Sum of The Degrees of Dominating Set And Complementary Dominating Set Using Eulidean Division Algorithm of Divisor 5 For Interval Graph G
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.189-201, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.189201
Abstract
Interval graphs, their importance over the years can be seen in the increasing number of researchers trying to explore the field. The concept of the domination is a rapidly developing area in Graph Theory. In this paper, we tried to present some relations on the sum of degree of the vertices in dominating set and complementary dominating set using Euclidean division algorithm of divisor 5 for interval graph G.
Key-Words / Index Term
Interval graph, Domination number, complementary dominating set, complementary domination number.
References
[1]. Sampathkumar E. and Walikar H.B., The connected domination number of graph, J. Math.Phy. Sci.,13, (1979), 607-613.
[2]. Dr.A.Sudhakaraiah, K.Narayana, Dr.T.Venkateswarlu., To Find The Domination Number Towards Quotient Of An Euclidean Division Algorithm Of Devisor 3 Using An Interval Graph G. IJRAR August 2018,Volume 5, Issue 3, Page no: 445-455, ISSN 2348-1269.
[3]. Kulli V.R., Theory of Domination in graphs, Vishva Int Pub. (2010).
[4]. Kulli V.R. and Soner N.D, Complementary edge domination in graphs, Indian j. Of pure applied mathematics, 28(7), (1997), 917-920.
[5]. Hedetniemi S.T. and Laskar R., Bibliography on domination in graphs and some basic definitions of domination parameters, Discrete mathematics , 86, (1990), 257-277.
[6]. Dr. A. Sudhakaraiah, Dr. T. Venkateswarlu, K. Narayana and A. Venkateswararao “To find minimum dominating set using Euclidean division algorithm with Divisor 5 for interval graph G” IJRAR November 2018, Volume 5, Issue 4.
[7]. Dr. A. Sudhakaraiah, Dr. T. Venkateswarlu, K. Narayana and A. Venkateswararao “Some properties on degrees of dominating sets using euclidean division algorithm divisor 5 for interval graph G” Volume 4, Issue 11, November-2018.
[8]. Bondy and Murthy. “Graph Theory with applications”. Macmillan (1976)
[9]. Laskar R C and Walikar H B “ On domination related topics in Graph Theory” in Lecture notes in match 85981, 308-320.
[10]. Ore O “Theory of Graphs” American math Soc Colloq Publ. 38 Providence. RI. (1962).
Citation
A. Sudhakaraiah, A. Venkateswarrao, T. Venkateswarlu, K. Narayana, "Sum of The Degrees of Dominating Set And Complementary Dominating Set Using Eulidean Division Algorithm of Divisor 5 For Interval Graph G," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.189-201, 2019.
SD-IOT: Security and Privacy
Research Paper | Journal Paper
Vol.7 , Issue.8 , pp.202-207, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.202207
Abstract
The Internet of things (IoT) is becoming apparent of the Internet which can connect nearly all environment devices, embedded with Internet Protocol (IP) and they are remotely monitored and controlled. Due to the huge growth of IoT devices, IoT networks are vulnerable to various security attacks. The implementation of efficient privacy and security protocols in IoT networks is extremely needed to ensure authentication, confidentiality, integrity and access control, among others. In this paper, I firstly present an in-depth meaning of the Internet of Things (IoT) and then propose a general framework for software-defined Internet of Things (SD-IoT) based on the SDx paradigm, software-defined everything (SDx) paradigm provides a way to strengthen the security of the IoT devices, as well as determines the impact of those new security and privacy issue and possible solutions. The proposed framework is implemented to strengthen the security of the IoT with heterogeneous and vulnerable devices. IoT, Software-defined Internet of Things (SDIoT), Security, Privacy.
Key-Words / Index Term
IoT, Software-defined Internet of Things (SDIoT), Security, Privacy
References
[1] Mosenia and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," in IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586- 602,1Oct.-Dec.2017.doi: 10.1109/TETC.2016.2606384
[2] D. Yin, L. Zhang and K. Yang, "A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework," in IEEE Access, vol. 6, pp. 24694- 24705,2018.doi: 10.1109/ACCESS.2018.2831284
[3] Krishnan, Prabhakar & S. Najeem, Jisha & Achuthan, Krishnashree. (2018)."SDN Framework for Securing IoT Networks” 10.1007/978-3-319-73423-1_11.
[4] Fadele, Alaba & Othman, Mazliza & Abaker Targio Hashema, Ibrahim & Alotaibi, Faiz. (2017). “Internet of things Security: A Survey. Journal of Network and Computer Applications”. 88.
10.1016/j.jnca.2017.04.002.
[5] Weigong LV, Fanchao MENG, “AGeneral Architecture of IoT System”, International Conference on Computational Science and Engineering, Vol.1, No.5, pp.1-4, 2017.
[6] Jararweh, Yaser & Al-Ayyoub, Mahmoud & Darabseh, Ala & Benkhelifa, Elhadj & Vouk, Mladen & Rindos, A.ndrew. (2015). “SDIoT: A Software Defined based Internet of Things framework”. Journal of Ambient Intelligence and Humanized Computing. 1. 453-461. 10.1007/s12652-015-0290-y.
