Security Preservation in Blockchain IoT
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.168-173, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.168173
Abstract
With rapid development of Internet of Things (IoT) , it is evident that users get convenience in different fields such as smart homes,transportation,supply chain, smart contracts etc.Blockchain Mechanisms play a vital role in securing many IoT oriented applications.Blockchain and IoT are both intended to be world changing technologies. Merging these technologies could result in something more than the sum of its parts.IoT security using Blockchain is aimed at providing better security mechanisms so that authentication, confidentiality and integrity constraints are preserved. Based on component interaction in IoTenvironment , the security measures that are depicted in the existing work ensures that no alien commodity is allowed to tamper the data and other devices in IoT environment. However IoT devices are surprisingly insecure.Hence security issue is one of the most challenging task for utilizing Blockchain
Key-Words / Index Term
IoT, Blockchain, firewalls, DDOS, Availability, Decentralized, Crypto currency, Privacy preservation etc
References
[1]S. Ølnes and A. Jansen, ``Blockchain technology as infrastructurein public sector: An analytical framework,`` in Proc. 19thAnnu. Int. Conf. Digit. Government Res., Governance Data Age,New York, NY, USA, 2018, pp. 77:1_77:10. [Online]. Available: http://doi.acm.org/10.1145/3209281.3209293
[2]R. Beck and C. Muller-Bloch, ``Blockchain as radical innovation: Aframework for engaging with distributed ledgers,`` in Proc. 50th HawaiiInt. Conf. Syst. Sci., 2017, pp. 5390_5399.
[3]NallapaneniManoj Kumar, Pradeep Kumar Mallick,“The Internet of Things: Insights into the building blocks, component interactions, and architecture layers”, 2018,www.keaipublishing.com/en/journals/digital- communications-and-networks.
[4]Mandrita Banerjee, Junghee Lee, Kim-Kwang Raymond Choo,2018, ScienceDirect.
[5] Daniel Minoli, Benedict Occhiogrosso DVI Communications,2018, Elsevier
[6]YongfengQian,YingyingJiang,JingChenetal.,MatevžPustišekSchoolofComputerScience,ChinaUniversityofGeosciences,Wuhan,China,SchoolofComputerScienceandTechnology,HuazhongUniversity ofScienceandTechnology,Wuhan430074.
[7]ABassi,MBauer,MFiedler,TKramp,RvanKranenburg,SLange,SMeissner(Eds.),EnablingtheInternetofThings,Springer,2013.
[8] A.K. Pathan (Ed.), “Securing Cyber Physical Systems”, CRC,2015.
[9]A.M. Rahmani, P. Liljeberg, J.-S. Preden, A. Jantsch, “Fog Computing in the Internet Of Things” , Springer,2017.
[10]Q.Hassan,A.R.Khan,S.A.Madani(Eds.),”InternetofThings:Challenges,AdvancesandApplications”,CRCPress, 2017 ISBN9781498778510.
[11]A. Pal, B. Purushothaman, “IoT Technical Challenges and Solutions,” ArtechHouse ISBN: 978-1-63081-111-2,Norwood,Mass,2016.
[12]A.Rayes,S.Salam,“Internet of Things From Hype to Reality”,Springer,2016.
Citation
Ajay, Ravi Kumar, Anuradha, "Security Preservation in Blockchain IoT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.168-173, 2019.
Intel’s core i7 10th generation (1065G7) Review
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.174-176, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.174176
Abstract
In this research paper, we will look at the Intel’s latest processor (1065G7). We will also deeply study the improvements and enhancement that have been introduced in his processors. For this I have gone through several papers and articles. We have found that this processor is rather fast and power-efficient and It is a very reliable processor and it is one of the best processors at this price range
Key-Words / Index Term
Intel core i7 10th gen (1065G7)
References
[1]. https://ark.intel.com/content/www/us/en/ark/products/196597/intel-core-i7-1065g7-processor-8m-cache-up-to-3-90-ghz.html
[2]. https://www.notebookcheck.net/Our-first-Ice-Lake-Core-i7-1065G7-benchmarks
[3]. https://www.windowscentral.com
[4]. https://www.pcworld.com/article/3432718/10th-gen-ice-lake-vs-comet-lake-cpu-buyers-guide.html
[5]. https://en.wikichip.org/wiki/intel/core_i7/i7-1065g7
[6]. https://www.digitaltrends.com/computing/intel-comet-lake-vs-ice-lake/
[7]. https://newsroom.intel.com/news/intel-launches-first-10th-gen-intel-core-processors-redefining-next-era-laptop-experiences/
Citation
Fahad Khan, Mohd Faiz Ansari, Mansoori Mohd Nadeem, Shakila Shaikh, Shiburaj Pappu, "Intel’s core i7 10th generation (1065G7) Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.174-176, 2019.
