Clustering as a Tool for Categorization of Unstructured Data
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.116-121, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.116121
Abstract
The volume of information untapped are locked up in huge volume of text documents (unstructured data) that could aid the economy, government, individuals and corporate organisation to improve on the state of life and develop better working system cannot be overemphasized, therefore the need to extract this information and give a structure that will facilitate its proper storage and access when required becomes so important. The target of this research is to explore Clustering as a Tool for Categorizing Unstructured Data (Text document). The K-Prototype Algorithm was applied for the purpose of clustering these unstructured data to give structure to it. There are two major phases involved in this: first is the pre-processing phase (Tokenization, Stemming, and Stop Word Removal) and secondly the clustering phase. The system built performed better as shown from the result, that it can be use to categorise text documents for proper and easy storage and accessibility.
Key-Words / Index Term
Unstructured data, Clustering, Categorisation, K-Prototype Algorithm, pre-processing
References
[1]. Chakraborty, Goutam, Murali Pagolu, and Satish Garla. Text mining and analysis: practical methods, examples, and case studies using SAS. SAS Institute, 2014.
[2]. Praveen, P., and B. Rama. "A k-means Clustering Algorithm on Numeric Data." International Journal of Pure and Applied Mathematics Vol.117, Issue.7, pp.157-164, 2017.
[3]. Jain, Anil K. "Data clustering: 50 years beyond k-means." In Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.3-4. Springer, Berlin, Heidelberg, 2008.
[4]. Bhambri, . M. A. & Gupta, D. An Analysis of Document Clustering Algorithm,in ICCCCT-10, IEEE 2010, pp.402-406, 2013.
[5]. Goswami, J. A comparative Study on clustering and classification Algorithms, International Journal of Scientific and Applied Science (IJSEAS) Vol.1, issue.1, June 2015 ISSN: 2395-3470 pp.170-177, 2015.
[6]. Fredrick, J. & Leonardo S. Data Clustering, its application and benefits, Semantic Scholar, 2017.
[7]. Clifton, Chris, Robert Cooley, and Jason Rennie. "Topcat: Data mining for topic identification in a text corpus." IEEE transactions on knowledge and data engineering Vol.16, Issue.8 pp.949-964, 2004.
[8]. Malik, Hassan H., and John R. Kender. "Clustering web images using association rules, interestingness measures, and hypergraph partitions." In Proceedings of the 6th international conference on Web engineering, pp.48-55, 2006.
[9]. Wang, J. & Karypis, G., Efficient Summarizing Transactions for Clustering, In Proceedings of the Fourth IEEE International Conference on Data Mining, 2014.
[10]. Beil, Florian, Martin Ester, and Xiaowei Xu. "Frequent term-based text clustering." In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.436-442. 2002.
[11]. Fung, Benjamin CM, Ke Wang, and Martin Ester. "Hierarchical document clustering using frequent itemsets." In Proceedings of the 2003 SIAM international conference on data mining, Society for Industrial and Applied Mathematics, pp.59-70. 2003.
[12]. Yu, Hwanjo, Duane Searsmith, Xiaolei Li, and Jiawei Han. "Scalable construction of topic directory with nonparametric closed termset mining." In Fourth IEEE International Conference on Data Mining (ICDM`04), pp. 563-566. IEEE, 2004.
[13]. Xiong, Hui, Michael Steinbach, Pang-Ning Tan, and Vipin Kumar. "HICAP: Hierarchical clustering with pattern preservation." In Proceedings of the 2004 SIAM International Conference on Data Mining, pp.279-290. Society for Industrial and Applied Mathematics, 2004.
[14]. Parsons, Lance, Ehtesham Haque, and Huan Liu. "Subspace clustering for high dimensional data: a review." Acm Sigkdd Explorations Newsletter Vol.6, Issue.1, pp.90-105, 2004.
[15]. Fore, Neil Koberlein. "A Contrast Pattern Based Clustering Algorithm for Categorical Data." 2010.
[16]. Osinski, Stanislaw, and Dawid Weiss. "A concept-driven algorithm for clustering search results." IEEE Intelligent Systems Vol.20, Issue.3, pp.48-54, 2005.
[17]. Oyegoke, Adekunle. "The constructive research approach in project management research." International Journal of Managing Projects in Business, Issue.4, pp.4573-595, 2011.
Citation
Ngor Gogo, E. O. Bennett, "Clustering as a Tool for Categorization of Unstructured Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.116-121, 2019.
Performance Evaluation of Machine Learning Classifiers for Epileptic Seizure Detection
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.122-129, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.122129
Abstract
Epilepsy is a neurological disorder in the human brain, which is characterized by chronic disorders and occurs at random to interrupt the normal function of the brain. The diagnosis and analysis of epileptic seizure is made with the help of Electroencephalography (EEG). In order to detect seizure, this study aims to construct an automatic seizure detection system to analyze epileptic EEG signals. The CHB-MIT Scalp EEG dataset is used for the experiment purpose. The Welch Fast Fourier Transform is applied to convert time-domain signals to frequency-domain. The statistical features are extracted from both time and frequency domains. The ANOVA based feature selection is used to select the most significant features. Data under-sampling and over-sampling techniques are used to balance the data. Eight machine learning algorithms, including Decision Tree, Extremely Randomized Decision Tree, Linear Discriminant Analysis, Quadratic Discriminant Analysis, Random Forest, Gradient Boosting, Multilayer Perceptron, and Stochastic Gradient Descent are used to classify the data. The highest result is recorded as 99.48% of accuracy, 99.79% of sensitivity, and 99.17% of specificity for the Extremely Randomized Decision Tree. The system might be a helpful tool for physicians to make a more reliable and objective analysis of a patient`s EEG records.
Key-Words / Index Term
Epilepsy, Electroencephalogram, Welch Fast Fourier Transform, Data Sampling techniques, Machine Learning Algorithms
References
[1]. Fisher, Robert S., Walter Van Emde Boas, Warren Blume, Christian Elger, Pierre Genton, Phillip Lee, and Jerome Engel Jr. "Epileptic seizures and epilepsy: definitions proposed by the International League Against Epilepsy (ILAE) and the International Bureau for Epilepsy (IBE)." Epilepsia 46, no. 4 (2005): 470-472.
[2]. Supriya, Siuly, Siuly Siuly, and Yanchun Zhang. "Automatic epilepsy detection from EEG introducing a new edge weight method in the complex network." Electronics Letters 52, no. 17 (2016): 1430-1432.
[3]. Fazel, Seena, Achim Wolf, Niklas Långström, Charles R. Newton, and Paul Lichtenstein. "Premature mortality in epilepsy and the role of psychiatric comorbidity: a total population study." The Lancet 382, no. 9905 (2013): 1646-1654.
[4]. Keusch, Gerald T., Joan Wilentz, and Arthur Kleinman. "Stigma and global health: developing a research agenda." The Lancet 367, no. 9509 (2006): 525-527.
[5]. Hirtz, D., D. J. Thurman, K. Gwinn-Hardy, M. Mohamed, A. R. Chaudhuri, and R. Zalutsky. "How common are the “common” neurologic disorders?." Neurology 68, no. 5 (2007): 326-337.
[6]. Sirven, Joseph I. "Epilepsy: a spectrum disorder." Cold Spring Harbor perspectives in medicine 5, no. 9 (2015): a022848.
[7]. Wu, Jimmy Ming-Tai, Meng-Hsiun Tsai, Chia-Te Hsu, Hsien-Chung Huang, and Hsiang-Chun Chen. "Intelligent Signal Classifier for Brain Epileptic EEG Based on Decision Tree, Multilayer Perceptron and Over-Sampling Approach." In Future of Information and Communication Conference, pp. 11-24. Springer, Cham, 2019.
