Effective Strategy Identification for Parallel Job Execution Job Partitioning, Requirement Gathering and Allocation Strategies
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.192-197, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.192197
Abstract
Parallel and distributed computing becomes critical in the heavy workload environment. In such situations, job partitioning becomes need of the hour. Smaller junks known as task has limited complexity and hence overall execution speed increased considerably as these allotted to the processors. In case of parallel computing, there exist several distinct tasks that may belong to single or multiple jobs having resource requirements. Assigning resources to tasks need strategies to reduce execution time and prevent starvation. This literature put a light on strategies used to allocate resources optimally to tasks meant to execute on distributed environment. Highlights of distinct literature presented through parameters in the form of comparative table so that useful feature can be extracted for future enhancements.
Key-Words / Index Term
Parallel and distributed computing, execution speed, starvation
References
[1] A. Vasudevan, “Static Task Partitioning Techniques for Parallel Applications on Heterogeneous Processors,” Trinity Coll. dublin, no. December, 2015.
[2] N. Saranya and R. C. Hansdah, “Dynamic partitioning based scheduling of real-time tasks in multicore processors,” Proc. - 2015 IEEE 18th Int. Symp. Real-Time Distrib. Comput. ISORC 2015, pp. 190–197, 2015.
[3] M. Y. Alzahrani, “Discovering Sequential Patterns from Medical Datasets,” 2016.
[4] S. Alamanda, S. Pabboju, and N. Gugulothu, “An Approach to Mine Time Interval Based Weighted Sequential Patterns in Sequence Databases,” 2017 13th Int. Conf. Signal-Image Technol. Internet-Based Syst., pp. 29–34, 2017.
[5] F. Ahmed, “A Simple Acute Myocardial Infarction ( Heart Attack ) Prediction System Using Clinical Data and Data Mining Techniques,” pp. 22–24, 2017.
[6] S. Abbasghorbani and R. Tavoli, “Survey on Sequential Pattern Mining Algorithms,” 2015 2nd Int. Conf. Knowledge-Based Eng. Innov., pp. 1153–1164, 2015.
[7] N. Béchet, P. Cellier, T. Charnois, B. Cremilleux, and M. C. Jaulent, “Sequential pattern mining to discover relations between genes and rare diseases,” Proc. - IEEE Symp. Comput. Med. Syst., 2012.
[8] C. J. Chen, T. W. Pai, S. S. Lin, C. C. Yeh, M. H. Liu, and C. H. Wang, “Application of PrefixSpan Algorithms for Disease Pattern Analysis,” Proc. - 2016 Int. Comput. Symp. ICS 2016, pp. 274–278, 2017.
[9] Y. CHENG, Y.-F. Lin, K.-H. Chiang, and V. Tseng, “Mining Sequential Risk Patterns from Large-Scale Clinical Databases for Early Assessment of Chronic Diseases: A Case Study on Chronic Obstructive Pulmonary Disease,” IEEE J. Biomed. Heal. Informatics, pp. 1–1, 2017.
[10] B. R. M. Eenan, “Non-homogeneous Markov models for sequential pattern mining of healthcare data,” IEEE, pp. 327–344, 2009.
[11] J. Wei, Y. Yin, and F. Liu, “Multi-model LPV approach to CSTR system identification with stochastic scheduling variable,” Proc. - 2015 Chinese Autom. Congr. CAC 2015, pp. 303–307, 2016.
[12] Y. Sun and P. Jiang, “A Novel Bottleneck Identification Based Differential Evolution Algorithm for Scheduling Complex Manufacturing Lines,” Proc. - 2016 3rd Int. Conf. Inf. Sci. Control Eng. ICISCE 2016, pp. 774–778, 2016.
[13] J. Dai, B. Hu, L. Zhu, H. Han, and J. Liu, “Research on dynamic resource allocation with cooperation strategy in cloud computing,” 2012 3rd Int. Conf. Syst. Sci. Eng. Des. Manuf. Informatiz. ICSEM 2012, vol. 1, pp. 193–196, 2012.
[14] A. Mohtasham, R. Filipe, and J. Barreto, “FRAME: Fair resource allocation in multi-process environments,” Proc. Int. Conf. Parallel Distrib. Syst. - ICPADS, vol. 2016-January, pp. 601–608, 2016.
Citation
Jasleen Kaur, Anil kumar, "Effective Strategy Identification for Parallel Job Execution Job Partitioning, Requirement Gathering and Allocation Strategies," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.192-197, 2019.
Advanced Charting Techniques of Microsoft Excel 2016 Aiming Visualization
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.198-207, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.198207
Abstract
Environment of Microsoft Excel integrates storage, analysis and visualization of data. After the data is stored in a precise structured format, further analysis and visualization of data is essential to discover the hidden valuable insight from the large dataset. Visualization supports extracting and understanding the information as it is represented in a graphical format. Visualization plays a vital role in decision making at various levels in the organization. There are numerous techniques of visualization. However, the most extensively used technique is to present the data in a chart format. Various charting techniques such as Column Chart, Pie Chart, Line Chart and Bar Chart are existing in Microsoft Excel application. In addition to these conventional charts, Microsoft Excel 2016 presents six advanced chart types named, Box and Whisker chart, Funnel chart, Histogram chart, Sunburst chart, Treemap chart and Waterfall chart to present the data differently. This paper describes illustrations of new chart types of Microsoft Excel 2016 along with their elements and respective attributes. The purpose of this research paper is to present how advanced charting techniques can be used for visualizing varied data types in the engineering manufacturing industries.
Key-Words / Index Term
Microsoft Excel 2016, Visualization, Charting Techniques, Structured Data
References
[1] Kirti Nilesh Mahajan and Leena Ajay Gokhale, “Comparative Study of Static and Interactive Visualization Approaches”, International Journal on Computer Science and Engineering (IJCSE), e-ISSN: 0975-3397 p-ISSN: 2229-5631, Vol. 10 No.03, DOI: 10.21817/ijcse/2018/v10i3/181003016 Vol. 10 No.03 Mar 2018 85, pp.85-91, March 2018.
[2] Kirti Mahajan and Leena Ajay Gokhale, “Significance of Digital Data Visualization Tools in Big Data Analysis for Business Decisions”, International Journal of Computer Applications (IJCA), Volume 165 – No.5, pp.15-18, May 2017.
[3] Michael Alexander and Dick Kusleika, “Excel 2016 Formulas”, Wiley India Pvt. Ltd., India, pp. 425-467, 2016.
