A Survey on Facial Recognition
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.313-319, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.313319
Abstract
Face recognition is one of the most interesting and challenging research area in the past decades. The face recognition system has used facial databases which can verify whether the given facial image is found in the database or not. It is very popular in biometric authentications and surveillance and they do not require the user intervention. Face recognition technique is definitely an emerging multi-disciplinary subject that facilitates discovering of previous unknown patterns from large amount of data. This paper provides the basic concepts of Facial Recognition and its essential characteristics. Face recognition in IoT, biometric system, crowd detection are also discussed in this paper.
Key-Words / Index Term
Face Detection, Face Recognition, Biometrics, IoT based face recognition, Applications
References
[1]. Kosov S., Scherbaum K., Faber K., Thormahlen T. and Seidel H.-P., "Rapid stereo-vision enhanced face detection", Image Processing (ICIP), 2009 16th IEEE International Conference on, IEEE, 1221-1224, 2009.
[2]. P.J. Phillips, H. Moon, S.A. Rizvi and P.J. Rauss, “The feret evaluation methodology for face-recognition algorithms”, IEEE Trans. Pattern Anal. Mach. Intell. 22 (10) (20 0 0) 1090–1104.
[3]. R. Gross, I. Matthews, J. Cohn, T. Kanade and S. Baker, Multi-pie, Image Vis. Com-put. 28 (5) (2010) 807–813.
[4]. G.B. Huang, M. Ramesh, T. Berg, E. Learned-Miller, “Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments”, Tech-nical Report 07-49, University of Massachusetts, Amherst, 2007.
[5]. C. Ding and D. Tao, “A comprehensive survey on pose-invariant face recognition”, ACM Trans. Intell. Syst. Technol.7 (3) (2016) 37.
[6]. X. Zhu, Z. Lei, J. Yan, D. Yi and S.Z. Li, “High-fidelity pose and expression normalization for face recognition in the wild”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recogn”ition, 2015, pp. 787–796 .
[7]. J. Yim, H. Jung, B. Yoo, C. Choi, D. Park and J. Kim, “Rotating your face using multi–task deep neural network”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 676–684 .
[8]. Christos Sagonas, YannisPanagakis, StefanosZafeiriou and MajaPantic, “Robust Statistical Face Frontalization”, ICCV, IEEE Xplore.
[9]. Jawad Nagi, Syed Khaleel Ahmed and Farrukh Nagi, “A MATLAB based Face Recognition System using Image Processing and Neural Networks” 4th International Colloquium on Signal Processing and its Applications, March 7-9, 2008, Kuala Lumpur, Malaysia. Faculty of Electrical Engineering, UiTM Shah Alam, Malaysia. ISBN: 978-983-42747-9-5
[10]. Divyarajsinh N. Parmar and Brijesh B. Mehta, “Face Recognition Methods & Applications” Divyarajsinh N Parmar et al ,Int.J.Computer Technology & Applications,Vol 4 (1),84-86, ISSN:2229-6093.
[11]. Kim, Kwang In, Keechul Jung, and Hang Joon Kim. "Face recognition using kernel principal component analysis" Signal Processing Letters, IEEE 9.2 (2002): 40-42.
[12]. Gan, Jun-ying, Dang-pei Zhou, and Chun-zhi Li. "A method for improved PCA in face recognition" International Journal of Information Technology 11.11 (2005): 79-85.
[13]. Timotius, Ivanna K., Iwan Setyawan, and Andreas A. Febrianto. "Face recognition between two person using kernel principal component analysis and support vector machines" International Journal on Electrical Engineering and Informatics 2.1 (2010): 55-63.
[14]. El Traboulsi et al. "Matrix Exponential based Semi-supervised Discriminant Embedding for Image Classification" Pattern Recognition (2016).
[15]. Vieira, MatheusAlves, et al. "Object based image analysis and data mining applied to a remotely sensed Landsat time-series to map sugarcane over large areas" Remote Sensing of Environment 123 (2012): 553-562.
[16]. Samir K. Bandyopadhyay, “A Method for Face Segmentation, Facial Feature Extraction and Tracking”, IJCSET | April 2011 | Vol 1, Issue 3,137-139
[17]. Dr. S.Vijayarani and M.Vinupriya, “Performance Analysis of Canny and Sobel Edge Detection Algorithms in Image Mining”, International Journal of Innovative Research in Computerand Communication Engineering, ISSN (Online): 2320-9801, ISSN (Print): 2320-9798, Vol.1, Issue 8, October 2013.
[18]. Juneja. Mamta , Sandhu .Parvinder Singh, “Performance Evaluation of Edge Detection Techniques for Images in Spatial Domain”, International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, 2009, 1793-8201.
[19]. Kirby, M. & Sirovich, L. (1990). “Application of the Karhunen-Loeve procedure for the characterization of human faces”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12, No. 1, pp. 103-107.
[20]. Tjahyadi, R.; Liu, W.; An, S. & Venkatesh, S.(2004) “Face Recognition via the Overlapping Energy Histogram”, IJCAI, pp.2891-2896, 2007.
[21]. Chen W., Er M.J., Wu S., “PCA and LDA in DCT Domain”, Pattern Recognition Letters, Vol. 26, Issue 15, November 2005, pp. 2474-2482
[22]. Delac, K., Grgic, M., “Face Recognition”, I-Tech Education and Publishing, ISBN 978-3-902613-03-5, Vienna, July 2007, 558 pages Delac K., Grgic M., Grgic S., Image Compression Effects in Face Recognition Systems, In: Face Recognition
[23]. Yang, M.; Kriegman, D. & Ahuja, N. (2001). Detecting faces in images: A survey, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 23, No. 1, pp. 34-58.
[24]. Shashua, A. & Riklin-Raviv, T. (2001). The quotient image: Classbased re-rendering and recognition with varying illuminations, IEEE Transactions Pattern Analysis and Machine Intelligence, Vol. 23, No. 2, pp. 129 – 139
[25]. Silva P. & Rosa, A.S. (2003). Face recognition based on eigeneyes. Pattern Recognition and Image Analysis, Vol. 13, No. 2, pp. 335–338
[26]. Pamudurthy, S.; Guan, E.; Mueller, K. & Rafailovich M. (2005). Dynamic approach for face recognition using digital image skin correlation. Proceedings of Audio- and Video-based Biometric Person Authentication.
[27]. Alexander, J. & Smith, (2003). Engineering privacy in public: Confounding face recognition, privacy enhancing technologies. Proceedings of International Workshop on Privacy Enhancing Technologies.
