A Survey on Cloud Security Issues
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.120-123, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.120123
Abstract
Everyone is moving from traditional services towards various cloud-based services at minimal cost. People are commonly using data storing and virtualization services because of their advantages. Increase in the use of these services is indeed increasing the challenges for its security in the cloud environment. Hence, security of cloud data and challenges related to it becomes the priority in the domain of cyber security. Many researchers have published different papers and have conducted different surveys related to security of cloud-based services, but researches show certain gap between cloud issue and their solution, few of them address data security issue and rest have virtualization problem. Here an effort is made to cover all factors related to security issue, and it has been derived properly and in clear way, which gives proper view of clouds security and challenges. Security of cloud platform is a major concern as the treats and attacks are increasing with advancement in the domain.
Key-Words / Index Term
Cloud Computing, Security, Virtualization, Cloud services
References
[1] Dean, Jeffery, S. Ghemawat, “Map Reduce Simplified Data Processing on Large Clusters”, OSDI, 2008.
[2] Chen, Deyan, and Hong Zhao, "Data security and privacy protection issues in cloud computing", In the Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Vol. 1, pp. 647-651, 2012.
[3] T. Chou, ”Security threats on cloud computing vulnerabilitie”, International Journal of Computer Science & Information Technology 5, no. 3 ,p: 79, 2013.
[4] S. Nuno, K. Gummadi, and R. Rodrigues. "Towards Trusted Cloud Computing." HotCloud 9, no. 9, p:3, 2009.
[5] S. Basu, A. Bardhan, K. Gupta, P. Saha, M. Pal, M. Bose, K. Basu, S. Chaudhury, and P. Sarkar, "Cloud computing security challenges & solutions-a survey", In the Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 347-356, 2018.
[6] Goyal, Sumit. "Public vs private vs hybrid vs community-cloud computing: a critical review." , International Journal of Computer Network and Information Security 6, no. 3, p: 20, 2014.
[7] J. Wayne, and T. Grance. "Guidelines on security and privacy in public cloud computing." , 2011.
[8] K. Hashizume, D. Rosado, E. Fernández-Medina, and E. B. Fernandez. "An analysis of security issues for cloud computing." Journal of internet services and applications 4, no. 1, p:5, 2013.
[9] Mahalakshmi, B., and G. Suseendran. "An Analysis of Cloud Computing Issues on Data Integrity, Privacy and Its Current Solutions." In Data Management, Analytics and Innovation, Springer, Singapore, pp. 467-482., 2019.
[10] W. Hanqian, Y. Ding, CH. Winer, and L. Yao, "Network security for virtual machine in cloud computing", In the Proceedings of the 2010 5th International Conference on Computer Sciences and Convergence Information Technology, Seoul, pp. 18-21.
[11] Q. Wang, C. Wang, L. Jin, R. Kui, and L. Wenjing. "Enabling public verifiability and data dynamics for storage security in cloud computing." In European symposium on research in computer security, Springer, Berlin, Heidelberg, pp. 355-370, 2009.
[12] Z. Kazi, and S. Vrbsky. "Security attacks and solutions in clouds." In Proceedings of the 2010 1st international conference on cloud computing, pp. 145-156.
[13] J. Sen, "Security and privacy issues in cloud computing." In Cloud Technology: Concepts, Methodologies, Tools, and Applications, IGI Global pp. 1585-1630., 2015.
[14] S. Aguru, and B.MadhavaRao “Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms” In International Journal of Scientific Research in Computer Science and Engineering, Vol.07, Issue.01, pp.6-9, 2019.
[15] Y. Patil, and P. Deshmukh “A Review: Mobile Cloud Computing: Its Challenges and Security” In International Journal of Scientific Research in Network Security and Communication, Vol.06, Issue.01, pp.11-13, 2018.
Citation
Foram Suthar, Samarat V.O. Khanna, Jignesh Patel, "A Survey on Cloud Security Issues," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.120-123, 2019.
A Survey on Diverse Vision and Varied Application Zone of BWT Algorithm
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.124-135, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.124135
Abstract
In the world of information, the data has to be stored in a large amount where the compression plays a vital role. Compression is beneficial because it reduces the resources required to store and transmit data. The paper discusses the different vision on BWT transformation algorithm, BWT works on data in memory and files too big to process in one go. The first section concentrates on complete Burrow Wheeler Transformation algorithm compression and decompression mechanism. This paper also examines the various Modification on BWT. The primary objective of this study is investigating the different approaches using BWT transformation. The comparison and performance analysis of second step algorithm in BWT is highlighted in this survey. Various Search algorithm using BWT is discussed briefly. A brief on recent work using this algorithm in different application Suffix Array, Suffix Sort on small space. Therefore this paper examines comparative analysis performance in compression ratio is carried out on various techniques.
