An Artificial Neural Network Based Sentiment Analysis System Using Optimization Technique
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1726-1730, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17261730
Abstract
Social Media is the next logical marketing arena. Currently, Social networking sites dominate the digital marketing space. In the past years, the World Wide Web (WWW) has become a huge source of user-generated content and opinionative data. Using social media, such as Twitter, facebook, etc, user shares their views, feelings in a convenient way. Social media, where millions of people express their views in their daily interaction, provides their sentiments and opinions about particular thing. A lot of work done earlier analyzes the polarity from text but the accuracy of existing technique is not acceptable because of the lack of feature optimization selection. The concept of feature optimization is used to find out the relevant data according to the sentiment classes. By using the concept of feature optimization technique, the chances of removal of irrelevant data is more and we can achieve better accuracy. In the proposed work, a classification technique named as Artificial Neural Network (ANN) along with genetic algorithm, an optimization algorithm will be used and it can train the large amount of dataset that is optimized by using Genetic Algorithm (GA) approach and can be divided into their groups according to the feature for social sentiment database.
Key-Words / Index Term
Data mining, Genetic algorithm, ANN,ARM
References
[1] K. Sarvakar, U. K. Kuchara, “Sentiment Analysis of movie reviews: A new feature-based sentiment classification” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp. 8-12 , 2018.
[2] C. Nanda, M. Dua, “A Survey on Sentiment Analysis” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.67-70, 2017.
[3] A. Palve, R. D. Sonawane, Amol D. Potgantwar, “Sentiment Analysis of Twitter Streaming Data for Recommendation using Apache Spark” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp. 99-103, 2017.
[4] S. Jain, “Mining Big Data using Genetic Algorithm” International Research Journal of Engineering and Technology (IRJET 2017), Vol.04, Issue.07, pp.743-747,2017.
[5] S. B. Maind, P Wankar, “Research Paper on Basic of Artificial Neural Network” International Journal on Recent and Innovation Trends in Computing and Communication, Vol.2, Issue.1, pp.96-100, 2014.
[6] N. Sharma, R. Pabreja, U. Yaqub, V. Atluri, S. A. Chun, and J. Vaidya, “Web-based application for sentiment analysis of live tweets,” In the Proceeding of 19th International Conference on Digital Government Research Governance in Data Age, , Delft, Netherlands, pp. 1–2, 2018.
[7] S. M. Jimenez-Zafra, M. T. Martin Valdivia, E. Martinez Camara, and L. A. Urena-Lopez, “Studying the Scope of Negation for Spanish Sentiment Analysis on Twitter,” IEEE Transactions on Affective Computing. , Vol. 14, Issue. 8, pp. 1–14, 2017.
[8] El Alaoui, I., Gahi, Y., Messoussi, R., Chaabi, Y., Todoskoff, A., & Kobi, A, “A novel adaptable approach for sentiment analysis on big social data.” Journal of Big Data, Vol.5(1), pp.1-18, 2018.
[9] C´ and cero N. dos Santos, “Deep Convolutional Neural Networks for Sentiment Analysis of Short Texts,” 25th International Conference on Computing Linguistic, pp. 69–78, 2014.
[10] F. Neri, C. Aliprandi, F. Capeci, M. Cuadros, and T. By, “Sentiment analysis on social media,” In the proceeding of IEEE/ACM International Conference on Advanced Social Networks Analysis Mining, (ASONAM 2012), Birmingham, UK pp. 919–926, 2012.
Citation
Gitanjali, Shailja, "An Artificial Neural Network Based Sentiment Analysis System Using Optimization Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1726-1730, 2019.
Bodo To English Statistical Machine Translation System
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1731-1736, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17311736
Abstract
Machine Translation (MT) is widely considered among the most difficult tasks and applications in the area of Natural Language Processing (NLP) and Computational Linguistics (CL). MT is the method of translating text from source language to target language using computer. The main objective of this proposed research work is to develop Bodo to English machine translation system for enhancing the translation result of Bodo to English Statistical Machine Translation (SMT) System by taking their respective parallel corpus. Here a statistical machine translation engine Moses is used to train statistical models of text translation from source language to a target language. We also used IRSTLM tool to develop the language model and GIZA++ tool to align the words respectively.
Key-Words / Index Term
Bodo Language, English Language, Machine translation, Moses, Corpus
References
[1] Ananthi Sheshasaaye, Angela Deepa. V.R, “The Role of Morphological Analyzer and Generator for Tamil language in Machine Translation Systems”, International Journal of Computer Science Engineering Volume-2, Issue-5, May 2014.
[2] Peter F. Brown et al., “A Statistical Approach to Machine Translation” Computational Linguistics Volume 16, Number 2, June 1990.
[3] Gurpreet Singh Josan & Jagroop Kaur (2011)’ Punjabi to Hindi Statistical Machine Translaiteration’, International Journal of Information Technology and Knowledge Management, Volume 4, No. 2, pp. 459-463 July-December 2011.
[4] Saiful Islam, Bipul Syam Purkayastha, “English to Bodo Machine Transliteration System for Statistical Machine Translation”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, pp. 7989-7997 Number 10, 2018.
[5] Islam, S., Devi, M. I., and Purkayastha, B. S., “A Study on Various Applications of NLP Developed for NorthEast Languages”, International Journal on Computer Science and Engineering, 9(6), pp. 368-378, 2017.
[6] Kalyanee K. Baruah, Pranjal Das, Abdul Hannan, Shikhar Kr. Sarma “Assamese-English Bilingual Machine Translation” International Journal on Natural Language Computing (IJNLC) Vol. 3, No. 3, June 2014.
[7] Pranjal Das and Kalyanee K. Baruah “Assamese to English Statistical Machine Translation Integrated with a Transliteration Module” International Journal of Computer Applications (0975 – 8887) Volume 100– No.5, August 2014.
[8] Das, A., Ekbal, A., Mandal, T., and Bandyopadhyay, S., “English to Hindi Machine Transliteration System at NEWS 2009”, Proceedings of the Named Entities Workshop-2009, ACL-IJCNLP 2009, Suntec, Singapore, pp. 80–83, 2009.
[9] Jaleel, N. A. and Larkey, L. S., “Statistical Transliteration for English-Arabic Cross-Language Information Retrieval”, In the proceedings of the 12th International Conference on Information and Knowledge Management, pp. 139-146, 2003.
[10] Sanjay Kumar Dwivedi and Pramod Premdas Sukhadeve, “Machine Translation System in Indian Perspectives”, Journal of Computer Science, Volume 6, Issue 10, pp. 1111-1116.
[11] D. D. Rao, “Machine Translation A Gentle Introduction”, RESONANCE, July 1998.
[12] Philipp Koehn et al, “Moses: Open Source Toolkit for Statistical Machine Translation”, In the Proceedings of the ACL, June 2007, pp. 177-180.
[13] Md. Zahurul Islam, “English to Bangla Statistical Machine Translation”, Master Thesis, Universitat des Saarlendes, August 2009.
[14] N.Sharma, P.Bhatia, V.Singh, “English to Hindi Statistical Machine Translation”, June 2011.
[15] Aadil, M. and Asger, M., “English to Kashmiri Transliteration System: A Hybrid Approach”, International Journal of Computer Applications, 162(12), 2017.
[16] Biswajit Brahma, Anup Kr Barman, Shikhar Kr. Sarma, Bhatima Boro, “Corpus Building of Literary Lesser Rich Language-Bodo: Insights and Challenges”, Conference: Proceedings of the 10th Workshop on Asian Language Resources, December 2012.
Citation
Maheswar Daimary, Shikhar Kumar Sarma, Mirzanur Rahman, "Bodo To English Statistical Machine Translation System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1731-1736, 2019.
Efficient Retrieval of Relevant Documents by Constructing Ontology Framework
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1737-1740, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17371740
Abstract
Information retrieval has a motive for obtaining the meaningful information on the basis of user demand. Information retrieval plays a major role in providing the information from huge amount of documents as per the requirements. Now days, the huge amount of data has been spread all over the world. We acquire data from various sources viz; internet, social media etc. some data is created by ourselves. In our system we have lot of documents stored but it is very difficult to address meaningful document or to find the information which relates our document. It is time consuming task to collect the needed information or document from the dataset available with us. In this paper, the focus is done over the information retrieval by constructing ontology framework. TF-IDF will help to find frequency of word present in document which will help to get the weightage of document. Input will be dataset & user document and the output will be documents matching the user document. The threshold is set to retrieve the accurate documents.