Evaluation of performance of Microprocessors of CPU-GPU CUDA architecture and EDA challenges facing Future Microprocessor Design
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.177-181, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.177181
Abstract
To increase the processor speed and its respective performance a more streamlined method of approach was required. Electronic Design Automation (EDA) is implemented. This article describes the changes brought about by EDA in the development of microprocessor systems and the challenges faced by EDA currently and in the future. This article will also describe the various tests and experiments conducted on the CUDA architecture based microprocessor and also highlight the overall performance and thermals of the system under such extreme test conditions
Key-Words / Index Term
GPU, Cuda cores, Thermal
References
[1] Cuda Architecture Link:http://developer.download.nvidia.com/compute/cuda/docs/CUDA_Architecture_Overview.pdf
[2] Electronic Design Automation
Link:https://www.sciencedirect.com/topics/engineering/electronic-design-automation
[3] The End of Moore’s Law?
Link:https://www.technologyreview.com/s/400710/the-end-of-moores-law/
[4]Transient Thermal Analysis of a Microprocessor using a heat spreader with variable thermal storage characteristics
Link:https://www.researchgate.net/publication/229050507_Transient_thermal_analysis_of_a_microprocessor_using_a_heat_spreader_with_variable_thermal_storage_characteristics
[5]Temperature sensitive microprocessor design
Link:https://pdfs.semanticscholar.org/afea/435fc7fb23ba7b31dc4c4bc75840b0470e20.pdf
[6] Tiwari, R. Sam and S. Shaikh, "Analysis and prediction of churn customers for telecommunication industry," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 218-222. doi: 10.1109/I-SMAC.2017.8058343
[7] S Navadia, P. Yadav, J. Thomas and S. Shaikh, "Weather prediction: A novel approach for measuring and analyzing weather data," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC),
Palladam, 2017, pp. 414-417. doi: 10.1109/I-SMAC.2017.8058382
[8] S. Shaikh, S. Rathi and P. Janrao, "IRuSL: Image Recommendation Using Semantic Link," 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, 2016, pp. 305-308. doi: .1109/CICN.2016.6
[9] S. Shaikh, S. Rathi and P. Janrao, "Recommendation System in E-Commerce Websites: A Graph Based Approached," 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, 2017, pp. 931-934. doi: 10.1109/IACC.2017.0189
[10] A. Fasiku, Ayodeji Ireti, B. Olawale, Jimoh Babatunde, C. Abiola Oluwatoyin B., "Comparison of Intel Single-Core and Intel Dual-Core Processor Performance", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.1-9, 2013
[11] M. Sora, J. Talukdhar, S. Majumder, P.H Talukdhar, U.Sharmah, "Word level detection of Galo and Adi language using acoustical cues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.10-13, 2013
[12] Manish Mishra, Piyush Shukla, Rajeev Pandey, "Assessment on different tools used for Simulation of routing for Low power and lossy Networks(RPL)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.4, pp.26-32, 2019
Citation
Shaikh Numan, Sayed Sajjad Haider, Shaikh Rwitobaan, Shaikh Shakila, Shiburaj Pappu, "Evaluation of performance of Microprocessors of CPU-GPU CUDA architecture and EDA challenges facing Future Microprocessor Design," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.177-181, 2019.
Ryzen 5 (3600, 1600, 1600X) Review
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.182-184, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.182184
Abstract
In July 7 2019, AMD launched Ryzen 5 3600 processor. This processor was launched to provide better all-round performances like gaming, multitasking, exceptional speed etc. and intention of hitting market by lower price as compare to other processor companies. For example, its competitive processor intel-5 9600k is expensive as compare to ryzen 5 3600
Key-Words / Index Term
Ryzen 5 (3600, 1600 & 1600X)
References
[1]. https://www.techpowerup.com/257763/amd-ryzen-5-3500-a-6-core-processor
[2]. https://www.amd.com
[3]. https://www.hardwarebbq.com/amd-ryzen-3000-cpus-do-not-reach-its-advertised-boost-clocks-der8auer/
[4]. https://en.wikichip.org
[5]. https://seekingalpha.com/article/4137737-impact-analysis-amd-drops-ryzen-cpu-prices-30-percent
[6]. https://cpu.userbenchmark.com
[7]. https://www.forbes.com
[8]. Tiwari, R. Sam and S. Shaikh, "Analysis and prediction of churn customers for telecommunication industry," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 218-222. doi: 10.1109/I-SMAC.2017.8058343
[9]. S. Navadia, P. Yadav, J. Thomas and S. Shaikh, "Weather prediction: A novel approach for measuring and analyzing weather data," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 414-417. doi: 10.1109/I-SMAC.2017.8058382
[10]. S. Shaikh, S. Rathi and P. Janrao, "IRuSL: Image Recommendation Using Semantic Link," 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, 2016, pp. 305-308. doi: 10.1109/CICN.2016.66
[11]. S. Shaikh, S. Rathi and P. Janrao, "Recommendation System in E-Commerce Websites: A Graph Based Approached," 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, 2017, pp. 931-934. doi: 10.1109/IACC.2017.0189
[12]. A. Fasiku, Ayodeji Ireti, B. Olawale, Jimoh Babatunde, C. Abiola Oluwatoyin B., "Comparison of Intel Single-Core and Intel Dual-Core Processor Performance", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.1-9, 2013
[13]. M. Sora, J. Talukdhar, S. Majumder, P.H Talukdhar, U.Sharmah, "Word level detection of Galo and Adi language using acoustical cues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.10-13, 2013
[14]. Manish Mishra, Piyush Shukla, Rajeev Pandey, "Assessment on different tools used for Simulation of routing for Low power and lossy Networks(RPL)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.4, pp.26-32, 2019
Citation
Faizan Shaikh, Salman Khan, Shaibaz Ansari, Shakila Shaikh, Shiburaj Pappu, "Ryzen 5 (3600, 1600, 1600X) Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.182-184, 2019.