[4] Getting started with Excel 2016, Microsoft IT Showcase, January 2017.
[5] Greg Harvey "Excel® 2016 For Dummies®", John Wiley & Sons, Inc., pp. 295-329, ISBN 978‐1‐119‐07701‐5 (pbk), ISBN 978‐1‐119‐07702‐2 (ePub), 978‐1‐119‐07703‐9 (ePDF), 2016.
[6] Mantripatjit Kaur, Anjum Mohd Aslam, “Big Data Analytics on IOT: Challenges, Open Research Issues and Tools”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.81-85, 2018.
[7] Rakesh. S.Shirsath, Vaibhav A.Desale, Amol. D.Potgantwar, “Big Data Analytical Architecture for Real-Time Applications”, International Journal of Scientific Research in Network Security and Communication, Volume-5, Issue-4, ISSN: 2321-3256, 2017.
Citation
Kirti Nilesh Mahajan, Leena Ajay Gokhale, "Advanced Charting Techniques of Microsoft Excel 2016 Aiming Visualization," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.198-207, 2019.
Devanagari Script Recognition using Capsule Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.208-211, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.208211
Abstract
Handwritten Devanagari Script Recognition has a lot of applications in the field of document processing, automation of postal services, automated cheque processing and so on. Several approaches have been proposed and experimented in the past depending on the type of features extracted and the ways of extracting them. In this paper, we proposed the use of Capsule Neural Networks (CapsNet) for the recognition of Handwritten Devanagari script, which is an advancement over the Convolutional Neural Networks (CNN) in terms of spatial relationships between the features. Capsule Neural Networks follow the principle of equivariance unlike the convolutional neural networks which follow the invariance property. CapsNet uses the dynamic routing by agreement method for passing data to higher capsules. CapsNet uses vector format for data representation. It can recognize similar characters in a more efficient manner as compared to CNN. Thus by using the advantages of CapsNet we are aiming to achieve better classification rate. We collected 100 samples of each of the 48 Devanagari characters and 10 Devanagari digits, and performed scaling, rotation and mirroring operations on these images. Hence, our dataset consists of total 29000 images.
Key-Words / Index Term
Capsule Networks, Dynamic routing, Devanagari Script Recognition, Convolutional Neural Networks
References
[1] Sara Sabour, Nicholas Frosst, Geoffrey Hinton , “Dynamic Routing Between Capsules”, In the Proceedings of the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA, 2017.
[2] Paul Gader, Magdi Mohamed, “Handwritten Word Recognition with Character and Inter-Character Neural Networks”, IEEE Transactions On Systems, Man, And Cybernetics-Part B: Cybernetics-Part B: Cybernetics, Vol.27, Issue.1, pp. 158-164, 1997.
[3] M. Blumenstein, B. Verma, H. Basli, “A Novel Feature Extraction Technique for the Recognition of Segmented Handwritten Characters”, In the Proceedings of ICDAR, pp. 137-141, 2003.
[4] Abdelhak Boukharouba, Abdelhak Bennia, “Novel feature extraction technique for recognition of handwritten digits”, Applied Computing and Infomatics, pp. 20-26, 2017.
[5] Shalaka Deore, Leena Ragha, “Moment Based Online and Offline Handwritten Character Recognition”, CiiT International Journal of Biometrics and Bioinfomatics, Vol.3, Issue.3, pp. 111-115, 2011.
[6] Punam Ingale, “The importance of Digital Image Processing and its applications”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp. 31-32, 2018.
[7] P. Umorya, R. Singh, “A Comparative Based Review on Image Segmentation of Medical Image and its Technique”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.71-76, 2017.
Citation
U.M. Sawant, R.K. Parkar, S.L. Shitole, S.P. Deore, "Devanagari Script Recognition using Capsule Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.208-211, 2019.
A Smart Green Data Center of Energy Conservation in Cloud and Mobile Cloud Computing
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.212-220, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.212220
Abstract
This paper focused to green system of the small data centers with sustainable energy power generation. The estimation must start with a baseline view of power consumption in every part of the data center. The primary vital issues of data centers are increasingly under intervention of their energy consumption and operations. This paper takes first step toward exploring green data centers powered by renewable energy system that include base load power supply, intermittent power supply and backup energy storage systems. The required energy assists in an embryonic attitude of data centers being saved energy with a "greener" consequence. Data centers are the factories of the digital world and the cloud is coming back to earth that ethereal place where data is being stored. The convention of renewable energy resources has been the vital role in our future development of modern technology and cloud computing is the fastest evolving paradigm of the modern age of computers. This requires more and more remote host machines such as servers. Naturally, data centers are required large amounts of energy to power the growing demand. Now, data centers are turning to energy-efficient data facilities to cut costs and green power for their operations. This paper presents small-scale routing algorithm used energy consumption by instead of using conventional energy, thus increasing the effective performance up gradation of the virtual data center. We bring new thought in energy saving of the data centers. This presents the technological way of power consumption in the records of data center.
Key-Words / Index Term
Cloud data center, Small scale algorithm, Energy consumption, Renewable energy
References
[1] P. Mell, T. Grance, The NIST definition of cloud computing, National Institute of Standards and Technology, Vol.53, Issue.6, pp. 1-7, 2009.
[2] D. Gielen, Renewable Energy Technologies: Cost Analysis Series, Solar Photovoltaic’s, Vol.1, Issue.4/5, pp. 1-52, 2012.
[3] A. Qureshi, Power-demand routing in massive geo-distributed systems (Ph.D. thesis), Massachusetts Institute of Technology, 2010.
[4] C. Ren, D. Wang, B. Urgaonkar, A. Sivasubramaniam, “Carbon-aware energy capacity planning for data centers”, In the Proceedings of the IEEE MASCOTS, IEEE Computer Society Washington, DC, USA. pp. 391-400, 2012.
[5] G. Piro, M. Miozzo, G. Forte, N. Baldo, L.A. Grieco, G. Boggia, P. Dini, Hetnets Powered by Renewable Energy sources: Sustainable Next-Generation Cellular Networks, IEEE Internet Computing, Vol.17, Issue.1, pp. 32–39, 2013.
[6] H. A. H. Hassan, L. Nuaymi, and A. Pelov, “Classification of Renewable Energy Scenarios and Objectives for Cellular Networks,” Proceeding of the IEEE PIMRC ’13, London, UK. pp. 2967-2972, 2013.
