Some Techniques of Ancient Indian Vedic Mathematics for Elliptic Curve Cryptography over the Ring A4
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1330-1337, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13301337
Abstract
In this present approach, some efficient computing techniques of Ancient Indian Vedic Mathematics for elliptic curve cryptography (ECC) over the Ring A4 has been studied, in which, it has been observed that the applications of AIVM Techniques or Sutras decrease the number of multiplications and squares which occur in point doubling and point addition in ECC over the Ring A4. This paper described the use of AIVM Sutras, Urdhva-Tiryagbhyam for multiplication and Dvandva-Yoga for the square of any number in the ECC over the Ring A4. The results proved that AIVM based scheme shows better performance in speed, processing time and power consumption of multipliers compared to conventional method. The effect of some AIVM techniques over ECC was investigated and the obtained results are explained in the form of tables and graphs.
Key-Words / Index Term
Cryptography, Dvandva-Yoga, Elliptic Curve, Finite Field, Point Addition, Point Doubling, Ring A4, Scalar Multiplication, Urdhva-Tiryagbhyam, Vedic Mathematics
References
[1] A. Chillali, M.H. Hassib, M.A. Elomary, “Elliptic curves over a chain ring of characteristic 3”, Journal of Taibah University for Science, Vol.9 Issue.3, pp.276-287, 2015.
[2] A. Kan he, S.K. Das, A.K. Singh, “Design and implementation of low power multiplier using Vedic multiplication technique”, International Journal of Computer Science and Communication, Vol.3, Issue.1, pp.131-132, 2012.
[3] A. Nanda, S. Behera “Design and Implementation of Urdhva-Tiryagbhyam Based Fast Vedic Binary Multiplier”, International Journal of Engineering Research & Technology, Vol.3, Isuue.3, pp.1856-1859, 2014.
[4] A. Pawar, A.K. Sahu, G.R. Sinha, “Implementation of High Speed Vedic Multiplier” International Journal of Innovative Research in Advanced Engineering, Vol.1, Issue10, pp.396-401, 2014.
[5] A. Tadmori, A. Chillali and M. Ziane, “Coding over elliptic curves in the ring of characteristic two”, International journal of Applied Mathematics and Informatics, Vol.8, pp.65-67, 2014.
[6] A. Tadmori, A. Chillali and M. Ziane., “Elliptic Curve over Ring A4”, Applied Mathematics Science, Vol.9, pp.1721-1733, 2015.
[7] A. Tadmori, A. Chillali and M. Ziane., “Normal Form of the elliptic curves over the finite ring”, Journal of Mathematics and system Science, Vol.4, pp.194-196, 2014.
[8] G. Sameer, M. Sumana and S. Kumar, “Novel High Speed Vedic Mathematics Multiplier using Compressors” International Journal of Advanced Technology and Innovative Research, Vol.7, Issue.2, pp.0244-0248, 2015.
[9] J. S. S. B. K. Tirthaji, Vedic Mathematics or Sixteen Simple Sutras from Vedas, Motilal Bhandaridas Varanasi India, 1986.
[10] K. N. Palata, V. K. Nadar, J. S. Jethawa, T. J. Surwadkar and R. S. Deshmukh “Implementation of an Efficient Multiplier based on Vedic Mathematics” International Research Journal of Engineering and Technology, Vol.4, Issue.4, pp494-497, 2017.
[11] M. Poornima, S. K. Patil, S. Kumar, K. P. Shridhar and H. Sanjay, “Implementation of multiplier using Vedic algorithm”, International Journal of Innovative Technology and Exploring Engineering, Vol.2, Issue6, pp.219-223 , 2013.
[12] N. Koblitz, “Elliptic Curve Cryptosystem”, Journal of Mathematics Computation, Vol.48, Issuue.177, pp.203-209, 1987.
[13] N. Shylashree, D. V. N. Reddy and V. Sridhar, “Efficient Implementation of Scalar Multiplication for Elliptic Curve Cryptography using Ancient Indian Vedic Mathematics over GF(p)", International Journal of Computer Applications, Vol.49, Issue.7, pp.0975-8887, 2012.
[14] R. Anchalya, G. Chiranjeevi N., S. Kulkarni, “Efficient Computing Techniques using Vedic Mathematics Sutras, International Journal of Innovative Research in Electrical”, Electronic Instrumentation and control engineering, Vol.3, Issue5, pp.24-27, 2015.
[15] S. M. Salim and S. A. Lakhotiya, “Implementation of RSA Cryptosystem Using Ancient Indian Vedic Mathematics” International Journal of Science and Research, Vol.4, Issue.5, pp.3221-3230, 2015.
[16] S. Sadanandan and V.Anjali, “Design of advanced encryption standard using Vedic Mathematics” International Journal of Innovative Research in Advanced Engineering, Vol.1, Issue.6, pp.322-325, 2014.
[17] W. Stallings, “Cryptography and Network Security: Principals and Practices” Prentice Hall, India, 2003.
Citation
Manoj Kumar, Ankur Kumar, "Some Techniques of Ancient Indian Vedic Mathematics for Elliptic Curve Cryptography over the Ring A4," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1330-1337, 2019.
Survey of Clustering Methods for Large Scale Dataset
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.1338-1344, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13381344
Abstract
This research study focuses on a comparative study of various clustering algorithms for the performance evaluation of large datasets. Analysis of large datasets is required for effective knowledge discovery. Use of data mining, machine learning techniques are often being used to refine of larger datasets. Traditional approach of processing of large datasets is inefficient and needs to consider the fast processing parallel environment to enhance the performance. This study has emphasis on four clustering algorithms, K-Means, Wards, PAM and CLARA to study performance on larger dataset of GeoJson format and CSV formats. Statistical techniques Medoid and Centroid are used for experimental work with different sample sizes to measure the performance of algorithms. Experimental work is carried out using R programming on Azure cloud for parallel computing with HDInsight Cluster. This research study provide evidence that the algorithm CLARA shows constant Medoid computations for different sample sizes compare to algorithm PAM and K-,Means. Silhouette widths of the algorithms CLARA (0.41) and Silhouette width of PAM (0.36) indicates well defined clusters are present in CLARA. Performance of these algorithms is effectively enhanced by reducing the time of DBSCAN by 45.72%, K-means by 99.95% and CLARA by 99.96% in comparison with Ward’s Algorithm for larger datasets using parallel processing environment.
Key-Words / Index Term
Azure, CLARA, Clustering Algorithms, GeoJson dataset, PAM, R Studio, Ward’s Method
References
[1] S. Miyamoto, R. Abe, Y. Endo, and J. Takeshita, “Ward method of hierarchical clustering for non-Euclidean similarity measures,” in 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR), Fukuoka, Japan, 2015, pp. 60–63.
[2] Jian Yin, Zhi-Fang Tan, Jiang-Tao Ren, and Yi-Qun Chen, “An efficient clustering algorithm for mixed type attributes in large dataset,” in 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 2005, pp. 1611-1614 Vol. 3.
[3] Lingling Yuan, “An effective Chinese short message texts clustering algorithm based on the ward’s method,” in 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), Deng Feng, China, 2011, pp. 1897–1899.
[4] J. Pagel, M. Campion, A. S. Nair, and P. Ranganathan, “Clustering analytics for streaming smart grid datasets,” in 2016 Clemson University Power Systems Conference (PSC), Clemson, SC, USA, 2016, pp. 1–8.
