Iterative Local Tangent Space Alignment with Adaptive Neighbourhood for Social Network Mining
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.259-265, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.259265
Abstract
High dimensional data is a function of feature space inputs and noise. This makes it difficult to analyse and visualize the data, specially, in case of social network analysis where the aim is to analyse user’s behaviour. Heterogeneous contents (text, audio, video, images etc.) make it more difficult to model. However, it is known that the actual feature vectors lie on much lower dimensions which can be obtained through non-linear manifold learning techniques. In this paper, we propose iterative local tangent space alignment with adaptive neighbourhood to extract the true low dimensional representation of data by sequentially aligning the tangent spaces and thereby reducing the overall reconstruction error. As the sub-manifold regions become linear, its neighbourhood size increases which leads to more information fusion. Extensive experiments on both synthetic and real world dataset proves that proposed method outperforms existing non-linear dimensionality reduction technique in both low dimensional representation and classification.
Key-Words / Index Term
Social Network Mining, Dimensionality reduction, Manifold learning, Local tangent space alignment, Adaptive neighbourhood
References
[1] S. Moro, P. Rita, and B. Vala, “Predicting social media performance metrics and evaluation of the impact on brand building: A data mining approach,” Journal of Business Research, vol. 69, no. 9, pp. 3341–3351, 2016.
[2] J. Surma and A. Furmanek, “Data mining in on-line social network for marketing response analysis,” in 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Oct 2011, pp. 537–540.
[3] L. del Carmen Contreras Chinchilla and K. A. R. Ferreira, “Analysis of the behavior of customers in the social networks using data mining techniques,” in 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Aug 2016, pp. 623–625.
[4] Hussain, Sadiq, et al. "Big data and learning analytics model." International Journal of Computer Sciences and Engineering 6.7 (2018): 654-663.
[5] T. Jia, M. Jian, L. Wu, and Y. He, “Modular manifold ranking for image recommendation,” in 2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM), Sep. 2018, pp. 1–5.
[6] W. Zhao, S. Tan, Z. Guan, B. Zhang, M. Gong, Z. Cao, and Q. Wang, “Learning to map social network users by unified manifold alignment on hypergraph,” IEEE Transactions on Neural Networks and Learning Systems, vol. 29, no. 12, pp. 5834–5846, Dec 2018.
[7] J. B. Tenenbaum, V. De Silva, and J. C. Langford, “A global geometric framework for nonlinear dimensionality reduction,” science, vol. 290, no. 5500, pp. 2319–2323, 2000
[8] L. K. Saul and S. T. Roweis, “An introduction to locally linear embedding.”
[9] M. Belkin and P. Niyogi, “Laplacian eigenmaps for dimensionality reduction and data representation,” Neural computation, vol. 15, no. 6, pp. 1373–1396, 2003.
[10] Z. Zhang and H. Zha, “Principal manifolds and nonlinear dimensionality reduction via tangent space alignment,” SIAM JOURNAL ON SCIENTIFIC COMPUTING, pp. 313–338, 2004.
[11] Vidya, G., and S. Omprakash. "Survey on Recent Researches on High Level Image Retrieval." International Journal of Computer Sciences and Engineering (2016): 72.
[12] C. Cortes and V. Vapnik, “Support-vector networks,” Machine learning, vol. 20, no. 3, pp. 273–297, 1995.
[13] P. Roy, S. Ghosh, S. Bhattacharya, and U. Pal, “Effects of degradations on deep neural network architectures,” arXiv preprint arXiv:1807.10108, 2018.
[14] H. Xiao, K. Rasul, and R. Vollgraf. (2017) Fashion-mnist: a novel image dataset for benchmarking machine learning algorithm.
Citation
S.K. Mishra, A. Agarwal, "Iterative Local Tangent Space Alignment with Adaptive Neighbourhood for Social Network Mining," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.259-265, 2019.
A Novel Digital Color Image Steganography using Discrete Wavelet Transform (Digital Color Image Steganography using DWT)
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.266-270, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.266270
Abstract
A novel color image steganography scheme based on discrete wavelet transforms (DWT) is proposed for better security. The proposed approach extracts R, G, and B planes from the color cover image. The DWT is applied on both secret image and RGB components of the cover image. The blocking process is applied to approximation coefficients of secret image and detail coefficients of RGB components of the cover image. The block of detail coefficients is replaced with approximation coefficient of secret image using root mean square error method. The key is used to store the position of best matching blocks. The proposed approach is compared with recently developed steganography technique. The experimental results reveal that the proposed approach improves the performance of steganography technique in terms of Peak Signal to Noise Ratio value. The stegano image has good visual quality also.
Key-Words / Index Term
Color image steganography, Discrete wavelet transforms, PSNR
References
[1] V. Kumar, and D. Kumar, “Digital image steganography based on combination of DCT and DWT” (Ed. V. V. Das and R. Vijaykumar), Information and Communication Technologies, Kochi, Kerala, 2010
[2] T.Y. Liu and W. H. Tsai, “A New Steganography method for data hiding in Microsoft Word documents by a Change Tracking Technique”, IEEE Transaction on information Forensics and Security 2(1), 2007 , 24–30 .
[3] A. A. Abdelwahab and L. Hasna, “A Discrete Wavelet Transform based Technique for Image Data Hiding”, In: National Radio Conference, Egypt, 2008, pp.1–9.
[4] C.K. Chan and L.M. Cheng, “Hiding data in image by simple LSB substitution”, Pattern Recognition 37, 2003, 469– 471.
[5] A. Sinha and K. Singh, “A technique for image encryption using digital signature”, Optics Communications 218(4), 2003, 229–234.