Privacy Preservation in Blockchain IoT
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.185-190, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.185190
Abstract
Blockchain, as a decentralized and appropriated open record innovation in shared system, has received impressive consideration as of late. It uses a connected block structure to confirm and store information, and a linked block structure to verify and store data, and applies the trusted mechanism to synchronize changes in data, which makes it possible to create a tamper-proof digital platform for storing and sharing data. In this paper, the privacy issues caused due to incorporation of blockchain in IoT applications by centering over the utilizations of our everyday use has been discussed. Besides, examining of usage of five security protection methodologies in blockchain-based IoT frameworks namely anonymization, encryption, private contract, mixing, and differential protection has been done. Different architectures for blockchain based IoT applications arediscussed that helps in ensuring privacy while performing a number of operations andtransactions
Key-Words / Index Term
IoT, Blockchain, Anonymization, Smart Contract, Trusted data access, Mixing, Bitcoin, Decentralized, Crypto currency, Privacy preservation etc
References
[1] S. Nakamoto, “Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions”,Elsevier,2014.
[2] A.M. Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies”,O’Reilly Media,2014.
[3]N. Szabo, “Smart contracts: Formalizing and securing relationships on public networks,” First Monday, vol. 2, no. 9, Sep. 1997.
[4] Carlos Molina-Jimenez,“Implementation of Smart Contracts Using Hybrid Architect- ures in blockchain IoT”, arxiv,2018.
[5] Salil S. Kanhere, “Blockchain for IoT Privacy: The Case Study of a Smart Home” , CSIRO,2017.
[6] S. Sicari, A. Rizzardi, “ L. A. Grieco,and
A. Coen- Porisini, “Security, privacy and trust in internet of things: The road ahead”,
Computer Networks, vol. 76,pp. 146– 2015.
[7] Muneeb et al., “Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions”, IEEE, 2019.
[8] Zhiqing Huang et al., “A Decentralized Solution for IoT Data Trusted Exchange Based-on Blockchain”,IEEE, 2017.
[9] Arman Pouraghily et al., “Privacy in Blockchain-Enabled Iot Devices”, IEEE,2018.
[10] Nir Kshetri, “Blockchain’s roles in strengthening cybersecurity and protecting privacy”, IEEE,2017.
[11]A.Rayes,S.Salam, “Internet of Things”, FromHypeto Reality, Springer, 2016.
[12] F. Tschorsch, B. Scheuermann, “Bitcoin and beyond: A technical survey on decentralized digital currencies”,IEEE,2016.
[13] A. Al-Fuqaha, M. Guizani, M. Mohammadi,“Internet of things: A survey on enabling technologies, protocols, and applications”, IEEE,2015.
[14] A. Ericsson, “Mobility report: On the pulse of the networked society”, Tech. Rep. EAB-14, 61078,2015.
[15] L. Zhou, L. Wang, Y. Sun, P. Lv, BeeKeeper,“A blockchain-based IoT system with secure storage and homomorphiccomputation”,
IEEE Access, 2018.
[16] A. Pal,B. Purushothaman, “IoT Technical Challenges and Solutions”, Artech HouseI SBN: 978-1-63081-111-2, Norwood, Mass, 2016.
Citation
Sapna Bhardwaj, Sagun Sharma, Anuradha, "Privacy Preservation in Blockchain IoT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.185-190, 2019.
