A Hybrid Approach for Fake News Detection using Convolution and Multilayer Perceptron
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1181-1187, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11811187
Abstract
Social media platforms allow its users to publicly share any kind of content without any restriction. This shared content is available to a very large number of people having access to social media, moreover, it plays a significant role in casting their trust and belief. Due to this, there is an essential necessity to probe the genuineness and authenticity of the publicly shared content. Fake news is one such problem which has recently attracted enormous attention due to its large social, political and economic impacts on an individual and the society. Manual analysis of articles on social media is a cumbersome task and also it does not ensure a high success rate in the detection of fake news. In this article, we proposed a hybrid deep learning architecture to exploit the characteristics of Convolutional Neural Network along with Multilayer Perceptron. To evaluate the architecture, we used LIAR dataset which contains the news text and profile of the news source. After testing the architecture on various models a significant improvement was observed when compared to state of the art models.
Key-Words / Index Term
Fake News, Deception, Convolutional neural network, Multilayer perceptron
References
[1] M.D. Vicario, A.Bessi, F.Zollo, F.Petroni, A.Scala, G.Caldarelli, H. E. Stanley, and W.Quattrociocchi. “The spreading of misinformation online”. Proceedings of the National Academy of Sciences 113, 3, pp. 554–559, 2016.
[2] R.Marchi, “With facebook, blogs, and fake news, teens reject journalistic objectivity”, Journal of Communication Inquiry, Vol.36(3), pp. 246-262, 2012.
[3] K.Shu, A.Sliva, S.Wang, J.Tang, and H.Liu, “Fake News Detection on Social Media: A Data Mining Perspective”, ACM SIGKDD Explorations Newsletter Vol.19-1, pp.22–36, 2017.
[4] E. Mustafaraj and P.T.Metaxas. “Thefake news spreading plague: Was it preventable?” arXiv preprint arXiv:1703.06988, 2017.
[5] M.Potthast, J.Kiesel, K.Reinartz, J.Bevendor, and B.Stein, “A stylometric inquiryinto hyperpartisan and fake news”. arXiv preprintarXiv:1702.05638, 2017.
[6] David O Klein and Joshua R Wueller. Fake news: A legal perspective. 2017.
[7] M. Balmas, “When fake news becomes real: Combinedexposure to multiple news sources and politicalattitudes of inefficacy, alienation, and cynicism”. CommunicationResearch, Vol.41(3), pp. 430-454, 2014.
[8] V.L Rubin, N.J. Conroy, Y.Chen, and S.Cornwell, “Fake news or truth? Using satiricalcues to detect potentially misleading news”. In Proceedingsof NAACL-HLT, pp. 7-17, 2016.
[9] S.Chopra and S.Jain, “Towards automatic identification of fake news: Headline-article stance detection with LSTM attention models,” 2017.
[10] S.Chopra, S.Jain, J.M. Sholar, “Towards Identification of Fake News: Headline, Article Stance Detection With LSTM Attention Models”, Stanford CS224 Deep Learning For NLP Final Project, 2017.
[11] E.Fitzpatrick, J.Bachenko, and T.Fornaciari, “Automatic Detection of Verbal Deception. SynthesisLectures on Human Language Technologies” Morgan & Claypool Publishers.
[12] P.Rosso and L.Cagnina, “Deception Detectionand Opinion Spam. In: A Practical Guide to SentimentAnalysis”, Cambria, E., Das, D., Bandyopadhyay,S., Feraco, A. (Eds.), Socio-Affective Computing,Vol. 5, Springer-Verlag pp. 155-171, 2017.
[13] N.J.Conroy, V.L.Rubin, Y.Chen “Automatic Deception Detection” Proceedings of the 78th ASIS&T, 2015.
[14] V.L.Rubin and T.Lukoianova “Truth anddeception at the rhetorical structure level”. Journal of the Association for Information Science and Technology, Vol. 66(5), pp. 905-917, 2015.
[15] A.A.Memon, A.Vrij, and R.Bull, “Psychology and law: Truthfulness,accuracy and credibility”. John Wiley & Sons, 2003.
[16] S. R. Maier, “Accuracy Matters: A Cross-Market Assessment of Newspaper Error and Credibility,” Journalism & Mass Communication Quarterly, Vol. 82, Issue. 3, pp. 533–551, 2005.
[17] B.J.Fogg and H.Tseng. “The Elements of Computer Credibility” , in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’99. New York, NY, USA: ACM, pp. 80–87,1999.
[18] L.Wu, H.Liu, “Tracing fake-news footprints: Characterizing social media messages by how they propagate”, Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. pp. 637–645. WSDM ’18, ACM, 2018.
[19] N.J.Conroy, V.L.Rubin and Y.Chen, “Automatic deceptiondetection: Methods for finding fake news”. Proceedings of the Association for Information Science and Technology 52, 1 , pp. 1–4,2015.
[20] Z.Jin, J.Cao, Y.Zhang, J.Zhou and Q.Tian, “Novel visual and statistical image features for micro blogs news verification”, IEEE transactions on multimedia Vol.19, Issue.3 , pp. 598–608, 2017.
[21] E.Tacchini, G.Ballarin, M.L.Vedova, S.Moret, and L.de Alfaro, “ Some like it hoax: Automated fake news detection in social networks”, arXiv preprint arXiv:1704.07506 ,2017.
[22] J.Ma, W.Gao, P.Mitra, S.Kwon, B. J.Jansen, K.Wong, and M.Cha. “Detecting Rumors from Microblogs withRecurrent Neural Networks”, In IJCAI, pp 3818–3824, 2016.
[23] N.Ruchansky, S.Seo, and Y.Liu, “CSI:AHybrid Deep Model for Fake News Detection”, Proceedings of the 2017 ACMon Conference on Informationand Knowledge Management. ACM, pp. 797–806, 2017.
[24] M.Granik, V.Mesyura, “Fake News Detection Using Naive Bayes Classifier”, First Ukraine Conference on Electrical and Computer Engineering, IEEE conference, Ukraine, pp. 900-903, 2017.
[25] H.Ahmed, I.Traore, S.Saad, “Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques”, Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC, Lecture Notes in Computer Science, Vol.10618. Springer, Cham, 2015.
[26] Y.Long, Q.Lu, R.Xiang, M.Li, C.R.Huang. “Fake News Detection Through Multi-Perspective Speaker Profiles”, International Joint Conference on Natural Language Processing, AFNLP, Taiwan, pp. 252–256, 2017.
[27] W.Y.Wang. “liar pants on fire: A new benchmark dataset for fake news detection”, arXiv preprint arXiv1705,00648, 2017.
[28] R.Mihalcea, C.Strapparava. “The lie detector: Explorations in the automatic recognition of deceptive language”, Proceedings of the ACL-IJCNLP, 2009.
[29] M.Ott, Y.Choi, C.Cardie, and J.T.Hancock’ “Finding deceptive spam by any stretch of the imagination”, Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Vol1. Association for Computational Linguistics, pages 309–319, 2011.
[30] J.Thorne et.al. “Fake News Detection using Stacked Ensemble of Classifiers” , Proceedings of the EMNLP, pages 80–83Copenhagen, Denmark, September-7, Association for Computational Linguistics, 2017.
[31] J.Pennington, R.Socher, C.D.Manning. “GloVe: Global Vectors for Word Representation”, Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532–1543, 2014.
[32] Y.Kim. “Convolutional neural networks for sentence classification”, Conference on Empirical Methods in Natural Language Processing (EMNLP), 2014.
Citation
Mohd Zeeshan Ansari, Mumtaz Ahmed, "A Hybrid Approach for Fake News Detection using Convolution and Multilayer Perceptron," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1181-1187, 2019.
Improved Hybrid Genetic Based Rule Mining Algorithm for Software Defect Prediction
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1188-1195, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11881195
Abstract
Predicting software defects is an important issue in the software development and maintenance process, which is related to the overall success of the software. This is because predicting software failures in the previous phase can improve software quality, reliability and efficiency, and reduce software costs. However, developing robust defect prediction models is a challenging task and many techniques have been proposed in the literature. This paper proposes a software defect prediction model based on the new improved hybrid genetic rule mining algorithm (IHGBR). The supervised IHGBR algorithm has been used to predict future software failures based on historical data. The evaluation process shows that the IHGBR algorithm can be used effectively with high accuracy. The collected results show that the IHGBR method has better performance.
Key-Words / Index Term
Rule mining, Defect, Genetic, software metrics, Prediction
References
[1] Y. Tohman, K. Tokunaga, S. Nagase, and M. Y. “Structural approach to the estimation of the number of residual software faults based on the hyper-geometric districution model,” IEEE Trans. on Software Engineering, pp. 345–355, 1989.
[2] A. Sheta and D. Rine, “Modeling Incremental Faults of Software Testing Process Using AR Models ”, the Proceeding of 4th International Multi-Conferences on Computer Science and Information Technology (CSIT 2006), Amman, Jordan. Vol. 3. 2006.