[8]. Siuly, Siuly, Yan Li, and Yanchun Zhang. "EEG signal analysis and classification." IEEE Transactions on Neural Systems and Rehabilitaiton Engineering 11 (2016): 141-144.
[9]. Yoo, Jerald, and Muhammad Awais Bin Altaf. "Machine-based patient-specific seizure classification system." U.S. Patent 9,848,793, issued December 26, 2017.
[10]. Ayoubian, Lacoma, H. Lacoma, and J. Gotman. "Automatic seizure detection in SEEG using high frequency activities in wavelet domain." Medical engineering & physics 35, no. 3 (2013): 319-328.
[11]. Hopfengärtner, Rüdiger, Burkhard S. Kasper, Wolfgang Graf, Stephanie Gollwitzer, Gernot Kreiselmeyer, Hermann Stefan, and Hajo Hamer. "Automatic seizure detection in long-term scalp EEG using an adaptive thresholding technique: a validation study for clinical routine." Clinical Neurophysiology 125, no. 7 (2014): 1346-1352.
[12]. Hunyadi, Borbála, Marco Signoretto, Wim Van Paesschen, Johan AK Suykens, Sabine Van Huffel, and Maarten De Vos. "Incorporating structural information from the multichannel EEG improves patient-specific seizure detection." Clinical Neurophysiology 123, no. 12 (2012): 2352-2361.
[13]. Yoo, Jerald, Long Yan, Dina El-Damak, Muhammad Bin Altaf, Ali Shoeb, Hoi-Jun Yoo, and Anantha Chandrakasan. "An 8-channel scalable EEG acquisition SoC with fully integrated patient-specific seizure classification and recording processor." In 2012 IEEE International Solid-State Circuits Conference, pp. 292-294. IEEE, 2012.
[14]. Harpale, Varsha, and Vinayak Bairagi. "An adaptive method for feature selection and extraction for classification of epileptic EEG signal in significant states." Journal of King Saud University-Computer and Information Sciences (2018).
[15]. Fergus, Paul, A. Hussain, David Hignett, Dhiya Al-Jumeily, Khaled Abdel-Aziz, and Hani Hamdan. "A machine learning system for automated whole-brain seizure detection." Applied Computing and Informatics 12, no. 1 (2016): 70-89.
[16]. Shanir, PP Muhammed, Kashif Ahmad Khan, Yusuf Uzzaman Khan, Omar Farooq, and Hojjat Adeli. "Automatic seizure detection based on morphological features using one-dimensional local binary pattern on long-term EEG." Clinical EEG and neuroscience 49, no. 5 (2018): 351-362.
[17]. Orosco, Lorena, Agustina Garcés Correa, Pablo Diez, and Eric Laciar. "Patient non-specific algorithm for seizures detection in scalp EEG." Computers in biology and medicine 71 (2016): 128-134.
[18]. Chakrabarti, Satarupa, Aleena Swetapadma, Prasant Kumar Pattnaik, and Tina Samajdar. "Pediatric Seizure prediction from EEG signals based on unsupervised learning techniques using various distance measures." In 2017 1st International Conference on Electronics, Materials Engineering and Nano-Technology (IEMENTech), pp. 1-5. IEEE, 2017.
[19]. Hosseini, Mohammad-Parsa, Dario Pompili, Kost Elisevich, and Hamid Soltanian-Zadeh. "Random ensemble learning for EEG classification." Artificial intelligence in medicine 84 (2018): 146-158.
[20]. Shoeb, Ali Hossam. "Application of machine learning to epileptic seizure onset detection and treatment." PhD diss., Massachusetts Institute of Technology, 2009.
[21]. Chen, Lan-Lan, Jian Zhang, Jun-Zhong Zou, Chen-Jie Zhao, and Gui-Song Wang. "A framework on wavelet-based nonlinear features and extreme learning machine for epileptic seizure detection." Biomedical Signal Processing and Control 10 (2014): 1-10.
[22]. Welch, Peter. "The use of fast Fourier transform for the estimation of power spectra: a method based on time averaging over short, modified periodograms." IEEE Transactions on audio and electroacoustics 15, no. 2 (1967): 70-73.
[23]. Akhilesh Krishna, P. R., and Jency Andrews. "PSD computation using modified Welch algorithm." Int J Sci Res Eng Technol (IJSRET) 4, no. 9 (2015): 951-954.
[24]. Bennasar, Mohamed, Yulia Hicks, and Rossitza Setchi. "Feature selection using joint mutual information maximisation." Expert Systems with Applications 42, no. 22 (2015): 8520-8532.
[25]. Lee, Sang-Hong, and Joon S. Lim. "Minimum feature selection for epileptic seizure classification using wavelet-based feature extraction and a fuzzy neural network." Applied Mathematics & Information Sciences 8, no. 3 (2014): 1295.
[26]. Penny, W., and R. Henson. "Analysis of variance." Statistical parametric mapping: The analysis of functional brain images (2006): 166-177.
[27]. Chowdhury, Tanima Tasmin, Shaikh Anowarul Fattah, and Celia Shahnaz. "Classification of seizure and non-seizure activity in seizure patients using time-frequency domain processing of gamma band EEG signals." In 2017 4th International Conference on Advances in Electrical Engineering (ICAEE), pp. 537-540. IEEE, 2017.
[28]. Nuzzo, Regina. "Scientific method: statistical errors." Nature News 506, no. 7487 (2014): 150.
[29]. Al Shalabi, Luai, Zyad Shaaban, and Basel Kasasbeh. "Data mining: A preprocessing engine." Journal of Computer Science 2, no. 9 (2006): 735-739.
[30]. Patro, S., and Kishore Kumar Sahu. "Normalization: A preprocessing stage." arXiv preprint arXiv:1503.06462 (2015).
[31]. Liu, Alexander, Joydeep Ghosh, and Cheryl E. Martin. "Generative Oversampling for Mining Imbalanced Datasets." In DMIN, pp. 66-72. 2007.
[32]. Chawla, Nitesh V., Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. "SMOTE: synthetic minority over-sampling technique." Journal of artificial intelligence research 16 (2002): 321-357.
[33]. Breiman, Leo. Classification and regression trees. Routledge, 2017.
[34]. Geurts, Pierre, Damien Ernst, and Louis Wehenkel. "Extremely randomized trees." Machine learning 63, no. 1 (2006): 3-42.
[35]. Lotte, Fabien, Marco Congedo, Anatole Lécuyer, Fabrice Lamarche, and Bruno Arnaldi. "A review of classification algorithms for EEG-based brain–computer interfaces." Journal of neural engineering 4, no. 2 (2007): R1.
[36]. Deepika Mallampati, "An Efficient Spam Filtering using Supervised Machine Learning Techniques", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.33-37, 2018.
[37]. Kim, Kang Soo, Heung Ho Choi, Chang Soo Moon, and Chi Woong Mun. "Comparison of k-nearest neighbor, quadratic discriminant and linear discriminant analysis in classification of electromyogram signals based on the wrist-motion directions." Current applied physics 11, no. 3 (2011): 740-745.
[38]. Breiman, L. "Random forests machine learning. 45: 5–32." View Article PubMed/NCBI Google Scholar (2001).
[39]. Friedman, Jerome H. "Greedy function approximation: a gradient boosting machine." Annals of statistics (2001): 1189-1232.
[40]. Hauck, Trent. scikit-learn Cookbook. Packt Publishing Ltd, 2014.
[41]. Rohini M., Arsha P., "Detection of Microaneurysm using Machine Learning Techniques", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.3, pp.1-6, 2019
[42]. Chu, Hyunho, Chun Kee Chung, Woorim Jeong, and Kwang-Hyun Cho. "Predicting epileptic seizures from scalp EEG based on attractor state analysis." Computer methods and programs in biomedicine 143 (2017): 75-87.