[7] Choi, S., & Kwak, J. (2016). “Enhanced SDIoT Security Framework Models. International Journal of Distributed Sensor
Networks”. https://doi.org/10.1155/2016/4807804
[8] Ullah, Rafi & ul Sami, Iftikhar & Ahmad, Maaz & Asif, Muhammad. (2018). “DoS/DDoS detection for E- healthcare in Internet of Things”. International Journal of Advanced Computer Science and Applications. 9. 10.14569/IJACSA.2018.090140.
[9] Ma YW, Lai CF, Huang YM, Chen JL. “Mobile RFID with IPv6 for phone services.” In: Proc. of the 13th IEEE Int’l Symp. On Consumer Electronics. Kyoto: IEEE Press, 2009. 169 170. [doi: 10.1109/ISCE.2009.5156859]
[10] Yaser Jararweh1 ,Mahmoud Al-Ayyoub1, Ala’ Darabseh1 “SDIoT: a software defined based internet of things framework”, Springer-Verlag Berlin Heidelberg, pp.1-9, 2015.
[11] Krishnan, Prabhakar & S. Najeem, Jisha & Achuthan, Krishnashree. (2018)."SDN Framework for Securing IoT Networks” 10.1007/978-3-319-73423-1_11.
[12] A. Hakiri, P. Berthou, A. Gokhale, and S. Abdellatif, ‘‘software defined networking for efficient and scalable IoT communications,’’ IEEE Commun. Mag., vol. 53, no. 9, pp. 48–54, Sep. 2015.
[13] X. Zhong, Research on Distributed Controller Deployment Algorithm Based on Software Defined Network. Changsha, China: Hunan Normal Univ., 2017, pp. 29–33.
Citation
Vishal S. Patil, Suraj S. Bhute, Gauri J. Chauhan, Aparna P. Morey, Tejaswini S. Borkar, "SD-IOT: Security and Privacy," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.202-207, 2019.
A Review Paper on Internet of Nano Things
Review Paper | Journal Paper
Vol.7 , Issue.8 , pp.208-211, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.208211
Abstract
The Internet of Nano Things taking IoT to next level. Nanotechnology is science technology in which size of devices are much smaller which contributed greatly in computing and electronics, leading to faster ,smaller and more profitable system that can be use for communication and storing of large data. It is also use of creating devices, machines in nano size by integrating molecules or atoms. Nanotechnology is a building block of Internet of Nano Things(IoNT) which include basic unit called as Nano machines which perform simple task like sensing and actuating. The interconnection of nano devices with existing internet called as “Internet of Nano Things”. Nanotechnology has provide new solution to benefit society in different sector like information technology, medicines, transportation, military field , as well as industrial purpose. In this paper we are showing the architecture of Nano machines, network architecture ,application field, challenges in Internet of Nano Things (IoNT) and help to researchers to find solution for challenges and increase the use of Internet of nano Things (IoNT) in future in different field.
Key-Words / Index Term
Internet of Things (IoT), Internet of Nano Things(IoNT), Nanotechnology, Nano Machines , Nano Sensor ,Nano communication.
References
[1]. Anand Nayyar, Vikram puri, Dac-Nhuong Le, “Internet of Nano Things(IoNT):Next Evolutionary Step in Nanotechnology”,Nanoscience and Nanotechnology 2017,7(1):4-8,DOI:10.5923/j.nn.20170701.02
[2]. Ian F. Akyildiz,Josep Miquel Jornet, “The Internet of Nano-Things”, IEEE Wireless communication 2010,1536-1284/10
[3]. Karan Agarwal, Kunal Agarwal, Shalini Agarwal, “Evolution of Internet of Nano Things(IoNT)”,International Journal of Engineering Technology Science and Researcher 2017 ,ISSN 2394-3386,Volume,Issue 7
[4]. Kaushal Dabhi,Ashish MAheta, “Internet of Nano Things-The Next Big Things”, International Journal of Engineering Science and Computing,2017,Volume 7, Issue No .4
[5]. “History of nanotechnology-Wikipedia”, https://en.m.wikipedia.org/wiki/History_of_nanotechnology[Last Accessed; 12-08-2019].
[6]. Saumya Sharma“Where do IoT and nanotechnology intersect?”, https://internetofthingsagenda.techtarget.com/answer/Where-do-IoT-and-nanotechnology-intersect [Last Accessed; 12-08-2019].
[7]. “Advantages of IoT ,Disadvantages of IoT, Internet of Things”, https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-IoT-Internet-Of-Things.html, [Last Accessed; 12-08-2019].
[8]. Kishor Mohanty “The Internert of Nano Things”, “https://www.tutorialspoint.com/articles/the-internet-of-nano-things’. [Last Accessed; 14-08-2019].
Citation
Vishal S.Patil, Gauri J. Chauhan, Aparna P. Morey, Suraj S. Bhute, Tejaswini S. Borkar, "A Review Paper on Internet of Nano Things," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.208-211, 2019.
A Review Paper on Solar Power Monitoring System using an IoT
Review Paper | Journal Paper
Vol.7 , Issue.8 , pp.212-215, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.212215
Abstract
The solar power monitoring system is used the Internet of Things for the purpose, to overcome the drawbacks of previous solar systems. An IoT is a joint network of the connected devices together and shares the data about how they are used in the environment in which they are operated. The solar power monitoring system is used for generating the electricity by using the energy of sunlight. This system is uses the Arduino Uno for enhancement of the solar systems. This solar power monitoring system uses the Arduino Uno. The Arduino Uno is microcontroller board, this microcontroller used the ATmega328p. ATmega328p is also a microcontroller chip which is developed by Atmel. By using Arduino Uno the solar panel is capable of moving in the direction where sunlight is moves , this is the additional feature of this solar system. This paper shows the working, architecture and connections of the solar power monitoring system using an IoT.