[28]. Sandesh Kulkarni, Minakshee Bagul, Akansha Dukare and Prof. Archana Gaikwad, “Face RecognitionSystem Using IoT” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)Volume 6, Issue 11, November 2017,ISSN:2278–1323.
[29]. Renu Bhatia, “Biometrics and Face Recognition Techniques” International Journal of Advanced Research in Computer Science and Software Engineering” Volume 3, Issue 5, May 2013ISSN: 2277 128X
[30]. Priyanka, “A Study on Facial Feature Extraction and Facial Recognition Approaches” International Journal of Computer Science and Mobile Computing, Vol.4 Issue.5, May-2015, pg. 166-174
[31]. D. Chaudhari, Mayur & Ghotkar, Archana. (2018). A Study on Crowd Detection and Density Analysis for Safety Control. International Journal of Computer Sciences and Engineering. 6. 424-428. 10.26438/ijcse/v6i4.424428.
[32]. B.Mohd. Jabarullah, Sandeep Saxena and Dr. C. Nelson Kennedy Babu, “Survey on Noise Removal in Digital Images”, IOSR Journal of Computer Engineering (IOSRJCE), ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 4, Oct. 2012.
[33]. Scott Tan Yeh Ping, Chun Hui Weng, Boonping Lau, “Face Detection through Template Matching and Color Segmentation”.
Citation
A. Sakila, S. Vijayarani, "A Survey on Facial Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.313-319, 2019.
Taxonomy of Intrusion Detection System –A Study
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.320-324, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.320324
Abstract
An intrusion detection system is a computer system monitors network traffic for suspicious activity, now, Computer Network is essential to give a high-level security to protect highly sensitive data and information. Network Technology and Internet related Application sector plays a essential role in today’s trend. Many intrusion detection techniques, methods and algorithms help to detect these attacks, hackers use different types of attacks for getting the valuable information. Numbers of clients are being connected with the technology day by day. It`s being done hacked by junction or evil intruder. A very effective tool in this is Intrusion Detection System , which detects the attacks and analysis it to take proper decision against it. Intrusion Detection System has a great impact on cyber security and network vulnerability. Once the detection is scored, the initialed can be taken by IDS. Intrusion detection system is a software and hardware device. This paper will notify us overview of IDS and to create a secure zone in the sector of networking. Numerous intrusion detection techniques, methods and algorithms assist to detect these attacks. Furthermore, appropriate problems and challenges in this field are consequently illustrated and discussed.
Key-Words / Index Term
Security, Intrusion detection, Network Attacks, Prevention System, Analyzer, Dos, Misuse detection, Anomaly detection
References
[1] The Rebecca Bace, Peter Mell, “NIST Special Publication on Intrusion Detection Systems”, 16 August 2001, pp.1-51.
[2] Defeng Wang, Yeung, D.S., and Tsang, E.C., “Weighted Mahalanobis Distance Kernels for Support Vector Machines”, IEEE Transactions on Neural Networks, Vol. 18, No. 5, 2007, pp. 1453-1462.
[3] Intrusion.com, Intrusion Secure Host, white paper available at: www.intrusion.com/products/hids.asp, 2003.
[4] W. Jansen, P. Mell,” Mobile Agents in Intrusion Detection and Response”, In Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, September 2010, pp.77-91.
[5] C. Kruegel, T. Toth,” Distributed Pattern Detection for Intrusion Detection”, In Proceedings of the Network and Distributed System Security Symposium Conference, Internet Society, Los Angeles, CA, February 2002.
[6] E. Eskin, A. Arnold, M. Prerau, L. Portnoy and S. Stolfo,”A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, in Applications of Data Mining in Computer Security”, S. Jajodia D. Barbara, “Advances In Information Security”, Ed. Boston: Kluwer Academic Publishers, 2012.
[7] M. Esmaili, R. Safavi-Naini, B. Balachandran and Pieprzyk, J.” A Case Based Reasoning for Intrusion Detection System”, December 1996, pp. 214 - 223, doi: 10.1109/CSAC.1996.569702. ISSN: 1063-9527 [In Proceedings of the 12th Annual Computer Security Applications Conference].
[8] German Florez-Larrahondo, Zhen Liu, Yoginder S. Dandass, Susan M. Bridges, and Rayford Vaughn, “Integrating Intelligent Anomaly Detection Agents into Distributed Monitoring Systems”, 2006, Vol. 1, issue 1, pp.59–77 , ISSN 1554-1010 Dynamic Publishers, Inc.[ Journal of Information Assurance and Security].
[9] C. Krugel, T. Toth,” A Survey on Intrusion Detection Systems”, Technical University of Vienna Technical report, April 2010, pp.410-417. [Online Available: http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.72.605.
[10] Yanny Liu, “An Introduction to Intrusion Detection Systems”, in ACC 626 Term Report for: Professor Malik Datardina, July 5, 2009 pp.1-9.
[11] Nathan Einwechter, “An Introduction to Distributed Intrusion Detection Systems”, January 8, 2001. [Online Available:http://www.symantec.com/connect/articles/introduction-distributed-intrusion-detection-systems (Accessed 30 April 2013).
[12] Yongguang Zhang, wenkelee,” Intrusion detection in Wireless ad-hoc networks”, Published in Mobicom’00 Proceedings of the 6th annual international conference on Mobile computing and networking pp 275-283
[13] Ghosh and A. Schwartzbard,”A Study in Using Neural Networks for Anomaly and Misuse Detection”, In Proceedings of the Eighth USENIX Security Symposium, Washington, D.C., August 1999, pp. 141-152.
[14] Amrita Anand, Brajesh Patel,” An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols”, International Journal Of Advanced Research in Computer Science and Software Engineering, vol.2 Issue.8,August 2012,ISSN: 2277 128X, pp.94-98.
[15] G. Helmer, J.S.K Wong, V. Honavar and L. Miller, “Intelligent Agents for Intrusion Detection”, In Proceedings of the IEEE Information Technology Conference, Syracuse, NY,September 2007, pp.121-124.
[16] Sriram Sundar Rajan, Vijaya Krishna Cherukuri- “An Overview of Intrusion Detection Systems”.
[17] Karthikeyan .K.R and A. Indra- “Intrusion Detection Tools and Techniques a Survey”
[18] “Top 125 Network Security Tools”- SecTools.Org-http://sectools.org/tag/ids/sec
Citation
P. Kaliraj, B. Subramani, "Taxonomy of Intrusion Detection System –A Study," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.320-324, 2019.