[3] D. Sharma and P. Chandra, "Software Fault Prediction Using MachineLearning Techniques," Smart Computing and Informatics. Springer, Singapore, 2018. 541-549.
[4] R. Malhotra, "Comparative analysis of statistical and machine learning methods for predicting faulty modules," Applied Soft Computing 21, (2014): 286-297
[5] Malhotra, Ruchika. "A systematic review of machine learning techniques for software fault prediction." Applied Soft Computing 27 (2015): 504-518.
[6] D`Ambros, Marco, Michele Lanza, and Romain Robbes. "An extensive comparison of bug prediction approaches." Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on. IEEE, 2010.
[7] Gupta, Dharmendra Lal, and Kavita Saxena. "Software bug prediction using object-oriented metrics." Sādhanā (2017): 1-15.
[8] M. M. Rosli, N. H. I. Teo, N. S. M. Yusop and N. S. Moham, "The Design of a Software Fault Prone Application Using Evolutionary Algorithm," IEEE Conference on Open Systems, 2011.
[9] T. Gyimothy, R. Ferenc and I. Siket, "Empirical Validation of ObjectOriented Metrics on Open Source Software for Fault Prediction," IEEE Transactions On Software Engineering, 2005.
[10] Singh, Praman Deep, and Anuradha Chug. "Software defect prediction analysis using machine learning algorithms." 7th International Conference on Cloud Computing, Data Science & EngineeringConfluence, IEEE, 2017.
[11] M. C. Prasad, L. Florence and A. Arya, "A Study on Software Metrics based Software Defect Prediction using Data Mining and Machine Learning Techniques," International Journal of Database Theory and Application, pp. 179-190, 2015.
[12] Okutan, Ahmet, and Olcay Taner Yıldız. "Software defect prediction using Bayesian networks." Empirical Software Engineering 19.1 (2014): 154-181.
[13] Bavisi, Shrey, Jash Mehta, and Lynette Lopes. "A Comparative Study of Different Data Mining Algorithms." International Journal of Current Engineering and Technology 4.5 (2014).
[14] Y. Singh, A. Kaur and R. Malhotra, "Empirical validation of objectoriented metrics for predicting fault proneness models," Software Qual J, p. 3–35, 2010.
[15] Malhotra, Ruchika, and Yogesh Singh. "On the applicability of machine learning techniques for object oriented software fault prediction." Software Engineering: An International Journal 1.1 (2011): 24-37.
[16] A. TosunMisirli, A. se Ba¸ S.Bener,“A Mapping Study on Bayesian Networks for Software Quality Prediction”, Proceedings of the 3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, (2014).
[17] T. Angel Thankachan1, K. Raimond2, “A Survey on Classification and Rule Extraction Techniques for Data mining”,IOSR Journal of Computer Engineering ,vol. 8, no. 5,(2013), pp. 75-78.
[18] T. Minohara and Y. Tohma, “Parameter estimation of hyper-geometric distribution software reliability growth model by genetic algorithms”, in Proceedings of the 6th International Symposium on Software Reliability Engineering, pp. 324–329, 1995.
[19] Olsen, David L. and Delen, “ Advanced Data Mining Techniques ”, Springer, 1st edition, page 138, ISBN 3-540-76016-1, Feb 2008.
[20] L. H. Crow, “Reliability for complex repairable systems,” Reliability and Biometry, SIAM, pp. 379–410, 1974
Citation
S. Maheswari, R. Ganesan, K. Chitra, "Improved Hybrid Genetic Based Rule Mining Algorithm for Software Defect Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1188-1195, 2019.
A Review on Bandwidth Enhancement in Microstrip Antenna
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.1196-1200, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11961200
Abstract
Now days antenna designers are paying more attention on microstrip patch antennas, due to its numerous blessings in field of communication, inclusive of high reliability, light weight, ease of fabrication etc. but despite of its extreme benefits, patch antennas additionally experience some drawbacks viz low gain and narrow bandwidth. These drawbacks may be overcome by looking after a few parameters within the layout of antennas. there are various designing factors affecting the radiating traits of antenna together with patch dimensions, feeding techniques, substrate used in production of antenna etc. The paper is targeted on various bandwidth enhancement strategies. The paper accommodates of a short examine in feeding techniques, parasitic patch elements, advent of slots, twin feed, shorting pin, air hole, defective ground and so forth that enhances the bandwidth of antenna.
Key-Words / Index Term
Technology, Electronics, Optoelectronics, Photonics, Telecommunications, Signals. Circuits, Systems, Applications
References
[1]. Devashree S. Marotkar, Prasanna Zade “Bandwidth enhancement of microstrip patch antenna using defected ground structure”, : Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference ,IEEE,2016
[2].Merbin John, “Bandwidth enhancement of microstrip patch antenna for 5.8GHz by optimized feed offset” Communication and Signal Processing (ICCSP) International Conference,IEEE, 2016
[3]. Aniket Gunjal, “ Bandwidth enhancement in band pass filter (BPF) using microstrip couple lines for WLAN (2.4GHZ) applications” Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference ,IEEE,2016
[4]. Neng-Wu Liu et al, “A Differential-fed Microstrip Patch Antenna with Bandwidth Enhancement under Operation of TM10 and TM30 Modes” ,IEEE Transactions on Antennas and Propagation, February 2017
[5]. Farhadur Arifin et al, “Bandwidth enhancement of a compact planar antenna for Wireless Capsule Endoscopy”, Electrical and Computer Engineering (ICECE), 2016 9th International Conference on,2017
[6]. Lei Lei et al, “Printed Texture With Triangle Flat Pins for Bandwidth Enhancement of the Ridge Gap Waveguide”, IEEE Transactions on Microwave Theory and Techniques , 2017
[7]. Tetsuya Ueda et al, “Enhancement of bandwidth for low-profile omnidirectional zeroth-order resonant antennas”, Antennas and Propagation (ISAP), 2016 International Symposium on,IEEE,2016
[8].Md Moinul Islam et al, “Bandwidth enhancement of a microstrip antenna for X-band applications” ARPN Journal of Engineering and Applied Sciences,2013
[9]. Anshika Khanna et al, “Bandwidth enhancement of modified square fractal microstrip patch antenna using gap-coupling”, Engineering Science and Technology, an International Journal,2015
[10]. Ragab M. Elsagheer et al, “Study on bandwidth enhancement techniques of microstrip antenna”Journal of Electrical Systems and Information Technology,2016
[11]. Naresh Kumar Darimireddya, “Design of triple-layer double U-slot patch antenna for wireless applications”, Journal of Applied Research and Technology,2015
[12]. Jatin Kumar et al, “Design and Optimization of Multiple slots Microstrip Patch Antenna for WIMAX and WLAN Applications”International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463 Vol. 3 Issue 11, November-2014, pp: (190-195)
[13]. Shailesh Kumar et al, “E–Shaped Coaxial Feed Microstrip Patch Antenna for WLAN and WIMAX Applications” International Journal of Current Engineering and Technology, Vol.5, No.2 (April 2015)
[14]. Hamza Nachouane et al, “Dual Port Antenna Combining Sensing and Communication Tasks for Cognitive Radio” International journal of electronics and telecommunication,2016
[15]. C. A. Balanis, Antenna Theory and Analysis, John Wiley & Sons, 1997.
[16].K. K. S. Angana, Sarma Kumaresh Sarmah, "Low return loss slotted rectangular microstrip patch antenna at 2.4 ghz", Proceedings of second international Conference on Signal Procesing and integrated Networks (SPIN 2015), 2015.
[17].A. A. D. Al-Sajee, K. A. Hamad, "Improving bandwidth rectangular patch antenna using different thickness of dielectric substrate", 2006.
[18].R. Nema, A. Khan, "Analysis of five different dielectric substrates on microstrip patch antenna", Analysis, vol. 55, no. 14, 2012.
[19]. D.M. Pozar, Microwave engineering, John wiley & sons, 2009.
[20].Vivek Hanumante, Panchatapa Bhattacharjee, Sahadev Roy, Pinaki Chakraborty, Santanu Maity, "Performance Analysis of Rectangular Patch Antenna for Different Substrate Heights", International Journal of Innovative Research in Electrical Electronics Instrumentation and Control Engineering, vol. 2, no. 1, pp. 515-518, Jan. 2014.
[21].Amit Kumar et al., "Bandwidth Enhancing technique in the Designing of Wireless Microstrip Patch Antenna", International Journal of Review in Electronics & Communication Engineering, vol. 1, no. 2, pp. 28-31, June 2013.