Key-Words / Index Term
Internet of Things(IoT), Arduino Uno, ATmega328p, solar panel
References
[1] Manish Katyarmal1, Suyash Walkunde2, Arvind Sakhare3, Mrs.U.S.Rawandale4 “Solar power monitoring system using IoT”, International Journal of Engineering and Technology, Vol.05, Issue. 03, pp.1-2,2018.[Last accessed : 16-08-2019].
[2] R.L.R. Lokesh Babu1, D Rambabu2, A. Rajesh Naidu3, R. D. Prasad4, P. Gopi Krishna5“IoT Enabled Solar Power Monitoring System ”, International Journal of Engineering and Technology, Vol.07, Issue.3.12,pp.526-530,2018[Last accessed :15-08-2019].
[3] SupritaM.Patil ,Vijayalashmi M, Rakesh Tapaskar “IoT based Solar Energy MonitoringSystem”, Indian Journal of Science and Research, Vol.15,Issue.2,pp.149-155,2017[Last accessed: 13-08-2019].
[4]R. Vignesh, A, Samydurai “A Survey on IoT System for Monitoring Solar Panels”, IJSDR, Vol.1,Issue.11,pp.114-115,2016[Last accessed :15-08-2019].
[5] Miss. Apurva L. ,Mr. Madhu N., “IoT based Solar monitoring system”,InternationalJournel of Science Technology and Engineering,Vol.3,Issue.2,pp.1-18,2016[Last accessed: 14-08-2019].
[6] Subhasri. G, Dr. Jeyalakshmi. c,“A study of IoT based solar panel tracking system”,Advances in computational science and Technology,Vol.11,Issue.7,pp.537-545,2018[Last accessed: 12-08-2019].
[7] S. Padma, P. U. Ilavarasi, AmithIfant. B,Anusan. K,”Monitorig of solar energy using IoT”,Indian Journal of Emerging Electronics in computer communications,Vol.4,Issue.1,pp.596-601,2017[Last accessed: 13-08-2019].
[8] Andreas Cellarius, Solar System-Wikipedia “http://en.wikipedia.org/wiki/Solar_System”[ Last accessed: 12-08-2019]
[9]Internet of Things: Novel Advances and Envisioned Applications“https://en.wikipedia.org/wiki/Internet_of_things”[Last accessed :14-08-2019]
Citation
Vishal S. Patil, Aparna P. Morey, Gauri J. Chauhan, Suraj S. Bhute, Tejaswini S. Borkar, "A Review Paper on Solar Power Monitoring System using an IoT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.212-215, 2019.
Extending Business Opportunities and Smart Services using Machine Learning
Technical Paper | Journal Paper
Vol.7 , Issue.8 , pp.216-220, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.216220
Abstract
With the advancement of technology and growing business needs it is vital that the services offered to customers across various applications need to be proactive and not reactive. This work extends the existing cloud framework available for smart homes that offers extended potential business opportunities to service providers and optimistic smart services to end users. Based on the defined framework cluster analysis is done to derive the customer segmentation that facilitates smart home service providers to offer efficient services and to improve the product upselling. The predicted energy consumption is derived using linear regression, for the end users to be energy efficient. Here a deeper analysis based on the data generated from devices and smart home applications is carried out to offer proactive consumer services and to have economical energy consumption.
Key-Words / Index Term
Smart Serivces, Machine Learning, Smart Homes, Internet of Things
References
[1] Towards Datascience. https://towardsdatascience.com/15-artificial-intelligence-ai-stats-you-need-to-know-in-2018-b6c5eac958e5
[2] Dataversity. http://www.dataversity.net/machine-learning-algorithms-today-usage-results/
[3] Forbes. https://www.forbes.com/sites/freddiedawson/2015/09/30/smart-home-sector-could-be-worth-hundreds-of-billions-in-next-five-years/#310e8bbe6a20
[4] Tyagi, Sapna, Ashraf Darwish, and Mohammad Y. Khan. "Managing computing infrastructure for IoT data." (2014).
[5] Botta, Alessio, et al. "On the integration of cloud computing and internet of things." Future internet of things and cloud (FiCloud), 2014 international conference on. IEEE, 2014.
[6] Stojkoska, Biljana L. Risteska, and Kire V. Trivodaliev. "A review of Internet of Things for smart home: Challenges and solutions." Journal of Cleaner Production 140 (2017): 1454-1464.
[7] C. Premalatha, "Automatic Smart Irrigation System Using IOT", International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.1-5, 2019
[8] Koduru, Suresh, VGD Prasad Reddy Padala, and Preethi Padala. "Smart Irrigation System Using Cloud and Internet of Things." Proceedings of 2nd International Conference on Communication, Computing and Networking. Springer, Singapore, 2019.
[9] Vidhi Tiwari, Pratibha Adkar, "Implementation of IoT in Home Automation using android application", International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.2, pp.11-16, 2019
[10] Zaouali, K., et al. "Incoming data prediction in smart home environment with HMM-based machine learning." Signal, Image, Video and Communications (ISIVC), International Symposium on. IEEE, 2016.
[11] Chung, Che-Min, et al. "Automated machine learning for Internet of Things." Consumer Electronics-Taiwan (ICCE-TW), 2017 IEEE International Conference on. IEEE, 2017.