Recent evaluation on Content Based Image Retrieval
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.325-329, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.325329
Abstract
Content Based Image Retrieval (CBIR) is the technique of retrieving the similar images from the large database as per user query by matching the contents of images. CBIR is widely used in various computer vision applications such as medical field, E-commerce, Satellite Imaging, and Art Collections and so on. Different types of contents which can be used for retrieving images are Color, Texture, Shape, and/or Spatial Information. The performance of CBIR depends vitally on Feature Extraction, Feature Reduction, Feature Selection, Similarity Measure, Classification, and Ranking. This paper presents the review of different feature extraction strategies used recently for CBIR. Literature review of different Feature Extraction methods used for evaluating the performance CBIR are discussed in order to grasping details about the domain. This review article mainly focuses on the feature extraction which is most crucial part of the CBIR system.
Key-Words / Index Term
CBIR, Feature Extraction, Color, Texture, Shape
References
[1]. Antani, Sameer, L Rodney Long, and George R Thoma. "Bridging the gap: Enabling CBIR in medical applications." Computer-Based Medical Systems, 21st IEEE International Symposium on. 2008. 4-6.
[2]. Chang, Che, X Yu, X Sun, and B Yu. "Image retrieval by information fusion based on scalable vocabulary tree and robust Hausdorff distance." Eurasip Journal on Advances in Signal Processing, 2017: 1-13.
[3]. Fadaei, S, R Amirfattahi, and M R Ahmadzadeh. "A New Content-Based Image Retrieval System Based on Optimized Integration of DCD, Wavelet and Curvelet Features." IET Image Processing 11, no. 2 (2017): 89-98.
[4]. Joshi, Chandani, GN Purohit, and Saurabh Mukherjee. "Impact of CBIR journey in satellite imaging." Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems. CRC Press, 2017. 341.
[5]. Kadobayashi, Rieko, and Katsumi Tanaka. "3D viewpoint-based photo search and information browsing." Proceedings of the 28th annual international ACM SIGIR conference on Research and development in information retrieval. ACM, 2005. 621-622.
[6]. Khare, Ashish, and Prashant Srivastava. "Utilizing multiscale local binary pattern for content-based image retrieval." Multimedia Tools and Applications 77, no. 10 (2017): 12377–12403.
[7]. Kumar, Arun T, and Naaz Effat. "Enhanced Content Based Image Retrieval Using Machine Learning Techniques." Innovations in Information, Embedded and Communication Systems, International Conference on. 2017. 1-12.
[8]. Liu, Y, D Zhang, G Lu, and W Y Ma. "A survey of content-based image retrieval with high-level semantics." Pattern Recognition 40, no. 1 (2007): 262-282.
[9]. Nagarajan, V, and T G Subash Kumar. "Local curve pattern for content-based image retrieval." Pattern Analysis and Applications In Press (2018): 1-10.
[10]. Rao, L. Koteswara, D. Venkata Rao, and L. Pratap Reddy. "Local mesh quantized extrema patterns for image retrieval." SpringerPlus 5, no. 1 (2016): 976-991.
[11]. Rui, Y, T S Huang, and S F Chang. "Image retrieval: Current techniques, promising directions, and open issue." Journal of Visual Communication and Image Representation 10, no. 1 (1999): 39-62.
[12]. Shriram, KV, PLK Priyadarsini, and A Baskar. "An intelligent system of content-based image retrieval for crime investigation." International Journal of Advanced Intelligence Paradigms 7, no. 3 (2015): 264--279.
[13]. Tan, Xiaoyang, and Bill Triggs. "Enhanced local texture feature sets for face recognition under difficult lighting conditions." International Workshop on Analysis and Modeling of Faces and Gestures. Springer, 2007. 168-182.
[14]. Tiwari, Ashwani Kumar, Vivek Kanhangad, and Ram Bilas Pachori. "Histogram refinement for texture descriptor based image retrieval." Signal Processing: Image Communication 53 (2017): 73-85.
[15]. Tyagi, Vipin. Content Based Image Retrieval Ideas Influences and Current Trends. Springer Nature Singapore Pte Ltd, 2017.
[16]. Zhou, Wengang, Houqiang Li, Jian Sun, and Qi Tian. "Collaborative Index Embedding for Image Retrieval." IEEE transactions on pattern analysis and machine intelligence 40, no. 5 (2018): 1154-1166.
Citation
S. M. Chavda, M. M. Goyani, "Recent evaluation on Content Based Image Retrieval," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.325-329, 2019.
Face Recognition: Modern Assessment of Features Extraction
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.330-335, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.330335
Abstract
Face recognition is the capability of identifying and authenticating the dominating and leading features of the face from the dataset images. It`s important in Access and Security, Healthcare, Banking, Criminal Identification, Payment, Advertising, and in many other fields. In this paper, we have assessment important basic phases of face recognition like Pre-processing, Face Detection, Feature Extraction, Optimal Feature Selection, and Classification. Feature Extraction, Feature Selection, and Classification play a major role in face recognition. The research area of statistical texture classification is widely investigated in several computer vision and pattern recognition problems. A general framework for face recognition with statistical and geometrical approaches and classification presented in this survey paper.
Key-Words / Index Term
Face Recognition, Feature Extraction Approaches, Optimal Feature Reduction, Classification
References
[1] Brunelli, R., & Poggio, T. (1993). Face Recognition: Features versus Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(10).
[2] Zhao, W., Krishnaswamy, A., Chellappa, R., Swets, D. L., & Weng, J. (1998). Discriminant analysis of principal components for face recognition. In Face Recognition (pp. 73-85). Springer, Berlin, Heidelberg
[3] Ahonen, T., Hadid, A., & Pietikäinen, M. (2004). Face recognition with local binary patterns. In European conference on computer vision (pp. 469-481). Springer, Berlin, Heidelberg.
[4] Tan, X., & Triggs, B. (2010). Recognition Under Difficult Lighting Conditions, In IEEE Transactions on Image Processing, 19(6), 1635–1650.
[5] Juefei-Xu, F., Luu, K., Savvides, M., Bui, T. D., & Suen, C. Y. (2011). Investigating age invariant face recognition based on periocular biometrics. In 2011 International Joint Conference on Biometrics (IJCB) (pp. 1-7). IEEE.
[6] Xie, Z., Jiang, P., & Zhang, S. (2017). Fusion of LBP and HOG using multiple kernel learning for infrared face recognition. In 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS) (pp. 81-84). IEEE. https://doi.org/10.1109/ICIS.2017.7959973
[7] Yin, X., & Member, X. L. (2017). Multi-Task Convolutional Neural Network for Pose-Invariant Face Recognition. IEEE Transactions on Image Processing, 7149(c), 1–12. https://doi.org/10.1109/TIP.2017.2765830
[8] Ayyavoo, T., & John Suseela, J. (2018). Illumination pre-processing method for face recognition using 2D DWT and CLAHE. IET Biometrics, 7(4), 380–390. https://doi.org/10.1049/iet-bmt.2016.0092
[9] Osuna, E., & Freund, R. (1997). Training Support Vector Machines: an Application to Face Detection, In Computer Vision and Pattern Recognition130–136.