[6] D. Fatiha, A. Beghdad, M. K. Abed and H. Habib, “Comparative Study of Digital audio Steganography Technique”, EURASIP on Audio, Speech and Music Processing 2012, 2012:25.
[7] L.G. Baisa and N.M. Suresh, “MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain”, SpringerPlus 4:126, 2015, DOI 10.1186/s40064-015-0904-z.
[8] B. Ali, B. Khier and B. Noureddine, “Blind Image Watermarking Technique Based on Differential Enbedding in DWT and DCT domains”, Benoraira et. al. EURASIP on Advances in Signal Processing 2015:55, 2015, DOI 10.1186/s13634-015- 0239-5.
[9] R.T. McKeon, “Steganography Using the Fourier Transform and Zero- Padding Aliasing properties”, IEEE International Conference on Electro/
Information Technology, 2006, pp. 492–497.
[10] Dinesh Kumar and Vijay Kumar, “Improving the Performance of Color Image Watermarking Using Contourlet Transform”, Advances in Computer Science and Information Technology, LNCS-CCIS, vol 131. Springer-Verlag, Berlin, 2011, pp.256-264.
[11] W. Wioletta andE.O. Marek, “Biometric watermarks based on face recognition methods for authentication of digital images”, Wiley online library, 2014, DOI : 10. 1002/sec. 1114.
[12] M. Ghebleh and A. Kanso, “A robust chaotic algorithm for digital image steganography”, Commun Nonlinear Sci Numer Simult 19, 2014, 1898-1907.
[13] G. Neha and S. Nidhi, “DWT and LSB based Audio Steganography”, International Conference on Reliability, Optimization and Information Technology – ICROIT, 2014.
[14] I. Rashedul, S. Ayasha, U. Palash, K.M. Ashis and H. Delowar, “An Efficient Filtering based approach improving LSB image steganography using status bit along with AES cryptography”, International Conference on Informatics, Electronics and Vision 2014.
[15] S.E. Jero, R. Palaniappan and S. Ramakrishnan, “Discrete Wavelet Transform and Singular Value Decomposition based ECG steganography for secured patient information transmission”, J Med Syst, vol. 38, pp. 2014
[16] H.R. Kanan and B. Nazeri, “A novel image steganography scheme with high embedding capacity and tunable visual Image quality based on a genetic algorithm,” Expert Systems with Applications, 2014
[17] L.S. Hwan, “DWT based coding DNA watermarking for DNA copyright protection”, Information Sciences, 273, 2014, 263-286.
[18] O. Duanhao and S.Wei, “High payload image steganography with minimum distortion based on absolute moment block truncation coding”, Multimed Tools Appl,
[19] P. J. Shyang, L. Wei, Y. C. Sheng and Y.L. Jun, “Image steganography based on subsampling and compressive sensing”, Multimed Tools Appl.
[20] F. Asna and K. Munish, “Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique using MATLAB”, IEEE International Conference on Computational Intelligence and Communication Technology, 2015
Citation
A. Goel, V. Deswal, S. Chhabra, "A Novel Digital Color Image Steganography using Discrete Wavelet Transform (Digital Color Image Steganography using DWT)," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.266-270, 2019.
Predicting the Birth of Healthy Babies with Gestation Period Observations using Machine Learning Algorithms
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.271-275, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.271275
Abstract
Machine learning is the most familiar division of Artificial Intelligence to perform exploratory data analysis tasks and to work out a variety of problems such as weather forecasting, drug discovery, encrypted image detection etc., This paper discusses about varieties of data mining classification algorithms that are commonly used to extract considerable knowledge from huge volumes of data. Identification of the healthiness of a baby with the observations during the gestation period of a mother requires various parameters to be taken into consideration during that period. Decision Tree (DT) algorithms could be very much helpful in predicting the healthiness of a baby. The numerical form of the data sets are taken and are fed to the DT algorithms to make calculations for the prediction of the healthiness of the baby. The data sets are taken and analyzed in the Waikato Environment for Knowledge Analysis (WEKA) platform.
Key-Words / Index Term
Data Mining, Knowledge Discovery, Classification Algorithms, WEKA
References
[1]J. Han and M. Kamber. “Data Mining: Concepts and Techniques”, Morgan Kaufmann, 2000.
[2]G. Piatetsky-Shapiro, U. M. Fayyad, and P. Smyth, “From data mining to knowledge discovery: An overview”. In U.M. Fayyad, et al. eds.), Advances in Knowledge Discovery and Data Mining, 1-35. AAAI/MIT Press, 1996.
[3]Eibe Frank, Mark A. Hall, and Ian H. Witten (2016), “ The WEKA Workbench. Online Appendix for "Data Mining: Practical Machine Learning Tools and Techniques", Morgan Kaufmann, Fourth Edition, 2016.
[4] George H. John and Pat Langley, “Estimating continuous
distribution in Bayesian Classifier”, In the proceedings of
the Eleventh conference on uncertainty in Artificial Intelligence,Morgan Kaufmann Publishers, San Mateo, 1995.
[5] WayneIba; and Pat Langley,(1992); Induction of One-Level Decision Trees, in ML92: Proceedings of the Ninth International Conference on Machine Learning, Aberdeen, Scotland, 1–3 July 1992, San Francisco, CA: Morgan Kaufmann, P.233–240.
[6] J.Ross Quinlan, “Programs for Machine Learning”, Edited by Morgan Kaufmann Publishers,Inc.,1993.
[7] Leo Breiman, “Random Forests Machine Learning” 45(1):5-32; (2001).