Key-Words / Index Term
Information retrieval, Feature extraction, term frequency& inverse document frequency, ontology
References
[1] Aizhang Guo, Tao Yang, “Research and Improvement of feature words weight based on TFIDF Algorithm” IEEE 2016.
[2] T.MuthamilSelvan, B.Balamurugan, “Cloud based automated framework for semantic rich ontology construction and similarity computation for E-health applications” 2352-9148, 2016 Elsevier Ltd.
[3] Kaijian Liu and Nora El-Gohary, “Ontology-based sequence labelling for automated information extraction for supporting bridge data analytics” 1877-7058 Elsevier Ltd 2016.
[4] Jie Tao, Amit V. deokar and Omar F. El-Gayar, “An Ontology-based Information Extraction (OBIE) Framework for Analyzing Initial Public Offering (IPO) Prospectus”, 978-1-4799-2504-9/14 IEEE 2014.
[5] Yuefeng Liu and Minyoung Shi, Chunfang Li, “Domain Ontology Concept Extraction Method Based on Text” 978-1-5090-0806-3/16, 2016 IEEE, ICIS 2016.
[6] Chaleerat Thamrongchote and wiwat vatanwood, “Business Process Ontology for Defining User Story” 978-1-5090-0806-3/16, IEEE 2016, ICIS 2016.
[7] Tarek Helmey, Ahmed Al-Nazer, Saeed Al-Bukhitan, Ali Iqbal, “Health, Food and User’s Profile Ontologies for Personalized Information Retrieval” Elsevier B.V 2015.
[8] Ying Qin, “Applying Frequency and Location Information to Keyword Extraction In Single Document” 978-1-4673-1857-0/12 IEEE 2012.
[9] Bernardus Ari Kuncoro and Banbang Heru Iswanto, “TF-IDF Method in Ranking Keywords of Instagram User’s Image Caption” 978-1-4673-6664-9/15 IEEE 2015.
[10] Prafulla Bafna, Dhanya Pramod, Anagha Vaidya, “Document Clustering: TF-IDF” 978-1-4673-9939-5 IEEE 2016.
[11] Amol N. Jamgade, Shivkumar J. Karale, “Ontology Based Information Retrieval System for Academic Library” 978-1-4799-6818-3/15 IEEE 2015.
[12] Aradhana R Patil, Amrita A Manjrekar, “A Novel Method To Summarize and Retrieve Text Documents Using Text Feature Extraction Based on Ontology” 978-1-5090-0774-5/16 IEEE 2016.
[13] Mohamed K. Elhadad, Khaled M. Badran, Gouda I. Salama, “A Novel Approach for Ontology-based Dimensionality Reduction for Web Text Document Classification” IEEE ICIS 2017, Wuhan, China.
[14] Yan Ying, Tan Qingping, Xie Qinzheng, Zeng Ping, Li Panpan “A Graph-based Approach of Automatic Keyphrase Extraction” 1877-0509 ICICT 2017.
[15] Eko Darwiyanto, Ganang Arief Pratama, Sri Widowati, “ Multi Words Quran and Hadith Searching Based on News Using TF-IDF” 978-1-4673-9879-4 IEEE 2016.
Citation
Sharvali S. Sarnaik, Ajit S. Patil, "Efficient Retrieval of Relevant Documents by Constructing Ontology Framework," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1737-1740, 2019.
Diagnosis of Diabetes Using Convolutional Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1741-1744, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17411744
Abstract
Modern society because of their life style is always prone to imbalanced metabolism disease called diabetes. Early diagnosis of diabetes is major challenge in real life since people don’t check their blood glucose level very often. But if the diabetes remains unattended or is detected at late stage, may lead to severe problem. So, what is important is to predict the diabetes at earliest. For the same reason various researchers are taking efforts by using various data mining techniques for the early prediction of diabetes. The automated prediction system is just one of the outcomes of the efforts taken by the researchers. The proposed system uses convolutional neural network for this kind of classification.
Key-Words / Index Term
diabetes, Prediction of diabetes, convolution neural network, classification
References
[1] J. S. a. P. Z. Hans Schneider, "Guidelines for the Detection of Diabetes Mellitus - Diagnostic Criteria and Rationale for Screening," The Clinical Biochemist Reviews, vol. 24, no. 3, pp. 77-80, August 2003.
[2] Z. P. Ronald Goldenberg, "Definition, Classification and Diagnosis of Diabetes, Prediabetes," Canadian Journal of Diabetes, vol. 37, no. 1, pp. s8-s11, 2013.
[3] A. M. PARITA PATEL, "Diabetes Mellitus: Diagnosis and Screening," American Family Physician, vol. 81, no. 7, pp. 863-870, April 2010.
[4] A. D. Association, "Diagnosis and Classification of Diabetes Mellitus," Diabetes Care, vol. 27, no. 1, pp. s5-s10, jan 2004.
[5] D. C. Y. Tharani.S, "Classification using Convolutional Neural Network for Heart and Diabetics Datasets," International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no. 12, pp. 417-422, december 2016.
[6] 2017. [Online]. Available: https://deeplearning4j.org/neuralnet-overview#concept.
[7] F. C. D. M. B. S. P. H. Y. Z. Harry Pratta, "Convolutional Neural Networks for Diabetic Retinopathy," in Elsevier`s, Loughborough, UK, 2016.
[8] X. F. a. L. A. Alexandre, "Weighted Convolutional Neural Network Ensemble," CiteSeerX , 2014.
[9] D. Y. M. G. a. T. L. Carson Lam, "Automated Detection of Diabetic Retinopathy using Deep Learning," AMIA Summits on Translational Science Proceedings, vol. 2017, p. 147–155, 2018.
[10] K. A. Ebenezer Obaloluwa Olaniyi, "Onset Diabetes Diagnosis Using Artificial Neural Network," International Journal of Scientific & Engineering Research, vol. 5, no. 10, pp. 754-759, October 2014.
[11] P. V. a. S. Anitha, "Application of a radial basis function neural network for diagnosis of diabetes mellitus," CURRENT SCIENCE, vol. 91, no. 9, pp. 1195-1199, November 2006.
[12] A. J. Zahed Soltani, "A New Artificial Neural Networks Approach for Diagnosing Diabetes Disease Type II," International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, pp. 89-94, 2016.
[13] K. K. P. N. A. P. E. P. Mrs. Madhavi Pradhan, "Design of Classifier for Detection of Diabetes using Neural Network and Fuzzy k-Nearest Neighbor Algorithm," International Journal Of Computational Engineering Research, vol. 2, no. 5, pp. 1384-1387, September 2012.
[14] R. Zolfaghari, "Diagnosis of Diabetes in Female Population of Pima Indian Heritage with Ensemble of BP Neural Network and SVM," IJCEM International Journal of Computational Engineering & Management, vol. 15, no. 4, pp. 115-121, July 2012.
[15] D. R. K. S. Manaswini Pradhan, "Predict the onset of diabetes disease using Artificial Neural Network (ANN)," International Journal of Computer Science & Emerging Technologies , vol. 2, no. 2, pp. 303-311, April 2011.
[16] T. Y. Kamer Kayaer, "Medical diagnosis on Pima Indian diabetes using general regression neural networks," Researchgate, january 2003.
[17] R. &. M. M. &. M. K. S. Ramezani, "A novel hybrid intelligent system with missing value imputation for diabetes diagnosis," Alexandria Engineering Journal., April 2017.
[18] D. &. P. S. Choubey, " GA_RBF NN: a classification system for diabetes," International Journal of Biomedical Engineering and Technology, vol. 23, no. 1, pp. 71-91, august 2017.
[19] S. K. P. V. R. Swapna G., "Automated detection of diabetes using CNN and CNN-LSTM network and heart rate signals," Procedia Computer Science, vol. 132, pp. 1253-1262, 2018.
[20] R. A. Piyush Samant, "Machine learning techniques for medical diagnosis of diabetes using iris imges," Computer Methods and Programs in Biomedicine, vol. 157, pp. 121-128, 2018.
[21] 2003. [Online]. Available: ] http://ftp.ics.uci.edu/pub/ml-repos/machine-learning databases/pima-indians-diabetes .
Citation
Tushar Deshmukh, H.S. Fadewar, Ankur Shukla, "Diagnosis of Diabetes Using Convolutional Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1741-1744, 2019.