Key-Words / Index Term
Move to Front, Frequency Count, Suffix Sort, Inversion Frequencies
References
[1] David Salomon, “Data Compression the Complete Reference” 3rd Edition, Spring Verlag, New York, pp.777, 2004
[2] Peter Fenwick, “Burrows–Wheeler compression: Principles and reflections“, Theoretical Computer Science 387 (2007) pp. 200–219, 2007 Elsevier.
[3] M. Burrows, D.J. Wheeler. A Block-sorting Lossless Data Compression Algorithm. DEC Systems Research Center Research Report 124, May 1994.
[4] Bernhard Balkenhol, Stefan Kurtz, Yuri M. Shtarkov, “Modifications of the Burrows and Wheeler Data Compression Algorithm”, In the Proceedings 1999 Data Compression Conference, IEEE Computer Society Washington, DC, USA pp.188-197, April 1999
[5] Sebastian Deorowicz, “Second step algorithms in the Burrows-Wheeler compression algorithm”, November 22, 2001, Journal of Software—Practice and Experience, 2002; 32(2): pp. 99–111, 2002
[6] Tim Bell1, Matt Powell1, Amar Mukherjee, Don Adjeroh, “Searching BWT compressed text with the Boyer-Moore algorithm and binary search”, Proceeding in 2002 Data compression Conference, Snowbird, UT, USA, pp. 112-121, 2002.
[7] Andrew Firth, Tim Bell, Amar Mukherjee, and Don Adjeroh “Ä comparison of BWT Approaches to String Patterns Matching”, Journal of Software-Practice and Experience, Volume 35, Issue 13, pp. 1217-1258,10 November 2005.
[8] N. Jesper Larssona, Kunihiko Sadakaneb,∗ “Faster suffix sorting”, Theoretical Computer Science 387 (2007) pp.258–272, 2007 Elsevier.
[9] Juha K¨arkk¨ainen∗,” Fast BWT in small space by blockwise suffix sorting “, Theoretical Computer Science 387 (2007) pp. 249–257, 2007 Elsevier
Citation
S.Ranjitha, L. Robert, "A Survey on Diverse Vision and Varied Application Zone of BWT Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.124-135, 2019.
Novel Smart Water Metering and Management System for Smart Cities
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.136-143, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.136143
Abstract
This paper presents a novel smart water management system which provides facility for water level control, water consumption prediction and water usage analysis in a cost-effective manner. The proposed system uses a NodeMCU Wi-Fi module to achieve wireless communication. A HC-SR04 Ultrasonic Ranging Module is used to detect the water levels and automate the pump operation, in coordination with DS18B20 waterproof temperature sensor probes to detect anomalies in water inflow and close off the water supply on assertion of undesirable water characteristics. The data provided by the system is processed via optimized machine learning and neural network algorithms to provide critical analytics to users.
Key-Words / Index Term
Water management, NodeMCU, HC-SR04, DS18B20, Firebase, Analytics, Data aggregation
References
[1]. S. Wadekar, V. Vakare, R. Prajapati, S. Yadav and V. Yadav, "Smart water management using IOT," 2016 5th International Conference on Wireless Networks and Embedded Systems (WECON), Rajpura, 2016, pp. 1-4.
[2]. P. Verma et al., "Towards an IoT based water management system for a campus," 2015 IEEE First International Smart Cities Conference (ISC2), Guadalajara, 2015, pp. 1-6.
[3]. B. N. Getu and H. A. Attia, "Automatic water level sensor and controller system," 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), Ras Al Khaimah, 2016, pp. 1-4.
[4]. Ocampo-Martinez, C.; Puig, V.; Cembrano, G.; Quevedo, J. “Application of predictive control strategies to the management of complex networks in the urban water cycle [Applications of Control]”. IEEE conference on Control Systems, (Volume:33, Issue: 1) Date of Publication: Feb. 2013 Page(s): 15 – 41 ISSN :1066-033X
[5]. J. A. Napieralski, "Statistical methods for data prediction," 2016 XII International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH), Lviv, 2016, pp. 120-123.
[6]. Verma, S., Prachi, “Wireless Sensor Network application for water quality monitoring in India”. Publisher IEEE. National conference on Computing Communication Systems (NCCCS), 2012 Date of Conference: 21-22 Nov. 2012.
[7]. Beza Negash Getu Hussain A. Attia "Remote Controlling of Light Intensity Using Phone Devices" Research Journal of Applied Sciences Engineering and Technology (RJASET) vol. 10 no. 10 pp. 1206-1215 2015.
[8]. Mantripatjit Kaur, Anjum Mohd Aslam, “Big Data Analytics on IOT: Challenges, Open Research Issues and Tools”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.81-85, 2018.