[43]. Liang, Weixia, Haijun Pei, Qingling Cai, and Yonghua Wang. "Scalp EEG epileptogenic zone recognition and localization based on long-term recurrent convolutional network." Neurocomputing (2019).
[44]. Yuvaraj, Rajamanickam, John Thomas, Tilmann Kluge, and Justin Dauwels. "A deep Learning Scheme for Automatic Seizure Detection from Long-Term Scalp EEG." In 2018 52nd Asilomar Conference on Signals, Systems, and Computers, pp. 368-372. IEEE, 2018.
Citation
Mirwais Farahi, Doreswamy, "Performance Evaluation of Machine Learning Classifiers for Epileptic Seizure Detection," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.122-129, 2019.
Glowworm Swarm Optimization based Clustered on – Demand Load Balancing Scheme (GSO-COD-LBS) for Heterogeneous Mobile Ad hoc Networks
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.130-136, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.130136
Abstract
Obtaining quality of service (QoS) through several routing schemes attracts researchers in the field of MANETs. Optimized routing through energy aware load balanced schemes is plays a significant role in ensuring QoS as well as many real – time applications. In this phase of research work, Glowworm Swarm Optimization is used for performing clustering operation. An adaptive on – demand routing mechanism is also employed. Simulation settings are used for analyzing the performance of the GSO-COD-LBS with other routing protocols / solutions / schemes using the metrics packet delivery ratio, throughput, packets drop, overhead and delay. From the results that are obtained through simulations it is inferred that GSO-COD-LBS outperforms other existing routing protocols and our earlier proposed works.
Key-Words / Index Term
routing, load balancing, energy, QoS, MANET
References
[1]. Hui, Chenga, Shengxiang, Yangb, Xingwei, Wangc, 2012. Immigrants-enhanced multi-population genetic algorithms for dynamic shortest path routing problems in mobile ad hoc networks. Int. J. Appl. Artif. Intell. 26 (7), 673–695.
[2]. Hui, Chenga, Shengxiang, Yangb, Jiannong, Cao, 2013. Dynamic genetic algorithm for the dynamic load balanced clustering problem in mobile ad hoc networks. J. Expert Syst. Appl. 40 (4), 1381–1392.
[3]. Shengxiang, Yang, Hui, Cheng, Fang, Wang, 2010. Genetic algorithms with immigrants and memory schemes for dynamic shortest path routing problems in mobile ad hoc networks. J. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 40 (1), 52–63.
[4]. Bhaskar, Nandi, Subhabrata, Barman, Soumen, Paul, 2010. Genetic algorithm based optimization of clustering in ad hoc networks. Int. J. Comput. Sci. Inf. Secur. 7 (1), 165–169.
[5]. Bo, Peng, Lei, Li, 2012. A method for QoS multicast based on genetic simulated annealing algorithm. Int. J. Future Gener. Commun. Netw. 5 (1), 43–60.
[6]. Abin, Paul, Preetha, K.G., 2013. A cluster based leader election algorithm for MANETs. In: International Conference on Control Communication and Computing, pp. 496–499.
[7]. Ting, Lu, Jie, Zhu, 2013. Genetic algorithm for energy efficient QoS multicast routing. IEEE Commun. Lett. 17 (1), 31–34.
[8]. John, M., Shea, Joseph, P., Macker, 2013. Automatic selection of number of cluster in networks using relative Eigen value quality. In: Proceedings of IEEE Military Communication, pp. 131–136.
[9]. Samaneh, A.D., Jamshid, A., 2016. Toward cluster-based weighted compressive data aggregation in wireless sensor networks. Ad Hoc Netw. 36 (1), 368–385.
[10]. Syed Zohaib, H.Z., Aloul, F., Sagahyroon, A., Wassim, El-Hajj, 2013. Optimizing complex cluster formation in MANETs using SAT/ILP techniques. J. IEEE Sens. 13 (6), 2400–2412.
[11]. Peng, Zhao, Xinyu, Yang, Wei, Yu, Xinwen, FuXinyu, 2013. A loose-virtual-clustering-based routing for power heterogeneous MANETs. J. IEEE Trans. Veh. Technol. 62 (5), 2290–2302.
[12]. Ibukunola, A., Modupea, Oludayo, O., Olugbarab, Abiodun, Modupea, 2013. Minimizing energy consumption in wireless adhoc networks with meta heuristics. In: Proceeding of 4th International Conference on Ambient Systems, Networks and Technologies, vol. 19, pp. 106–115.
[13]. El Khawaga, Sally E., Saleh, Ahmed I., Ali, Hesham A., 2016. An administrative cluster-based cooperative caching (ACCC) strategy for mobile ad hoc networks. J. Netw. Comput. Appl. 69, 54–76.
[14]. Jabbar W.A., Ismail M., Nordin R., 2017.Energy and mobility conscious multipath routing scheme for route stability and load balancing in MANETs. Simulation Modelling Practice and Theory. 77, 245-271.
[15]. Ali H.A., Areed M.F., Elewely D.I., 2018. An on-demand power and load-aware multi-path node-disjoint source routing scheme implementation using NS-2 for mobile ad-hoc networks. Simulation Modelling Practice and Theory. 80, 50 – 65.
[16]. Aruna Devi P., Karthikeyan K., 2018, Bio Inspired Ant Colony Optimization Based NeighborNode Selection and Enhanced Ad Hoc on DemandDistance Vector to Defending Against Black HoleAttack by Malicious Nodes in Mobile AD HOC NetworksJournalofComputational and Theoretical Nanoscience. 15, 3011 – 3018.
[17]. Aruna Devi P., Karthikeyan K., 2019, Fuzzy Clustering and Constructive Relay-based Cooperative and Load Balanced Routing in MANET. Journal of Advanced Research in Dynamical and Control Systems. 11 (04), 1743 – 1753.
[18]. Aruna Devi P., Karthikeyan K., 2019, Grey Wolf Optimization based Clustered On – Demand Load Balancing Scheme (GWO-COD-LBS) for Heterogeneous Mobile Ad hoc Networks. International Journal of Computer Sciences and Engineering, 7(6), 641-649.
Citation
P. Aruna Devi, K. Karthikeyan, "Glowworm Swarm Optimization based Clustered on – Demand Load Balancing Scheme (GSO-COD-LBS) for Heterogeneous Mobile Ad hoc Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.130-136, 2019.
Identification of Accurate Classification Technique for Crime Investigation Using Ensemble Approach
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.137-143, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.137143
Abstract
Recently, it`s observed that the crime is increasing across the world very rapidly and some technique is required for analysis of the crime data. Analysis of the crime data can be done through data mining (DM). DM techniques are applied to crime data for predicting features that affect the high crime rate. Using the method of data mining on previously collected data for predicting the features responsible for the crime in a locality or area, the Police Department and the Crimes Record Bureau Police Department may take the required measures to reduce the likelihood of the crime. In the current work, a new machine learning ensemble algorithm is opted for predicting feature that affects a high crime rate. It helps the police and citizens to take necessary and required action in decreasing the crimes rate. The ensemble algorithm can predict more accurate and significant features with higher accuracy and efficiency.
Key-Words / Index Term
Crime investigation, Crime Prediction, Crime Prediction, Data Mining, Ensemble approach
References
[1] OdedMaimon, LiorRokach, “The Data Mining and Knowledge Discovery Handbook”, Springer 2005, Page 6
[2] Han, Jiawei et.al “Data Mining”, Second Edition, Page 285
[3] Mugdha Sharma, “Z-Crime: A Data Mining Tool for the Detection of Suspicious Criminal Activities based on the Decision Tree”, International Conference on Data Mining and Intelligent Computing, pp. 1-6, 2014
[4] Ehab Hamdy, Ammar Adl, Aboul Ella Hassanien, Osman Hegazy and Tai-Hoon Kim, “Criminal Act Detection and Identification Model”, Proceedings of 7 th International Conference on Advanced Communication and Networking, pp. 79-83, 2015
[5] Kaumalee Bogahawatte and Shalinda Adikari, “Intelligent Criminal Identification System”, Proceedings of 8th IEEE International Conference on Computer Science and Education, pp. 633-638, 2013.
