Identification of Important Performance Metrics of Different Routing Protocols in the context of Different Scenarios using ANOVA Test
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.316-322, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.316322
Abstract
In this paper, the performance metrics of routing protocols by varying node density and transmission range are analyzed using the statistical tool called Two-way ANOVA. The performance of routing protocols namely AODV, DSR, DSDV and OLSR are evaluated in two different traffic classes using NS2 simulation study. The sample data is collected from this simulation study. The Quality of Service metrics such as PDR, NRO, E2ED, TP and Jitter are treated as dependent variables which are evaluated by varying independent factors namely Node Density and Transmission Range. The ANOVA test is intended to ratify the correctness of the results and to investigate the important metrics while using individual factors and interaction effect between factors. The results of the ANOVA test found to be inline with that of NS2 simulation.
Key-Words / Index Term
AODV, DSR, DSDV, OLSR, ANOVA, MANETs
References
[1] K.Gangadhara Rao, Ch.Suresh Babu, B.Basaveswara Rao, D.Venkatesulu, “Simulation Based Performance Evaluation of Various Routing Protocols in MANETs”, IOSR journal of Mobile Computing & Application, Vol 3, Issue 4, pp 23-39, 2016.
[2] Subhrananda Goswami, “Performance comparison of routing protocols of MANET using NS2”, LAP LAMBERT Academic Publishing, pp 1-140, 2014.
[3] Jean-Michel D, P.D.Doncker, E.Zimanyi, “Multivariate Analysis of the Cross-Layer Interaction in Wireless Networks Simulations”, In the Proceedings of International Workshop on Wireless Ad-hoc Networks, IWWAN, pp 121-125, 2005.
[4] B.A.S.Roopa Devi, J.V.R.Murty, G.Narasimha, S.Pallam Setty, “Investigating the Impact of Black Hole Attack on AODV with Statistical Tool-ANOVA”, International Journal of Current Engineering and Technology”, Vol 5, No. 1, pp 97-103, 2015.
[5] C.Chigan, L.Li, Y.Ye, “Resource-aware Self-Adaptive Security Provisioning in Mobile Ad Hoc Networks”, Journal of IET Information Security. May, 2014.
[6] C.F.Alvarez, L.E.Palafox, L.Aguilar, “Link Disconnection Entropy Disorder in Mobile Adhoc Networks”, International Journal of Recent Research in Electrical and Electronics Engineering, Vol 2, Issue 3, pp 119-125, 2015.
[7] Yongda Lin, Fengjie Li, “An Integrated Testbed for Routing Performance of MANET”. In the proceedings of 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), China, pp 33-38 2017.
[8] Fahad Taha AL-Dhief , Naseer Sabri , M.S. Salim , S. Fouad , S. A. Aljunid, “MANET Routing Protocols Evaluation: AODV, DSR and DSDV Perspective”, In the proceedings of MATEC Web of Conferences 150, No 06024, pp 1-6, 2018.
[9] Umar Draz, Tariq Ali, Sana Yasin, Ahmad Shaf, “Evaluation Based Analysis of Packet Delivery Ratio for AODV and DSR under UDP and TCP Environment”, In the proceedings of 2018 International Conference on Computing mathematics and Engineering Technologies, Pakistan, 2018.
[10] Lubdha M. Bendale, Roshani. L. Jain, Gayatri D. Patil, “Study of Various Routing Protocols in Mobile Ad-Hoc Networks”, International Journal of Scientific Research in Network Security and Communication, Vol 6, Issue 1, pp 1-5, 2018.
[11] R. Kumari, P. Nand, “Performance Analysis for MANETs using certain realistic mobility models: NS-2”, International Journal of Scientific Research in Computer Science and Engineering, Vol 6, Issue 1, pp 70-77, 2018.
Citation
Ch.Suresh Babu., K.Gangadhara Rao, B.Basaveswara Rao, K.Chandan, "Identification of Important Performance Metrics of Different Routing Protocols in the context of Different Scenarios using ANOVA Test," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.316-322, 2019.
Forecasting Financial Time Series using a Hybrid Non-stationary Model with ANN
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.323-326, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.323326
Abstract
Forecasting financial time series have been regarded as one of the most challenging applications of modern time series forecasting. Thus, numerous models have been depicted to provide the investors with more precise predictions. In recent years, financial market dynamics forecasting has been a focus of economic research. In this paper, we propose a hybrid non-stationary time series model with artificial neural network (ANN) for forecasting financial time series. The proposed model is non-stationary in trend component with regressor, lagged variable and non-linear component. The proposed model can capture both linear and non-linear structures in the time series. Non-linear structure is capture by Fed-Forward Neural Networks (FNN). The working of the proposed model is examined for SPY and VOO stock prices. Forecast based on the proposed model performs better than existing models in terms of Root Mean Square Error (RMSE), Mean Absolute Error (MAE) and Mean Absolute Percent Error (MAPE) criterion.
Key-Words / Index Term
ARIMA-ANN, ARIMA-GARCH, Trend, Hybrid and Accuracy
References
[1] C.H.Aladag, E.Egrioglu, C.Kadil, “Forecasting nonlinear time series with a hybrid methodology”, Applied Mathematics Letters,Vol.22, Issue.9, pp.1467-1470, 2009.
[2] F.M. Tseng, H.C. Yu, G.H. Tzeng, “Combining neural network model with seasonal time series ARIMA model”, Technological Forecasting & Social Change,Vol. 69, Issue.1 , pp.71-87, 2002.
[3] G. Zhang, E.B. Patuwo, M.Y. Hu, “Forecasting with artificial neural networks: the state of the art”, Journal of Forecasting,Vol. 1, Issue.1, pp.35-62, 1998.