[5] M. K. Pakhira, “Fast Image Segmentation Using Modified CLARA Algorithm,” in 2008 International Conference on Information Technology, Bhunaneswar, Orissa, India, 2008, pp. 14–18.
[6] S. Sreepathi, J. Kumar, R. T. Mills, F. M. Hoffman, V. Sripathi, and W. W. Hargrove, “Parallel Multivariate Spatio-Temporal Clustering of Large Ecological Datasets on Hybrid Supercomputers,” in 2017 IEEE International Conference on Cluster Computing (CLUSTER), Honolulu, HI, USA, 2017, pp. 267–277.
[7] X. Dong and Z. Zhang, “Research and implementation of PAM algorithm with time constraints,” in Proceedings 2014 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS), Qingdao, China, 2014, pp. 108–111.
[8] X.-D. Wang, R.-C. Chen, F. Yan, Z.-Q. Zeng, and C.-Q. Hong, “Fast Adaptive K-Means Subspace Clustering for High-Dimensional Data,” IEEE Access, vol. 7, pp. 42639–42651, 2019.
[9] K. M. A. Patel and P. Thakral, “The best clustering algorithms in data mining,” in 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, Tamilnadu, India, 2016, pp. 2042–2046.
[10] Li Wenchao, Z. Yong, and X. Shixiong, “A Novel Clustering Algorithm Based on Hierarchical and K-means Clustering,” in 2007 Chinese Control Conference, Zhangjiajie, China, 2006, pp. 605–609.
[11] A. Bhardwaj, V. K. Singh, Vanraj, and Y. Narayan, “Analyzing BigData with Hadoop cluster in HDInsight azure Cloud,” in 2015 Annual IEEE India Conference (INDICON), New Delhi, India, 2015, pp. 1–5.
[12] C. Nishizaki, Y. Niwa, M. Imasato, and H. Motogi, “A method for feature extraction and classification of marine radar images,” in 2014 World Automation Congress (WAC), Waikoloa, HI, 2014, pp. 48–53.
[13] C.-Y. Kuo, C. N. Hang, P.-D. Yu, and C. W. Tan, “Parallel Counting of Triangles in Large Graphs: Pruning and Hierarchical Clustering Algorithms,” in 2018 IEEE High Performance extreme Computing Conference (HPEC), Waltham, MA, 2018, pp. 1–6.
[14] M. Alkathiri, J. Abdul, and M. B. Potdar, “Kluster: Application of k-means clustering to multidimensional GEO-spatial data,” in 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC), Indore, 2017, pp. 1–7.
[15] S. Soor and B. S. D. Sagar, “Iterated Watersheds, A Connected Variation of K-Means for Clustering GIS Data,” p. 11.
[16] K. L. N. Eranki and A. S. Reddy, “Geo-spatial library: A geo-spatial educational tool for knowledge management and capacity building,” in 2012 IEEE International Conference on Engineering Education: Innovative Practices and Future Trends (AICERA), Kottayam, India, 2012, pp. 1–4.
[17] A. S. Sidhu, S. R. Balakrishnan, and S. K. Dhillon, “HPC+Azure environment for bioinformatics applications,” in 2013 IEEE International Conference on Bioinformatics and Biomedicine, Shanghai, China, 2013, pp. 12–15.
[18] C. Reinbacher, M. Ruther, and H. Bischof, “Pose Estimation of Known Objects by Efficient Silhouette Matching,” in 2010 20th International Conference on Pattern Recognition, Istanbul, Turkey, 2010, pp. 1080–1083.
[19] F. Pedregosa et al., “Scikit-learn: Machine Learning in Python,” MACHINE LEARNING IN PYTHON, p. 6.
[20] Y. Zhuang, Y. Mao, and X. Chen, “A Limited-Iteration Bisecting K-Means for Fast Clustering Large Datasets,” in 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 2016, pp. 2257–2262.
[21] S. Gupta and V. K. Srivatava, “An accelerated clustering algorithm for segmentation of grayscale images,” in 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011), Allahabad, India, 2011, pp. 660–665.
[22] Marie Fernandes , “Data Mining: A Comparative Study of its Various Techniques and its Process”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.19-23, 2017
[23] Nilamadhab Mishra , “Internet of Everything Advancement Study in Data Science and Knowledge Analytic Streams”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.30-36, 2018.
Citation
Anupama Jawale, Ganesh Magar, "Survey of Clustering Methods for Large Scale Dataset," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1338-1344, 2019.
A Machine Learning Based Bug Severity Prediction using Customized Cascading Weighted Majority Voting
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1345-1350, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13451350
Abstract
As open source software systems are becoming bigger and more complex, the bug detection task and fixing it to improve the performance of the software is also getting complex, time taking, and inefficient. Users are permitted by the developers to report bugs that are found by them using a bug tracking system such as Bugzilla to improve the quality and efficiency of the software. In Bugzilla, users identify clearly the details of the bug, such as the description, the component, the version, the product, and the severity. Depending on this information, the priority levels to the reported bugs are assigned by the developers according to their severity. In this research, the model is proposed that is a customized version of a classification technique called “Customized Cascading Randomized Weighted Majority Voting”. This technique will include an ensemble of two base classifiers: Naïve Bayes classifier and Random Forest classifier with different proposed weights in case of textual datasets.
Key-Words / Index Term
Eclipse, Priority Prediction, Severity Prediction, Machine Learning, Textual Analysis, Bugzilla, Jupyter Notebook
References
[1] S. Kim, E. J. Whitehead, “How long did it take to fix bugs?”, MSR `06 Proceedings of the 2006 international workshop on Mining software repositories, Shanghai, China, pp.173-174, 2006.
[2] S. Gujral, G. Sharma, “Classifying Bug Severity Using Dictionary Based Approach”, International Conference on Futuristic trend in Computational Analysis and Knowledge (ABLAZE 2015), Noida, India, pp.632-639, 2015.
[3] D. Cubranic, G. C. Murphy, “Automatic bug triage using text categorization”, 16th International Conference on Software Engineering, Italy, pp.92-97, 2004.
[4] V. Challagulla, F. Bastani, I.-L. Yen, R. Paul, “Empirical Assessment of Machine Learning Based Software Defect Prediction Techniques.”, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems., Arizona, USA, pp.263-270, 2005.
[5] S N Ahsan , J. Ferzund , F. Wotawa, “Automatic Software Bug Triage System (BTS) Based on Latent Semantic Indexing and Support Vector Machine”, Proceedings of the 2009 Fourth International Conference on Software Engineering Advances, Portugal, pp.216-221, 2009.
[6] Lamkanfi, S. Demeyer, E. Giger, B. Goethals, “Predicting the severity of a reported bug.”, 7th IEEE Working Conference Mining Software Repositories (MSR), South Africa, pp.1-10, 2010.
[7] Lamkanfi, Ahmed, et al. "Comparing mining algorithms for predicting the severity of a reported bug", 15th European Conference on Software Maintenance and Reengineering (CSMR), Germany, pp.249-258, 2011.
[8] T. Menzies, A. Marcus, “Automated severity assessment of software defect reports,” in IEEE International Conference on Software Maintenance, China, pp.346–355, 2008.
[9] M.N. Pushpalatha, M. Mrunalini, “Predicting the Severity of Bug Reports using Classification Algorithms”, 2016 International Conference on Circuits, Controls, Communications and Computing (I4C), Bangalore, India, pp.520-525, 2016.
