Factors Influencing Infection Source Identification in Complex Networks: An Empirical Study
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1791-1804, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17911804
Abstract
One of the important characteristics of the modern-day world is its high connectivity. While it has brought people closer and made lives easier, it has also paved way for harmful content, such as diseases, rumors, computer viruses, etc., to flow easily and spread even quicker. Therefore, finding the source of such unwanted diffusion processes becomes critical to mitigate the damages and avoid future threats. Consequently, infection source identification in complex networks has become an important problem with wide range of effective and meaningful applications. Researchers, over the years, have produced elegant and efficient solutions for the same. The main aim of this paper is to study the factors affecting locating a source of infection. This study largely focuses on four such factors: topology, graph density, infection probability and infection size. For performance analysis, three well known state-of-art source identification techniques, i.e., Dynamic Age (DA), Reverse Infection (RI) and Minimum Description Length (MDL), are employed. Largescale and extensive experiments conducted on various datasets indicate that all the four factors play critical roles in infection source identification, irrespective of the source identification technique employed.
Key-Words / Index Term
Infection Source Identification, Information Diffusion, Social Networks, Complex Networks, SI Model
References
[1] G. S. Campos, A. C. Bandeira, S. I. Sardi, “Zika virus outbreak, Bahia, Brazil”, Emerging Infectious Diseases, Vol. 21, No. 10, pp. 1885, 2015.
[2] WHO Ebola Response Team, “Ebola virus disease in West Africa—The first 9 months of the epidemic and forward projections”, New England J. Med., Vol. 371, No. 16, pp. 1481–1495, 2014.
[3] H. Allcott, M. Gentzkow, “Social media and fake news in the 2016 election”, Journal of Economic Perspectives, Vol. 31, No. 2, pp. 211-36, 2017.
[4] B. Doerr, M. Fouz, T. Friedrich, “Why rumors spread so quickly in social networks”, Commun. ACM, Vol. 55, No. 6, pp. 70–75, Jun. 2012.
[5] C. Pash, “The lure of naked hollywood star photos sent the Internet into meltdown in New Zealand”, Business Insider Australia, Vol. 4, Sep. 2014.
[6] D. MacRae, “5 viruses to be on the alert for in 2014”, Computer Business Review, Tech. Rep., Feb. 2014.
[7] A. Singla, K. Jain, A. Gairola, "Delving into Security of Networks - Times Need", International Journal of Scientific Research in Network Security and Communication, Vol. 2, Issue. 3, pp. 1-8, 2014.
[8] U.K. Singh, C. Joshi, S.K. Singh, "Zero day Attacks Defense Technique for Protecting System against Unknown Vulnerabilities", International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, Issue. 1, pp. 13-18, 2017.
[9] D. Shah, T. Zaman, “Detecting sources of computer viruses in networks: Theory and experiment”, In the Proc. ACM SIGMETRICS Int. Conf. Measur. Model. Comput. Syst. (SIGMETRICS), New York, NY, USA, pp. 203–214, Dec. 2010.
[10] L. J. Allen, “Some discrete-time si, sir, and sis epidemic models”, Mathematical Biosciences, Vol. 124, Issue. 1, pp. 83–105, 1994.
[11] R. M. Anderson, R. M. May, B. Anderson, “Infectious diseases of humans: dynamics and control”, Vol. 28, Wiley Online Library, 1992.
[12] N. Karamchandani, M. Franceschetti, “Rumor source detection under probabilistic sampling”, In the Proc. IEEE Int. Symp. Inf. Theory (ISIT), Istanbul, Turkey, pp. 2184–2188, 2013.
[13] W. Luo, W. P. Tay, M. Leng, “Identifying infection sources and regions in large networks”, IEEE Trans. Signal Process., Vol. 61, No. 11, pp. 2850–2865, Jun. 2013.
[14] D. T. Nguyen, N. P. Nguyen, M. T. Thai, “Sources of misinformation in online social networks: Who to suspect?”, In the Proc. of 2012 IEEE Milit. Commun. Conf. (MILCOM), Orlando, FL, USA, pp. 1–6, 2012.
[15] W. Luo, W. P. Tay, M. Leng, “How to identify an infection source with limited observations”, IEEE J. Sel. Topics Signal Process., Vol. 8, No. 4, pp. 586–597, Aug. 2014.
[16] W. Luo, W. P. Tay, “Identifying infection sources in large tree networks”, In the Proc. of 9th Annu. 2012 IEEE Commun. Soc. Conf. Sensor Mesh Ad Hoc Commun. Netw. (SECON), Seoul, South Korea, pp. 281–289, 2012.
[17] K. Zhu, L. Ying, “Information source detection in the SIR model: A sample-path-based approach”, IEEE/ACM Transactions on Networking (TON), Vol. 24, Issue 1, pp. 408-421, 2016.
[18] V. Fioriti, M. Chinnici, J. Palomo, “Predicting the sources of an outbreak with a spectral technique”, Appl. Math. Sci., Vol. 8, No. 135, pp. 6775–6782, 2014.
[19] W. Luo, W. P. Tay, “Identifying multiple infection sources in a network”, In the Proc. of 2012 Conf. Rec. 46th Asilomar Conf. Signals Syst. Comput. (ASILOMAR), Pacific Grove, CA, USA, pp. 1483–1489, 2012.
[20] B. A. Prakash, J. Vreeken, C. Faloutsos, “Spotting culprits in epidemics: How many and which ones?”, In the Proc. of 2012 IEEE 12th Int. Conf. Data Min. (ICDM), Brussels, Belgium, pp. 11–20, 2012.
[21] B. A. Prakash, J. Vreeken, C. Faloutsos, “Efficiently spotting the starting points of an epidemic in a large graph”, Knowl. Inf. Syst., Vol. 38, No. 1, pp. 35–59, 2014.
[22] J. Leskovec, J. J. Mcauley, “Learning to discover social circles in ego networks, In Advances in Neural Information Processing Systems, Curran Associates, Inc., pp. 539–547, 2012.
[23] D. J. Watts, S. H. Strogatz, “Collective dynamics of ‘small-world’ networks”, Nature, Vol. 393, No. 6684, pp. 440–442, 1998.
[24] P. Erdos, A. Rényi, “On random graphs I”, Publ. Math. Debrecen, 6, pp. 290-297, 1959.
[25] P. Erdos, A. Rényi, “On the evolution of random graphs”, Publ. Math. Inst. Hung. Acad. Sci, Vol. 5, No. 1, pp. 17-60, 1960.
[26] J. G. Restrepo, E. Ott, and B. R. Hunt, “Characterizing the dynamical importance of network nodes and links,” Phys. Rev. Lett., Vol. 97, No. 9, Art. No. 094102, Sep. 2006.
