SVM Based Plant Diseases Detection using Image Processing
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1263-1266, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.12631266
Abstract
Plants are affected by a disease which leads to the variation in the growth stages of it’s and finally affects the throughput from it. Identification of the plant leaves diseases id the key role in preventing the losses in farming, where it’s a challenging to detect multi plant diseases. Here four major diseases affected by the plant are selected like Alternaria Alternata, Anthracnose, Bacterial Blight and Cercospora Leaf Spot and also addition with the healthy leaves using image processing technologies. The algorithm consist of a image pre-processing, image segmentation, feature extraction and finally with classification method.
Key-Words / Index Term
Image processing, Segmentation, Feature Extraction, Support Vector Machine, Gray-Level Cooccurrence Matrix (GLCM).
References
[1]. Naikwadi, NiketAmoda, “Advances in image processing for detection of plant diseases”, International journal of application or innovation in engineering and managrment(IJAIEM) Volume 2,Issue11,November 2013
[2]. Arti N. Rathod, Bhavesh A. Tanawala, Vatsal H. Shah, International Journal of Advance Engineer ing and Research Development (IJAERD) Volume 1,Issue 6,June 2014, e-ISSN: 2348 - 4470
[3]. Zulkifli Bin Husin, Abdul Hallis Bin Abdul Aziz, Ali Yeon Bin Md Shakaff Rohani Binti S Mohamed Farook, “Feasibility Study on Plant Chili Disease Detection Using Image Processing Techniques”, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.
[4]. Mrunalini R. Badnakhe, Prashant R. Deshmukh, “Infected Leaf Analysis and Comparison by Otsu Threshold and k-Means Clustering”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue, March 2012.
[5]. Prakash and K Thangadurai., 2016. Implementation of RGB and Grayscale Images in Plant Leaves Disease Detection – Comparative Study. Indian Journal of Science and Technology, Vol. 9, pp. 1-6.
Citation
Bharath Kumar R, Balakrishna K, Shreyas M S, Sonu S, Anirudh H, Abhishek B J, "SVM Based Plant Diseases Detection using Image Processing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1263-1266, 2019.
A Novel Approach of Cooperative Sharing Based On Hybrid Relaying Scheme of Chase Algo and Decode & Forward Using Fuzzy Logic in Cognitive Radio
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.1267-1270, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.12671270
Abstract
Throughput of Cooperative network can be enhanced by using different relay selection scheme ,therefore interest in relay selection is going upwards .It an open research topic these days.We proposed a relay selection algorithm named as chase algorithm which select the best relay on the basis of some parameters like SNR, channel allocation, power allocation ,interference constraint .Further at every relay node, Decode & Forward protocol is used for removing the noise in further stages .Finally with the help of fuzzy controller in which the SNR,channel allocation ,power allocation,interference constraint are the fuzzy parameters ,we propose an expected model that reduce some computational load and enhance the channel rate.
Key-Words / Index Term
CooperativeCommunication , ChaseAlgo, Decode and forward , FuzzyLogic
References
[1] F. Fitzek and M. Katz, Cooperation in Wireless Networks. Dordrecht, The Netherlands: Springer, 2006
[2] T.Otsu,Y.Aburakawa and Y.Yamao,Multihop Wireless link system for new generation mobile radio access network ,IEICE Trans.Comm,volE85-B,no.8,Aug2002,pp.1542-1551
[3] Proc. IEEE Dyn. Spectrum (DySPAN) Conf. 2005 and 2007, New York.
[4] Kharat, P. and J. Gavade, Cooperative communication: New trend in wireless communication. International Journal of Future Generation Communication and Networking, 2013. 6(5): p. 157- 166.
[5] Wang, C.-L. and S.-J. Syue. A geographic-based approach to relay selection for wireless ad hoc relay networks. in Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th. 2009. IEEE.
[6] Tanoli, U., et al., Performance analysis of cooperative networks with inter-relay communication over Nakagami-m and rician fading channels. International Journal on Multidisciplinary sciences, 2012. 3(4): p. 24-29.
[7] Tanoli, U., et al., Comparative analysis of fixed-gain relaying schemes for inter-relay communication over Nakagami-m fading channel. Sindh University Research Journal-SURJ (Science Series), 2013. 45(1).
[8] Wang, C.-L. and S.-J. Syue. A geographic-based approach to relay selection for wireless ad hoc relay networks. in Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th. 2009. IEEE.
[9] Madan, R., et al., Energy-efficient cooperative relaying over fading channels with simple relay selection. IEEE Transactions on Wireless Communications, 2008. 7(8): p. 3013-3025.
[10] Chen, Y., et al. Power-aware cooperative relay selection strategies in wireless ad hoc networks. in 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications. 2006. IEEE.
[11] Li, Y., et al., Fair relay selection in decode-and-forward cooperation based on outage priority. Science China Information Sciences, 2013. 56(6): p. 1-10.
[12] Ju, M., K.-S. Hwang, and H.-K. Song, Relay selection of cooperative diversity networks with interference-limited destination. IEEE Transactions on Vehicular Technology, 2013. 62(9): p. 4658-4665.