An Effective Clustering Approach for Text Summarization
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.191-197, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.191197
Abstract
Text summarization automatically creates a shorter version of one or more text documents. It is an effective way of finding relevant information from large set of documents. Text summarization techniques are categorized as Extractive summarization and Abstractive summarization. Extractive summarization methods evaluate text summarization by selecting sentences present in documents according to predefined set of rules. Abstractive summaries attempt to improve the coherence among sentences by eliminating redundancies and clarifying the content of sentences. It should also extract the information is such a way that the content would be in the interest of the user. In this paper we used tokenization for preprocessing of statements then calculate TF/IDF for feature extraction, K-means clustering to generate clusters containing high frequency statements and then NEWSUM algorithm for weighing of statements that are used for relevant content summarization. We also present experimental results on a number of real data sets in order to illustrate the advantages of using proposed approach
Key-Words / Index Term
Text Mining, Text Summarization, Clustering, extractive summary, information extraction
References
[1] HtetMyet Lynn 1 , Chang Choi 2 , Pankoo Kim “An improved method of automatic text summarization for web contents using lexical chain with semantic-related terms”, Springer-Verlag Berlin Heidelberg 2017
[2] Xiaojun Wan 1 , FuliLuo 2 , Xue Sun Songfang Huang3 , Jin-ge Yao “Cross-language document summarization via extraction and ranking of multiple summaries” Springer- Verlag London 2018
[3] Andrew Mackey and Israel Cuevas “AUTOMATIC TEXT SUMMARIZATION WITHIN BIG DATA FRAMEWORKS”, ACM 2018
[4] Yong Zhang, Jinzhi Liao, Jiyuyang Tang “Extractive Document Summarization based on hierarchical GRU”, International Conference on Robots & Intelligent System IEEE 2018
[5] Lili Wan “Extractive Algorithm of English Text Summarization for English Teaching” IEEE 2018
[6] Anurag Shandilya, Kripabandhu Ghosh, Saptarshi Ghosh “Fairness of Extractive Text Summarization”, ACM 2018
[7] P.Krishnaveni, Dr. S. R. Balasundaram “Automatic Text Summarization by Local Scoring and Ranking for Improving Coherence”, Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
[8] Bagalkotkar, A., Kandelwal, A., Pandey, S., &Kamath, S. S. (2013, August). “A Novel Technique for Efficient Text Document Summarization as a Service”, In Advances in Computing and Communications (ICACC), 2013 Third International Conference on (pp. 50-53). IEEE.
[9] Ferreira, Rafael, Luciano de Souza Cabral, Rafael DueireLins, Gabriel Pereira e Silva, Fred Freitas, George DC Cavalcanti, Rinaldo Lima, Steven J. Simske, and Luciano Favaro. "Assessing sentence scoring techniques for extractive text summarization." Expert systems with applications 40, no. 14 (2013): 5755-5764.
[10] Gupta, V. K., &Siddiqui, T. J. (2012, December). “Multi-document summarization using sentence clustering”, In Intelligent Human Computer Interaction (IHCI), 2012 4th International Conference on (pp. 1-5). IEEE.
[11] Min-Yuh Day Department of Information Management Tamkang University New Taipei City, Taiwan myday@mail.tku.edu.tw Chao-Yu Chen Department of Information Management Tamkang University New Taipei City, Taiwan susan.cy.chen@gmail.tw “Artificial Intelligence for Automatic Text Summarization”,2018 IEEE International Conference on Information Reuse and Integration for Data Science
[12] Xiaoping SunandHaiZhuge*, Senior Member, IEEE Laboratory of Cyber-Physical-Social Intelligence, Guangzhou University, China Key Laboratory of Intelligent Information Processing, Institute of Computing Technology, University of Chinese Academy of Sciences, Chinese Academy of Sciences, China System Analytics Research Institute, Aston University, UK “Summarization of Scientific Paper through Reinforcement Ranking on Semantic Link Network” ,IEEE 2018
[13] Ahmad T. Al-Taani (PhD, MSc, BSc) Professor of Computer Science (Artificial Intelligence) Faculty of Information Technology and Computer Sciences Yarmouk University, Jordan. ahmadta@yu.edu.jo “Automatic Text Summarization Approaches” ,IEEE 2017
[14] AlokRanjan Pal Dept. of Computer Science and Engineering College of Engineering and Management, KolaghatKolaghat, India chhaandasik@gmail.com DigantaSaha Dept. of Computer Science and Engineering Jadavpur University Kolkata, India neruda0101@yahoo.com “An Approach to Automatic Text Summarization using WordNet”, IEEE 2014
[15] Prakhar Sethi1, Sameer Sonawane2, Saumitra Khanwalker3, R. B. Keskar4 Department of Computer Science Engineering, Visvesvaraya National Institute of Technology, India 1 prakhar.sethi2@gmail.com, 2 sameer9311@gmail.com, 3 theapogee2011@gmail.com, 4 rbkeskar@cse.vnit.ac.in“Automatic Text Summarization of News Articles”, IEEE 2017
[16] Yue Hu and Xiaojun Wan “PPSGen: Learning-Based Presentation Slides Generation for Academic Papers” , IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 4, APRIL 2015
[17] Daan Van Britsom, AntoonBronselaer, and Guy De Tre “Using Data Merging Techniques for Generating Multidocument Summarizations” , IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 23, NO. 3, JUNE 2015
[18] NingZhong, Yuefeng Li, and Sheng-Tang Wu “Effective Pattern Discovery for Text Mining”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 1, JANUARY 2012
[19] Mohsen Pourvali and Mohammad SanieeAbadeh Department of Electrical & Computer Qazvin Branch Islamic Azad University Qazvin, Iran Department of Electrical and Computer Engineering at TarbiatModares University Tehran, Iran “Automated Text Summarization Base on Lexicales Chain and graph Using of WordNet and Wikipedia Knowledge Base” , IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012
[20] Daan Van Britsom, AntoonBronselaer, Guy De Tre´ Department of Telecommunications and Information Processing, Ghent University Sint-Pietersnieuwstraat 41, B-9000 Ghent, Belgium “Using data merging techniques for generating multi-document summarizations” ,IEEE TRANSACTIONS ON FUZZY SYSTEMS 2018
[21] Yang Gao,YueXu, Yuefengli, “Pattern-based Topics for Document Modeling in Information Filtering” in IEEE Transaction on Knoweledge and Data Engineering, vol.27,No.6,June 2015.