[27] J. Jiang, S. Wen, S. Yu, Y. Xiang, W. Zhou, “K-center: An approach on the multi-source identification of information diffusion”, IEEE Transactions on Information Forensics and Security, Vol. 10, Issue. 12, pp. 2616-2626, 2015.
[28] K. Yang, A. H. Shekhar, D. Oliver, and S. Shekhar, “Capacity constrained network-Voronoi diagram: A summary of results”, In Advances in Spatial and Temporal Databases, Berlin, Germany: Springer-Verlag, pp. 56–73, 2013.
[29] D. Brockmann and D. Helbing, “The hidden geometry of complex, network-driven contagion phenomena”, Science, Vol. 342, No. 6164, pp. 1337–1342, 2013.
[30] Z. Wang, C. Wang, J. Pei, X. Ye, “Multiple Source Detection without Knowing the Underlying Propagation Model”, In the Proceedings of the Thirty-First 2017 AAAI Conference on Artificial Intelligence (AAAI-17), San Francisco, California, USA, pp. 217-223, 2017.
[31] K. Zhu, Z. Chen, L. Ying, “Catch `Em All: Locating Multiple Diffusion Sources in Networks with Partial Observations”, In the Proceedings of the Thirty-First 2017 AAAI Conference on Artificial Intelligence (AAAI-17), San Francisco, California, USA, pp. 1676-1683, 2017.
[32] P. C. Pinto, P. Thiran, and M. Vetterli, “Locating the source of diffusion in large-scale networks”, Phys. Rev. Lett., Vol. 109, No. 6, Art. No. 068702, Aug. 2012.
[33] A. Louni, K. P. Subbalakshmi, “Who Spread That Rumor: Finding the Source of Information in Large Online Social Networks With Probabilistically Varying Internode Relationship Strengths”, IEEE Transactions on Computational Social Systems, Vol. 5, Issue. 2, pp. 335-343, 2018.
[34] A. Agaskar and Y. M. Lu, “A fast Monte Carlo algorithm for source localization on graphs”, In the Proc. of 2013 SPIE Opt. Eng. Appl., San Diego, CA, USA, Art. No. 88581N, 2013.
[35] F. Altarelli, A. Braunstein, L. Dall’Asta, A. Lage-Castellanos, and R. Zecchina, “Bayesian inference of epidemics on networks via belief propagation”, Phys. Rev. Lett., Vol. 112, No. 11, Art. No. 118701, 2014.
[36] Y. Xie, V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang, “Worm origin identification using random moonwalks”, in Proc. IEEE Symp. Security Privacy, Oakland, CA, USA, pp. 242–256, 2005.
[37] A. Y. Lokhov, M. Mézard, H. Ohta, and L. Zdeborová, “Inferring the origin of an epidemic with a dynamic message-passing algorithm”, Phys. Rev. E, Vol. 90, No. 1, Art. No. 012801, 2013.
[38] L. C. Freeman, “Centrality in social networks conceptual clarification”, Soc. Netw., Vol. 1, No. 3, pp. 215–239, 1978.
[39] M. E. J. Newman, “Epidemics on networks, in Networks: An Introduction”, Oxford, U.K.: Oxford Univ. Press, Ch. 17, pp. 700–750, 2010.
[40] B. Chang, E. Chen, F. Zhu, Q. Liu, T. Xu, Z. Wang, “Maximum a Posteriori Estimation for Information Source Detection”, IEEE Trans. on Systems, Man, and Cybernetics: Systems (Early Access), pp. 1-15, May, 2018.
[41] Z. Chen, K. Zhu, and L. Ying, “Detecting multiple information sources in networks under the SIR model,” in Proc. 48th Annu. Conf. Inf. Sci.Syst. (CISS), Mar. 2014, pp. 1–4.
Citation
Syed Shafat Ali, Syed Afzal Murtaza Rizvi, "Factors Influencing Infection Source Identification in Complex Networks: An Empirical Study," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1791-1804, 2019.
A Proposed Algorithm to Reinforce the Security of Steganograpy in conjunction with Cryptography to Assure Privacy and Integrity of the Communication by using Native OS Batch Programming Technique
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1805-1819, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18051819
Abstract
This present digital world is made up of both secure and insecure data communication. So, it is imperative to secure our data from adversaries. To protect our data while communications, lots of mechanisms are there, but still some vulnerability exists. Steganography is one of the security techniques where we can hide our data inside different mediums like video, image, and audio files. There are also some vulnerable exists. Since it hides the data in the least significant bit [LSB], attacks could be performed easily if the adversary knows some data concealed in the object. In this research, we proposed a new multi-layered security algorithm to reinforce security of steganography along with Cryptography to ensure the privacy and integrity of the data by using the native Operating System batch programming. In this Algorithm, we used several encryption techniques with many undercover keys, did ASCII to Binary conversions, exchange of symbols and Hash function. This Proposed mechanism reinforced the security of steganography by ensuring confidentiality and integrity. It would be a big challenge for the adversary. In this research, we used our coding to perform Steganography and to produce the hash code.
Key-Words / Index Term
Steganography, Cryptography, Hash function, Plain Text, Cipher Text, LSB, Pixel, Undercover key, Operating System [OS], SHA512
References
[1] Bani Younes, M. A., & Jantan, A.,”Image encrytion using block based transformation Algorithm”,International journal of computer sciences,35:1,IJCS _35_1_03. pp(407- 415), 2008
[2] Moreland, T, ‘Steganography and Steganalysis’, Leiden Institute of Advanced Computing Science, 2003.
[3] Morkel, T., Eloff, J. H., and Olivier, M. S, “An overview of image steganography”, In ISSA, pp.1-11, 2005.
[4] Sheth, R. K., & Tank, R. M.,”Image Steganography Techniques “, International Journal Of Computer Engineering And Sciences, 1(2), 10-15, (2015).
[5] R. Indrayani, H. A. Nugroho, R. Hidayat, and I. Pratama, “Increasing the security of MP3 steganography using AES Encryption and MD5 hash function,” in Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016, 2017, pp. 129–132.
[6] Uzair Nisar1*, Craig Stewart2 , Implementation of Email System With Steganography”, International Journal of Computer Sciences and Engineering , EISSN: 2347-2693, Vol-3, issue 1, Dec 2019.
[7] Robbi Rahim1*, Heri Nurdiyanto, “Combination Base64 Algorithm and EOF Technique for Steganography”, IOP Conf. Series: Journal of Physics: Conf. Series 1007 (2018) 012003 doi :10.1088/1742-6596/1007/1/012003
[8] S. M. Masud Karim, M. S. Rahman, and M. I. Hossain, “A new approach for LSB based image steganography using undercover key,” in 14th International Conference on Computer and Information Technology, ICCIT 2011, 2011, pp. 286–291.
[9] Hajduk, V., Broda, M., Kováč, O., & Levický, D. (2016, April). Image steganography with using QR code and cryptography. In Radioelektronika (RADIOELEKTRONIKA), 2016 26th International Conference (pp. 350-353). IEEE.