Behavioral Analysis of Routing Protocols in VANET
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1745-1749, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17451749
Abstract
The vehicular ad-hoc network (VANET) plays a prominent role in the driver safety through inter-vehicular communication (V2V). Routing is one of the aspects through which vehicle communication have performed through message passing. IEEE 802.11p with the help DSRC supports communication among vehicles (V2V) and in between vehicle to infrastructure (V2I) communication. VANET is basically different from the conventional wireless ad-hoc networks with respect to the speed of the vehicle, fast changes in the topology, fixed movement pattern and frequent disconnection in the links. Thus, developing a routing protocol is a tedious task in the VANET environment. The objective is to verify the behavioral performance analysis of the topological routing protocols in the VANET. The paper consist of the description of the topological routing protocols such as AODV DSDV and AOMDV routing protocols. The simulation is conducted for the topological routing protocols using various scenarios. The parameter analyzed are the average end to end delay, packet delivery ratio, normalized routing load and throughput.
Key-Words / Index Term
VANET, DSRC, Routing Protocols, AODV, DSDV
References
[1] S. K. Bhoi and P. M. Khilar, "Vehicular communication: a survey," in IET Networks, vol. 3, no.3, pp. 204-217, September 2014.
[2] Marzak B., Toumi H., Benlahmar E., Talea M., “Performance Analysis of Routing Protocols in Vehicular Ad Hoc Network”, In El- (eds) Advances in Ubiquitous Networking 2. Lecture Notes in Electrical Engineering, vol 397. Springer, Singapore. pp. 31-42, 2017.
[3] Hyun Yu, Sanghyun Ahn and John Yoo, “ A Stable Routing Protocol for Vehicles in Urban Environments”, International Journal of Distributed Sensor Networks volume, 2013.
[4] F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Vehicular Technology Magazine, vol. 2, no. 2, pp. 12-22, June 2007.
[5] J. B. Kenney, "Dedicated Short-Range Communications (DSRC) Standards in the United States," In the Proceedings of the IEEE, vol. 99, no. 7, pp. 1162-1182, July 2011.
[6] Tarapiah, Saed, Aziz, Kahtan, Atalla and Shadi, “Analysis the Performance of Vehicles Ad Hoc Network,” Procedia Computer Science 4th Information Systems International Conference ISICO 2017, Bali Indonesia, 2017.
[7] Yasser Ahmed, M. Zorkany and Kader Abdel Neamat, “Vanet routing protocol for V2V implementation A suitable solution for developing countries,” Cogent Engineering, 2017.
[8] G. Li, L. Boukhatem and J. Wu, "Adaptive Quality-of-Service-Based Routing for Vehicular Ad Hoc Networks With Ant Colony Optimization," IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3249-3264, April 2017.
[9] M. Hashem Eiza, T. Owens and Q. Ni, "Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs," in IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 1, pp. 32-45, Jan.-Feb. 1 2016.
[10] J. Harri, F. Filali, and C. Bonnet, "Mobility models for vehicular ad hoc networks: a survey and taxonomy," in IEEE Communications Surveys & Tutorials, vol. 11, no. 4, pp. 19-41, Fourth Quarter 2009.
[11] S. A. Ben Mussa, M. Manaf, K. Z. Ghafoor and Z. Doukha, "Simulation tools for vehicular ad hoc networks: A comparison study and future perspectives," 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakech, 2015, pp. 1-8.
[12] Martinez, F. J., Toh, C. K., Cano, J.-C., Calafate, C. T. and Manzoni, P. (2011), “A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)”. Wirel. Commun. Mob. Comput., 11: 813–828
[13] V. Bondre and S. Dorle, "Design and performance evaluation of AOMDV routing protocol for VANET," International Conference on Computer, Communication and Control (IC4), pp. 1-4, 2015, Indore.
[14] Marina Mahesh K. and Das Samir R., “Ad hoc on-demand multipath distance vector routing,”WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, vol 6, pp. 969-988,2006.
Citation
B.S. Yelure, S.P. Sonavane, "Behavioral Analysis of Routing Protocols in VANET," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1745-1749, 2019.
Parallel Computing Approaches for Dimensionality Reduction in the High-Dimensional Data
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.1750-1755, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17501755
Abstract
The machine learning, as well as data mining techniques, deals with huge datasets. The numbers of dimensions (many features or instances) for these datasets are very large, which reduces performance (accuracy) of classification. The high dimensionality data models generally involve enormous data to be modeled and visualized for knowledge extraction which may require feature selection, classification, and prediction. Because of the high dimensionality of the datasets, it often consists of many redundant and irrelevant features which will grow the classification complexity while degrade the learning algorithm performance. Recent research focuses on improving accuracy by the way of dimension reduction techniques resulting in reducing computing time. So, it leads researchers to easily opt for parallel computing on high-performance computing (HPC) infrastructure. Parallel computing on multi-core and many-core architectures has evidenced to be important when searching for high-performance solutions. The general purpose graphics processing unit (GPGPU) has gained a very important place in the field of high-performance computing as a result of its low cost and massively data processing power. Also, parallel processing techniques achieve better speedup and scaleup. The popular dimensionality reduction methods are reviewed in this paper. These methods are Linear Discriminant Analysis (LDA), Principal Component Analysis (PCA), Random Projection (RP), Auto-Encoder (AE), Multidimensional scaling (MDS), Non-negative Matrix Factorization (NMF), Locally Linear Embedding (LLE), Extreme Learning Machine (ELM) and Isometric Feature Mapping (Isomap). The objective of this paper is to present parallel computing approaches on multi-core and many-core architectures for solving dimensionality reduction problems in high dimensionality data.
Key-Words / Index Term
High-performance computing, Parallel computing, Dimensionality reduction, Classification, High-dimensionality data, Graphics processing unit
References
[1] E. Martel, R. Lazcano, J. Lopez, D. Madronal et al., “Implementation of the Principal Component Analysis onto High-Performance Computer Facilities for Hyperspectral Dimensionality Reduction: Results and Comparisons”, Remote Sens, Vol. 10, issue. 6, pp. 864, 2018.
[2] S. Ramirez-Gallego, I. Lastra et al.,“Fast-mrmr: fast minimum redundancy maximum relevance algorithm for high-dimensional big data”, Int. J. Intell. Syst . Vol. 32, Issue. 2, pp. 134-152, 2017.
[3] H. Kvinge, E. Farnell, M. Kirby, and C. Peterson, “A GPU-Oriented Algorithm Design for Secant-Based Dimensionality Reduction”, 17th IEEE International Symposium on Parallel and Distributed Computing (ISPDC), Geneva, pp. 69-76, 2018.
[4] H. Hotelling, “Analysis of a complex of statistical variables into principal components”, J. Edu. Psychol., vol. 24, Issue. 6, pp. 417-441, 1933.
[5] D. Lee, H. Seung, “Learning the parts of objects by non-negative matrix factorization”, Nature, vol. 401, pp. 788-791, 1999.
[6] D. Achlioptas, “Database-friendly random projections”, Proc. 20th Symp. Principles Database Syst., pp. 274-281 , 2001.
[7] Y. Bengio, “Learning deep architectures for AI”, Found. Trends Mach. Learn., vol. 2, no. 1, pp. 1-127, 2009.
[8] Y. Bengio, A. Courville, P. Vincent, “Representation learning: A review and new perspectives”, IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, issue. 8, pp. 1798-1828, 2013.
[9] M. Chen, Z. Xu et al., “Marginalized denoising autoencoders for domain adaptation”, Proc. 29th Int. Conf. Mach. Learn., pp. 767-774, 2012.
[10] T. Cox, M. Cox, “Multidimensional Scaling”, Handbook of Data Visualization. Springer Handbooks Comp.Statistics. Springer, Berlin, Heidelberg, pp. 316-341, 2008.
[11] S. Roweis, L. Saul, “Nonlinear Dimensionality Reduction by Locally Linear Embedding”, Science, vol. 290, pp. 2323-2326, 2000.
[12] J. Tenenbaum, V. de Silva, J. Langford, “A Global Geometric Framework for Non- linear Dimensionality Reduction”, Science, vol. 290, pp. 2319-2323, 2000.
[13] L. Kasun, Y. Yang, G. Huang and Z. Zhang, “Dimension Reduction With Extreme Learning Machine”, IEEE Transactions on Image Processing, vol. 25, no. 8, pp. 3906-3918, 2016.
[14] K. Beyer, J. Goldstein, R. Ramakrishnan, U. Shaft, “When is nearest neighbor" meaningful?. Database Theory - ICDT99, 217{235}, 1999.
[15] J. Chen et al., “A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment", IEEE Transactions on Parallel and Distributed Systems, vol. 28,issue. 4, pp. 919-933, 2017.
