stassinopoulos “The space radiation environment for electronics,” Proceedings of the IEEE Vol: 76, Issue: 11, Nov 1988.
[6] .R. Oldham and F.B. McLean, “Total ionizing dose effects in MOS oxides and devices,” IEEE Transactions on Nuclear Science, 50(3):483–499, June 2003.
[7] P. E. Dodd and L. W. Massengill, “Basic mechanisms and modeling of single-event upset in digital microelectronics,” IEEE Transactions on Nuclear Science, vol. 50, no. 3, pp. 583–602, 2003.
[8] Alexander Fish, LiorAtias, Adam Teman “ A Low-Voltage Radiation-Hardened 13T SRAM Bitcell for Ultralow Power Space Applications ” IEEE Transactions on Very Large Scale Integration (VLSI) Systems (Volume: 24, Issue: 8, Aug. 2016).
[9] Mohab Anis, Mohamed Elmasry “Multi-Threshold CMOS Digital Circuits: Managing Leakage Power,” 2003.
[10] S. Mutoh, T. Douseki, Y. Matsuya, T. Aoki, S. Shigematsu, J. Yamada “1V power supply highspeed digital circuit technology with multithresholdvoltage CMOS,” Issue 8, Volume 30, August 1995.
[11] S. Mukhopadhyay, H. Mahmoodi, and K. Roy, “Modeling of failure probability and statistical design of SRAM array for yield enhancement in nanoscaled CMOS,” IEEE Trans. Comput. Aided Des., vol. 24, no. 12, pp. 1859–1880, Dec. 2005.
[12] Rashmi Deshmukh, Anagha Zade, Rasika Bhusari “Temperature Monitoring and Regulating System for Power Saving”, International Journal of Computer Sciences and Engineering, Vol.1, Issue.2, pp.36-37, 2013.
[13] Anil Pratap “Analysis of Full and Half Adder Using Different Logic Style”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.6-9, Feb 2016.
[14] Lior Atias, Adam Teman, and Alexander Fish, “Single Event Upset Mitigation in Low Power SRAM Design,” IEEE 28th Convention of Electrical and Electronics Engineers in Israel, 2014.
Citation
Anusha Gandla, "A Low Power SEU Resilient 13T SRAM using MTCMOS," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1120-1125, 2019.
An Online Diet Recommendation System Based On Artificial Intelligence
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.1126-1130, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11261130
Abstract
This research paper aims to present the study and implementation of artificial intelligence dietician which can simulate the experience of a human dietician. The main aim is to recommend to the users a perfectly planned diet according to their body parameters and their day to day activities using artificial intelligence. The online artificial dietician is a bot with artificial intelligence about human nourishments. It acts as a diet specialist similar to an actual dietician. We have also taken under consideration the health status of the user. We have used artificial intelligence as the driving technology. To select the diet of user it has to check various parameters and there can be various food items that pass the criteria. So to select the best among all, we take the help of Genetic Algorithm. Genetic Algorithm is our key algorithm, besides the Naïve Bayes algorithm. Genetic algorithm keeps on finding the best option from the pool of options while Naïve Bayes is used for the purpose of classification.
Key-Words / Index Term
Genetic algorithm, Naïve Bayes Classifier, Artificial Intelligence
References
[1] G.Agapito, M.Simeoni, “DIETOS: a recommender system for adaptive diet monitoring and personalized food suggestion”, In the Proceedings of the 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), New York, NY, USA, pp.1-8, 2016.
[2] C.Snae, M.Bruckner, “FOODS: A Food-Oriented Ontology-Driven
System”, In the Proceedings of the 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, Phitsanulok, Thailand, pp.168-176, 2008.
[3] F.Wang, Y.Yuan, Y.Pan, B.Hu, “Study on the Principles of the Intelligent Diet Arrangement System Based on Multi-Agent”, In
the Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application, Shanghai, China, pp.264-268, 2008.
[4] H.Jen-Hsiao, C.Henry, “SmartDiet: A personal diet consultant for healthy meal planning”, In the Proceedings of the 2010 IEEE 23rd
International Symposium on Computer-Based Medical Systems (CBMS), Perth, WA, Australia, pp.421-425, 2010.
[5] H.Pruthi. H.Parvadiya, V.Rawool, J.Philip, “Artificial Intelligence Dietician” INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH Vol.31, Issue.2, pp.176-178, 2017.
[6] J.Barnett. M.Harricharan, D.Fletcher, “myPace: An Integrative Health Platform for Supporting Weight Loss and Maintenance
Behaviors” IEEE Journal of Biomedical and Health Informatics Vol.19, Issue.1, pp.109-116, 2015.
[7] G.Saranya, G.Geetha, M.Safa, “E-Antenatal assistance care using decision tree analytics and cluster analytics based supervised machine learning”, In the Proceedings of the 2017 International Conference on IoT and Application (ICIOT), Nagapattinam, India, pp.1-3, 2017.
[8] J.H.Kim, J.S.Park, Y.H.Lee, K.W.Rim, “Design of Diet Recommendation System for Healthcare Service Based on User
Information”, In the Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, Seoul, South Korea, pp.516-518, 2009.
[9] Y.Lv, D.Li, “Improved Quantum Genetic Algorithm and Its Application in Nutritional Diet Optimization” In the Proceedings of the 2008 Fourth International Conference on Natural Computation, Jinan, China, pp. 460-464, 2008.
[10] Z.Pei, Z.Liu, “Nutritional Diet Decision Using Multi-objective
Difference Evolutionary Algorithm” In the Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing, Wuhan, China, pp.77-80, 2009.
[11] S. Dubey, R. Jhaggar, R. Verma, D. Gaur, “Encryption and Decryption of Data by Genetic Algorithm” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.42-46, 2017.
[12] S.Sharma, S.Khan, “Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)” International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.1, 2019.
Citation
D.S. Zingade, Umar Shaikh, Shreyas Saisekhar, Umang Koul, Keshav Vaswani, "An Online Diet Recommendation System Based On Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1126-1130, 2019.
Virtualization and its Role in Cloud Computing Environment
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1131-1136, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11311136
Abstract
In recent times Virtualization and Cloud computing are two popular research directions. In contrast with the past, Virtualization is being used by a growing number of organizations for Server Consolidation, Dynamic Load Balancing, Testing and Development, Disaster Recovery, Improved System Reliability and Security and to reduce power consumption, and also provides high availability for critical applications, and streamlines application deployment and migrations. Information Technology resources can be delivered as services over the Internet to the end user through cloud computing. One of such important core technologies of cloud computing is Virtualization. In this paper, we present a detailed review on virtualization. Furthermore, we also discussed the Role of Virtualization in cloud computing, we also discussed the three main types of Virtualization technologies.