[10] M. Juneja and P. S. Sandhu, “Designing of robust image steganography technique based on LSB insertion and encryption,” in ARTCom 2009 - International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp. 302–305.
[11] Puja Mahajan, Prajakta Nimbalkar and Prtiksha Pawar,‖ Improved FPGA base X-Box Mapping of an image using Steganography Technique‖, International Journal of computer Application (0975-8887), 2016
[12] Dey, A. S., Nath, B. J., & Nath, C. A. (2012, January). A New Technique to Hide Encrypted Data in QR Codes (TM). In Proceedings on the International Conference on Internet Computing (ICOMP) (p. 1). The Steering committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
[13] Sharma, S., & Sejwar, V. (2016). QR Code Steganography for Multiple Image and Text Hiding using Improved RSA-3DWT Algorithm. International Journal of Security and Its Applications, 10(7), 393-406.
[14] K. Nandhini, B. Gomathi, “ Implementation of LSB Based Steganography Algorithms in FPGA”, Int. J. Sc. Res. in Network Security and Communication, ISSN: 2321-3256, Volume-6, Issue-5, June 2017.
[15] G. Hamed, M. Marey, S. A. El-Sayed, and M. F. Tolba, “Hybrid technique for steganography-based on DNA with n-bits binary coding rule,” in Proceedings of the 2015 7th International Conference of Soft Computing and Pattern Recognition, SoCPaR 2015, 2016, pp. 95–102.
Citation
J. Sebastian Nixon, Mesele Gebre Awgichew, Akalu Assefa Afaro, Fisaha Solomon, Paulos Bogale Wada, Fevan Tafari, "A Proposed Algorithm to Reinforce the Security of Steganograpy in conjunction with Cryptography to Assure Privacy and Integrity of the Communication by using Native OS Batch Programming Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1805-1819, 2019.
Opportunistic Forward Routing Using Bee Colony Optimization
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1820-1827, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18201827
Abstract
An intermittent connectivity experience node by paradigm of opportunistic forwarding has been proposed to serve emerging wireless networking applications transmit messages to a distant destination for given delay bound, disjoined parts of the network exchange information by nodes broker to exploit node mobility. Forwarding decision is made by main challenge of opportunistic forwarding relays the best chosen cumulative probability within the delay bound of destination. The Bee Colony algorithm performs a kind of neighborhood search to solve this issue at recent work combined with global search used for both combined optimization and continuous optimization. Choosing initial centroid clusters is the problem for OFPC affects the efficiency of algorithm. The initial centroids for clusters are found to introduce by Bee Colony algorithm. A new opportunistic forwarding scheme is designed after finding the initial centroid, partial centrality with opportunistic forwarding (OFPC), and theoretically quantifies the partial centrality influence on the data forwarding performance using Bee colony optimization. Bee Colony optimization creates multi agent system capable to successfully solved difficult combinatorial optimization problem as the basic idea. Different TTL requirements are epidemic by applying our scheme on three real opportunistic networking scenarios, our extensive evaluations show that our scheme achieves significantly better mean delivery delay and cost compared to the state-of-the-art works, achieve delivery ratios sufficiently closer. The OFPC outperforms other solutions overall with extending shows the evaluation result, especially in terms of mean delivery delay and cost.
Key-Words / Index Term
Opportunistic Forwarding with Partial Centrality, Bee Colony algorithm, clustering, opportunistic networking scenarios, Decayed Aggregation Graph
References
[1] A. Lindgren, A. Doria, O. Schelen. Probabilistic Routing in Intermittently Connected Networks. Lecture Notes in Computer Science, 2004,3126:239-254.
[2] A. Balasubramanian, B. N. Levine, A. Venkataramani. Replication Routing in DTNs: A Resource Allocation Approach. IEEE/ACM Trans. On Networking, 2010, 18(2):596-609.
[3] G. Dinan, K. Thomas, P. Alexandre, et al. Scoop: Decentralized and Opportunistic Multicasting of Information Streams. In Proc. MobiCom2011, ACM, pp. 169-180.
[4] J. Leguay, T. Friedman, V. Conan. Evaluating Mobility Pattern Space Routing for DTNs. In Proc. Infocom 2006, IEEE, pp.1-10.
[5] V. Erramilli, A. Chaintreau, M. Crovella, et al. Diversity of forwarding paths in pocket switched networks. In Proc. IMC 2007, ACM, pp. 161-174.
[6] C. Augustin, P. Hui, C. Jon, et al. Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms. IEEE Transactions on Mobile Computing, 2007, 6(6):606-620.
[7] Wei Gao, Guohong Cao. Fine-Grained Mobility Characterization: Steady and Transient State Behaviors. In Proc. MobiHoc 2010, ACM, pp.61-70.
[8] P. V. Marsden. Egocentric and socio centric measures of network centrality. Social Networks, 2002, 24:407-422.
[9] E. Daly, M. Haahr. Social Network Analysis for Routing in Disconnected Delay-Tolerant MANETs. In Proc. MobiHoc 2007, ACM, pp.32-40.
[10] Pan Hui, J. Crowcroft, E. Yoneki. BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks. In Proc. MobiHoc 2008, ACM,pp.241-250.
[11] A. Mtibaa, M. May and C. Diot et al. People Rank: Social Opportunistic Forwarding. In Proc. Infocom 2010, IEEE, pp.111-115.
[12] S. Brin, L. Page. The anatomy of a large-scale hyper textual web search engine. Comput. Netw. ISDN Syst., 1998, 30(1-7):107-117.
[13] Vahdat A, Becker D. Epidemic routing for partially connected ad hocnetworks, cs2200006. Durham, North Carolina : Duke University,2000.
[14] F. Warthman, “Delay-tolerant networks (dtns) - a tutorial,” tech. rep.,Warthman Associates, 2008.
[15] L. Pelusi, A. Passarella, and M. Conti, “Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks,” Communications Magazine, IEEE, vol. 44, pp. 134–141, Nov. 2006.
[16] K. Mershad and H. Artail, “A framework for secure and efficient data acquisition in vehicular ad hoc networks,” IEEE Transactions on Vehiculer Technology, vol. 62, pp. 536–551, Feb. 2013.
[17] M. R. Schurgot, C. Comaniciu, and K. Jaffres-Runser, “Beyond traditional dtn routing: Social networks for opportunistic communication”, Communications Magazine, IEEE, vol. 50, pp. 155–162, July 2012.
[18] M. Conti and M. Kumar, “Opportunities in opportunistic computing”, Computer, vol. 43, pp. 42–50, Jan. 2010.
[19] S. Smaldone, L. Han, P. Shankar, and L. Iftode, “Road speak: Enabling voice chat on roadways using vehicular social networks,” in Proc. the1st Workshop on Social Network Systems SocialNets’08, (Glasgow, UK), pp. 43–48, Apr. 2008.