[4] G.E.P. Box, G.M. Jenkins, “Time Series Analysis: Forecasting and Control”, Holden-Day, San Francisco, 1970.
[5] G.Zhang, “Time series forecasting using a hybrid ARIMA and neural network model”,Neurocomputing,Vol. 50 , Issue. 17, pp.159-175, 2003.
[6] M.H. Ahmad, P.Y. Ping, S.R Yaziz, N.A Miswan, “A Hybrid Model for Improving Malaysian Gold Forecast Accuracy”, International Journal of Mathematical Analysis, Vol. 8, Issue. 28, pp. 1377-1387, 2014.
[7] P.F. Pai, C.S. Lin, “A hybrid ARIMA and support vector machines model in stock price forecasting”, The International journal of Management Science, Vol. 33, Issue. 6, pp. 497-505, 2005.
[8] R.S. Tsay, “Analysis of Financial Time Series”, 2nd ed., John Wiley& Sons, U.K, 2005.
[9] T.Nakatsuma, “Bayesian analysis of ARMA-GARCH models: A Markov chain sampling approach”, Journal of Econometrics, Vol. 95, Issue. 1, pp. 57-69 2000.
[10] W.W.S Wei, “Time Series Analysis: Univariate and Multivariate methods”, Pearson, San Francisco, 2006.
Citation
D.K.Shetty, B.Ismail, "Forecasting Financial Time Series using a Hybrid Non-stationary Model with ANN," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.323-326, 2019.
Segmentation of Liver from Abdomen CT Images Using Classification and Regression Tree
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.327-332, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.327332
Abstract
Segmentation role is inevitable in image processing for the extraction of the desired region of interest. This work proposes decision tree for the segmentation of liver from abdomen CT images. Prior to feature extraction and segmentation, feature extraction was performed by the median filter. The hybrid feature extraction comprising of GLCM and LBP is used and training phase comprises of 20 DICOM CT abdomen images. The morphological operations are performed in the post processing phase for the refinement of output. The algorithms are developed in Matlab 2010a and tested on real time abdomen CT images.
Key-Words / Index Term
Decision tree; Segmentation; Classification, regression tree
References
[1] Kumar SN, Fred AL, Varghese PS. “An Overview of Segmentation Algorithms for the Analysis of Anomalies on Medical Images”. Journal of Intelligent Systems.
[2] P. Umorya, R. Singh, “A Comparative Based Review on Image Segmentation of Medical Image and its Technique”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.71-76, April 2017.
[3] T.SenthilSelvi, R.Parimala, “Improving Clustering Accuracy using Feature Extraction Method”, International Journal of Scientific Research Computer Science and Engineering, Vol.6, Issue.2, pp.15-19, April 2018.
[4] Kumar SN, Fred AL, Kumar HA, Varghese PS. “Performance Metric Evaluation of Segmentation Algorithms for Gold Standard Medical Images”. InRecent Findings in Intelligent Computing Techniques pp. 457-469, 2018.
[5] Deshmukh J, Bhosle U. “Image mining using association rule for medical image dataset”. Procedia Computer Science. Vol. 85, 117-124. 2016
[6] Anguera A, Barreiro JM, Lara JA, Lizcano D. “Applying data mining techniques to medical time series: an empirical case study in electroencephalography and stabilometry”. Computational and structural biotechnology journal. Vol.14, pp. 185-199, 2016
[7] Rao RB, Fung G, Krishnapuram B, Bi J, Dundar M, Raykar V, Yu S, Krishnan S, Zhou X, Krishnan A, Salganicoff M. “Mining medical images”. InProceedings of the Third Workshop on Data Mining Case Studies and Practice Prize, Fifteenth Annual SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2009), Vol. 15, p. 16, 2009.
[8] Khan A, Ansari Z. “Soft Computing based Medical Image Mining: A Survey”. International Journal of Computer Trends and Technology (IJCTT). Vol. 27, Issue 2, 2015.
[9] Antonie ML, Zaiane OR, Coman A. “Application of data mining techniques for medical image classification”. InProceedings of the Second International Conference on Multimedia Data Mining, pp. 94-101. 2001.
[10] D. Sherlin, D. Murugan, “A Case Study on Brain Tumor Segmentation Using Content based Imaging”, Int. J. Sci. Res. in Network Security and Communication, Vol-6, Issue-3, June 2018.
[11] A.C. Motagi, V.S. Malemath, “Detection of Brain Tumor using Expectation Maximization (EM) and Watershed”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.76-80 , June 2018.
[12] Elsayed A, Coenen F, García-Fiñana M, Sluming V. Segmentation for Medical Image Mining: A Technical Report. The University of Liverpool, Liverpool L69 3BX, UK. 2008.
[13] Shukla VS, Vala JA. “Survey on image mining, its techniques and application”. International Journal of Computer Applications. Vol. 133, Issue 9. 2016.
[14] Meng XH, Huang YX, Rao DP, Zhang Q, Liu Q. “Comparison of three data mining models for predicting diabetes or prediabetes by risk factors”. The Kaohsiung journal of medical sciences. Vol. 29, Issue 2, pp. 93-99, 2013.
[15] Salcedo-Bernal A, Villamil-Giraldo MP, Moreno-Barbosa AD. “Clinical Data Analysis: An opportunity to compare machine learning methods”. Procedia Computer Science. Vol. 100, pp.731-738. 2016
[16] Sayad AT, Halkarnikar PP. “Diagnosis of heart disease using neural network approach”. InProceedings of IRF International Conference, 13th April-2014, Pune, India, pp. 978-993 2014.
[17] Nosaka R, Ohkawa Y, Fukui K. “Feature extraction based on co-occurrence of adjacent local binary patterns”. InPacific-Rim Symposium on Image and Video Technology, Springer, Berlin, Heidelberg. pp. 82-91, 2011.