[7] https://apprenda.com/library/architecture/the-three-tier-model-of-cloud-computing/
[8] E. Masanet, A. Shehabi, J.Koomey, “Characteristics of low-carbon data centers, Nature Climate Change”, Vol.3, Issue.7, pp. 627-630, 2013.
[9] A. Uchechukwu, K. Li, Y. Shen, “Improving cloud computing energy efficiency”, Cloud Computing Congress (APCloudCC). IEEE Asia Pacific. pp. 53-58, 2012.
[10] W. Deng, F. Liu, H. Jin, B. Li, D. Li, “Harnessing renewable energy in cloud data centers: opportunities and challenges”, IEEE Network, Vol.28, Issue.1, pp. 48-55, 2014.
[11] S. Mustafa, B. Nazir, A. Hayat, S.A. Madani, “Resource management in cloud computing: Taxonomy, prospects, and challenges”, Computers & Electrical Engineering, Vol.47, pp. 186–203, 2015.
[12] E. Or o´, V. Depoorter, A. Garcia, J. Salom, “Energy efficiency and renewable energy integration in data centers. Strategies and modelling review”, Renewable and Sustainable Energy Reviews, Vol. 42, pp. 429-445, 2015.
[13] I. Goiri, K. Katsak, T.D. Le, Nguyen, R. Bianchini, In: SIGARCHA CM, editor. “Parasol and greenswitch: Managing data centers powered by renewable energy”, ACM SIGARCH Computer Architecture News, Vol. 41, Issue. 1, pp. 51-64, 2013.
[14] D. Ren, B. Wang, Urgaonkar, A. Sivasubramaniam, “Carbon-aware energy capacity planning for datacenters”, International Symposium on Modeling, Analysis & Simulation of Computer and Tele-communication Systems (MASCOTS), pp. 391–400, 2012.
[15] I. Goiri ´, W. Katsak, K. Le, T.D. Nguyen, R. Bianchini, “Designing and managing data enters powered by renewable energy”, IEEE Micro, Vol.34, Issue.3, pp. 8-16, 2014.
[16] Y. Zhang, Y. Wang, X. Wang. “GreenWare: Greening Cloud-Scale Data Centers to Maximize the Use of Renewable Energy”, 12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. Springer, Lecture Notes in Computer Science, LNCS-7049, pp.143-164, 2011.
[17] C. Pandi selvi, S. Sivakumar, “Constraint Programming approach based Virtual Machine Placement Algorithm for Server Consolidation in Cloud data center”, International Journal of Computer Science and Engineering, Vol.6, Issue.8, pp. 91-95, 2018.
[18] M. R. Sudha, M. Sornam, “Differential Evolutionary Algorithm for Energy Efficiency
Improvement on Mobile Cloud Computing”, International Journal of Control Theory and Applications, Vol.9, Issue.40, pp. 1149-1156, 2016.
[19] Measurement and Instrumentation data center, http://www.nrel.gov/midc/
[20] S. Bergqvist, "Energy Efficiency Improvements using DC in Data Centers," master`s thesis, Uppsala Universitet, 2011.
[21] G. Laura Grit, I. David, Y. Aydan, C. Jeff, “Virtual Machine Hosting for Networked Clusters: Building the Foundations for Autonomic Orchestration”, 2nd International Workshop on Virtualization Technology in Distributed Computing (VTDC 06), ACM, pp. 7, 2006.
[22] E. Berl, M. Gelenbe,G. Di Girolamo, H. Giuliani, M. De Meer, K. Quan Dang, Pentikousis, “Energy-Efficient Cloud Computing”, The Computer Journal, Vol.53, Issue.7, pp. 1045-1051, 2010.
[23] S. Dutta, W. H. Dutton, G. Law G. “The new Internet world: a global perspective on freedom of expression, privacy, trust and security online”, World Economic Forum; pp. 1-35, 2011.
[24] C. Sharma, “Global Mobile Market Update”, http://www.chetansharma.com/GlobalMobileMarketUpdate2012.htm, 2012. [(accessed 9.12.12)].
[25] M. Ton, B. Fortenbery, W. Tschudi, “DC Power for Improved Data Center Efficiency”, Lawrence Berkeley National Laboratory, pp. 1-74, 2008.
[26] Guidelines for Energy-Efficient Data Centers,white paper, The Green Grid Consortium, 16 Feb. 2007; www.thegreengrid.org/~/media/WhitePapers/Green_ Grid_Guidelines_WP.pdf?lang=en.
[27] S. Akoush, R. Sohan, A. Rice, A.W. Moore, A. Hopper, “Free lunch: exploiting renewable energy for computing”, Proceedings of the 13th USENIX conference on Hot topics in operating systems, pp.17–17, 2011.
[28] R. de Lemos, H. Giese, H. Müller, and M. Shaw. 10431 Report - Software Engineering for Self-Adaptive Systems. In R. de Lemos, H. Giese, H. Müller, and M. Shaw, editors, “Software Engineering for Self-Adaptive Systems”, number 10431 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2011.
[29] N. Qureshi and A. Perini, “ Engineering adaptive requirements”, ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, IEEE, pp. 126–131, 2009.
[30] Camara, R. De Lemos. “Evaluation of resilience in self-adaptive systems using probabilistic model-checking”, 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), IEEE, pp. 53–62, 2012.
[31] D. Djemame, R. E. Armstrong, A. J. Kavanagh, D. G. Ferrer, D. R. Perez, J. C. Antona, C. Deprez, D. Ponsard, M. Ortiz, J. Macıas, F. Guitart, J. Lordan, R. Ejarque, R. M. Sirvent, M. Badia, O. Kammer, E. Kao, A. Agiatzidou, C. Dimakis, Courcoubetis, L. Blasi. “Energy efficiency embedded service lifecycle: Towards energy efficient cloud computing architectur”, In the Proceedings of the Workshop on Energy Efficient Systems (EES’2014) at ICT4S, Stockholm, Sweden, pp. 1–6, 2014.
[32] K.K. Nguyen, M. Cheriet, M. Lemay, V. Reijs, A. Mackarel, A. Pastrama, Environmental-aware virtual data center network, Computer Networks, Vol.56, pp. 2358-2550, 2012.
[33] S. Edel Josephine Rajakumari, T. Daisy Premila Bai, H. M. Leena, "Analysis of Cloud Computing and Its Challenges", International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.326-329, 2018.