[20] S.M. Allen et al., “Social Networking for Pervasive Adapta¬tion,” Proc. 2nd Int’l Conf. Self-Adaptive and Self-Organizing Systems Workshops (SASOW 08), IEEE Press, 2008, pp. 49-54.
Citation
S. Sivabalan, S. Dhamodharavadhani, R. Rathipriya, "Opportunistic Forward Routing Using Bee Colony Optimization," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1820-1827, 2019.
Fault Modelling of an Object-Oriented System using CPN
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1828-1845, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18281845
Abstract
Object-oriented development is a mechanism in which objects provide services to other objects by various means like inheritance, polymorphism, etc. Faults, in object-oriented software, may occur at two levels i.e. object level and interaction level (when one object provides/receives some services from others). A formal representation, of an object-oriented system, may be helpful to understand the behavior of software faults. Faults identification, at earlier stages, may help during the development and testing stages. In this paper, an attempt has been made to model several faults, in an object-oriented system, with the help of Colored Petri Nets. First, a formal representation of object-oriented properties is depicted by Colored Petri Nets. Secondly, various possible faults are modeled using different programming scenarios. The main emphasis was on faults that may arise due to objects and their interactions i.e. inheritance and polymorphism state. Such information may be useful during the testing and maintenance phases of software development.
Key-Words / Index Term
Object, Faults, Colored Petri Nets, Inheritance, Polymorphism
References
[1] S. Malve, P. Sharma Investigation of Manual and Automation Testing using Assorted Approaches, International Journal of Scientific Research in Computer Science and Engineering,Vol. 5, Issue. 2, pp.81-87, 2017.
[2] S. Jat, P. Sharma Analysis of Different Software Testing Techniques, International Journal of Scientific Research in Computer Science and Engineering,Vol. 5, Issue. 2, pp.77-80, 2017.
[3] A. Marcus, D. Poshyvanyk, R. Ferenc. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems. IEEE Transactions on Software Engineering, Vol: 34 , Issue. 2, pp. 287-300, 2008.
[4] G. Antoniol, R. Fiutem, & L. Cristoforetti, Using Metrics to Identify Design Patterns in Object-Oriented Software. IEEE METRICS, 1998
[5] V.R. Basili, L.C. Briand, & W.L. Melo, A Validation of Object-Oriented Design Metrics as Quality Indicators. IEEE Trans. Software Eng., Vol. 22, Issue. 10, pp. 751-761, 1996.
[6] E. Arisholm, L.C. Briand, & A.Føyen, Dynamic coupling measurement for object-oriented software. IEEE Transactions on Software Engineering, Vol. 30, Issue. 8, pp. 491-506, 2004.
[7] L.C. Briand, J. Wüst, & H. Lounis. Using Coupling Measurement for Impact Analysis in Object-Oriented Systems. ICSM, 1999.
[8] C. Lakos,. Object Oriented modelling with Object Petri Nets. Concurrent Object-Oriented Programming and Petri Nets, Springer,Vol. 2001, pp. 1-37, 2001
[9] L.C. Wang, Object-oriented Petri nets for modelling and analysis of automated manufacturing systems, ISSN. Vol. 9, Issue. 2, pp. 111-125, 1996
[10] T. Murata,. Petri Nets : Properties , Analysis and Appl ka t ions., IEEE, vol. 77, Issue. 4pp. 541-580 2004
[11] K. Jensen, & L.M. Kristensen,. Colored Petri nets: a graphical language for formal modelling and validation of concurrent systems. Commun. ACM, Vol. 58, Issue. 6, pp. 61-70, 2015.
[12] J.R. Silva, & P.M. Foyo, Timed Petri Nets. ABCM Vol.3, pp. 471-478, 2012
[13] F. Bause, & P.S. Kritzinger,. Stochastic Petri nets - an introduction to the theory (2. ed.). Advanced studies of computer science. 1996
[14] D. Wodtke, & G. Weikum,. A Formal Foundation for Distributed Workflow Execution Based on State Charts. ICDT, Vol. 1186, pp.230-246, 1996
[15] R. Alur, & M. Yannakakis,. Model Checking of Hierarchical State Machines. ACM Trans. Program. Lang. Syst., Vol. 23, Issue. 3, pp. 273-303, 2001
[16] A.S. Dange, A. Marcus, & D. Poshyvanykquot,. Survey of Fault Prediction Methods in Object Oriented Systems, IEEE, Vol. 38, Issue. 99, pp. 1-1, 2011
[17] A.J. Offutt, R.T. Alexander, Y. Wu, Q. Xiao, & C. Hutchinson,. A Fault Model for Subtype Inheritance and Polymorphism. ISSRE, pp. 27-30, 2001
[18] L.E. Buzato, C.M. Rubira, & M.L. Lisbôa,. A Reflective Object-Oriented Architecture for Developing Fault-Tolerant Software. J. Braz. Comp. Soc., Vol. 4, 1997
[19] K.K. Aggarwal, Y. Singh, A. Kaur, & R Malhotra,.. Investigating effect of Design Metrics on Fault Proneness in Object-Oriented Systems. Journal of Object Technology, Vol. 6, pp. 127-141. 2007
[20] S. Jain, H. Gulati, V. Bajpai, S. Goel, D. Singh, S. Baranwal, "Classes and Objects in Java," A Computer Science portal for geeks.. [webpage]. https://www.geeksforgeeks.org/classes-objects-java/. [April 20, 2018].
[21] M. Sheridan, "Java Fundamentals," Java - Oracle, Mike Sheridan at Sun Microsystems in 1991. [pdf]. http://www.oracle.com/events/global/en/java-outreach/resources/java-a-beginners-guide-1720064.pdf. [April 15, 2018].
[22] S. Jaiswal, "Inheritance in Java," Free Online Tutorials, Javatpoint provides tutorials and interview questions of all technology. [webpage]. https://www.javatpoint.com/inheritance-in-java. [April 16, 2018].
[23] BeginnersBook.com, "Multilevel inheritance in java with an example," BeginnersBook is a tutorials site for beginners that covers topics like Java, Collections, AWT, JSP, Servlet, JSTL, C, C++, DBMS, Perl, WordPress, SEO.. [webpage]. https://beginnersbook.com/2013/12/multilevel-inheritance-in-java-with-example/. [April 16, 2018].
[24] S. Jaiswal, "Polymorphism in Java," Free Online Tutorials, Javatpoint provides tutorials and interview questions of all technology. [webpage]. https://www.javatpoint.com/runtime-Polymorphism-in-java. [April 24, 2018].
[25] Wikipedia, “Trap (computing)” para. 1, 15, March 2018 [Online]. Available: https://en.wikipedia.org/wiki/Trap_(computing). [Accessed 4, April 2018].
[26] C. Inacio, "Software Fault Tolerance," Engineering Research Accelerator, Carnegie Mellon University Dependable Embedded Systems, Spring 1998. [webpage].