[12] Suresh, K., Prasad Reddy, PVGD., Preethi, P. (2019). Smart Home Services using Cloud and Internet of Things. Manuscript submitted for publication.
[13] SAP Fiori – SAP UI5, https://archive.sap.com/documents/docs/DOC-46225
[14] SAP UI5,
https://sapui5.hana.ondemand.com/#docs/guide/95d113be50ae40d5b0b562b84d715227.html
[15] Python. https://www.python.org/
[16] Eastern Power Distribution Company of AP Ltd.
https://www.apeasternpower.com/EPDCL_Home.portal;jsessionid=k23ybnwM1pFsk4GZBQcQTLZmJnypTJ5x1pnp8PhZz20ySkr4LfYn!161743796?_nfpb=true&_pageLabel=EPDCL_Home_portal_page_97
Citation
K. Suresh, PVGD. Prasad Reddy, P. Pushkal, "Extending Business Opportunities and Smart Services using Machine Learning," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.216-220, 2019.
Challenges in Acquisition of New Courses in Education, Bachelor of Technology in SD VS Traditional CSE Program: A Case Study of M.M. Deemed to Be University
Survey Paper | Conference Paper
Vol.7 , Issue.8 , pp.221-226, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.221226
Abstract
With rapid advancement in Technology and its demand in industry rapidly forcing Universities to take help of course content writers or open education resources to make changes in the existing curriculum, that must fulfill requirements of industries which they’re looking from fresh graduates. Even though development of new courses or enhancing the quality of existing courses by adding topics of more demanded technologies is a time consuming job yet as a result these time variant practices makes candidates job ready. In reality there are huge innovations in our lives based on engineering technology, but university curriculum not keeping pace. In this particular research article thorough study about bachelor level Software Development program discussed and suitable comparison with respect to existing program provided.
Key-Words / Index Term
Course Content Writers (CCW), Communication Skills (CS), Distance Education (DE), Faculty Development Program (FDP), Open Education Resources (OER), Open Sources, Software Development Program (SD), Self-Learning-Material (SLM), Video Conferencing (VC)
References
[1]. Emory W., ‘New Course Development in a Distance Collaborative Environment’, 33rd ASEE/IEEE Frontiers in Education Conference, Nov 5-8, 2003, Boulder, Colorado.
[2]. Hongqing Yu, ‘A Study on Development of Web-based Moral Education Course’, 2011 IEEE International Conference on Uncertainty Reasoning and Knowledge Engineering, Bali, Indonesia, Aug 4-7, 2011.
[3]. Michael E. Auer, ‘New Pedagogic Challenges in Engineering-Education’, ‘Soaring to New Height in Engineering Education-2012 FIE’, IEEE Computer Society, Oct, 2012, Seattle, Washington DC.
[4]. Fazeel Khan, ‘Upgrading the Engineering Curriculum through Thematic Learning Modules’, 2014 Frontiers in Education Conference, IEEE, Madrid, Spain, Oct 22-24, 2014.
[5]. D. Ktoridou, ‘Designing a Product Development Process Graduate Course: An Interdisciplinary Example’, 2016 IEEE Global Engineering Education Conference, Abu Dhabi, UAE, April 10-13, 2016.
[6]. Jiri Dostal, ‘Researching Computing Teachers’ Attitude Towards Changes in the Curriculum Content – An Innovative Approach or Resistance?’, 2017 Second International Conference on Informatics and Computing, IEEE, Papua, Indonesia, Nov 1-3, 2017.
[7]. Pande, ‘Opportunities and Challenges in adoption of Open Education Resources for Course Development’, International Journal of Information Technology (Springer) (BJIT), Sep 2018, Pg: 339-347.
[8]. https://www.iiitd.ac.in/academics/courses/
[9]. https://www.mmumullana.org/engineering
[10]. https://nitdelhi.ac.in/wp-content/uploads/2018/12/syllabus_CSE.pdf
[11]. https://en.wikipedia.org/wiki/Computer_Science_and_Engineering
[12]. https://www.carterradley.co
[13]. Schank, Roger. Teaching Minds. How Cognitive Science Can Save Our Schools. Teachers College Press. 2011.
Citation
Arvind K. Sharma, Gunjan Sethi, Martin Radley, "Challenges in Acquisition of New Courses in Education, Bachelor of Technology in SD VS Traditional CSE Program: A Case Study of M.M. Deemed to Be University," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.221-226, 2019.
Comparative Study and evolution of Mobile Banking Security Solutions and Comparision between Various Solutions
Survey Paper | Journal Paper
Vol.7 , Issue.8 , pp.227-232, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.227232
Abstract
Due to the rapidly increasing use of mobile phones, it is essential to provide a secure solution for mobile phones; with the evolution of mobile commerce, it is obvious to provide a secure and efficient solution for the mobile environment. Day by day usages of mobile devices is huge and consumers are getting familiar with the various purposes of devices such as mobile banking. This paper focuses and describes various types of mobile banking methods and their possible security solutions. In the first part mobile banking solutions using contactless technology – Near Field Communication (NFC) is discussed with its limitations in terms of security. In addition, we also address the security weaknesses of Wireless Application Protocol (WAP) and Wireless Transport Layer Security (WTLS). To overcome the above mention weaknesses, in the second part different solutions of mobile banking with Public Key Infrastructure such as MPKI, WPKI, ECC, LPKI are discussed with its limitations and possible solutions to overcome the limitations.