Citation
M. R. Sudha, C. P. Sumathi, "A Smart Green Data Center of Energy Conservation in Cloud and Mobile Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.212-220, 2019.
Approximate Series Solution of Non Linear Fractional Dispersive Equations Using Generalized Differential Transform Method
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.221-228, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.221228
Abstract
In the present paper, generalized differential transform method (GDTM) is used for obtaining the approximate analytic solutions of non-linear dispersive partial differential equations of fractional order. The fractional derivatives are described in the Caputo sense.
Key-Words / Index Term
Fractional differential equations; Caputo fractional derivative; Generalized Differential transform method; Analytic solution. Mathematical Subject Classification (2010) — 26A33, 34A08, 35A22, 35R11, 35C10, 74H10
References
[1] J.K.Zhou,”Differential Transformation and Its Applications for Electrical Circuits”. Huazhong University Press,Wuhan, China,1986.
[2] C.K. Chen,S.H. Ho,“Solving partial differential equations by two dimensionalDifferential transform Method”,Appl. Math. Comput.,Vol.
106,pp.171–179,1999.
[3] F.Ayaz,”Solutions of the systems of differential equations by
differential transform Method",Appl. Math. Comput.,Vol.147,
pp.547–567,2004.
[4] R.Abazari,A. Borhanifar,”Numerical study of the solution of the Burgers and coupled Burgers equations by a differential transformation method”, Comput. Math. Appl.,Vol.59,
pp.2711–2722,2010
[5] C.K.Chen,”Solving partial differantial equations by two dimensional differential transformation method”,Appl. Math. Comput.,Vol.106,pp.171–179,1999
[6] M.J.Jang,C.K.Chen,”Two-dimensional differential transformation method for partial differantial equations”,Appl. Math. Comput.,
Vol.121,pp.261–270,2001.
[7] F.Kangalgil,F.Ayaz,”Solitary wave solutions for the KDV and mKDV equations by differential transformation method”, Choas Solitons Fractals,Vol.41,pp.464–472,2009.
[8] A.Arikoglu,I.Ozkol,”Solution of difference equations by using differential transformation method”,Appl. Math. Comput.,Vol.174,pp.1216–1228,2006.
[9] S.Momani,Z. Odibat,I,Hashim,”Algorithms for nonlinear fractional partial differantial equations: A selection of numerical methods”, Topol. Method Nonlinear Anal.,Vol.31,pp.211–226,2008.
[10] A.Arikoglu,I.Ozkol,”Solution of fractional differential equations by using differential transformation Method”, Chaos Solitons Fractals,Vol.34,pp.1473–1481,2007.
[11] B.Soltanalizadeh,M.Zarebnia,”Numerical analysis of the linear and nonlinear Kuramoto-Sivashinsky equation by using Differential Transformation method”. Inter. J. Appl. Math. Mechanics,Vol.7, Issue.12,pp.63–72,2011.
[12] A.Tari,M.Y.Rahimi,S.Shahmoradb,F.Talati,”Solving a class of two-dimensional linear and nonlinear Volterra integral equations by the differential transform method”,J.Comput. Appl. Math.,Vol.228,pp.70–76,2009.
[13] D.Nazari,S.Shahmorad,”Application of the fractional differential transform method to fractional-order integro-differential equations with nonlocal boundary conditions”, J. Comput. Appl. Math.,Vol.234,pp.883–891,2010.
[14] A.Borhanifar,R.Abazari,”Exact solutions for non-linear Schr.dinger equations by differential transformation Method”, J. Appl. Math. Comput.,Vol.35,pp.37–51,2011.
[15] A.Borhanifar,R.Abazari,”Numerical study of nonlinear Schr.dinger and coupled Schr.dinger equations by differential transformation method”,OpticsCommunications,Vol.283,
pp.2026–2031,2010.
[16] S.Momani,Z.Odibat,V.S.Erturk,”Generalized differential
Transform method for solving a space- and time-fractional diffusion-wave equation”, Physics Letters. A,Vol.370,Issue.5-6,pp.379–387,2007 .
[17] Z.Odibat,S.Momani,”A generalized differential transform method for linear partial Differential equations of fractional order”, Applied Mathematics Letters, Vol.21,Issue.2,pp.194–199,2008.
[18] Z.Odibat,S.Momani,V.S.Erturk,”Generalized differential
Transform method: application to differentia equations of fractionalorder”,Applied Mathematics and Computation,
Vol.197,Issue.2,pp.467–477,2008.
[19] V.S.Erturk,S.Momanib,”On the generalized differential transform method : application to fractional integro-differential equations”,
Studies in Nonlinear Sciences,Vol.1,Issue.4,pp.118-126,2010
[20] M.Garg,P.Manohar,S.L.Kalla,”Generalized differential transform method to Space-time fractional telegraph Equation”,Int.J.of
Differential Equations,Hindawi Publishing Corporation,2011,
article id.:548982,9 pages,doi.:10.1155/2011/548982.
[21] M.K.Bansal,R.Jain,”Application of generalized differential transform method to fractional order Riccati differential equation
and numerical results”,Int. J.of Pure and Appl. Math.,Vol.99,
Issue.3,pp.355-366,2015.
[22] A.Cetinkaya,O.Kiymaz,J.Camli,”Solution of non linear PDE’s of fractional order with generalized differential transform method”,
Int. Mathematical Forum,Vol.6,Issue.1,pp.39-47,2011.
[23] S.Das,”Functional Fractional Calculus”, Springer,2008.
[24] K.S.Miller,B.Ross,”An Introduction to the Fractional Calculus and Fractional Diff. Equations”, John Wiley and Son,1993.
[25] M.Caputo,”Linear models of dissipation whose q is almost frequency independent-ii”, Geophys J. R. Astron. Soc,Vol.13,
pp.529-539,1967.
[26] I,Podlubny,”Fractional differential equations: An introduction to fractional derivatives, fractional differential equations, to methods of their solution and some of their applications”,Academic
Press,1999.
[27] R.Almeida,D.F.Torres,”Necessary and sufficient conditions for the fractional calculus of variations with caputo derivatives”,
Communications in Nonlinear Science and Numerical Simulation,
Vol.16,pp.1490-1500,2011.
[28] A.M.WazWaz,”Partial differential equations methods and applications”,Saint Xavier University,Chicago, Illinois,
USA,2002.