Key-Words / Index Term
Cloud computing, Network, Virtualization, Technology, Memory
References
[1] Aaqib Rashid, Amit Kumar “Cloud Computing Characteristics and Services: A Brief Review”, International Journal of Computer Sciences and Engineering Vol.7(2), Feb 2019, E-ISSN: 2347-2693
[2] NIST, http://www.nist.gov/itl/cloud/index.cfm
[3] S. Perez, ―Mobile cloud computing: $9.5 billion by 2014‖, http://exoplanet.eu/catalog.php, 2010.
[4] White Paper, ―Mobile Cloud Computing Solution Brief,‖ AEPONA, November 2010.
[5] Michael Kretzschmar, S Hanigk, “Security management interoperability challenges for collaborative clouds”, Systems and Virtualization Management (SVM), 2010, Proceedings of the 4th International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud, pp. 43-49, October 25-29, 2010. ISBN:978-1-4244-9181-0,DOI: 10.1109/SVM.2010.5674744.
[6] B. Loganayagi, S. Sujatha, ―Creating virtual platform for cloud computing‖, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC 2010), 28-29 Dec. 2010, pp.1-4.
[7] Dawei Sun, Guiran Chang, Qiang Guo, Chuan Wang, Xingwei Wang., ―A Dependability Model to Enhance Security of Cloud Environment Using System-Level Virtualization Techniques‖, First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA); 2010, pp.305-310.
[8] Karen Scarfone, Murugiah Souppaya, and Paul Hoffman, ―Guide to Security for Full Virtualization Technologies‖, Special Publication 800-125, National Institute of Standards and Technology (NIST), 2011.
[9] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, A. Warfield, ―Xen and the art of virtualization‖, in: Proc. 19th ACM Symposium on Operating Systems Principles, SOSP 2003, Bolton Landing, USA, Oct. 2003.
[10] Joanna Rutkowska and Alexander Tereshkin, ―Bluepilling the Xen Hypervisor‖, Xen 0wning Trilogy part III, Black Hat USA, aug 2008.
[11] Samuel T. King, Peter M. Chen, Yi min Wang, Chad Verbowski, Helen J. Wang, and Jacob R. Lorch, ―Subvirt: Implementing Malware with Virtual Machines‖, In IEEE Symposium on Security and Privacy, 2006.
[12] Z. Pan, Q. He, W. Jiang, Y. Chen, and Y. Dong, ―Nestcloud: Towards practical nested virtualization,‖ in Proc. Int Cloud and Service Computing (CSC) Conf, 2011, pp. 321–329.
[13] W. Dawoud, I. Takouna, and C. Meinel, ―Infrastructure as a service security: Challenges and solutions‖, in Proc. Informatics and Systems (INFOS), 2010 The 7th International Conference on, 2010, pp. 1 –8.
[14] A. Whitaker, M. Shaw, S. D. Gribble, ―Denali: Lightweight virtual machines for distributed and networked applications‖, Tech. rep. (Feb. 08 2002).
[15] IBM, ―IBM systems virtualization‖, version 2 release 1, http://publib.boulder.ibm.com/infocenter/eserver/v1r2/topic /eicay/eicay.pdf (2005).
[16] Calheiros RN, Buyya R, De Rose CAF, ―Building an automated and self-configurable emulation testbed for grid applications‖, Software: Practice and Experience, April 2010; Vol. 40(5), Pp. 405–429.
[17] Asma ben letaifa, Amed haji, Maha Jebalia, Sami Tabbane, ―State of the Art and Research Challenges of new services architecture technologies: Virtualization, SOA and Cloud Computing‖, International Journal of Grid and Distributed Computing 3(4), December 2010, 69-88.
[18] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, ―Xen and the art of virtualization‖, In SOSP ’03: Proceedings of the nineteenth ACM symposium on operating systems principles (New York, NY, USA, 2003), ACM Press, pp. 164–177.
[19] IBM Virtual Infrastructure Access Service Product. https://www935.ibm.com/services/au/gts/pdf/end03005usen.pdf.
[20] B. Siddhisena, Lakmal Wruasawithana, Mithila Mendis, ―Next generation muti tenant virtualization cloud computing platform‖, In: Proceedings of 13th International conference on advanced communication technology(ICACT), vol. 12, no.3; 2011. p.405–10.
Citation
Aaqib Rashid, Amit Chaturvedi, "Virtualization and its Role in Cloud Computing Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1131-1136, 2019.
New Approaches for Stock Index Prediction Using Artifical Neural Networks
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1137-1141, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11371141
Abstract
Stock index prediction is a continually evolving field. Prediction is used for technical and fundamental analysis by both short term traders and long terms investors. There are a multitude of theories and methodologies that exist in the area of stock index prediction. These range from older time-series econometric models to newer Artificial Neural Network (ANN) models. The scope and applicability of ANN is widening rapidly with newer and powerful architectures being proposed in the past few years. Significant amount of work has been done using ANN for stock index prediction, but most of it is done on a class of network architecture called Multi Layered Perceptron (MLP). In this work, we make use of two relatively newer ANN architectures – Long-Short Term Memory (LSTM) and Convolutional Neural Network (CNN) for stock index prediction. We find that these two models offer better forecast accuracy compared to the MLP model for the chosen stock index.
Key-Words / Index Term
Stock index prediction, MLP, LSTM, CNN
References
[1] Mizono, H., Kosaka, M., Yajma, H., and Komoda, N. (1998). “Application of Neural Network to Technical Anaysis of Stock Market Prediction”, Studies in Informatics and Control, Vol.7, No.3, pp.1l1-120
[2] Majumder, M., and Hussian, M.D.A.(2009). “Forecasting Of Indian Stock Market Index Using Artificial Neural Network”, National Stock Exchange of India Limited
[3] Naeini, M.P., Taremian, H., and Hashemi, H.B. (2010). “Stock Market Value Prediction Using Neural Network”, CISIM, pp: 132 - 136
[4] Neenwi, S., Asagba, P.O., Kabari, L.G. (2013). “Predicting the Nigerian Stock Market Using Artificial Neural Network”, European Journal of Computer Science and Information, Vol I , No.1, pp.30-39
[5] Kar, A. (2013). “Stock Prediction using Artificial Neural Network”, Dept. of Computer Science and Engineering, IIT Kanpur
[6] Wanjawa, B.W., and Muchemi, L (2014). “ANN Model to Predict Stock Prices at Stock Exchange Markets”, Xiv:1502.06434
Citation
Navin S. Patel, Y.T. Krishne Gowda, "New Approaches for Stock Index Prediction Using Artifical Neural Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1137-1141, 2019.