[10] S. Sharma, P. Rana, “Implementing Bug Severity Prediction through Information Mining using KNN Classifier”, International Journal of Science Technology & Engineering, Vol. 2, Issue 4, pp.333 – 340, 2015
[11] G. Yang, T. Zhang, “Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-Feature of Bug Reports”, 2014 IEEE 38th Annual International Computers, Software and Applications Conference, Sweden, pp.97-106, 2014.
[12] Herraiz, D. German, J. Gonzalez-Barahona, G. Robles, “Towards a Simplification of the Bug Report Form in Eclipse,” in 5th International Working Conference on Mining Software Repositories, Germany, pp.145-148, May 2008.
[13] J. Anvik, L. Hiew, and G. Murphy, “Who should fix this bug?” in Proc 28th International Conference on Software Engineering. ACM, China, pp.361–370, 2006.
Citation
Prachi Pundir, Satwinder Singh, Gurpreet Kaur, "A Machine Learning Based Bug Severity Prediction using Customized Cascading Weighted Majority Voting," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1345-1350, 2019.
Reliability Optimization Using Distance Check pointing Through Dynamic Request And Requirement Aware Mechanism
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1351-1359, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13511359
Abstract
In cloud computing the datacenters are utilized to coordinates the distinct tasks where tasks may require more resources and source of these cloudlets could be from thousands of users. These datacenters aims to deliver reliable services. But the equal reliability to all the users at the same time according to their requirements may be a difficult task and may vary. So in this paper we purpose a technique that considers optimized elastic reliability in cloud computing using distance based server selection policy. In our scheme reliability enhancement through distance dependent check pointing with resource maximization mechanism is distance aware checkpoint. Resource maximization mechanism uses division policy which divides the jobs by looking at the capacity of virtual machine on which load is to be dispersed. This operation can efficiently solve the problem of reliability. it improves the resource usage in the datacenters and also gives optimized reliability to the user.
Key-Words / Index Term
Reliability, Checkpointing, datacenters, cloudcomputing
References
[1] S. Ranga, “A Survey for Secure Live Migration of Virtual Machines in Cloud Computing Platform,” pp. 110–115.
[2] D. Jain and V. Singh, “Feature selection and classification systems for chronic disease prediction: A review,” Egypt. Informatics J., 2018.
[3] C. Feng, H. Xu, and B. Li, “An Alternating Direction Method Approach to Cloud Traffic Management,” IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 8, pp. 2145–2158, 2017.
[4] J. Wang, W. Bao, X. Zhu, L. T. Yang, and Y. Xiang, “FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2545–2558, 2015.
[5] M. R. Chinnaiah and N. Niranjan, “Fault tolerant software systems using software configurations for cloud computing,” J. Cloud Comput., vol. 7, no. 1, 2018.
[6] A. Zhou, S. Wang, C. H. Hsu, M. H. Kim, and K. seng Wong, “Virtual machine placement with (m, n)-fault tolerance in cloud data center,” Cluster Comput., pp. 1–13, 2017.
[7] Y. Wang, Q. He, D. Ye, and Y. Yang, “Formulating Criticality-Based Cost-Effective Fault Tolerance Strategies for Multi-Tenant Service-Based Systems,” IEEE Trans. Softw. Eng., vol. 44, no. 3, pp. 291–307, 2018.
[8] G. Li, J. Wu, J. Li, K. Wang, and T. Ye, “Service Popularity-based Smart Resources Partitioning for Fog Computing-enabled Industrial Internet of Things,” IEEE Trans. Ind. Informatics, vol. PP, no. c, p. 1, 2018.
[9] R. K. Naha, S. Garg, D. Georgakopoulos, P. P. Jayaraman, L. Gao, Y. Xiang, and R. Ranjan, “Fog computing: Survey of trends, architectures, requirements, and research directions,” IEEE Access, vol. 6, no. c, pp. 47980–48009, 2018.
[10] A. Zhou, S. Wang, B. Cheng, Z. Zheng, F. Yang, R. N. Chang, M. R. Lyu, and R. Buyya, “Cloud service reliability enhancement via virtual machine placement optimization,” IEEE Trans. Serv. Comput., vol. 10, no. 6, pp. 902–913, 2017.
[11] S. M. Abdulhamid, M. S. Abd Latiff, S. H. H. Madni, and M. Abdullahi, “Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm,” Neural Comput. Appl., vol. 29, no. 1, pp. 279–293, 2018.
[12] A. S. Perspective, R. Jhawar, G. S. Member, and V. Piuri, “Fault Tolerance Management in Cloud Computing :,” IEEE Syst. J., vol. 7, no. 2, pp. 288–297, 2013.
[13] C. A. Chen, M. Won, R. Stoleru, and G. G. Xie, “Energy-efficient fault-tolerant data storage and processing in mobile cloud,” IEEE Trans. Cloud Comput., vol. 3, no. 1, pp. 28–41, 2015.
[14] R. Jhawar and V. Piuri, “Chapter 9 - Fault Tolerance and Resilience in Cloud Computing Environments,” Comput. Inf. Secur. Handb. (Third Ed., vol. 2, pp. 165–181, 2017.
[15] L. P. Saikia and Y. L. Devi, “Fault tolererance techniques and algorithms in cloud system,” Int. J. Comput. Sci. Commun. Networks, vol. 4, no. 1, pp. 1–8, 2014.
[16] T. J. Charity and G. C. Hua, “Resource reliability using fault tolerance in cloud computing,” Proc. 2016 2nd Int. Conf. Next Gener. Comput. Technol. NGCT 2016, no. October, pp. 65–71, 2017.
[17] J. Liu, S. Wang, S. Member, A. Zhou, S. A. P. Kumar, S. Member, and R. Buyya, “Using Proactive Fault - Tolerance Approach to Enhance Cloud Service Reliability,” IEEE Access, pp. 1–13, 2016.
[18] D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A. Y. Zomaya, “Energy-efficient data replication in cloud computing datacenters,” IEEE Access, vol. 18, no. 1, pp. 385–402, 2015.
[19] D. Ardagna, G. Casale, M. Ciavotta, J. F. Pérez, and W. Wang, “Quality-of-service in cloud computing : modeling techniques and their applications,” IEEE Access, pp. 1–17, 2014.
[20] B. S. Taheri, “ACCFLA : Access Control in Cloud Federation using Learning Automata,” vol. 107, no. 6, pp. 30–40, 2014.
[21] K. B. Ferreira, R. Riesen, P. Bridges, D. Arnold, and R. Brightwell, “Accelerating incremental checkpointing for extreme-scale computing,” Futur. Gener. Comput. Syst., vol. 30, no. 1, pp. 66–77, 2014.
[22] M. Salehi, M. K. Tavana, S. Rehman, S. Member, M. Shafique, and A. Ejlali, “Two-State Checkpointing for Energy-Efficient Fault Tolerance in Hard Real-Time Systems,” pp. 1–12, 2016.
[23] M. V Santiago, S. E. P. Hernández, L. A. M. Rosales, and H. H. Kacem, “Checkpointing Towards Dependable Business Processes,” vol. 14, no. 3, pp. 1408–1415, 2016.
[24] R. Luo, S. Member, W. Liao, S. Member, H. Zhang, and S. Member, “Fusion of Hyperspectral and LiDAR Data for Classification of Cloud-Shadow Mixed Remote,” IEEE Access, pp. 1–14, 2017.
[25] R. M. Systems, T. Wei, P. Mishra, K. Wu, and H. Liang, “Fixed-Priority Allocation and Scheduling for Energy-Efficient Fault Tolerance in Hard,” vol. 19, no. 11, pp. 1511–1526, 2008.