[9]. K. Parimala, G. Rajkumar, A. Ruba, S. Vijayalakshmi, "Challenges and Opportunities with Big Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.16-20, 2017
[10]. Yogita G. Patil, Pooja S. Deshmukh, "A Review: Mobile Cloud Computing: Its Challenges and Security", International Journal of Scientific Research in Network Security and Communication, Vol.06, Issue.01, pp.11-13, 2018
[11]. L. Shaikh, K. Sawlani, "A Rainfall Prediction Model Using Articial Neural Network", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.1, pp.24-28, 2017
Citation
Badari Nath K, Suhas Poornachandra, Tanmay S H, Yatish H R, Vishal Gowda, Venkatesh D N, "Novel Smart Water Metering and Management System for Smart Cities," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.136-143, 2019.
Induction Motor’s Health Diagnosis Based on Vibration Analysis
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.144-148, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.144148
Abstract
Induction motors are performing very critical roles in modern industries. Their reliable and efficient operation has great impact on performance of concerned industry. This work is intended to check feasibility for the use of micro electro mechanical accelerometers for the purpose of electric motor’s vibration signature analysis. Here Lab-VIEW software is used for analysis and user interface. Vibration signal of motor is observed for various speeds and speed is changed by SPWM technique. The complete assembly of MEMS (Micro Electro Mechanical Systems) accelerometer ADXL 203 and interfacing devices (PCI 6221 and BNC 2120) is also verified with standard vibration signal generating laboratory equipments. This experimental work has confirmed the resemblance of electrical and mechanical fault in induction motors in terms of observable change in motor vibrations.
Key-Words / Index Term
Vibration signature, MEMS, “g” scale, FFT, Accelerometer
References
[1] Steve Goldman, Vibration Spectra Analysis
[2] R. Keith Mobley, Vibration Fundamentals
[3] Vibration Analysis Handbook
[4] ADXL 203 Datasheet
[5] www.analog.com
[6] IS 11726
Citation
Viral R Avalani, Takshak V Rabari, "Induction Motor’s Health Diagnosis Based on Vibration Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.144-148, 2019.
Prediction of Heart Disease Using Machine Learning Algorithms
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.149-155, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.149155
Abstract
Heart-related disease or cardiovascular disease is the main reason for a huge number of deaths in the world. Machine learning techniques help health care professionals in the diagnosis of heart disease. This aims a better understanding and application of machine learning in the medical domain, an automated system in medical diagnosis would enhance medical efficiency and reduce costs. In order to decrease the number of deaths by heart diseases there have to be a quick and efficient detection technique, the use of multiple machine learning algorithms for heart disease, models based on supervised learning algorithms such as: Decision tree, Neural Networks, Logistic Regression, and then implement them to predict heart disease based on patients’ medical records. Find the accuracy of the models, Choose the best output with the highest accuracy. These machine learning algorithms and techniques have been applied to various medical data sets. The implementation of work is done on heart disease data set from the University of California Irvine (UCI) machine learning repository, it contains several instances and attributes. By using the data set we test on different machine learning techniques and predict the best model which is computationally efficient as well as accurate for the prediction of heart disease.
Key-Words / Index Term
Machine Learning, Supervised Learning, Classification Techiniques
References
[1] Sanjay Kumar Sen, “Predicting and Diagnosing of Heart Disease Using Machine Learning Algorithms”, International Journal of Engineering and Computer Science, ISSN: 2319-7242, Volume.6, Issue.6, June 2017, Page No. 21623-21631.
[2] Jaymin Patel, Prof. TejalUpadhyay, Dr. Samir Patel, “Heart disease prediction on using machine learning and data mining technique.”, IJCSC, Volume.7, Number.1, pp.129-137, 2016.
[3] Tülay Karayilan, izkan Kiliç, “Prediction of Heart Disease Using Neural Network”, IEEE, Vol.978, Issue.1, pp.5386-0930, 2017.
[4] Theresa Princy. R, J. Thomas, “Human Heart Disease Prediction System using Data Mining Techniques” 2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT] , Vol.978, Issue.1, pp.5090-1277, 2016 IEEE.
[5] Ashok Kumar Dwivedi, “Performance evaluation of different machine learning techniques for prediction of heart disease”, Springer, DOI 10.1007/s00521-016-2604-1. 2016.
[6] Akash Mukherjee, Raj Manjrekar, Ashish Marde, Prof. Rajesh Gaikwad, “Heart Disease Prediction Using Artificial Neural Networks”, IJSRD, National Conference on Technological Advancement and Automatization in Engineering, January 2016, ISSN: 2321-0613.
[7] A. Sankari karthiga, M. Safish Mary, M. Yogasini “Early Prediction of Heart Disease Using Decision Tree Algorithm” , International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST), Vol.3, Issue.3, March 2017.