[18] Mohanaiah P, Sathyanarayana P, GuruKumar L. “Image texture feature extraction using GLCM approach”. International Journal of Scientific and Research Publications. Vol. 3 Issue 5, 2013.
Citation
T.R. Nisha Dayana, A. Lenin Fred, "Segmentation of Liver from Abdomen CT Images Using Classification and Regression Tree," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.327-332, 2019.
Detection of disease from Chilly Plant Using Vegetation Indices
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.333-337, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.333337
Abstract
Yield of chilly is very important aspect for farmer, it is depend on the supplied water to plant and use of pesticide. The chilly plant is mostly infected by white fly, bacterial leaf spot, pepper mosaic virus. In this paper we use peeper mosaic virus infected leaves of chilly plant. We also use four different vegetation Indices and Support Vector Machine classification to classify between diseased and non-diseased leaf. Among four vegetation indices, we found NPCI is better indices in this study work.
Key-Words / Index Term
NPCI, MCARI, NDVI, TCARI, SVM
References
[1] J Brown. NDVI, the Foundation for Remote Sensing Phenology. Available:“https://phenology.cr.usgs.gov/ndvi_foundation.php2017”
[2] R Shamshiri “Plant disease detection based on spectral band selection.” Department of Agricultural and Biological Engineering, University of Florida, Gainesville, USA, 2008.
[3] Leaf Pigment, Available: http://harvardforest.fas.harvard.edu/leaves/pigment , time 4.14 PM 31/8/2018.
[4] Kerstin Grill, Simone Graeff, Wilhelm laupein, “Use of Vegetation indices to detect plant diseases.” The 27th GIL Annual Meeting, 5-7, Stuttgart, Germany, March 2007.
[5] Rainer Laudien, Georg Bareth, Reiner Doluschitz “Analysis of hyperspectral field data for detection of Sugar beet diseases.” 5-9, EFITA Conference, Debrecen, Hungary, 2003
[6] Dr.Agrarwissenschaften “Detection, identification, and quantify cation of fungal diseases of sugar beet Leaves using imaging and non-imaging hyper spectral techniques.” Ph.D. Inaugural-dissertation, Institute of Crop Science and Rescource Conservation – Phytomedicine, Ansbach, 2011
[7] F Ghobadifar, A Wayayok, M Shattri, H Shafri “Using SPOT-5 images in rice farming for detecting BPH.” In Conf .Earth and Environmental Science, Kuala Lumpur, Malaysia, 2014.
[8] W C Chew, M Hashim2, A M S Lau1,4, A E Battay3 and C S Kang “ Early detection of plant Disease using close range sensing system for input Into digital earth Environment.”, In Conf. Earth and Environmental Science, Kuching, Sarawak, Malaysia, 2013.
[9] Davoud Ashourloo, Mohammad Reza Mobasheri, Alfredo Huete, “Developing Two Spectral Disease Indices for Detection of Wheat Leaf Rust.” Remote Sensing, 6(6), 4723-4740, 2014.
[10] Support Vector Machine [online] https://medium.com/machine-learning-101/chapter-2- svm-support-vector-machine-theory-f0812effc7217. time 4.14 PM, 31/8/2018
[11] J. Penuelas, J.A.Gamon, A.L redeen, J.Marineo, C, B, Field “Reflectance indices Associated with Physiological changes in Nitrogen-and water limited sunflower leaves.” Remote Sensing of Environment, 48, 2, 135-146, 1994.
[12] Yong-Hyun Kim et al, “Comparative Analysis of the Multispectral Vegetation Indices and the Radar Vegetation Index.” Journal of the Korean Society of Surveying, Geodesy, Photogrammetry & Cartography. 32(6): 607-615. Dec 2014
[13] C. S. T. Daughtry C. L. Walthall, M. S. Kim, E. Brown de Colstoun‡ and J. E. McMurtrey III “Estimating Corn Leaf Chlorophyll Concentration from Leaf and Canopy Reflectance.” Elsevier Science Inc. Remote sensing 74:229–239, 2000.
[14] Chaoyang Wu, Zheng Niu, Quan Tang, Wenjiang Huang “Estimating chlorophyll content from Hyper spectral vegetation indices: Modeling and validation.” Agricultural and Forest Meteorology, Vol 148, 1230-1241, 2008.
[15] Preesan Rakwatin1, Grienggrai Pantuwan2, Sunamee Ngamsaard3, Kanin Ditkhamma4, Wannisa Nilapan5 “Brown plant hopper damage monitoring in rice using field imaging spectroscopy”
[16] Swati B. Magare, Dr.Ratnadeep R. Deshmukh “To Study the Impact of Glyphosate on Chlorophyll Content of Crops” International journal of innovative research in science, Engineering and technology. Vol. 5, Issue 3, March 2016
[17] Sushma D Guthe, Dr.Ratnadeep R. Deshmukh “ Prediction of Phosphorus Content in Different Plants: Comparison of PLSR and SVMR Methods” International Journal of Computer Technology and Research, Volume 6–Issue 8, 410-416, 2017.
[18] Anatoly A. Gitelson et al “Relationships between leaf chlorophyll content and spectral reflectance and algorithms for non-destructive chlorophyll assessment in higher plant leaves” Journal of plant Physiology, 271-282,2003.
[19] Remote Sensing and GIS in Agriculture [Online] http://www.seos- project.eu/modules/agriculture/agriculture-c01-s01.html 27/11/2018.
Citation
Akshay V. Kshirsagar, Ratnadeep R. Deshmukh, Pooja V. Janse, Rohit Gupta, Jaypalsing N. Kayte, "Detection of disease from Chilly Plant Using Vegetation Indices," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.333-337, 2019.