[26] S. Kannan and S. Rajendran, “Energy Efficient Cloud Computing,” pp. 157–171.
[27] G. R. Kalanirnika and V. M. Sivagami, “Fault Tolerance in Cloud Using Reactive and Proactive Techniques,” IEEE, vol. 3, no. 3, pp. 1159–1164, 2015.
[28] G. Yao, Y. Ding, S. Member, and K. Hao, “Using imbalance characteristic for fault - tolerant workflow scheduling in Cloud systems,” vol. 9219, no. c, 2017.
[29] J. Liu, S. Wang, A. Zhou, S. Kumar, F. Yang, and R. Buyya, “Using Proactive Fault-Tolerance Approach to Enhance Cloud Service Reliability,” IEEE Trans. Cloud Comput., pp. 1–1, 2016.
[30] M. Amoon, C. Science, and P. O. B. R. Arabia, “Adaptive Framework for Reliable Cloud Computing Environment,” ACM, vol. 3536, no. c, 2016.
Citation
Preet Kawal Kaur, Kamaljit Kaur, "Reliability Optimization Using Distance Check pointing Through Dynamic Request And Requirement Aware Mechanism," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1351-1359, 2019.
Kmeans Clustering in R Studio
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1360-1362, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13601362
Abstract
This paper describes about data mining and its techniques , the main focus for this paper is the clustering techniques. There are many different tools available for performing the clustering techniques , for this paper the clustering technique which is chosen is the Kmeans clustering and the tool which is used to perform this clustering technique is R studio. R studio is the tool which is used for both data mining as well as for the visual analytics also . The Kmeans clustering is the clustering technique which is used to cluster the data in which data items are categorised into the k groups of similarity. This tool not only provide interface to use data mining but it also give us a visual representation of the result generated by that data mining algorithm . The data set which has been used for performing Kmeans clustering consist of nine attributes and 583 observations.
Key-Words / Index Term
Data Mining. Clustering , classification ,clustering , Kmeans , R studio
References
[1]. Nikita Jain, Vishal Srivastava,” DATA MINING TECHNIQUES: A SURVEY PAPER” eISSN: 2319-1163 | pISSN: 2321-7308
[2]. Wahbeh, A.H., Al-Radaideh Q.A., Al-Kabi, M.N. and AlShawakfa E.M. 2010. A comparison study between Data Mining Tools over some classification methods. IJACSA, Special Issue on Artificial Intelligence, SAI Publisher, 2(8), pp. 18-26.
[3]. Auza, J. 2010. 5 of the Best Free and Open Source Data Mining Software. [Accessed Online March 2013] http://www.junauza.com/2010/11/free-data-miningsoftware.html.
[4]. Indian Liver Patient dataset https://archive.ics.uci.edu/ml/datasets/ILPD+(Indian+Liver+Patient+Dataset)
Citation
Shivani Chauhan, Bharti Nagpal, "Kmeans Clustering in R Studio," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1360-1362, 2019.
Modified Artificial Fish Swarm Algorithm for Efficient Task Scheduling in Cloud Environment
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1363-1371, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13631371
Abstract
In cloud computing, task scheduling plays an important key role. The tasks provided by the user are to be allocated to the resources in cloud and the users have to pay for the usage. Even though there are number of popular schedulers available for task scheduling in Grid and other distributed environments, they are not suitable for cloud. Cloud is different from other distributed environments in resource pool and encounters less failure rate. Task scheduling in cloud has to give attention to the QoS parameters such as deadline and budget. Most conventional heuristic algorithms are proposed in the literature. But the meta-heuristic algorithm like fish swarm approach for the task scheduling in cloud is expected to give way the optimal results. A new meta-heuristic technique inspired from the swarm intelligence of fish, namely Modified Artificial Fish Swarm (MAFS) Optimization for Efficient Task Scheduling in Cloud Environment, has been proposed to solve the task scheduling problem. Then the proposed algorithm is compared with existing algorithms such as Particle Swarm Optimization (PSO) and Genetic algorithm (GA). The experimental result shows that the proposed MAFS greatly reduces the makespan and execution cost.
Key-Words / Index Term
Task scheduling, resource utilization, cost, makespan
References
[1] Keshanchi, Bahman, Alireza Souri, and Nima Jafari Navimipour, "An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: formal verification, simulation, and statistical testing", Journal of Systems and Software, vol. 124, pp. 1-21, 2017.
[2] Koutsandria, Georgia, Emmanouil Skevakis, Amir A. Sayegh, and Polychronis Koutsakis, "Can everybody be happy in the cloud? Delay, profit and energy-efficient scheduling for cloud services", Journal of Parallel and Distributed Computing, vol. 96, pp. 202-217, 2016.
[3] Lin, Weiwei, Weiqi Wang, Wentai Wu, Xiongwen Pang, Bo Liu, and Ying Zhang, "A heuristic task scheduling algorithm based on server power efficiency model in cloud environments", Sustainable Computing: Informatics and Systems,2017.
[4] Mao, Li, Yin Li, Gaofeng Peng, Xiyao Xu, and Weiwei Lin, "A multi-resource task scheduling algorithm for energy- performance trade-offs in green clouds", Sustainable Computing: Informatics and Systems, vol.19, pp. 233-241,2018.
[5] Yang, Jiachen, Bin Jiang, Zhihan Lv, and Kim-Kwang Raymond Choo, "A task scheduling algorithm considering game theory designed for energy management in cloud computing", Future Generation Computer Systems, 2017.
[6] Abdi, Somayeh, Latif PourKarimi, Mahmood Ahmadi, and Farzad Zargari. "Cost minimization for deadline-constrained bag-of-tasks applications in federated hybrid clouds", Future Generation Computer Systems, vol.71, pp.113-128, 2017.
[7] Nayak, Suvendu Chandan, Sasmita Parida, Chitaranjan Tripathy, and Prasant Kumar Pattnaik, "An Enhanced Deadline Constraint Based Task Scheduling Mechanism for Cloud Environment", Journal of King Saud University-Computer and Information Sciences,2018.
[8] Gill, Sukhpal Singh, Inderveer Chana, Maninder Singh, and Rajkumar Buyya,"CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing", Cluster Computing, vol.1, pp. 1-39, 2017.
[9] Maria Carla Calzarossa, Marco L. Della Vedova and Daniele Tessera, “A methodological framework for cloud resource provisioning and scheduling of data parallel applications under uncertainty”, Future Generation Computer Systems, In press, accepted manuscript, 2018.
[10] Sobhanayak, Srichandan, Ashok Kumar Turuk, and Bibhudatta Sahoo, "Task scheduling for cloud computing using multi-objective hybrid bacteria foraging algorithm", Future Computing and Informatics Journal, 2018.
[11] Panda, Sanjaya Kumar, Shradha Surachita Nanda, and Sourav Kumar Bhoi, "A Pair-Based Task Scheduling Algorithm for Cloud Computing Environment", Journal of King Saud University-Computer and Information Sciences, 2018.
[12] Yuan, Haitao, Jing Bi, MengChu Zhou, and Ahmed Chiheb Ammari. "Time-Aware Multi-Application Task Scheduling With Guaranteed Delay Constraints in Green Data Center", IEEE Transactions on Automation Science and Engineering, vol.15, issue. 3, pp. 1138-1151, 2018.