[13] Bletsas, A., et al., A simple cooperative diversity method based on network path selection. IEEE journal on Selected Areas in Communications, 2006. 24(3): p. 659-672.
[14] Fei, L., et al., Relay selection with outdated channel state information in cooperative communication systems. IET Communications, 2013. 7(14): p. 1557-1565.
[15] Brante, G., et al., Distributed fuzzy logic-based relay selection algorithm for cooperative wireless sensor networks. IEEE sensors journal, 2013. 13(11): p. 4375-4386.
[16] Chen, M., T.C.-K. Liu, and X. Dong, Opportunistic multiple relay selection with outdated channel state information. IEEE Transactions on Vehicular Technology, 2012. 61(3): p. 1333-1345.
[17] Kumar A.R, Information Technology:principles & applications prentice hall of india privet Ltd,2004,pp-409-496
Citation
Vasundhara, Avtar Singh Buttar, "A Novel Approach of Cooperative Sharing Based On Hybrid Relaying Scheme of Chase Algo and Decode & Forward Using Fuzzy Logic in Cognitive Radio," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1267-1270, 2019.
Cluster Based Secured Data Transmission using Hybrid Cryptography Techniques in Wireless Sensor Network
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1271-1276, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.12711276
Abstract
Security in the Wireless Sensor Network plays an important role and can be achieved by cryptographic algorithms. The cryptography is the science and art of transforming messages to make them secure and immune to attacks by authenticating the sender and receiver within the network. The Proposed methodology, hybrid cryptographic technique has combined Blowfish algorithm for symmetric and Elliptic Curve Diffie-Hellman algorithm for asymmetric. Blowfish algorithm provides high speed encryption process when compared with the other symmetric algorithms. The Elliptic Curve Diffie-Hellman algorithm combines the concept of elliptic curve and Diffie-Hellman key exchange algorithm. Hence, it provides more security compared to other asymmetric algorithm and the key exchange mechanism. Cluster based trust Management approaches are used to identify unauthorized user in WSN. It first identifies the trusted nodes in networks, then send packets through that trusted nodes. Trusted nodes are identified based on trust values to identify the neighboring nodes during verification process for improving the Packet Delivery Ratio and Energy Consumption.
Key-Words / Index Term
Sensor node, Elliptic Curve, Blowfish, Diffie-Hellman, Trust Node Calculation, WSN
References
[1]. Asha Rani Mishra, Mahesh Singh “Elliptic Curve Cryptography (ECC) For Security in Wireless sensor Network” International Journal of Engineering Research and Technology (IJERT), vol-1,Issue-3,may-2012.
[2]. Madhumita Panda “Security in Wireless Sensor Networks using Cryptographic Techniques” American Journal of Engineering Research (AJER) , Volume-03, Issue-01, pp(50-56)-2014.
[3]. kamulu Deepthi, Krishnachaitanya,.Katkam “Wireless Sensor Networks Security Survey Using Cryptography” International Journal Of Emerging Trends & Technology In Computer Science (IJETTCS), Volume 5, Issue 5, September - October 2016.
[4]. Mohamed Elhoseny , Hamdy Elminir , Alaa Riad , Xiaohui Yuan “A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption” Journal of King Saud University – Computer and Information Sciences, pp( 262–275), ELSEVIER-2016.
[5]. Abdullah Smadi, Hesham Enshasy, Qasem Abu Al-Haija “Estimating Energy Consumption of Diffie-Hellman Encrypted Key Exchange (DH-EKE) for Wireless Sensor Network” International Conference On Intelligent Techniques In Control, Optimization And Signal Processing, IEEE-2017.
[6]. Preetika Joshi, Manju verma, Pushpendra R Verma “Secure Authentication Approach Using DiffieHellman Key
Exchange Algorithm for WSN” International Conference on Control,Instrumentation, Communication and
Computational Technologies (lCCICCT), IEEE-2015.
[7].Chaitali Haldankar, Sonia Kuwelkar “IMPLEMENTATION OF AES AND BLOWFISH ALGORITHM” International Journal of Research in Engineering and Technology (IJRET) , Volume-3 Special Issue-3,May- 2014 .
[8].Shamina Ross.B, Josephraj.V “ Performance Enhancement of Blowfish Encryption Using RK-Blowfish Technique” International Journal of Applied Engineering Research(IJAER) , Volume 12, pp( 9236-9244) – 2017.
[9].Rajat Soni, Deepak Sethi, Partha Pratim Bhattacharaya “ ANALYSIS OF VARIOUS CRYPTOGRAPHIC ALGORITHMS FOR SECURITY IN WIRELESS SENSOR NETWORKS” International Journal For Advance Research In Engineering And Technology(IJARE), Volume-4, Issue-V, May-2016.
[10]. Juan Li “A Symmetric Cryptography Algorithm in Wireless Sensor Network Security” International journal of
online Engineering ((iJOE) ‒ Vol 13,2017.
[11]. Huang Lu, Jie Li, Mohsen Guizani “Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEM - 2013.
[12]. Thiruppathy Kesavan Venkatasam, Radhakrishnan Shanmugasundaram “ Authentication in Wireless Sensor Networks Using Dynamic Keying Technique” International Journal of Intelligent Engineering and Systems (IJIES), Vol.9, No.3, 2016.