A Self-adaptive System reconfiguring a Composite Web Service for Emergency Medical Aid
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.338-343, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.338343
Abstract
The web services run in a highly dynamic environment so, the most fundamental challenges in web services based software solutions is to manage QoS changes of their component web services at runtime. In order to make the composite web service adapt to these changes, a self adaptive system is proposed for web service composition. The distributed approach is followed at the client and the server side along with the runtime monitoring and adaptation of the component web services at the provider side. For the self adaptive systems to recover as quickly as possible, a way of performance prediction is proposed in this paper along with the case study and the performance of the system. The prototype is developed using Java, and the JADE platform is used for implementing software agents using hospital lookup case study. The experimental results show that the proposed solution has better performance for supporting self adaptive web service composition.
Key-Words / Index Term
Self-adaptive systems; Web services; Quality of Service (QoS) and Web Service Composition
References
[1] V. Agarwal, & P. Jalote, “Enabling end-to-end support for non-functional properties in web services”, 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA) , pp 1 – 8, 2009.
[2] A. Amin, A. Colman, & L. Grunske,”Statistical detection of qos violations based on cusum control charts”. In Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering, ACM., pp. 97-108, 2012.
[3] R. Angarita, Y. Cardinale, & M. Rukoz, “Reliable Composite Web Services Execution: Towards a Dynamic Recovery Decision”, Electronic Notes in Theoretical Computer Science Volume 302, Proceedings of the XXXIX Latin American Computing Conference (CLEI 2013) , pp 5-28, 2014.
[4] R. Angarita, “Responsible objects: Towards self-healing internet of things applications”,2015 IEEE International Conference on Autonomic Computing (ICAC). IEEE., pp. 307-312, 2015, July.
[5] R. Angarita, M. Rukoz, & Y. Cardinale, “Modeling dynamic recovery strategy for composite web services execution”, World Wide Web, 19(1), pp 89-109, 2016.
[6] D. Ardagna, M. Comuzzi, E. Mussi, B. Pernici, & P. Plebani, “PAWS: A Framework for Executing Adaptive Web-Service Processes”, IEEE software, 24(6) , 39, 2007.
[7] S. Asadollah, & T. Chiew, “Web Service Response Time Monitoring: Architecture and Validation”, Theoretical and Mathematical Foundations of Computer Science Volume 164 of the series Communications in Computer and Information Science , pp 276-282, 2011.
[8] R. Aschoff, & A. Zisman, “QoS-Driven proactive adaptation of service composition”, Service-Oriented Computing, Lecture Notes in Computer Science, Volume 7084 2011 , pp 421-435, 2011.
[9] L. Baresi, & S. Guinea, “Towards Dynamic Monitoring of WS-BPEL Processes”. Service-Oriented Computing - ICSOC 2005 Volume 3826 of the series Lecture Notes in Computer Science , pp 269-282, 2005.
[10] Y. Dai, L. Yang, & B. Zhang, “QoS-driven self-healing web service composition based on performance prediction”, Journal of Computer Science and Technology, 24(2), pp 250-261, 2009.
[11] D. H. Elsayed, E. S. Nasr, M. Alaa El Din, & M. H. Gheith, “Appraisal and Analysis of Various Self-Adaptive Web Service Composition Approaches”, In Requirements Engineering for Service and Cloud Computing, Springer International Pub , pp. 229-246, 2017.
[12] Q. He, J. Han, Y. Yang, H. Jin, J.G. Schneider, & S. Versteeg, “Formulating cost-effective monitoring strategies for service-based systems”, IEEE Transactions on Software Engineering, 40(5). IEEE Transactions on Software Engineering, 40(5), pp 461-482, 2014.
[13] J. S. Hunter, “The Exponentially Weighted Moving Average”, Journal of Quality Technology, Vol. 18, No. 4 , pp 203-210, 1986.
[14] C. L. Hwang, & K. Yoon, “Multiple attribute decision making Methods and applications”, CRC press, 1981.
[15] N.K. Kahlon, K.K. Chahal, & S.B. Narang, “Managing QoS degradation of partner web services: A proactive and preventive approach”, Journal of Service Science Research, 8(2) , pp 131-159, 2016.
[16] Q. Liang, B. Lee, & P.Hung, “A rule-based approach for availability of service by automated service substitution”. Softw., Pract. Exper. 44(1) , pp 47-76, 2014.
[17] H. Mansour, & T. Dillon, “Dependability and Rollback Recovery for Composite Web Services”, IEEE Transactions on Services Computing, Volume: 4, Issue: 4 , pp 328-339, Oct.-Dec. 2011.
[18] A. Metzger, C. H. Chi, Y. Engel, & A. Marconi, “Research challenges on online service quality prediction for proactive adaptation”, 2012 Workshop on EuropeanSoftware Services and Systems Research - Results and Challenges (S-Cube), pp 51 – 57, 2012.
[19] A. Michlmayr, F. Rosenberg, P. Leitner, & S. Dustdar, “Comprehensive QoS monitoring of Web services and event-based SLA violation detection”, Proceeding MWSOC `09 Proceedings of the 4th International Workshop on Middleware for Service Oriented Computing, ACM New York, NY, USA , pp 1-6, 2009.
[20] M. Natrella, NIST/SEMATECH e-Handbook of Statistical Methods, 2010.
[21] M. Oriol, X. Franch, & J. Marco, “Monitoring the service-based system lifecycle with SALMon”, Expert Systems with Applications, 42(19) , pp 6507-6521, 2015.
[22] P. Plebani, & B. Pernici, “URBE: Web service retrieval based on similarity evaluation”, IEEE Transactions on Knowledge and Data Engineering, 21(11), pp 1629-1642, 2009.