Personalized Android Application for Food Identification and Calorie Count Visualization
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1142-1147, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11421147
Abstract
Regular measurement and maintenance of calorie count of body is very essential and important for healthy living. Calorie count of body changes with change occurring in weight and height measurement. High body calories is a way to many diseases and disorders. Proper calorie count and nutritional value can be maintained by intake of healthy food. Keeping the knowledge of calories and nutritional value of each food item is a difficult task. Use of the emerging and rapidly growing smart phone technology for health maintenance can proved to be a great combination with outstanding results. The paper describes the system developed for food identification and calorie recognition, which also shows whether the given fruits and vegetables are fresh or not. Users can use the system with the help of developed android application on their smart phones. The system is trained and tested on the set of different food images to calculate its efficiency and accuracy. The results obtained proved that the system is accurate in recognizing the food item and showing its calorie contents. Also, the android application set the BMI value and depending on that give the daily calorie limit, which can be maintained by consuming the healthy food.
Key-Words / Index Term
Calorie Count, Segmentation, Feature Extraction, Classification, Health Monitoring
References
[1] Haotian Jiang, Jammes Starkman, Menghan Liu, and Ming-Chun Huang “Food Nutrition Visualization on Google Glass”, IEEE Consumer Electronics Magazine, pp. 21-31, May 2018.
[2] Ridho Rahman Hariadi, Wijayanti Nurul Khotimah, Eko Adhi Wiyono, “Design and Implementation of Food Nutrition Information System using SURF and FatSecret API”, pp. 181-183.
[3] Arnel B. Ocay, Jane M. Fernandez, Thelma D. Palaoag, “NutriTrack: Android-based Food Recognition App for Nutrition Awareness”, 3rd IEEE International Conference on Computer and Communications, pp.2099-2104, 2017.
[4] S. Jasmine Minija, W.R. Sam Emmanuel, “Food image Classification using Sphere Shaped-Support Vector Machine”, Proceedings of the International Conference on Inventive Computing and Informatics (ICICI 2017) IEEE Xplore Compliant - Part Number: CFP17L34-ART, ISBN: 978-1-5386-4031-9, pp. 109-113.
[5] Diptee Kumbhar, Prof. Sarita Patil, “Mobile Cloud based System Recognizing Nutrition and Freshness of Food Image”, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017), pp. 709-714.
[6] Dr. Anne Moorhead, Dr Raymond Bond, Dr Huri Zheng, “Smart Food: Crowdsourcing of experts in nutrition and non-experts in identifying calories of meals using smartphone as a potential tool contributing to obesity prevention and management”, IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 1777-1779, 2015.
[7] Agapito G., Calabrese B., Guzzi P. H., Cannataro M., Simeoni M., Car´e I., Lamprinoudi T., Fuiano G., Pujia A., “DIETOS: a recommender system for adaptive diet monitoring and personalized food Suggestion”, Fourth International IEEE Workshop on e-Health Pervasive Wireless Applications and Services, 2016.
[8] Haik Kalantarian, Nabil Alshurafa, Majid Sarrafzadeh, “A Wearable Nutrition Monitoring System”, 11th International Conference on Wearable and Implantable Body Sensor Networks, pp.75-80, 2014.
[9] Yoshiyuki kawano, Keiji yanai, “Real-time Mobile Food Recognition System”, IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2013.
[10] Lili Pan, Samira Pouyanfar, Hao Chen, Jiaohua Qin, Shu-Ching Chen, “DeepFood: Automatic Multi-Class Classification ofFood Ingredients Using Deep Learning”, IEEE 3rd International Conference on Collaboration and Internet Computing, pp.181-189, 2017.
[11] Muhammad Farooq, Edward Sazonov, “Feature Extraction Using Deep Learning for Food Type Recognition”, Springer International Publishing AG, I. Rojas and F. Ortuño (Eds.): IWBBIO, Part I, pp.464–472, 2017.
Citation
Rutuja Rewane, P. M. Chouragade, "Personalized Android Application for Food Identification and Calorie Count Visualization," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1142-1147, 2019.
Visual Cryptography Identity Specification Scheme
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1148-1152, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11481152
Abstract
This paper focuses on the use of visual cryptography for the unique identification of user where different schemes like visual secret sharing schemes, halftone schemes, etc are used. The scheme uses users identifying data to be split into meaningful and meaningless shares. These shares can further be used by merging two shares and reveal the original data content. For additional security of data content, we can use different types of encryption techniques to hide the data content and the same can be retrieved by using the decryption method. The user is identified by the data content hidden in the two shares. One share of the data content can be put on the server side and the second share is at users end. At the time evaluation, one share is shown to the user at the server side and can be matched by the user with given second share of the data content.
Key-Words / Index Term
Visual secret sharing (VSS), Visual cryptography (VC), Random grid (RG), Visual cryptography visual secret sharing (VCVSS), Random grid Visual secret sharing (RGVSS)
References
[1] Y.C. Hou, S.C. Wei, and C.Y. Lin, “Random- Grid based Visual Cryptography Schemes”, IEEE Transactions on Circuits and Systems for Video Technology, VOL. 24, NO. 5, May 2014.
[2] R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998.
[3] M. Naor and A. Shamir, “Visual cryptography,” in Proc. Adv. Cryptology-EUROCRYPT’94, LNCS 950, 1995, pp. 1–12.
[4] S. K Joseph, R. Ramesh , “Random Grid based Visual Cryptography using a common share”, 2015 Intl. Conference on Computing and Network Communications (CoCoNet`15), Dec. 16-19, 2015, Trivandrum, India.
[5] T. Chen and K. Tsao, “User-friendly random-grid-based visual secret sharing”, IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1693-1703, Nov. 2011.
[6] X. Wu and W. Sun, “Generalized Random Grid and Its Applications in Visual Cryptography”, IEEE Transactions On Information Forensics And Security, vol. 8, NO. 9, September 2013.
[7] http://bookboon.com/en/visual-cryptography-and-itsapplicationsebook.
[8] Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone Visual Cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453, Aug. 2006.
[9] S. Pahuja, S. Kasana, “Halftone Visual Cryptography For Color Images”,International Conference on Computer, Communications and Electronics (Comptelix) Manipal University Jaipur, Malaviya National Institute of Technology Jaipur & IRISWORLD, July 01-02, 2017.
[10] T. H. Chen and K. H. Tsao, “Threshold visual secret sharing by random grids,” J. Syst. Softw., vol. 84, no. 7, pp. 1197–1208, 2011.