Citation
Deepanjan Das, "Approximate Series Solution of Non Linear Fractional Dispersive Equations Using Generalized Differential Transform Method," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.221-228, 2019.
Fractal Image Compression Techniques
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.229-233, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.229233
Abstract
Digital image are used in several areas. Digital image includes large amount of data. So transmission of such large amount of data require large storage space. Hence to deal which such problems, image compression is used. Image compression is a technique in which redundant information of image is removed, such that only essential information remain. Image compression technique is also helpful in reduce storage size, transmission bandwidth and transmission time. This paper provides review and comparison of different image compression techniques like DCT ( Discrete Cosine Transform ) , DWT ( Discrete Wavelet Transform) and Hybrid (DCT and DWT) and Fractal Image compression by using Affine Transformation and Iterated function system ( FIS). Research finding of this paper helps to build new and more effective image compression technique.
Key-Words / Index Term
DCT (Discrete Cosine Transform), DWT (Discrete Wavelet Transform), Fractal image compression (FIC), Affine Transformation, Iterated function system (FIS)
References
[1] A Jain, “Fundamental of digital image processing” Prentice Hall, 1989.
[2]M. Rabbani and P. Jones , “Digital Image compression techniques”, PIE opt. Eng. Press, Bellingham , Washington , Tech Rep, 1991.
[3]A Lewis and G. Knowles – “Image compression using the 2- D wavelet transform” IEEE Trans Image Processing vol.1 pp. 244- 250 , April 1992.
[4] Dan Liu , Peter K , Jimack, “A survey of parallel Algorithm for fractal image compression” P.No. 1-15, 2007.
[5]Chong Fu and Zhiliang Zhu , “A DCT based fractal image compression method” International Conference IEEE paper , 2009.
[6]Aree Ali Mohammed, Janal Ali Hussein ,“ Hybrid transform coding schemes for Medical Image Application”, 2011.
[7]Er. RamandeepKaur ,Navneet Randhawa ,“Image compression using DCT and DWT” 2012.
[8]A.G. Ananth and Veenadevi S. V ,“ Fractal Image compression Using Quadtree decomposition and Huffman Coding”, Signal and Image processingAn International Journal ( SIPIJ) Vol. 3 No. 2 April 2012.
[9] Dr. SophinSeelil , Dr. M. K. Jeya Kumar , “ A Study on fractal image compression using soft Computing techniques” IJCSI ( International Journal of computer Science Issues ), Vol. 9 Issue 6, No. 2, November 2012 , P. No. 420 – 430.
[10]Manjinder Kaur ,Gagan preetkaur ,“ Survey of lossless and losy Image compression Techniques” , 2013.
[11]Rasha Adel Ibrahim et. Al , “An Enchnaced Fractal Image Compression Integration Quantized Quadtree and Entropy Coding” IEEE 2015.
[12]Utpal Nandi and Jyotsna Kumar Mandal et .al ,“ Fractal Image Compression with Quadtree Partitioning and a new fast classification strategy” International Conference IEEE paper 2015 .
[13]Sonali V. Kolekar and Prof .PrachiSorte ,“ An Efficient and Secure fractal image and video compression” International Journal of Innovative Research in computer and Communication Engineering , vol. 4 , Issue 12 , December 2016 , P.No. 1-6 .
[14]Sunwoong Kim , Hyuk – Jae Lee , “RGBW image compression by low complexity adaptive multilevel block truncating coding” , Volume 62 , P. No. 412 - 419 , 2016.
[15] Ryan Rey M. Daga , “Improved K-d Tree segmented block truncate coding for color image compression” , IEEE 2nd International Conference on signal and Image processing ( ICSIP), Pages 178 – 182 . 2017.
Citation
Nitu, Yogesh Kumar, Rahul Rishi, "Fractal Image Compression Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.229-233, 2019.
Comparative Study of Classification Techniques for Breast Cancer Diagnosis
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.234-240, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.234240
Abstract
Classification techniques in Machine Learning are implemented on datasets. In this work, the cancer datasets are used for the classification purpose and collected from UCI Machine Learning repository. There are two types of datasets of breast cancer. Both the datasets are varying by their number of features available across the datasets. This paper presents the implementation and comparative study of major and popular classification techniques such as Decision Tree, k-Nearest Neighbour, Support Vector Machine, Bayesian Network and Naïve Bayes under WEKA environment for accuracy based on evaluation of performance metrics. This paper evaluates that the Bayesian Network gives the best accuracy with less featured dataset while Support Vector Machine gives best accuracy for more featured dataset.
Key-Words / Index Term
Classification Techniques, Feature Selection, k-Nearest Neighbour (KNN), Support Vector Machine (SVM), Naïve Bayes (NB), Decision Tree (DT), Bayesian Network (BN), WEKA
References
[1] B. Nithya, V. Ilango, 2017, “Comparative Analysis of Classification Methods in R Environment with two Different Datasets.”, Intl J Scientific Research and Computer Science, Engineering and Information Technology (IJSRCSEIT), vol 2, Issue 6, ISSN: 2456-3307.
[2] D. Lavanya et al. 2011, “Analysis of Feature Selection with Classification: Breast Cancer Datasets.”, Intl. J of Computer Science & Engineering (IJCSE), vol. 2, No. 5, Oct-Nov 2011, ISSN: 0976-5166.
[3] Deepika Verma et al., 2017. “Analysis and Prediction of Breast Cancer and Diabetes disease datasets using Data Mining Classification Techniques.”, IEEE Xplore Proceeding of the Intl. Conf. on Intelligent Sustainable Systems (ICISS 2017), IEEE Xplore Compliant – part number: CFP17M19-ART, ISBN:978-1-5386-1959-9
[4] Niyati Gupta et al. 2013, “Accuracy, Sensitivity and Specificity Measurement of Various Classification Techniques on Healthcare data.”, IOSR J. of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p-ISSN: 2278-8727, vol.11, issue 5, pp 70-73, May-Jun 2017.
[5] Morteza Heidari et al. 2017. “Prediction of Breast Cancer Risk using Machine Learning Approach embedded with a Locality Preserving Projection Algorithm.” Institute of Physics in Medicine and Biology (IPEM), doi: https://doi.org/10.1088/1361-6560/aaa1ca.
[6] T. John Peter et al. 2012. “Study and Development of Novel Feature Selection Framework for Heart Disease Prediction.” Intl J. Scientific and Research Publication, IJSRP. Vol.2 Issue 10, (Oct. 2012), ISSN: 2250-3153.