[10] Sung, K., & Poggio, T. (1998). Example-Based Learning for View-Based Human Face Detection. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 20(1), 39–51.
[11] Yang, M. H., Roth, D., & Ahuja, N. (2000). A SNoW-based face detector. In Advances in neural information processing systems (pp. 862-868).
[12] Viola, P., & Jones, M. (2004). Robust Real-Time Face Detection. International Journal of Computer Vision, 57(2), 137–154.
[13] Weng, R., Lu, J., & Tan, Y. P. (2016). Robust Point Set Matching for Partial Face Recognition. IEEE Transactions on Image Processing, 25(3), 1163–1176. https://doi.org/10.1109/TIP.2016.2515987
[14] Yang, F., Yang, W., Gao, R., & Liao, Q. (2018). Discriminative Multidimensional Scaling for Low-Resolution Face Recognition. IEEE Signal Processing Letters, 25(3), 388–392. https://doi.org/10.1109/LSP.2017.2746658
[15] Ojala, T. (1996). A COMPARATIVE STUDY OF TEXTURE MEASURES WITH CLASSIFICATION BASED ON. Pattern Recognition, 29(1), 51–59.
[16] Guo, Y., Zhao, G., & Pietik, M. (2012). Discriminative features for texture description. Pattern Recognition, 45, 3834–3843. https://doi.org/10.1016/j.patcog.2012.04.003
[17] Rao, L. K., Rohini, P., & Reddy, L. P. (2018). Local color oppugnant quantized extrema patterns for image retrieval. Multidimensional Systems and Signal Processing, 1-23.
[18] Li, L., Feng, L., Wu, J., Sun, M. X., & Liu, S. L. (2018). Exploiting global and local features for image retrieval. Journal of Central South University, 25(2), 259-276.
[19] Wang, J., Fan, Y., Li, Z., & Lei, T. (2018). Texture classification using multi-resolution global and local Gabor features in pyramid space. Signal, Image and Video Processing. https://doi.org/10.1007/s11760-018-1341-6
[20] Fanaee, F., Yazdi, M., & Faghihi, M. (2019). Face image super-resolution via sparse representation and wavelet transform. Signal, Image and Video Processing, 13(1), 79-86. https://doi.org/10.1007/s11760-018-1330-9.
[21] Ayyavoo, T., & Suseela, J. J. (2017). Illumination pre-processing method for face recognition using 2D DWT and CLAHE. IET Biometrics, 7(4), 380-390.
[22] Zhou, D., Yang, D., & Zhang, X. (2017). Exploring joint encoding of multi-direction local binary patterns for image classification. Multimedia Tools and Applications, 1-25.
[23] Cui, X., Zhou, P., & Yang, W. (2017). Local dominant orientation feature histograms (LDOFH) for face recognition. In Applied Informatics Vol. 4, No. 1, p. 14.
[24] Weng, R., Lu, J., & Tan, Y. P. (2016). Robust point set matching for partial face recognition. IEEE transactions on image processing, 25(3), 1163-1176.
Citation
Payal P. Parekh, M. M. Goyani, "Face Recognition: Modern Assessment of Features Extraction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.330-335, 2019.
Keyword Search on Confidential Data in A Cloud Environment
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.336-338, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.336338
Abstract
Keyword search on confidential data in a cloud environment is the main focus of this research. The cloud providers are not fully trusted. So, it is necessary to outsource data in the encrypted form. In the attribute-based keyword search schemes, the authorized users can generate some search tokens and send them to the cloud for running the search operation. A new cryptographic primitive called key-policy attribute-based temporary keyword search provides this property. To evaluate the security of our scheme, we formally prove that our proposed scheme achieves the keyword secrecy property and is secure against selectively chosen keyword attack both in the random oracle model and under the hardness of Decisional Bilinear Diffie-Hellman assumption.
Key-Words / Index Term
Cipher text, Token, Encrypted form, leakage information, Temporary keyword
References
[1] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology-Eurocrypt 2004. Springer, 2004, pp. 506–522.
[2] Q. Zheng, S. Xu, and G. Ateniese, “Vabks: Verifiable attribute-based keyword search over outsourced encrypted data,” in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 522–530.
[3] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology– EUROCRYPT 2005. Springer, 2005, pp. 457–473.
[4] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and exten- sions,” in Advances in Cryptology–CRYPTO 2005. Springer, 2005, pp. 205–222.
[5] X. Boyen and B. Waters, “Anonymous hierarchical identity-based en- cryption (without random oracles),” in Annual International Cryptology Conference. Springer, 2006, pp. 290–307.
[6] Y. Yu, J. Ni, H. Yang, Y. Mu, and W. Susilo, “Efficient public key encryption with revocable keyword search,” Security and Communication Networks, vol. 7, no. 2, pp. 466–472, 2014.
[7] Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2706–2716, 2016.
[8] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacypreserving multi- keyword ranked search over encrypted cloud data,” IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, pp. 222–233, 2014.
[9] H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. S. Shen, “Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 312–325, 2016.
Citation
M. Prasanna Lakshmi, V. Esther Jyothi, M. Venkata Rao, "Keyword Search on Confidential Data in A Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.336-338, 2019.
Data Mining Techniques in Biological Research
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.339-343, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.339343
Abstract
In current era, the trend of application of data mining is widely used because of health sector is rich in information and data mining has become its necessity. In the healthcare organizations many data and information is generated on daily basis. Use of data mining and knowledge that help bring some interesting patterns which means eliminate manual tasks and easy data extraction from any electronic records, through that will secure medical records, save patient’s lives and also reduce the cost of medical services as well as early detection of any infectious disease on the basis of historical and advanced data collection. Data mining can enable healthcare organizations to predict trends in the patient’s medical condition and behavior proved by analysis of different prospects and by making connections between totally unrelated data and information. Generally the raw data from the healthcare organizations are tremendous and heterogeneous. These all data can be gathered from various sources or different components. Data mining has great importance for area of healthcare and also it represents comprehensive process that demands through understanding of requirement of the healthcare organization. Knowledge gained with the use of techniques of data mining can be used to make successful decisions that will improve success of healthcare organizations and also health of the patients. Data mining once started, represents continuous cycle of knowledge discovery. In this paper, I wish to discuss that how data mining is used in infectious disease like cervical cancer.