Citation
Anmol S. Budhewar, Shubhanand S. Hatkar, "Visual Cryptography Identity Specification Scheme," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1148-1152, 2019.
E-Health Diagnosis System using IoT and Machine Learning
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1153-1162, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11531162
Abstract
IOT is the induced structure foundation of openness, transportation and advancement. IOT sharp contraptions can understand the work environments of remote thriving viewing and additionally crisis see structure. It has clear utilization of sharp therapeutic organizations framework. In the human organizations structure the featured techniques and systems that assistance to the masters and investigators and specialists who make stunning contraption which is the up-degree to the present improvement. Undoubtedly, even information mining strategies and ML tally expect a basic work around there. The specialists vivifying their experts work to make programming with the assistance of AI check which can help aces with taking choice concerning both gauge and diagnosing of coronary sickness. The genuine objective of this examination paper is envisioning the coronary disease of a patient using ML estimations and web of web of things.
Key-Words / Index Term
Blood pressure sensor, ESP8266 Wi-Fi module, Health monitoring systems, Heartbeat sensor, Internet of Things(IoT), Machine learning, Smart devices, Temperature sensor
References
[1] Secured Smart Healthcare Monitoring System Based on Iot, International Journal on Recent and Innovation Trends in Computing and Communication Volume: 3 Issue: 7, Bhoomika.B.K, Dr. K N Muralidhara
[2] Real time wireless health monitoring application using mobile devices, International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015, Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-ElNour, and Mohammed Tarique
[3] Oana Frunza.et.al, “A Machine Learning Approach For Identifying Disease-Treatment Relations In Short Texts”, May 2011
[4] In Ms. Shinde Sayali P.1 , Ms. Phalle Vaibhavi N. 2, “ A Survey Paper on Internet of Things based Healthcare System”,4 january 2017
[5] Ahmed Abdulkadir Ibrahim*, Wang Zhuopeng **, ”IOT Patient Health Monitoring Patient”, ISSN : 2248-9622, Vol. 8, Issue 1, ( Part -III) January 2018, pp.77-80
[6] Pravin Shinde RVIOT Kharghar Navi Mumbai. Prof.Sanjay Jadhav Saraswati College Of Engineering, Kharghar Navi Mumbai,“ Health Ananlysis using Machine Learning”, Pravin Shinde et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 3928-3933
[7] Sanjay Kumar Sen Asst. Professor, Computer Science & Engg. Orissa Engineering College, Bhubaneswar, Odisha – India. ,”Predicting and Diagnosing of Heart Disease Using Machine Learning Algorithms” International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 6 June 2017, Page No. 21623-21631 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i6.14
[8] Zeroday. "A lua based firmware for ifi-soc esp8266". Github. Retrieved 2 April 2015.
[9] Hari Wiguna. "NodeMCU LUA Firmware". Hackaday. Retrieved 2 April 2015.
[10] Jumpup to:a b Systems, Espressif. "Espressif Systems". Espressif-WikiDevi. Retrieved 3 June2017.
[11] Brian Benchoff. "A DEV BOARD FOR THEESPLUA INTERPRETER". Hackaday. Retrieved 2 April 2015.
[12] Mpx. "Lua CJSON is a fast JSON encoding/parsing module for Lua". Github. Retrieved 2 April 2015.
[13] Pellepl. "Wear-leveled SPI flash file system for embedded devices". GitHub. Retrieved 2 April 2015.
[14] Domingos P and Pazzani M. “Beyond Independence: Conditions for the Optimality of the SimpleBayesian Classifier”, in Proceedings of the 13th Conference on Machine Learning, Bari, Italy, pp105-112,1996.
[15] Elkan C. “Naive Bayesian Learning, Technical Report CS97-557”, Department of Computer Scienceand Engineering, University of California, San Diego, USA, 1997.
[16] B.L DeekshatuluaPriti Chandra “Reader, PG Dept. Of Computer Application North Orissa University,Baripada, Odisha – India. “Empirical Evaluation of Classifiers’ Performance Using Data Mining Algorithm”International Journal of Computer Trends and Technology (IJCTT) – Volume 21 Number 3 – Mar 2015ISSN: 2231-2803 http://www.ijcttjournal.org Page 146
[17] Elkan C. Magical Thinking in Data Mining: Lessons FromCoIL Challenge 2000, Department ofComputer Science and Engineering, University of California, San Diego, USA, 2001.
[18] Witten I and Frank E. Data Mining: Practical Machine Learning Tools and Techniques with Java,Morgan Kauffman Publishers, California, USA, 1999.
[19] Michael W.Berryet.al,”Lecture notes in data mining”,World Scientific(2006)
[20] Sanjay Kumar Sen,Asst. Professor, Computer Science & Engg.,Orissa Engineering College, Bhubaneswar, Odisha – India.”Predicting and Diagnosing of Heart Disease Using Machine Learning Algorithms” International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 6 June 2017, Page No. 21623-21631
Citation
Parth Patel, Harshil Shah, Hiren V. Mer, "E-Health Diagnosis System using IoT and Machine Learning," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1153-1162, 2019.
Content Based Alternate Medicine Recommendation By Using Random Forest Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1163-1168, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11631168
Abstract
This paper explores the application of the random forest algorithm for the alternate medicine recommendation. In this work the users able to search alternate medicine for their particular prescribed medicine. The main aim of the proposed system is to provide the users with alternate recommendation of medicines based on their content and shows the medicines as per ascending order of cost. It also has a facility to users to provide ratings for a particular medicine. Proposed System Architecture for content-based systems, one needs to assess the similarity of any many distinct medicines. If there exists a sufficient textual description for each medicine, this can be achieved via random forest algorithm. However, a user`s input medicine must contain all contain of medicine otherwise no similarity measuring can be performed.
Key-Words / Index Term
Cost and Content Based Recommendation, Random Forest, Healthcare, Alternate Medicine
References
[1] Naoki Shino, Ryosuke Yamanishi, Junichi Fukmoto, “Recommendation System For Alternative-ingredients Based On Co-occurrence Relation On Recipe Database And The Ingredient Category”, 5th International Congress On Advanced Applied Informatics, IEEE, 2016.
[2] Weiwei Lin, Ziming Wu, Longxin Lin, Angzhan Wen, And Jin Li, “An Ensemble Random Forest Algorithm For Insurance Big Data Analysis”, Recent Advances In Computational Intelligence Paradigms For Security And Privacy For Fog And Mobile Edge Computing, IEEE, 5th July 2017.
[3] Leslie Wilson, Fatema A. Turkistani, Wei Huang, Dang M. Tran, Tracy Kuo Lin, “The Impact Of Alternative Pricing Methods For Drugs In California Workers’ Compensation System: Fee-schedule Pricing”, May 2018.