[8] Avni Sharma, Deeksha Tyagi, Dr. Tarun Kumar Gupta, “Comparative Analysis of Machine Learning Techniques in Heart Disease Prediction by R Language”, IJSRD - International Journal for Scientific Research & Development|, Vol. 5, Issue 02, 2017.
Citation
Nukala V V Pravallika, P Suresh Varma, "Prediction of Heart Disease Using Machine Learning Algorithms," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.149-155, 2019.
Analyzing Cognitive Factor to Enhance Student Performance using Deep Learning Technique
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.156-160, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.156160
Abstract
Cognitive skills (CS) are the basic processing functions that enable to learn. These include attention, memory, auditory processing, visual processing, logic, and reasoning ability. It play a vital role in performance of any individual. Performance of students can be predicted by knowing the level of cognitive skill. The proposed method consists of three stages quantization, simulation and prediction. Finally, we analyzed the simulated data using deep learning algorithms. The learning algorithm Convolutional Neural Network (CNN) is used for our study. The proposed method is tested on the students` performance data sets in UCI repository. The results shows that CNN achieve higher accuracy than other the traditional approach.
Key-Words / Index Term
Cognitive skills, Study related characteristics, quantization, Deep learning algorithms, Convolutional Neural Network.
References
[1] Y. Wang, Y. Wang, S. Patel, and D. Patel, "A Layered reference model of the brain (LRMB)," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 124-133,2006.
[2] L.-F. Rodriguez, F. Ramos, and Y. Wang, "Cognitive computational models of emotions," in Proc. 2011 10th IEEE InternationalConference on the Cognitive Informatics & Cognitive Computing, 2011.
[3] O. AlZoubi, I. Koprinska, and R. A. Calvo, "Classification of braincomputer interface data," presented at the 7th Australasian Data Mining Conference, Glenelg, Australia, 2008.
[4] E. A. Patall, R. R. Steingut, A. C. Vasquez, S. S. Trimble, K. A. Pituch, and J. L. Freeman, ``Daily autonomy supporting or thwarting and students` motivation and engagement in the high school science classroom,`` J. Educ.Psychol., vol. 110, no. 2, pp. 269_288, 2017.
[5] J. Härkönen, F. Bernardi, and D. Boertien, ``Family dynamics and childoutcomes: An overview of research and open questions,`` Eur. J. Population, vol. 33, no. 2, pp. 163_184, 2017.
[6] S. Ahmad, K. Li, H. A. I. Eddine, and M. I. Khan, ``A biologically inspired cognitive skills measurement approach,`` Biol. Inspired Cogn. Archit.,vol. 24, pp. 35_46, Apr. 2018.
Nkambou, R., J. Bourdeau, et al. (2010). [7] Koedinger, K. and E. A. Mclaughlin (2010). Advances in Intelligent Tutoring Systems.
[8]Seeing language learning inside the math: Cognitive analysis yields transfer. the 32nd Annual Conference of the Cognitive Science Society. Austin, TX: 471- 476.
[9] Anderson, J. R. and B. J. Reiser (1985). "The LISP Tutor." Byte 10: 159-175.
[10] J. Xu, K. H. Moon, and M. van der Schaar, ``A machine learning approach for tracking and predicting student performance in degree programs,``
IEEE J. Sel. Topics Signal Process. vol. 11, no. 5, pp. 742_753, Aug. 2017.
[11] M. Pojon, ``Using machine learning to predict student performance,`` M.S. thesis, Fac. Natural Sci. Softw. Develop. Univ. Tampere, Tampere, Finland, 2017.
[12] Z. Iqbal, J. Qadir, A. N. Mian, and F. Kamiran. (2017). ``Machine learning based student grade prediction: A case study.`` [Online]. Available: https://arxiv.org/abs/1708.08744
[13] A. S. Lillard, M. D. Lerner, E. J. Hopkins, R. A. Dore, E. D. Smith, and C. M. Palmquist, ``The impact of pretend play on children`s development:
A review of the evidence,`` Psychol. Bull., vol. 139, no. 1, pp. 1_34, 2013.
[14] B. Y. Ohye et al., ``Three-generation model: A family systems framework for the assessment and treatment of veterans with posttraumatic stress disorder and related conditions,`` Prof. Psychol., Res. Pract., vol. 46, no. 2,
pp. 97_106, 2015.
[15] G. M. Fosco, M. J. Van Ryzin, A. M. Connell, and E. A. Stormshak, ``Preventing adolescent depression with the family check-up: Examining family con_ict as a mechanism of change,`` J. Family Psychol., vol. 30, no. 1, pp. 82_92, 2016.
[16] I. E. Livieris, K. Drakopoulou, and P. Pintelas, ``Predicting students` performance using arti_cial neural networks,`` in Proc. 8th PanHellenicConf. Int. Participation Inf. Commun. Technol. Edu., 2012, pp. 321_328.