[7] Mahua Nandy , 2013. “An Analytical study of Supervised and Unsupervised Classification Methods for Breast Cancer Diagnosis”. 2nd Intl conf on Computing Communication and Sensor Network (CCSN-2013), Proceedings published by Intl. J Computer Application (IJCA) .
[8] Wenbin Yue, Zidong Wang, Hongwei Chen, and Annette Payne. May 2018. “Machine Learning with Applications in Breast Cancer Diagnosis and Prognosis.”, www.mdpi.com/journal/designs Design 2018, 2, 13; doi:10.3390/designs2013.
[9] Mohd. Milon Islam et al. 2017. Prediction of Breast Cancer using Support Vector Machine and K-Nearest Neighbours.”, 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC), Dec 21-23, 2017, Dhaka, Bangladesh.
[10] Amit Bhola, Arvind Kumar Tiwari, December 2015, “Machine Learning Based Approaches for Cancer Classification using Gene Expression Data.”, Machine Learning and Application: An Intl. J. (MLAIJ), Vol 2, No.3/4
[11] Pedro D.,Micheal P., 1997, “On the Optimality of the Simple Bayesian Classifier under Zero-One Loss.”, Machine Learning, 29, 103-130 (1997), Kluwer Academic Publishers, Netherlands.
[12] Wenbin Yue, Zidong Wang, Hongwei Chen, and Annette Payne. May 2018. “Machine Learning with Applications in Breast Cancer Diagnosis and Prognosis.”, www.mdpi.com/journal/designs Design 2018, 2, 13; doi:10.3390/designs2013,.
[13] Isabelle Guyon, Jason W., Stephen B., et al., 2002, “Gene Selection for Cancer Classification using Support Vector Machine, Machine Learning,” vol.46, pp 389-422, 2002, Springer, Kluwer Academic Publishers, Netherlands
[14] D. Coomans, D.L.Massart, 1982, “Alternate k-Nearest Neighbour Rules in Supervised Pattern Recognition, Part-1. k-NN classification by using Alternative Voting Rules.”, Analytica Chimica Acta, 136 (1982) 15-27, Elsevier Scientific Publishing Company, Amsterdam, Netherlands
[15] Leo Breiman, 2001, “Random Forests, Machine Learning”, vol. 45, issue 1, pp 5-32, Oct 2001, Springer, Kluwer Academic Publishers, Netherlands
[16] Dursun Delen, Glenn Walker, Amit Kadam, 2005, “Predicting Breast Cancer Survivability: a comparison of three data mining methods.”, ELSEVIER Artificial Intelligence in Medicine (2005), 34, 113-127. doi: 10.1016/j.artmed.2004.07.002
[17] A. Marcano-Cedeno et al. 2011, “WBCD breast cancer database classification applying artificial metaplasticity neural network.”, ELSEVIER Expert Systems with Applications 38 (2011) 9573-9579. Doi: 10.1016/j.eswa.2011.01.167
[18] B.B. Chaudhauri, U. Bhattachrya, 2011, “Efficient training and Improved Performance of Multilayer Perceptron in Pattern Classification”. ELSEVIER Neurocomputing 34 (2000) 11-27
[19] J. Tang, C. Deng, G. Huang, 2016, “Extreme Learning Machine for Multilayer Perceptron”, IEEE Transaction on Neural Networks and Learning System, vol 27, No. 4, April 2016.
[20] Cruz-Ramirez Nicandro et al., 2013, “Evaluation of the Diagnostic Power of Thermography in Breast Cancer using Bayesian Network Classifiers.”, Hindwai Publishing Corp, Computational and Mathematical Methods in Medicine. Vol 2013, Article ID 264246, 10 pages, http://dx.doi.org/10.1155/2013/264246
[21] S. Wongthanavasu, 2010, “A Bayesian Belief Network Model for Breast Cancer Diagnosis.”, Springer Operation Research Proceedings 2010, Intl. Conf. German Operation Research Society, Sept 1-3, 2010, pp 3-8,
Citation
Ajay Kumar, R. Sushil, A. K. Tiwari, "Comparative Study of Classification Techniques for Breast Cancer Diagnosis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.234-240, 2019.
Sarcasm Recognition in Twitter
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.241-248, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.241248
Abstract
Sarcasm is a nuanced form of speech broadly utilized in different online platforms such as social networks, micro-blogs and sarcasm recognition refers to anticipate whether the content is sarcastic or not. Identifying sarcasm in content is among the significant issues confronting sentiment analysis. In sarcasm, individuals express their negative feelings by utilizing positive or strengthened positive words in the content. While talking, individuals regularly utilize intense tonal force and certain gestural pieces of information like rolling of the eyes, hand development, and so forth to reveal sarcasm. Due to these challenges, in the last few decades, researchers have been working rigorously on sarcasm recognition so as to amend the performance of automatic sentiment analysis of data. In this paper, a supervised learning approach, which learns from four different categories of features and their combinations, is presented. These feature sets are employed to classify instances as sarcastic and not-sarcastic using four different classifiers, namely – Naïve Bayes, SVMs, Random Forest and k-Nearest Neighbor classifiers. In particular, it has been tried to explore the impact of sarcastic patterns based on POS tags and the outcomes demonstrate that they are not useful as a feature set for recognizing sarcasm when compared to content words and function words. Using the finest feature set i.e. the combination of content words and function words, a precision and AUC of approximately 85% and 87%, respectively, were achieved. Additionally, the Naïve Bayes classifier gives better results over every single other classifier that has been utilized.
Key-Words / Index Term
Sentiment analysis, Sarcasm, Supervised learning, Feature-sets
References
[1] R. Kumar, V. Ravi. "A survey on opinion mining and sentiment analysis: tasks, approaches and applications", Knowledge-Based Systems, Vol.89, pp.14-46, 2015.
[2] E. Riloff, A. Qadir, P. Surve, L. D. Silva, N. Gilbert, R. Huang, "Sarcasm as contrast between a positive sentiment and negative situation", In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, pp.704-714, 2013.
[3] D. G. Maynard, M. A. Greenwood, "Who cares about sarcastic tweets? investigating the impact of sarcasm on sentiment analysis", In LREC 2014 Proceedings, ELRA, 2014.
[4] Bharti, S. Kumar, K. S. Babu, S. K. Jena, "Parsing-based sarcasm sentiment recognition in twitter data", In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ACM, pp. 1373-1380, 2015.