Key-Words / Index Term
Data Mining, Knowledge Discovery Database, Cervical cancer, Classification, Clustering
References
[1]. Eapen, A. G. (2004). “Application of Data mining in Medical Applications”.Ontario, Canada, 2004: University of Waterloo.
[2]. Chen M. S., Han J., and Yu P. S., (1996), ‘Data Mining: An Overview from Database Perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol.8, No.6, pp.866-883.
[3]. Cios K. J. (ed.), (2000), ‘Medical Data Mining and Knowledge Discovery”, Physica-Verlag (Springer).
[4]. Divya Tomar, Sonali Agarwal (2013), “A survey on Data Mining approaches for Healthcare” International Journal of Bio-Science and Bio-Technology, Vol-5, No-5, pp.241-266 (ISSN 2233-7849)
[5]. Illhoi Yoo, Patricia Alafaireet, Miroslav Marinov, Keila Pena-Hernandez, Rajitha Gopidi, Jia-Fu Chang, Lei Hua (2011) “Data Mining in Heath Care and Biomedicine: A survey of the literature” J Med Syst DOI 10.1007/s 10916-011-9710-5, Springer.
[6]. J.Han and M.Kamber(2006), “Data Mining: Concept and techniques”,2nd edition, The Morgan Kaufmann Series.
[7]. Brachman, R. J. & Anand, T. (1996), “The process of knowledge discovery in databases.” AAAI Press / The MIT Press.
[8]. Fayyad U.M. et al. (1996), “Data Mining and Knowledge Discovery: making sense out of data ”,IEEE Expert, Vol-11, No-5, pp. 20-25.
[9]. Kasper, Fauci, Hauser et al. (2015). Part-7: Oncology and Hematology. 19th Edition Harrion’s Principles of Internal Medicine. McGraw Hill Education: New York. P-467
[10]. https://www.cancer.org/cancer/cervical-cancer/about/what-is-cervical-cancer.html
[11]. Denny L. (2012) “Cervical cancer: prevention and treatment.” Discov Med. 14: PP-125–131.
[12]. Arbyn M, Castellsague X, DeSanjose S, et al. (2011) “ Worldwide burden of cervical cancer. Ann Oncol.” 22: PP- 2675–2686.
[13]. Yeole BB, Kumar AV, Kurkureet A, Sunny L (2004). “Population-based survival from cancers of breast, cervix and ovary in women in Mumbai.” Asian Pac J Cancer Prev. 5:308–315.
[14]. ICO Information Centre on HPV and cancer (Summary Report 2014-08-22).Human Papillomavirus and Related Diseases in India. 2014
[15]. PrashantNaresh, (Aug-2014). “Early Detection of Lung Cancer Using Neural Network Techniques”, Journal of Engineering Research and Applications, Vol-4, Issue-8.
[16]. Ravi Kumar, G., Ramachandra.A, Nagamani.K, (Aug-2013). “An Efficient Prediction of Breast Cancer Data Using Data Mining Techniques”, International Journal of Innovations in Engineering and Technology (IJIET) Vol-2, Issue-4.
[17]. K.Srinivas, B. Kavitha Rani and Dr. A. Govrghan (2010), “Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks” International Journal on Computer Science and Enginerring, Vol-2,No-2,pp.250-255.
[18]. A. Sudha (March-2012). “Utilization of Data Mining Approaches for Predictin of Life Threatening Diseases Survivability”, International Journal of Computer Applications (0975-8887) Vol-41-No. 17.
[19]. Neha Sharma (Sept-2012). “Framework for Early Detection and Prevention of oral Cancer Using Data Mining” International Journal of Advances in Engineering and Information Technology (IJAET) ISSN: 2231-1963, Vol-4, Issue-2, pp. 302-310.
[20]. Blake, C., & Merz, C.J. (2001) UCI Repository of Machine Learning Databases. [Machine-readable data repository]. University of California, Department of Information and Computer Information and Computer Science, Irvine, C.A. [Available from http://www.ics.uci.edu/~mlearn/MLRepository.html]
[21]. Sushmita Mitra, Pabitra Mitra(July-2000). “Staging of Cervical Cancer with Soft Computing”, IEEE Transactions on BioMedical Engineering, Vol-47, No-7.
[22]. C.McGregor, C.Christina and J. Andrew (2012), “ A process mining driven framework for clinical guideline improvement in critical care”, Learning from Medical Data Streams 13th Conference on Artificial Intelligence in Medicine (LEMEDS). http://ceur-ws.org, vol-765.
[23]. V. Vapnik (1998). “The support vector method of function estimation”
[24]. N. Chistianini and J. Shawe-Taylor (2000), “An Introduction to Support Vector Machines, and other Kernel-based learning methods”, Cambridge University Press.
[25]. Apte & S.M. Weiss (1997), “Data Mining with Decision Trees and Decision Rules”, T.J. Watson Research Center, http:// www.research.ibm.com/dar/papers/pdf/fgcsapteweissue_with_cover.pdf.
[26]. Kaur, H., and Wasan, S.K. (2006), “Empirical study on applications of data mining techniques in healthcare”, I.comput. Sci. 2(2), pp. 194-200.
[27]. Bellazzi, R, and Zupan, B.(2008), “Predictive data mining in clinical medicine: current issues and guidelines”, Int. J. Med. Inform. 77:pp. 81-97.
[28]. Ubeyli, E.D.(2007),” Comparison of different classification algorithms in clinical decision making”, Expert syst 24(1): pp.17-31.
[29]. Potter, R., (july-2007), “Comparison of classification algorithms applied to breast cancer diagnosis and prognosis, advances in data mining”, 7th Industrial Conference, ICDM- 2007, Leipzig, Germany, pp.- 40-49.
[30]. Romeo, M., Burden, F., Quinn, M., Wood, B., and McNaughton, D. (1998), “Infrared microspectroscopy and artificial neural networks in the diagnosis of cervical cancer”, Cell. Mol. Biol. (Noisy –le-Grand, France) 44(1): 179.
[31]. Brickly, M., Shepherd, J. P., and Armstrong, R.A.(1998), “Neural networks: a new technique for development of decision support systems in dentistry”, J.Dent. 26(4): pp. 305-309.
[32]. Einstein, A. J., Wu, H. S., Sanchez, M., and Gil, J.(1998), “fractal characterization of chromatin appearance for diagnosis in breast cytology”, J. Pathol. 185(4): pp. 366-381.