[17] D. Dorner and J. Gerdes, "Motivation, emotion, intelligence," in Proc. the International Conference on Systems and Informatics, Yantai, 2012.
[18]Weka 3:Data Mining Software in Java, Machine Learning Group at the University of Waikato, Official Web: http://www.cs.waikato.ac.nz/ml/weka/index.html, accessed on 26th March 2016.
Citation
J.Suganya, T. Chakravarthy, "Analyzing Cognitive Factor to Enhance Student Performance using Deep Learning Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.156-160, 2019.
An Efficient Approach for Sentiment Analysis Using Regression Analysis Technique
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.161-165, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.161165
Abstract
Sentiment Analysis is one of the major areas in text analytics. It primarily focuses on the recognition and categorization of opinions. Sentiment analysis is the way by which we mine the reviews given by people on different events, products, movies and many more. People rely on the reviews provided by the users of the product before shopping. Likewise people depend on the reviews of a movie before watching it. In this work, we have shown how regression algorithm work on the sentiment analysis of movie reviews and we also which regression algorithm is better for sentiment analysis. The regression algorithm which we have implemented is Random Forest, Ridge, Linear and ElasticNet. The dataset which we used for sentiment analysis is based on movie reviews also known as IMDB dataset and the parameters which we have used for analysis is mean square error and R squared error. From the result, it can be easily concluded that regression analysis with the best accuracy can be considered as a benchmark for all the other algorithms.
Key-Words / Index Term
Sentiment Analysis, Regression, Naïve Bayes, Random forest, Features
References
[1] S. H. Huddleston and G. G. Brown, “Machine learning,” in Informs Analytics Body of Knowledge, 2018.
[2] P. H. Shahana and B. Omman, “Evaluation of features on sentimental analysis,” in Procedia Computer Science, 2015.
[3] R. Nair and A. Bhagat, “A Life Cycle on Processing Large Dataset - LCPL Rajit Nair,” vol. 179, no. 53, pp. 27–34, 2018.
[4] S. A. Alasadi and W. S. Bhaya, “Review of data preprocessing techniques in data mining,” J. Eng. Appl. Sci., 2017.
[5] H. Saif, M. Fernández, Y. He, and H. Alani, “On stopwords, filtering and data sparsity for sentiment analysis of Twitter,” in Proceedings of the 9th International Conference on Language Resources and Evaluation (LREC 2014), 2014.
[6] L. van der Maaten, E. Postma, and J. van den Herik, “Dimensionality Reduction: A Comparative Review,” 2009.
[7] M. Hall, “Correlation-based feature selection for machine learning,” Diss. Univ. Waikato, 1999.
[8] R. Dechter and J. Pearl, “Generalized best-first search strategies and the optimality af A*,” J. ACM, 2002.
[9] “Supervised learning,” in Springer Tracts in Advanced Robotics, 2010.
[10] D. Jurafsky and J. Martin, “Naive Bayes and Sentiment Classification,” Speech Lang. Process., 2017.
[11] C. Cortes and V. Vapnik, “Support-Vector Networks,” Mach. Learn., 1995.
[12] P. Cunningham and S. J. Delany, “k-Nearest Neighbour Classifiers,” Mult. Classif. Syst., 2007.
[13] S. R. Safavian and D. Landgrebe, “A Survey of Decision Tree Classifier Methodology,” IEEE Trans. Syst. Man Cybern., 1991.
[14] V. Svetnik, A. Liaw, C. Tong, J. Christopher Culberson, R. P. Sheridan, and B. P. Feuston, “Random Forest: A Classification and Regression Tool for Compound Classification and QSAR Modeling,” J. Chem. Inf. Comput. Sci., 2003.
[15] M. S. Neethu and R. Rajasree, “Sentiment analysis in twitter using machine learning techniques,” in 2013 4th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2013, 2013.
[16] A. Amolik, N. Jivane, M. Bhandari, and M. Venkatesan, “Twitter sentiment analysis of movie reviews using machine learning technique,” Int. J. Eng. Technol., 2016.
[17] P. Nagamma, H. R. Pruthvi, K. K. Nisha, and N. H. Shwetha, “An improved sentiment analysis of online movie reviews based on clustering for box-office prediction,” 2015.
[18] G. C. McDonald, “Ridge regression,” Wiley Interdiscip. Rev. Comput. Stat., 2009.
[19] D. J. Olive, Linear regression. 2017.
[20] C. Hans, “Elastic net regression modeling with the orthant normal prior,” J. Am. Stat. Assoc., 2011.
[21] M. D. Schluchter, “Mean Square Error,” in Wiley StatsRef: Statistics Reference Online, 2014.