[6] Jyoti Agarwal, Renuka Nagpal and Rajni Sehgal, “Crime Analysis using K-Means Clustering”, International Journal of Computer Applications, Vol. 83, No. 4, pp. 1-4, 2013.
[7] Prajakta Yerpude, Vaishnavi Gudur. “Predictive modelling of crime dataset using data mining”. In international journal of data mining & knowledge management process, vol.7, pp.43-58, 2017.
[8] Jeroen S. De Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros and Joost N. Kok, “Data Mining Approaches to Criminal Career Analysis”, Proceedings of 6 th IEEE International Conference on Data Mining, pp. 1-7, 2006.
[9] H. Chen, W. Chung, J.J. Xu, G. Wang, Y. Qin and M. Chau, “Crime Data Mining: a General Framework and Some Examples”, Computer, Vol. 37, No. 4, pp. 50-56, 2004.
[10] Sadhna shrama, sanjiv sharma, “ a compartive study of crime investigation using data mining approaches”, International Journal for Research in Applied Science & Engineering Technology,Vol.7,pp. 2073-2079,2019.
Citation
Sadhna sharma, Sanjiv sharma, "Identification of Accurate Classification Technique for Crime Investigation Using Ensemble Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.137-143, 2019.
Optimal Fault Tolerance Using Intuitionistic Fuzzy and Selection of Cluster Head in MANET
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.144-150, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.144150
Abstract
In recent years exploration of wireless devices with small in size and platforms based on processing mobile have bring great attention towards the ad hoc networks. These Ad hoc networks are generally consists of temporary links connected among the nodes. MANET is such a dynamic network which compromises many good qualities to handle the wireless communication devices which are roaming randomly. MANET holds certain restriction on them because of the energy, battery consumption, load management, etc. Due to the nodes mobility nature and the characteristic of error prone nature the wireless medium pretense a lot of confronts, together with recurrent route change and packet losses, in the way of conferencing the necessities of QoS. Such disputes amplify packet delay, reduces throughput and lesser network failure. The first phase adapts the behavior of ants to discover the route and the intuitionistic fuzzy estimation is used to find the direction for searching the optimal route and the fault occurred in the node or link is handled using the check point and fault manger. In nature MANET are logically realized as a set of clusters by grouping together nodes which are in close proximity with one another or through another wireless node. The nodes communicate to the base station directly for data transfer. But it is not efficient in mobile environment because of the energy restriction on each node. The second phase focuses on such issue by creating the cluster topology to group similar nodes by adapting intuitionistic fuzzy k means and electing the cluster heads using the evolutionary algorithms known as genetic algorithm. Then elected cluster head collects the data from other nodes within the cluster and aggregates the data packets for transferring it to the base station directly or by gateway or cluster heads of other clusters. The simulation model for each phase is deployed using MAT lab and the outcome of the result shows that in each phase the proposed techniques performs better than other existing techniques discussed in each phase due to their enhancement in the proposed techniques.
Key-Words / Index Term
Intuitionistic fuzzy, cluster head, optimal route
References
[1] Jayakumar, Geetha Gopinath G, Ad hoc mobile wireless networks routing protocols--a review. ,Journal of Computer Science, Source Volume: 3 Source Issue: 8, 2007.
[2] Narasimhan, B. and S.S. Baboo, 2009. A hop-by-hop congestion-aware routing protocol for heterogeneous mobile ad-hoc networks. Int. J. Comp. Sci. Inform. Security.
[3] Venkata subramanian, S. and N.P. Gopalan, 2009. A QoS-based robust multipath routing protocol for mobile adhoc networks. IACSIT Int. J. Eng. Technol., 1: 391-396.
[4] Fard, M.A.K., S. Karamizadeh and M. Aflaki, 2011. Enhancing congestion control to address link failure loss over mobile ad-hoc network. Int. J. Comput. Netw. Commun.
[5] Yi, J., A. Adnane, S. David and B. Parrein, 2011. Multipath optimized link state routing for mobile ad hoc networks. J. Ad Hoc Netw., 9: 28-47. DOI:10.1016/j.adhoc.2010.04.007.
[6] Liu, S. and J. Liu, 2010. Delay-aware multipath source routing protocol to providing QoS support for wireless ad hoc networks. Proceedings of the 12th IEEE International Conference on Communication Technology (ICCT), Nov. 11-14, IEEE Xplore Press, Nanjing, pp: 1340-1343, DOI:10.1109/ICCT.2010.5689050.
[7] C. Liu, C. Lee, L.ChunWang, "Distributed clustering algorithms for data gathering in wireless mobile sensor networks", Elsevier Sci. J. Parallel Distributed Computing., Vol.67, 2007, pp.l187 -1200
[8] W. Heinzelman, A. Chandrakasan and H. Balakrishnan., "An Application -Specific Protocol Architecture for Wireless Microsensor Networks", IEEE Trans. Wireless Communications, Vol. 1, No.4, October 2002, pp.660-670.
[9] W. Heinzelman, Application - Specific Protocol Architectures for Wireless Networks, Ph.D Thesis, Massachusetts Institute of Technology, June 2000.
[10] G. Smaragdakis, I. Matta, A. Bestavros, SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks, In Second International Workshop on Sensor and Actor Network Protocols and Applications (SANPA), 2004
[11] D. J. Baker and A. Ephremides. A Distributed Algorithm for Organizing Mobile Radio Telecommunication Network. In proceedings of the 2nd International Conference on Distributed Computer Systems, page 476 - 483, April 1981.
[12] D. J. Baker and A. Ephremides. The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm. IEEE Transactions on Communication, COM - 29 11:1694, 1701. November 1981.
[13] Ratish Agrawal, Dr. Mahesh Motwani, “Survey of Clustering Algorithm for Mobile Ad hoc Network”, IJCSE, Vol. 1 Issue 2, pp. 98-104, 2009
[14] M. Gerla and J. T. Tsai, “Multicluster, Mobile, Multimedia Radio Network. Wireless Network,” 1995
[15] R.S. Walse, G.D. Kurundkar, P. U. Bhalchandra, “A Review:
Design and development of Novel Techniques for clustering and classification of data” ,International Journal of Scientific Research in Computer Sciences and Engineering, Vol 06, Special Issue 01, pp 19-22, Jan 2018
[16] G. Abare, E. J. Garba, “A Proposed Model for Enhanced
Security against Key Reinstallation Attach on Wireless networks, International Journal of Scientific Research in Network Security and Communication- Vol 7, Issue 3, PP 21-27, June 2019
Citation
S.P. Swornambiga, "Optimal Fault Tolerance Using Intuitionistic Fuzzy and Selection of Cluster Head in MANET," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.144-150, 2019.
Simulation and Real-Time Implementation of MPPT Techniques for PV System using High Precision PV Emulator and dSPACE DS1202 MicroLabBox
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.151-162, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.151162
Abstract
The Maximum Power Point Tracking (MPPT) is a vital element in a Photovoltaic (PV) system to harvest maximum power from solar PV system. Therefore, it is of interest to us to develop a more effective and efficient system that can transfer maximum power to the load. Implementation of the new MPPT techniques such as Artificial Neural Network (ANN), Fuzzy Logic Control (FLC) and Cuckoo Search Algorithm (CSA) is carried out to identify the most efficient system and the results are compared with conventional Perturb and Observe (P&O) and are presented in this paper. The proposed models are simulated and obtained results are analyzed and compared with the conventional method using MATLAB/Simulink, while the real-time implementation of similar prototype is carried out using a novel dSPACE DS1202 MicroLabBox and highly accurate PV emulator. Further this paper also comprises the comparison of steady state accuracy of D.C. link voltage of proposed techniques i.e. ANN, FLC, CSA vis-a-vis conventional P&O using MATLAB/Simulink and dSPACE.