[33]. J. Fox (1997), “Applied Regression Analysis, Linear Models, and Related Methods”.
[34]. U. Fayyad, G. Piatetsky- Shapiro and P. Smyth (1996), “The KDD process of extracting useful knowledge from volumes of data. Commun.”, ACM, Vol-39, no-11,pp. 27-34.
[35]. Agrawal, R., Imielinski, T., and Swami, A.(1993), “Mining association rules between sets of items in large databases” , Proceedings of the ACM SIGMOD International Conference on the Management of Data. ACM, Washington DC, pp. 207-216.
[36]. Agrawal, R., and Srikant, R.(1994), “Fast algorithm for mining association rules”, Proceedings of the 20th international Conference on Very Large Data Bases (VLDB’94). Morgan Kaufmann, Santiago, pp. 487-499.
Citation
Dipti N. Punjani, Kishor H. Atkotiya, "Data Mining Techniques in Biological Research," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.339-343, 2019.
Enhanced Compression and Cryptographic Techniques for Securing Images- A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.344-348, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.344348
Abstract
A huge amount of data has been exchanged over various types of networks due to the rapid growth of computer networks and information technology. In major part of these exchanged data, they need security mechanisms to offer various degree of protection. The common solution to protect digital data from eavesdropping and intercepting is to encrypt the message which needs some knowledge of cryptography. Cryptography is a technique used today hiding any confidential information from the attack of an intruder and used to create authentication, integrity, availability and confidentiality. Nowadays, Digital data communication requires data security, so that data should reach to the intended user in safe manner. The protection of confidential data from unauthorized access can be done with many encryption techniques. Encryption is used to protect data from being accessed by unauthorized users. It is very important to communicate images over networks. The important image transfer will takes place over the unsecured internet network. Continuing development of the various electronic image processing technologies has produced faster means of transmission. Compression is often used to save disk space and reduce the time needed to transfer images over the networks. Compressing data can save storage capacity, speed up file transfer and reduce cost for hardware storage and network bandwidth.
Key-Words / Index Term
Data Compression, Data Encryption, Cryptography, Image Processing and Security Mechanism
References
[1] Chamman Lal Sahu , Chandra Shekhar Singh Thakur , Manoj Kumar Xalxo , Mohit Thakur , Miss RoshniRathour, “Survey on JPEG Image Compression Using DCT”, Volume 4 Issue X, October 2016, International Journal for Research in Applied Science & Engineering Technology (IJRASET).
[2] K. AyyappaSwamy , C. Somasundar Reddy, K. DurgaSreenivas , “Image Compression Using Hybrid DCT-DWT Transform”, International Journal of Advanced Research in Computer Science and Software Engineering 5(5), May- 2015.
[3] Dr.T. Karthikeyan, C. Thirumoorthi, "A Survey on Embedded Zero Tree Wavelet ", 2014 International Journal of Computer Science.
[4] Dr Mohammed Ismail.B, "Contemporary Bench Mark Techniques in Fractal image Compression-A Survey", International Journal of Engineering Technology Science and Research IJETSR, October 2017.
[5] Anita Thengade, RuchaDondal, "Genetic Algorithm – Survey Paper", International Journal of Computer Applications, April-2012.
[6] Peiya Li, Kwok-Tung Lo, “A Content-Adaptive Joint Image Compression and Encryption Scheme”, 1520-9210 (c) 2017 IEEE
[7] Mohab Mostafa L, Mohamed Waleed Fakhr, “Joint Image Compression and Encryption Based on Compressed Sensing and Entropy Coding”, 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA 2017), Penang, Malaysia
[8] Subhajit Roy, Prof.(Dr.)GautamSanyal, “An Approach to Selective Encryption on Compressed Image ”, on 2016 2nd International Conference on Contemporary Computing and Informatics (ic3i)
[9] Kalyani G. Nimbokar, Milind V.Sarode, MangeshM.Ghonge, “A Survey based on Designing an Efficient Image Encryption-then-Compression System”, International Journal of Computer Applications (0975 – 8887) National Level Technical Conference “X-PLORE 14
[10] Ganesh Lamkhade, Ajay Kumar Gupta, “A Survey on Efficient ETC (EncryptionThenCompression) Techniques for Image Data Security”, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358
[11] Maria Joseph, Tomson Devis,”Highly Secure Scalable Compression of Encrypted Images”, IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308, Oct -2015
[12] Prasanth P. S, Anusree L, “Lossy Compression and Reconstruction for Encrypted Image”, International Journal of Computer Science and Mobile Computing, ICMIC13, December- 2013, pg. 153-157
[13] G. Elavarasi, Dr. M. Vanitha, “A Novel Method for Securing Medical Image Using Visual Secret Sharing Scheme”, International Journal of Engineering and Technology (IJET), Vol 9 No 5 Oct-Nov 2017
[14] A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau,” Lossless Image Compression and Selective Encryption Using a Discrete Radon Transform”, 2007 IEEE
[15]Abraham Jun Jiang Lock, Chong HooiLoh, SitiHasanahJuhari, AzmanSamsudin, “Compression-Encryption Based on Fractal Geometric”, Second International Conference on Computer Research and Development, 2010 IEEE
[16] Xinpeng Zhang, “Lossy Compression and Iterative Reconstruction for Encrypted Image”, IEEE Transactions on Information Forensics and Security, VOL. 6, NO. 1, MARCH 2011
[17] Subhajit Roy , Prof.(Dr.)GautamSanyal, “An Approach to Selective Encryption on Compressed Image ”, 2016 2nd International Conference on Contemporary Computing and Informatics (ic3i), IEEE
[18] Daniel Schonberg, Stark Draper, Kannan Ramchandran, “On Compression Of Encrypted Images”, UC Berkeley, EECS Department, 211 Cory Hall #1772, Berkeley, CA 94720-1772 {dschonbe,sdraper,kannanr}
[19] B.Suneetha, “Designing an Efficient Image Encryption-then Compression System”, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering Vol. 3, Issue 3, March 2015
[20] EmySetyaningsih, RetantyoWardoyo, “Review of Image Compression and Encryption Techniques”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 2, 2017
[21] Xinpeng Zhang, Member, IEEE, Yanli Ren, Liquan Shen, Zhenxing Qian, and GuoruiFeng, “Compressing Encrypted Images With Auxiliary Information”, IEEE Transactions On Multimedia, VOL. 16, NO. 5, AUGUST 2014
[22] S. Dubey, R. Jhaggar , R. Verma and D. Gaur, “Encryption and Decryption of Data by Genetic Algorithm”, International Journal of Scientific Research in Computer Science and Engineering Vol.5, Issue.3, pp.42-46, June (2017)
[23] V. Kapoor, “A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security”, International Journal of Scientific Research in Network Security and Communication, Volume-1, Issue-2, June- 2013
Citation
G.Elavarasi, M. Vanitha , "Enhanced Compression and Cryptographic Techniques for Securing Images- A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.344-348, 2019.