Key-Words / Index Term
NFC, TSM, WAP, PKI, GSM, GPRS, SIM, SMS, Mobile PKI, Wireless PKI, Lightweight PKI
References
[1] Venessa Pegueros : “Security of mobile banking and payments” : GIAC (GSEC) Gold certificate, 2012.
[2] S. Schwiderski- Grosch and H. Knopse : “ Secure Mobile commerce”, Electronic And communication engineering journal , Vol. 14, Issue 5, pp-228-238,2002.
[3] Nikolaos Zacharopoulos, An ISACA Emerging Technology White paper: “Mobile Payments, risks Security and assurance issues”, November 2011.
[4] Balachandra Muniyal,Krishna Prakash, Shashank Sharma : “wireless public key infrastructure for mobile phones”: International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.6, pp. 111-118, 2012.
[5] Yong lee, Jaeil Lee, JooSeok Song, "Design and Implementation of wireless PKI technology suitable for mobile phone in mobile commerce”,Science Direct, Computer communication 30, pp.893-902, 2007.
[6] Sangram Ray, G. P. Biswas, “design of mobile public key infrastructure (m-PKI) using elliptic curve cryptography”, International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, pp. 25-37, 2013.
[7] Ke Gu,Na Wu,Yongzhi Liu,Fei Yu and Bo Yin : “WPKI Certificate Verification Scheme Based on Certificate Digest Signature-Online Certificate Status Protocol” :Mathematical Problems in Engineering, Volume 2018, Article ID 7379364, 19 pages.
[8] M. Toorani and A. Beheshti, "LPKI - A lightweight public key Infrastructure for the mobile environments," 11th IEEE Singapore International Conference on Communication Systems, Guangzhou, , pp. 162-166, 2008.
[9] Y. Zheng : “Digital signcryption or how to achieve Cost (Signature & Encryption) << Cost (Signature) + Cost (Encryption),” Advances in Cryptology–CRYPTO`97, LNCS 1294, Springer-Verlag, pp.165-179, 1997.
[10] K. Zeilenga,“Lightweight Directory Access Protocol (LDAP): Schema Definitions for X.509 Certificates”, RFC 4523, 2006.
[11] H. Krawczyk : “HMQV: A high-performance secure Diffie-Hellman protocol (Extended Abstract)” : Advances in Cryptology – CRYPTO`05, LNCS 3621, Springer-Verlag, pp.546-566, 2005.
Citation
Mubina Malik, Shreya Banker, "Comparative Study and evolution of Mobile Banking Security Solutions and Comparision between Various Solutions," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.227-232, 2019.
A Survey of Classification Methods and Techniques for Improving Classification Performance
Survey Paper | Journal Paper
Vol.7 , Issue.8 , pp.233-240, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.233240
Abstract
This paper surveys the state of the art techniques which have been reviewed to develop the overall classification meth- odology of this research work. The feature selection methods, traditional classification algorithms followed by a brief description of theoretical works on data mining are summarized. The major classification approaches and the techniques which is used for improving classification performance are analyzed. In addition, some important issues affecting classification performance are discussed. In this paper we have gone through the existing work in the area of classification which will allow us to have a fair evaluation of the progress made in the field of Classification.
Key-Words / Index Term
Machine Learning, Feature Selection methods, Classification
References
[1] Han, J. and Kamber, M., 2006. Classification and prediction. Data mining: Concepts and techniques, 347-350.
[2] Friedman, J., Hastie, T., and Tibshirani, R., 2001. The elements of statistical learning. Springer series in statistics.
[3] Liu, H., and Motoda, H., 2007. Computational methods of feature selection. CRC Press.
[4] Balasaraswathi, M., “Improved PSO based classifier for MultiClass Datasets”, (Doctoral dissertation, Avinashilingam University, 2017.
[5] Weston, J., Elisseeff, A., Schölkopf, B., and Tipping, M., 2003. Use of the zero-norm with linear models and kernel methods. Journal of machine learning research, 3, 1439-1461.
[6] Song, L., Smola, A., Gretton, A., Borgwardt, K.M., and Bedo, J., 2007. Supervised feature selection via dependence estimation. In Proceedings of the 24th international conference on Machine learning, 823-830.
[7] Dy, J.G., and Brodley, C.E., 2004. Feature selection for unsupervised learning. Journal of machine learning research,845-889.
[8] Zhao, Z. and Liu, H., 2007. Semi-supervised feature selection via spectral analysis. In Proceedings of the 2007 Society for Industrial and Applied Mathematics (SIAM) International Conference on Data Mining, 641-646.
[9] Xu, Z., King, I., Lyu, M.R.T., and Jin, R., 2010. Discriminative semi-supervised feature selection via manifold regularization. IEEE Transactions on Neural networks, 21(7), 1033-1047.
[10] John, G. H., Kohavi, R., and Pfleger, K., 1994. Irrelevant features and the subset selection problem. Proceedings of the Eleventh International Conference on Machine Learning, 121–129.
[11] Lal, T., Chapelle, O., Weston, J., and Elisseeff, A., 2006. Embedded methods. Feature extraction, 137-165.
[12] Duda, R.O., Hart, P.E., and Stork, D.G., 2012. Pattern classification.John Wiley & Sons.