[8] Cutler.A, “Fast Classification Using Perfect Random Trees”, TechnicalReport5/99/99, Department of Mathematics and Statistics, Utah State University, May 1999.
[9] Scott S. Emerson, M.D., Ph.D. Professor of Biostatistics Department of Biostatistics, University of Washington, Emerson Statistics: Datasets and Documentation .
Citation
K. Menaka, B. KeerthanaKani, "Predicting the Birth of Healthy Babies with Gestation Period Observations using Machine Learning Algorithms," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.271-275, 2019.
Detection of the Sickle Cell Anaemia disease by simple and efficient way
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.276-279, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.276279
Abstract
Through the proposed method it can be clearly known that a human being (specially a human baby) is suffering from sickle cell anaemia or not by a fast and efficient way. This disease is caused by mutation of the gene controlling Beta-chain of haemoglobin (Hb). It replaces Glutamic acid (GAG) present at 6th position of the Beta-chain by Valine (GTG). The mutant haemoglobin molecule undergoes polymerization under low Oxygen tension causing the change in the shape of the RBC from biconcave disc to elongated Sickle-like structure. With the help of this test, it can be known that a human is a Mutant of this disorder or not, which can save the life of new generation.
Key-Words / Index Term
Beta chain of Haemoglobin, Glutamic acid, Valine
References
[1] Baldi P and Brunak S (1998) Bioinformatics: The Machine Learning Approach, MITPress, Cambridge, MA.
[2] Athey J, Alexaki A, Osipova E, Rostovtsev A, Santana-Quintero LV, Katneni U, Simonyan V, Kimchi-Sarfaty C (2017) A new and updated resource for codon usage tables. BMC Bioinformatics Sept 2, 2017.
[3] Chaney JL, Clark PL (2015) Roles for Synonymous Codon Usage in Protein Biogenesis. Annu Rev Biophys, 2015 Feb 26.
[4] Hecht A, Glasgow J, Jaschke PR, Bawazer LA, Munson MS, Cochran JR, Endy D, Salit M (2017) Measurements of translation initiation from all 64 codons in E.coli : Nucleic Acids Research Apr 20, 2017.
[5] Collins FS, Green ED, Guttmacher AE, Guyer MS, U.S. National Human Genome Research Institute. A vision for the future of genomics research. Nature 2003;422:835– 47.
[6] Strouse J (2016), Sickle Cell disease. Handbook of clinical Neurology 2016; 138:311-24.
[7] 7. Roses AD. Pharmacogenetics and the practice of medicine. Nature 2000;405:857.
[8] Williams RSaG.-C PJ. The genetics of cardiovascular disease: from genotype to phenotype. Dialogues in Cardiovascular Medicine 2004; 9:3–19.
[9] Guttmacher AE, Collins FS. Genomic medicine—a primer. N Engl J Med 2002;347:1512–20.
[10] Cook SA, Rosenzweig A. DNA microarrays: implications for cardiovascular medicine. Circ Res 2002;91:559 – 64.
[11] Goldsmith ZG, Dhanasekaran N. The microrevolution: applications and impacts of microarray technology on molecular biology and medicine (review). Int J Mol Med 2004;13:483–95.
[12] Napoli C, Lerman LO, Sica V, Lerman A, Tajana G, de Nigris F. Microarray analysis: a novel research tool for cardiovascular scientists and physicians. Heart 2003;89:597– 604
[13] Patino WD, Mian OY, Kang JG, et al. Circulating transcriptome reveals markers of atherosclerosis. Proc Natl Acad SciUSA 2005;102: 3423– 8.
[14] van de Vijver MJ, He YD, van’t Veer LJ, et al. A gene-expression signature as a predictor of survival in breast cancer. N Engl J Med 2002;347:1999 –2009.
[15] Bild AH, Yao G, Chang JT, et al. Oncogenic pathway signatures in human cancers as a guide to targeted therapies. Nature 2006;439: 353–7.
[16]. Berchuck A, Iversen ES, Lancaster JM, et al. Patterns of gene expression that characterize long-term survival in advanced stage serous ovarian cancers. Clin Cancer Res 2005;11:3686 –96.
Citation
Anindya Sundar De, "Detection of the Sickle Cell Anaemia disease by simple and efficient way," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.276-279, 2019.
Implementation of ORB and Object Classification using KNN and SVM Classifiers
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.280-285, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.280285
Abstract
Object identification and classification has been topic of interest for researchers in computer vision due to its numerous applications in various domains since decades. But object detection and classification faces certain issues and challenges like scaling variations, rotational variations, occlusion, noise etc. Hence, there is need to design descriptors which are robust, compact and efficient. The extraction of features and the classification process should be done with minimal compromises in the performances. This paper proposes an orientation and rotation invariant feature descriptor named as ORB (Oriented FAST and Rotated BRIEF). This feature vector computes scale, rotation and translation invariant features for the test and trainee images. For matching the computed feature sets we used supervised classification method i.e. K-Nearest Neighbors Algorithm (K-NN) and Support Vector Machine (SVM) for the classification of various object categories in the dataset. Comparative experimental results based on analysis of the SVM and KNN classifiers on the basis of recognition accuracy and execution time is given. Results show that SVM gives better matching score whereas KNN is time efficient in comparison to SVM.
Key-Words / Index Term
ORB, K-Nearest Neighbour Classifier, SVM, Object Recognition and Classification
References
[1] Mikolajczyk, K.; Schmid, C., "A performance evaluation of local descriptors," in Computer Vision and Pattern Recognition, Proceedings. 2003 IEEE Computer Society Conference on , vol.2, 18-20 June 2003, pp.II-257-II-263 .