Available: https://users.ece.cmu.edu/~koopman/des_s99/sw_fault_tolerance/. [04,April 2018].
[27] BeginnersBook.com, "Polymorphism in java with an example," BeginnersBook is a tutorials site for beginners that covers topics like Java, Collections, AWT, JSP, Servlet, JSTL, C, C++, DBMS, Perl, WordPress, SEO.. [webpage]. https://beginnersbook.com/2013/03/Polymorphism-in-java/.[April 27, 2018].
[28] D. Calvanese, "Conditional Statements," Diego Calvanese.Unibz online study lectures [pdf]. https://www.inf.unibz.it/~calvanese/teaching/04-05-ip/lecture-notes/uni05.pdf. [May 8, 2018].
[29] S. Jain, H. Gulati, V. Bajpai, S. Goel, D. Singh, S. Baranwal, "Loops in Java," A Computer Science portal for geeks.. [webpage]. https://www.geeksforgeeks.org/loops-in-java/. [April 20, 2018].
Citation
Shubham Kaushik, Ratneshwer, "Fault Modelling of an Object-Oriented System using CPN," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1828-1845, 2019.
Recent Trends in Cloud Computing
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.1846-1851, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18461851
Abstract
Developers with innovative ideas no longer needs the huge amount of capital investment in hardware or supporting software to deploy their service or the human expense to operate it because of the introduction of Cloud Computing. Cloud Computing is the delivery of computing services such as servers, software, databases, storage, networking, intelligence, analytics etc. over the Internet to facilitate faster innovation, economies of scale and flexible resources. While a lot of research is currently going on in the technology itself, this paper is trying to contain the new and emerging technologies in cloud computing. Here we have tried to bring most important new technologies introduced in Cloud Computing such as data sharing and data security. Finally, we presented some proposals which have connected other areas with cloud computing.
Key-Words / Index Term
Cloud Computing, Data security, Data sharing, Cloud data sharing, Mobile Cloud Computing
References
[1] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." (2011).
[2] JoSEP, Anthony D., et al. "A view of cloud computing." Communications of the ACM 53.4 (2010).
[3] Foster, Ian, et al. "Cloud computing and grid computing 360-degree compared." arXiv preprint arXiv:0901.0131 (2008).
[4] Fox, Armando, et al. "Above the clouds: A berkeley view of cloud computing." Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS28.13 (2009): 2009.
[5] Buyya, Rajkumar, et al. "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility." Future Generation computer systems 25.6 (2009): 599-616.
[6] Zhang, Qi, Lu Cheng, and Raouf Boutaba. "Cloud computing: state-of-the-art and research challenges." Journal of internet services and applications 1.1 (2010): 7-18.
[7] Marston, Sean, et al. "Cloud computing—The business perspective." Decision support systems 51.1 (2011): 176-189.
[8] Li, Jin, et al. "Secure attribute-based data sharing for resource-limited users in cloud computing." Computers & Security 72 (2018): 1-12.
[9] Shen, Jian, et al. "Anonymous and traceable group data sharing in cloud computing." IEEE Transactions on Information Forensics and Security 13.4 (2018): 912-925.
[10] Li, Ruixuan, et al. "A lightweight secure data sharing scheme for mobile cloud computing." IEEE Transactions on Cloud Computing 6.2 (2018): 344-357.
[11] Xiong, Hu, Hao Zhang, and Jianfei Sun. "Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing." IEEE Systems Journal 99 (2018): 1-22.
[12] Zhang, Yinghui, Axin Wu, and Dong Zheng. "Efficient and privacy-aware attribute-based data sharing in mobile cloud computing." Journal of Ambient Intelligence and Humanized Computing 9.4 (2018): 1039-1048.
[13] Zuo, Cong, et al. "Fine-grained two-factor protection mechanism for data sharing in cloud storage." IEEE Transactions on Information Forensics and Security 13.1 (2018): 186-196.
[14] Jouini, Mouna, and Latifa Ben Arfa Rabai. "A security framework for secure cloud computing environments." Cloud Security: Concepts, Methodologies, Tools, and Applications. IGI Global, 2019. 249-263.
[15] Yang, Li, et al. "A remotely keyed file encryption scheme under mobile cloud computing." Journal of Network and Computer Applications 106 (2018): 90-99.
[16] Langmead, Ben, and Abhinav Nellore. "Cloud computing for genomic data analysis and collaboration." Nature Reviews Genetics 19.4 (2018): 208.
[17] Masala, Giovanni L., Pietro Ruiu, and Enrico Grosso. "Biometric authentication and data security in cloud computing." Computer and Network Security Essentials. Springer, Cham, 2018. 337-353.
[18] Roy, Sandip, et al. "Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications." IEEE Transactions on Industrial Informatics 15.1 (2019): 457-468.
[19] Liu, Yi, et al. "Secure and fine-grained access control on e-healthcare records in mobile cloud computing." Future Generation Computer Systems 78 (2018): 1020-1026.
[20] Ning, Zhaolong, et al. "Green and sustainable cloud of things: Enabling collaborative edge computing." IEEE Communications Magazine 57.1 (2019): 72-78.
[21] Nurmi, Daniel, et al. "The eucalyptus open-source cloud-computing system." Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid. IEEE Computer Society, 2009.
[22] Sakshi kathuria,"A Survey on Security Provided by Multi-Clouds in Cloud Computing",International Journal of Scientific Research in Network Security and Communication,Vol.6,Issue.1,pp 23-28
[23] Kaur, U., M. Mahajan, and D. Singh. "A Comparative Analysis of Trust Models in Cloud Computing." International Journal of Scientific Research in Network Security and Communication6.2 (2018): 19-23.
Citation
O. Jamsheela, Mohd Abdul Hameed, "Recent Trends in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1846-1851, 2019.
Personality Evaluation and CV Analysis using Machine Learning Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1852-1857, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18521857
Abstract
Human personality has played a vital role in an individual`s life as well as in the development of an organization. One of the ways to judge human personality is by using standard questionnaires or by analyzing the Curriculum Vitae (CV). Traditionally, recruiters manually shortlist/filters a candidate’s CV as per their requirements. In this paper, we present a system that automates the eligibility check and aptitude evaluation of candidates in a recruitment process. To meet this need an online application is developed for the analysis of aptitude or personality test and candidate’s CV. The system analyzes professional eligibility based on the uploaded CV. The system employs a machine learning approach using TF-IDF Algorithm. The output of our system gives a decision for candidate recommendation. Further, the resulting scores help in evaluating the qualities in the candidates by analyzing the scores obtained in different areas. The graphical analysis of the performance of any candidate makes it easier to evaluate his/her personality and helpful in analyzing the CV properly. Thus, the system provides a helping hand for the recruitment process so that the candidate’s CV will be shortlisted and the fair decision will be made.