[16] Y. Wang, A. Shrivastava, J. Wang, and J. Ryu, “Randomized Algorithms Accelerated over CPU-GPU for Ultra-High Dimensional Similarity Search”, ACM Proceedings of International Conference on Management of Data. pp. 889-903, 2018.
[17] S. Ramirez-Gallego et al., “An Information Theory-Based Feature Selection Framework for Big Data Under Apache Spark”, IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 48, Issue. 9, pp. 1441-1453, 2018.
[18] R. Jin, G. Chen, Anthony K. H. Tung, Lidan Shou, and Beng Chin Ooi, “An Optimized Iterative Semantic Compression Algorithm And Parallel Processing for Large Scale Data”, KSII Transactions on Internet and Information Systems. Vol. 12, issue. 6, pp. 2761- 2781, 2018.
[19] M. Awan and F. Saeed, “An Out-of-Core GPU based Dimensionality Reduction Algorithm for Big Mass Spectrometry Data and Its Application in Bottom-up Proteomics”, ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, New York, pp. 550-555, 2017.
[20] K. Siddique, Z. Akhtar et al., “Apache Hama: An Emerging Bulk Synchronous Parallel Computing Framework for Big Data Applications”, IEEE Access. 4, pp. 8879-8887, 2016.
[21] T. Mingjie, Y. Yu et al., “Efficient Parallel Skyline Query Processing for High-Dimensional Data”, IEEE Transactions on Knowledge and Data Engineering, Vol. 30, issue. 10, 2018.
[22] K. Passi, A. Nour and C. K. Jain, “Markov blanket: Efficient strategy for feature subset selection method for high dimensional microarray cancer datasets”, IEEE International Conference on Bioinformatics and Biomedicine, USA, 2017.
[23] Z. Wu, Y. Li et al., “Parallel and Distributed Dimensionality Reduction of Hyperspectral Data on Cloud Computing Architectures”, IEEE Journal of Selected Topics, vol. 9, issue. 6, pp. 2270-2278, 2016.
Citation
Siddheshwar V. Patil, Dinesh B. Kulkarni, "Parallel Computing Approaches for Dimensionality Reduction in the High-Dimensional Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1750-1755, 2019.
Automation of Security System Using Machine Learning
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1756-1761, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17561761
Abstract
This project mainly focuses on controlling and securing our home or office using machine learning technology. In this system we are implementing a system to monitor our home or office using a security camera system. Most thefts are done in the night and most of the times thieves cover their face during the theft time. So even though the home and office have those security camera systems, we are unable to identify the thief. In this project we use the machine learning technology in the security camera. It identifies each and every object in the visuals by real time. Whenever it identifies a person in the night, the system will send message to the concerned admin and nearby police station. Alarm will be produced as it automatically sends signal to our automation system. This system has the ability to identify the person, animals and all other objects. So system won’t work when it identify an animal in the night.
Key-Words / Index Term
Machine Learning technology, Security Camera, Identify
References
[1] Bejammin Danielsson, “Real-time object detection and identification Using machine learning, training a model from a pretrained checkpoint”.
[2] Human Motion Detection and Tracking for Real-Time Security System Pavithra ,Mahanthesh, Stafford Michahial1, Dr. M Shivakumar Asst. Professor, Department of IT1 Prof & Head, Department of ITI. International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 5, Issue 12, December 2016.
[3] Nwalozie G. C, Aniedu A. N, Nwokoye C. S, Abazuonu I.E “SMS Based Intruder Detection System” IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1177 – 1184.
[4] Jorge Garcia, Alfredo Garden, Ignacio Bravo, Jose Luis Lazar and Miguel Martinez, (2013).“Tracking People Motion Based Extended Condensation .Algorithm, ”IEEE Trans.Syst.,Man,Cybern. A, Syst., vol. 43, No. 3, May.
[5] Y.-L. Hou and G. K. H. Pang, (2011).“People counting and human detection in a challenging situation,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans,vol. 41, no. 1, pp. 24-33, Jan.
[6] X. Zhao, E. Delleandrea, and L. Chen, (2009).“A people counting system based on face detection and tracking in a video,” in Proc. IEEE Int. Conf. AVSS, pp. 67-72.
[7] Xiaowei Zhou, Can Yang, and Weichuan Yu, (2013). “Moving Object Detection by Detecting Contiguous Outliers in the LowRank Representation” IEEE Trans.
[8] Shi-qi Xing, Yong-zhen Li, Da-hai Dai, XueSongWang,(2012).“Three-Dimensional Reconstruction of ManMade Objects Using Polarimetric Tomographic SAR”, IEEE Trans. Vol. 51, Issue: 6 Journal on Geoscience and Remote Sensing.
[9] Liyuan Li, Weimin HuangIreneYu-Hua Gu, and. QiTian, (2004). “Statistical Modelling of Complex Backgroundsfor Foreground Object Detection” IEEE Transon Image Processing, Vol. 13, NO. 11
[10] Weiming Hu, Xue Zhou, Wei Li, WenhanLuo, Xiaoqin Zhang, and Stephen Maybank,(2013).“Active Contour-Based VisualTracking by Integrating Colors, Shapes ,and Motions Image Processing”, IEEETrans.onImageProcessing,Vol.22
[11] .Hsu-Yung Cheng, Chih-Chia Weng, Yi-Ying Chen, (2012). “Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks”, IEEE Trans on Image Processing, Vol.21, Issue:4.
[12] Pushe Zhao, Hongbo Zhu, He Li, and Tadashi Shibata, (2013). “A Directional-Edge-Based Real-Time Object Tracking System Employing Multiple Candidate-Location Generation” IEEE Trans.vol. 23,no. 3, Mar.
[13] Wang. H and Suter.D, (2006). “A Novel Robust Statistical Method for Background Initialization and Visual Surveillance” Proc. Asian Conf. Computer Vision.
Citation
Sam Sebastian, Dipin S Nair, Aiswarya B Nair, Jeswin Elza Varghese, Sithu Ubaid, "Automation of Security System Using Machine Learning," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1756-1761, 2019.
Increasing Power generation by increasing efficiency of merged operation of Hybrid Solar and Biomass Plant
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1762-1765, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17621765
Abstract
In most of the countries, Electricity Power is a major concern. Specially for the developing countries like India. For Electricity Power generation from Fossil fuels will not be last long, as well as they cause pollution in environment. There are other factors that can be count for Power generation can be generating the Power from agriculture waste, also heat energy can be stored through various technology for generating power form it when it’s required. In this paper there is literature review of Increasing the Power generation by increasing the efficiency of Biomass plant, thermal plant, Solar plant or by the combination of all these in appropriate way. Possible methods are assumed for two plants. One is combination of solar and Biogas plant, which can be operated on steam as well as gas turbine as it can increase the efficiency by 50%. In another system there is thermal storage system, with the help of molten salt as Solar can provide the energy during day time only, but the thermal storage system it can generate energy when sun radiations are not available.
Key-Words / Index Term
Solar plant, Biomass plant, efficiency
References
[1] Antonia M Pantaleo, Sergio M Camporeale, Arianna Sorrentino, Adio Miliozzi, Nilay Shah, Chirstos N Markids, “Solar/biomass hybrid cycles with thermal storage and bottoming ORC: System integration and economic analysis” In Proceeding of Energy Procedia, Vol.129, pp. 724-731, 2017
[2] B. Grange, C. Dalet, Q. Falcoz, F. Siros, A. Ferriere, “Simulation of hybrid Solar gas-turbine cycle with storage integration” In Proceeding of Energy procedia, Vol.49, pp.1147-1156, 2014
[3] Ifegwu Eziyi, Anjaneyula Krothapalli, “Sustainable Rural Development: Solar/ Biomass Hybrid Renewable Energy Systems” In proceeding of Energy procedia, Vol.57, pp. 1492-1501, 2014
[4] T.Srinivas, B.V. Reddy, “Hybrid solar-biomass power plant without energy storage” In Proceeding of Case Studies in Thermal Engineering, Vol.2, pp.75-81, 2014
[5] J. Spelling, B. Laumert, T. Fransson, “Advanced hybrid Tower combined-cycle power plants” In Proceedings of Energy Procedia, SolarPACES 2013
[6] J.H. Peterseim, A. Tadros, S. White, U. Hellwig, J. Landler, Kinneth Galang, “Solar tower-biomass hybrid plant-maximizing plant performance”, In Proceedings of Energy Procedia, SolarPACES 2013
[7] S.Kibaara, S.Chowdhury, SP.Chowdhury, “A Thermal Analysis of Parabolic Trough CSP Biomass Hybrid Power System” In the Proceedings of the IEEE Power Engineering Society Transmission and Distribution Conference 2012
[8] Swati Negi, Lini Mathew, “Hybrid Renewable Energy System: A Review”, International Journal of Electronic and Electrical Engineering, Vol.7, pp.535-542, 2014
[9] Thilo Bocklisch, “Hybrid energy storage systems for renewable energy applications” In the Proceedings of the International Renewable energy Storage Conference, IRES 2015
Citation
Vipanjit Kaur, S. Grover, "Increasing Power generation by increasing efficiency of merged operation of Hybrid Solar and Biomass Plant," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1762-1765, 2019.