Learning Analytics with Big Data: A Framework
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.349-353, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.349353
Abstract
Learning Management Systems (LMS) introduced in 1990’s support online learner-centered model by complete management of teaching, learning and assessment. These LMS help teachers to deliver course related material to their students, manage quizzes, exams and other course related tasks, evaluate student performance and manage other activities. The LMS tools like Moodle, Blackboard, Sakai, EvalTool, Dokeos etc., have produced outstanding results for both teachers as well as students. Since most of students use laptops and smart phones to access LMS for their learning related activities, therefore, their online activities generate huge volume of data that educational institutions can use to improve the performance of their teaching and learning activities. This huge volume of data can give a deep insight into the teaching and learning activities if analyzed properly. Learning Analytics(LA) is a new emerging field that analyzes this big data and develop the models that can predict the performance of student, detect the students who are most likely to drop out from the courses, prepare the reports, provide the intelligent and instant feedback to students, recommend the courses to students based on their interests and assesses the skills developed by the students. Therefore, by using learning analytics, teachers, students, faculty, and administrators can develop more engaged and effective teaching and learning techniques. Keeping in view the importance of LA, this paper discusses the LMS, LA and a framework for using LA on the LMS data.
Key-Words / Index Term
Learning Analytics (BA); Data Mining; Dashboard; Scorecard; Learning Management Systems (LMS)
References
[1] S. Retalis, A. Papasalouros, Y. Psaromiligkos, S. Siscos and T. Kargidis, “Towards networked learning analytics–A concept and a tool,” in 5th Int. Conference on Networked Learning, Lancaster, 2006.
[2] A. A. Pina, “An overview of learning management systems,” in Virtual Learning Environments: Concepts, Methodologies, Tools and Applications, 1st ed, Louisville, KY, USA, Information Resources Management Association (USA), 2012, p. 33–51.
[3] G. Siemens and R. S. Baker, “Learning analytics and educational data mining: Towards communication and collaboration,” in 2nd International Conference on Learning Analytics Knowledge, 2012.
[4] A. Rubel and K. Jones, “Student privacy in learning analytics: An information ethics perspective,” The Information Society, vol. 32, no. 2, pp. 143-159, 2016.
[5] S. Wallden and E. Makinen, “Educational data mining and problem-based learning,” Informatics in Education, vol. 13, no. 1, pp. 141-156, 2014.
[6] J. Wang, W. J. Doll, X. Deng, K. Park, M. Ga and M. Yang, “The impact of faculty perceived reconfigurability of learning management systems on effective teaching practices,” Computers & Education, vol. 61, p. 146–157, 2013.
[7] K. Parimala, G. Rajkumar, S. Ruba and S. Vijayalakshmi, “Challenges and Opportunities with Big Data,” International Journal of Scientific Research in Computer Science and Engineering, vol. 5, no. 5, pp. 16-20, 2017.
[8] S. Shirsath, V. A. Desale and A. D. Potgantwar, “Big Data Analytical Architecture for Real-Time Applications,” International Journal of Scientific Research in Network Security and Communication, vol. 5, no. 4, pp. 1-8, 2017.
[9] P. Long, G. Siemens, G. Conole and D. Gasevic, “Announcing open course: Learning and knowledge analytics,” in 1st Int. Conf. Learning Analytics and Knowledge , Banff, AB, Canada, 2011.
[10] L. Johnson, R. Smith, H. Willis, A. Levine and K. Haywood, The 2011 Horizon Report, Austin, Texas: The New Media Consortium, 2011.
[11] G. Siemens, “Learning Analytics: The Emergence of a Discipline,” American Behavioral Scientist, vol. 57, no. 10, p. 1380–1400, 2013.
[12] M. V. Harmelen and D. Workman, “Analytics for Learning and Teaching,” Centre for Educational Technology& Interoperability Standards, vol. 1, no. 3, 2012.
[13] R. S. J. Baker and K. Yacef, “The state of educational data mining in 2009: A review and future visions,” Journal of Educational Data Mining, vol. 1, no. 1, p. 3–17, 2009.
[14] C. Romero and S. Ventura, “Educational data mining: A review of the state of the art,” IEEE Transactions on Systems, Man, and Cybernetics, Part C, vol. 40, no. 6, p. 601–618, 2010.
[15] S. B. Shum and R. Ferguson, “Social learning analytics,” Journal of Educational Technology & Society, vol. 15, no. 3, p. 3–26 , 2012.
[16] H. Drachsler and W. Greller, “The Pulse of Learning Analytics Understandings and Expectations from the Stakeholders,” in Learning Analytics and Knowledge, 2011.
[17] N. S. Gill, “Data Preparation, Preprocessing and Wrangling in Deep Learning,” 23 May 2017. [Online]. Available: https://www.xenonstack.com/blog/preparation-wrangling-machine-learning-deep/. [Accessed 24 March 2019].
[18] R. Saxena and A. Srinivasan, Business Analytics-A Practitioner’s Guide, Springer, 2013.
[19] N. Raden, “The Foundations of Analytics:Visualization, Interactivity and Utility. The ten principles of Enterprise Analytics,” Spotfire, Inc, Somerville, U.S.A, 2010.
[20] ECAR, “The Predictive Learning Analytics Revolution: Leveraging Learning Data for Student Success.,” ECAR-ANALYTICS Working Group, Louisville, CO: ECAR, 2015.
[21] Halo, “Descriptive, Predictive, and Prescriptive Analytics Explained,” 24 March 2019. [Online]. Available: https://halobi.com/blog/descriptive-predictive-and-prescriptive-analytics-explained/.
[22] L. O’Farrell, “Using Learning Analytics to Support the Enhancement of Teaching and Learning in Higher Education,” National Forum for the Enhancement of Teaching and Learning in Higher Education, Dublin 2, Ireland , 2017.
[23] A. Kirtland, “Executive Dashboards,” 20 1 2006. [Online]. Available: http://dssresources.com/papers/features/kirtland/kirtland01202006.html.
[24] A. Vasiliu, “Dashboards and scorecards: Linking management reporting to execution,” 30 4 2006. [Online]. Available: http://dssresources.com/papers/features/vasiliu/vasiliu04302006.html.