[2] Tinne Tuytelaars and Krystian Mikolajczyk,"Local Invariant Feature Detectors: A Survey", Foundations and Trends® in Computer Graphics and Vision: Vol. 3: No. 3, 2008, pp 177-280.
[3] C. Harris., M Stephens, “A combined corner and edge detector”, Alvey Vision Conf, pp. 147 – 151, 1988.
[4] E. Rosten, R. Porter and T. Drummond, FASTER and better:A machine learning approach to corner detection, IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 32, pp.105-119, 2010.
[5] Lowe, D.G.: ‘Distinctive image features from scale-invariant keypoints’, International Journal of Computer Vision., 60, (2), pp. 91 – 110, 2004.
[6] Bay, H., Ess, A., Tuytelaars, T., Gool, L.V.: ‘Surf – speeded up robust features’, Computer Vision and Image Understanding, 110, (3), pp. 346 – 359, 2008.
[7] Ke, Y., and Sukthankar, R., "PCA-SIFT: A More Distinctive Representation for Local Image Descriptors", Computer Vision and Pattern Recognition, 2004.
[8] M. Calonder, V. Lepetit, M. Ozuysal, T. Trzcinski, C. Strecha, and P. Fua, "BRIEF: Computing a local binary descriptor very fast," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 34, no. 7, pp. 1281-1298, July 2012.
[9] S. Leutenegger, M. Chli, and R. Siegwart, "BRISK: Binary robust invariant scalable keypoints," in Computer Vision (ICCV), IEEE International Conference on, pp. 2548 -2555, Nov. 2011.
[10] S. Saha and V. Demoulin, "ALOHA: An efficient binary descriptor based on haar features," in Image Processing (ICIP), 2012 19th IEEE International Conference on, pp. 2345-2348, 2012.
[11] A. Alahi, R. Ortiz, and P. Vandergheynst, “FREAK: Fast Retina Keypoint”, In Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2012, pp. 510-517.
[12] E. Rublee, V. Rabaud, K. Konolige, and G. R. Bradski, “ORB: An efficient alternative to SIFT or SURF”, in Proc. ICCV, 2011, pp. 2564–2571.
[13] Bremner D, Demaine E, Erickson J, Iacono J,Langerman S, Morin P, Toussaint G, Outputsensitive algorithms for computing nearestneighbor decision boundaries, Discrete and Computational Geometry, 2005, pp. 593–604.
[14] Cover, T., Hart, P. , Nearest-neighbor pattern classification, Information Theory, IEEE Transactions on, Jan. 1967, pp. 21-27.
[15] LI LiLi, ZHANG YanXia and ZHAO YongHeng, “K-Nearest Neighbors for automated classification of celestial objects,” Science in China Series G-Phys Mech Astron, Vol.51, no.7, July 2008, pp. 916- 922.
[16] The PASCAL Visual Object Classes (VOC) Challenge Everingham, M., Van Gool, L., Williams, C. K. I., Winn, J. and Zisserman,A. International Journal of Computer Vision, 88(2), 2010, pp. 303-338.
[17] Zhang, J., Marszałek, M., Lazebnik, S., & Schmid, C. (2007). Local features and kernels for classification of texture and object categories: A comprehensive study. International journal of computer vision, 73(2), 213-238.
[18] Maji, S., Berg, A. C., & Malik, J. (2008, June). Classification using intersection kernel support vector machines is efficient. In 2008 IEEE Conference on Computer Vision and Pattern Recognition (pp. 1-8). IEEE.
[19] Sun, Z., Bebis, G., & Miller, R. (2004). Object detection using feature subset selection. Pattern recognition, 37(11), 2165-2176.
[20] Lin, Y., Lv, F., Zhu, S., Yang, M., Cour, T., Yu, K., ... & Huang, T. (2011, June). Large-scale image classification: fast feature extraction and svm training. In CVPR 2011 (pp. 1689-1696). IEEE
[21] Rani, R., Kumar, R., & Singh, A. P. (2016, January). A Comparative Study of Object Recognition Techniques. In 2016 7th International Conference on Intelligent Systems, Modelling and Simulation (ISMS) (pp. 151-156). IEEE.Rani,
[22] R., Kumar, R., & Singh, A. P. (2018). An empirical evaluation of translational and rotational invariance of descriptors and the classification of flower dataset. Pattern Analysis and Applications, 21(1), 1-18.
[23] Rani, R., Kumar, R., & Singh, A. P. (2016, September). An empirical evaluation of local descriptors in object recognition. In 2016 international conference on advances in computing, communications and informatics (ICACCI) (pp. 1517-1521). IEEE.
Citation
Ritu Rani, Ravinder Kumar, Amit Prakash Singh, "Implementation of ORB and Object Classification using KNN and SVM Classifiers," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.280-285, 2019.
Application of Machine Learning Algorithm for Predicting Students Skill
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.286-290, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.286290
Abstract
The accurate prediction of student cognitive skill is important, for improving student academic performance.In this paper, a model is proposed to predict the students’ performance in an academic organization. A machine learning algorithm Naïve Bayes is used for prediction. Further, the importance of different cognitive factor is considered, in order to determine which of these are correlated with student performance. Result proves that Naïve Bayes algorithm provides more accuracy over other methods for comparison and prediction.
Key-Words / Index Term
Cognitive skills, Students’ performance, Machine learning, Naïve Bayes
References
[1] Y. Wang, Y. Wang, S. Patel, and D. PatelA, "LayeredReference Model of the Brain (LRMB)," IEEETransactions on Systems, Man, and Cybernetics Part C:Applications and Reviews, vol. 36, March 2006.