[23] K. Ren, J. Song, M. Zhu, & N. Xiao, “A bargaining-driven global QoS adjustment approach for optimizing service composition execution path”, The Journal of Supercomputing, Volume 63 (1), pp 126–149, 2013.
[24] F. Rosenberg, C. Platzer, & S. Dustdar, “Bootstrapping Performance and Dependability Attributes of Web Services”, In Proceedings of the IEEE International Conference on Web Services (ICWS’06),pp. 205–212, 2006.
[25] F. Rosenberg, C. Platzer, & S. Dustdar, “QUATSCH–A QoS Evaluation and Monitoring Tool for Web Services” Journal on Web services Research, 2007.
[26] J. Ruiz, & C. Rubira, “Quality of Service Conflict During Web Service Monitoring: A Case Study”, Electronic Notes in Theoretical Computer Science, 321 , pp 113-127, 2016.
[27] Z. Zheng, & M. Lyu, “A runtime dependability evaluation framework for fault tolerant web services”, In The International Workshop on Proactive Failure Avoidance, Recovery and Maintenance (PFARM`09), co-located with DSN2009, 2009.
[28] J. Zhu, P. He, Z. Zheng, & M. Lyu, “Online QoS Prediction for Runtime Service Adaptation via Adaptive Matrix Factorization”, IEEE Transactions on Parallel and Distributed Systems, IEEE, 2017.
Citation
Navinderjit Kaur Kahlon, "A Self-adaptive System reconfiguring a Composite Web Service for Emergency Medical Aid," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.338-343, 2019.
Investigating Sentiment analysis using Clustering and NLP tools
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.344-347, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.344347
Abstract
Twitter is a social media platform, a place where people from all parts of the world can make their opinions heard. Twitter produces around 500 million of tweets daily which amounts to about 8TB of data. The data generated in twitter can be very useful if analyzed as we can extract important information via opinion mining. Opinions about any news or launch of a product or a certain kind of trend can be observed well in twitter data. The main aim of sentiment analysis (or opinion mining) is to discover emotion, opinion, subjectivity and attitude from a natural text. In twitter sentiment analysis, we categorize tweets into positive and negative sentiment. Clustering is a protean procedure in which identically resembled objects are grouped together and form a pack or cluster. We conducted a study and found out that the use of clustering can quickly and efficiently distinguish tweets on the basis of their sentiment scores and can find weekly and strongly positive or negative tweets when clustered with results of different dictionaries. This paper implements the approach of clustering with respect to sentiment analysis and presents a way to find relationships between the tweets on the basis of polarity and subjectivity.
Key-Words / Index Term
Opinion Mining, sentiment analysis, clustering, Twitter
References
[1] Peng, Zhichao, Qinghua Hu, and Jianwu Dang. ”Multi-kernel SVM based depression recognition using social media data.” International Journal of Machine Learning and Cybernetics (2017): 1-15.
[2] Banitaan, Shadi, and Kevin Daimi. ”Using data mining to predict possible future depression cases.” International Journal of Public Health Science (IJPHS) 3.4 (2014): 231-240.
[3] Abhyankar, Anjali. ”Social networking sites.” SAMVAD 2 (2011): 18-21.
[4] Braithwaite, Scott R., et al. ”Validating machine learning algorithms for twitter data against established measures of suicidality.” JMIR mental health 3.2 (2016).
[5] Tripathy, Abinash, Abhishek Anand, and Santanu Kumar Rath” Document-level sentiment classification using hybrid machine learning approach.” Knowledge and Information Systems (2017):1-27.
[6] Yousefpour, Alireza, Roliana Ibrahim, and Haza Nuzly Abdel amed. “Ordinal-based and frequency-based integration of feature selection methods for sentiment analysis” Expert Systems with Applications 75 (2017): 80-93.
[7] Hussain, Jamil, Maqbool Ali, Hafiz Syed Muhammad Bilal, Muhammad Afzal, Hafiz Farooq Ahmad, Oresti Banos, and Sungyoung Lee. ”SNS based predictive model for depression.” In International Conference on Smart Homes and Health Telematics, pp. 349-354. Springer, Cham,2015.
[8]R. Joshi and R. Tekchandani, "Comparative analysis of Twitter data using supervised classifiers," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, 2016, pp. 1-6. doi:10.1109/INVENTIVE.2016.7830089
[9] I.S. Jacobs and C.P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G.T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271-350.
[10] M. Kumar and A. Bala, "Analyzing Twitter sentiments through big data," 2016 3rd International Conference on Computing for Sustainable Global evelopment (INDIACom), New Delhi, 2016, pp. 2628-2631.
[11] R. A. Ramadhani, F. Indriani and D. T. Nugrahadi, "Comparison of Naïve Bayes smoothing methods for Twitter sentiment analysis," 2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS), Malang, 2016, pp. 287-292.
[12] Deng, Li and Yu, Dong.Deep Learning: Methods and Applications.2014. NOW Publishers,United State of America.
[13] Miachel, Ray. 2012. 3 steps of text mining [Online] Available at: http://www2.cs.man.ac.uk/~raym8/comp38212/main/node203.html [Accessed 20 May 2017]
[14] Tomar, Shubham Simar.2017.Text Mining in R: A Tutorial [Online] Available at : https://www.springboard.com/blog/text-mining-in-r/[Accessed 20 May 2017]
Citation
Ashwini Yerlekar, Devika Deshmukh, "Investigating Sentiment analysis using Clustering and NLP tools," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.344-347, 2019.