[13] Gu, Q., Li, Z., and Han, J., 2012. Generalized fisher score for feature selection. arXiv preprint arXiv:1202.3725.
[14] Zhou, M., 2016. A Hybrid Feature Selection Method Based On Fisher Score and Genetic Algorithm. Journal of Mathematical Sciences: Advances and Applications, 37, 51-78.
[15] Chen, L., Man, H., and Nefian, A.V., 2005. Face recognition based on multi-class mapping of Fisher scores. Pattern Recognition, 38(6), 799-811.
[16] Liu, X., Ma, L., Song, L., Zhao, Y., Zhao, X., and Zhou, C., 2015. Recognizing common CT imaging signs of lung diseases through a new feature selection method based on Fisher criterion and genetic optimization. IEEE journal of biomedical and health informatics, 19(2), 635-647.
[17] He, X. F., Yan, S. C., Hu, Y. X., Niyogi, P., and Zhang, H. J., 2005. Face recognition using laplacian faces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(3), 328–340.
[18] Nie ,F., Xiang ,S., Jia ,Y., Zhang ,C., and Yan, S.,2008. TraceRatio Criterion for Feature Selection. In AAAI , 2, 671-676.
[19] Zhao, M., Zhang, Z., and Chow, T.W., 2011. ITR-Score algorithm: An efficient trace ratio criterion based algorithm for supervised dimensionality reduction. 2011 International Joint Conference on Neural Networks (IJCNN), 145-152.
[20] Arauzo-Azofra, A., Benitez, J.M., and Castro, J.L., 2004. A feature set measure based on relief. In Proceedings of the fifth international conference on Recent Advances in Soft Computing, 104-109.
[21] Zhao, M., Chan, R.H., Tang, P., Chow, T.W., and Wong, S.W., 2013. Trace ratio linear discriminant analysis for medical diagnosis: a case study of dementia. IEEE signal processing letters, 20(5), 431-434.
[22] Zhao, M., Zhang, Z., and Chow, T.W., 2012. Trace ratio criterion based generalized discriminative learning for semi- supervised dimensionality reduction. Pattern Recognition, 45(4), 1482-1499.
[23] Rosario, S.F., and Thangadurai, K., 2015. RELIEF: Feature Selection Approach. International Journal of Innovative Research and Development, 4(11), 218-221.
[24] Baskar, S.S., and Arockiam, L., 2013. E LAS-Relief-A Novel Feature Selection Algorithm In Data mining. Compusoft, 2(12), 392-395.
[25] Stokes, M.E., and Visweswaran, S., 2012. Application of a spatially-weighted Relief algorithm for ranking genetic predictors of disease. BioData mining, 5(1), pp.1-11.
[26] Soliman, O.S., and Rassem, A., 2012. Correlation based feature selection using quantum bio inspired estimation of distribution algorithm. In International Workshop on Multi- disciplinary Trends in Artificial Intelligence, 318-329.
[27] Way, T.W., Sahiner, B., Hadjiiski, L.M., and Chan, H.P., 2010. Effect of finite sample size on feature selection and classification: a simulation study. Medical physics, 37(2), 907- 920.
[28] Jacob, S.G., and Ramani, R.G., 2011. Discovery of knowledge patterns in clinical data through data mining algorithms: Multi- class categorization of breast tissue data. International Journal of Computer Applications (IJCA), 32(7), 46-53.
[29] Jacob, S.G., Geetha Ramani, R., and Nancy, P., 2013. Discovery of knowledge patterns in lymphographic clinical data through data mining methods and techniques. Advances in computing and information technology, 129-140.
[30] Jin, C., De-Lin, L., and Fen-Xiang, M., 2009. An improved ID3 decision tree algorithm. 4th International Conference on Computer Science & Education, 2009 (ICCSE’09), 127-130.
[31] Chen, X.J., Zhang, Z.G., and Tong, Y., 2014. An improved ID3 decision tree algorithm. In Advanced Materials Research , 962, 2842-2847.
[32] Luo, H., Chen, Y., and Zhang, W., 2010, An Improved ID3 Algorithm Based on Attribute Importance-Weighted. 2nd International Workshop on Database Technology and Applications (DBTA), 1-4.
[33] Yang, F., Jin, H., and Qi, H., 2012, Study on the application of data mining for customer groups based on the modified ID3 algorithm in the e-commerce. 2012 International Conference on Computer Science and Information Processing (CSIP), 615-619.
[34] Yuxun, L., and Niuniu, X., 2010, Improved ID3 algorithm. 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 465-468.
[35] Ali, M., Siarry, P., and Pant, M., 2012. An efficient differential evolution based algorithm for solving multi-objective optimization problems. European journal of operational research, 217(2), 404-416.t
[36] Youn, E., and Jeong, M.K., 2009. Class dependent feature scaling method using naive Bayes classifier for text datamining. Pattern Recognition Letters, 30(5), 477-485.
[37] Bermejo, P., Gámez, J.A., and Puerta, J.M., 2011. Improving the performance of Naive Bayes multinomial in e-mail foldering by introducing distribution-based balance of datasets. Expert Systems with Applications, 38(3), 2072-2080.
[38] Kibriya, A.M., Frank, E., Pfahringer, B., and Holmes, G., 2004, Multinomial Naive Bayes for Text Categorization Revisited. In Australian Conference on Artificial Intelligence, 3339, 488- 499.