[2] -F. Rodriguez, F. Ramos, and Y. Wang, "CognitiveComputational Models of Emotions," presented at theCognitive Informatics & Cognitive Computing (lCCI*CC), 2011 10th IEEE International Conference on, 2011.
[3] Y. Wang, Y. Wang, S. Patel, and D. Patel A, "LayeredReference Model of the Brain (LRMB)," IEEETransactions on Systems, Man, and Cybernetics Part C:Applications And Reviews, vol. 36, March 2006.
[4] L.-F. Rodriguez, F. Ramos, and Y. Wang, "CognitiveComputational Models of Emotions," presented at theCognitive Informatics & Cognitive Computing (ICCI*CC), 2011 10th IEEE International Conference on, 2011.
[5] A. J. Karran, S. Fairclough, and K. Gilleade, "AFramework for Psychophysiological Classification withina Cultural Heritage Context Using Interest," ACMTransactions on Computer-Human Interaction, Vol. 21,No. 6, Article 34, Publication date: January 2015.
[6] G. Matthews, J. Carlos P. Gonzalez, A. N. Fellner, G. J.Funke, A. K. Emo, M. Zeidner, and R. D. Roberts,"Individual Differences in Facial Emotion Processing:167Trait Emotional Intelligence, Cognitive Ability, or
Transient Stress?," Journal of Psycho-educationalAssessment 2015, Vol. 33(1) 68-82
[7] Ruth A. Lamont, Hannah J. Swift, and Dominic Abrams,"A Review and Meta-Analysis of Age-Based StereotypeThreat: NegativeStereotypes, Not Facts, Do the Damage,"Psychology and Aging 2015 http://dx.doi.org/10.1037/a0038586.
[8] P. Winkielman, P. Niedenthal, J. Wielgosz, J. Eelen, andL. C. Kavanagh,"Embodiment of Cognition and Emotion," 2015 by the American Psychological Association
http://dx.doi.org/1O.1037/14341-004.
[9] J. M. Tien and J. P. Burnes, "On the Perceived Speed ofTime Over Time," presented at the Systems, Man, andCybernetics, 2000 IEEE International Conference on,Nashville, TN, 2000.
[10] A.-A. Samadani and Z. Moussavi, "The Effect of Aging onHuman Brain Spatial Processing Performance," presentedat the 34th Annual International Conference of the IEEEEMBS, San Diego, California USA, 2012.
[11] D. C. Park, "The basic mechanisms accounting for agerelateddecline in cognitive function," in Cognitive aging:
A primer ii, ed, 2000, pp. 3-19.
[12] C. Ayoub, E. O`Connor, G. Rappolt-Schlictmann, C.Vallotton, H. Raikes, and R. Chazan-Cohen, "Cognitiveskill performance among young children living in poverty:Risk, change, and the promotive effects of Early HeadStart," Early Childhood Research Quarterly., vol. 24, pp.289-305, 2009.
[13] Y. Jing, S. Jing, C. Huajian, S. Chuangang, and L. Yan,"The gender difference in distraction of background musicand noise on the cognitive task performance," presentedat the Natural Computation (ICNC), 2012 EighthInternational Conference on, Chongqing, 2012.
[14] D. Mokeddem, and H.Belbachir, Distributedclassification using class-association rules miningalgorithm`," `Book Distributed classification classassociation rules mining algorithm`(lEEE, edn.), pp334-337.
[15] S. Nasehi and H. Pourghassem, "Optimal EEG-basedEmotion Recognition Algorithm Using GaborFeatures," WSEAS Transactions on Signal Processing,vol. 8, July 2012.
[16] Sz. L. T6th I, D. Sztah61, K. Vicsi I, "Speech EmotionPerception by Human and Machine," Laboratoryof Speech Acoustics, Budapest University of Technology and Economics, Department of Telecommunications andMedia Informatics, Stoczek u. 2, 1111 Budapest, Hungary.
Citation
J.Suganya, T. Chakravarthy, "Application of Machine Learning Algorithm for Predicting Students Skill," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.286-290, 2019.
An Efficient Virtual Machine Management to Achieve Energy Efficiency in Cloud Computing
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.291-296, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.291296
Abstract
Cloud computing has revolutionized the information technology industry by empowering versatile on-demand provisioning of computing resources. Rapid growth of demand for computational power by scientific, business and web applications has led to the creation of large scale data centers consuming enormous amounts of electrical power. How to exert energy and handle the issue concerned with energy efficiency has been the most important matter of Green Cloud Computing. This research presents the novel technique and algorithm for the Efficient Virtual Machine Management to achieve energy efficiency. Proper Virtual Machine Management is done by proper VM allocation. The overloaded host detection, VM selection, VM placement and at last under loaded host detection are four major steps carried out throughout the research. This is aimed for saving the energy and makes the virtual machine management efficient. According to the proposed work when any of the host will be shut down at the end of process the energy will not be used more and it will be saved.
Key-Words / Index Term
Virtual Machine Management, Virtual machine, Cloud Computing, Virtualization, Power Consumption
References
[1]. National Institute of Standards and Technology. The NIST definition of cloud computing. http://www.nist.gov/itl/cloud/
[2]. R. Buyya, C. Yeo, S. Venugopal, J. Broberg and I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems 25 (6) pp. 599– 616, 2009.