A Survey on Efficient and Secure Techniques for Storing Sensitive Data on Cloud
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.1766-1777, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17661777
Abstract
Cloud computing, being the most recent emerging paradigm, is a technological advancement that aims at turning the vision of computing utilities into a reality. Simply, it is an approach of making technology available to the users, by the usage of Internet servers for data storage and processing. More specifically, cloud computing offers users benefits such as scalability, availability, reliability and global accessibility. Being a radical mechanism, the major obstacles for massive adoption of cloud computing are security, trust and privacy issues. With some defensive procedures like using a combination of methods that include encryption, authentication, and authorization, users are still concerned about the risks associated with their stored data. In this survey, many efficient and secured claiming techniques are investigated for end users to access the data stored in the cloud. The focus is here much on securing the data residing in cloud and privacy in accessing them. The study will throw lights upon keyword search, indexing, file splitting, encryption, and multi-cloud. Further, various methodologies in the existing system and performance of algorithms together with their pros and cons are discussed. Also, cloud security challenges, privacy and communication issues are considered and addressed here.
Key-Words / Index Term
Keyword Search, Secure Data, Data Privacy, Cloud Computing, Splitting Techniques, Encryption
References
[1] M. Almorsy, J. Grundy, and I. M¨uller, “An analysis of the cloud computing security problem,” arXiv preprint arXiv:1609.01107, 2016.
[2] Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multikeyword ranked search scheme over encrypted cloud data.” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, 2016.
[3] P.Arora,A.Singh,andH.Tyagi,“Evaluationandcomparisonofsecurity issues on cloud computing environment,” World of Computer Science and Information Technology Journal (WCSIT), vol. 2, no. 5, pp. 179– 183, 2012.
[4] E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing,” in Informatics and Systems (INFOS), 2012 8th International Conference on. IEEE, 2012, pp. CC– 12.
[5] S. El-etriby, E. M. Mohamed, and H. S. Abdul-kader, “Modern encryption techniques for cloud computing,” in ICCIT, 2012, pp. 800–805.
[6] S. S. Khan and R. Tuteja, “Security in cloud computing using cryptographic algorithms,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 1, pp. 148–155, 2015.
[7] E.-J. Goh et al., “Secure indexes.” IACR Cryptology ePrint Archive, vol. 2003, p. 216, 2003.
[8] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on. IEEE, 2010, pp. 253–262.
[9] K. W. Nafi, T. S. Kar, S. A. Hoque, and M. Hashem, “A newer user authentication, file encryption and distributed server based cloud computing security architecture,” arXiv preprint arXiv:1303.0598, 2013.
[10] J. Wang, H. Ma, Q. Tang, J. Li, H. Zhu, S. Ma, and X. Chen, “Efficient verifiable fuzzy keyword search over encrypted data in cloud computing,” Computer Science and Information Systems, vol. 10, no. 2, pp. 667–684, 2013.
[11] P. Rewagad and Y. Pawar, “Use of digital signature with diffie hellman key exchange and aes encryption algorithm to enhance data security in cloud computing,”in Communication Systems and Network Technologies (CSNT), 2013 International Conference on. IEEE, 2013, pp. 437–439.
[12] I.-H. Chuang, S.-H. Li, K.-C. Huang, and Y.-H. Kuo, “An effective privacy protection scheme for cloud computing,” in Advanced Communication Technology (ICACT), 2011 13th International Conference on. IEEE, 2011, pp. 260–265.
[13] R. Chen, Y. Mu, G. Yang, F. Guo, and X. Wang, “Dual-server publickey encryption with keyword search for secure cloud storage,” IEEE transactions on information forensics and security, vol. 11, no. 4, pp. 789–798, 2016.
[14] Z. Xin, L. Song-qing, and L. Nai-wen, “Research on cloud computing data security model based on multi-dimension,” in Information technology in medicine and education (itme), 2012 international symposium on, vol. 2. IEEE, 2012, pp. 897–900.
[15] V. Fusenig and A. Sharma, “Security architecture for cloud networking,” in Computing, Networking and Communications (ICNC), 2012 International Conference on. IEEE, 2012, pp. 45–49.
[16] [16] S. R. Lenka and B. Nayak, “Enhancing data security in cloud computing using rsa encryption and md5 algorithm,” International Journal of Computer Science Trends and Technology, vol. 2, no. 3, pp. 60–64, 2014.
[17] W. Itani, A. Kayssi, and A. Chehab, “Privacy as a service: Privacyaware data storage and processing in cloud computing architectures,” in Dependable, Autonomic and Secure Computing, 2009. DASC’09. Eighth IEEE International Conference on. IEEE, 2009, pp. 711–716.
[18] D. Liu and S. Wang, “Programmable order-preserving secure index for encrypted database query,” in 2012 IEEE Fifth International Conference on Cloud Computing. IEEE, 2012, pp. 502–509.
[19] J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li, “Toward secure multikeyword top-k retrieval over encrypted cloud data,” IEEE transactions on dependable and secure computing, vol. 10, no. 4, pp. 239–250, 2013.
[20] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multikeyword ranked search over encrypted cloud data,” IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, pp. 222–233, 2014.
[21] N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou, “Privacy-preserving query over encrypted graph-structured data in cloud computing,” in Distributed Computing Systems (ICDCS), 2011 31st International Conference on. IEEE, 2011, pp. 393–402.
[22] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Infocom, 2010 proceedings ieee. Ieee, 2010, pp. 1–9.
[23] R. Sakr, F. Omara, and O. Nomir, “An optimized technique for secure data over cloud os,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume, vol. 3.
[24] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in European symposium on research in computer security. Springer, 2009, pp. 355–370.
[25] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security i.n cloud computing,” in Quality of Service, 2009. IWQoS. 17th International Workshop on. Ieee, 2009, pp. 1–9.
[26] ZQian, G.Yufei, L.Hong, and S.Jin, “A load balancing task scheduling algorithm based on feedback mechanism for cloud computing,” International Journal of Grid and Distributed Computing, vol. 9, no. 4, pp. 41–52, 2016.
[27] B. U. I. Khan, A. M. Baba, R. F. Olanrewaju, S. A. Lone, and N. F. Zulkurnain, “Ssm: Secure-split-merge data distribution in cloud infrastructure,” in Open Systems (ICOS), 2015 IEEE Confernece on. IEEE, 2015, pp. 40–45.
[28] A. Negi, M. Singh, and S. Kumar, “An efficent security farmework design for cloud computing using artificial neural networks,” International Journal of Computer Applications, vol. 129, no. 4, p. 1721, 2015.
[29] G. Jakimoski and L. Kocarev, “Chaos and cryptography: block encryption ciphers Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 48, no. 2, pp. 163–169, 2001.
[30] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Infocom, 2010 proceedings IEEE. Ieee, 2010, pp. 1–9.
[31] H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-based authentication for cloud computing,” in IEEE International Conference on Cloud Computing. Springer, 2009, pp. 157–166.
[32] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted data in cloud computing,” in Distributed Computing Systems (ICDCS), 2011 31st International Conference on. IEEE, 2011, pp. 383–392.
[33] I. Houidi, M. Mechtri, W. Louati, and D. Zeghlache, “Cloud service delivery across multiple cloud platforms,” in Services Computing (SCC), 2011 IEEE International Conference on. IEEE, 2011, pp. 741–742.
[34] I.-H. Chuang, S.-H. Li, K.-C. Huang, and Y.-H. Kuo, “An effective privacy protection scheme for cloud computing,” in Advanced Communication Technology (ICACT), 2011 13th International Conference on. IEEE, 2011, pp. 260–265.
[35] Y.Zhu, H.Hu, G.-J.Ahn, and M.Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE transactions on parallel and distributed systems, vol. 23, no. 12, pp. 2231–2244, 2012.
[36] P. Xu, H. Jin, Q. Wu, and W. Wang, “Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack,” IEEE Transactions on computers, vol. 62, no. 11, pp. 2266– 2277, 2013.