[22] Y. Bastide, R. Taouil, N. Pasquier, G. Stumme, and L. Lakhal, “Mining frequent patterns with counting inference,” ACM SIGKDD Explorations Newslett., vol. 2, no. 2, pp. 66–75, 2000.
[23] H. Cheng, X. Yan, J. Han, and C.-W. Hsu, “Discriminative frequent pattern analysis for effective classification,” in Proc. IEEE 23rd Int. Conf. Data Eng., 2007, pp. 716–725.
[24] R. J. BayardoJr, “Efficiently mining long patterns from databases,” in Proc. ACM Sigmod Record, 1998, vol. 27, no. 2, pp. 85–93.
[25] J. Han, H. Cheng, D. Xin, and X. Yan, “Frequent pattern mining: Current status and future directions,” Data Min. Knowledge. Discovery., vol. 15, no. 1, pp. 55–86, 2007.
[26] http://kavita-ganesan.com/opiniosis-opinion-dataset/
Citation
Rajani S. Sajjan, Meera G. Shinde, "An Effective Clustering Approach for Text Summarization," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.191-197, 2019.
The First Six-Core Intel Xeon Microprocessor
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.198-200, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.198200
Abstract
This paper describes the next-generation Intels Xeons microprocessor designed for a broad range of highly power-efficient servers, codename Dunnington. The Dunnington processor has six cores (three core-pairs) integrated with large, dense, on-chip caches, and it delivers the dramatic power efficiency of Intel’s 45nm high-K metal gate process and the Intel Core 2 microarchitecture to server platforms. This processor implements a high bandwidth-dedicated interface from each of the three core pairs to the last-level cache (LLC) for the effective use of the inclusive LLC. With high functional integration, large cache size, and 1.9 billion transistors, the processor’s moderate server-class die size of 503mm2 is achieved by optimizing the floor plan and physical design. Thermal Design Power (TDP) limits of 50, 65, 90, and 130W. This processor will be the first part to employ core recovery techniques for reducing product cost
Key-Words / Index Term
Xeon, six cores, Dunnington, 45nm
References
[1] Mistry K. et al. A 45nm Logic Technology with High-k+ Metal Gate Transistors, Strained Silicon, 9 Cu Interconnect Layers, 193nm Dry Patterning, and 100% Pb-free Packaging. International Electron Devices Meeting, December 2007, pp. 247–250.
https://www.intel.com/content/dam/www/public/us/en/documents/research/2008-vol12-iss-3-intel-technology-journal.pdf
[2] Varghese George et al. Penryn: 45nm Next Generation Intel Core 2 Processor. IEEE Association, November 2007.
https://www.intel.com/content/dam/www/public/us/en/documents/research/2008-vol12-iss-3-intel-technology-journal.pdf
[3] Kelin Kuhn et al. Managing Process Variation in Intel’s 45nm CMOS Technology. Intel Technology Journal, Vol. 12, No. 2, 2008.
https://www.intel.com/content/dam/www/public/us/en/documents/research/2008-vol12-iss-3-intel-technology-journal.pdf
[4] Tiwari, R. Sam and S. Shaikh, "Analysis and prediction of churn customers for telecommunication industry," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 218-222. DOI: 10.1109/I-SMAC.2017.8058343
[5] S. Navadia, P. Yadav, J. Thomas and S. Shaikh, "Weather prediction: A novel approach for measuring and analyzing weather data," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 414-417.DOI: 10.1109/I-SMAC.2017.8058382
[6]S. Shaikh, S. Rathi and P. Janrao, "IRuSL: Image Recommendation Using Semantic Link," 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, 2016, pp. 305-308.DOI: 10.1109/CICN.2016.66
[7] S. Shaikh, S. Rathi and P. Janrao, "Recommendation System in E-Commerce Websites: A Graph Based Approached," 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, 2017, pp. 931-934. DOI: 10.1109/IACC.2017.0189
[8] A. Fasiku, Ayodeji Ireti, B. Olawale, Jimoh Babatunde, C. Abiola Oluwatoyin B., "Comparison of Intel Single-Core and Intel Dual-Core Processor Performance", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.1-9, 2013
[9] M. Sora, J. Talukdhar, S. Majumder, P.H Talukdhar, U.Sharmah, "Word level detection of Galo and Adi language using acoustical cues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.10-13, 2013
[10] Manish Mishra, Piyush Shukla, Rajeev Pandey, "Assessment on different tools used for Simulation of routing for Low power and lossy Networks(RPL)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.4, pp.26-32, 2019
Citation
Uzair Khan, Aziz Ansari, Meet Yadav, Shiburaj Pappu, Shakila Shaikh, "The First Six-Core Intel Xeon Microprocessor," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.198-200, 2019.