[3]. Abaslom Et-Shamir Ezugwu, Sahalu Junaidu, Seyed Buhari,”Virtual Machine Allocation in Cloud Computing” International Journal of Cloud Applications and Computing, 3(2), 47-60, April-June 2013
[4]. Shin-ichi Kuribayashi” Reducing Total Power Consumption Method in Cloud Computing Environments” International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.2, March 2012
[5]. HarmanPreet Kaur, Jasmeet Singh Gurm,” A Survey on the Power and Energy Consumption of Cloud Computing” International Journal of Computer Science Trends and Technology (IJCST) – Volume 3 Issue 3, May-June 2015
[6]. Rakesh Kumar Vishwarkarma1 , Dr. Syed Imran Ali2 , Anidra Katiyar” Energy Efficient Dynamic Resource Scheduling for Cloud Data Center” International Journal of Recent Development in Engineering and Technology (ISSN 2347-6435(Online) Volume 5, Issue 7, July 2016)
[7]. Yen, J.-L Yang, M.-J- Yang, Chao-Tung,” Power-Saving Management for Energy-Efficient Green Clouds ” 2014/05/01, 381, 389, Journal of Internet Technology, 15 10.6138/JIT.2014.15.3.07
[8]. Olayinka Adeleye” Energy Efficient Virtual Machine Management for Cloud Computing: A Survey” Department of Computer Engineering Federal University Oye-Ekiti, Nigeria International Journal of Scientific & Engineering Research, Volume 6, Issue 11, November-2015
[9]. Anton Beloglazov and Rajkumar Buyya” Energy Efficient Resource Management in Virtualized Cloud Data Centers” cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of Computer Science and Software Engineering The University of Melbourne, Australia
[10]. Chao-Tung Yang,, Jung-Chun Liu, Kuan-Lung Huang, Fuu-Cheng Jiang” A method for managing green power of a virtual machine clustering cloud” Department of Computer Science, Tunghai University, Taichung 40704,taiwan Future Generation Computer Systems 37 (2014) 26–36
[11]. Anton Benglov and Rajkumar Bhuya, “Optimal Online Deterministic Algorithms and Adaptive Heuristics for Energy and Performance Efficient Dynamic Consolidation of Virtual Machines in Cloud Data Centers” DOI: 10.1002/cpe.1867
[12]. Anup H. Gade Shri Ram Institute of Technology, Jabalpur” A Survey paper on Cloud Computing and its effective utilization with Virtualization” International Journal of Scientific & Engineering Research, Volume 4, Issue 12, December-2013
Citation
Nital Patel, Nimisha Patel, Rajan Patel, "An Efficient Virtual Machine Management to Achieve Energy Efficiency in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.291-296, 2019.
Detection of Sink Hole Attack Using Decision Tree in Manet
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.297-302, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.297302
Abstract
Mobile Ad-hoc network (MANET) is an ad-hoc wireless network with a routing network background typically located at the top of a link layer of the network. For the transmission of data routing protocols plays an essential role. Since the topology in MANET is not stable (nodes are moving) therefore routing as well as maintenance of the network is a challenging task. The difficulty that most of the researchers have analyzed is the energy consumed by the sensor nodes. The first problem of this research is to find a trust-based route so that the network can be protected against any additional cost used during the searching of an appropriate node. For this purpose, the Zone Routing Protocol (ZRP) routing mechanism with the concept of Artificial Bee Colony (ABC) algorithm has been used. Another problem that has been considered in this research is to protect the network from external attacks named as sinkhole attack. These attacks are also known as smart attack, as, when these attacks came into the network the sensor nodes do not know that whether the data is transmitted to the genuine node or to the malicious node. Therefore to resolve this problem, machine learning approach named as decision tree is used. The performance parameters are evaluated to measure the efficiency of the network. It has been determine that the Packet Delivery Ratio (PDR) of the proposed system has been increased by 1.19% compared to the existing work.
Key-Words / Index Term
MANET, OLSR, ABC, Decision tree, sinkhole attack
References
[1] K. Agarwal, LK. Awasthi, “Enhanced AODV routing protocol for ad hoc networks,” InNetworks, ICON, 16th IEEE International Conference, pp. 1-5, 2008.
[2] A. Hinds, M. Ngulube, S. Zhu, H. Al-Aqrabi, “A review of routing protocols for mobile ad-hoc networks (manet),” International journal of information and education technology. Vol. 3, No.1, 2013.
[3] A. Al-Maashri, M. Ould-Khaoua, “ Performance analysis of MANET routing protocols in the presence of self-similar traffic,” InLocal Computer Networks, Proceedings 2006 31st IEEE Conference, pp. 801-807, 2006.
[4] A. Bagwari, & R. Jee, “The Criteria Require for Cluster Head Gateway Selection in Integrated Mobile Ad hoc Network,” International Journal of Engineering Science and Technology (IJEST), 2011.
[5] A. Khandakar, “ Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol,” In International Proceedings of Computer Science & Information Tech , Vol. 40, No. 12, 2012.
[6] P. K. Sahu, B. Acharya, & N. Panda, “QoS Based Performance Analysis of AODV and DSR Routing Protocols in MANET,” In 2018 2nd International Conference on Data Science and Business Analytics (ICDSBA), pp. 221-225, 2018.
[7] Y. Jahir, M. Atiquzzaman, H. Refai, A. Paranjothi, & P. G. LoPresti, “Routing protocols and architecture for Disaster Area Network: A survey,” Ad Hoc Networks, Vol. 82, pp.1-14, 2019.
[8] Z. J. Haas, & M. R. Pearlman, “The performance of query control schemes for the zone routing protocol,” IEEE/ACM Transactions on networking, Vol.9, no. 4, pp.427-438, 2001.
[9] N. J. K. Patel, & K. Tripathi, “Trust Value based Algorithm to Identify and Defense Gray-Hole and Black-Hole attack present in MANET using Clustering Method, International Journal of Scientific Research in Science, Engineering and Technology, Vol.4, Issue 4, pp. 281-287, 2018.