[13]. Usha.A, Dr.Subramani.A “Performance Study of Key Developer Data Encryption and Decryption Algorithm (KDDEDA) with AES, DES and BLOWFISH” International Journal Of Engineering And Computer Science (IJEC), Volume 5, Issue 12, Pp( 19596-19611), Dec- 2016
Citation
V. Perumal, K. Meenakshi Sundaram, "Cluster Based Secured Data Transmission using Hybrid Cryptography Techniques in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1271-1276, 2019.
Crop Recommendation System for Precision Agriculture
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1277-1282, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.12771282
Abstract
Crop forecasting or prediction is the art of predicting crop yields and production before the harvest actually takes place, typically a couple of months in advance. Crop forecasting relies on computer programs that describe the plant-environment interactions in quantitative terms. The soil testing program starts with the collection of a soil sample from a field. The first basic principle of soil testing is that a field can be sampled in such a way that chemical analysis of the soil sample will accurately reflect the field’s true nutrient status.
Key-Words / Index Term
Precision Agriculture, Recommendation system, Ensemble model, Majority Voting technique, K-Nearest Neighbour.
References
[1]Satish Babu (2013), ‘A Software Model for Precision Agriculture for Small and Marginal Farmers’,at the International Centre for Free and Open Source Software (ICFOSS) Trivandrum, India.
[2]AnshalSavla, Parul Dhawan, HimtanayaBhadada, Nivedita Israni, Alisha Mandholia ,Sanya Bhardwaj (2015), ‘Survey of classification algorithms for formulating yield prediction accuracy in precision agriculture`, Innovations in Information,Embedded and communication systems (ICIIECS).
[3]Aakunuri Manjula, Dr.G .Narsimha (2015), ‘XCYPF: A Flexible and ExtensibleFramework for Agricultural Crop Yield Prediction’ , Conference on Intelligent Systems and Control (ISCO)
[4]Yash Sanghvi, Harsh Gupta, Harmish Doshi, DivyaKoli, AmoghAnshDivyaKoli, Umang Gupta (2015), ‘Comparison of Self Organizing Maps and Sammon’s Mapping on agricultural datasets for precision agriculture’, International Conference on Innovations in Information,Embedded and Communication systems (ICIIECS).
[5]Rakesh Kumar, M.P. Singh, Prabhat Kumar and J.P. Singh (2015), ’Crop Selection Method to Maximize Crop Yield Rate using Machine Learning Technique’, International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).
[6]A.T.M Shakil Ahamed, NavidTanzeem Mahmood, Nazmul Hossain, Mohammad Tanzir Kabir, Kallal Das, Faridur Rahman, Rashedur M Rahman (2015) , ‘Applying Data Mining Techniques to Predict Annual Yield of Major Crops and Recommend Planting Different Crops in Different Districts in Bangladesh’ , (SNPD) IEEE/ACIS International Conference.
[7]Liying Yang (2011), ‘Classifiers selection for ensemble learning based on accuracy and diversity’ Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS].
[8]Tapas Ranjan Baitharua, Subhendu Kumar Panib (2016), ‘Analysis of Data Mining Techniques for Healthcare Decision Support System Using Liver Disorder Dataset’ International Conference on Computational Modeling and Security (CMS).
[9]Aymen E Khedr, Mona Kadry, Ghada Walid (2015), ‘Proposed Framework for Implementing Data Mining Techniques to Enhance Decisions in Agriculture Sector Applied Case on Food Security Information Center Ministry of Agriculture, Egypt’, International Conference on Communications, management, and Information technology (ICCMIT`) .
[10]Monali Paul, Santosh K. Vishwakarma, Ashok Verma (2015), ‘Analysis of Soil Behaviour and Prediction of Crop Yield using Data Mining Approach’, International Conference on Computational Intelligence and Communication Networks.
Citation
Bharath Kumar R, Balakrishna K, Bency Celso A, Siddesha M, Sushmitha R, "Crop Recommendation System for Precision Agriculture," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1277-1282, 2019.
Automatic Speech Recognition of Alveolar Rhotic and Retroflex Rhotic Phonemes of Malayalam Language
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1283-1286, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.12831286
Abstract
Development of speech recognition systems in local languages will help anyone to make use of the technological advancement of the speech recognition . In India, speech recognition systems have been developed for many indigenous languages, however very less work has been done in Malayalam Language. Malayalam language is famous for its unique phonemes. Hence one of the main objectives of this work is to explore the Alveolar and Retroflex phonemes of Malayalam language which has unique phonetic realizations.
Key-Words / Index Term
Automatic Speech Recognition , Malayalam , Phonome
References
[1] Sorin Dusan and Larry R. Rabiner, “On integrating insights from human speech perception into automatic speech recognition,” in Proceedings of INTERSPEECH 2005, Lisbon, 2005.
[2] HILL, D. R. (1971). Man-machine interaction using speech. In Advances in Computers, 11. Eds F. L. Alt, M. Rubinoff & M. C. Yovitts, pp. 165-230. New York: Academic Press.