[4] Torgyn Shaikhinaa, Dave Loweb, Sunil Dagad, David Briggsc, Robert Higginse, Natasha Khovanovaa, “Decision Tree And Random Forest Models For Outcome Prediction Inantibody Incompatible Kidney Transplantation”, Biomedical Signal Processing and Control, Elsevier, 2017.
[5] Shyong (Tony) K. Lam John Riedl. “Shilling Recommender Systems for Fun and Profit”, Group Lens Research Computer Science and Engineering University of Minnesota Minneapolis, 2004.
[6] Bradley N. Miller, “Toward a Personal Recommender System”, Workshop: Beyond Personalization 2005 IUI’05, San Diego, California, USA, 9th January, 2005.
[7] Deepti Sisodiaa, Dilip Singh Sisodiab, “Prediction of Diabetes using Classification Algorithms” Procedia Computer Science, Published by Elsevier, Vol. 132 pp.1578-1585, 2018.
[8] Braun L, Tiralongo E, Wilkinson J, Spitzer O, Bailey M, Poole S, Dooley M., “Perceptions, use and attitudes of pharmacy customers on complementary medicines and pharmacy practice"e”. BMC Complement Alternate Medicine 2010.
[9] MacLennan A., Myers S., Taylor A., “The continuing use of complementary and alternative medicine in South Australia: costs and beliefs in 2004”, Med J Aust., Vol.184:5, 2006.
[10] Xue CCL, Zhang AL, Lin V., Da Costa C., Story DF, “Complementary and alternative medicine use in Australia: a national population-based survey”. Journal of Alternate Complement Med. 13: pp. 643-650, 2007.
[11] Braun L “Integrative Pharmacy: threat or fantasy”, J Compl Med., 8: pp. 41-42, 2009.
[12] Semple S. J., Hotham E., Rao D., Martin K., Smith C. A., Bloustien G. F. “Community pharmacists in Australia: barriers to information provision on complementary and alternative medicines”. Pharm World Sci. 28: pp. 366-373, 2006.
[13] J. Pradeep Kandhasamy, S. Balamurali, “Performance Analysis of Classifier Models to Predict Diabetes Mellitus”, Procedia Computer Science, Published by Elsevier, pp. 45-51, 2015.
[14] Soudabeh Khodambashi, Alexander Perry, Oystein Nytro, “Comparing User Experiences on the Search-based and Content-based Recommendation Ranking on Stroke Clinical Guidelines - A Case Study” Procedia Computer Science, Published by Elsevier, pp. 260-267, 2015.
[15] Kourosh Modarresi, “Recommendation System Based on Complete Personalization” Procedia Computer Science, Published by Elsevier, Vol. 80, pp. 2190-2204, 2016.
[16] Rubal, Dinesh Kumar, “Evolving Differential evolution method with random forest for prediction of Air Pollution” ” Procedia Computer Science, Published by Elsevier, Vol. 132, pp. 824–833, 2018.
[17] Mo Hai, You Zhangc, Yuejin Zhanga “A Performance Evaluation of Classification Algorithms for Big Data” Procedia Computer Science, Published by Elsevier Vol.122 pp. 1100-1107, 2017.
[18] Charu Kathuria, Deepti Mehrotra, Navnit Kumar Misra, “Predicting the protein structure using random forest approach” Procedia Computer Science, Published by Elsevier Vol.132, pp. 1654–1662, 2018.
[19] Meenu Shukla, Sanjiv Sharma “Analysis of Efficient Classification Algorithm for Detection of Phishing Site” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.136-141, June 2017.
[20] J.V.N. Lakshmi, Ananthi Sheshasaayee “A Big Data Analytical Approach for Analyzing Temperature Dataset using Machine Learning Techniques” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.92-97, June 2017.
Citation
Ankita D. Rewade, Sudhir W. Mohod, Sharad P. Bargat, "Content Based Alternate Medicine Recommendation By Using Random Forest Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1163-1168, 2019.
A Survey of Essential Methods in Deep Learning for Big Data
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.1169-1180, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11691180
Abstract
Big data has become an essential technology as many publicand private organizations have continuously collecteda vast amount of information regarding medical informatics, marketing, cyber security, fraud detection, and national intelligence. Deep learning is one of the remarkable machine learning techniques to find abstract patterns in Big data. Deep learning has achieved great success in variousbig data applications such as speech recognition, text understanding, and image analysis. In the field of data science, big data analytics and deep learning have become two highly focused research areas. Deep learning algorithm learns the multi-level representations and features of data in hierarchical structures through supervised and unsupervised strategies for the classification and pattern recognition tasks. In the last decade, deep learning has played a crucial role in providing the solutions for big data analytic problems. This paper provides a comprehensive survey of deep learning in Big data with the comparison of conventional deep learning methods, research challenges, and countermeasures. It also presents the deep learning methods, comparison of deep learning architectures, and deep learning approaches. Furthermore, this survey discusses the application-focused deep learning works in Big data. Finally, this work points out the challenges in big data deep learning and provide several future directions.