Key-Words / Index Term
PV, MPPT, dSPACE, CSA, FLC, ANN, P&O, AI
References
[1] H Taheri , S Taheri, “Two-Diode Model-Based Nonlinear MPPT Controller for PV Systems”, Canadian Journal of Electrical and Computer Engineering, Vol.40, Issue.2, pp. 74-82, 2017.
[2] S Titri, C Larbes, K Y Toumi, Benatchba K, “A new MPPT controller based on the Ant colony optimization algorithm for Photovoltaic systems under partial shading conditions”, Applied Soft Computing, Vol.58, pp. 465-479, 2017.
[3] A Gupta, P Kumar, R K Pachauri, Y K Chauhan, “Performance Analysis of Neural Network and Fuzzy Logic Based MPPT Techniques for Solar PV Systems”, Power India International Conference, IEEE,India, pp.1-6, 2014.
[4] M Uzunoglu, O C Onar, M S Alam, “Modeling, control and simulation of a PV/FC/UC based hybrid power generation system for stand-alone applications”, Renewable Energy, Vol.34, Issue.3, pp. 509–520, 2008.
[5] S M Azharuddina, M Vysakh, H V Thakur, B Nishant, T S Babu, K Muralidhar, D Paul, B Jacob, K Balasubramanian, N Rajasekar, “A near accurate solar PV emulator using dSPACE controller for real-time control”, International Conference on Applied Energy, United Kingdom, pp. 2640 – 2648, 2014.
[6]A M Noman, K E Addoweesh, H M Mashaly, “Simulation and dSPACE Hardware Implementation of the MPPT Techniques Using Buck Boost Converter”, Electrical and Computer Engineering, IEEE, Canada, pp. 4-7, 2014.
[7] M Killi, S Samanta, “Modified Perturb and Observe MPPT Algorithm for Drift Avoidance in Photovoltaic Systems”, IEEE Transactions on Industrial Electronics, Vol.62, Issue.9, pp. 5549-5559, 2015.
[8] Shimi S L, T Thakur, J Kumar, D Karanjkar, S Chatterji, V K Sharma, “Real Time Simulation of Artificial Intelligence (AI) based MPPT of a Photo-Voltaic Array using Dspace”, International Journal of Engineering Research and Applications, National Conference on Advances in Engineering and Technology, pp. 49-58, 2014,.
[9] H H Song, De TIAN, “Study on Hardware-in-the-Ioop-simulation of Wind Power Based on dSPACE”, Computational Intelligence and Natural Computing Proceedings (CINC),Second International Conference, IEEE, China, pp. 325-327, 2010.
[10] M Shehaba, A T Khader, M Betar, “A survey on applications and variants of the cuckoo search Algorithm”, Applied Soft Computing, Vol.61, pp.1041-1059, 2017.
[11] B R Peng, K C Ho , Y H Liu, “A novel and fast MPPT method suitable for both fast changing and partially shaded conditions”, IEEE Transactions on Industrial Electronics, Vol. 65, Issue.4, pp. 3240-3251, 2018.
[12] N Priyadarshi, A Anand, A K Sharma, F Azam, V K Singh, R K Sinha, “An Experimental Implementation and Testing of GA based Maximum Power Point Tracking for PV System under Varying Ambient Conditions Using dSPACE DS 1104 Controller”, International Journal of Renewable Energy Research, Vol.7, Issue. 1, pp. 255-265, 2017.
[13] A M Noman, K E Addoweesh, H M Mashaly, “ DSPACE Real-Time Implementation of MPPT-Based FLC Method”, International Journal of Photoenergy, Vol.2013, pp. 1-11, 2013.
[14] B Lahfaoui, S Zouggar, M L Elhafyani, A Benslimane, “Modeling Validation and MPPT Technique of Small Wind PMSG Turbines Using DSPACE Hardware”, Renewable and Sustainable Energy, 3rd International Conference (IRSEC), Morocco, pp.1-6, 2015 .
[15] N V Naik, S P Singh, “A Comparative Analytical Performance of F2DTC and PIDTC of Induction Motor Using DSPACE-1104”, IEEE Transactions on Industrial Electronics, Vol.62, Issue.12, pp. 7350-7359, 2015.
[16] M Abouzeid, V Sood, M Youssef, “A Comparative Study of a PV-MPPT grid-integrated system under Different Control Techniques”, Electrical Power and Energy, IEEE Conference (EPEC) , Canada, pp. 256-261, 2015.
[17] K Sundareswaran , V Vigneshkumar, P Sankar, S P Simon, P Nayak, S Palani, “Development of an Improved P&O Algorithm Assisted Through a Colony of Foraging Ants for MPPT in PV System”, IEEE Transactions on Industrial Informatics,Vol.12, Issue.1, pp. 187-200, 2016.
[18] U Patel, D Sahu, D Tirkey D, “Maximum Power Point Tracking Using Perturb & Observe Algorithm and Compare With another Algorithm”, International Journal of Digital Application & Contemporary research, Vol.2, Issue.2, pp.1-8, 2013.
[19] V C Kotak, P Tyagi, “DC To DC Converter in Maximum Power Point Tracker”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering,Vol.2, Issue.12, pp. 6115-6125, 2013.
[20] J M Kwon, W Y Choi, Bong-Hwan Kwon, “Cost-Effective Boost Converter with Reverse-Recovery Reduction and Power Factor Correction”, IEEE Transactions on Industrial Electronics, Vol.55, Issue.1, pp.471-473, 2008.
[21] M Killi, S Samanta, “Modified Perturb and Observe MPPT Algorithm for Drift Avoidance in Photovoltaic Systems”, IEEE Transactions on Industrial Electronics, Vol.62, Issue.9, pp. 5549-5559, 2015.
[22] Sandeep V, Bala Murali Krishna V, K K Namala,D N Rao, “Grid Connected Wind Power System driven by PMSG with MPPT Technique using Neural Network Compensator”, Energy Efficient Technologies for Sustainability (ICEETS),International Conference, IEEE, India, pp. 917-921, 2016.
[23] M Zainuri, M Radzi, A C Soh, N A Rahim, “Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc–dc converter”, IET Renew. Power Generation, Vol.8, Issue.2, pp. 183–194, 2014.
[24] X S Yang, S Deb, “Engineering Optimisation by Cuckoo Search”, Int. J. Mathematical Modelling and Numerical Optimisation, Vol.1, Issue.4, pp. 330-343, 2010.
[25] Srishti, “Technique Based on Cuckoo’s Search Algorithm for Exudates Detection in Diabetic Retinopathy”, Ophthalmology Research: An International Journal, Vol.2, Issue.1, pp. 43-54, 2014.
[26] A K Yadav, P Gaur, “Comparative analysis of modern control and AI-based control for maintaining constant ambient temperature”, World Review of Science, Technology and Sust. Development, Vol.10, Issue.1/2/3, pp. 56-77, 2013.
[27] K Sundareswaran, V Vigneshkumar, P Sankar, S P Simon, P S P Nayak, S Palani, “Development of an Improved P&O Algorithm Assisted Through a Colony of Foraging Ants for MPPT in PV System”, IEEE Transactions on Industrial Informatics, Vol.12, Issue.1, pp. 187-200, 2016.
[28] D Sharma, P Gaur P, A P Mittal, “Comparative Analysis of Hybrid GAPSO Optimization Technique With GA and PSO Methods for Cost Optimization of an Off-Grid Hybrid Energy System”, Journal of Energy Technology & Policy, Vol.1, Issue.1, pp. 106-114, 2014.