[3] Balaji. V., K. Rajamohan, R. Rajasekarapandy, S. Senthilkumaran,"Towards a knowledge system for sustainable food security: The information village experiment in Pondicherry," in IT Experience in India : Bridging the Digital Divide, Kenneth Keniston and Deepak Kumar, eds., New Delhi, Sage,2004.
[4] G. Doddington, (1989), "Phonetically Sensitive Discriminants for Improved Speech Rec.", Proc. IEEE Int Conf. Acoustics. Speech and Sig. Proc., ICASSP-89, pp. 556-559, Glasgow, Scot- land.
[5]Itakura F (1975) Minimum prediction residual principle applied to speech recognition. IEEE Trans Acoustics Speech Signal Process ASSP 23:52–72
[6] Miyatake, M. Sawai, H., & Shikano, K. (1990). Integrated Training for Spotting Japanese Phonemes Using Large Phonemic Time-Delay Neural Networks. In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, 1990.
[7] Kimura, S. (1990). 100,000-Word Recognition Using Acoustic-Segment Networks. In Proc.IEEE International Conference on Acoustics, Speech, and Signal Processing.
[8]K.-F. Lee, Large-vocabulary speaker-independent continuous speech recognition: The Sphinx system, Ph.D. Thesis, Carnegie Mellon University, 1988.
[9] Jurafsky, Daniel, and James H. Martin. 2009. Speech and Language Processing: An Introduction to Natural Language Processing, Speech Recognition, and Computational Linguistics. 2nd edition. Prentice-Hall.
[10] Bahl, L. R. et al. (1978). Automatic Recognition of Continuously Spoken Sentences from a Finite State Grammar. In Proc ICASSP, pp. 418-421.
[11] Young, S., Evermann, G., Kershaw, D., Moore, G., Odell, J., Ollason, D., Povey, D.,Valtchev, V. and Woodland, P. (2002). The HTK Book (for HTK Version 3.2).Microsoft Corporation and Cambridge University Engineering Department,England.
[12] Young (1996). "Large Vocabulary Continuous Speech Recognition." IEEE Signal Processing Magazine 13(5): 45-57
13] Punnoose, R. (2010). An Auditory and Acoustic Study of Liquids in Malayalam. Ph.D. Thesis, Newcastle University, Newcastle, UK
[14] J. Holmes (1988). Speech synthesis and recognition. Van Nostrand Reinhold (UK) Co. Ltd., Wokingham.
Citation
Cini Kurian, "Automatic Speech Recognition of Alveolar Rhotic and Retroflex Rhotic Phonemes of Malayalam Language," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1283-1286, 2019.
Data Analysis and Data Visualization using Python
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1287-1291, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.12871291
Abstract
Data analysis and data visualization is the requirement of today’s organization. Data science is a field that relates to data cleansing, preparation and analysis. Data science algorithms are used in many industries like Internet searches, Digital Advertisements, Travelling, Healthcare, Gaming, Financial services etc. There are various applications in today’s world where data analysis and data visualization is required. Data science can solve the problems like classification, identifying anomalies, to quantify, finding way of organization, decision making issues etc. In this paper, we have shown how python is useful and acts as a key to solve such problems. In addition to python, there are also some other platforms which are used to solve a task completely based on data science. Here we have focused on python and it’s packages that are highly useful for data science based problems. We have shown how python can be used for data analysis and data visualization.
Key-Words / Index Term
Data Science, Python, Data analysis, Data Visualization
References
[1]. Javin D. West, “The science of data science”,
Journal of Integrated creative studies, No. 2016-010-e, May 2016.
[2]. Wes McKinney, “pandas: a Foundational Python Library for DataAnalysis and Statistics”, DLR Portal, www.dlr.de/sc/Portaldata/15/Resources/dokument e/.../pyhpc2011_submission_9.pdf.
[3]. Gaurav, Zunaid Alam, “Road Safety in india using Data Mining Approach”, International Conference, REDSET 2017, CCIS 799, https://doi.org/10.1007/978-981-10-8527-7_17
[4]. Rosa Filguiera, Iraklis Klampanos, Amrey Krause, Mario David, Alexander Moreno and Malcolm Atkinson, “A Python Framework for Data-Intensive Scientific Computing”, IEEE Conference, 978-1-4673-6750-9, Nov-2014.
[5]. Ing. Zdena Dobesova, “Programming Language Python for Data Processing”, IEEE Conference, 978-1-4244-8165-1/11, Sept-2011.
[6]. Fabien Dubosson , Stefano Bromuri, and Michael Schumacher, “A Python Framework for Exhaustive Machine Learning Algorithms and Features Evaluations “, IEEE Conference, 1550-445X/16, March-2016.
[7]. Ankur Bhatia, “Artificial Intelligence – Making an Intelligent personal assistant”, International Journal of Computer Science and Engineering, Vol. 6, No. 6, 2015.
[8]. Nurul Afiqah Mat Zaib , Nor Erne Nazira Bazin, Noorfa Haszlinna Mustaffa , Roselina Sallehuddin, “Integration of System Dynamics with Big Data Using Python: An Overview”, IEEE Conference, 978-1-5090-6255-3/17, May 2017.
Citation
Nitin Kumar, Gaurav, "Data Analysis and Data Visualization using Python," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1287-1291, 2019.