Show Context
[22].N.I. Pyatak, T.V. Klochko, S.V. Chumachenko, "The calculation of the matrix of a scattering wave-guide dielectric resonator of a complex structure", The Fifth International Kharkov Symposium on Physics and Engineering of Microwaves Millimeter and Submillimeter Waves 2004. MSMW 04, vol. 2, pp. 722-724, 21–26 June 2004
[23]. Y. Chen, G. Y. Li, and Y. P. Zhang, "An LTCC planar ultra-wideband antenna", Microwave and Optical Technology Letter, vol. 42, no.3, pp. 220-222, Aug. 2004. 14.
[24].Y. Chen and Y. P. Zhang, "Integration of ultra-wideband slot antenna on LTCC substrate," Electronics Letters, vol. 40, pp. 645-646, 2004.
[25]. C. Ying and Y. P. Zhang, "A planar antenna in LTCC for single-package ultrawide-band radio," IEEE Transactions on Antennas and Propagation, vol. 53, no.9, pp. 3089-3093, 2005.
[26]. K. Doppler, "Device-to-Device Communication as an Underlay to LTE-Advanced Networks", IEEE Commun. Mag., vol. 47, no. 12, pp. 42-49, Dec. 2009.
[27]. M. Scott Corson, "Toward Proximity-Aware Internetworking", IEEE Wireless Mag., vol. 17, no. 6, pp. 26-33, Dec. 2010.
[28]. H. Nakano, H. Iwaoka, K. Morishita, J. Yamauchi, "A wideband low-profile antenna composed of a conducting body of revolution and a shorted parasitic ring", IEEE Trans. on Antennas Propag., vol. 56, no. 4, pp. 1187-1192, Apr. 2008.
[29].C. Caloz, T. Itoh, Electromagnetic Metamaterials: Transmission Line Theory and Microwave Applications, New Jersey:Wiley, 2006.
33.A. Sanada, T. Itoh, "Zeroth-order resonance in composite right/left handed transmission line resonator", Proc.2003 Asia-Pacific Microw. Conf., pp. 1588-1592, 2003.
[30].A. Lai, K. Leong, T. Itoh, "Infinite wavelength resonant antennas with monopolar radiation pattern based on periodic structures", IEEE Trans. Antennas Propag., vol. 55, pp. 868-876, Mar. 2007.
[31].J. Zhu, G. V. Eleftheriades, "A compact transmission-line metamaterial antenna with extended bandwidth", IEEE Antennas Wireless Propag. Lett., vol. 8, pp. 295-298, 2009.
[32]. Hsing-Yi Chen, Yu Tao, “Performance improvement of a U-slot patch antenna using a dual-band frequency selective surface with modified Jerusalem cross elements”IEEE Trans. Antennas Propag., 59 (9) (September 2011), pp. 3482–3486
[33].Hsing-Yi Chen, Yu Tao, “Antenna gain and bandwidth enhancement using frequency selective surface with double rectangular ring elements”Proceedings of International Symposium on Antenna, Propagation and EM Theory (December 2010), pp. 271–274 Guangzhou, China
[34].A.M. Abdelraheem, A. Mahmoud, A.M. Sharaf,UWB notched antenna for nearby WiMAX system interference immunity,30th National Radio Science Conference (NRSC2013), National Telecommunication Institute, Egypt, April 16–18 (2013), pp. 123–131
[35]. S. Barbarino, F. Consoli,UWB circular slot antenna provided with an inverted-L notch filter for the 5 GHz WLAN band,Prog. Electromagn. Res., 104 (2012), pp. 1–13
[36]. Singh et al., “Dual band microstrip antenna for UMTS/WLAN/WIMAX applications” international conference on communication systems and network technologies (CSNT). IEEE, pp. 47-50,2013
[37]. Chitra R. and Nagarajan V., “Double L-slot Microstrip Patch Antenna Array for WiMAXandWLAN application”, Journal of Computer and Electrical Engineering, Elsevier, Vol.39, Issue 3, pp 1026-1041, 2013.
[38]. Kaushik S., Dhillon S.S. and Marwaha A., “Rectangular Microstrip Patch Antenna with U-shaped DGS structure for Wireless Applications” Proceedings of IEEE 5th International Conference of Computational Intelligence and Communication Network (CICN), Mathura, pp 27-31, 2013.
[39] . A. Deshmukh, M. Parulekar, S. Kadam and K. P Ray (2011), Broadband Proximity Fed Modified E-shaped Microstrip Antenna, IEEE Conference on Communication, Page(s): 1-5
[40].Z. Faiza, M. T Subahir, Z. Ali, S. Subahir and A. L Yusof (2012), Design of Reconfigurable Dual Band E-shaped Microstrip Patch Antenna IEEE Conference on Computer and communicating Engineering, Page(s): 113 – 117.
[41].M. T. Islam (2009), Broadband E-shaped Microstrip Patch Antenna for Wireless Systems, Progress in Electromagnetic Research, Page(s):163-173.
[42].N. Kaabouch and W. C. Hu, Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic, University of North Dakota, US Spectrum Management, 2014.
[43].Q. Zhao and B. M. Sadler, “A survey of dynamic Spectrum Access,” IEEE Signal Processing Magazine, pp. 79-89, May 2007.
[44]. L. Berlemann and S. Mangold, Cognitive Radio and Dynamic Spectrum Access, John Wiley & Sons, Inc., 2009.
[45]. J. Mitola and G. Q. Maguire, “Cognitive radios: Making Software Radios More Personal,” IEEE Personal Communications, Vol. 6, No. 4, pp. 13-18, 1999.
[46].J. Yang, Spatial Channel Characterization for Cognitive Radios. MS Thesis, UC Berkeley,2004.
[47].H. Nachouane, A. Najid, A. Tribak, and F. Riouch, “Reconfigurable Antenna Combining Sensing and Communication Tasks for Cognitive Radio Applications,” in Mediterranean Conference on Information and Communication Technologies, Saidia, Morocco, May 7-9, 2015.
[48].P. Y. Qin, F. Wei, and Y. J. Guo, “A Wideband to Narrowband Tunable Antenna Using A Reconfigurable Filter,” IEEE Transactions on Antennas and Propagation, vol. 63, no. 5, pp. 2282-2285, May 2015.
[49]. M. R. Hamid, P. Gardner, P. S. Hall, and F. Ghanem, “Switched-Band Vivaldi Antenna,” IEEE Transactions on Antennas and Propagation, vol. 59, no. 5, pp. 1472-1480, 2011.
[50].R. Hussain, and M. S. Sharawi, “A Cognitive Radio Reconfigurable MIMO and Sensing Antenna System,” IEEE Antennas and Wireless Propagation Letters, vol. 14, pp. 257-260, 2015.
[51]. E. Ebrahimi, and P. S. Hall, “Integrated wide-narrowband antenna for multiband applications,” Microwave and Optical Technology Letters, vol. 52, no. 2, pp. 425-430, February 2010.
[52]. Devashree Marotkar, Prassanna Zade, Vivek Kapur, "To Study the Effect of DGS on Antenna Parameters", iraj conference 2015.
[53].M. Al-Husseini, K. Y. Kabalan, A. El-Hajj and C. G. Christodoulou, “Reconfigurable microstrip antennas for cognitive radio,” in Advancement in Microstrip Antennas with Recent Applications, Prof. Ahmed Kishk (Ed.), chapter 14, InTech Publication, pp. 337-362, 2013.
Citation
Ritu Goyal, Y K Jain, "A Review on Bandwidth Enhancement in Microstrip Antenna," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1196-1200, 2019.
A Logical Approach Towards Effective Data Search using Ant Colony Optimization in Cloud Environment
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1201-1207, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.12011207
Abstract
The world has revolutionized over the years with the advent of various technologies and life of mankind has taken a significant turnaround in terms of getting the official problems solved in an effective and efficient manner in no time. One of the most powerful technologies that has come up in recent years is cloud computing. This technology has captured a special place in various Information Technology (IT) sectors and business organizations. Among all the aspects of this technology that are in existence, cloud data search optimization has become a key area of focus for the researchers. Various research works were conducted based on several fundamentals such as Gossip Protocol, Genetic Algorithm, Hybrid Algorithm, Multi-Keyword Synonym Query, Particle Swarm Optimization, Honey Bee Optimization, etc. and all these were put into practical purpose with the primary objective of optimizing the search technique in the cloud. In our paper, we have suggested the use of Ant Colony Optimization Algorithm for an effective data search in database and allocating them to the respective clients through shortest possible network path in no time. We have used the concept of pheromone values to conduct this procedure. Our suggested techniques ensure that our algorithm will achieve a higher degree of performance in terms of increased throughput and increased efficiency as compared to the traditional techniques which were carried out earlier.
Key-Words / Index Term
Database, Client machines, Data Carrier Equipment, Wires, Quadrilateral Obstruction, Pheromone value, Ant Colony Optimization Algorithm
References
[1] Elham Azhir, Nima Jafari Navimipour, Mehdi Hosseinzadeh, Arash Sharifi, Aso Darwesh, “Deterministic and non-deterministic query optimization techniques in the cloud computing”, Concurrency and Computation Practice and Experience, 5th March 2019, DOI: 10.1002/cpe.5240.