[5] A. Khattri, A. Joshi, P. Bhattacharyya, M. Carman, "Your sentiment precedes you: Using an author’s historical tweets to predict sarcasm", In Proceedings of the 6th workshop on computational approaches to subjectivity, sentiment and social media analysis, pp. 25-30, 2015.
[6] B. Pang, L. Lee, "A sentimental education: Sentiment analysis using subjectivity summarization based on minimum cuts", In Proceedings of the 42nd annual meeting on Association for Computational Linguistics, Association for Computational Linguistics, p.271, 2004.
[7] S. M. Mohammad, P. D. Turney, "Crowdsourcing a word–emotion association lexicon", Computational Intelligence, Vol.29, Issue.3, pp. 436-465, 2013.
[8] R. Justo, T. Corcoran, S. M. Lukin, M. Walker, M. I. Torres, "Extracting relevant knowledge for the detection of sarcasm and nastiness in the social web", Knowledge-Based Systems, Vol.69, pp.124-133, 2014.
[9] S. Mukherjee, P. K. Bala, "Sarcasm detection in microblogs using Naïve Bayes and fuzzy clustering", Technology in Society, Vol.48, pp.19-27, 2017.
[10] M. Bouazizi, T. O. Ohtsuki, "A pattern-based approach for sarcasm detection on Twitter", IEEE Access 4, pp.5477-5488, 2016.
[11] O. Tsur, D. Davidov, A. Rappoport, "ICWSM-A Great Catchy Name: Semi-Supervised Recognition of Sarcastic Sentences in Online Product Reviews", In ICWSM, pp.162-169, 2010.
[12] D. Davidov, O. Tsur, A. Rappoport, "Semi-supervised recognition of sarcastic sentences in twitter and amazon", In Proceedings of the fourteenth conference on computational natural language learning, Association for Computational Linguistics, pp.107-116, 2010.
[13] J. Tepperman, D. Traum, S. Narayanan, "" Yeah Right": Sarcasm Recognition for Spoken Dialogue Systems", In Ninth International Conference on Spoken Language Processing, 2006.
[14] C. C. Liebrecht, F. A. Kunneman, A. P. J. van Den Bosch. "The perfect solution for detecting sarcasm in tweets# not", 2013.
[15] N. Littlestone. "Learning quickly when irrelevant attributes abound: A new linear-threshold algorithm", Machine learning, Vol.2, Issue.4, pp.285-318, 1988.
[16] R. González-Ibánez, S. Muresan, N. Wacholder, "Identifying sarcasm in Twitter: a closer look", In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: Short Papers, Association for Computational Linguistics, Vol.2, pp.581-586, 2011.
[17] A. Rajadesingan, R. Zafarani, H. Liu, "Sarcasm detection on twitter: A behavioral modeling approach", In Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, ACM, pp.97-106, 2015.
[18] S. C. Schürer, S. M. Muskal, "Kinome-wide activity modeling from diverse public high-quality data sets", Journal of chemical information and modeling, Vol.53, Issue.1, pp.27-38, 2013.
[19] R. Kohavi, "A study of cross-validation and bootstrap for accuracy estimation and model selection" In Ijcai, Vol.14, Issue.2, pp.1137-1145, 1995.
[20] K. W. Church, "A stochastic parts program and noun phrase parser for unrestricted text", In Proceedings of the second conference on Applied natural language processing, Association for Computational Linguistics, pp.136-143, 1988.
[21] D. Biber, S. Johansson, G. Leech, S. Conrad, E. Finegan, "Longman grammar of spoken and written English", pp.89-110, 1999.
[22] K. P. Murphy, "Naive bayes classifiers", University of British Columbia, 2006.
[23] C. Hsu, C. Chang, C. Lin, "A practical guide to support vector classification", pp.1-16, 2003.
[24] L. Breiman, "Random forests", Machine learning, Vol.45, Issue.1, pp.5-32, 2001.
[25] M. J. Islam, QM Jonathan, M. Ahmadi, M. A. Sid-Ahmed, "Investigating the performance of naive-bayes classifiers and k-nearest neighbor classifiers", In Convergence Information Technology, 2007. International Conference on, IEEE, pp.1541-1546, 2007.
[26] H. Schütze, C. D. Manning, P. Raghavan, “Introduction to information retrieval”, Cambridge University Press, Vol.1, 2008.
Citation
Sakshi Thakur, Sarbjeet Singh, Makhan Singh, "Sarcasm Recognition in Twitter," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.241-248, 2019.
A New Approach towards Confusion Analysis of S-boxes using Truncated Differential Cryptanalysis
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.249-256, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.249256
Abstract
SAC matrices have been implemented for S-boxes of DES and AES to implement a higher order differential analysis, known as truncated differentials. This new approach will help us to find the vulnerability to attacks. After getting the original outputs corresponding to the input strings, inputs to s-boxes of DES and AES are then truncated in two parts, strings (a, b), of equal bit length Then each bit of both a and b is changed one after the other to get the new input and its corresponding output. Using all outputs of every possible input, SAC matrices are generated for statistical and truncated differential analysis to reach the conclusion.
Key-Words / Index Term
Truncated Differential; S-box; SAC; Higher order differential; Cryptanalysis; Cryptology; Differential Cryptanalysis
References
[1] Knudsen, Lars R. "Truncated and higher order differentials." International Workshop on Fast Software Encryption. Springer, Berlin, Heidelberg, 1994.
[2] X. Lal. “Higher order derivatives and differential cryptanalysis”. In Proc. "Symposium on Communication, Coding and Cryptography", in honour of James L. Massey on the occasion of his 60`th birthday, Feb. 10-13, 1994, Monte-Verita, Ascona, Switzerland, 1994.
[3] E. Biham and A. Shamir. “Differential cryptanalysis of DES-like cryptosystems”. Journal of Cryptology, 4(1):3-72, 1991.
[4] K. Nyberg. “Differentially uniform mappings for cryptography”. In T. Helleseth, editor, Advances in Cryptology- Proc. Eurocrypt`93, LNCS 765, pages 55-64. Springer Verlag, 1993.
[5] K. Nyberg and L.R. Knudsen. “Provable security against differential cryptanalysis.” In E.F. Brickell, editor, Advances in Cryptology - Proc. Crypto`92, LNCS 740, pages 566-574. Springer Verlag, 1993.
[6] Nyberg, Kaisa. "Perfect nonlinear S-boxes." Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1991.