Network Intrusion Detection Exploitation Machine Learning Strategies with the Utilization of Feature Elimination Mechanism
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1292-1300, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.12921300
Abstract
The momentous concerns is to discard irrelevant features to boost up the detection rate. There are major problems associated with the feasibility and tolerance with the inception of recent technologies. To realize this objective, we tend to illustrate our model manipulating recursive feature elimination mechanism to reject inutile attributes that are operated on Decision Tree Classifier (DTC) and random forest algorithm (RFA). The experiment is carried on New Subset Labeled version of the KDD`99 dataset (NSL-KDD) dataset that is associated degree updated version of Knowledge Discovery and Data Mining 1999 (KDD’99) dataset. The proposed methodology is discriminated with other strategies illustrated by the previous researchers. It is classified into four distinct categories illustrates the attack classes and one as normal traffic. The model’s capability has been increased to thirteen category classification to compare the tolerance when the number of attack categories will increase. It offers excellent performance analysis metrics to assess the exploitation of our model.
Key-Words / Index Term
Intrusion Detection System, DTC, RFA, KDD, Machine Learning
References
[1] N. Shone, T. N. Ngoc, Vu Dinh Phai, and Qi Shi, “A Deep Learning Approach to Network Intrusion Detection”, IEEE Transactions on Emerging Topics in Computational Intelligence, Vol. 2, NO. 1, pp. 41-50, Feb. 2018.
[2] Z. Liang, G. Zhang, J. X. Huang, and Q. V. Hu, “Deep learning for healthcare decision making with EMRs,” In the Proceedings of the 2014 IEEE International Conference on Bioinformatics. Biomed., pp. 556–559, Nov. 2014.
[3] L. You, Y. Li, Y. Wang, J. Zhang, and Y. Yang, “A deep learning-based RNNs model for an automatic security audit of short messages,” In the Proceedings of the 16th International Symposium on Communications and Information Technologies, Qingdao, China, pp. 225–229, Sep. 2016.
[4] A. Luckow, M. Cook, N. Ashcraft, E. Weill, E. Djerekarov, and B. Vorster, “Deep learning in the automotive industry: Applications and tools,” In the Proceedings of IEEE International Conference on Big Data, pp. 3759–3768. Dec. 2016.
[5] R. Polishetty, M. Roopaei, and P. Rad, “A next-generation secure cloud-based deep learning license plate recognition for smart cities,” Proceedings of 15th IEEE International Conference on Machine Learning Application, Anaheim, CA, USA, pp. 286–293, Dec. 2016.
[6] H. Lee, Y. Kim, and C. O. Kim, “A deep learning model for robust wafer fault monitoring with sensor measurement noise,” IEEE Transaction Semicond. Manuf., vol. 30, no. 1, pp. 23–31, Feb. 2017.
[7] F. Falcini, G. Lami, and A. M. Costanza, “Deep learning in automotive software,” IEEE Softw., vol. 34, no. 3, pp. 56–63, May 2017.
[8] S. P. Shashikumar, A. J. Shah, Q. Li, G. D. Clifford, and S. Nemati, “A deep learning approach to monitoring and detecting atrial fibrillation using wearable technology,” in Proc. IEEE EMBS Int. Conf. Biomed. Health Information, FL, USA, pp. 141–144, 2017.
[9] C. Yin, Y. Zhu, J. Fei, and X. He, “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks” IEEE Access, vol. 5, pp. 21954–21961, Nov. 2017.
[10] D. Farid, N. Harbi, and Z. Rahman, "Combining Nave Bayes and Decision Tree for Adaptive Intrusion Detection," International Journal of Network Security & Its Applications, Vol. 2, No. 2, pp. 12-25, April 2010.
[11] J. Zhang, M. Zulkernine, A. Haque, “Random-Forests-Based Network Intrusion Detection Systems,” IEEE Transactions on Systems, pp. 649–659, Sep 2008.
[12] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ‘‘Deep learning approach for network intrusion detection in software-defined networking,’’ In the Proceedings of 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258–263, Oct. 2016.
[13] B. Senthilnayaki, K. Venkatalakshmi, and A. Kannan, " Intrusion Detection Using Optimal Genetic Feature Selection and SVM based Classifier," In the Proceedings of 3rd International Conference on Signal Processing Communication and Networking (ICSCN) Intrusion, pp.1–4,2015.
[14] L. Dhanabal, S. P. Shantharajah "A Study on NSL_KDD Dataset for Intrusion Detection System Based on Classification Algorithms," International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, issue 6, pp. 446-452, June 2015.
[15] F. Zhang, and D. Wang, "An Effective Feature Selection Approach for Network Intrusion Detection," In the Proceedings of Eighth International Conference on Networking, Architecture, and Storage, 2013.
Citation
Safura A. Mashayak, Balaji R. Bombade, "Network Intrusion Detection Exploitation Machine Learning Strategies with the Utilization of Feature Elimination Mechanism," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1292-1300, 2019.