[2] YoungJu Moon, HeonChang Yu, Joon Min Gil and JongBeom Lim, “A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments”, Human-centric Computing and Information Sciences, 9th October 2017, DOI: 10.1186/s13673-017-0109-2.
[3] Gurneet Kaur, “Role And Importance Of Search Engine Optimization”, International Journal Of Research-Granthaalayah, Volume 5, Issue 6, June 2017, DOI: 10.5281/zenodo.818213.
[4] Sudipta Sahana, Rajesh Bose, Debabrata Sarddar, “An Enhanced Search Optimization Protocol Based on Gossip Protocol for the Cloud”, International Journal of Applied Engineering Research, Volume 12, Number 19, pp. 8436-8442, ISSN 0973-4562, 2017.
[5] Li Liu, Miao Zhang, Rajkumar Buyya, Qi Fan, “Deadline-constrained coevolutionary genetic algorithm for scientific workflow scheduling in cloud computing”, Concurrency and Computation Practice and Experience, WILEY, 22nd July 2016, DOI: 10.1002/cpe.3942.
[6] Mohammed Abdullahi, Md Asri Ngadi, “Hybrid Symbiotic Organisms Search Optimization Algorithm for Scheduling of Tasks on Cloud Computing Environment”, PLOS One, 27th June 2016, DOI: 10.1371/journal.pone.0158229.
[7] Mohammed Abdullahi, Md Asri Ngadi, Shafi’i Muhammad Abdulhamid, “Symbiotic Organism Search optimization based task scheduling in cloud computing environment”, Future Generation Computer Systems, 24th August 2015, DOI: 10.1016/j.future.2015.08.006.
[8] Manish M. Pardeshi, R. L. Paikrao, “Enhanced and Efficient Search Multimedia Data by Using Multi-Keyword Synonym Query”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 4, Issue 6, June 2015.
[9] George Suciu, Ana Maria Sticlan, Cristina Butca, Alexandru Vulpe, Alexandru Stancu and Simona Halunga, “Cloud Search Based Applications for Big Data - Challenges and Methodologies for Acceleration”, ARMS-CC 2015, LNCS 9438, Springer International Publishing Switzerland 2015, pp. 177–185, 2015, DOI: 10.1007/978-3-319-28448-4_13.
[10] Qiang Xu, Zhengquan Xu, Tao Wang, “A Data-Placement Strategy Based on Genetic Algorithm in Cloud Computing”, International Journal of Intelligence Science, 2015, 5, 145-157, April 2015, DOI: 10.4236/ijis.2015.53013.
[11] Gunvir Kaur, IEr. Sugandha Sharma, “Research Paper on Optimized Utilization of Resources Using PSO and Improved Particle Swarm Optimization (IPSO) Algorithms in Cloud Computing”, International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), Vol. 2, Issue 2, Ver. 3, April-June 2014.
[12] Medhat Tawfeek, Ashraf El-Sisi, Arabi Keshk and Fawzy Torkey, “Cloud Task Scheduling Based on Ant Colony Optimization”, The International Arab Journal of Information Technology, Vol. 12, No. 2, 23rd April 2014.
[13] Vimmi Makkar, Sandeep Dalal, “Ranked Keyword Search in Cloud Computing: An Innovative Approach”, International Journal of Computational Engineering Research, Volume 3, Issue 6, June 2013.
[14] Dr S. Saravanakumar, K Ramnath, R Ranjitha and V.G.Gokul, “A New Methodology for Search Engine Optimization without getting Sandboxed”, International Journal of Advanced Research in Computer and Communication Engineering, Volume 1, Issue 7, ISSN: 2278-1021, September 2012.
[15] Lizheng Guo, Shuguang Zhao, Shigen Shen, Changyuan Jiang, “Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm”, Journal of Networks, Volume 7, No. 3, March 2012, DOI: 10.4304/jnw.7.3.547-553.
Citation
Sudipta Sahana, Tanmoy Mukherjee, Debabrata Sarddar, "A Logical Approach Towards Effective Data Search using Ant Colony Optimization in Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1201-1207, 2019.
Perspective Analysis of Voice Disorder Detection using various Approaches
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1208-1212, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.12081212
Abstract
Abstract— Automatic voice pathology detection and classification systems effectively contribute to the assessment of voice disorders, which helps clinicians to detect the existence of any voice pathologies and the type of pathology from which patients suffer in the early stage. This paper performs detailed study on various methodologies like feature extraction techniques, pattern recognition using machine learning, artificial intelligence, data mining, etc., used by various researches to detect the voice disorder using signal processing and voice recordings. The identification of an algorithm that discriminates between pathological and healthy voices with more accuracy is necessary to realize a valid and precise health system. The key contribution of this study is to investigate the performance of several machine learning techniques useful for voice pathology detection. This work provides detailed survey and comparison of the existing works pros and cons. This study also highlights the drawbacks in the existing methods and outlines the important factors to be considered while performing
Key-Words / Index Term
voice pathology, voice disorder, signal processing, machine learning, data mining and feature extraction
References
[1]. Davis B., “Acoustic Characteristics of Normal and Pathological Voices,” in Proceedings of Speech and Language: Advances in Basic Research and Practice, Orland, pp. 271-335, 1979.
[2]. Parsa V. and Jamieson G., “Interactions between Speech Coders and Disordered Speech,” Computer Journal of Speech Communication, vol. 40, no. 7, pp. 365-385, 2003.
[3]. Wang J. and Cheolwoo J., “Performance of Gaussian Mixture Model as a Classifier for Pathological Voice,” in Proceedings of the ASST in Auckland, Australian, pp. 165-169, 2006.
[4]. Yu P., Ouaknine M., Revis J., and Giovanni A., “Objective Voice Analysis for Dysphonic Patients: A Multiparametric Protocol Including Acoustic and Aerodynamic Measurements,” Computer Journal of Voice, vol. 15, no. 4, pp. 529-542, 2001
[5]. J. I. Godino-Llorente, P. G´omez-Vilda, N. S´aenz-Lech´on, M. Blanco Velasco, F. Cruz-Rold´an, and M. A. Ferrer-Ballester, “Support vector machines applied to the detection of voice disorders,” Lecture notes in computer science, vol. 3817, p. 219, 2005.
[6]. N. Souissi and A. Cherif, “Dimensionality reduction for voice disorders identification system based on mel frequency cepstral coefficients and support vector machine,” in Modelling, Identification and Control (ICMIC), 2015 7th International Conference on. IEEE, 2015, pp. 1–6.
[7]. W. Barry and M. P¨utzer, “Saarbrucken voice database,” Institute of Phonetics, Universit¨at des Saarlandes, http://www. stimmdatenbank.coli. uni-saarland. de, 2007.
[8]. M. El Emary, M. Fezari, and F. Amara, “Towards developing a voice pathologies detection system,” Journal of Communications Technology & Electronics, vol. 59, no. 11, p. 1280, 2014.
[9]. E. S. Fonseca, R. C. Guido, P. R. Scalassara, C. D. Maciel, and J. C. Pereira, “Wavelet time-frequency analysis and least squares support vector machines for the identification of voice disorders,” Computers in Biology and Medicine, vol. 37, no. 4, pp. 571–578, 2007.
[10]. J. Wang and C. Jo, “Vocal folds disorder detection using pattern recognition methods,” in Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE. IEEE, pp. 3253–3256, 2007.
[11]. Henríquez, P., Alonso, J. B., Ferrer, M. A., Travieso, C. M., Godino-Llorente, J. I., Díaz-di-María, F. Characterization of Healthy and Pathological Voice Through Measures Based on Nonlinear Dynamics. IEEE Transactions on Audio, Speech, and Language Processing, Vol. 17, No. 6, 1186-1195, August 2009.
[12]. Forero, L. A., Kohler, M., Vellasco, M., Cataldo, E. Analysis and Classification of Voice Pathologies Using Glottal Signal Parameters. Journal of Voice, 30(5):549-556, 2015.
[13]. Markaki, M., Stylianou, Y. Voice Pathology Detection and Discrimination Based on Modulation Spectral Features. IEEE Transactions on Audio, Speech, and Language Processing, Vol. 19, No. 7, 1938-1948, 2011.
[14]. Panek, D., Skalski, A., Gajda, J., Tadeusiewicz, R. Acoustic Analysis Assessment in Speech Pathology Detection. Int. J. Appl. Math. Comput. Sci., 2015, Vol. 25, No. 3, 631–643.
[15]. Al-nasheri, A., Muhammad, G., Alsulaiman, M., Ali, Z. Investigation of Voice Pathology Detection and Classification on Different Frequency Regions Using Correlation Functions. Journal of Voice, 31(1):3-15, 2016.