[29] P Sahw, P Gaur, “Photovoltaic Powered Centrifugal Water Pump”, International Journal of Electronic and Electrical Engineering, Vol.7, Issue.3, pp. 247-254, 2014.
[30] R Sharma, P Gaur, A P Mittal, “Design of two-layered fractional order fuzzy logic controllers applied to robotic manipulator with variable payload”, Applied Soft Computing, Vol.47, pp. 565–576, 2016.
[31] A K Singh, P Gaur, “Adaptive control for non-linear systems using Artificial Neural Network and its application applied on Inverted Pendulum”, Power Electronics (IICPE), International Conference, India, pp.1-8, 2010.
[32] O Cornelius C, A O Eze, “Development of an Optimized Intelligent Machine Learning Approach in Forex Trading Using Moving Average indicators”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.3, pp. 15-21, 2019.
[33] H K Soni, “Machine Learning – A New Paradigm of AI”, International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.3, pp. 31-32, 2019.
Citation
Srishti, Prerna Gaur, "Simulation and Real-Time Implementation of MPPT Techniques for PV System using High Precision PV Emulator and dSPACE DS1202 MicroLabBox," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.151-162, 2019.
Real-Time Internet of Things (IOT) Application Big Data Stream Graph Optimization Framework
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.163-167, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.163167
Abstract
Big Data and Internet of Things (IoT) are two popular technical terms in current IT industry. The computing of IoT applications data consumes more energy since it’s high velocity in real-time. The proposed methodology re-storm that addresses energy issues and response time of IoT applications data. It uses big data stream computing for re-storm against existing method storm. The ultimate goal of proposed system is to plan and develop complete strategies to improve the performance of BDSC Environment for IoT application datasets. The storm failed to address dynamic scheduling but re-storm deals with three different features, 1) Data stream graph optimization, 2) energy-efficient self-scheduling strategy, 3) Real-Time Data Stream Computing with Memory Level Dynamic Voltage and Frequency Scaling (DVFS). Proposed system handles different traffic arriving rate of streams and re-storm at multiple traffic levels for high energy efficiency, low response time. It deals at three levels, firstly, a mathematical model for high energy efficiency, low response time. Secondly, allocation of resources bearing in mind DVFS methods and existing effective optimal consolidation methods. Thirdly, online task allocation using hot swapping technique and streaming graph optimizing. Finally, the experimental results show that restorm has been improved the performance 30-40% against storm for real time data of IoT applications.
Key-Words / Index Term
Internet of Things, Big Data Stream Computing, Hadoop Distributed File System, Virtual Machine
References
[1]. Neumeyer, L. and B. Robbins (2010). S4 : Distributed Stream Computing Platform. IEEE Int. Conf. on Data Mining Workshops, Washington DC, pp. 170–177, USA.
[2]. Zhuravlev, S., J.C. Saez, S. Blagodurov, A. Fedorova and M. Pranaw (2013). Survey of Energy-Cognizant Scheduling Techniques, IEEE Trans. Parall. Distr. Syst., Vol. 24, No. 7, pp. 1447–1464.
[3]. Benkhelifa, E., M. Abdel-Maguid, S. Ewenike and D. Heatley (2014). The Internet of Things: The eco-system for sustainable growth. IEEE/ACS 11th Int. Conf. on Computer Systems and Applications, Doha, pp. 836-842, Qatar.
[4]. Sharifi, M., S. Shahrivari and H. Salimi (2013). PASTA: A Power-aware Solution to Scheduling of Precedence-constrained Tasks on Heterogeneous Computing Resources, J. Computing, Vol. 95, No. 1, pp. 67–88.
[5]. Shao, H., L. Rao, Z. Wang, X. Liu, Z. Wang and K. Ren. (2014). Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets, IEEE Trans. Parall. Distr. Syst., Vol. 25, No. 10, pp. 2659–2669.
[6]. Wang, J.H., D. Lai, Huang and W. Shi Zheng (2013). SVStream: a Support Vector- Based Algorithm for Clustering Data Streams, IEEE Trans. Knowl. Data Eng., Vol. 25, No. 6, pp. 1410–1424.
[7]. Daoud, M.I. and N. Kharma (2011). A hybrid heuristic-genetic algorithm for task scheduling in heterogeneous processor networks, J. Parall. Distr. Comput., Vol. 71, No. 11, pp. 1518–1531.
[8]. Liu, X., N. Iftikhar and X. Xie (2014). Survey of Real-Time Processing Systems for Big Data, 18th Int. Database Engineering and Applications Symposium, New York, pp. 356–361, USA.
[9]. Xu Y., K. Li, L. He and T. K. Truong (2013). A DAG Scheduling Scheme on Heterogeneous Computing Systems using Double Molecular Structure-Based Chemical Reaction Optimization, J. Parall. Distr. Comput., Vol. 73 No. 9, pp. 1306–1322.
Citation
Sharmila G., "Real-Time Internet of Things (IOT) Application Big Data Stream Graph Optimization Framework," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.163-167, 2019.
Straggler Problem –Tail Latancy in Distributed network
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.168-178, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.168178
Abstract
Distributed processing frameworks split a data intensive computation job into multiple smaller tasks, which are then executed in parallel on commodity clusters to achieve faster job completion. A natural consequence of such a parallel execution model is that slow running tasks, commonly called stragglers potentially delay overall job completion. Stragglers in general take more time to complete tasks than their peers. This could happen due to many reasons such as load imbalance, I/O blocks, garbage collections, hardware configuration etc. Straggler tasks continue to be a major hurdle in achieving faster completion of data intensive applications running on modern data-processing frameworks. The trouble with stragglers is that when parallel computations are followed by synchronizations such as reductions, this would cause all the parallel tasks to wait for others meaning that the parallel runtime is dominated by the slowest performing straggler. In a large-scale distributed system comprising a group of worker nodes, the stragglers` delay performance bottleneck, is caused by the unpredictable latency in waiting for slowest nodes (or stragglers) to finish their tasks. Such stragglers increase the average job duration by 52% in data clusters of Facebook and Bing even after these companies using state of the art straggler mitigation techniques[1]. This is because current mitigation techniques all involve an element of waiting and speculation. Existing straggler mitigation techniques are inefficient due to their reactive and replicative nature – they rely on a wait speculate- execute mechanism, thus leading to delayed straggler detection and inefficient resource utilization. Hence, full cloning of small jobs, avoiding waiting and speculation altogether is proposed in a system called as Dolly. Dolly utilizes extra resources due to replication.
Key-Words / Index Term
Distributed network, latency, straggler detection, data clusters, slowest performing straggler
References
[1] S. Venkataraman, A. Panda, M. J. Franklin, and I. Stoica, “The Power of Choice in Data-Aware Cluster Scheduling This paper is included in the Proceedings of the Operating Systems Design and Implementation .,” 2014.
[2] D. Ford et al., “Availability in Globally Distributed Storage Systems,” 9th USENIX Symp. Oper. Syst. Des. Implement., pp. 61–74, 2010.
[3] X. Tian, R. Han, L. Wang, J. Zhan, and G. Lu, “Latency critical big data computing in finance,” J. Financ. Data Sci., vol. 1, no. 1, pp. 33–41, 2015.
[4] J. Dean and S. Ghemawat, “Summary of Installed Capacity , Dependable Capacity , Power Generation and Consumption (2003-2016),” pp. 137–149, 2016.
[5] J. Dean and L. A. Barroso, “The tail at scale,” Commun. ACM, vol. 56, no. 2, p. 74, 2013.
[6] W. D. Gray and D. A. Boehm-Davis, “Milliseconds matter: An introduction to microstrategies and to their use in describing and predicting interactive behavior,” J. Exp. Psychol. Appl., vol. 6, no. 4, pp. 322–335, 2000.