[37] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing,” in Workshop on Cryptography and Security in Clouds (WCSC 2011), vol. 1217889, 2011.
[38] B. Parno, J. Howell, C. Gentry, and M. Raykova, “Pinocchio: Nearly practical verifiable computation,” in 2013 IEEE Symposium on Security and Privacy. IEEE, 2013, pp. 238–252.
[39] S. Raghavendra, K. Meghana, P. Doddabasappa, C. Geeta, R. Buyya, K. Venugopal, S. Iyengar, and L. Patnaik, “Index generation and secure multi-user access control over an encrypted cloud data,” Procedia Computer Science, vol. 89, pp. 293–300, 2016.
[40] B. Thuraisingham, V. Khadilkar, A. Gupta, M. Kantarcioglu, and L. Khan, “Secure data storage and retrieval in the cloud,” in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference on. IEEE, 2010, pp. 1–8.
[41] S. Raghavendra, K. Nithyashree, C. Geeta, R. Buyya, K. Venugopal, S. Iyengar, and L. Patnaik, “Frorss: Fast result object retrieval using similarity search on cloud,” in Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), IEEE. IEEE, 2016, pp. 107–112.
[42] S.Kar,M.P.Mahmud,S.H.Farjana,K.W. Nafi,andB.C. Karmokar, “A newer secure communication, file encryption and user identification based cloud security architecture,” International Journal of Computer Applications, vol. 52, no. 4, 2012.
[43] A. Hussain, C. Xu, and M. Ali, “Security of cloud storage system using various cryptographic techniques.”
[44] P. S. Patel, K. Patidar, M. Yadav, R. Kushwah, and S. SSSIST, “A result paper on outsourced revocation of encryption based on identity in cloud computing,” International Journal of Engineering Science, vol. 16078, 2018.
[45] P. V. Parmar, S. B. Padhar, S. N. Patel, N. I. Bhatt, and R. H. Jhaveri, “Survey of various homomorphic encryption algorithms and schemes,” International Journal of Computer Applications, vol. 91, no. 8, 2014.
[46] G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp. 735–737.
[47] M. Tebaa, S. El Hajji, and A. El Ghazi, “Homomorphic encryption applied to the cloud computing security,” in Proceedings of the World Congress on Engineering, vol. 1, 2012, pp. 4–6.
[48] T. Matsuda, G. Hanaoka, K. Matsuura, and H. Imai, “Simple ccasecure public key encryption from any non-malleable identity-based encryption,” in International Conference on Information Security and Cryptology. Springer, 2008, pp. 1–19.
[49] E. Vaidehi, “Computing aggregation function minimum/maximum using homomorphic encryption schemes in wireless sensor networks (wsns),” California State University, East Bay Hayward, CA, USA, vol. 14, 2007.
[50] R. Arora, A. Parashar, and C. C. I. Transforming, “Secure user data in cloud computing using encryption algorithms,” International journal of engineering research and applications, vol. 3, no. 4, pp. 1922–1926, 2013.
[51] J. Hu and A. Klein, “A benchmark of transparent data encryption for migration of web applications in the cloud,” in Dependable, Autonomic and Secure Computing, 2009. DASC’09. Eighth IEEE International Conference on. IEEE, 2009, pp. 735–740.
[52] S.Wangand G.Liu, “File encryption and decryption system based on rsa algorithm,” in Computational and Information Sciences (ICCIS), 2011 International Conference on. IEEE, 2011, pp. 797–800.
[53] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004, pp. 563– 574.
[54] D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing,” in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 1. IEEE, 2012, pp. 647–651.
[55] C.-K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Keyaggregate cryptosystem for scalable data sharing in cloud storage,” IEEE transactions on parallel and distributed systems, vol. 25, no. 2, pp. 468– 477, 2014.
[56] E. Shen, E. Shi, and B. Waters, “Predicate privacy in encryption systems,” in Theory of Cryptography Conference. Springer, 2009, pp. 457–473.
[57] J. Wang, S. Wu, H. Gao, J. Li, and B. C. Ooi, “Indexing multidimensional data in a cloud system,” in Proceedings of the 2010 ACM SIGMOD International Conference on Management of data. ACM, 2010, pp. 591–602.
[58] S. Wu, D. Jiang, B. C. Ooi, and K.-L. Wu, “Efficient b-tree based indexing for cloud data processing,” Proceedings of the VLDB Endowment, vol. 3, no. 1-2, pp. 1207–1218, 2010.
[59] S. Kozak, D. Novak, and P. Zezula, “Secure metric-based index for similarity cloud,” in Workshop on Secure Data Management. Springer, 2012, pp. 130–147.
[60] S. Raghavendra, C. Geeta, R. Buyya, K. Venugopal, S. Iyengar, and L. Patnaik, “Msigt:Most significant index generation technique for cloud environment,” in India Conference (INDICON), 2015 Annual IEEE. IEEE, 2015, pp. 1–6.
[61] S. Raghavendra, S. Girish, C. Geeta, R. Buyya, K. Venugopal, S. Iyengar, and L. Patnaik, “Igsk: index generation on split keyword for search over cloud data,” in Computing and Network Communications (CoCoNet), 2015 International Conference on. IEEE, 2015, pp. 374– 380.
[62] S. Raghavendra, G. Mara, R. Buyya, V. K. Rajuk, S. Iyengar, and L. Patnaik, “Drsig: Domain and range specific index generation for encrypted cloud data,” in Computational Techniques in Information and Communication Technologies (ICCTICT), 2016 International Conference on. IEEE, 2016, pp. 591–596.
[63] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 3025–3035, 2014.
[64] C. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari, and A. Y. Zomaya, “An efficient privacy-preserving ranked keyword search method,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 951–963, 2016.
[65] R. Sarang and R. Bunkar, “Study of services and privacy usage in cloud computing,” International Journal of Scientific Research in Computer Science and Engineering, vol. 1, no. 6, 2013.
[66] S. Raghavendra, C. Geeta, K. Shaila, R. Buyya, K. Venugopal, S. Iyengar, and L. Patnaik, “Msss: most significant single-keyword search over encrypted cloud data,” in Proceedings of the 6th Annual Intrernational Conference on ICT: BigData, Cloud and Securit, 2015.
[67] B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud,” in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 2112–2120.
[68] Y. Lu, “Privacy-preserving logarithmic-time search on encrypted data in cloud.” in NDSS, 2012.
[69] S. Raghavendra, S. Girish, C. Geeta, R. Buyya, K. Venugopal, S. Iyengar, and L. Patnaik, “Split keyword fuzzy and synonym search over encrypted cloud data,” Multimedia Tools and Applications, vol. 77, no. 8, pp. 10135–10156, 2018.
[70] S. Buyrukbilen and S. Bakiras, “Privacy-preserving ranked search on public-key encrypted data,” in High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC EUC), 2013 IEEE 10th International Conference on. IEEE, 2013, pp. 165–174.
[71] D. Liu and S. Wang, “Programmable order-preserving secure index for encrypted database query,” in 2012 IEEE Fifth International Conference on Cloud Computing. IEEE, 2012, pp. 502–509.
[72] H. T. Dhole, P. C. Papade, and S. B. Bhosale, “Ensuring data storage security using cloud computing,” Intl. Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 1, 2014.
[73] A. Padmapriya and P. Subhasri, “Cloud computing: security challenges and encryption practices,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 3, 2013.
[74] V. Kapoor, “Data encryption and decryption using modified rsa cryptographybasedonmultiplepublickeysand‘n’primenumber,” International Journal of Scientific Research in Network Security and Communication, vol. 1, no. 2, pp. 35–38, 2013.
[75] S. Raghavendra, C. Geeta, R. Buyya, K. Venugopal, S. Iyengar, and L. Patnaik, “Drsms: Domain and range specific multi-keyword search over encrypted cloud data,” International Journal of Computer Science and Information Security, vol. 14, no. 5, p. 69, 2016.
[76] V. Raich, P. Sharma, S. Mewada, and M. Kumbhkar, “Performance improvement of software as a service and platform as a service in cloud computing solution,” ISROSET-International Journal of Scientific Research in Computer Science and Engineering, vol. 1, pp. 13–16, 2013.
[77] Raghavendra, S., et al. "Survey on data storage and retrieval techniques over encrypted cloud data." International Journal of Computer Science and Information Security 14.9 (2016): 718.
[78] Kobusińska, Anna, et al. "Emerging trends, issues and challenges in Internet of Things, Big Data and cloud computing." (2018): 416-419.