Deadlock Analysis of Hybrid Lottery scheduling algorithm using Markov Chain model
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1301-1318, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13011318
Abstract
CPU scheduling defines the policy for deciding which of the available process in ready queue will be dispatched next to CPU by the scheduler; so that the resource utilization and overall performance of the system could be improved. Many traditional CPU scheduling algorithms have been proposed by several authors. Lottery scheduling is one of the well organized random based scheduling algorithms. It has random based ticket allocation algorithm in which one or more tickets are randomly assigned to each Process and when CPU becomes available the winner process is selected next for assignment. In this paper, we calculated the performance of the deadlock condition. The state transition from one process to another process is done by using Markov chain model and also data set based approach is used to study different transition states. The overall performances in terms of unequal and equal numerical data set are analyzed and then comparative analysis is performed to justify the results.
Key-Words / Index Term
Multiprocessing Environment ,Markov chain, CPU- scheduling, lottery scheduling, Process ,Deadlock Condition.
References
[1]. D. Shukla & S. Ojha(2010). “Deadlock index analysis of multi-level queue scheduling in operating system using data model approach”, GESJ, 6(29), pp. 93-110.
[2]. Ruesh sendre & R.Singhai(2018). “Deadlock Analysis of Improved Round Robin CPU Scheduling Algorithm Using Markov Chain Model ,IJREAM 4(4) .
[3]. A. Silberschatz, P.B. Galvin & G. Gagne (2016). Operating Systems Concepts, 9th edition, John Wiley & Sons Publication.
[4]. D.M. Dhamdhere, (2012). Operating Systems: A Concept Based Approach, 3rd edition, Tata McGraw-Hill Publication.
[5]. Petrou, D., Milford, J. W., & Gibson, G. A. (1999). “Implementing Lottery Scheduling: Matching the Specializations in Traditional Schedulers”. In USENIX Annual Technical Conference, General Track , pp. 1-14.
[6]. Carl.A.Waldspurger, & William E. Weihl(1994). “Lottery scheduling Flexible Proportional –share resource management”. IT laboratory for computer science, Cambridge.
[7]. Shweta Ojha & Saurabh jain (2011). “Hybrid Lottery multilevel queue scheduling with a Markov Model” GESJ Computer Science and Telecommunication, 03(32).
[8]. S. Reveliotis, &Z. Fei ( 2017). “Robust deadlock avoidance for sequential resource allocation systems with resource outages”, IEEE Transactions on automation science and engineering, 14(4), pp-1696-1711.
[9]. P. Kawadkar, S. Prasad & A.D. Dwivedi(2014). “Deadlock Avoidance based on banker’s algorithm for waiting state Processes”, IJISME, 2(12), pp. 1-2.
[10]. S. Srinivasan & R. Rajaram(2011).“A decentralized deadlock detection and resolution algorithm for generalized model in distributed systems”, Springer-Diatribe Parallel Databases, Vol 29, pp. 261-276.
[11]. D. Pandey & Vandana(2010). “Improved round robin policy a mathematical approach”, IJCSE, 2(4) pp. 948-964.
[12]. S.H. Yadgire & Y.B. Jadhav(2017).“Analysis of deadlock with fungible resources”, IJRSE, 3(3), pp. 290-294.
[13]. Y. Cai & W.K. Chan(2014). “Magiclock- scalable detection of potential deadlocks in large-scale multithreaded Programs”, IEEE Transaction on Software Engineering, 40(3), pp. 266-281.
[14]. Brzezinski J., Helary J.M., Raynal M. & Singhal M(2002).“Deadlock Models and a general algorithm for distributed deadlock detection”, Journal of Parallel & Distributed Computing, 31(2), pp. 112-126.
[15]. A. Nazeem, S. Reveliotis, Y. Wang & S. Lafortune(2011). “Designing compact and maximally permissive deadlock avoidance policies for complex resource allocation systems through classification theory: the linear case”, IEEE Transactions on automatic control, 66(8), pp. 1818-1833.
[16]. Y. Rosa, A. Shahyar & R. Vahid,( 2016). “A greedy algorithm versus metaheuristic solutions to deadlock detection in graph transformation systems”, JIFS, 31(1), pp. 137-149,
[17]. Manish Vyas, & Dr. Saurabh Jain(2016).”Stochastic Modeling for Analyzing Scalability Impact of Lottery Scheduling using Proportion Reformation“ International Journal Of Engineering And Computer Science ,6(10), pp. 18668-18674.
[18]. Manish Vyas,& Dr. Saurabh Jain(2016).” Comparative Study of Extensive Round Robin Scheduling by Data Model Approach under Markov Chain” International Journal of Recent Research Aspects, 3(2), pp. 92-100.
[19]. D.shukla & Sweta ojha(2010).”Prediction of Ready Queue Processing Time in Multiprocessor Environment Using Lottery Scheduling (ULS)” International Journal of the Computer, the Internet and Management Vol.18.pp 68-66.
[20]. D. Shukla & S. Jain,(2007). “A Markov chain model for multi-level queue scheduler in operating system”, Proceedings of the International Conference on Mathematics and Computer Science, ICMCS-07, pp. 622-626.
[21]. R. Sendre, R. Singhai& S. Jain(2018). “Markov Chain Analysis of Improved Round Robin CPU Scheduling Algorithm”, IJREAM, 3(4), pp. 728-737.