[7] M. Kambadur, T. Moseley, R. Hank, and M. A. Kim, “Measuring interference between live datacenter applications,” Int. Conf. High Perform. Comput. Networking, Storage Anal. SC, no. 3, 2012.
[8] G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica, “Effective Straggler Mitigation: Attack of the Clones,” Nsdi, p. 185, 2013.
[9] G. Ananthanarayanan et al., “Reining in the Outliers in Map-Reduce Clusters using Mantri,” Time, pp. 265–278, 2010.
[10] E. Krevat, J. Tucek, and G. R. Ganger, “Disks are like snowflakes: no two are alike,” Proc. 13th USENIX Conf. Hot Top. Oper. Syst., p. 5, 2011.
[11] A. Tumanov, R. H. Katz, M. A. Kozuch, C. Reiss, and G. R. Ganger, “Heterogeneity and dynamicity of clouds at scale,” pp. 1–13, 2012.
[12] P. Beckman, K. Iskra, K. Yoshii, and S. Coghlan, “The influence of operating systems on the performance of collective operations at extreme scale,” Proc. - IEEE Int. Conf. Clust. Comput. ICCC, 2006.
[13] F. Petrini, D. J. Kerbyson, and S. Pakin, “The Case of the Missing Supercomputer Performance,” vol. 836, p. 55, 2011.
[14] K. B. Ferreira, P. G. Bridges, R. Brightwell, and K. T. Pedretti, “The impact of system design parameters on application noise sensitivity,” Cluster Comput., vol. 16, no. 1, pp. 117–129, 2013.
[15] C. Curino, D. E. Difallah, C. Douglas, and S. Krishnan, “Socc14-Paper15.”
[16] A. D. Ferguson, P. Bodik, E. Boutin, and R. Fonseca, “Jockey : Guaranteed Job Latency in Data Parallel Clusters,” Proc. 8th ACM Eur. Conf. Comput. Syst. - EuroSys ’12, pp. 99–112, 2012.
[17] B. Hindman et al., “2011_Benjamin Hindman_Benjamin Hindman_Mesos A Platform for Fine-Grained Resource Sharing in the Data Center.”
[18] C. R. Lumb and R. Golding, “D-SPTF: Decentralized Request Distribution in Brick-based Storage Systems,” ACM SIGOPS Oper. Syst. Rev., vol. 38, p. 37, 2004.
[19] D. Shue, M. Freedman, and A. Shaikh, “Performance Isolation and Fairness for Multi-Tenant Cloud Storage Setting : Shared Storage in the Cloud.”
[20] T. Zhu, A. Tumanov, M. A. Kozuch, M. Harchol-Balter, and G. R. Ganger, “PriorityMeister: Tail Latency QoS for Shared Networked Storage,” Symp. Cloud Comput., pp. 1–14, 2014.
[21] M. Capitão, “Mediator Framework for Inserting Data into Hadoop Micael José Pedrosa Capitão Plataforma de Mediação para a Inserção de Dados em Hadoop Mediator Framework for Inserting Data into Hadoop,” no. January, 2015.
[22] “Apache Hadoop.” [Online]. Available: http://hadoop.apache.org/. [Accessed: 08-Mar-2019].
[23] “NameNode and DataNode – Hadoop In Real World.” [Online]. Available: http://www.hadoopinrealworld.com/namenode-and-datanode/. [Accessed: 08-Mar-2019].
[24] “What is Hadoop Distributed File System (HDFS)? - Definition from WhatIs.com.” [Online]. Available: https://searchdatamanagement.techtarget.com/definition/Hadoop-Distributed-File-System-HDFS. [Accessed: 10-Jan-2019].
[25] “20 Essential Hadoop Tools for Crunching Big Data – Data Science IO – Medium.” [Online]. Available: https://medium.com/data-science-io/20-essential-hadoop-tools-for-crunching-big-data-efbc8b5c77ce. [Accessed: 15-Jan-2019].
[26] A. Manzanares et al., “Improving MapReduce performance through data placement in heterogeneous Hadoop clusters,” Ned. Tijdschr. Psychol., vol. 4, no. 4, pp. 1–9, 2010.
[27] “Hadoop Soup: 01/10/14.” [Online]. Available: http://dailyhadoopsoup.blogspot.com/2014_01_10_archive.html. [Accessed: 10-Sep-2018].
[28] “20 essential Hadoop tools for crunching Big Data.” [Online]. Available: https://bigdata-madesimple.com/20-essential-hadoop-tools-for-crunching-big-data/. [Accessed: 08-Sep-2018].
[29] “Apache Spark Introduction.” [Online]. Available: https://www.tutorialspoint.com/apache_spark/apache_spark_introduction.htm. [Accessed: 08-Aug-2018].
[30] “Home - Apache Hive - Apache Software Foundation.” [Online]. Available: https://cwiki.apache.org/confluence/display/HIVE. [Accessed: 08-Aug-2018].
[31] “What is Hive? Architecture & Modes.” [Online]. Available: https://www.guru99.com/introduction-hive.html. [Accessed: 08-Jul-2018].
[32] “Impala Hadoop Tutorial.” [Online]. Available: https://www.dezyre.com/hadoop-tutorial/hadoop-impala-tutorial. [Accessed: 20-Nov-2018].
[33] “Cloudera Impala Overview | 5.3.x | Cloudera Documentation.” [Online]. Available: https://www.cloudera.com/documentation/enterprise/5-3-x/topics/impala_intro.html. [Accessed: 04-Oct-2018].
[34] “Big Data: How to manage Hadoop.” [Online]. Available: https://www.cleverism.com/how-to-manage-hadoop-big-data/. [Accessed: 20-Dec-2018].
[35] “Introduction to batch processing - MapReduce - Data, what now?” [Online]. Available: https://datawhatnow.com/batch-processing-mapreduce/. [Accessed: 05-Jan-2019].
[36] A. Gupta and G. N. Campus, “HIVE- Processing Structured Data in HADOOP,” no. August, 2018.
[37] “Why is Impala faster than Hive? - Quora.” [Online]. Available: https://www.quora.com/Why-is-Impala-faster-than-Hive. [Accessed: 30-Sep-2018].
[38] “What is the advantages of Hadoop and Big data? - Quora.” [Online]. Available: https://www.quora.com/What-is-the-advantages-of-Hadoop-and-Big-data. [Accessed: 12-Jan-2019].
[39] “Advantages of Hadoop MapReduce Programming.” [Online]. Available: https://www.tutorialspoint.com/articles/advantages-of-hadoop-mapreduce-programming. [Accessed: 10-Dec-2018].
Citation
Md. Nesar Rahman, Ayesha Siddika, Muhammad Shafiqul Islam, Md. Shahajada, "Straggler Problem –Tail Latancy in Distributed network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.168-178, 2019.
A Novel Feature Extraction Method for Texture and Shape Analysis of Face Makeup Database
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.179-184, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.179184
Abstract
Human face images are very important for the identity of human faces and used for many applications such as authentication, or medical fields for analysis. The face retrieval and detection from the large database is a difficult problem. It becomes more challenging in the presence of makeup on the faces. Makeup is done in the different parts of the face such as lips, eyes, or on cheeks. Therefore, it is required to first detect the makeup on the image and then use efficient face recognition method. In this paper a novel texture and shape based feature extraction methods are presented using the wavelet based feature fusion for the efficient face recognition. The goal is to recognize the quarry face within the image database. The detection algorithm is very simple and fast to work for large databases. First a random quarry image is picked from database then features are extracted from both quarry and template images. Method first resizes the quarry and template images and then calculates features in RGB domain. For the texture analysis the Local Ternary Pattern (LTP) based feature are adopted in place of Local binary pattern (LBP). For feature enhancement the wavelet based fusion of lower and upper LTP patterns are proposed in the paper. Method is calculated and compared for images with and without makeup. To analyze the shape features Histogram of Gradient are plotted. The performance of our proposed feature extraction is tested using the Face images of man’s and women’s with heavy and light makeup and also without makeup.