Key-Words / Index Term
Psychometric Analysis, Machine-learning, TF-IDF, Curriculum Vitae Analysis, Personality Evaluation
References
[1] FoDRA – Nikolaos D. Almalis George A. Tsihrintzis , Aggeliki D. Strati , “A New Content-Based Job Recommendation Algorithm for Job Seeking and Recruiting” , 2016.
[2] Data,Vishnu M Menon Computer Rahul Nath H A, “A Novel Approach to Evaluate and Rank Candidates in A Recruitment Process by Estimating Emotional Intelligence through Social Media”,May 2016.
[3] Manasi Ombhase, Prajakta Gogate, Tejas Patil
“Automated Personality Classification Using Data Mining Techniques” 10.13140/RG.2.2.35949.59363, 2017
[4] Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu Ee-Peng Lim, David Lo, “Career Mapper: An Automated Resume Evaluation Tool”, 2016.
[5] Janet E. Squires, Leslie Hayduk, Alison M. Hutchinson, Lisa ACranley, Mark Gierl, Greta G. Cummings, Peter G. Norton and Carole A Estabrooks, "A Protocol for Advanced Psychometric Assessment of Surveys", Nursing Research and Practice Volume 2013 (2013), Article ID 156782,20 December 2012.
[6] Automated CV Processing along with Psychometric Analysis in Job Recruiting Process Firoz Ahmed , Mehrin Anannya 2 , Tanvir Rahman 3 , Risala Tasin Khan4 Institute of Information Technology , May 2015.
[7] Mesurado, Belén & J. Mateo, Niño & Valencia, Marshall & Richaud, Maria, “Extraversion: Nature, Development and Implications to Psychological Health and Work Life”, (2014).
[8] M.Balabanovic and Y. Shoham, “Fab: Content-based, Collaborative Recommendation. Communications of the ACM,” vol. 40, no. 3, pp. 66-72, 1997.
[9] Ramezani, M., Bergman, L., Thompson, R., Burke, R. and Mobasher, B., “Selecting and applying recommendation technology”. In Proc. of International Workshop on Recommendation and Collaboration, in Conjunction with 2008 International ACM Conference on Intelligent User Interfaces. Canaria, Canary Islands, Spain, 2008.
[10] Badrul Sarwar, G. Karypis, J. Konstan, and J. Riedl, “Item-Based Collaborative Filtering Recommendation Algorithms,” Proceedings of the 10th International Conference of World Wide Web, pp. 285-295, 2001.
[11] Shereen Albitar, Sebastien Fournier, Bernald Espinasse, An effective tf/idf-based text-to-text semantic similarity measure for text, spinger, pp. 105-114, 2014.
[12] Stephen Robertson,"Understanding inverse document frequency: on theoretical arguments for IDF", Journal of Documentation, Vol. 60 Issue: 5, pp.503-520, 2004.
[13] R.S. Walse, G.D. Kurundkar, P. U. Bhalchandra, "A Review: Design and Development of Novel Techniques for Clustering and Classification of Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.19-22, 2018.
[14] Shahzad Qaiser,Ramsha Ali ,International Journal of Computer Applications (0975 – 8887), “Text Mining: Use of TF-IDF to Examine the Relevance of Words to Documents” Volume 181 – No.1, July 2018.
[15] Amit Palve, Rohini D.Sonawane, Amol D. Potgantwar, "Sentiment Analysis of Twitter Streaming Data for Recommendation using, Apache Spark", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.99-103, 2017.
[16] Huan Liu, Lei Yu, "Towards integrating feature selection algorithms for classification and clustering", IEEE Transaction on Knowledge and Data Engineering, vol. 17, no. 4, pp. 491-502, April 2005.
Citation
Jayashree Rout, Sudhir Bagade, Pooja Yede , Nirmiti Patil, "Personality Evaluation and CV Analysis using Machine Learning Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1852-1857, 2019.
Use of Software Metrics on Software Development Projects Life Cycles in OOE to Improve Software Quality
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1858-1864, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18581864
Abstract
Software quality metrics are part of software metrics focusing primarily on process, product and project quality aspects. Software quality metrics primarily focus on software measurement and its development process. The main objective of software testing is to enhance the quality of software. Many experts in the field of software testing propose various number of metrics. With the help of these we can detect trends and can prevent problems in efficient cost control, quality improvements, time and risk reduction with their probable solutions. Thus, in the global competitive market, it facilitates ensuring and achieving optimal business goals.
Key-Words / Index Term
Software Testing, Software Testing Metrics, Software Testing Product Metrics, Software Testing Process Metrics
References
[1] Aggarwal, K.K., Singh, Y., Kaur, A., and Maihotra, R. (2005), ‘Software Reuse Metrics for Object-Oriented Systems’ , Proceedings of the 2005 Third ACIS Int’l Conference on Software Engineering Research, Management and Applications (SERA ‘05).
[2] Arar, O. F. and Ayan, K. (2016). Deriving thresholds of ¨ software metrics to predict faults on open source software: Replicated case studies. Expert Systems with Applications, 61:106–121.
[3] DeMarco, T. (2013), ‘Controlling Software Projects: Management, Measurement and Estimation.’ ISBN 0-13-171711-1.
[4] Dhavachelvan,P., V.S.K. Uma, Venkatachalapathy G. V. (2006) ‘A new approach in development of distributed framework for automated software testing using agents’ , Volume 19, Issue 4.
[5] Erturk, E. and Sezer, E. A. (2015). A comparison of some soft computing methods for software fault prediction. Expert Systems with Applications, 42(4):1872–1879.
[6] Ghotra, B., McIntosh, S., and Hassan, A. E. (2015). Revisiting the impact of classification techniques on the performance of defect prediction models. In Proceedings of the 37th International Conference on Software Engineering-Volume 1, pages 789–800. IEEE Press.
[7] Honglei, T., Wei, S., and Yanan, Z. (2009). The research on software metrics and software complexity metrics. In Computer Science-Technology and Applications, 2009. IFCSTA’09. International Forum on, volume 1, pages 131–136. IEEE.
[8] Kamei, Y. and Shihab, E. (2016). Defect prediction: Accomplishments and future challenges. In Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, volume 5, pages 33–45. IEEE
[9] Karner, C. and Bond, W.P. (2004), ‘Software Engineer Metrics: What do they measure and how do we know?’ Proceeding of the 10th International Software Metrics Symposium, Metrics.
[10] Kumar, L., Misra, S., and Rath, S. K. (2017). An empirical analysis of the effectiveness of software metrics and fault prediction model for identifying faulty classes. Computer Standards & Interfaces, 53:1–32.
[11] Menzies, T., Krishna, R., and Pryor, D. (2015). The promise repository of empirical software engineering data (2015).
[12] Ogasawara, H., Yamada, A. and Kojo, M. (1996) ‘Experiences of software Quality Management Using Metrics through Life cycle’, Proceedings of ICSE.