Citation
Supriya J., Srusti K.S., Gamana G, S. Sukhaniya Ragani, Raghavendra S., Venugopal K.R., "A Survey on Efficient and Secure Techniques for Storing Sensitive Data on Cloud," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1766-1777, 2019.
Survey on Artificial Intelligence
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.1778-1790, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17781790
Abstract
Artificial intelligence is a field of science which aims to automate the activities that require human intelligence. This has been used since last two decades as a development tool in various fields like forecasting, health care, security and also has significantly improved both manufacturing and service system performance. Since AI and its working lies on large amount of data, an algorithms and data science, users fail to understand and grasp the concepts and lacks the skills needed to work with this technology. It is difficult to identify the cause behind system software/hardware crashes because AI is controlled by machines and algorithms. It requires huge fund to implement the system. But there are some facts that support the adoption of AI such as flexible computing power available on the cloud, availability of ready to use software libraries and data. These changes made it possible for the users to build their own algorithms.
Key-Words / Index Term
Artificial Intelligence, Data mining, Algorithm, ANN
References
[1] T. Nitin, S. Apoorvaa, S. Himanshi, and T. Krishna, “Diagnosing dengue: A faster, artificial intelligence based hack,” International Journal Of Engineering And Computer Science, vol. 6, no. 7, pp. 21 895–21 915, 2017.
[2] O. Mahmoudi, F. Piltan, O. R. Sadrnia, M. Jafari, and M. Eram, “Design robust artificial intelligence model-base variable structure controller with application to dynamic uncertainties octam vi continuum robot,” International Journal of Hybrid Information Technology, vol. 8, no. 1, pp. 51–72, 2015.
[3] F. Junejo, I. Amin, M. Hassan, A. Ahmed, and S. Hameed, “The application of artificial intelligence in grinding operation using sensor fusion,” International Journal, vol. 12, no. 30, pp. 11–18, 2017.
[4] S. Saroha, V. Gupta, V. Shekher, P. Rana, and P. Singla, “Promoting short term load forecasting by using artificial intelligence.”
[5] L. Sharma and V. Srivastava, “Performance enhancement of information retrieval via artificial intelligence,” International Journal of Scientific Research in Science, Engineering and Technology, vol. 3, no. 1, pp. 187–192, 2017.
[6] A. Anitha, G. Paul, and S. Kumari, “A cyber defence using artificial intelligence,” International Journal of Pharmacy and Technology, vol. 8, no. 4, 2016.
[7] Z. JAGRUTI and S. P M, “Analysis of reliability using artificial intelligence technique,” International Journal of Innovative Technology, vol. 5, no. 2, pp. 0247–0250, 2017.
[8] K. Amandeep and C. Deepti, “Cyber awarness improvement using artificial intelligence,” International Journal For Technological Research In Engineering, vol. 4, no. 9, pp. 2347– 4718, 2017.
[9] R. Patel, A. A. Amin, and D. M. Hiren, “Optimal svc placement for loss minimization in electric power networks using artificial intelligence techniques,” International Journal of Advance Research in Engineering, Science & Technology, vol. 4, no. 4, 2017.
[10] A.-A. Shayma M and A. Maysam, “Prediction of cancer behavior based on artificial intelligence.”
[11] R. Sathya, M. Pavithra, and G. Girubaa, “Artificial intelligence for speech recognition,” International Journal of Computer Science & Engineering Technology (IJCSET), ISSN, pp. 2229–3345, 2017.
[12] E. Khanna, “On the applicability of artificial intelligence in black box testing.”
[13] P. D. A. Saygın and A. Kerem, “Wind power forecasting: A case study in terrain using artificial intelligence,” 2017.
[14] V. Kostandina, “Artificial intelligence in adaptive control strategy design,” International Journal of Science and Engineering Investigations, vol. 4, no. 4, pp. 2251–8843, 2017.
[15] B. Neha, B. Utkarsha, and S. Yerker, “Title: A brief review on artificial intelligence in power system,” INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY, vol. 3, no. 5.
[16] R. Soni and N. Singh, “Knowledge representation in artificial intelligence using domain knowledge and reasoning mechanism.”
[17] A. Mohamed, “Novel testing algorithm for busbar protection systems using iec 61850 and artificial intelligence technique.”
[18] P. Agnihotri, J. K. Dwivedi, and V. M. Mishra, “Stabilization of power system using artificial intelligence based system,” 2017.
[19] A. Heydarzadegan, Y. Nemati, and M. Moradi, “Evaluation of machine learning algorithms in artificial intelligence,” vol, vol. 4, pp. 278–286, 2015.
[20] S. S. More and M. K. Nighot, “Artificial intelligence and ant colony optimization based wireless sensor networks to minimize energy of network.”
[21] K. Kumar and G. S. M. Thakur, “Advanced applications of neural networks and artificial intelligence: A review,” IJ Information Technology and Computer Science, vol. 6, pp. 57–68, 2012.
[22] Z.-H. Zhou, J. Wu, and W. Tang, “Ensembling neural networks: many could be better than all,” Artificial intelligence, vol. 137, no. 1-2, pp. 239–263, 2002.
[23] A. S. Ahmad, “Brain inspired cognitive artificial intelligence for knowledge extraction and intelligent instrumentation system,” in 2017 International Symposium on Electronics and Smart Devices. IEEE, 2017, pp. 352–356.
[24] Z. Hong, “A preliminary study on artificial neural network,” in 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference, vol. 2. IEEE, 2011, pp. 336–338.
[25] L. Parthiban and R. Subramanian, “Intelligent heart disease prediction system using canfis and genetic algorithm,” International Journal of Biological, Biomedical and Medical Sciences, vol. 3, no. 3, 2008.
[26] G. Subbalakshmi, K. Ramesh, and M. c. Rao, “Decision support in heart disease prediction system using naive bayes,” Indian Journal of Computer Science and Engineering, vol. 2, no. 2, 2011.
[27] P. Gupta and P. Sahai, “A review on artificial intelligence approach on prediction of software defects,” IJRDASE, 2016.
[28] N. A. Alrajeh and J. Lloret, “Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 9, no. 10, p. 351047, 2013.
[29] K. O. Bachri, B. Anggoro, A. D. W. Sumari, and A. S. Ahmad, “Cognitive artificial intelligence method for interpreting transformer condition based on maintenance data,” Advances in Science, Technology and Engineering Systems Journal (ASTESJ) Vol, vol. 2, pp. 1137–1146, 2017.
[30] J. Awwalu, A. G. Garba, A. Ghazvini, and R. Atuah, “Artificial intelligence in personalized medicine application of ai algorithms in solving personalized medicine problems,” International Journal of Computer Theory and Engineering, vol. 7, no. 6, p. 439, 2015.
[31] S. Merat and W. Almuhtadi, “Cyber-awareness improvement using artificial intelligence techniques.” International Journal on Smart Sensing& Intelligent Systems, vol. 8, no. 1, 2015.
[32] H. R. Jani, H. D. Maniya, R. M. Hirpara, A. J. Maradiya, G. K. Nanani, H. R. Jani, H. D. Maniya, R. M. Hirpara, A. J. Maradiya, and G. K. Nanani, “Artificial intelligence based self assemble bot,” International Journal for Innovative Research in Science & Technology, vol. 2, pp. 184–190.
[33] A. Samy, S. A. Ward, and M. N. Ali, “Conventional ratio and artificial intelligence (ai) diagnostic methods for dga in electrical transformers,” International Electrical Engineering Journal (IEEJ), vol. 6, no. 12, pp. 2096–2102, 2015.
[34] M. Eppe, E. Maclean, R. Confalonieri, O. Kutz, M. Schorlemmer, E. Plaza, and K.-U. K¨uhnberger, “A computational framework for conceptual blending,” Artificial Intelligence, vol. 256, pp. 105–129, 2018.
[35] M. Law, A. Russo, and K. Broda, “The complexity and generality of learning answer set programs,” Artificial Intelligence, vol. 259, pp. 110– 146, 2018.
[36] M. Campbell, A. J. Hoane Jr, and F.-h. Hsu, “Deep blue,” Artificial intelligence, vol. 134, no. 1-2, pp. 57–83, 2002.
[37] M. Ying, “Quantum computation, quantum theory and ai,” Artificial Intelligence, vol. 174, no. 2, pp. 162–176, 2010.
[38] S.-Z. Yu, “Hidden semi-markov models,” Artificial intelligence, vol. 174, no. 2, pp. 215–243, 2010.