[7] Moriai S., Sugita M., Aoki K., Kanda M. (2000) “Security of E2 against Truncated Differential Cryptanalysis.” In: Heys H., Adams C. (eds) Selected Areas in Cryptography. SAC 1999. Lecture Notes in Computer Science, vol 1758. Springer, Berlin, Heidelberg.
[8] Rasoolzadeh, Shahram, et al. "An improved truncated differential cryptanalysis of KLEIN." Tatra Mountains Mathematical Publications 67.1 (2016): 135-147.
[9] Lee, Seonhee, et al. "Truncated differential cryptanalysis of Camellia." International Conference on Information Security and Cryptology. Springer, Berlin, Heidelberg, 2001.
[10]https://www.cosic.esat.kuleuven.be/ecrypt/courses/albena11/slides/LRK-truncated_differentials.pdf
[11] Webster, A. F., and Stafford E. Tavares. "On the design of S-boxes." Conference on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, 1985 (pp. 523-534).
[12] Shannon, C.E. “A mathematical theory of communication.” Bell System Technical Journal 27, 1948. p. 379–423, 623–656.
[13] Ramamoorthy, V., et al., “The Design of Cryptographic S-boxes Using CPSs.” J. Lee (Ed.): CP 2011, LNCS 6876, Springer-Verlag Berlin Heidelberg, 2013. p. 54-68.
[14] A.Datta, D.Bhowmick, S. Sinha, “A Novel Technique for Analysing Confusion in S-boxes.” International Journal of Innovative Research in Computer and Communication Engineering, 2016. 4(6): p. 11608-11615.
[15] A.Datta, D.Bhowmick, S. Sinha, “Implementation of SAC Test for Analyzing Confusion in an S-box Using a Novel Technique.” International Journal of Scientific Research in Computer Science Applications and Management Studies, Vol. 7, Issue 3, No. 182
[16] Webster, A.F., Tavares, S.E. “On the Design of S-boxes”. Advance in Cryptology. Proc. CRYPTO ’85, Springer-Verlag, Berlin, 1986. pp. 523-534.
[17] Forrié R. (1990) “The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition.” In: Goldwasser S. (eds) Advances in Cryptology — CRYPTO’ 88. CRYPTO 1988. Lecture Notes in Computer Science, vol 403. Springer, New York, NY
[18] D.Bhowmick, A.Datta, S. Sinha. “A Bit-Level Block Cipher Diffusion Analysis Test.” Springer International Publishing Switzerland 2015: S.C.Satpathy et. al. (eds), Proc of 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 2014-Col. I, Advances in Intelligent Systems and Computing 327. pp: 667-674.
[19] Coppersmith, D. “The Data Encryption Standard and its Strength against Attacks.” IBM Journal of Research and Development. 38(3) 243, 1994.
[20] P. Sharma, D. Mishra, V.K. Sarthi, P. Bhatpahri, R. Shrivastava, "Visual Encryption Using Bit Shift Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.57-61, 2017
[21] M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017
Citation
Avijit Datta, Dipanjan Bhowmik, Sharad Sinha, "A New Approach towards Confusion Analysis of S-boxes using Truncated Differential Cryptanalysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.249-256, 2019.
A Review Paper on Big Data with comparative analysis of Hadoop
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.257-261, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.257261
Abstract
Big data is the complete data that is generated by human beings in daily life. Data is gathered from various sources and thus made useful for people by preprocessing it. For processing such huge amount of data (i.e. in terabytes and petabytes), specialized hardware and software is required. Thus, to store, manage, and process the increasing amount of data is really a challenging area of research and development in big data analysis. The objective of this paper is to explore the impact, challenges, architecture of big data and various tools associated with it. This paper also provides a comparative study of Hadoop distributed file system and traditional database and a platform to explore it at various stages
Key-Words / Index Term
Hadoop, HDFS, Challenges, Big Data Analysis
References
[1] International Journal of Engineering Technology, Management and Applied Sciences www.ijetmas.com March 2017, Volume 5 Issue 3, ISSN 2349-4476 19 AnjanaRaviprolu The Big Data and Market Research Anjana Raviprolu, Dr.Lankapalli Bullayya.
[2] International Journal of Scientific and Research Publications, Volume 4, Issue 10, October 2014 1 ISSN 2250-3153 www.ijsrp.org A Review Paper on Big Data and Hadoop Harshawardhan S. Bhosale1 , Prof. Devendra P. Gadekar.
[3] Jimmy Lin “MapReduce Is Good Enough?” The control project. IEEE Computer 32 (2013)
[4] Shilpa Manjit Kaur,” BIG Data and Methodology- A review” ,International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013.
[5] D. P. Acharjya, S. Dehuri and S. Sanyal Computational Intelligence for Big Data Analysis, Springer International Publishing AG, Switzerland, USA, ISBN 978-3-319-16597-4, 2015.
[6] Jyoti Kumari, Mr. Surender, Statically Analysis on Big Data Using Hadoop,IJCSMC, Vol. 6, Issue. 6, June 2017, pg.259 – 265
[7] C.L. Philip Chen, Chun-Yang Zhang, “Data intensive applications, challenges, techniques and technologies: A survey on Big Data” Information Science 0020-0255 (2014), PP 341-347, elsevier.
[8] Gayathri Ravichandran ,Big Data Processing with Hadoop : A Review , International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02,Feb -2017 .
[9] Abdelladim Hadioui!!", Nour-eddine El Faddouli, Yassine Benjelloun Touimi, and Samir Bennani Machine Learning Based On Big Data Extraction of Massive Educational Knowledge,iJET ‒ Vol. 12, No. 11, 2017.
[10] Rahul Beakta , Big Data And Hadoop: A Review Paper Volume 2, Spl. Issue 2 (2015) e-ISSN: 1694-2329 | p-ISSN: 1694-2345
[11] ]Kache, F., Kache, F., Seuring, S., Seuring, S.,Challenges and opportunities of digital information at the intersection of Big Data Analytics and supply chain management. International Journal of Operations & Production Management 37, 10–36, (2017)https://doi.org/10.1108/IJOPM-02-2015-0078
[12] Zhou, L., Pan, S., Wang, J., Vasilakos, A.V., Machine Learning on Big Data: Opportunities and Challenges. Neurocomputing, (2017).
Citation
Priya, "A Review Paper on Big Data with comparative analysis of Hadoop," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.257-261, 2019.