[10] X. M. Zhang, Y. Zhang, F. Yan, & A. V. Vasilakos, “Interference-based topology control algorithm for delay-constrained mobile ad hoc networks,” IEEE Transactions on Mobile Computing, Vol. 14, No.4, pp.742-754, 2015.
[11] S. Chatterjee, & S. Das, “Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-hoc network,”. Information Sciences,Vol.295,pp. 67-90, 2015.
[12] A. K. Jain, & V. Tokekar, “Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks,” In Pervasive computing (ICPC), 2015 international conference, pp. 1-6, 2015.
[13] A. S. Chouhan, V. Sharma, U. Singh, & R. Sharma, “A modified AODV protocol to detect and prevent the wormhole usingh using hybrid technique,” In Electronics, Communication and Aerospace Technology (ICECA), 2017 International conference , Vol. 2, pp. 621-625, 2017.
[14] S. Brar, & M. Angurala, “Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with Multiple Swarms,” International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, issue10, pp.424-429, 2017.
[15] J. Gupta, “Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET,” In Signal Processing, Computing and Control (ISPCC), 2017 4th International Conference, pp. 356-361, 2017.
[16] I. J. Jebadurai, E. B. Rajsingh, & G. J. L. Paulraj, “A Novel Node Collusion Method for Isolating Sinkhole Nodes in Mobile Ad Hoc Cloud,” In Advances in Big Data and Cloud Computing Springer, Singapore, pp. 319-329, 2018.
[17] R. Kalucha, & D. Goyal, “A review on artificial bee colony in MANET,” International Journal Computer Science Mobile Comput.,Vol. 3, no.7, pp.34-40, 2014.
[18] P. Visu, J. Janet, E. Kannan, & S. Koteeswaran,, “Optimal energy management in wireless adhoc network using Artificial Bee Colony based routing protocol,” European Journal of Scientific Research, Vol. 74, No. 2, pp.301-307, 2012.
[19] Y. Freund, & L. Mason, “The alternating decision tree learning algorithm,” In icml , Vol. 99, pp. 124-133, 1999.
Citation
Rohit.Wandra, Parveen Kumar, Anita Suman, "Detection of Sink Hole Attack Using Decision Tree in Manet," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.297-302, 2019.
A Cloud-Based Smart Traffic Management in the Internet-of-Things (IoT) Environment
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.303-309, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.303309
Abstract
Traffic on public roads all over the world is a crucial problem and is becoming a major pretend to conclusion makers. Urban region have a great stack of traffic jams. Cloud computing is turning a good engineering to provide a potent and scalable computing at low cost. This paper proposes a cloud-controlled smart traffic management system based on Internet-of-Things (IoT). The proposed system collects vehicle count at various roads with the help of RFID receivers and uses this data to manage traffic efficiently. It will be capable of overcoming all the pain points observed with minimum cost and best-in-class quality of services.
Key-Words / Index Term
Traffic Management, Cloud Computing, Internet of Things (IoT), Radio-frequency identification (RFID), Service Oriented Architecture (SOA)
References
[1] Geoffrey Raines, “Cloud Computing and SOA”. Systems Engineering at MITRE Service-Oriented Architecture Series.
[2] Geoffrey Raines, “Cloud Computing and SOA”. Systems Engineering at MITRE Service-Oriented Architecture Series.
[3] Arun.V, Dr.M.Poongothai, ” Implementation of IoT Based Intelligent Transportation System”, Asian Journal of Applied Science and Technology, Vol. 2, Issue. 2, pp.933 – 946, 2018.
[4] Hon Fong Chong, Danny Wee Kiat Ng, “Development of IoT Device for Traffic Management System”, IEEE Student Conference on Research and Development (SCOReD), Malaysia, 2016, ISBN 9781-5090-2948-8
[5] Jan Vascak, Jakub Hvizdos† and Michal Puheim, “Agent-Based Cloud Computing Systems for Traffic Management”, International Conference on Intelligent Networking and Collaborative Systems (INCoS), Czech Republic, 2016, ISBN 978-1-5090-4124-4
[6] Maram Bani Younes, Azzedine Boukerche, “An Intelligent Traffic Light Scheduling Algorithm Through VANETs”, 39th Annual IEEE Conference on Local Computer Networks Workshops, Canada, 2014, ISBN 978-1-4799-3784-4
[7] Aiswaria. Mohan, Janet Lourds. Rani, “An Intelligent Algorithm for Traffic Signal Scheduling”, International Journal of Chemical, Environmental & Biological Sciences (IJCEBS), Vol. 1, Issue. 1, pp.119 – 123, 2013
[8] Wu He, Gongjun Yan, and Li Da Xu, “Developing Vehicular Data Cloud Services in the IoT Environment”, IEEE Transactions on Industrial Informatics, Vol. 10, Issue. 2, pp.1587 – 1595, 2014
Citation
Sravya E U, Jisha George A, "A Cloud-Based Smart Traffic Management in the Internet-of-Things (IoT) Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.303-309, 2019.
Designing The Code Snippets for Experiments on Code Comprehension of Different Software Constructs
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.310-318, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.310318
Abstract
The concept of Basic control structure (BCS) of software and their cognitive weights have been proposed in theory. However not much work has been done to validate weights assigned to various programming constructs. One of the primary reasons for same is that it is difficult to design the experiment to measure the mental effort involved in understanding the effect of various programming constructs and their interplay. The paper discusses some of the challenge involved in setting up such psychological experiment. In such experiments we cannot select and compare any random code snippets of various programming constructs- the variations are endless. We identified different approaches to conduct such experiments. We explained with example various factors and issues involved in selecting the code snippets which resulted in minimum variations in code snippets of various programming constructs, other than that is inherent in syntax. The code snippets design approach proposed here can be used to conduct series of psychological experiments in software studies. We need series of such experiments not only to validate the cognitive weights of different programming constructs, but also it will go long way in having robust metrics for software complexities. These types of experiments can be extremely useful in the field of computer science education in understanding the cognitive load required for learning the concepts of programming languages.