[22] T. Chai and R. R. Draxler, “Root mean square error (RMSE) or mean absolute error (MAE)? -Arguments against avoiding RMSE in the literature,” Geosci. Model Dev., 2014.
[23] D. Demir, O. Kapralova, and H. Lai, “Predicting IMDB movie ratings using Google Trends,” Dept. Elect. Eng, Stanford Univ., Calif., 2012.
[24] M. Pilgrim, Dive into python 3. 2009.
Citation
Rajit Nair, Vaibhav Jain, Amit Bhagat, Ratish Agarwal, "An Efficient Approach for Sentiment Analysis Using Regression Analysis Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.161-165, 2019.
Reinforced Dynamic Clustering (RDC) for Optimal Selection of Cloud Packages
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.166-172, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.166172
Abstract
This paper presents the Reinforced Dynamic Clustering (RDC) for optimal selection of cloud packages which enable effective package allocation for users. This model operates on four major phases. The initial phase identifies the QoS requirements of customers and clusters them effectively. The second phase identifies the average QoS requirements based on each of the clusters. Decision Tree model is used to train on the data from the clusters and to predict packages that are most suitable for each of the clusters. The next phase handles the real-time resource requirements from the users and allocates packages. The final phase aggregates the user requirements, which are then used in the clustering phase to incorporate the latest user requirements. Experiments were performed with the access log data and comparisons were performed with state-of-the-art models. Results indicate highly effective performances of the proposed model.
Key-Words / Index Term
Resource provisioning, Cloud resource allocation, Clustering, Package Selection, Reinforcement
References
[1] Mustafa, S., Nazir, B., Hayat, A., & Madani, S. A., “Resource management in cloud computing: Taxonomy, prospects, and challenges”. Computers & Electrical Engineering, Vol. 47, pp. 186-203, 2015.
[2] Kirthica, S., & Sridhar, R., “Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud`s Elasticity”. International Journal of Intelligent Information Technologies (IJIIT), Vol. 14(2), pp.43-58, 2018.
[3] Kirthica, S., & Sridhar, R., “CIT: A cloud inter-operation toolkit to enhance elasticity and tolerate shut down of external clouds”. Journal of Network and Computer Applications, Vol. 85, pp. 32-46, 2017.
[4] Grozev, N., & Buyya, R., “Inter‐Cloud architectures and application brokering: taxonomy and survey”. Software: Practice and Experience, Vol. 44(3), pp. 369-390, 2014.
[5] Xiao, Z., Song, W., & Chen, Q., “Dynamic resource allocation using virtual machines for cloud computing environment”. IEEE transactions on parallel and distributed systems, Vol. 24(6), pp. 1107-1117, 2013.
[6] Kumar, M. R. V., & Raghunathan, S., “Heterogeneity and thermal aware adaptive heuristics for energy efficient consolidation of virtual machines in infrastructure clouds”. Journal of Computer and System Sciences, Vol. 82(2), pp.191-212, 2016.
[7] Kirthica, S., & Sridhar, R., “Horizontal scaling and aggregation across heterogeneous clouds for resource provisioning”. Computers & Electrical Engineering, Vol. 69, pp. 301-316, 2018.
[8] Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I. M.,& Ben-Yehuda, M., “The reservoir model and architecture for open federated cloud computing”. IBM Journal of Research and Development, Vol. 53(4), pp. 4-1, 2009.
[9] Petcu, D., Di Martino, B., Venticinque, S., Rak, M., Máhr, T., Lopez, G. E. & Stankovski, V., “Experiences in building a mOSAIC of clouds”. Journal of Cloud Computing: Advances, Systems and Applications, Vol. 2(1), 2013.
[10] Kirthica, S., & Sridhar, R., “A residue-based approach for resource provisioning by horizontal scaling across heterogeneous clouds”. International Journal of Approximate Reasoning, Vol. 101, pp. 88-106, 2018.
[11] R. Buyya, R. Ranjan, R.N. Calheiros, “InterCloud: utility-oriented federation of cloud computing environments for scaling of application services”, in: Algorithms and Architectures for Parallel Processing, Springer, pp.13–31, 2010.
[12] R.N. Calheiros, A.N. Toosi, C. Vecchiola, R. Buyya, “A coordinator for scaling elastic applications across multiple clouds”, Future Gener. Comput. Syst. Vol. 28(8) pp. 1350–1362, 2012.
[13] A.C. Marosi, G. Kecskemeti, A. Kertesz, P. Kacsuk, “FCM: an architecture for integrating IaaS cloud systems”, in: 2nd International Conference on Cloud Computing, GRIDs, and Virtualization, IARIA, pp.7–12, 2011.
[14] G. Kecskemeti, M. Maurer, I. Brandic, A. Kertesz, Z. Nemeth, S. Dustdar, “Facilitating self-adaptable inter-cloud management”, in: 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, IEEE, pp.575–582, 2012.