[16]. Sellam, V., Jagadeesan, J. Classification of Normal and Pathological Voice Using SVM and RBFNN. Journal of Signal and Information Processing, 2014, 5, 1-7.
[17]. Hugo Cordeiro, Carlos Meneses Ribeiro, Speaker Characterization with MLSFs, The Journal for Nurse Practitioners. Elsevier, 2016
[18]. S. C. Punitha¸ N. A. Sheela Selvakumari, Voice Pathology Identification System using SVM Classifier, International Journal of Advance Research in Computer Science and Management Studies, Volume 5, Issue 1, January 2017
[19]. Laura Verde, Giuseppe De Pietro, Voice Disorder Identification by using Machine Learning Techniques, IEEE. Translations and content mining, pp 1-11, 2018.
[20]. Joao Paulo Teixeiraa, Paula Odete Fernandesa, Nuno Alvesa, Vocal Acoustic Analysis – Classification of Dysphonic Voices with Artificial Neural Networks, ScienceDirect, Procedia Computer Science 121 (2017) 19–26
[21]. Zhijian Wang, Ping Yu, Nan Yan, Lan Wang, Manwa L. Ng, Automatic Assessment of Pathological Voice Quality Using Multidimensional Acoustic Analysis Based on the GRBAS Scale, Sign Process Syst (82:241–251), 2016
Citation
P. Kokila, G. M. Nasira, "Perspective Analysis of Voice Disorder Detection using various Approaches," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1208-1212, 2019.
Design of Taxation System Based on Blockchain Technology
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1213-1219, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.12131219
Abstract
Blockchain technology is becoming a revolution in the area of the internet. It is considered a driving force behind the next generation of the Internet. It is an unchallengeable and decentralized database that facilitates transparent and auditable management of data over a distributed network. It has the ability to transform industries and services including tax management system. We suggest that the decentralized and programmable nature of the blockchain applications can be used to improve the tax management system to gain greater efficiency in this system. The current indirect tax management system in India is complex and requires to do some activity offline. It also has an overhead of return filing. The blockchain can potentially solve these issues. The use of the blockchain based distributed ledger and smart contracts can reduce the administrative burden for accounting services and there is no need to do anything offline, everything will be done online during the tax payment itself. Using the blockchain, all the transactions are done in real time, therefore no return filing is required. The blockchain technology has the advantage that all the transactions are transparent and tamper-proof reducing any system fraud.
Key-Words / Index Term
Blockchain, Distributed Network, Real-time, Smart Contract, Hash Function, Goods and Services Tax
References
[1] P. Paramashivaiah, S. Chakraborthy, “Goods and Services Tax (GST) in India: An Overview and Impact”, ANVESHAK-International Journal of Management, Vol. 6, Issue 1, pp.162, 2017.
[2] Central Board of Indirect Taxes and Customs (CBITC), “Goods and Service Tax (GST) Concept & Status”, Department of Revenue, Ministry of Finance, Government of India, 2019. htp://gstcouncil.gov.in/sites/default/files/01012019-GST-Concept-and-Status.pdf
[3] X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, C. Pautasso and P. Rimba, “A taxonomy of Blockchain-based Systems for Architecture Design in Software Architecture” In the Proceedings of IEEE International Conference on ICSA, pp. 243-252, 2017.
[4] J. Rehman, “Difference between Centralized, Decentralized and Distributed Processing". Retrieved on Sep. 2018. http://www.itrelease.com/2017/11/difference-centralized-decentralized-distributed-processing/
[5] D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, G. Das, “Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems” IEEE Consumer Electronics Magazine, Vol. 7, Issue 4, pp. 6–14, 2018
[6] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”, 2008. http://bitcoin.org/bitcoin.pdf.
[7] S. K. Johansen, “A Comprehensive Literature Review on the Blockchain Technology as a Technological Enabler for Innovation”, 2018. https://doi.org/10.13140/RG.2.2.12942.77121
[8] T. Aste, P. Tasca, T. Di Matteo, “Blockchain Technologies: The Foreseeable Impact on Society and Industry”, Computer, Vol. 50, Issue 9, pp.18–28, 2017.
[9] N. Kshetri, J. Voas. “Blockchain-Enabled E-Voting”, IEEE Software, Vol. 35, Issue 4, pp. 95-99, 2018.
[10] C. Esposito, A. De Santis, G. Tortora, H. Chang, K. K. R. Choo, “Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?”, IEEE Cloud Computing, Vol. 5 Issue 1, pp. 31–37, 2018.
[11] T. T. Kuo, H. E. Kim, L. Ohno-Machado, “Blockchain Distributed Ledger Technologies for Biomedical and Health Care Applications”, Journal of the American Medical Informatics Association, Vol. 24, Issue 6, pp. 1211–1220, 2017.
[12] D. Miller, “Blockchain and the Internet of Things in the Industrial Sector”, IT Professional, Vol. 20, Issue 3, pp. 15–18, 2018.
[13] J. Mendling, J. V. Brocke, F. Daniel, P. di Milano, I. S. Debois, M. Dumas, L. Zhu, “Blockchains for Business Process Management-Challenges and Opportunities”, ACM Transactions on Management Information Systems, Vol. 9, Issue 1, pp. 1–16, 2018.
[14] N. Kshetri, J. Voas, “Blockchain in Developing Countries”, IT Professional, Vol. 20, Issue 2, pp. 11–14, 2018.
[15] I. Stănescu, L. Alboaie, and A. Panu, “Blockchain and Smart-contracts Modeled in a Swarmesb Ecosystem”, Journal of Advance Research in Dynamical & Control Systems, Vol. 10, Special Issue 9, pp. 1–10, 2018.
Citation
S. Ahmad, A. K. Bharti, "Design of Taxation System Based on Blockchain Technology," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1213-1219, 2019.
Investigation of Efficient SKC Cryptic Algorithm for Image Encipherment and Decipherment Using SMCrypter
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1220-1226, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.12201226
Abstract
Without image data security, number of problems arises with the security of different image data files, important data and security is required to send and store on cloud with assurance of confidentially, integrity and authenticity of information over the internet, in public or local networks. Image security has become a critical issue, and is playing a vital role in the domain of network communication system and web. So, there is always a need to have a method to guard the confidentiality, integrity and authenticity of images and avoid the unapproved access of image data over insecure communication environment. Various techniques have been investigated and developed to protect data and personal privacy like cryptic algorithms so far. Cryptic algorithms play a vital role in providing the information security against malicious attacks. It is challenging stuff for researchers to find out more efficient and accurate symmetric block cipher cryptic algorithm for image enciphering and deciphering, and to implement cryptic algorithm. There are many research institutes working on block cipher cryptic algorithm for secure data communication web in the form of digital images like; JPEG/JFIF, BMP, PNG TIFF, GIF, Exif, PPM, PNM, HEIF, PGM, PBM, BAT, BPG. In this paper, presents performance analysis of various symmetric algorithms and investigate of more efficient, confidential and secure symmetric block cipher cryptic algorithm for image encryption and decryption, against cryptanalysis attacks using SMCrypter tool.
Key-Words / Index Term
References
[1].?? J.-S. Coron, “What is cryptography,” IEEE Security & Privacy, Vol.4, Issue.1, pp.70-73, 2006.
[2].?? R. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol.21, Issue.2, pp.120-126, 1978.
[3].?? William Stallings, “Cryptography and network security: Principles and Practices,” Pearson Education India, 7th edition, 2009.
[4].?? H. Mohan, and R. Raji, “ Performance Analysis of AES and MARS Encryption Algorithms,” ?International Journal? Computer Science Issues (IJCSI), Vol.8, Issue.4, 2001.
[5].?? Shivlal Mewada, Pradeep Sharma, S. S. Gautam, “Exploration of efficient symmetric AES algorithm, “. IEEE Symposium on Colossal Data Analysis and Networking (CDAN):), Indore,pp(1-5), 2016.
[6].?? Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Classification of Efficient Symmetric Key Cryptography Algorithms,” International Journal of Computer Science and Information Security (IJCSIS) USA, Vol.14, Issue.2, pp.105-110, 2016.
[7].?? Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms,” IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).? pp(663?–?666), 2016.
[8].?? ShaligramPrajapat, Aditi Thakur, Kajol Maheshwari and Ramjeevan Singh Thakur, “Cryptic Mining in Light of Artificial Intelligence” International Journal of Advanced Computer Science and Applications(IJACSA), Vol.6, Issue.8, 2015..
[9].?? Shaligram Prajapat, Ramjeevan Singh Thakur, “Key Diffusion Approach for AVK based Cryptosystem,” In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies ICTCS-16?published by ACM. 78, 2016.
[10].Shaligramprajapat, R. S. Thakur, “Realization of information exchange with Fibo-Q based Symmetric Cryptosystem.,” International Journal? Computer Science and Information Security, IJCSIS, Vol.14, Issue.2, pp.216-223, 2016.