Complex Pattern Detection with Entropy
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.201-205, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.201205
Abstract
Pattern recognition techniques are important component of intelligent systems. It used for both data pre-processing and decision making. Broadly speaking, pattern recognition is the science that concerns the description or classification of measurements. And its algorithms generally aim to provide a reasonable answer for all possible inputs and to perform "most likely" matching of the inputs, taking consideration of their statistical variation in every approach that we are taking in account. This is just opposite to pattern matching algorithms, which compare the input with pre-existing patterns for exact matches.A very common example of a pattern-matching algorithm is regular expression matching, which looks for patterns of a given sort in given text data and is included in the search capabilities
Key-Words / Index Term
Pattern Recognition,Artificial Intellegence,Fuzzy Logic,Neural Network
References
[1]. Majida Ali Abed , Ahmad Nasser Ismail andZubadiMatizHazi, “Pattern recognition UsingGenetic Algorithm”,International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 2010. Ahmad, T.,Jameel, [2]. A.Ahmad, “Pattern recognition using statistical and neural techniques”, International Conference onComputer Networks and Information Technology (ICCNIT), 2011.
[3] Mohammad S. Alam,Mohammad A. Karim,“Advances in Pattern Recognition Algorithms,Architectures and Devices,” Optical Engineering,Vol. 43 No. 8, August 2004.
[4] Sebastien ´ Gadat,Laurent Younes, “AStochastic Algorithm for Feature Selection in Pattern Recognition”, Journal of Machine Learning Research 8 (2007) 509-547.
Citation
Ritu Sindhu, Neha Gehlot, "Complex Pattern Detection with Entropy," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.201-205, 2019.
A Review on Flower Image Recognition
Review Paper | Journal Paper
Vol.7 , Issue.10 , pp.206-216, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.206216
Abstract
There is a large number of flowers available in the world, and it is hard to remember all names and types of flowers, but for identification and recognition of flower species in environments such as forests, mountains, and dense regions is necessary to know about their existence. So the system which is developed for identification of flower type is useful. This identification and recognition of a particular flower among millions of flower types is a very heavy task. So Automated flower species recognition has been studied for many years. Differences between these studies come from features that were extracted from the flower image and the recognition algorithm that was used to recognize the flower species. For selecting the feature from flower images, the three most important attributes to be considered are color, texture, and shape. For these individual class of feature variety of feature extraction methods are present, and for recognition, the different classification model is present such as ANN, kNN, SVM, CNN, etc. This paper discusses, and well us reviews the algorithms and the technologies which are available for segmentation, feature extraction, classifying, detecting and counting of flowers from the flower images from different standardized dataset like Oxford 17, Oxford 102, etc and analyzing several research papers.
Key-Words / Index Term
Segmentation,feature extraction,classification ,SVM, shape, texture, color
References
[1] Aalaa Albadarneh and Ashraf Ahmad,” Automated Flower Species Detection and Recognition from Digital Images”, IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.4, April 2017.
[2] Huthaifa Almogdady, Dr. Saher Manaseer and Dr.Hazem Hiary,” A Flower Recognition System Based On Image Processing And Neural Networks ”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 7, ISSUE 11, NOVEMBER 2018.
[3] Chaku Gamit, Prof. Prashant B. Swadas and Prof. Nilesh B. Prajapati,” Literature Review on Flower Classification”, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181,Vol. 4 Issue 02, February-2015.
[4] Tanakorn Tiay, Pipimphorn Benyaphaichit, and Panomkhawn Riyamongkol,” Flower Recognition System Based on Image Processing”, 2014 Third ICT International Student Project Conference (ICT-ISPC2014), 978-1-4799-5573-2/14/$31.00 ©2014 IEEE.
[5] I.Gogul, V.Sathiesh Kumar,” Flower Species Recognition System using Convolution Neural Networks and Transfer Learning”, 2017 4th International Conference on Signal Processing, Communications and Networking (ICSCN -2017), March 16 – 18, 2017, Chennai, INDIA, 978-1-5090-4740-6/17/$31.00 ©2017 IEEE.
[6] Balvant V. Biradar, Santosh P. Shrikhande,” Flower Detection and Counting Using Morphological and Segmentation Technique”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3) , 2498-2501,2015.
[7] Y H Sharath Kumara, D S Gurub,” Retrieval of Flower Based on Sketches”, International Conference on Information and Communication Technologies (ICICT 2014),ELSEVIER 2015.
[8]D.S.Guru,Y.H.SharathKumar,S.Manjunath,”Texturalfeaturesinflowerclassification”,Received14August2010 Accepted 4November2010 ,ELSEVIER.
[9] Kriti Sharma, Anoop Singhal,” COUNTING FLOWERS IN DIGITAL IMAGE: A REVIEW”, International Journal For Technological Research In Engineering Volume 3, Issue 9, May-2016 .
[10] Amira Ben Mabrouk, Asma Najjar and Ezzeddine Zagrouba ,”Image Flower Recognition based on a New Method for Color Feature Extraction “,2014 International Conference on Computer Vision Theory and Applications (VISAPP), 2015 IEEE.