[39] P. Lin, K. Abney, and G. Bekey, “Robot ethics: Mapping the issues for a mechanized world,” Artificial Intelligence, vol. 175, no. 5-6, pp. 942–949, 2011.
[40] P. Baldi and P. Sadowski, “The dropout learning algorithm,” Artificial intelligence, vol. 210, pp. 78–122, 2014.
[41] J. Pajarinen and V. Kyrki, “Robotic manipulation of multiple objects as a pomdp,” Artificial Intelligence, vol. 247, pp. 213–228, 2017.
[42] S. Lemaignan, M. Warnier, E. A. Sisbot, A. Clodic, and R. Alami, “Artificial cognition for social human–robot interaction: An implementation,” Artificial Intelligence, vol. 247, pp. 45–69, 2017.
[43] A. Harb, “Paradigm shift: Engineering artificial intelligence and management strategies fusion.”
[44] R. E. Korf, “A complete anytime algorithm for number partitioning,” Artificial Intelligence, vol. 106, no. 2, pp. 181–203, 1998.
[45] R. S. Sutton, D. Precup, and S. Singh, “Between mdps and semi-mdps: A framework for temporal abstraction in reinforcement learning,” Artificial intelligence, vol. 112, no. 1-2, pp. 181–211, 1999.
[46] P. Patil, “Emotion in artificial intelligence and its life research to facing troubles,” 2016.
[47] Dr. Pranav Patil “Artificial intelligence in cybersecurity,” International Journal of Research in Computer Applications and Robotics, vol. 4, no. 5, pp. 1–5, 2016.
[48] A. A. Dongare and R. Ghongade, “Artificial intelligence based bank cheque signature verification system,” 2016.
[49] G. Kaur and R. Sharma, “A systematic performance comparison of artificial intelligence techniques used for alnpr system,” Research Cell: an International Journal of Engineering Sciences, vol. 17, no. 1, pp. 161–167, 2016.
[50] O. Deepa and A. Senthilkumar, “Swarm intelligence from natural to artificial systems: Ant colony optimization,” Networks (Graph-Hoc), vol. 8, no. 1, pp. 9–17, 2016.
[51] S. Harjit, “Artificial intelligence revolution and indias ai development: Challenges and scope,” IJSRSET, vol. 3, 2017.
[52] K. Sakthivel and C. Rajitha, “Artificial intelligence for estimation of future claim frequency in non-life insurance,” Global Journal of Pure and Applied Mathematics, vol. 13, no. 6, pp. 1701–1710, 2017.
[53] M. V. J Maria and A. R, “Deploying artificial intelligence techniques in software engineering,” International Journal of Contemporary Research in Computer Science and Technology, vol. 3, 2017.
[54] M. Piyush, R. Deepak, and V. Gatty, “Artificial intelligence in power saving & games,” International Research Journal of Engineering and Technology, vol. 4, 2017.
[55] K. Navneet and S. S. Mandeep, “Enhanced cluster head selection algorithm based on artificial intelligence technique,” IJACMS, vol. 2, 2017.
[56] S. Shraddha and Aamir, “Predicting material removal rate using an artificial intelligence approach,” International Journal of Research and Development in Applied Science and Engineering (IJRDASE), vol. 9, 2016.
[57] M. Sahu, “Plagiarism detection using artificial intelligence technique in multiple files,” International Journal 0f Scientific and Technology Research, vol. 5, no. 4, 2016.
[58] N. Ernest, D. Carroll, C. Schumacher, M. Clark, K. Cohen, and G. Lee, “Genetic fuzzy based artificial intelligence for unmanned combat aerial vehicle control in simulated air combat missions,” Journal of Defense Management, vol. 6, no. 1, pp. 2167–0374, 2016.
[59] Y. Huai and P. Yong, “Teaching evaluation of single chip microcomputer based on artificial intelligence algorithm,” vol. 39, 2016.
[60] C. Vinay Kumar, K. Dinesh Kumar, and S. Vaibhav, “Development of artificial intelligence model for the prediction of mrr in turning,” International Journal of Hybrid Information Technology, vol. 9, 2016.
[61] Y.-K. Huang, A.-C. Pang, and H.-N. Hung, “An adaptive gts allocation scheme for ieee 802.15. 4,” IEEE transactions on parallel and distributed systems, vol. 19, no. 5, pp. 641–651, 2008.
[62] S.-H. Park and S.-P. Lee, “Emg pattern recognition based on artificial intelligence techniques,” IEEE transactions on Rehabilitation Engineering, vol. 6, no. 4, pp. 400–405, 1998.
[63] W. E. Spangler, “The role of artificial intelligence in understanding the strategic decision-making process,” IEEE Transactions on Knowledge and Data Engineering, vol. 3, no. 2, pp. 149–159, 1991.
[64] S. B. Patil and Y. Kumaraswamy, “Extraction of significant patterns from heart disease warehouses for heart attack prediction,” IJCSNS, vol. 9, no. 2, pp. 228–235, 2009.
[65] R. Chitra and V. Seenivasagam, “Review of heart disease prediction system using data mining and hybrid intelligent techniques,” ICTACT journal on soft computing, vol. 3, no. 04, pp. 605–609, 2013.
[66] J. Soni, U. Ansari, D. Sharma, and S. Soni, “Predictive data mining for medical diagnosis: An overview of heart disease prediction,” International Journal of Computer Applications, vol. 17, no. 8, pp. 43–48, 2011.
[67] K. Srinivas, B. K. Rani, and A. Govrdhan, “Applications of data mining techniques in healthcare and prediction of heart attacks,” International Journal on Computer Science and Engineering (IJCSE), vol. 2, no. 02, pp. 250–255, 2010.
[68] A. Methaila, P. Kansal, H. Arya, P. Kumar et al., “Early heart disease prediction using data mining techniques,” Computer Science & Information Technology Journal, pp. 53–59, 2014.
[69] D. Chandna, “Diagnosis of heart disease using data mining algorithm,” International Journal of Computer Science and Information Technologies, vol. 5, no. 2, pp. 1678–1680, 2014.
[70] N. A. Sundar, P. P. Latha, and M. R. Chandra, “Performance analysis of classification data mining techniques over heart disease database,” International journal of engineering science & advanced technology, vol. 2, no. 3, pp. 470–478, 2012.
[71] S. S. Ms. Ishtake SH, “Intelligent heart disease prediction system using data mining techniques,” International J. of Healthcare & Biomedical Research, vol. 1, no. 2, pp. 94–101, 2013.
[72] S. B. Patel, P. K. Yadav, and D. Shukla, “Predict the diagnosis of heart disease patients using classification mining techniques,” IOSR Journal of Agriculture and Veterinary Science (IOSR-JAVS), vol. 4, no. 2, pp. 61–64, 2013.
[73] A. Taneja et al., “Heart disease prediction system using data mining techniques,” Oriental Journal of Computer science and technology, vol. 6, no. 4, pp. 457–466, 2013.
[74] S. Amin, K. Agarwal, and R. Beg, “Data mining in clinical decision support systems for diagnosis, prediction and treatment of heart disease,” vol. 2, pp. 2278–1323, 01 2013.
[75] S.D.N.Hayath Ali and M. Giri “ A Study on Challenging issues Optimal Methods for Video Streaming over Hrterogeneous Wireless Network” vol.6 ,04 2018.
[76] Yakubu Ajiji Makeri “The Role of Cyber Security and Human-Technology Centric for Digital Transformation” vol.6, pp 53-59 12 2018.
[77] A kobusinska, C Leung, CH Hsu, S Raghavendra and V Chang “ Emerging trends, issues and challenges in Internet of Things, Big Dataand cloud computing” vol.87, pp.416-419, 10 2018.
[78] S Raghavendra, C Leung, CH Hsu, CM Geeta, R Buyya and KR Venugopal “Survey on data storage and retrieval techniques over encrypted cloud data” vol.14, pp.718, 9 2016.
[79] S Raghavendra, CS Reddy, CM Geeta, R Buyya, KR Venugopal and S Iyengar “DRSMS: Domain and Range specific Multi KeywordSearch over encrypted cloud data” vol.14, pp.69-78, 5 2016.
[80] S Raghavendra, G Mara, R Buyya and KR Venugopal, VK Rajuk S Iyengar and LM Patnaik “Drsig : Domain and Range specificindex generation for encrypted cloud data” pp.591-596, 3 2016
Citation
Aishath Murshida A, Chaithra B K, Nishmitha B, P B Pallavi, Raghavendra S, Mahesh Prasanna K, "Survey on Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1778-1790, 2019.