Key-Words / Index Term
Face Recognition, Makeup Detection, Feature extraction, Histogram of Gradient, Image binary patterns
References
[1] Neslihan Kose, Ludovic Apvrille, Jean-Luc Dugel, “Facial Makeup Detection Technique Based on Texture and Shape Analysis” IEEE international conference and Workshop on Automatic Face and Gesture Recognition, pp. 1-7, 2015.
[2] Cunjian Chen, Antitza Dantcheva, Arun Ross, “Automatic Facial Makeup Detection with Application in Face Recognition”, Appeared in Proc. of 6th IAPR International Conference on Biometrics (ICB), (Madrid, Spain), pp. 1-8 June 2013
[3] Syed Hamad Shirazi,, Noor ul Amin Khan “ Content-Based Image Retrieval Using Texture Color Shape and Region, International Journal of Advanced Computer Science and Applications, (IJACSA) Vol. 7, No. 1, 2016.
[4] N. Kose, N. Erdogmus and J.-L. Dugelay. ”Block based face recognition approach robust to nose alterations”, IEEE International Conf. on Biometrics: Theory, Applications and Systems (BTAS), pp. 121-126, 2012.
[5] Neetu Sharma, Paresh Rawat,, “Efficient CBIR using color Histogram Processing”, A Robust CBIR System, “ in Lambart publication Germany 2011.
[6] N. Kose and J.-L. Dugelay. ”Mask spoofing in face recognition and countermeasures”, Image and Vision Computing Journal - Elsevier, Special Issue of IMAVIS - Best of Automatic Face and Gesture Recognition 2013, Vol. 32, no. 10, pp. 779-789, July 2014,
[7] Y. P. Chen, S. Z. Li, and X. M. Lin, “Fast hog feature computation based on cuda,” in Computer Science and Automation Engineering (CSAE) IEEE International Conference on, 2011, pp. 748–751 ,2011.
[8] M.-L. Eckert, N. Kose and J.-L. Dugelay. ”Facial cosmetics database and impact analysis on automatic face recognition”, IEEE Int. Workshop on Multimedia Signal Processing (MMSP), pp. 434-439, 2013.
[9] C. Chen, A. Dantcheva, and A. Ross. ”Automatic Facial Makeup Detection with Application in Face Recognition”, International Conf. on Biometrics (ICB), pp. 1-8, 2013.
[10] S. Varshovi. ”Fjm yjacial makeup detection using HSV color space and texture analysis”, Master’s thesis report , Concordia University, Canada, 2012.
[11] C.-C. Chang and C.-J. Lin. ”LIBSVM: A library for support vector machines”, ACM Trans. on Intelligent Systems and Technology, vol. 2, pp. 1-27, 2011.
[12] L. Apvrille and A. Apvrille. ”Pre-filtering Mobile Malware with Heuristic Techniques”, Proceedings of GreHack’ 2013, Grenoble, Nov. 2013.
[13] S. Z. Li and A. K. Jain, editors. Handbook of Face Recognition, 2nd Edition. Springer, 2011.
[14] Y. Fu, G. Guo and T. S. Huang. ”Age synthesis and estimation via faces: a survey”, IEEE Trans. on PAMI, vol. 32, pp. 1955-1976, 2010.
[15] W. Zhang, S. Shan, et al. ”Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition”, Proc. ICCV, pp. 786-791, 2005.
[16] A. Dantcheva, A. Ross, C. Chen, ”Makeup challenges automated face recognition systems”, SPIE Newsroom, 2013.
[17] T. Ojala, M. Pietik¨ainen, and T. M¨aenp¨a¨a. ”Multiresolution gray-scale and rotation invariant texture classification with local binary patterns”, PAMI, vol 24, pp. 971-987, 2002.
[18] O. Ludwig, D. Delgado, et al. ”Trainable Classifier-Fusion Schemes: An Application To Pedestrian Detection”, Int. IEEE Conf. On Intelligent Transportation Systems, pp. 432-437, 2009.
[19] G. Rhodes, A. Sumich and G. Byatt. ”Are average facial configurations attractive only because of their symmetry?”, Psychological Science, vol. 10, pp. 52-58, 1999.
[20] S. Ueda and T. Koyama. ”Influence of makeup on facial recognition”, Perception, vol. 39, pp. 260, 2010.
[21] G. Guo, L. Wen and S. Yan. ”Face Authentication with Makeup Changes”, IEEE Trans. on Circuits and Systems for Video Technology, 2013.
Citation
Rohita Singh, Monika Raghuwanshi, "A Novel Feature Extraction Method for Texture and Shape Analysis of Face Makeup Database," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.179-184, 2019.
Enhancement of Data Classification Accuracy using Bagging Technique in Random Forest
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.185-188, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.185188
Abstract
Random forest are able to do classification on high performance through a classification ensemble with a decision trees that grow mistreatment at random elect subspaces of information. The performance of associate degree ensemble learner is very obsessed on the accuracy of every element learner and also the diversity among these parts. In random forest, organisation would cause incidence of unhealthy trees and should embrace related trees. This ends up in inappropriate and poor ensemble classification call. During this paper a shot has been created to enhance the performance of the model by applying material technique in a very random forest. Experimental results have shown that, the random forest are often more increased in terms of the classification accuracy.’
Key-Words / Index Term
Random forest, Classification Accuracy, Bagging
References
[1] Breiman, L. 2001. Random Forests. Machine Learning, Vol. 45 Issue 1, pp. 5-32.
[2] Breiman, L. 1996. Heuristics of instability and stabilization in model selection. The Annals of Statistics, Vol.24 Issue 6, pp. 2350–2383.’
[3] P. Boyle and B. Levin, "World Cancer Report,"World Health Organization, Geneva, Switzerland 2008.
[4]J. A. Cruz and D. S. Wishart, "Applications of machine learning in cancer prediction and prognosis," Cancer Informatics, vol. 2, pp. 59- 78, 2006’
[5]G. Richards, V. J. Rayward-Smith, P. Sönksen, S. Carey, and C. Weng, "Data mining for indicators of early mortality in a database of clinical records," Artificial intelligence in medicine, vol. 22, no. 3, pp. 215-231, 2001.
[6] L. Breiman, "Random forests," UC Berkeley TR567, 1999.
[7] (2016, 2016-12-10). Random Forest – RapidMiner Documentation.
[8] V Adegoke, Daqing Chen, Ebad Banissi, and Safia Barikzai. Prediction of breast cancer survivability using ensemble algorithms. 2017.
[9] Abdulsalam Alarabeyyat, Mohannad Alhanahnah, et al. Breast cancer detection using k-nearest neighbor machine learning algorithm. In Developments in eSystems Engineering (DeSE), 2016 9th International Conference on, pages 35–39. IEEE, 2016.
[10] Dania Abed Aljawad, Ebtesam Alqahtani, AL-Kuhaili Ghaidaa, Nada Qamhan, Noof Alghamdi, Saleh Alrashed, Jamal Alhiyafi, and Sunday O Olatunji. Breast cancer surgery survivability prediction using bayesian
network and support vector machines. In Informatics, Health & Technology (ICIHT), International Conference on, pages 1–6. IEEE, 2017.
[11] Bhavini J. Samajpati, Sheshang D. Degadwala,”A Survey on apple Fruit Diseases Detection and Classification” International Journal of Computer Applications (0975 –8887) Volume 130 – No.13, November 2015.
[12] Wang, Bo, et al. "Power System Transient Stability Assessment Based on Big Data and the Core Vector Machine." IEEE Transactions on Smart Grid (2016):1-1.
Citation
Vikas S., Thimmaraju S.N., "Enhancement of Data Classification Accuracy using Bagging Technique in Random Forest," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.185-188, 2019.