[13] Arunarani, A. R., D. Manjula, and Vijayan Sugumaran, "Task scheduling techniques in cloud computing: A literature survey," Future Generation Computer Systems, vol.91, pp. 407-415, 2019.
[14] Rashidi, Shima, and Saeed Sharifian. "A hybrid heuristic queue based algorithm for task assignment in mobile cloud." Future Generation Computer Systems, vol.68, pp. 331-345, 2017.
[15] Kumar, Mohit, and S. C. Sharma. "PSO-COGENT: Cost and Energy Efficient scheduling in Cloud environment with deadline constraint", Sustainable Computing: Informatics and Systems, vol.19, pp. 147-164 , 2018.
[16] Bittencourt, Luiz F., Alfredo Goldman, Edmundo RM Madeira, Nelson LS da Fonseca, and Rizos Sakellariou. "Scheduling in distributed systems: A cloud computing perspective", Computer Science Review, vol. 30, pp. 31-54, 2018.
[17] Jiang, Hui, Jianjun Yi, Shaoli Chen, and Xiaomin Zhu. "A multi-objective algorithm for task scheduling and resource allocation in cloud-based disassembly", Journal of Manufacturing Systems, vol. 41, pp. 239-255, 2016.
[18] Zhang Qian, Ge Yufei and Liang Hong "A Load Balancing Task Scheduling Algorithm based on Feedback Mechanism for Cloud Computing ", International Journal of Grid and Distributed Computing, vol. 9, issue. 4, pp.41-52, 2016.
[19] A.I.Awad, N.A.El-Hefnawy, H.M.Abdel_kader, “Enhanced Particle Swarm Optimization For Task Scheduling In Cloud Computing Environments”, International Conference on Communication, Management and Information Technology (ICCMIT2015), Elsevier, Science Direct, Procedia Computer Science, vol. 65, pp. 920 – 929, 2015.
[20] M. Krishna Sudha, Dr. S. Sukumaran, “Coherent Genetic Algorithm for Task Scheduling in Cloud Computing Environment”, Australian Journal of Basic and Applied Sciences, vol.9, issue.2, pp. 1-8, 2015, ISSN: 1991-8178.
[21] Xuezhi Zeng, Saurabh KumarGarg, Zhenyu Wen, Peter Strazdins, Albert Y.Zomaya and Rajiv Ranjan, “Cost efficient scheduling of MapReduce applications on public clouds”, journal of computational science, 2017.
[22] Demyana Izzat Esa and Adil Yousif, “Scheduling Jobs on Cloud Computing using Firefly Algorithm", International Journal of Grid and Distributed Computing”, vol. 9, issue. 7 pp.149-158, 2016.
[23] F. Ramezani, J. Lu, J. Taheri, F.K. Hussain, “Evolutionary algorithm-based multi- objective task scheduling optimization model in cloud environments”, Journal of world wide web-Internet And Web Information Systems, vol.18, issue.6, pp.1737-1757, 2015.
[24] Wang, Tongxiang, Xianglin Wei, Tao Liang, and Jianhua Fan, "Dynamic Tasks Scheduling Based on Weighted Bi-graph in Mobile Cloud Computing", Sustainable Computing: Informatics and Systems, vol. 19, pp. 214-222, 2018.
[25] Nima Jafari Navimipour and Farnaz Sharifi Milani, “Task Scheduling in the Cloud Computing based on the Cuckoo Search Algorithm”, International Journal of Modeling and Optimization, vol.5,issue.1, pp.44-47, Feb 2015.
[26] Dyah Pythaloka, Agung Toto Wibowo, Mahmud Dwi Sulistiyo , “Artificial Fish Swarm Algorithm for Job Shop Scheduling Problem”, IEEE, 2015.
[27] X.S. Han, Y.C. Liang, and Z.G. Li, “An efficient genetic algorithm for optimization problems with time consuming fitness evaluation”, International Journal of Computer Methods, vol.12, iss.1,pp.1-24, 2015.
[28] X. Li, Z. Shao, and J. Qian, “An optimizing method based on autonomous animates: fish-swarm algorithm”, System Engineering Theory and Practice, vol. 22, issue.11, pp.32-38, 2002.
[29] M. Neshat, G. Sepidnam, M. Sargolzaei, and A.N. Toosi, “Artificial fish swarm algorithm: a survey of the state-of the-art, hybridization, combinatorial and indicative applications”, Artificial Intelligence Review- Springer, vol. 42, issue. 4,pp. 965-997, 2002.
[30] M. Jiang and K. Zhu, “Multi objective optimization by artificial fish swarm algorithm”, Proceeding of the 2011 IEEE International Conference on Automation Science and Engineering, (Trieste, Italy), pp. 506-511, 2011.
[31] K. Zhu and M. Jiang, “The optimization of job shop scheduling problem based on artificial fish swarm algorithm with tabu search strategy”, Proceeding of International Workshop on Advanced Computational Intelligent (Hangzhou, China), pp. 323–327, 2013.
[32] S. He, N. Belacel, H. Hamam, and Y. Bouslimani ,” Fuzzy clustering with improved artificial fish swarm algorithm”, Proceeding of the International Joint Conference on Computational Sciences and Optimization (Hainan, Sanya, China), vol:2, pp.317-321, 2009.
[33] Sebagenzi Jason, Suchithra. R, “Scheduling Reservations of Virtual Machines in Cloud Data Center for Energy Optimization”, International Journal of Scientific Research in Computer Science and Engineering , Vol.6, Issue.6, pp.16-26, 2018.
[34] G.U.Tambe , P.R. Bhaladhare, “Efficient Resource Sharing in Heterogeneous Environments”, International Journal of Scientific Research in Network Security and Communication, Vol.5 , Issue.3 , pp.123-127, 2017.
[35] Hamid R. Tizhoosh,”Opposition-based Learning: A new scheme for Machine Intelligence”, Proceedings of the 2005 International Conference on Computational Intelligence for Modelling, Control and Automation and International Confe Intelligent Agents, Web Technologies and Internet Commerce,IEEE,2005.
[36] Mehmet Ergezer, Dan Simon, ”Oppositional Biogeography-based Optimization for Combinatorial Problems”, IEEE, 2011.
Citation
H. Krishnaveni, V. Sinthu Janita, "Modified Artificial Fish Swarm Algorithm for Efficient Task Scheduling in Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1363-1371, 2019.
Smart Health Prediction System Using Python
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1372-1375, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13721375
Abstract
Breast cancer is increasing day by day due to life style, hereditary. So, health care need to be modernized it means that the health care data should be properly analyzed. Breast Cancer has become the common cause of death among women. Due to long hours invested in manual diagnosis and lesser diagnostic system available emphasize the development of automated diagnosis for early diagnosis of the disease. Each individual has different values for each attributes of breast cancer. Diagnosis is done by classifying the tumor. Tumors can be either benign or malignant but only latter is the cancer. Malignant are more cancerous than the benign. Unfortunately not all physicians are expert in distinguishing between the benign and malignant. So we need a proper and reliable diagnostic system that can detect the malignant. The frameworks use will provide multipurpose beneficial outputs which includes getting the healthcare data analysis into various forms. In this Smart Health Prediction Using Python, we are proposing a evaluate classification technique used for predicting the risk level of each person. The proposed system is using 13 attributes and 569 datasets to develop an accurate result. The patient risk level is classified using machine learning classification algorithm that is Logistic regression algorithm; the accuracy of the risk level is high when using a greater number of attributes. The proposed system will group together symptoms data and analyze it to provide cumulative information. After the analysis, algorithm could be applied to the resultant and grouping can be made to show a clear result. Our aim is to classify whether the breast cancer is benign or malignant for the analysis purpose of laboratories.