Smart Labourer – A Proposed System for locating Labourers
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.348-352, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.348352
Abstract
It is very challenging for a contractor to procure skilled/ semi-skilled manpower for the various construction activates. On other side labourers are going through lots of hardships. Labourers who work on daily or hourly wages in any construction work find it very difficult to get a job. Generally labourers gathering at a place like railway station or bus stop etc. every morning in search of jobs. If they have to spend their whole day without work then it will become difficult for their family to survive. There are many middlemen working between worker and contractor, they take commission from both parties workers and contractors. They offer jobs only to those workers who give them good commission and ignore others. Contractors also have to give commission to the middlemen and because of this labourers get lesser than the expected wages. This system will eliminate the middlemen agents and hence commission from the labourers. This System will also provide full wages to labourers by contractors which were previously cut by middlemen/agents. Instead of agents there will be placement agencies which will help the labourers offering jobs and these placement agencies will be paid by contractors depending upon the amount of work and number of labourers. This will gradually increase the jobs seeking for labourers and eliminate unemployment for labourers. Hence, our system will be helpful for contractors for finding labourers and also be helpful for needy labourers who work on wages.
Key-Words / Index Term
Contractor, Labourer, Middleman, Agents, Job, Construction
References
[1] Jason Stuart Gorham, Willoughby Cir., Lake Worth, “INTEGRATED ONLINE JOB RECRUITMENT SYSTEM”, International Patent Classification, Patent Number US 7,653,567 B2, Patent Date Jan. 26, 2010 FL (US) 33463.
[2] Evanthia Faliagka, Kostas Ramantas, Athanasios Tsakalidis, “APPLICATION OF MACHINE LEARNING ALGORITHMS TO AN ONLINE RECRUITMENT SYSTEM”, ICIW 2012: The Seventh International Conference on Internet and Web Applications and Services, Vol. 1.
[3] Stephane Lajoie, Alma (CA), “ONLINE RECRUITMENT SYSTEM AND METHOD”, International Patent Classification, Patent No. US 2012/01854.02 A1, Patent Date Jul.19, 2012, Vol. 1.
[4] Avinash S. Kapse, Vishal S. Patil, Nikhil V. Patil, “E- RECRUITMENT”, International Journal of Engineering and Advanced Technology (IJEAT), Vol. 1, Issue. 4, April 2012, ISSN: 2249 – 8958.
[5] Arik Filstein, HerZila (IL), “INTELLIGENT JOB RECRUITMENT SYSTEM AND METHOD”, United States Patent Application Publication Pub. No. US 2014/0214711 A1, Pub. Date: Jul 31, 2014, Vol. 1.
[6] Ben Greiner, “AN ONLINE RECRUITMENT SYSTEM FOR ECONOMIC EXPERIMENTS”, Munich Personal RePEc Archive(MPRA), MPRA Paper No. 13513, posted 20. February 2009 15:36 UTC.
[7] Rina Agarwala, “USING LEGAL EMPOWERMENT FOR LABOUR RIGHTS IN INDIA”, The Journal of Development Studies, Published online: 01 Apr 2018, Vol. 1.
[8] Vaishnavi C. Mankar; Jai R. Sharma; Kanchan K. Masal; Siddhved R. Phadke, “ONLINE JOB PORTAL”, International Journal of Research In Science & Engineering, Special Issue: Techno-Xtreme 16, Dept. of CSE, J.D.I.E.T, Yavatmal, India.
[9] Robert J. McGovern, Potomac, James A. Winchester JR., Andrew B. Evans, Alderson, Brian E. Farmer, Jennie A. Kofman, Aaron P. Walker, “COMPUTERIZED JOB SEARCH SYSTEM”, United States Patent Application Publication, Pub. No.: US 2002/0120532, Pub. Date: Aug. 29, 2002.
Citation
Mohammed Ahmed, Shamshad Iraqui, Masood Ansari, Abdul Qadir Ansari, "Smart Labourer – A Proposed System for locating Labourers," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.348-352, 2019.
A Secure Blind Path Energy Aware Geographical Routing Protocol for Wireless Sensor Networks
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.353-360, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.353360
Abstract
Wireless Sensor Networks (WSNs) are rapidly becoming popular due to they are low cost solutions for various real-world challenges. It is widely used in military surveillance, transportation management, health care, etc. Prolonging a wireless sensor network’s lifetime is closely related to energy consumption. Furthermore, secure data transfer is a great challenge for WSNs, especially for applications that use important data such as military applications. The main objective is not only to design a new routing protocol that ensures network lifetime efficiency, but the balance between these security threats and energy efficiency. For that reason, we have designed the standard framework and simplify the process of building a novel geographical routing sensor networks that introduce location privacy, data privacy and energy awareness routing. Firstly, the whole network is divided into multiple grids with randomly distributed sensor nodes and all sensor nodes only communicates with their neighbor grids. Each grid selects the grid head based on the maximum energy level and minimum distance of the destination node in each grid .The data transmitter node identifies the neighbor grid with the grid head having maximum energy level and minimum distance of the destination node among its neighbor grids for data transmission. Further Hybrid AES-DES algorithm is applied to provide data privacy and location privacy. The proposed protocol provides a good trade-off between balancing energy, security and routing efficiency, and in all cases the lifespan of sensory networks can be significantly expanded.
Key-Words / Index Term
Wireless Sensor Networks, Geographic Routing, Location privacy preserving, Data privacy preserving, Energy aware, blind path approach
References
[1] A. Milankovich , K. Klincsek , Wireless sensor network for water quality moni- toring, in: Proceedings of the European Project Space on Information and Com- munication Systems, 2015, pp. 28–47 .
[2] P. Mohit , R. Amin , G.P. Biswas , Design of authentication protocol for wireless sensor network-based smart vehicular system, Veh. Commun. 9 (2017) 64–71 .