[11].Prajapat, Shaligram, Ramjeevan Singh Thakur, “Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem. In proceedings of Computational Science and Its Applications,” Springer International Publishing. pp. 164-176, 2015.
[12].ShaligramPrajapat, Ramjeevan Singh Thakur,? “Various Approaches Towards Crypt analysis,” International Journal of Computer Applications, Vol.127, Issue.14, 2015.
[13].Prajapat, Shaligram, Ramjeevan Singh Thakur, “Optimal Key Size of the AVK for Symmetric Key Encryption,” In Covenant Journal of Information & Communication Technology, Vol.3, Issue.2,? pp. 71-81. (2015)
[14].Shivlal Mewada, Aarti Shrivastava, Pradeep Sharma, N Purohit and S.S. Gautam, “Performance Analysis of Encryption Algorithm in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.83-89, 2014.
[15].NidhiSinghal, J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization,”? International Journal Computer Trends and Technology, Vol.1, Issue.3, pp.117-181, 2011.
[16].Neha Joshi, Megha Singh, Surabhi Shah. A New Encryption Algorithm to Increase Performance & Security through Block Cipher Technique.? International Journal of Engg. Science and management, Vol.5, Issue.4, pp.73-78, 2015.
[17].S KTripathi, UK Lilhore, “An Efficient Block Cipher Encryption Technique Based on Cubical Method and Improved Key,” I. J. Interdisciplinary Research, Vol.2, Issue.6, pp.373-377, 2016.
[18].Raghu M E and Ravi Shankar K C, “Application of Classical Encryption Techniques for Securing Data- A Threaded Approach,”? International Journal Cybernetics & Informatics (IJCI), Vol.4, Issue. 2, pp.125-132, 2015.
[19].P. Gope, A. Singh, A Sharma and N. Pahwa, “An Efficient Cryptographic Approach or Secure Policy Based Routing. IEEE Journal on Selected Areas in Communications, ?Vol.1, pp.359-363, 2013.
[20].L. Buttyan, L. Czap and I. Vajda, “Detection and Recovery from Pollution Attacks in Coding Based Distributed Storage Schemes,” IEEE Transaction on Dependable and Secure Computing, Vol.8, Issue.6, pp. 824-838, 2011.
[21].S. F. Mare, M. Vladutiu and L. Prodan, “Secret data communication system using Steganography, AES and RSA,” IEEE: International Symposium for Design and Technology in Electronic Packaging, Vol.2, pp. 339-344, 2011.
[22].S. Verma, R. Choubey and R. Soni, “An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security,”? International Journal? Emerging Technology and Advanced Engineering, Vol.2, Issue.7, pp.18-21, 2012.
[23].RanjeetMasram, Vivek Shahare, Jibi Abraham, RajniMoona. Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based On Various File Features, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, pp. 43-53, July 2014.
[24].S. Soni, H. Agrawal, M. Sharma, “Analysis and comparison between AES and DES Cryptographic Algorithm. International Journal of Engineering and Innovative Technology, Vol.2, Issue.6, pp.362-365, 2012.
[25].NidhiSinghal and J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization,” International Journal of Computer Trends and Technology, Vol.2, Issue.6, pp.177-181, 2011.
[26].Jawahar Thakur et. Al., “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol.1, Issue.2, pp.6-12, 2011.
[27].Kofahi, N.A, Turki Al-Somani, Khalid Al-Zamil, “Performance evaluation of three Encryption/Decryption Algorithms”, IEEE 46th Midwest Symposium on Circuits and Systems, Vol. 2, Issue.1, pp.790-793, 2003.
[28].Y. Jha, K. Kaur and C. Pradhan, “Improving image encryption using two-dimensional logistic map and AES," 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, Tamilnadu, India, pp-0177-0180, 2016.
[29].M. Kurt Pehli̇vanoğlu and N. Duru, Encryption of Walsh Hadamard Transform applied images with the AES encryption algorithm," 2016 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, pp. 301-304, 2016.
[30].Q. Zhang and Q. Ding, “Digital Image Encryption Based on Advanced Encryption Standard (AES)," 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control, ?Qinhuangdao, pp.1218-1221, 2015.
[31].K. Aggarwal, “Comparison of RC6, modified RC6 & enhancement of RC6," 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, pp-444-449, 2015. ?
[32].Dadhich, A.; Gupta, A.; Yadav, S..Swarm, “Intelligence based linear cryptanalysis of four-round Data Encryption Standard algorithm”, IEEE:International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp: 378 – 383, 2014.
[33].Alabaichi, A.,?Ahmad, F., Mahmod, R., “Security analysis of blowfish algorithm”, IEEE: 2nd International Conference on Informatics and Applications (ICIA-13), pp.12– 18, 2013.
[34].TingyuanNie, Teng Zhang, “A study of DES and Blowfish encryption algorithm”, IEEE Region 10 Conference, pp.1-4, 2009.
[35].G. Catalini, F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni and M. Reginelli, “Modified twofish algorithm for increasing security and efficiency in the encryption of video signals," Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429), 1:I-525-8, 2003.
[36].A. O. Montoya B., M. A. Muñoz G. and S. T. Kofuji, “Performance analysis of encryption algorithms on mobile devices," 2013 47th International Carnahan Conference on Security Technology (ICCST), Medellin,? pp. 1-6, 2013..
[37].H. K. Verma and R. K. Singh, “Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6," 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, pp. 556-561, 2013.
[38].S. Mewada, P. Sharma, and S. S. Gautam, “Investigation of Efficient Cryptic Algorithm for Text using SM Crypter,” International Journal of Information Science and Computing, Vol.3, Issue.2, pp. 99-108, 2016.
Citation
Shivlal Mewada, Pradeep Sharma, SS Gautam, "Investigation of Efficient SKC Cryptic Algorithm for Image Encipherment and Decipherment Using SMCrypter," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1220-1226, 2019.
Bi-Directional Recurrent Neural Network for IDS in the Internet of Things
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1227-1235, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.12271235
Abstract
With IoT bringing a large number of day-by-day objects into the digital fold to make them smarter. It is also evident that the IoT is going to transform into a multi-trillion-dollar industry in the near future. However, the reality is that IoT bandwagon rushing full steam ahead is prone to count-less cyber- attack’s in the extremely hostile environment like the internet. Nowadays, standard PC security solutions won’t solve the challenge of privacy and data security transmitted over the internet. In this Paper, we have applied a Bidirectional Recurrent Neural Network to build a security solution with high durability for IoT network security. DL and ML have shown remarkable result in dealing with multimodal and voluminous hetero-generous data in regard’s to intrusion detection especially with the architectures of Recurrent Neural Network’s. Feature selection mechanism were also implemented to help identify and remove non-essential variables from data that does not affect the accuracy of the prediction model. In this case a Random Forest algorithm was implemented over Principal Component Analysis because of flexibility, and easy in using machine learning algorithms that allow production without hyper-parameter tuning, building of multiple decision tree and merging them together to get a more accurate and stable prediction. In this study a novel algorithm (BRNN) out-performed both Recurrent Neural Network and Gated Recurrent Neural Network because it consider both information from the past and the future with back and forward hidden neuron’s.
Key-Words / Index Term
IoT, Recurrent Neural Network’s, Bi-Directional RNN, Intrusion Detection, Deep Learning, Machine Learning.
References
[1] (2020). Retrieved 1 April 2020, from http://kdd.ics.uci.edu/databases/kddcup99 opened april13th.2019.
[2] Ammar, A. (2015). A Decision Tree Classifier for Intrusion Detection Priority Tagging. Journal of Computer And Communications, 03(04), 52-58. https://doi.org/10.4236/jcc.2015.34006
[3] Cs.columbia.edu. (2020). Retrieved 1 April 2020, from http://www.cs.columbia.edu/~mcollins/ibm12.pdf.
[4] Decision-Making, M., Tech, T., FinTech, T., A Women in Tech Study: Motivation, R., Healthcare, T., & Tech, I. et al. (2020). Techopedia - Where IT and Business Meet. Techopedia.com. Retrieved 1 April 2020, from https://www.techopedia.com.
[5] Handa, A., Sharma, A., & Shukla, S. (2019). Machine learning in cybersecurity: A review. Wires Data Mining And Knowledge Discovery, 9(4). https://doi.org/10.1002/widm.1306
[6] Hinton, G., Deng, L., Yu, D., Dahl, G., Mohamed, A., & Jaitly,
N. et al. (2012). Deep Neural Network’s for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups. IEEE Signal Processing Magazine, 29(6), 82-97. https://doi.org/10.1109/msp.2012.2205597
[7] Hochreiter, S., & Schmidhuber, J. (1997). Long Short-Term Memory. Neural Computation, 9(8), 1735-1780. https://doi.org/10.1162/neco.1997.9.8.1735
[8] IEEE International Conference on Acoustics, Speech, and Signal Processing. (2008), 56(8), 4110-4110. https://doi.org/10.1109/tsp.2008.928592
[9] Internet of Things (IoT) news, blogs and analysis - IoTAgenda.com. Internetofthingsagenda.techtarget.com. (2020). Retrieved 1 April 2020, from https://internetofthingsagenda.techtarget.com.