[22]. I.S. Rajput, & D. Gupta(2012). “A Priority based round robin CPU scheduling algorithm for real time systems”, IJIET, 1(3), pp. 01-11.
[23]. D. Shukla & S. Jain(2007) .“A Markov chain model for multi-level queue scheduler in operating system”, Proceedings of the International Conference on Mathematics and Computer Science, ICMCS-07, pp. 622-626.
[24]. D. Shukla & S. Jain(2007). “Deadlock State Study in Security Based Multilevel Queue Scheduling Scheme in Operating System”, Proceedings of National Conference on Network Security and Management, NCNSM-07, pp. 166-176.
[25]. J. Medhi(1991). “Stochastic Processes” Ed. 4, Wiley Limited (Fourth Reprint), New Delhi,
[26]. P.K. Jatav & R. Singhai(2018). “Comparative Study of CPU Scheduling Algorithms based on Markov Chain”, IJREAM, 4(3), pp. 668-672.
[27]. A.K. Gupta, N.S. Yadav & D. Goyal(2017). “Review of Round Robin CPU Scheduling Algorithm on Varying Time Quantum”, IJESI, 6(8), pp. 68-72.
[28]. A.S. Tenenbaum & A.S. Woodhull(2012). Operating Systems: Design and Implementation, 3rd edition, PHI Publication.
[29]. J. Medhi(1991). “Stochastic Models in Queuing Theory”, Academic Press Professional, Inc, San Diego, CA.
Citation
Pradeep kumarJatav, Rahul Singhai, Saurabh Jain, "Deadlock Analysis of Hybrid Lottery scheduling algorithm using Markov Chain model," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1301-1318, 2019.
An Exact Analytical Solution of Blast Wave Problem in Gas-Dynamics at Stellar Surface
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1319-1322, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13191322
Abstract
In the present analysis, an analytical approach is used to construct an exact solution of a problem of one-dimensional unsteady adiabatic flow of a blast wave propagation with generalized geometries at stellar surface in a plasma whose density ahead of the shock front is assumed to vary as a power law of the distance from the source of the point of explosion. The plasma is assumed to be an ideal gas. An analytical solution of the problem is find out in terms of flow parameters velocity, density and the pressure, which exhibits space-time dependence. In addition, an analytical expression has been derived for the total energy of the blast wave propagation at the stellar surface.
Key-Words / Index Term
Blast wave, Ideal gas-dynamics, Rankine-Hugoniot conditions, Stellar surface
References
[1] A. Sakurai, “On the propagation and structure of the Blast wave- I”, Journal of the Physical
Society of Japan, Vol. 8, pp. 662-665, 1953.
[2] J. L. Taylor, “An exact solution of the spherical Blast wave problem”, Philosophical Magazine, Vol. 46, pp. 317-320, 1955.
[3] L. I. Sedov, “Similarity and Dimensional Methods in Mechanics”, Academic Press, New York, 1959.
[4] M. H. Rogers, “Analytic solutions for the Blast-waves problem with an atmosphere of
varying density,” Astrophysical Journal, Vol.125, pp.478–493, 1957.
[5] D.D. Laumbach, R. F. Probeistein, “A point explosion in a cold atmosphere. Part II.
Radiating flow”, J. Fluid Mech., Vol. 40, pp. 833-858, 1969.
[6] G.G. Bach, J. H. S. Lee, “An analytical solution for blast waves”, AIAA, Vol. 8, pp. 271-275, 1970.
[7] P. L. Sachdev, “Propagation of a blast wave in uniform or non-uniform media: a uniformly
valid analytic solution”, J. Fluid Mech., Vol. 52, pp. 369-378, 1972.
[8] V. P. Korobeinikov, “Problems in the Theory of Point Explosions in Gases”, Providence, RI: American Mathematical Society, 1976.
[9] S. A. Poslavskii, “A new class of exact solutions with shock waves in gas dynamics”, PMM, Vol. 49, pp. 369-378, 1985.
[10] S. R. Brinkley and J. G. Kirkwood, “Theory of the propagation of the shock wave”, Phys. Rev. Lett., Vol. 71, pp. 606-611, 1947.
[11] E. N. Pelinovskii, N. S. Petrukhin, “Stellar surface oscillations under the action of hydrodynamical Perturbations”, Geophysical and Astrophysical Fluid Dynamics, Vol.75, pp. 77-89, 1998.
[12] F. Oliveri and M. P. Speciale, “Exact solutions to the unsteady equations of perfect gases through Lie group analysis and substitution principles”, Int. J. Non-linear Mech., Vol.37, pp. 257-274, 2002.
[13] F. Oliveri and M. P. Speciale, “Exact solutions to the ideal magneto-gasdynamic equations of perfect gases through Lie group analysis and substitution principles”, J. Phys. A, Vol. 38, pp. 8803-8820, 2005.
[14] S. Murata, “New exact solution of the Blast wave problem in gas dynamics”, Chaos, Solitons and Fractals, vol. 28, pp. 327-330, 2006.
[15] L. P. Singh, Akmal Husain and M. Singh, “An approximate analytical solution of imploding strong shocks in a non-ideal gas through Lie group analysis”, Chinese Phys. Lett., Vol. 27, pp. 014702(1)-014702(4), 2010.