[39] Deekshatulu, B.L., and Chandra, P., 2013. Classification of heart disease using k-nearest neighbor and genetic algorithm. Procedia Technology, 10, 85-94.
[40] Shouman, M., Turner, T., and Stocker, R., 2012. Applying k-nearest neighbour in diagnosing heart disease patients. International Journal of Information and Education Technology, 2(3), 220-223.
[41] Imandoust, S.B., and Bolandraftar, M., 2013. Application of k-Nearest Neighbor (KNN) approach for predicting economic events: Theoretical background. International Journal of Engineering Research and Applications, 3(5), 605-610.
[42] Wang, L., Khan, L., and Thuraisingham, B., 2008, An effective evidence theory based k-nearest neighbor (KNN) classification. In Proceedings of the 2008 IEEE/WIC/ ACM International Conference on Web Intelligence and Intelligent Agent Technology, 1, 797-801.
[43] Hu, L.Y., Huang, M.W., Ke, S.W., and Tsai, C.F., 2016. The distance function effect on k-nearest neighbor classification for medical datasets. SpringerPlus, 5(1304), 1-9.
[44] Qian, X., and Wang, X., 2009. A new study of DSS based on neural network and data mining. International Conference on E-Business and Information System Security, 2009 (EBISS›09),1-4.
[45] Kamrunnahar, M., and Urquidi-Macdonald, M., 2010. Prediction of corrosion behavior using neural network as a data mining tool. Corrosion Science, 52(3), 669-677.
[46] Hara, A., and Hayashi, Y., 2012. A new neural data analysis approach using ensemble neural network rule extraction. Artificial Neural Networks and Machine Learning–ICANN 2012, 515-522.
[47] Liu, Z., Li, H., and Miao, G., 2010. MapReduce-based backpropagation neural network over large scale mobile data. 2010 Sixth International Conference on Natural Computation (ICNC), 4, 1726-1730.
[48] Bhawna Sharma1, Sheetal Gandotra, Utkarsh Sharma, Rahul Thakur, Alankar Mahajan, A Comparative Analysis Of Different Machine Learning Classification Algorithms For Predicting Chronic Kidney Disease, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, Vol.-7, Issue-6, June 2019
Citation
M. Balasaraswathi, A. Uthiramoorthy, "A Survey of Classification Methods and Techniques for Improving Classification Performance," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.233-240, 2019.
Improvisation of SDLC Model Using Machine Learning Technique (CBR) For Development of Software
Survey Paper | Journal Paper
Vol.7 , Issue.8 , pp.241-246, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.241246
Abstract
This paper explores software development through early prediction of planning phase . It summarizes a variety of techniques for software planning prediction in the domain of software engineering. The objective of this research is to apply the various machine learning approaches, such as Case-Based Reasoning and Fuzzy logic, to predict software planning. The system predicts the planning phase activity after accepting the values of certain parameters of the software. This paper advocates the use of case-based reasoning (i.e., CBR) to build a software development prediction system with the help of human experts. The prediction is based on analogy. We have used different similarity measures to find the best method that increases reliability. It can be readily deployed on any configuration without affecting its performance.
Key-Words / Index Term
Software Engineeering,SDLC Model,Machine Learning, CBR
References
[1] G. Kadoda, M Cartwright, L Chen, and M. Shepperd. (2000), “Experiences Using Case- Based Reasoning to Predict Software Project Effort”, In Proceeding of EASE, p. 23-28, Keele, UK.
[2] I. Myrtveit and E. Stensrud. (1999), “A Controlled Experiment to Assess the Benefits of Estimating with Analogy and Regression Models”, IEEE transactions on software Engineering, Vol 25, no. 4, pp. 510-525.
[3] K. Ganeasn, T.M. Khoshgoftaar, and E. Allen. (2000), “Case-based Software Quality Prediction”, International journal of Software Engineering and Knowledge Engineering, 10 (2), pp. 139-152 .
[4] Shi Zhong,Taghi M.Khoshgoftaar and Naeem Selvia “Unsupervised Learning for Expert-Based Software Quality Estimation”.Proceeding of the Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE’04).
[5] Ekbal Rashid, Srikanta Patnaik, Vandana Bhattacherjee “A Survey in the Area of Machine Learning and Its Application for Software Quality Prediction” has been published in ACM SigSoft ISSN 0163-5948, volume37,number5,September2012,http://doi.acm.org/10.1145/2347696.2347709 New York, NY, USA.
[6] M. J. Khan, S. Shamail, M. M Awais, and T. Hussain, “ Comparative study of various artificial intelligence techniques to predict software quality” in proceedings of the 10th IEEE multitopic conference, 2006, INMIC 06, PP 173-177, Dec 2006.
[7] S. Becker, L. Grunske, R. Mirandola, and S. Overhage, “ Performance prediction of component-based systems a survey from an engineering perspective”, In architechture systems with Trust-worthy components, Vol 3938 of LNCS, Springer, 2006.
[8] Ekbal Rashid, Srikanta Patnaik, Vandana Bhattacherjee “Enhancing the accuracy of case-based estimation model through Early Prediction of Error Patterns” proceedings published by the IEEE Computer Society 10662 Los Vaqueros Circle Los Alamitos, CA, in International Symposium on Computational and Business Intelligence (ISCBI 2013), New Delhi, 24~26 Aug 2013 ISBN 978-07695-5066-4/13 IEEE, DOI 10.1109/ISCBI.2013.