[15] A. Kertesz, G. Kecskemeti, M. Oriol, P. Kotcauer, S. Acs, M. Rodríguez, O. Mercè, A.C. Marosi, J. Marco, X. Franch, “Enhancing federated cloud management with an integrated service monitoring approach”, J. Grid Comput. Vol. 11(4) pp. 699–720, 2013.
[16] Calzarossa, M. C., Della Vedova, M. L., & Tessera, D., “A methodological framework for cloud resource provisioning and scheduling of data parallel applications under uncertainty”. Future Generation Computer Systems, Vol. 93, pp.212-223, 2019.
[17] R. Van den Bossche, K. Vanmechelen, J. Broeckhove, “Cost-optimal scheduling in hybrid IaaS clouds for deadline constrained workloads”, in: Proc. 2010 IEEE Int. Conf. on Cloud Computing (CLOUD), IEEE, pp. 228–235, 2010.
[18] A. Ruiz-Alvarez, I.K. Kim, M. Humphrey, “Toward optimal resource provisioning for cloud MapReduce and hybrid cloud applications”, in: Proc. of the IEEE 8th Int. Conf. on Cloud Computing, pp. 669–677, 2015.
[19] Hwang, E., & Kim, K. H., “Minimizing cost of virtual machines for deadline-constrained mapreduce applications in the cloud”. In Proceedings of the 2012 ACM/IEEE 13th International Conference on Grid Computing(pp. 130-138). IEEE Computer Society, 2012.
[20] K. Chen, J. Powers, S. Guo, F. Tian, “CRESP: Towards optimal resource provisioning for MapReduce computing in public clouds”, IEEE Trans. Parallel Distrib. Syst. Vol. 25 (6) pp. 1403–1412, 2014.
[21] Xu, X., Tang, M., & Tian, Y. C., “QoS-guaranteed resource provisioning for cloud-based MapReduce in dynamical environments”. Future Generation Computer Systems, Vol. 78, pp.18-30, 2018.
[22] Ralha, C. G., Mendes, A. H., Laranjeira, L. A., Araújo, A. P., & Melo, A. C., “Multiagent system for dynamic resource provisioning in cloud computing platforms”. Future Generation Computer Systems, Vol. 94, pp.80-96, 2019.
[23] Li, Z., Chu, T., Kolmanovsky, I. V., Yin, X., & Yin, X., “Cloud resource allocation for cloud-based automotive applications”. Mechatronics, Vol. 50, pp.356-365, 2018.
[24] C., Madhumathi, and Gopinath Ganapathy. "Cloud Package Selection for Academic Requirements using Multi Criteria Decision Making based Modified Ant Colony Optimization Technique." International Journal of Engineering and Technology (IJET) Vol. 8 pp. 1205-1211, 2016.
Citation
K Mani, R Mohana Krishnan, "Reinforced Dynamic Clustering (RDC) for Optimal Selection of Cloud Packages," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.166-172, 2019.
Big data Processing Comparison using Pig and Hive
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.173-178, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.173178
Abstract
Big data is not only about mammoth volume of data along with volume velocity i.e. data generating speed like more than a speed of cheetah and also verity of data like a verity of vegetables in market, which we cannot process using our traditional system, processing is nothing but storing and analyzing the generated huge amount of verity of streaming and non- streaming data. Around us each and every device generates huge amount of structured and unstructured data. From many years many devices and organizations generates the data, generated data is not used by organizations for many years, now a day’s organizations thinking of using the generated data for analysis and enhance the performance of organizations. Different data generation sources generate variety of data, i.e. Not of same in nature variety of data like structured whose features (fields) and features types are known, semi structured whose features types are unknown but features are known and unstructured whose features types and features are not known. To process big data Hadoop is developed by Benn cutting of yahoo later enhanced by google and amazon. Now amazon is number one company in the world because of analyzing the generated data. To process big data many tools and software frame work have been developed by many companies like Amazon, Google and Yahoo. Hadoop basically had two components like HDFS and Map Reduce one for storing and other one for processing, later stages YARN is added as recourse manager, before Yarn HDFS takes care of Recourse management which leads poor performance so YARN additional frame work added on top of Hadoop to manage recourse, along with Yarn later stages many other components like H-base-Hive, Sqoop are added to process only structured data and to process unstructured data. Pig and Flume are added to process unstructured data. Main work of Sqoop is to import and export structured data from database to Hadoop and vice versa. whereas flume is to import unstructured data generated from web server, twitter and face-book to Hadoop for analysis. The ecosystem of recent Hadoop are H-base, PIG, hive, Zoo-keeper, Oozie, flume, mahout machine learning tool and many more to make user friendly and to improve the performance of data analysis. Similar spark and flink are also competitors of hadoop spark which overcome limitations of Hadoop and flink which overcome the limitations of spark. In this we wanted to highlight the map- reduce applications for word-count bench mark examples, in our research we executed the bench mark word count program using pig and hive and achieved hive is much faster than PIG.