[10] Investopedia. Investopedia. (2020). Retrieved 1 April 2020, from https://www.investopedia.com.
[11] Jia, Y., Wang, M., & Wang, Y. (2019). Network intrusion detection algorithm based on deep neural network’s. IET Information Security, 13(1), 48-53. https://doi.org/10.1049/iet-ifs.2018.5258
[12] Jiang, F., Fu, Y., Gupta, B., Lou, F., Rho, S., Meng, F., & Tian, Z. (2018). Deep Learning based Multi-channel intelligent attack detection for Data Security. IEEE Transactions on Sustainable Computing, 1-1. https://doi.org/10.1109/tsusc.2018.2793284
[13] Samsung Next. Samsung NEXT. (2020). Retrieved 1 April 2020, from https://samsungnext.com.
[14] U.Farooq, M., Waseem, M., Khairi, A., & Mazhar, S. (2015). A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal Of Computer Applications, 111(7), 1-6. https://doi.org/10.5120/19547-1280
[15] (2020). Retrieved 4 April 2020, from https://spiritlifestyle.com/news/
[16] Ashfaq, R., Wang, X., Huang, J., Abbas, H., & He, Y. (2017). Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 378, 484- 497. doi: 10.1016/j.ins.2016.04.019
[17] Breiman, L. (2001). Journal search results - Cite This For Me. Machine Learning, 45(1), 5-32. doi: 10.1023/a:1010933404324
Gori, M., Maggini, M., & Rossi, A. (2016). Neural network training as a dissipative process. Neural Network’s, 81, 72-80. doi: 10.1016/j.neunet.2016.05.005
[18] Gwynne, P. (2015). arXiv analysis lifts the lid on text reuse. Physics World, 28(2), 9-9. doi: 10.1088/2058- 7058/28/2/17
[19] Hasan, M., Nasser, M., Ahmad, S., & Molla, K. (2016). Feature Selection for Intrusion Detection Using Random Forest. Journal Of Information Security, 07(03), 129-140. doi: 10.4236/jis.2016.73009
[20] LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444. doi: 10.1038/nature14539
[21] Li, Y., & Guo, L. (2007). An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & Security, 26(7-8), 459-467. doi: 10.1016/j.cose.2007.10.002
[22] Mukkamala, S., Sung, A., & Abraham, A. (2005). Intrusion detection using an ensemble of intelligent paradigms. Journal Of Network And Computer Applications, 28(2), 167-182. doi: 10.1016/j.jnca.2004.01.003
[23] Obeidat, I., Hamadneh, N., Alkasassbeh, M., Almseidin, M., & AlZubi, M. (2019). Intensive Pre-Processing of KDD Cup
99 for Network Intrusion Classification Using Machine Learning Techniques. International Journal Of Interactive Mobile Technologies (Ijim), 13(01), 70. doi: 10.3991/ijim.v13i01.9679
[24] Proti?, D. (2018). Review of KDD Cup `99, NSL-KDD and Kyoto 2006+ datasets. Vojnotehnicki Glasnik, 66(3), 580-596. doi: 10.5937/vojtehg66-16670
[25] Rai, N., & Chansarkar, S. (2017). Cyberspace Security : An Overview for Beginners. Defence Science Journal, 67(4), 483. doi: 10.14429/dsj.67.11542
[26] S, D., & S, R. (2014). PERFORMANCE COMPARISON FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK WITH KDD
[27] LeCun, Y., Bengio, Y. and Hinton, G., 2015. Deep learning. Nature, 521(7553), pp.436-444.
[28] Murata, N., Yoshizawa, S. and Amari, S., 1994. Network information criterion-determining the number of hidden units for an artificial neural network model. IEEE Transactions on Neural Network’s, 5(6), pp.865-872.
[29] Xu, K., Wang, X., Wei, W., Song, H. and Mao, B., 2016. Toward software defined smart home. IEEE Communications Magazine, 54(5), pp.116-122.
[30] Hasan, M., Nasser, M., Ahmad, S. and Molla, K., 2016. Feature Selection for Intrusion Detection Using Random Forest. Journal of Information Security, 07(03), pp.129-140.
Citation
Susheel Kumar Tiwari, Manmohan Singh, Rahul Sharma, "Bi-Directional Recurrent Neural Network for IDS in the Internet of Things," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1227-1235, 2019.
Analytical Solution of Steady Hydromagnetic Flow Bounded by Two Concentric Circular Cylinders in a Porous Medium
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1236-1238, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.12361238
Abstract
In this study the steady hydromagnetic flow of fluid between two porous concentric circular cylinders is consider. The fluid isconsider as viscous, incompressible, conducting. The equation of motion and the constitutive equations form a system of non-linear ODEs that is investigated analytically, and in a few cases the numerical results are compared with a known numerical solution. Numerical computations show the effect of the non-Newtonian quantities on the velocity and on the shear stress as the dimensionless parameters are varied. It is supposed that the rate of suction at the inner cylinder is equal to the rate of injection at the outer.
Key-Words / Index Term
hydromagnetic flow, porous medium, viscous, incompressible, conducting fluid.
References
[1] Z. Abbas, J. Hasnaina, and M. Sajid, “Hydromagnetic mixed convective two-phase flow of couple stress and viscous fluids in an inclined channel,” Zeitschriftfür Naturforschung A, vol. 69, no. 10-11, pp. 553–561, 2014.
[2] J. C. Umavathi, A. J. Chamkha, A. Mateen, and A. Al-Mudhaf, “Unsteady two-fluid flow and heat transfer in a horizontal channel,” Heat and Mass Transfer, vol.42, no.2, pp. 81–90, 2005.
[3] ShercliffJ.A.Proc. Comb. Phil. Soci, 49 (1953), 136.
[4] Chang C.C. and Lundgren, T.S., ZAMP, 12 (1961), 100.
[5] Edward, R.D’SA ZAMS 17,140, 1966.
[6] Singh D. and Rizvi, Phys. Fluids, 7, 285, 1964.
[7] Singh, G.S.Jour. Sci. Engg. Res., 9, 284, 1965.
[8] MahapatraJ.R.Appl. Sci. Res, 27, 274, 1973.
[9] Sengupta P.R. and Ghosh, S.K., Gzech, Jour. Phys. 25, 514, 1975.
[10] Roy Chowdhury, S.K. Ind, Jour. Theo. Phys, 31, 137, 1983.
[11] Ahmadi O. and Manvi, R. Ind. Jour. Tech, 9, 441, 1971.
[12] Gulabram and Mishra, R.S.Ind. Jour. Pure. Appl: Math., 8, 637, 1977.
[13] Biswas, D., Blood Flow Models: A Comparative Study, Mittal Publications, New Delhi, India, 2000.
[14] Pedley, T.J., The Fluid Mechanics of Large Blood Vessels, Cambridge University Press, London, 1980.
[15] Haynes, R.H., Physical Basis of The Dependence of Blood Viscosity on Tube Radius, Am. J.Physiol, 198(6), 1193-1200, 1960.
[16] Cowin, S.C., The Theory of Polar Fluids, Adv. Appl. Mech, 14, 179-347, 1974.
[17] Skalak, R., Theoretical Models on Capillary Flow, Blood Cells, 8, 147-152, 1982.
[18] Mann, D.E. and Trarbell, J.M., Flow of Non-Newtonian Blood Analog Fluids in Rigid Curved and Straight Artery Models, Biorheology, 27, 711-733, 1990.
[19] Biswas, D. and Nath, A., Poiseuille Flow of Power-Law Fluid Model for Blood Flow with Velocity Slip, Journal of Assam University, 6(1), 1-13, 2001.
[20]Bugliarello, G. and Hayden, J.W., High speed Microcinematographic Studies of Blood Flow in Vitro, Science, 138, 981-983, 1982.
[21]Bugliarello, G and Sevilla, J., Velocity Distribution and Other Characteristics of Steady and Pulsatile Blood in Fine Glass Tubes, Biorheology, 7, 85-107, 1970.
[22]Young, D.F. and Tsai, F.Y., Flow Characteristics in Models of Arterial stenosis-I: Steady Flow, J.Biomech. 6, 395-411, 1973.
Citation
Anup Kumar Karak, "Analytical Solution of Steady Hydromagnetic Flow Bounded by Two Concentric Circular Cylinders in a Porous Medium," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1236-1238, 2019.