Key-Words / Index Term
Software Complexity;Code complexity;Code Comprehension; Cognitive Weights;Basic control structure;cognitive metrics;Cognitive load; Software Experimentation; computer science education; Code snippets;human brain working
References
[1] T. J. McCabe, “A Complexity Measure,” IEEE Trans. Softw. Eng., vol. SE-2, no. 4, pp. 308–320, 1976.
[2] J. Shao and Y. Wang, “A new measure of software complexity based on cognitive weights,” Can. J. Elect. Comput. Eng., vol. 28, no. 2, pp. 1–6, 2003.
[3] Y. Wang, “Cognitive Complexity of Software and its Measurement,” in 5th IEEE International Conference on Cognitive Informatics, 2006, pp. 226–235.
[4] Y. Wang and S. Patel, “IJSSCI-1201-CogFundSE.pdf,” Int. J. Softw. Sci. Comput. Intell., vol. 1, no. June, pp. 1–19, 2009.
[5] O. Esther, O. Stephen, O. Elijah, A. Rafiu, T. Dimple, and Y. Olajide, “Development of an Improved Cognitive Complexity Metrics for Object- Oriented Codes,” Br. J. Math. Comput. Sci., vol. 18, no. 2, pp. 1–11, Jan. 2016.
[6] A. K. Jakhar and K. Rajnish, “A new cognitive approach to measure the complexity of software’s,” Int. J. Softw. Eng. its Appl., vol. 8, no. 7, pp. 185–198, 2014.
[7] D. De Silval and N. Kodagoda, “Improvements to a Complexity Metric : CB Measure,” in IEEE 10th International Conference on Industrial and Information Systems, ICIIS 2015, 2015, pp. 401–406.
[8] S. Misra, A. Adewumi, L. Fernandez-Sanz, and R. Damasevicius, “A Suite of Object Oriented Cognitive Complexity Metrics,” IEEE Access, vol. 6, no. January, pp. 8782–8796, 2018.
[9] S. Misra, A. Adewumi, R. Damasevicius, and R. Maskeliunas, “Analysis of Existing Software Cognitive Complexity Measures,” Int. J. Secur. Softw. Eng., vol. 8, no. 4, pp. 51–71, Oct. 2017.
[10] V. Gruhn and R. Laue, “On Experiments for Measuring Cognitive Weights for Software Control Structures,” in 6th IEEE International Conference on Cognitive Informatics, 2007, no. September 2007, pp. 116–119.
[11] D. J. Adamo, “An Experiment to Measure the Cognitive Weights of Code Control Structures.” pp. 1–16, Jul-2014.
[12] M. E. Hansen, A. Lumsdaine, and R. L. Goldstone, “An experiment on the cognitive complexity of code,” in Proceedings of the Thirty-Fifth Annual Conference of the Cognitive Science Society, 2013.
[13] H. Sackman, W. J. Erikson, and E. E. Grant, “Exploratory experimental studies comparing online and offline programming performance,” Communications of the ACM, vol. 11, no. 1, pp. 3–11, Jan-1968.
[14] B. T. Mynatt, “The effect of semantic complexity on the comprehension of program modules,” Int. J. Man-Machine Stud., vol. 21, pp. 91–103, 1984.
[15] E. R. Iselin, “Conditional statements, looping constructs, and program comprehension: an experimental study,” Int. J. Man. Mach. Stud., vol. 28, no. 1, pp. 45–66, Jan. 1988.
[16] B. Curtis, “Substantiating Programmer Variability,” in Proceedings of the IEEE, 1981, vol. 69, no. 7, p. 846.
[17] M. Klerer, “Experimental study of a two-dimensional language vs Fortran for first-course programmers,” Int. J. Man. Mach. Stud., vol. 20, pp. 445–467, 1984.
[18] S. Ajami, Y. Woodbridge, and D. G. Feitelson, “Syntax, Predicates, Idioms - What Really Affects Code Complexity?,” in 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC), 2017, vol. 24, no. 1, pp. 66–76.
[19] D. I. De Silva, N. Kodagoda, S. R. Kodituwakku, and A. J. Pinidiyaarachchi, “Analysis and enhancements of a cognitive based complexity measure,” in 2017 IEEE International Symposium on Information Theory (ISIT), 2017, pp. 241–245.
[20] U. Chhillar and S. Bhasin, “A New Weighted Composite Complexity Measure for Object-Oriented Systems,” Int. J. Inf. Commun. Technol. Res., vol. 1, no. 3, pp. 101–108, 2011.
[21] L. Jain and S. Singh, “A journey from cognitive metrics to cognitive computers,” IJARET, vol. 4, no. 4, pp. 60–66, 2013.
[22] V. R. Basili, “The role of experimentation in software engineering: past, current, and future,” in Proceedings of IEEE 18th International Conference on Software Engineering, 1996, pp. 442–449.
[23] V. Rajlich and G. S. Cowan, “Towards standard for experiments in program comprehension,” in Proceedings Fifth International Workshop on Program Comprehension. IWPC’97, 1997, pp. 160–161.
Citation
Leena Jain, Satinderjit Singh, "Designing The Code Snippets for Experiments on Code Comprehension of Different Software Constructs," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.310-318, 2019.