[13] Paul, C. (2002) ‘Software Testing - A Craftsman’s Approach Second Edition’ CRC Press.
[14] Prakash, P. (2018). ‘Using weighted defects metrics to improve software quality: An analysis and review’. International conference on recent trends and advances in computer science and engineering, LIET, Alwar, Rajasthan, India, 14-15 April, 2018, pages 50-53.
[15] Rathore, S. S. and Kumar, S. (2017). Linear and non-linear heterogeneous ensemble methods to predict the number of faults in software systems. Knowledge-Based Systems, 119:232–256.
[16] Turhan, B., Mısırlı, A. T., and Bener, A. (2013). Empirical evaluation of the effects of mixed project data on learning defect predictors. Information and Software Technology, 55(6):1101–1118.
[17] Yang, X., Lo, D., Xia, X., and Sun, J. (2017). Tlel: A two layer ensemble learning approach for just-in-time defect prediction. Information and Software Technology, 87:206–220.
[18] Zhao, Y., Yang, Y., Lu, H., Liu, J., Leung, H., Wu, Y., Zhou, Y., and Xu, B. (2017). Understanding the value of considering client usage context in package cohesion for fault-proneness prediction. Automated Software Engineering, 24(2):393–453.
[19] Aanchal, Kumar S. (2013). ‘Metrics for Software Components in Object Oriented Environments: A Survey’ International Journal of Scientific Research in Computer Science and Engineering, Volume-1, Issue-2, March-April-2013: pp. 25-29.
Citation
Piyush Prakash, Sarvottam Dixit, S. Srinivasan, "Use of Software Metrics on Software Development Projects Life Cycles in OOE to Improve Software Quality," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1858-1864, 2019.
Ultra low Cost Interactive Whiteboard using Computer Vision Techniques: A Review
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.1865-1869, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18651869
Abstract
Whiteboard has played a vital role in our education system, teachers have been using this prop to deliver the daily knowledge capsules using presentations, slide after slide, which has surely left the dusty old chalkboard at par. This whiteboard also allows presenters the ease of annotating as they continue with the slides by using marker and stuff. But this practice has been revolutionized since the introduction of touch sensitive interactive panel. The classes become more interesting and involvement of students grow stronger, the presenters hold a better control on delivering a good session. But unfortunately, it is not accessible to all due to the cost of these fancy boards, which does not help the mass. Since the usage of whiteboard has emerged as a smart classroom property and adopted by various digitally sound organizations, it is therefore in need of cost effective smarter interactive display. Therefore, in this review, the objective is to identify minimal cost of installation of an interactive whiteboard or means to achieve this ideal system preferably with the help of Computer Vision (a trending perception realistic technology in minimizing cost).
Key-Words / Index Term
Computer vision, Image processing, IWBS, Camera, Infrared light
References
[1] Alexander Mordvintsev & Abid K. “Image processing in OpenCV”, 2014.
[2] Dalbir Singh, Ridha Omar and Azfar Anuar, “Low Cost Interactive Electronic Whiteboard Using Nintendo Wii Remote”, American Journal of Applied Sciences, Vol.-7 Issue- 11, pp. 1458-1463. 2010.
[3] Cxetin G, Bedi R and Sandler S “Multitouch technologies”. NUI Group, no publisher, 2009
[4] Oliphant, T. E. “Python for Scientific Computing”. Computing in Science & Engineering, Vol.-9, Issue- 3, pp. 10–20, 2007.
[5] Tosuntaş, Ş. B., Karadağ, E., & Orhan, S. “The factors affecting acceptance and use of interactive whiteboard within the scope of FATIH project: A structural equation model based on the Unified Theory of acceptance and use of technology”. Computers & Education, Vol.-81, pp. 169–178. 2015.
[6] Kellerman, A., Gurusinghe, N., Ariyarathna, T., & Gouws, R. “Smart whiteboard for interactive learning”. 2018 IEEE International Conference on Industrial Electronics for Sustainable Energy Systems (IESES). 2018.
[7] Rautaray, S. S., & Agrawal, A. “Vision based hand gesture recognition for human computer interaction: a survey”. Artificial Intelligence Review, Vol.-43(1), pp. 1–54. 2012.
[8] Lee, J. C. “Hacking the Nintendo Wii Remote”. IEEE Pervasive Computing, Vol.-7(3), pp. 39–45. 2008.
[9] Zhang, S., He, W., Yu, Q., & Zheng, X. “Low-cost interactive whiteboard using the Kinect”. International Conference on Image Analysis and Signal Processing. 2012.
[10] Dai, J., & Chung, C.-K. R. “Touchscreen Everywhere: On Transferring a Normal Planar Surface to a Touch-Sensitive Display”. IEEE Transactions on Cybernetics, Vol.-44(8), pp. 1383–1396. 2013.
[11] Şimşek, S., & Durdu, P. O., “Developing an Interactive Learning Environment with Kinect”. Communications in Computer and Information Science, pp. 150–155. 2014
[12] Amano, T., “Projection Center Calibration for a Co-located Projector Camera System”. 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops. 2014
[13] Yucel, K., Orhan, N., Misirli, G., Bal, G., & Sahin, Y. G. “An improved interactive whiteboard system: A new design and an ergonomic stylus”, 2nd International Conference on Education Technology and Computer. Vol.-3 pp. 148-152. 2010
[14] M.K. Bhuyan, D.R. Neog, M.K. Kar, “Fingertip detection for hand pose recognition”, International Journal of Computer Sciences and Engineering. Vol.-4, Issue-3, pp. 501–511, 2012.
[15] Manne Vamshi Krishna, Gopu Abhishek Reddy, B. Prasanthi and M. Sreevani, “Green Virtual Mouse Using OpenCV”, (IJCSE) International Journal of Computer Sciences and Engineering, Vol.-7, Issue-4, April 2019
Citation
Sunny Deep Basumatary, Kishore Kashyap, "Ultra low Cost Interactive Whiteboard using Computer Vision Techniques: A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1865-1869, 2019.
Energy Aware Routing Framework for Internet of Things
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1870-1872, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18701872
Abstract
Internet of Things (IoT) is an innovative paradigm that considers pervasive presence of variety of things. In particular, IoT consists of a large number of tiny devices which are deployed to sense the data. The sensed data has the potential to add a new dimension to human life. It is one of the latest technologies which provide connectivity to anyone, anywhere at any time. As voluminous numbers of devices are going to be connected and the devices are mostly battery connected, energy plays a vital role in IoT networks. Moreover, routing becomes a challenging task. The authors propose a framework to sustain the remaining energy of individual devices in IoT networks.
Key-Words / Index Term
Energy, Routing, Framework, IoT
References
[1]. S. Santiago, L. Arockiam, “Energy Efficiency in Internet of Things: An Overview”, International Journal of Recent Trends in Engineering & Research (IJRTER), Vol.2, pp.475-482, 2016.