[3] A. Odorizzi , G. Mazzini , M-geraf: A reliable random forwarding geographic routing protocol in multisink ad hoc and sensor networks, in: Proceedings of the International Symposium on Intelligent Signal Processing and Communica- tion Systems, 2008, pp. 416–419 .
[4] K. Oe , A. Koyama , L. Barolli , Proposal and performance evaluation of a multi- cast routing protocol for wireless mesh networks based on network load, Mo- bil. Inf. Syst. 2015 (2015) 1–10
[5] K. Oe , A. Koyama , L. Barolli , Proposal and performance evaluation of a multi- cast routing protocol for wireless mesh networks based on network load, Mo- bil. Inf. Syst. 2015 (2015) 1–10
[6] B. O’Flynn , R. Martinezcatala , S. Harte , C. O’Mathuna , J. Cleary , C. Slater , F. Re- gan , D. Diamond , H. Murphy , Smartcoast: a wireless sensor network for water quality monitoring, in: Proceedings of the IEEE Conference on Local Computer Networks, 2007, pp. 815–816
[7] Boukerche, A., Turgut, B., Aydin, N., Ahmad, M.Z., Boloni, L., Turgut, D., 2011. Routing protocols in ad hoc networks: a survey. Comput. Netw. 55, 3032–3080.
[8] Mulert, J., Welch, I., Seah, W.K.G., 2012. Security threats and solutions in manets: a case study using aodv and saodv. J. Netw. Comput. Appl. 35 (4), 1249–1259.
[9] Ade, S.A., Tijare, P.A., 2010. Performance comparison of aodv, dsdv, olsr and dsr routing protocols in mobile ad hoc networks. Int. J. Inf. Technol. Knowl. Manag. 2 (2),545–548.
[10] Tyagi, S., Kumar, N., 2013. A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. J. Netw. Comput. Appl. 36(2), 623–645.
[11] Karp, B., Kung, H., 2000. GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM Press, pp. 243–254
[12] F. M. Al-Turjman and H. S. Hassanein, ``Enhanced data delivery framework for dynamic information-centric networks (ICNs),`` in Proc. IEEE 38th Conf. Local Comput. Netw. (LCN), Oct. 2013, pp. 810_817.9
[13] Silva, C. M., Masini, B. M., Ferrari, G., & Thibault, I. (2017). A survey on infrastructure-based vehicular networks. Mobile Information Systems, 2017.
[14] C. Ozturk, Y. Zhang, W. Trappe. Source-Location privacy in energy-constrained sensor network routing. In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004). pp. 88-93, 2004.
[15] E.Park, D. Bae, H. Choo, Energy efficient geographic routing for prolonging network lifetime in wireless sensor networks, in: Proceedings of the 2010 International Conference on Computational Science and Its Applications, ICCSA ’10, IEEE Computer Society, Washington, DC, USA, 2010, pp. 285–288
[16] C. Petrioli, M. Nati, P. Casari, M. Zorzi, S. Basagni, Alba-r: Load-balancing geographic routing around connectivity holes in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems 25 (3) (2014)529–539.
[17] Xu, Y., Heidemann, J., Estrin, D.: Geograph-informed energy conservation for Ad hoc routing. In: 7th Annual International Conference on Mobile Computing and Networking, 2001, pp. 70–84.
[18] Brad Karp, H. T. Kung GPSR: greedy perimeter stateless routing for wireless networks MobiCom `00 Proceedings of the 6th annual international conference on Mobile computing and networking Pages 243-254
[19] A.A. Qasem, A.E. Fawzy, M. Shokair, W. Saad, S. El-Halafawy, A. Elkorany, Energy Efficient Intra Cluster Transmission in Grid Clustering Protocol for Wireless Sensor Networks, Wirel. Pers. Commun. 97 (2017) pp. 915–932.
[20] D. Tang, T. Li, J. Ren, J. Wu. Cost-Aware SEcure Routing (CASER) Protocol Design for
Wireless Sensor Networks. IEEE Transactions on Parallel & Distributed Systems, 2015, 26(4):960-973.
[21] J. Li, Y. Li, J. Ren, J. Wu. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(5): 1223-1232.
[22] J. Freudiger, M.H. Manshaei, J.P. Hubaux, D.C. Parkes. Non-Cooperative Location Privacy. IEEE Transactions on Dependable & Secure Computing, 2013, 10(2):84-98.
Citation
Manjunath D R, Thimmaraju S N, "A Secure Blind Path Energy Aware Geographical Routing Protocol for Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.353-360, 2019.
Mining of Uncommon Value Sets From the Transactional Data Using Proposed Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.361-364, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.361364
Abstract
The Mining task produce the various examples of values from the bunch of information Visit value sets mining is a critical information mining assignment to find the covered up, fascinating example of things in the set of Data. At times uncommon values are more vital because it convey valuable data. Uncommon values seem as it were at the point when edge is set to low. Uncommon value sets are moreover critical in discovering relationship between inconsistently bought trade things, examination of various medical reports which help in decision making. Uncommon values extraction from the transactional data is the difficult task in nature. For the extraction of uncommon values from the large transactional data some critical issues happen like (i) Extraction of recognize intriguing uncommon examples. (ii) The most effective method to productively find them in large transactional data. This manuscript represents the effective technique for extraction uncommon values from the large changing in nature Transactional data.
Key-Words / Index Term
Threshold, Profit, uncomman value sets, visit value set, candidate value set
References
[1] S. Murali, K. Morarjee,” A Novel Mining Algorithm for High Utility Value sets from Transactional Databases”, Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 11 Versions 1.0 Year 2013.
[2] G. Yu, S. Shao, X. Zengmining, “ Long High Utility Value sets in Transaction Databases” Wseas Transactions On Information Science & Applications Issue 2, Volume 5, Feb. 2008.