Key-Words / Index Term
Big Data, Deep learning, Big data analytics, Machine learning, Deep learning architectures, and Challenges
References
[1] Gheisari, Mehdi, Guojun Wang, and MdZakirulAlamBhuiyan, “A Survey on Deep Learning in Big Data”, IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), Vol.2, pp.173-180, 2017
[2] BengioYoshua, “Deep learning of representations: Looking forward”, In International Conference on Statistical Language and Speech Processing, Springer, pp.1-37, 2013
[3] Yu Dong, and Li Deng, “Deep learning and its applications to signal and information processing”, IEEE Signal Processing Magazine, Vol.28, No.1, pp.145-154, 2011
[4] Hinton Geoffrey E., Simon Osindero, and Yee-WhyeTeh, “A fast learning algorithm for deep belief nets”, Neural computation, Vol.18, No.7, pp.1527-1554, 2006
[5] BengioYoshua, Pascal Lamblin, Dan Popovici, and Hugo Larochelle, “Greedy layer-wise training of deep networks”, In Advances in neural information processing systems, pp.153-160, 2007
[6] Hinton Geoffrey E, “Training products of experts by minimizing contrastive divergence”, Neural computation, Vol.14, No.8, pp.1771-1800, 2002
[7] Hinton, Geoffrey, and RuslanSalakhutdinov, “Discovering binary codes for documents by learning deep generative models”, Topics in Cognitive Science, Vol.3, No.1, pp.74-91, 2011
[8] SalakhutdinovRuslan, and Geoffrey Hinton, “Semantic hashing”, International Journal of Approximate Reasoning, Vol.50, No.7, pp.969-978, 2009
[9] RanzatoMarc`Aurelio, and Martin Szummer, “Semi-supervised learning of compact document representations with deep networks”, ACM Proceedings of the 25th international conference on Machine learning, pp.792-799, 2008
[10] Mikolov Tomas, Kai Chen, Greg Corrado, and Jeffrey Dean, “Efficient estimation of word representations in vector space”, arXiv preprint arXiv:1301.3781, 2013
[11] Krizhevsky Alex, IlyaSutskever, and Geoffrey E. Hinton, “Imagenet classification with deep convolutional neural networks”, In Advances in neural information processing systems, pp.1097-1105, 2012
[12] Le, Quoc V, “Building high-level features using large scale unsupervised learning”, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.8595-8598, 2013
[13] Socher Richard, Cliff C. Lin, Chris Manning, and Andrew Y. Ng, “Parsing natural scenes and natural language with recursive neural networks”, In Proceedings of the 28th international conference on machine learning (ICML-11), pp.129-136, 2011
[14] Kumar Ranjitha, Jerry O. Talton, Salman Ahmad, and Scott R. Klemmer, “Data-driven Web Design”, In ICML, 2012
[15] Chen, Xue-Wen, and Xiaotong Lin, “Big data deep learning: challenges and perspectives”, IEEE access, Vol.2, pp.514-525, 2014
[16] Raina, Rajat, AnandMadhavan, and Andrew Y. Ng, “Large-scale deep unsupervised learning using graphics processors”, ACM Proceedings of the 26th annual international conference on machine learning, pp.873-880, 2009
[17] Schmidhuber Jürgen, “Deep learning in neural networks: An overview”, Neural networks, Vol.61, pp.85-117, 2015
[18] BengioYoshua, “Learning deep architectures for AI”, Foundations and trends® in Machine Learning, Vol.2, No.1, pp.1-127, 2009
[19] Deng Li, “Three classes of deep learning architectures and their applications: a tutorial survey”, APSIPA transactions on signal and information processing, 2012
[20] Deng, Li, Dong Yu, and John Platt, “Scalable stacking and learning for building deep architectures”, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2133-2136, 2012
[21] Hutchinson, Brian, Li Deng, and Dong Yu, “Tensor deep stacking networks”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.35, No.8, pp.1944-1957, 2013
[22] X. Glorot, A. Bordes, and Y. Bengio, “Domain adaptation for large-scale sentiment classification: A deep learning approach,” in Proceedings of International Conference on Machine Learning (ICML), pp.513–520, 2011
[23] Srivastava, Nitish, and Ruslan R. Salakhutdinov, “Multimodal learning with deep boltzmann machines”, In Advances in neural information processing systems, pp.2222-2230, 2012
[24] LeCun, Yann, “Learning invariant feature hierarchies”, In Computer vision–ECCV 2012. Workshops and demonstrations, Springer, pp.496-505, 2012
[25] Zhou, Hongming, Guang-Bin Huang, Zhiping Lin, Han Wang, and Yeng Chai Soh. “Stacked extreme learning machines”, IEEE transactions on cybernetics, Vol.45, No.9 pp.2013-2025, 2015
[26] Zhang, Qingchen, Laurence T. Yang, and Zhikui Chen, “Deep computation model for unsupervised feature learning on big data”, IEEE Transactions on Services Computing, Vol.9, No.1, pp.161-171, 2016
[27] Najafabadi, Maryam M., FlavioVillanustre, Taghi M. Khoshgoftaar, NaeemSeliya, Randall Wald, and EdinMuharemagic, “Deep learning applications and challenges in big data analytics”, Journal of Big Data, Vol.2, No.1, p.1, 2015
[28] R. Weng, J. Lu, Y. Tan, J. Zhou, “Learning cascaded deep auto-encoder networks for face alignment”, IEEE Transactions on Multimedia, Vol.18, No.10, pp.2066–2078, 2016
[29] M. Sun, X. Zhang, H.V. Hmme, T.F. Zheng, “Unseen noise estimation using separable deep auto encoder for speech enhancement”, IEEE/ACM Transactions on Audio, Speech, and Language Processing, Vol.24, No.1, pp.93–104, 2016
[30] Jie, Niu, Bu Xiongzhu, Li Zhong, and Wang Yao, “An Improved Bilinear Deep Belief Network Algorithm for Image Classification”, IEEE Tenth International Conference on Computational Intelligence and Security (CIS), pp.189-192, 2014
[31] Huang, Wenhao, Guojie Song, Haikun Hong, and KunqingXie, “Deep architecture for traffic flow prediction: deep belief networks with multitask learning”, IEEE Transactions on Intelligent Transportation Systems, Vol.15, No.5, pp.2191-2201, 2014
[32] Deng Li, and Dong Yu, “Deep convex net: A scalable architecture for speech pattern classification”, In Twelfth Annual Conference of the International Speech Communication Association, 2011
[33] Indiveri, Giacomo, and Shih-Chii Liu, “Memory and information processing in neuromorphic systems”, Proceedings of the IEEE, Vol.103, No.8, pp.1379-1397, 2015
[34] Liao Bin, JungangXu, Jintao Lv, and Shilong Zhou, “An image retrieval method for binary images based on DBN and softmax classifier”, IETE Technical Review, Vol.32, No.4, pp.294-303, 2015
[35] OquabMaxime, Leon Bottou, Ivan Laptev, and Josef Sivic, “Learning and transferring mid-level image representations using convolutional neural networks”, In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.1717-1724, 2014