[2]. Zhu Chunsheng, Victor CM Leung, Lei Shu, Edith C-H Ngai, “Green internet of things for smart world”, IEEE Access, Vol.3, pp. 2151-2162, 2015.
[3]. Lamaazi, Hanane, Nabil Benamar, “RPL enhancement using a new objective function based on combined metrics”, Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, pp. 1459-1464, 2017.
[4]. Ok Dudu, Furqan Ahmed, Piergiuseppe Di Marco, Roman Chirikov and Cicek Cavdar, “Energy aware routing for Internet of Things with heterogeneous devices”, International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, pp. 1-5, 2017.
[5]. Risteska Stojkoska, Biljana, Kire Trivodaliev and Danco Davcev, “Internet of Things framework for home care systems”, Wireless Communications and Mobile Computing, Vol. 2017, pp. 1-8, 2017.
[6]. Nguyen T D, Khan J Y and Ngo D T, “An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications”, International Conference on Communications (ICC), pp. 1-6, 2017.
[7]. Sousa, Natanael, Jose VV Sobral, Joel JPC Rodrigues, Ricardo AL Rabêlo, and Petar Solic, “ERAOF: A new RPL protocol objective function for Internet of Things applications”, 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech), IEEE, pp. 1-5, 2017.
[8]. Sarwesh P, N Shekar V Shet and K Chandrasekaran, “Energy efficient network architecture for IoT applications”, International Conference on Green Computing and Internet of Things (ICGCIoT), IEEE, pp. 784-789, 2015.
[9]. Hassan El Alami and Abdellah Najid, “Energy-Efficient Fuzzy Logic Cluster Head Selection in Wireless Sensor Networks”, IEEE, pp. 1-6, 2016.
[10]. Kaur, Navroop and Sandeep K Sood, “An energy-efficient architecture for the Internet of Things (IoT)”, IEEE Systems Journal, Vol. 11, Issue 2, pp. 796-805, 2017.
[11]. Santiago, S. and Arockiam, L., “ELT-EAPR: Expected Life Time of Energy Aware Parent Routing for IoT Networks”, International Journal of Pure and Applied Mathematics, Vol. 118, Issue 8, pp.243-249, 2018.
[12]. Santiago, S., A. Kumar, and L. Arockiam, "EALBA: Energy Aware Load Balancing Algorithm for IoT Networks", In Proceedings of the 2018 International Conference on Mechatronic Systems and Robots, ACM, pp. 46-50, 2018.
[13]. Santiago. S, Arockiam. L, “E2TBR: Energy-Efficient Transmission Based Routing for IoT Networks,” IJCSEITR, Vol.7, pp.93-100, 2017.
[14]. BJ.Hubert Shanthan, Dr.L.Arockiam, “LAHUBMAX Priority Based Meta Task Scheduling Algorithm in multicloud”, International Journal of Computer Sciences
Citation
S. Santiago, L. Arockiam, "Energy Aware Routing Framework for Internet of Things," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1870-1872, 2019.
Large Scale Short Text Analysis to Recognize Categories
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1873-1877, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.18731877
Abstract
Twitter is a miniaturized scale blogging service in which individuals share and talk about their contemplations and perspectives in 140 characters without being obliged by space and time. A huge number of tweets are produced every day on diverse issues. Social researchers network have distinguished a few connections and measurements that actuate homophily. Assessments or feelings towards various issues have been seen as a key measurement which describes human conduct. Individuals typically express their assumptions towards different issues. Diverse people from various strolls of social life may impart same insight towards different issues. At the point when these people constitute a gathering, such gatherings can be advantageously named same wavelength groups or gatherings. That is, same wavelength groups will be bunches framed on the premise of conclusions and suppositions of comparable tint towards different issues by various people. Such same wave length groups crucially associate the people in an important and intentional organization.
Key-Words / Index Term
Twitter, blogging, data, Politics
References
[1]. Balahur, A., Steinberger, R., Goot, E. V. D., Pouliquen, B., &Kabadjov, M. “Opinion mining on newspaper quotations” Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT`09. IEEE/WIC/ACM International Joint Conferences on (Vol. 3, pp. 523-526). IET.
[2]. David, MB, Andrew, YN & Michael IJ 2003, Latent Dirichlet Allocation , Journal of Machine Learning Research, vol. 3, pp.993-1022.
[3]. Sriram, B, David, F & Murat D 2010, Short Text Classification in Twitter to Improve Information Filtering ACM SIGIR, Geneva, Switzerland, pp. 841-842.
[4]. Bermingham and A. F. Smeaton, “ On using Twitter to monitor political sentiment and predict election results,” in n: Sentiment Analysis where AI meets Psychology (SAAIP) Workshop at the International Joint Conference for Natural Language Processing (IJCNLP), Chiang Mai, Thailand, 2011.
[5]. Potts, Christopher 2011, On the negativity of negation. In Proceedings of Semantics and Linguistic Theory 20, Ithaca, NY, CLC Publications, pp. 636-659.
[6]. Cambria, E & Hussain, A 2013, Sentic Computing: Techniques, Tools and applications Springer briefs in cognitive computation.
[7]. Pang, B & Lee, L 2008, ‘opinion mining and sentiment analysis’ Foundations and Trends in Information Retrieval, vol. 2, no. 1, pp. 1 135.
[8]. Abbasi, MA, Chai, S, liu, H & Sagoo, K 2012, Real -world behavior analysis through a social media : 5th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction (SBP 2012), USA, pp. 18-26.
[9]. Michal Skuza,Andrzej Romanowski, "Sentiment Analysis of Twitter Data within Big Data Distributed Environment for Stock Prediction", Computer Science and Information Systems pp. 1349– 1354, 2015 F230 ACSIS, Vol.5.
[10].Venkata Sasank Pagolu, Kamal Nayan Reddy Challa, Ganapati Panda,Babita Majhi, "Sentiment Analysis of Twitter Data for Predicting Stock Market Movements", International conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016.
[11].Tina Ding, Vanessa Fang, Daniel Zuo, "Stock Market Prediction based on Time Series Data and Market Sentiment", 2012.
[12]. Phillip Tichaona Sumbureru, "Analysis of Tweets for Prediction of Indian Stock Markets", International Journal of Science and Research (IJSR), Volume 4 Issue 8, August 2015.
[13]. Rishabh Soni, K. James Mathai, "Improved Twitter Sentiment Prediction through „Cluster-then-Predict Model‟", International Journal of Computer Science and Network, Volume 4, Issue 4, August 2015
[14]. Linhao Zhang, "Sentiment Analysis on Twitter with Stock Price and Significant Keyword Correlation", April 16, 2013.
Citation
Atul Agrawal, Omprakesh Singh, "Large Scale Short Text Analysis to Recognize Categories," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1873-1877, 2019.