Deep Learning-based Hybridized LSTM model for Gesture Recognition
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1239-1246, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.12391246
Abstract
In Human-Computer Interaction, gesture recognition is a prominent topic. Human-computer interaction (HCI) allows computers to recognize and interpret human gestures as commands. Gesture recognition is important for ease of use to operate computer machines. It has wider range of applications in the area like talking with machine, medical operation, computer game control, control of home appliances, car control driving and communication. In this research work A real-time Hand Gesture Recognition System is proposed with hybrid approach of Convolution Neural Network (CNN) and the Recurrent Neural Network (RNN). Moreover experimentation with pre-trained VGG16 is carried out with LSTM. Here LSTM is used to replace the final three layers of the VGG16 architecture, and a soft-max layer is used to produce the output. The integrated model is recognizing both static and dynamic hand motions. Proposed model has obtained training accuracy as 92.71% and validation accuracy is 87.50%.
Key-Words / Index Term
Convolution Neural Network (CNN), Human-Computer Interaction (HCI), Recurrent Neural Network (RNN), LSTM (Long Short Term Memory)
References
[1] Sanmukh Kaur, Anuranjana, “Electronic Device Control Using Hand Gesture Recognition System for Differently Abled”, 8th International Conference on Cloud Computing, Data Science & Engineering, 2018.
[2] Youngwook Kim And Brian Toomajian, “Hand Gesture Recognition Using Micro-Doppler Signatures With Convolutional Neural Network”, IEEE Access Vol.4, 2016.
[3] Soeb Hussain, Rupal Saxena, Xie Han, Jameel Ahmed Khan, Hyunchul Shin, “Hand Gesture Recognition Using Deep Learning”, International SoC Design Conference, 2017.
[4] Md Rashedul Islam, Rasel Ahmed Bhuiyan, Ummey Kulsum Mitu, Jungpil Shin, “Hand Gesture Feature Extraction Using Deep Convolutional Neural Network for Recognizing American Sign Language”, 4th International Conference on Frontiers of Signal Processing, 2018.
[5] Panwar, M., February. Hand gesture recognition based on shape parameters. In 2012 international conference on computing, communication and applications, pp.1-6, 2012. IEEE.
[6] Zhang, L.G., Chen, Y., Fang, G., Chen, X. and Gao, W., October. A vision-based sign language recognition system using tied-mixture density HMM. In Proceedings of the 6th international conference on Multimodal interfaces, pp.198-204, 2004.
[7] Molchanov, P., Gupta, S., Kim, K. and Pulli, K., May. Multi-sensor system for driver`s hand-gesture recognition. In 2015 11th IEEE international conference and workshops on automatic face and gesture recognition (FG), Vol.1, pp.1-8, 2015. IEEE.
[8] Jing-Hao Sun, Shu-Bin Zhang, “Research on the Hand Gesture Recognition Based on Deep Learning”, 12th International Symposium on Antennas, Propagation and EM Theory, 2018.
[9] Anush Ananthakumar, “Efficient Face and Gesture Recognition for Time Sensitive Application”, IEEE Southwest Symposium on Image Analysis and Interpretation, 2018.
[10] Mohd. Baqir Khan, Kavya Mishra, Mohammed Abdul Qadeer, “Gesture Recognition using Open-CV”, 7th International Conference on Communication Systems and Network Technologies, 2017.
[11] Arathi P.N, S.Arthika, S.Ponmithra, K.Srinivasan, V.Rukkumani, "Gesture-Based Home Automation System", 2017 International Conference on Nextgen Electronic Technologies: Silicon to Software, 2017.
[12] Kenneth Lai and Svetlana N. Yanushkevich, “CNN+RNN Depth and Skeleton based Dynamic Hand Gesture Recognition”, 24th International Conference on Pattern Recognition, 2018.
[13]. P Raghu Veera Chowdary, M Nagendra Babu, Thadigotla Venkata Subbareddy, Bommepalli Madhava Reddy, V Elamaran, “Image Processing Algorithms for Gesture Recognition using Communication Control and Computing Technologies, 2014.
[14]. Chih-Hung Wu and Chang Hong Lin, “Depth-based hand gesture recognition for home appliance control”, IEEE 17th International Symposium on Consumer Electronics, 2013.
[15] Ransalu Senanayake, Sisil Kumarawadu, “A Robust Vision-based Hand Gesture Recognition System for Appliance Control in Smart Homes”, IEEE International Conference on Signal Processing, Communication and Computing, 2012.
[16] Archana S. Ghotkar, Rucha Khatal, Sanjana Khupase, Surbhi Asati &Mithila Hadap, “Hand Gesture Recognition for Indian Sign Language”, International Conference on Computer Communication and Informatics, 2012.
[17] Lan Tiantian, Shen Jinyuan, Liu Runjie, Guo Yingying, “Hand Gesture Recognition Based on Improved Histograms of Oriented Gradients”, The 27th Chinese Control and Decision Conference, 2015.
[18] Guillaume Plouffe and Ana-Maria Cretu, “Static and Dynamic Hand Gesture Recognition in Depth Data Using Dynamic Time Warping”, IEEE Transactions on Instrumentation and Measurement, Vol.65, Issue.2, 2016.
[19] Dong-Woo Lee, Jeong-Mook Lim, John Sunwoo, Il-Yeon Cho and Cheol-Hoon Lee, “Actual Remote Control: A Universal Remote Control using Hand Motions on a Virtual Menu”, IEEE Transactions on Consumer Electronics, Vol.55, Issue.3, 2009.
[20] Bin Xie1, Xiaoyu He1, Yi Li1, “RGB-D static gesture recognition based on convolutional neural network”, The Journal of Engineering, Vol. 2018, Issue.16, 2018.
[21] Nikam, A.S. and Ambekar, A.G., November. Sign language recognition using image based hand gesture recognition techniques. In 2016 online international conference on green engineering and technologies (IC-GET), pp.1-5, 2016. IEEE.
[22] Haria, A., Subramanian, A., Asokkumar, N., Poddar, S. and Nayak, J.S., Hand gesture recognition for human computer interaction. Procedia computer science, 115, pp.367-374, 2017.
[23] Oyedotun, O.K. and Khashman, A., 2017. Deep learning in vision-based static hand gesture recognition. Neural Computing and Applications, Vol.28, Issue.12, pp.3941-3951, 2017.
[24] Hussain, S., Saxena, R., Han, X., Khan, J.A. and Shin, H., 2017, November. Hand gesture recognition using deep learning. In 2017 International SoC design conference (ISOCC), pp.48-49, 2017. IEEE.
[25] Lu, W., Tong, Z. and Chu, J., 2016. Dynamic hand gesture recognition with leap motion controller. IEEE Signal Processing Letters, Vol.23, Issue.9, pp.1188-1192, 2016.
[26] De Smedt, Q., Wannous, H. and Vandeborre, J.P., 2016. Skeleton-based dynamic hand gesture recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp.1-9, 2016.
[27] Xu, P., 2017. A real-time hand gesture recognition and human-computer interaction system. arXiv preprint arXiv:1704.07296.
[28] Sun, J.H., Ji, T.T., Zhang, S.B., Yang, J.K. and Ji, G.R., 2018, December. Research on the hand gesture recognition based on deep learning. In 2018 12th International symposium on antennas, propagation and EM theory (ISAPE), pp.1-4, 2018. IEEE.
[29] Devineau, G., Moutarde, F., Xi, W. and Yang, J., 2018, May. Deep learning for hand gesture recognition on skeletal data. In 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), pp.106-113, 2018. IEEE.
[30] Zengeler, N., Kopinski, T. and Handmann, U., 2018. Hand gesture recognition in automotive human–machine interaction using depth cameras. Sensors, Vol.19, Issue.1, p.59, 2018.
[31] Kellogg, B., Talla, V. and Gollakota, S., 2014. Bringing gesture recognition to all devices. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pp.303-316, 2014.
[32] Abdelnasser, H., Youssef, M. and Harras, K.A., 2015, April. Wigest: A ubiquitous wifi-based gesture recognition system. In 2015 IEEE conference on computer communications (INFOCOM), pp.1472-1480, 2015. IEEE.
[33] Fang, Y., Wang, K., Cheng, J. and Lu, H., 2007, July. A real-time hand gesture recognition method. In 2007 IEEE International Conference on Multimedia and Expo, pp.995-998, 2007. IEEE.
[34] Ren, Z., Yuan, J., Meng, J. and Zhang, Z., 2013. Robust part-based hand gesture recognition using kinect sensor. IEEE transactions on multimedia, Vol.15, Issue.5, pp.1110-1120, 2013.
[35] Lin, H.I., Hsu, M.H. and Chen, W.K., 2014, August. Human hand gesture recognition using a convolution neural network. In 2014 IEEE International Conference on Automation Science and Engineering (CASE), pp.1038-1043, 2014. IEEE.
Citation
Sunil D. Kale, "Deep Learning-based Hybridized LSTM model for Gesture Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1239-1246, 2019.