[36] X. Liu, J. Gao, X. He, L. Deng, K. Duh, and Y.-Y. Wang, “Representation learning using multi-task deep neural networks for semantic classification and information retrieval,” in Proc. of Conference of North American Chapter of Association for Computational Linguistics (NAACL), 2015
[37] Maggiori, Emmanuel, YuliyaTarabalka, Guillaume Charpiat, and Pierre Alliez, “Convolutional neural networks for large-scale remote-sensing image classification”, IEEE Transactions on Geoscience and Remote Sensing, Vol.55, No.2, pp.645-657, 2017
[38] Han, Yoonchang, Jaehun Kim, Kyogu Lee, Yoonchang Han, Jaehun Kim, and Kyogu Lee, “Deep convolutional neural networks for predominant instrument recognition in polyphonic music”, IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP), Vol.25, No.1, pp.208-221, 2017
[39] Boureau Y-Lan, Jean Ponce, and YannLeCun, “A theoretical analysis of feature pooling in visual recognition”, In Proceedings of the 27th international conference on machine learning (ICML-10), pp.111-118, 2010
[40] Boureau Y-Lan, Nicolas Le Roux, Francis Bach, Jean Ponce, and YannLeCun, “Ask the locals: multi-way local pooling for image recognition”, IEEE International Conference onn Computer Vision (ICCV), ,pp.2651-2658, 2011
[41] JiaYangqing, Chang Huang, and Trevor Darrell, “Beyond spatial pyramids: Receptive field learning for pooled image features”, IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.3370-3377, 2012
[42] Sermanet Pierre, SoumithChintala, and YannLeCun, “Convolutional neural networks applied to house numbers digit classification”, IEEE 21st International Conference on Pattern Recognition (ICPR), pp.3288-3291, 2012
[43] Zeiler, Matthew D., and Rob Fergus, “Stochastic pooling for regularization of deep convolutional neural networks”, arXiv preprint arXiv:1301.3557, 2013
[44] Chien Jen-Tzung, and Yuan-Chu Ku, “Bayesian recurrent neural network for language modeling”, IEEE transactions on neural networks and learning systems, Vol.27, No.2, pp.361-374, 2016
[45] Lu Xiaoqiang, Yaxiong Chen, and Xuelong Li, “Hierarchical recurrent neural hashing for image retrieval with hierarchical convolutional features”, IEEE Transactions on Image Processing, Vol.27, No.1, pp.106-120, 2018
[46] Lipton, Zachary C., David C. Kale, Charles Elkan, and Randall Wetzell, “Learning to diagnose with LSTM recurrent neural networks”, arXiv preprint arXiv:1511.03677, 2015
[47] Pham Trang, Truyen Tran, DinhPhung, and SvethaVenkatesh, “Deepcare: A deep dynamic memory model for predictive medicine”, In Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer, pp.30-41, 2016
[48] Lee Honglak, Peter Pham, Yan Largman, and Andrew Y. Ng, “Unsupervised feature learning for audio classification using convolutional deep belief networks”, In Advances in neural information processing systems, pp.1096-1104, 2009
[49] Hu Fan, Gui-Song Xia, Jingwen Hu, and Liangpei Zhang, “Transferring deep convolutional neural networks for the scene classification of high-resolution remote sensing imagery”, Remote Sensing, Vol.7, No.11, pp.14680-14707, 2015
[50] Kim In-Jung, and XiaohuiXie, “Handwritten Hangul recognition using deep convolutional neural networks”, International Journal on Document Analysis and Recognition (IJDAR), Vol.18, No.1, pp.1-13, 2015
[51] Manor Ran, and Amir B. Geva, “Convolutional neural network for multi-category rapid serial visual presentation BCI”, Frontiers in computational neuroscience, Vol.9, 2015
[52] Dong Chao, Chen Change Loy, Kaiming He, and Xiaoou Tang, “Image super-resolution using deep convolutional networks”, IEEE transactions on pattern analysis and machine intelligence, Vol.38, No.2, pp.295-307, 2016
[53] Lane Nicholas D., and PetkoGeorgiev, “Can deep learning revolutionize mobile sensing?”, ACM Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, pp.117-122, 2015
[54] Nguyen Anh, Jason Yosinski, and Jeff Clune, “Deep neural networks are easily fooled: High confidence predictions for unrecognizable images”, In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.427-436, 2015
[55] Kelley Richard, Liesl Wigand, Brian Hamilton, Katie Browne, Monica Nicolescu, and MirceaNicolescu, “Deep networks for predicting human intent with respect to objects”, In Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction, pp.171-172, 2012
[56] Chen Xiangyu, YanwuXu, Damon Wing Kee Wong, Tien Yin Wong, and Jiang Liu, “Glaucoma detection based on deep convolutional neural network”, In Engineering in Medicine and Biology Society (EMBC), 37th Annual International Conference of the IEEE, pp.715-718, 2015
[57] SutskeverIlya, OriolVinyals, and Quoc V. Le, “Sequence to sequence learning with neural networks”, In Advances in neural information processing systems, pp.3104-3112, 2014
[58] Socher Richard, YoshuaBengio, and Chris Manning, “Deep learning for NLP”, Tutorial at Association of Computational Logistics (ACL), and North American Chapter of the Association of Computational Linguistics (NAACL), 2013
[59] Wallach Izhar, Michael Dzamba, and Abraham Heifets, “AtomNet: a deep convolutional neural network for bioactivity prediction in structure-based drug discovery”, arXiv preprint arXiv:1510.02855, 2015
[60] Elkahky Ali Mamdouh, Yang Song, and Xiaodong He, “A multi-view deep learning approach for cross domain user modeling in recommendation systems”, In Proceedings of the 24th International Conference on World Wide Web, pp.278-288, 2015
[61] Liu Siqi, Sidong Liu, WeidongCai, Sonia Pujol, Ron Kikinis, and Dagan Feng, “Early diagnosis of Alzheimer`s disease with deep learning”, IEEE 11th International Symposium on Biomedical Imaging (ISBI), pp.1015-1018, 2014
[62] Miotto Riccardo, Li Li, Brian A. Kidd, and Joel T. Dudley, “Deep patient: An unsupervised representation to predict the future of patients from the electronic health records”, Scientific reports, Vol.6, p.26094, 2016
[63] Miotto Riccardo, Li Li, and Joel T. Dudley, “Deep Learning to predict patient future diseases from the electronic health records”, In European Conference on Information Retrieval, Springer, pp.768-774, 2016
[64] Deng Jun, Zixing Zhang, Erik Marchi, and Bjorn Schuller, “Sparse autoencoder-based feature transfer learning for speech emotion recognition”, IEEE Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII), pp.511-516, 2013
[65] Zhang Jie, Shiguang Shan, MeinaKan, and Xilin Chen, “Coarse-to-fine auto-encoder networks (CFAN) for real-time face alignment”, In European Conference on Computer Vision, Springer, pp.1-16, 2014