[3] M. Adda, L. Wu, S. White, Y. Feng, “ Pattern Detection With Rare Item-Set Mining” International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.1, No.1, August 2012.
[4] L. Feng, M. Jiang, L. Wang, “An Algorithm for Mining High Average Utility Value sets Based on Tree Structure” Journal of Information & Computational Science 9: 11 3189–3199, 2012.
[5] P. K. sharma1, A. Raghuwansi, “A Review of some Popular High Utility Valueset Mining Techniques” International Journal for Scientific Research & Development| Vol. 1, Issue 10, 2013 | ISSN (online): 2321-0613
[6] M. J. Zaki, W. Meira, “Data Mining and Analysis: Fundamental Concepts and Algorithms.
[7] K. S. Chenniangirivalsu Sadhasivam, T. Angamuthu, “Mining Rare Valueset with Automated Support Thresholds” Journal of Computer Science 7 (3): 394-399, 2011 ISSN 1549-3636 © 2011 Science Publications
[8] N. Sethi, P. Sharma, “Mining Frequent Pattern from Large Dynamic Database Using Compacting Data Sets” International Journal of Scientific Research in Computer Science and Engineering Vol-1, Issue-3 ISSN: 2320– 7639.
[9] A.L. Greenie,” Efficient Algorithms for Mining Closed Frequent Valueset and Generating Rare Association Rules from Uncertain Databases” International Journal of scientific research and management Volume 1 Issue 2 Pages 94-108, ISSN (e): 2321-3418,2013.
[10] S.Vanamala, L.P. sree, S.D. Bhavani, “Efficient Rare Association Rule Mining Algorithm” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 3, Issue 3, pp.753-757, 2013
[11] A. Bansal, N. Baghel, S. Tiwari,” An Novel Approach to Mine Rare Association Rules Based on Multiple Minimum Support Approach “International Journal of Advanced Electrical and Electronics Engineering, (IJAEEEISSN (Print) : 2278-8948, Volume-2, Issue-4, 2013.
[12] Harish Abu. Kalidasu B.PrasannaKumar aripriya.P “Analysis of Utility Based Frequent Valueset Mining Algorithms” IJCSET,Vol 2, Issue 9, 1415-1419 ,ISSN:2231-0711, 2012.
[13] K. S. Chenniangirivalsu, T. Angamuthu “Mining Rare Valueset with Automated Support Thresholds” Journal of Computer Science ISSN 1549-3636 © 2011 Science Publications.
Citation
Surbhi Singh, Renu Jain, "Mining of Uncommon Value Sets From the Transactional Data Using Proposed Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.361-364, 2019.
Detecting Fraud Reviews of Apps Using Sentiment Analysis
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.365-368, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.365368
Abstract
Sentiment analysis is one of the main tasks of Natural Language Processing (NLP). This analysis had gained more attention in recent years. In this paper, we tackled the problem of sentiment polarity categorization as one of the fundamental problems of sentiment analysis. A general process is proposed with detailed descriptions. Data used are online product reviews collected from Amazon.com. Experiment for sentence-level categorization and review-level categorization are performed with best outcomes. Finally, we give insight into our future work on sentiment analysis.
Key-Words / Index Term
Natural Language Processing(NLP), Sentiment Analysis, Sentence Level Categorization, Review Level Categorization
References
[1] Kim S-M, Hovy E, Determining the sentiment of opinions In: Proceedings of the 20th international conference on Computational Linguistics, page 1367. Association for Computational Linguistics, Stroudsburg, PA, USA.
[2] Liu B, Sentiment analysis and subjectivity In: Handbook of Natural Language Processing, Second Edition. Taylor and Francis Group, Boca.
[3] Pak A, Paroubek P, Twitter as a corpus for sentiment analysis and opinion mining In: Proceedings of the Seventh conference on International Language Resources and Evaluation.. European Languages Resources Association, Valletta, Malta.
[4] Pang B, Lee L,Opinion mining and sentiment analysis. Found Trends Inf Retr2(1-2).
[5] Twitter, Twitter apis. https://dev.twitter.com/start.
[6] Liu B, The science of detecting fake reviews. http://content26.com/blog/bing-liu-the-science-of-detecting-fake-reviews/.
[7] www.amazon.com.
[8] Go A, Bhayani R, Huang L, Twitter sentiment classification using distant supervision, 1–12. CS224N Project Report, Stanford.
[9] Sarvabhotla K, Pingali P, Varma V Sentiment classification: a lexical similarity based approach for extracting subjectivity in documents. InfRetrieval14 (3): 337–353.
[10] Wilson T, Wiebe J, Hoffmann P, Recognizing contextual polarity in phrase-level sentiment analysis In: Proceedings of the conference on human language technology and empirical methods in natural language processing, 347–354.. Association for Computational Linguistics, Stroudsburg, PA, USA.
[11] Zhang Y, Xiang X, Yin C, Shang L, Parallel sentiment polarity classification method with substring feature reduction In: Trends and Applications in Knowledge Discovery and Data Mining, volume 7867 of Lecture Notes in Computer Science, 121–132.. Springer Berlin Heidelberg, Heidelberg, Germany.
[12] Choi Y, Cardie C, Adapting a polarity lexicon using integer linear programming for domain-specific sentiment classification In: Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 2 - Volume 2, EMNLP ’09, 590–598.. Association for Computational Linguistics, Stroudsburg, PA, USA.
[13] Tan LK-W, Na J-C, Theng Y-L, Chang K, Sentence-level sentiment polarity classification using a linguistic approach In: Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation, 77–87. Springer, Heidelberg, Germany.
Citation
S. Sabeena, "Detecting Fraud Reviews of Apps Using Sentiment Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.365-368, 2019.