[16] L.P. Singh, S. D. Ram, D. B. Singh, “Analytical solution of the Blast wave problem in a non-ideal gas”, Chinese Physics Letters, Vol. 28, pp. 114303(1)-114303(3), 2011.
[17] L. P. Singh, S.D. Ram, D.B. Singh, “Exact solution of planar and non-planar weak shock wave problem in dynamics”, Chaos, Solitons and fractals, Vol. 44, pp. 964-967, 2011.
[18] Ya. M. Kazhdan, M. Marina, “Shock wave emergence at the stellar surface and the subsequent gas expansion into a vacuum - The sphericity involvement”, Astrophys. J., Vol. 400, pp. 192-202, 1992.
Citation
Syed Aftab Haider, Akmal Husain, V. K. Singh, "An Exact Analytical Solution of Blast Wave Problem in Gas-Dynamics at Stellar Surface," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1319-1322, 2019.
Predictive Analytic for Blood Request by Using Moving Average and Linear Regression
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1323-1329, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13231329
Abstract
The main objective of this research predicted the number of blood request in each month of the organization. In this research, we compared 3 statistical estimation methods (simple moving average, exponential moving average, and linear regression) to predict the number of requested blood in each month using historical time series data. Reducing the error of the expected requested blood would be beneficial for planning and decision making to prepare for the target of blood donation. Data used in this experiment, were the number of requested blood components (red blood cells) from 5 years which divided into two periods. The first period, from January 2014 to December 2017, was used as training set for building linear regression models. The second period, from January 2018 to December 2018, was used as test set to evaluate the regression models and to compare with simple moving average and exponential moving average. The results presented that the exponential moving average method had significantly lowered errors than both the simple moving average method and the linear regression method.
Key-Words / Index Term
Requested blood, Simple moving average, Exponential moving average, Linear regression
References
[1] K. Saritha and S. Abraham, “Statistical Predictability in Big Data Analytics with Data Partitioning”, International Journal of computer Science and Engineering, Vol.06, Issue.06, pp.80-55, 2018.
[2] N.M. Annigeri, S. Shetty, A.P. Patil, “Analysing the supervised learning methods for predicting of healthcare data in cloud environment: A Survey”, International Journal of computer Science and Engineering, Vol.06, Issue.3, pp.434-438, 2018.
[3] M. Fernandes, “Data Mining: A Comparative Study of its Various Techniques and its Process, International Journal of computer Science and Engineering, Vol.5, Issue.1, pp.19-23, 2017.
[4] J.V.N. Lakshmi, A. Sheshasaayee, “A Big Data Analytical Approach for Analyzing Temperature Dataset using Machinee Learning Techniques”, International Journal of computer Science and Engineering, Vol.5, Issue.3, pp.92-97, 2017.
[5] R. Daosa-nguan, C. Hansa, S.Maneerat, “Comparative study of suitable models for forecasting Number of patients with epidemiological surveillance in Bangkok”, Research and Development Journal, KMUTT, Vol.38, No.1, pp.33-55, 2015.
[6] S. Ronachai, K. Kittisak and K. Nittaya, “Forecasting the demand for power distribution units with support vector regression. 3 alternate examination forms”, Journal of Science and Technology Ubon Ratchathani University. Vol.19, Issue.1, pp.215-232, 2017.
[7] T. Chalermchat, “Comparison of forecasting methods for electricity consumption in Nakhon Phanom province”, Narasuan University Journal: Science and Technology, Vol.25, Issue.4, pp.124-137, 2017.
[8] C. Thanaporn and C. Paramet, “Forecasting of the services of the customers in retail business”, Journal of King Mongkut`s University of Technology North Bangkok, Vol.23, Issue.3, pp.664-674, 2013.
[9] P. Komon, “The forecasting model of manpower suitable for workload: a case study of a branch shop, CP All Public Company Limited”, Panyapiwat Journal. Vol.5, Issue.2, pp.103-119, 20142.
[10] S. Nicha and K. Sumet, “Forecasting water demand for consumption in the future using Arya model and Garch model”, KKU Res. J. (be), Vol.11, Issue.1, pp.45-55, 2012.
[11] E. Agthe,, Donald. and R.B. Billings, “Dynamic Modals of Residential Water Demand”, Water Resources Research, Vol.16, Issue.June, pp.476-480, 1980.
[12] E.L. Danielson, “An analysis of Residential Demand for water using Micro Time Series Data”, Water Resources Research, Vol.15, Issue.August, pp.763-767, 1979.
[13] S.J. Henry, and R.B. Bruce, “Urban Residential Demand for Water in the United States”, Land Economics, Vol.55, Issue.February, pp.43-58, 1979.
[14] W. Charles and F.P. Linaweaver,Jr, “The Impact of Price on Residential Water Demand and Its Relation to System Design and Price Structure”, Water Resources Resarch, Vol.3, Issue.February, pp.13-32, 1967.
Citation
P. Limsaiprom, S. Rattanachan, N. Phuangphairoj, M. Kaenchuwongk, "Predictive Analytic for Blood Request by Using Moving Average and Linear Regression," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1323-1329, 2019.