[66] KanMeina, Shiguang Shan, Hong Chang, and Xilin Chen, “Stacked progressive auto-encoders (spae) for face recognition across poses”, In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.1883-1890, 2014
[67] Esteva Andre, Brett Kuprel, Roberto A. Novoa, Justin Ko, Susan M. Swetter, Helen M. Blau, and Sebastian Thrun, “Dermatologist-level classification of skin cancer with deep neural networks”, Nature, Vol.542, No.7639, pp.115-118, 2017
[68] Koh Pang Wei, Emma Pierson, and AnshulKundaje, “Denoising genome-wide histone ChIP-seq with convolutional neural networks”, Bioinformatics, Vol.33, No.14, pp.i225-i233, 2017
[69] Li Jian, JianjiangFeng, and C-C. Jay Kuo, “Deep convolutional neural network for latent fingerprint enhancement”, Signal Processing: Image Communication, Vol.60, pp.52-63, 2018
[70] Tran Truyen, TuDinh Nguyen, DinhPhung, and SvethaVenkatesh, “Learning vector representation of medical objects via EMR-driven nonnegative restricted Boltzmann machines (eNRBM)”, Journal of biomedical informatics, Vol.54, pp.96-105, 2015
[71] GhahabiOmid, and Javier Hernando, “Restricted Boltzmann machines for vector representation of speech in speaker recognition”, Computer Speech & Language, Vol.47, pp.16-29, 2018
[72] Zhang Zhenhua, Qing He, Jing Gao, and Ming Ni, “A deep learning approach for detecting traffic accidents from social media data”, Transportation Research Part C: Emerging Technologies, Vol.86, pp.580-596, 2018
[73] Choi Edward, Mohammad TahaBahadori, Andy Schuetz, Walter F. Stewart, and Jimeng Sun, “Doctor ai: Predicting clinical events via recurrent neural networks”, In Machine Learning for Healthcare Conference, pp.301-318, 2016
[74] Wollmer Martin, Florian Eyben, Joseph Keshet, Alex Graves, Bjorn Schuller, and Gerhard Rigoll, “Robust discriminative keyword spotting for emotionally colored spontaneous speech using bidirectional LSTM networks”, IEEE International Conference on Acoustics, Speech and Signal Processing, pp.3949-3952, 2009
[75] Hammerla Nils Y., Shane Halloran, and Thomas Ploetz, “Deep, convolutional, and recurrent models for human activity recognition using wearables”, arXiv preprint arXiv:1604.08880, 2016
[76] Huang B. Q., Tarik Rashid, and M. T. Kechadi, “Multi-context recurrent neural network for time series applications”, International Journal of Computational Intelligence, Vol.3, No.1, pp.45-54, 2006
[77] Dean Jeffrey, Greg Corrado, RajatMonga, Kai Chen, Matthieu Devin, Mark Mao, Andrew Senior et al, “Large scale distributed deep networks”, In Advances in neural information processing systems, pp.1223-1231, 2012
[78] Heigold Georg, Vincent Vanhoucke, Alan Senior, Patrick Nguyen, Marc’AurelioRanzato, Matthieu Devin, and Jeffrey Dean, “Multilingual acoustic models using distributed deep neural networks”, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.8619-8623, 2013
[79] Coates Adam, Brody Huval, Tao Wang, David Wu, Bryan Catanzaro, and Ng Andrew, “Deep learning with COTS HPC systems”, In International Conference on Machine Learning, pp.1337-1345, 2013
[80] Weston Jason, FrédéricRatle, HosseinMobahi, and Ronan Collobert, “Deep learning via semi-supervised embedding”, In Neural Networks: Tricks of the Trade, Springer, pp.639-655, 2012
[81] Fergus Rob, Yair Weiss, and Antonio Torralba, “Semi-supervised learning in gigantic image collections”, In Advances in neural information processing systems, pp.522-530, 2009
[82] Vincent Pascal, Hugo Larochelle, YoshuaBengio, and Pierre-Antoine Manzagol, “Extracting and composing robust features with denoising autoencoders”, ACM Proceedings of the 25th international conference on Machine learning, pp.1096-1103, 2008
[83] Calandra Roberto, TapaniRaiko, Marc Peter Deisenroth, and Federico MontesinoPouzols, “Learning deep belief networks from non-stationary streams”, In International Conference on Artificial Neural Networks, Springer, pp.379-386, 2012
[84] Zhou Guanyu, KihyukSohn, and Honglak Lee, “Online incremental feature learning with denoising autoencoders”, In Artificial Intelligence and Statistics, pp.1453-1461, 2012
[85] Ouyang, Wanli, Xiao Chu, and Xiaogang Wang, “Multi-source deep learning for human pose estimation”, In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.2329-2336, 2014
[86] Zhao, Liang, Jiangzhuo Chen, Feng Chen, Wei Wang, Chang-Tien Lu, and NarenRamakrishnan, “Simnest: Social media nested epidemic simulation via online semi-supervised deep learning”, IEEE International Conference on Data Mining (ICDM), pp.639-648, 2015
[87] Chen Minmin, ZhixiangXu, Kilian Weinberger, and FeiSha, “Marginalized denoising autoencoders for domain adaptation”, arXiv preprint arXiv:1206.4683, 2012
[88] NgiamJiquan, AdityaKhosla, Mingyu Kim, Juhan Nam, Honglak Lee, and Andrew Y. Ng, “Multimodal deep learning”, In Proceedings of the 28th international conference on machine learning (ICML-11), pp.689-696, 2011
[89] Zhang Qingchen, Laurence T. Yang, and Zhikui Chen, “Privacy preserving deep computation model on cloud for big data feature learning”, IEEE Transactions on Computers, Vol.65, No.5, pp.1351-1362, 2016
[90] Yu, Lequan, Hao Chen, Qi Dou, Jing Qin, and Pheng Ann Heng, “Integrating Online and Offline Three-Dimensional Deep Learning for Automated Polyp Detection in Colonoscopy Videos”, IEEE journal of biomedical and health informatics, Vol.21, No.1, pp.65-75, 2017
[91] F. Bu, Z. Chen, Q. Zhang, “Incremental updating method for big data feature learning”, Computer Engineering and Applications, Vol.51, No.12, pp.21–26, 2015
[92] Chen Kai, and QiangHuo, “Scalable training of deep learning machines by incremental block training with intra-block parallel optimization and blockwise model-update filtering”, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5880-5884, 2016
[93] Shalev-ShwartzShai, “Online learning and online convex optimization”, Foundations and Trends® in Machine Learning, Vol.4, No.2, pp.107-194, 2012
[94] Bartlett Peter L, “Optimal Online Prediction in Adversarial Environments”, In Discovery Science, p.371, 2010
[95] Chien Jen-Tzung, and Hsin-Lung Hsieh, “Nonstationary source separation using sequential and variational Bayesian learning”, IEEE transactions on neural networks and learning systems, Vol.24, No.5, pp.681-694, 2013
[96] J.V.N. Lakshmi and Ananthi Sheshasaayee, “A Big Data Analytical
approach for Analyzing Temperature Dataset using Machine Learning Techniques”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.92-97, 2017
Citation
S.Umamageswari, M. Kannan, "A Survey of Essential Methods in Deep Learning for Big Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1169-1180, 2019.