[11] Asma Najjar and Ezzeddine Zagrouba,” Flower image segmentation based on color analysis and a supervised evaluation”, 2012 International Conference on Communications and Information Technology (ICCIT),2012 IEEE.
[12] Maria-Elena Nilsback, Andrew Zisserman,”A Visual Vocabulary for Flower Classification”, CVPR(2)2006:1447-1454,2006. [13] Maria-Elena Nilsback, Andrew Zisserman,” Delving into the Whorl of Flower Segmentation”, BMVC 2007: 1-10,2007.
[14] Maria-Elena Nilsback, Andrew Zisserman,” Automated Flower Classification over a Large Number of Classes”, ICVGlP 2008: 722729,2008.
[15] Maria-Elena Nilsback,“An automatic visual Flora – segmentation and classification of flower images”, PhD thesis, 2009.
[16] Tzu-Hsiang Hsu ,Chang-Hsing Lee and Ling-Hwei Chen,” An interactive flower image recognition system”, Published online: 6 March 2010 # Springer Science+Business Media, LLC 2010.
[17] D. Sugimura, T. Mikami, H. Yamashita, and T. Hamamoto, “Enhancing Color Images of Extremely Low Light Scenes Based on RGB/NIR Images Acquisition With Different Exposure Times”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 11, NOVEMBER 2015.
[18] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing‖, 2nd Ed”, Beijing: Publishing House of Electronics Industry, 2007.
[19] A.B.Patil , J.A.Shaikh,” Segmentation and Feature Extraction of Flowers Intended for Image Retrieval : A survey”, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 5, Issue 1, January 2016.
[20] W. X. Kang, Q. Q. Yang, R. R. Liang,―The Comparative Research on Image Segmentation Algorithms”, IEEE Conference on ETCS, pp. 703-707, 2009 .
[21] Zhong Qu and Li Hang ―Research on Image Segmentation Based on the Improved Otsu Algorithm.‖, 2010
[22] Pooja Kamavisdar, Sonam Saluja, Sonu Agrawal,” A Survey on Image Classification Approaches and Techniques”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 1, January 2013 .
[23] Twa MD, Parthasarathy S, Roberts C, Mahmoud AM, Raasch TW, Bullimore MA.,”Automated decision tree classification of corneal shape, Optometry and vision science”: official publication of the American Academy of Optometry 2005; 82: 1038.
[24] Brodley CE, Utgoff PE. “Multivariate versus univariate decision trees”,Citeseer, 1992.
[25] Jang J-SR. ANFIS: adaptive-network-based fuzzy inference system. Systems, Man and Cybernetics, IEEE Transactions on, 1993; 23: 665-685. https://doi.org/10.1109/21.256541
[26] Phyu TN,”Survey of classification techniques in data mining”, in Proceedings of the International MultiConference of Engineers and Computer Scientists 2009; pp. 18-20.
[27] Kotsiantis SB, Zaharakis I, Pintelas P,”Supervised machine learning A review of classification techniques”, ed, 2007.
[28] Cover T and Hart P,” Nearest neighbor pattern classification”, IEEE Transactions on Information Theory 1967; 13: 21-27, https://doi.org/10.1109/TIT.1967.1053964
[29] Wu X, Kumar V, Quinlan JR, Ghosh J, Yang Q, Motoda H, et al,”Top 10 algorithms in data mining”,Knowledge and Information Systems 2008; 14: 1-37. https://doi.org/10.1007/s10115-007-0114-2
[30] Bhatia N. Survey of nearest neighbor techniques. arXiv preprint arXiv:1007.0085, 2010.
[31] Sneha Pethkar and S.V.Phakade,” Review on Soil Classification Methods ”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering(An ISO 3297: 2007 Certified Organization) , Vol. 5, Issue 11, November 2016
Citation
Rabindra Patel, Chandra Sekhar Panda, "A Review on Flower Image Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.206-216, 2019.
A Survey of Different Methods in Border Security and Surveillance
Survey Paper | Journal Paper
Vol.7 , Issue.10 , pp.217-228, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.217228
Abstract
This paper presents a review of the existing border security and surveillance techniques proposed, keeping in view the energy optimization and economic integration at the same time. As the task of border monitoring becomes more and more difficult, searching for solutions beyond physical barriers may be one way to improve security. This paper aims to compare different researches in border security with respect to technique, technology, merits and demerits, time complexity, efficiency and unique features. This paper also highlights their fundamental working principles. The solely aim of this paper is to present a direct comparison of various major researches done in this field so as to facilitate the best optimized method to be deployed according to the current scenario
Key-Words / Index Term
Wireless Sensor Networks (WSNs), ZigBee, OPNET Simulator, Barrier Coverage, Wireless Integrated Network Sensors (WINS), Raspberry Pi, IoT, Radio Frequency Identification (RFID) tags
References
[1] P. Andreas, “Perspective: Border Security in the Age of Globalization: How Can We Protect Ourselves without Losing the Benefits of Openness?,” 2003.
[2] T. Academy, R. Academy, and S. S. Trakt, “Border Management Security Council,” Appl. Phys. A. [Online]. Available: https://www.un.org/sc/ctc/focus-areas/border-control/ accessed on August 2,2019.