Key-Words / Index Term
Hadoop;Map-Reduce;Hive;Pig;wordcount;cloudxlab;flink;spark
References
[1] Jorge Veiga, Roberto R. Expósito et al. “Performance Evaluation of Big Data Frameworks for Large-Scale Data Analytics” 2016 IEEE International Conference on Big Data (Big Data)
[2] Md. Armanur Rahman 1 , J. Hossen “A Survey of Machine Learning Techniques for Self-tuning Hadoop Performance” International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 3, June 2018, pp. 1854-1862
[3] AmanLodha , “Hadoop’s Optimization Framework for Map Reduce Clusters “ Imperial Journal of Interdisciplinary Research (IJIR) Vol-3, Issue-4, 2017
[4] Dan Wang, JiangchuanLiu , “Optimizing Big Data Processing Performance in the Public Cloud: Opportunities and Approaches” IEEE Network • September/October 2015
[5] A. K. M. MahbubulHossen1, A. B. M. Moniruzzaman et. al. “Performance Evaluation of Hadoop and Oracle Platform for Distributed Parallel Processing in Big Data Environments” International Journal of Database Theory and Application Vol.8, No.5 (2015), pp.15-26
[6] ChangqingJi,Yu Li, WenmingQiu et.al. “Big Data Processing in Cloud Computing environments “International Symposium on Pervasive Systems, Algorithms and Networks. 2012
[7] Bogdan Ghiţet. al. “Towards an Optimized Big Data Processing System” 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, 2013
[8] Kyong-Ha Lee et. al. “Parallel Data Processing with Map Reduce: A Survey” SIGMOD Record, December 2011 (Vol. 40, No. 4)
[9] JaliyaEkanayake and Geoffrey Fox “High Performance Parallel Computing with Clouds and Cloud Technologies” International Conference on Cloud Computing, 2009 – Springer
[10] Ashlesha S. Nagdive et al, “Overview on Performance Testing Approach in Big Data“ International Journal of Advanced Research in Computer Science, 5 (8), Nov–Dec, 2014, pp165-169.
Citation
J. Santosh Kumar, B. K. Raghavendra, S. Raghavendra, "Big data Processing Comparison using Pig and Hive," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.173-178, 2019.
Secure SMS System for Android
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.179-183, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.179183
Abstract
Communication (from Latin communicare, meaning "to share") is the act of conveying messages from one entity or group to another through the use of mutually understood signs. It not only facilitates the process of sharing information and knowledge, but and also helps people to develop relationships with others. Security matters to people differently. However, it is always required. Same is with our shared information. The main purpose of this paper is to introduce security of the text messages that people share among them. In this paper, we are presenting Secure SMS System for Android users, thus providing an End-to-End Encryption (E2EE). RSA algorithm of Cryptography and a Key generation algorithm have been used. Whenever a message is sent, it is not sent as a plain text; rather it is encrypted using the public key of the receiver to get the cipher text, which is transmitted to the receiver. At the receiver side, that cipher text is decrypted using the private key of the receiver, to get the plain text, the actual message that is sent to him. This would prevent the third parties from interfering into the text messages shared. This implementation can then be used by people in general as well as all the intelligence agencies.
Key-Words / Index Term
Cryptography, Encryption, Key, Cipher text
References
[1] Delfs, Hans & Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications.
[2] Hacker Lexicon: What Is End-to-End Encryption?".WIRED. 2014-11-25.
[3] RIVEST, Ronald L.; SHAMIR, Adi; ADLEMAN, Len. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM; 1978; 21.2: 120-126.
[4] Johnson, J.; Kaliski, B. (February 2003). "Public-Key Cryptography Standards (PKCS) : RSA Cryptography Specifications Version 2.1.
[5] RIVEST, Ronald L.; SHAMIR, Adi; ADLEMAN, Len. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM; 1978; 21.2: 120-126.
[6] William Stallings, Network Security Essentials Application and standards, 4th edition published by Prentice Hall.
[7] Van Tilborg, Henk C.A. (2000). Fundamentals of Cryptology.
[8] Bellare, Mihir. "Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements".
[9] Katz, Jon; Lindell, Y. (2007). Introduction to Modern Cryptography.
[10] Pelzl & Paar (2010). Understanding Cryptography. Berlin: Springer-Verlag.
Citation
Lalit Kumar Gupta, Ananya Gupta, Akshay Singh, Abhishek Kumar, "Secure SMS System for Android," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.179-183, 2019.