Key-Words / Index Term
Logistic regression algorithm, Malignant, Benign
References
[1] Abien Fred M. Agarap, “On Breast Cancer Detection: An Application of Machine Learning Algorithms on the Wisconsin Diagnostic Dataset”, ICMLSC,Phu Quoc Island, Viet Nam, February 2018.
[2] Hadi Lotfnezhad Afshar, Maryam Ahmadi, Masoud Roudbari and Farahnaz Sadoughi “Prediction of Breast Cancer Survival Through Knowledge Discovery in Databases”, Global Journal of Health Science; Vol. 7, Published by Canadian Center of Science and Education, 2015.
[3] S. Palaniappan and T. Pushparaj, “A Novel Prediction on Breast Cancer from the Basis of Association rules and Neural Network”, IJCSMC, Vol. 2, Issue. 4, 269 – 277, April 2013.
[4] P. Saranya and B. Satheeskumar,”A Survey on Feature Selection of Cancer Disease Using Data Mining Techniques”, IJCSMC, Vol. 5, Issue. 5, ,713 – 719,May 2016.
[5] Chaurasia V, Pal S., “Data Mining Techniques: To Predict and Resolve Breast Cancer Survivability”. International Journal of Computer Science and Mobile Computing Vol 3, 10–22, 2014.
[6] L. Breiman Random Forests, “J. Machine Learning”, vol.45, pp. 5 -32, 2001.
[7] L. Tolosi, and T. Lengauer, “Classification with correlated features: unreliability of feature ranking and solutions, Bioinformatics”, vol. 27, no. 14, pp. 1986-1994, 2011.
Citation
Manisha M S Pillai, Rahul Gopal, Roshitha Mariam Sunny, Revathy Chandran, Akhila Balachandran, "Smart Health Prediction System Using Python," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1372-1375, 2019.
Nail Feature Analysis and Classification Techniques for Disease Detection
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1376-1383, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13761383
Abstract
In the healthcare domain, various techniques available for early disease diagnosis. Nail image analysis is one of the techniques for early stage disease diagnosis. Human fingernail image analysis is procedure consists of image capturing, pre-processing of image, image segmentation, segmentation of image, feature extraction. This paper presents review based generalized model for human fingernail image processing system, different classification techniques for nail feature classification and nail features. The nail features such as color, shape and texture used to predict diseases. Color features discussed are Mean, Standard Deviation, Skewness, Kurtosis and average RGB color. Shape features discussed in this paper are area, perimeter, roundness and compactness. Texture features are entropy, energy, homogeneity, contrast and correlation. Different classification techniques such as SVM classifier, KNN classifier, ANN classification used to classify the nail database for disease prediction are discussed.
Key-Words / Index Term
image processing, feature extraction, disease detection, SVM, ANN, K-Nearest Neighbor, nail image analysis
References
[1] R. C. Gonzalez and R. E. Woods, “Digital Image Processing”, 2nd edition, Pearson Education, 2004.
[2] Goel Navnish, Yadav Akhilendra and Singh Brij Mohan, Medical image processing: A review, Second International Innovative Applications of Computational Intelligence on Power, Energy and Controls with their Impact on Humanity (CIPECH), Nov. 2016.
[3] Indi T. S. and Gunge Y. A., Early Stage Disease Diagnosis System Using Human Nail Image Processing, I.J. Information Technology and Computer Science, Vol. 8 Issue.7 , pp. 30-35, 2016.
[4] Lean Karlo Tolentino, Renz Marion Aragon, Winnie Rose Tibayan, Angelie Alvisor, Pauline Grace Palisoc and Geralyn Terte, Detection of Circulatory Diseases Through Fingernails Using Artificial Neural Network, Journal of Telecommunication, Electronic and Computer Engineering, e-ISSN: 2289-8131 Vol. 10 No. 1-4,pp. 181-188, 2018.
[5] Vipra Sharma and Aparajit Shrivastava, System for Disease detection by analyzing finger nails Color and Texture, International Journal of Advanced Engineering Research and Science (IJAERS), Vol-2, Issue-10,pp. 1-10, Oct- 2015, ISSN: 2349-6495.
[6] Priya Maniyan and B L Shivakumar, Early Disease Detection Through Nail Image Processing Based on Ensemble of Classifier Model, International Journal on Future Revolution in Computer Science & Communication Engineering, Vol. 4 Issue. 5, pp. 120-130, May 2018.
[7] V.Saranya and Dr.A.Ranichitra, Image Segmentation Techniques To Detect Nail Abnormalities, International Journal of Computer Technology & Applications,Vol. 8, Issue. 4, pp. 522-527, July-August 2017.
[8] Nijhawan Rahul, Verma Rose, Ayushi, Bhushan Shashank, Dua Rajat and Ankush Mittal, An Integrated Deep Learning Framework Approach for Nail Disease Identification, 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), 2017.
[9] Sneha Gandhat, A. D. Thakare, Swati Avhad, Nityash Bajpai and Rohit Alawadhi, Study and Analysis of Nail Images of Patients, International Journal of Computer Applications (0975 – 8887), Vol. 143, Issue.13, pp. 38-41, 2016.
[10] Indi Trupti S. and Patil Dipti D., A Review: Human Finger Nail Image Analysis for Disease Diagnosis, International Journal of Emerging Technologies and Innovative Research (JETIR), ISSN:2349-5162, Vol.6, Issue. 5, pp. 299-303, May-2019.
[11] Priyanka N.Munje, Deepak Kapgate and Snehal Golait, Novel Techniques for Color and Texture Feature Extraction, International Journal of Computer Science and Mobile Computing, Vol.3, Issue.2, pp. 497-507, February- 2014.
[12] Ryszard S. Choras´, Image Feature Extraction Techniques and Their Applications for CBIR and Biometrics Systems, International Journal of Biology and Biomedical Engineering, Vol. 1, Issue. 1, pp. 6-16, 2007.
[13] Anum Masood, Muhammad Alyas Shahid and Muhammad Sharif, Content-Based Image Retrieval Features: A Survey, Int. J. Advanced Networking and Applications, Vol. 10, Issue. 01, pp. 3741-3757, 2018.
[14] Ahmad B. A. Hassanat and Ahmad S. Tarawneh, Fusion of Color and Statistic Features for Enhancing Content-Based Image Retrieval Systems, Journal of Theoretical and Applied Information Technology, Vol.88, Issue.3, pp. 644-655, 2016.
[15] C. Umamaheswari, R. Bhavani and K. Thirunadana Sikamani, Texture and Color Feature Extraction from Ceramic Tiles for Various Flaws Detection Classification, International Journal on Future Revolution in Computer Science & Communication Engineering, Vol. 4 Issue. 1, pp. 169 – 179, January 2018.
[16] https://en.wikipedia.org/wiki/Color_moments Date: 10th April 2019
[17] Mitisha Narottambhai Patel and Purvi Tandel, A Survey on Feature Extraction Techniques for Shape based Object Recognition, International Journal of Computer Applications (0975 – 8887), Vol. 137, Issue.6, pp. 16-20, March 2016.
[18] Mingqiang Yang, Kidiyo Kpalma, Joseph Ronsin, A Survey of Shape Feature Extraction Techniques, Peng-Yeng Yin. Pattern Recognition IN-TECH, pp.43-90, 2008.