[3] N. Paudyal, “10 Toughest Borders In The World.” accessed on August 7,2019.
[4] UN, “Border Management,” 2013. [Online]. Available: https://www.un.org/counterterrorism/ctitf/en/uncct/border-security-initiative, accessed on August 12,2019.
[5] PIB, “Smart Fencing Indo Pak Jammu Border,” 2018. [Online]. Available: https://pib.gov.in/PressReleaseIframePage.aspx?PRID=1546376, accessed on August 12,2019.
[6] PIB, “Smart Fencing Indo Bangladesh Border,” PIB 2019. [Online]. Available: https://pib.gov.in/Pressreleaseshare.aspx?PRID=1567516, accessed on August 20,2019.
[7] WCO, “Smart Border World,” 2019. [Online]. Available: http://www.wcoomd.org/en/media/newsroom/2018/november/world-customs-organization-dedicates-2019-to-transforming-frontiers-into-smart-borders.aspx, accessed on August 21,2019.
.
[8] M. A. M. and M. M. I. Additional, “Overview of Wireless Sensor Network Chapter.”
[9] X. Hu, “Wireles ss Sens sor Ne etwork k : Cha aracte eristics s and Ar rchitec ctures,” vol. 6, no. 12, pp. 1398–1401, 2012.
[10] M. R. Senouci, “WSN Image.” [Online]. Available: https://www.researchgate.net/profile/Mustapha_Senouci/publication/265396190/figure/fig2/AS:295817744273409@1447539854939/A-typical-WSN-architecture.png, accessed on August 23,2019.
[11] S. Siraj, A. K. Gupta, and Badgujar-Rinku, “Network Simulation Tools Survey,” Int. J. Adv. Res. Comput. Commun. Eng. Vol. 1, Issue 4, June 2012, vol. 1, no. 4, pp. 201–210, 2012.
[12] M. Alkhathami, L. Alazzawi, and A. Elkateeb, “Large scale border security systems modeling and simulation with OPNET,” 2017 IEEE 7th Annu. Comput. Commun. Work. Conf. CCWC 2017, pp. 1–8, 2017.
[13] S. Mittal, “OPNET: An Integrated Design Paradigm for Simulations,” Softw. Eng. An Int. J., vol. 2, no. 2, pp. 57–67, 2012.
[14] G. Gao, “Deployment of WirelessHART,” no. Fskd, pp. 2120–2124, 2012.
[15] A. Kuki, “Modeling computer networks by the help of OPNet tools,” vol. 1, pp. 251–258, 2015.
[16] C. M. Ramya, M. Shanmugaraj, and R. Prabakaran, “Study on ZigBee technology,” ICECT 2011 - 2011 3rd Int. Conf. Electron. Comput. Technol., vol. 6, no. April, pp. 297–301, 2011.
[17] D. Products, “Zigbee Wireless Mesh Networking Link.” [Online]. Available: https://www.digi.com/resources/standards-and-technologies/zigbee-wireless-mesh-networking, accessed on August 24,2019.
.[18] Raspberry Pi Foundation, “Raspberry Pi.” [Online]. Available: https://opensource.com/resources/raspberry-pi, accessed on August 25,2019.
[19] Gadget Geek, “Zigbee image.” [Online]. Available: https://i0.wp.com/www.gadgetgeek.info/wp-content/uploads/zigbee_network2-3.jpg?w=413, accessed on August 29,2019.
[20] A. Imteaj, T. Rahman, M. K. Hossain, and S. Zaman, “IoT based autonomous percipient irrigation system using raspberry Pi,” 19th Int. Conf. Comput. Inf. Technol. ICCIT 2016, pp. 563–568, 2017.
[21] R. Karthikeyan, S. Karthik, T. R. Prasanna Vishal, and S. Vignesh, “Snitch: Design and development of a mobile robot for surveillance and reconnaissance,” ICIIECS 2015 - 2015 IEEE Int. Conf. Innov. Information, Embed. Commun. Syst., pp. 5–8, 2015.
[22] Raspberry Pi Foundation, “Raspberry Pi 4 Image.” [Online]. Available: https://www.raspberrypi.org/products/raspberry-pi-4-model-b/, accessed on August 29,2019..
[23] E. – E. P. for E. Students, “RFID web link.” [Online]. Available: https://www.elprocus.com/rfid-basic-introduction-simple-application/, accessed on September 2,2019..
[24] E. – E. P. for E. Students, “RFID tag image.” [Online]. Available: https://www.elprocus.com/wp-content/uploads/2013/09/RFID-Tag.jpg, accessed on September 2,2019.
[25] E. – E. P. for E. Students, “RFID reader image link.” [Online]. Available: https://www.elprocus.com/wp-content/uploads/2013/09/An-RFID-reader.jpg, accessed on September 2,2019.
Citation
Palak Sood, Himani Sharma, Sumeet Kaur Sehra, "A Survey of Different Methods in Border Security and Surveillance," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.217-228, 2019.