[9] Aamodt, A. and E. Plaza, Case-based reasoning: foundational issues, methodical variations and system approaches. AI Communications 7(1), 1994.
[10] Venkata U.B.Challagulla et al ”A Unified Framework for Defect data analysis using the MBR technique”. Proceeding of the 18th IEEE International Conference on Tools with Artificial Intelligence(ICTAI’06).
[11] Tom M. Mitchell, “Machine LearningSection 4.1.1; page 82, McGraw Hill Companies, Inc. (1997).
[12] David E. Goldberg “Genetic Algorithms in search, Optimization and Machine learning” Pearson Education, Inc.
[13] Luger, George F. Artificial Intelligence, Structures and Strategies for Complex Problem Solving, Fourth Edition, atpage 471 2002. Harlow, England: Addison-Wesley.
[14] Ekbal. Rashid "R4 Model for Case-Based Reasoning and Its Application for Software Fault Prediction," International Journal of Software Science and Computational Intelligence (IJSSCI) 8 (2016): 3, doi:10.4018/IJSSCI.2016070102.
[15] Ekbal Rashid “Improvisation of Case-Based Reasoning and Its Application for Software Fault Prediction” has been published in International Journal of Services Technology and Management (IJSTM).ISSN online: 1741-525X ISSN print: 1460-6720, Vol.21, No.4/5/6, pp.214,227,DOI:http://dx.doi.org/10.1504/IJSTM.2015.073921, Inderscience Publisher.
[16] Catal C. Software mining and fault prediction. WIREs Data Mining Knowl Discov 2012; 2: 420-426.
Citation
Madhup Kumar, Anuradha Sharma, "Improvisation of SDLC Model Using Machine Learning Technique (CBR) For Development of Software," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.241-246, 2019.
Supervised Learning Techniques for Identifying Credit Fraud
Survey Paper | Journal Paper
Vol.7 , Issue.8 , pp.247-250, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.247250
Abstract
Credit fraud is a broad term associated with theft or fraudulent transactions that involve the usage of a credit card. The fraud detection systems today are only capable of preventing one-twelfth of one percent of all transactions processed, which still results in huge losses. To the human eye, fraudulent transactions are indistinguishable from real ones. However, there are underlying patterns common to these transactions that can be recognized by machine learning algorithms. In this paper, we have trained supervised learning models on a dataset containing more than 280,000 transactions. We go on to evaluate the performance of each of these models on the dataset in terms of accuracy and precision and compare them with each other. With this, we show that the Random Forest model shows promising results for identifying credit fraud when trained on a labelled dataset.
Key-Words / Index Term
Machine Learning, Supervised Learning, Fraud Detection, Random Forest, Regression, Classifier
References
[1] F. Misarwala, K. Mukadam, K. Bhowmick, "Applications of Data Mining in Fraud Detection", International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.45-53, 2015.
[2] D. Sathiya, S. V. Evangelin Sonia, “A Comparative Study of Supervised Machine Learning Algorithm”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.875-878, 2018.
[3] Shen, A., Tong, R. and Deng, Y., 2007, June. Application of classification models on credit card fraud detection. In 2007 International conference on service systems and service management (pp. 1-4). IEEE.
[4] West, J. and Bhattacharya, M., 2016. Intelligent financial fraud detection: a comprehensive review. Computers & security, 57, pp.47-66.
[5] Chaudhary, K., Yadav, J. and Mallick, B., 2012. A review of fraud detection techniques: Credit card. International Journal of Computer Applications, 45(1), pp.39-44.
[6] Şahin, Y.G. and Duman, E., 2011. Detecting credit card fraud by decision trees and support vector machines.
[7] Sahin, Y., Bulkan, S. and Duman, E., 2013. A cost-sensitive decision tree approach for fraud detection. Expert Systems with Applications, 40(15), pp.5916-5923.
[8] Gadi, M.F.A., Wang, X. and do Lago, A.P., 2008, August. Credit card fraud detection with artificial immune system. In International Conference on Artificial Immune Systems (pp. 119-131). Springer, Berlin, Heidelberg.
[9] Raj, S.B.E. and Portia, A.A., 2011, March. Analysis on credit card fraud detection methods. In 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET) (pp. 152-156). IEEE.
[10] Zareapoor, M. and Shamsolmoali, P., 2015. Application of credit card fraud detection: Based on bagging ensemble classifier. Procedia computer science, 48(2015), pp.679-685.
[11] Niimi, A., 2015, October. Deep learning for credit card data analysis. In 2015 World Congress on Internet Security (WorldCIS) (pp. 73-77). IEEE.
[12] Akila, S. and Reddy, U.S., 2017, November. Risk based bagged ensemble (RBE) for credit card fraud detection. In 2017 International Conference on Inventive Computing and Informatics (ICICI) (pp. 670-674). IEEE.
[13] Adewumi, A.O. and Akinyelu, A.A., 2017. A survey of machine-learning and nature-inspired based credit card fraud detection techniques. International Journal of System Assurance Engineering and Management, 8(2), pp.937-953.
[14] Tabassum, N. and Ahmed, T., 2016, March. A theoretical study on classifier ensemble methods and its applications. In 2016 3rd Internati onal Conference on Computing for Sustainable Global Development (INDIACom) (pp. 374-378). IEEE.
Citation
Advait Maduskar, Aniket Ladukar, Shubhankar Gore, "Supervised Learning Techniques for Identifying Credit Fraud," International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.247-250, 2019.