[19] Rajivkumar Mente, B V Dhandra and Gururaj Mukarambi, Image Recognition Using Shape Descriptor: Eccentricity and Color, IBMRD`s Journal of Management and Research, Vol. 3, Issue. 1, 2014.
[20] Anne Humeau-Heurtier, Texture Feature Extraction Methods: A Survey, Published in: IEEE Access, Vol. 7, Digital Object Identifier 10.1109/ACCESS.2018.2890743, January 2019
[21] Renu Bala, Survey on Texture Feature Extraction Methods, International Journal of Engineering Science and Computing, Vol. 7, Issue. 4, pp. 10375-10377, April 2017
[22] https://en.wikipedia.org/wiki/Image_texture Date: 10th April 2019
[23] Book edited by Charu C. Aggarwal, Data Classification: Algorithms and Applications, Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, CRC Press
[24] Yashima Ahuja and Sumit Kumar Yadav, Multiclass Classification and Support Vector Machine, Global Journal of Computer Science and Technology Interdisciplinary, Vol. 12, Issue. 11, 2012.
[25] Ashis Pradhan, Support Vector Machine-A Survey, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Issue. 8, 2012.
[26] Amita Goel and Saarthak Mahajan, Comparison: KNN & SVM Algorithm, International Journal for Research in Applied Science & Engineering Technology (IJRASET), Vol. 5, Issue. XII, 2017.
[27] Martin Weis, Till Rumpf, Roland Gerhards and Lutz Plümer, Comparison of different classification algorithms for weed detection from images based on shape parameters, Image Analysis for Agricultural Products and Processes, pp. 53-64
[28] Ned Horning, Random Forests : An algorithm for image classification and generation of continuous fields data sets, International Conference on Geoinformatics for Spatial Infrastructure Development in Earth and Allied Sciences 2010.
[29] https://www.learnopencv.com/understanding-feedforward-neural-networks/ Date: 15th April 2019
[30] Chakma A and Sharma S, Nails - The Firsthand Sign to Understand the Underlying Disease Condition, Journal Homeopathy & Ayurvedic Medicine 2014, ISSN: 2167-1206
[31] http://shodhganga.inflibnet.ac.in/bitstream/10603/20615/11/11_chapter%205.pdf Date: 19th April 2019
Citation
Trupti S. Indi, Dipti D. Patil, "Nail Feature Analysis and Classification Techniques for Disease Detection," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1376-1383, 2019.
Defeating Jamming Attack in Wireless Network Techniques
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1384-1388, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13841388
Abstract
The open nature of the wireless form leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional intrusion with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat representation. However, adversaries with internal knowledge of protocol description and network secrets can launch low-effort jamming attacks that are difficult to recognize and counter. In this work, we address the issue of selective jamming attacks in wireless networks. In these attacks, the opponent is active only for a short period of time, selectively targeting messages of high importance. We embellish the advantages of selective jamming in terms of network staging mortification, and opponent effort by presenting two case studies; a selective pounce, on TCP and one on routing. We show that selective jamming attacks can be launched by execute real-time packet classification at the physical layer. To mitigate this pounce, we develop three schemes that intercept real-time packet classification by combining cryptography primitives with physical-layer attributes. We inspect the security of our procedure and evaluate their computational and communication overhead.
Key-Words / Index Term
Jamming, Attack, Network, Defective
References
[1] R. Ananadha Jothi V. Palanisamy, “Trust Based Association Estimation Technique on AODV Protocol Against Packet Droppers in MANET”, International Journal of Applied Engineering Research,10 (55) (2015) 2408-2413.
[2] R. Ananadha Jothi and V. Palanisamy Various Attacks and Its Countermeasures in Mobile Ad Hoc Networks: A Survey International Journal of Engineering Research & Technology,3 (3) (2014) 50-57.
[3] J. Nithyapriya, R. Ananadha Jothi, V. Palanisamy, “Securing data with selective encryption based DAC scheme for MANET” , Computer Networks, Big Data and IoT. (Springer) Dec- 2018 (Accepted)
[4] J.NithyaPriya ,R.Anandha Jothi, V.Palanisamy, “Security scheme for MANET based on echoing and path changing”International Journal of Innovative science and research technology. 3 (10) (2018) 601-603.
[5] M. Jeevamaheswari, R. Anandha Jothi, V. Palanisamy ,” AODV Routing Protocol to Defence Against Packet Dropping Gray Hole Attack In MANET”, International Journal of Scientific Research in Science and Technology, 2018 IJSRST | Volume 4 | Issue 2 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X.
[6] V. Anantharam and S. Verdu, “Bits through queues,” IEEE Trans. Inf. Theory, vol. 42, no. 1, pp. 4–18, Jan. 1996.
[7] G. Morabito, “Exploiting the timing channel to increase energy efficiency in wireless networks,” IEEE J. Sel. Areas Commun., vol. 29, no. 8,pp. 1711–1720, Sep. 2011.
[8] L. Galluccio, G. Morabito, and S. Palazzo, “TC-Aloha: A novel access scheme for wireless networks with transmit-only nodes,” IEEE Trans.Wireless Commun., vol. 12, no. 8, pp. 3696–3709, Aug. 2013.
[9] W. Xu, W. Trappe, and Y. Zhang, “Anti-jamming timing channels for wireless networks,” inProc. 1st ACM Conf. Wireless Netw. Security, 2008,pp. 203–213.
[10] S. D’Oro, L. Galluccio, G. Morabito, and S. Palazzo, “Efficiency analysis of jamming-based countermeasures against malicious timing channel in tactical communications,” inProc. IEEE ICC, 2013, pp. 4020–4024.
[11] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,”IEEE Netw., vol. 20, no. 3, pp. 41–47, May/Jun. 2006.
[12] R. Saranyadevi, M. Shobana, and D. Prabakar, “A survey on preventing jamming attacks in wireless communication,” Int. J. Comput. Appl., vol. 57, no. 23, pp. 1–3, Nov. 2012.
[13] R. Poisel, Modern Communications Jamming Principles and Techniques. Norwood, MA, USA: Artech House, 2004, ser. Artech House information warfare library. [Online]. Available: http://books.google.it/books? Id=CZDXton6vaQC.
[14] R.-T. Chinta, T. F. Wong, and J. M. Shea, “Energy-efficient jamming attacks in IEEE 802.11 MAC,” inProc. IEEE MILCOM, 2009, pp. 1–7.
[15] Y. W. Law, L. Van Hoesel, J. Doumen, P. Hartel, and P. Havinga, “Energyefficient link-layer jamming attacks against wireless sensor network MAC protocols,” inProc. 3rd ACM Workshop Security Ad Hoc Sensor Netw. 2005, pp. 76–88.
[16] S. M. Bamakan, H.Wang, T.Yingjie, Y. shi, An effective instrusion detection framework based on MCLP/SVM optimized by timevarying chaos particle swarm optimization, Neurocomputing, Volume 199, 2016, page 90- 102.
[17] I. Yaqoob, E. Ahmed, M. H. Rehman, A. I. A. Ahmed, M. A. AlGaradi, M. Imran, M. Guizani, The rise of ransomware and emerging security challenges and solutions in the Internet of Things, Computer Networks, Vol. 129, Part 2, pp. 444-458, Dec, 2017.
[18] H. Wang, J. Gu, S. Wang, An effective intrusion detection framework based on SVM with feature augmentation, Knowledge-Based Systems, Volume 136, 2017, Pages 130-139, ISSN 0950-7051, https://doi.org/10.1016/j.knosys.2017.09.014.
[19] D. Gong, Y. Yang, and Z. Pan, “Energy-efficient clustering in lossy wireless sensor networks,”J. Parallel Distrib. Comput. vol. 73, no. 9, pp. 1323–1336, Sep. 2013.
[20] M. Ma, Y. Yang, and M. Zhao, “Tour planning for mobile data gathering mechanisms in wireless sensor networks, ”IEEE Trans. Veh. Technol., vol. 62, no. 4, pp. 1472–1483, May 2013.
[21] M. Zhao and Y. Yang, “Bounded relay hop mobile data gathering in wireless sensor networks,” IEEE Trans. Comput., vol. 61, no. 2, pp. 265–271, Feb. 2012.
[22] K. Xu, H. Hassanein, G. Takahara, and Q. Wang, “Relay node deployment strategies in heterogeneous wireless sensor networks,”IEEE Trans. Mobile Comput., vol. 9, no. 2, pp. 145–159, Feb. 2010.
[23] E. Lee, S. Park, F. Yu, and S.-H. Kim, “Data gathering mechanism with local sink in geographic routing for wireless sensor networks,”IEEE Trans. Consum. Electron. vol. 56, no. 3, pp. 1433–1441, Aug. 2010.
[24] B. Yang, J. Liu, S. Shenker, J. Li, and K. Zheng, “Keep forwarding: Towards K-link failure resilient routing,” inProc. IEEE INFOCOM, Apr./May 2014, pp. 1617–1625.
[25] T. Elhourani, A. Gopalan, and S. Ramasubramanian, “IP fast reroutingfor multi-link failures,” in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2148–2156.
[26] T. Elhourani, A. Gopalan, and S. Ramasubramanian, “IP fast rerouting for multi-link failures,” IEEE/ACM Trans. Netw., vol. 24, no. 5, pp. 3014–3025, Oct. 2016.
[27] M. Chiesa et al., “On the resiliency of static forwarding tables,”IEEE/ACM Trans. Netw., vol. 25, no. 2, pp. 1133–1146, Apr. 2016.
[28] S. Kini, S. Ramasubramanian, A. Kvalbein, and A. F. Hansen, “Fast recovery from dual-link or single-node failures in IP networks using tunneling,” IEEE/ACM Trans. Netw., vol. 18, no. 6, pp. 1988–1999, Dec. 2010.
[29] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,”IEEE Netw., vol. 20, no. 3, pp. 41–47, May/Jun. 2006.
[30] R.-T. Chinta, T. F. Wong, and J. M. Shea, “Energy-efficient jamming attacks in IEEE 802.11 MAC,” inProc. IEEE MILCOM, 2009, pp. 1–7.
[31] D.G.Harkut, M.S.Ali and P.B.Lohiya, “Scheduling Task of Wireless Sensor Network Using Earliest Deadline First Algorithm” in ISROSET-Journal(IJSRCSE), vol.2, Issue.2, pp.1-6, Mar-2014.
[32] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks” Isroset-Journal(IJSRCSE), vol.3, Issue.1, PP.11-15, Jan-2015.
[33] U.Korupolu, S.Kartik, and GK.Chakravarthi, “An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks With the Impact of Collusion Attacks” Isroset-Journal(IJSRCSE), vol.3, Issue.3, PP.26-29, Jan-2016.
[34] Lubdha M. Bendale, Roshani.L. Jain, Gayatri D.Patil, “Study of Various Routing Protocols in Mobile Ad-Hoc Networks”(IJSRNSC) Vol.06, Special Issue.01, PP.1-5, Jan-2018.
[35] Poonam Ahuja, “Bluetooth and Ad Hoc Networking” (IJSRNSC)
Vol.1, Issue.2, PP.31-34, May-2013.
Citation
T. Aruna, R. Anandha Jothi, V. Palanisamy, "Defeating Jamming Attack in Wireless Network Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1384-1388, 2019.
Human Pose Detection From a Digital Image With Machine Learning Technique
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1389-1393, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13891393
Abstract
Continuous development of Information Technology in the field of computer vision and digital image processing has brought new hope to many unfold problems of our daily life. In digital image area problems are solved by representing image as set of pixels with different amplitudes. These pixels are sent as input to the computer system and the system process these values using different algorithms. In this paper, we are working on a model, which is capable of automatically recognizing sitting and standing poses of human from digital photographs. We are also able to tag the respective images with correct pose. In this paper, we have shown standing and sitting poses which are executed using Matlab machine learning technique.
Key-Words / Index Term
Computer vision, Image processing, Human pose, HOG
References
[1] Afzal Ahmad, Mohammad Asif and Shaikh Rohan Ali, “Review Paper on Shallow Learning and Deep Learning Methods for Network security”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.45-54, October 2018.
[2] N.S. Lele, “Image Classification Using Convolutional Neural Network”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.22-26, June 2018.
[3] Chaitra B H, Anupama H S and Cauvery N K, “Human Action Recognition using Image Processing and Artificial Neural Networks”, International Journal of Computer Applications (0975 – 8887)Volume 80 – No.9, October 2013.
[4] Yi Liu, Ying Xu and Shao-bin Li, “2-D Human Pose Estimation from Images based on Deep Learning:A Review”, 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference,2018.
[5] Vasileios Belagiannis and Andrew Zisserman, “Recurrent Human Pose Estimation” 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition, 2017.
[6] Xiao Chu, Wanli Ouyang, Hongsheng Li and Xiaogang Wang, “Structured Feature Learning for Pose Estimation”, IEEE Conference on Computer Vision and Pattern Recognition, 2016.
[7] Wenlin Zhuang Siyu Xia ,Yangang Wang, “Human pose estimation using Direction Maps”, 33rd Youth Academic Annual Conference of Chinese Association of Automation (YAC), 2018.
[8] Alexandros Iosifidis and Anastasios Tefas, “View-Invariant Action Recognition Based on Artificial Neural Networks”, IEEE Transactions on Neural Networks and Learning Systems, Vol. 23, No. 3, March 2012.
[9] Ronald Poppe, “A survey on vision-based human action recognition”, Image and Vision Computing, Volume 28 Issue 6, pp.976-990, June 2010.
[10] Daniel Weinland, Remi Ronfard, and Edmond Boyer, “A survey of vision-based methods for action representation, segmentation and recognition,” Computer Vision and Image Understanding, 115(2):224-241, February 2011.
[11] Toshev, Alexander and Christian Szegedy, “DeepPose: Human Pose Estima-tion via Deep Neural Networks”, 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014.
[12] Ita Lifshitz, Ethan Fetaya and Shimon Ullman, “Human Pose Estimation Using Deep Consensus Voting”, European Conference on Computer Vision, March 2016.
[13] N. Geetha and E. S. Samundeeswari, “A Review on Human Activity Recognition System”, International Journal of Computer Sciences and Engineering, Vol-6, Issue-12, Dec 2018.
[14] Karabi Barman, Parismita Sarma, “Glaucoma Detection Using Fuzzy-C Means Clustering Algorithm and Thresholding”, International Journal of Computer Sciences and Engineering, Vol. 7, Issue. 3, pp. 859-864, 2019.
[15] Navneet Dalal and Bill Triggs, “Histograms of Oriented Gradients for Human Detection”, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005.
Citation
Munindra kakati, Parismita Sarma, "Human Pose Detection From a Digital Image With Machine Learning Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1389-1393, 2019.