[25] Gravic, “The Evolution of Real-Time Business Intelligence and How To Achieve It Using HPE Shadowbase Software,” Gravic , Inc., Malvern, PA,USA, 2017.
[26] D. Chappelle, “Big Data & Analytics Reference Architecture,” Oracle Corporation, CA, USA, 2013.
[27] R. Kaplan and D. Norton, The balances scorecard, Boston: Harvard Business Press, 1996.
[28] C. M. Olszak, “An overview of information tools and technologies for competitive intelligence building: Theoretical approach,” Issues in Informing Science and Information Technology, vol. 11, pp. 139-153, 2014.
[29] A. Daud, N. R. Aljohani, R. A. Abbasi, M. D. Lytras, F. Abbas and J. S. Alowibdi, “A Predicting Student Performance using Advanced Learning Analytics,” in Proceedings of the 26th International Conference on World Wide Web Companion, Perth, Australia, 2017.
Citation
Rafi Ahmad Khan, "Learning Analytics with Big Data: A Framework," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.349-353, 2019.
Effort of Load Balancing to achieve Green Computing
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.354-359, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.354359
Abstract
In a distributed computing, the serious problem from the starting days is the distribution of load among servers in the commercial internet. Cloud computing faces some challenges in Load balancing and it requires the energetic workload among various nodes and it assure that not a single node get affected. The important aim is the minimization of the load balance from the sources utilization which would be decreased by the release rate of the carbon and energy consumption would be extremely required in cloud computing.
Key-Words / Index Term
Cloud computing, Green computing, Load Balancing, Carbon footprint and Energy efficiency
References
[1] R.Mata - Toledo, and P. Gupta “Green Data centers, how green can we perform”, Journal of Technology Research Academic and Business Research Institute, Vol. 3 No. 1, May 2010 pages 2-8.
[2] C.S. Yeob , S.K. Garg , R. Buyya, A Anandasivamc, “Environment-Conscious scheduling of HPC applications on distributed cloud - oriented data centers ” Journal of Parallel and Distributed Computing Elsevier, Vol. 70, No. 5, May 2010, pages 1-18.
[3] V.Topka ,S.Kabiraj , and R.C Walke , “Going Green : A holistic Approach to Transform Business ” , International Journal of managing Information Technology Vol. 2 No. 3 , August 2010 , pages 22-31.
[4] W.A.Ayre , J.Baliga , R.S Tucker and K.Hinton, “Green cloud computing balancing energy in processing storage, and Transport ” , Proceedings of the IEEE , Vol 99 , No. 1 , January 2011 , pages 149-167.
[5] J.Gu , J.Hu , T.Zhao and G. Sun , “A Scheduling Strategy on load balancing of virtual Machine Resource in cloud computing environment” , Third International Symposium on parallel Architecture , Algorithm and programming 2010 , pages 88-95.
[6] F. Wang , Y. Fang , and J. Ge , “A Task Scheduling Algorithm Based on Load Balancing in cloud computing ”, Web Information System and Mining , Lecture notes in Computer science Vol. 6318 2010, pages 271-277.
[7] S. Chaudhary and A. Bhadani , “Performance evaluation of web servers using central load balancing policy over virtual machines on cloud” ,Proceedings of the Third Annual ACM Bangalore Conference , January 2010.
[8] M. Randles , A. Taleb - Bendiab and D. Lamb , “A comparative study into distributed load balancing Algorithms for cloud computing” , Proceedings of 24th IEEE International Conference on Advanced Information Networking and Application workshops , Perth , Australia , April 2010, pages 551-555.
[9] S.Liu , X-Meng , H.liu , Y.Zhang and C.Yang , “LBVS : A Load Balancing strategy for virtual storage ”, International Conference on Service Sciences , IEEE , 2010 , pages 25-262
[10] E.Madeira ,A.M.Nakai and L.E. Buzata “Load balancing for internet distributed Services using limited redirection rates” 5th IEEE Latin American Symposium on dependable computing , 2011, pages 156-165..
[11] Lei Pan , Xi Lei , chong-jun , jun-yuan , Wang and Xie, “A Lock - Free Solution for load balancing in multicore Environment”, 3rd IEEE International Workshop on Intelligent System and Application , 2011, pages 1-4.
[12] X. Zhang and Z.Zhang , “A Load Balancing Mechanism Based on Ant Colony and complex network Theory in open cloud computing federation”, Proceeding of 2nd International Mechatronics and Automation, Wuhan , China, May 2010, pages 240-243.
Citation
Lubna Kalam, Ihtiram Raza Khan, "Effort of Load Balancing to achieve Green Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.354-359, 2019.
Linear Support Vector Machine (SVM) with Stochastic Gradient Descent (SGD) training & multinomial Naïve Bayes (NB) in News Classification
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.360-363, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.360363
Abstract
The motivation for this work arises from the need of Automatic Document Classification (ADC) which is necessary when the task involves business specific contexts which cannot be fulfilled via querying on any search engine. Since a large number of websites are available over the internet nowadays therefore users generally search information from different websites via search engines now. But search engines require appropriate keywords from users in order to give relevant information from the web and sometimes users have obtained irrelevant results if he or she is not sound enough to provide keywords correctly. Thus, we need a proper document classification for the material of our wish so that the one which is required can be obtained easily instead of wasting time in searching. To understand this, we have discussed the automatic document classification in news domain where we classify news articles into four distinct categories: business, science & technology, entertainment and health using Linear SVM with SGD training and multinomial NB classifier and compare their performance. The classification is based on the title of the news article taken as feature.
Key-Words / Index Term
Automatic Document Classification, Linear SVM, Stochastic Gradient Descent, multinomial NB
References
[1] C.C. Aggarwal and C. Zhai, “Mining Text Data”, MA: Springer, Eds. Boston, pp. 163-222, 2012.
[2] T. Jo, “Classifying News Articles Using Feature Similarity K Nearest Neighbor”, In Proc. of the 6th Int. Conf. on Green and Human Information Technology, ICGHIT 2018, Chiang Mai, Thailand, pp. 73-78, 2018.
[3] S. Xu, Y. Li and Z. Wang, “Bayesian Multinomial Naïve Bayes Classifier to Text Classification”, In Proc. of the 11th Int. Conf. on Multimedia and Ubiquitous Engineering, MUE 2017, Proc. of the 12th Int. Conf. on Future Information Technology, FutureTech 2017, Seoul, South Korea, pp. 347-352 2017.
[4] A. Hassaine, S. Mecheter and A. Jaoua, “Text Categorization Using Hyper Rectangular Keyword Extraction : Application to News Articles Classification”, In Proc. of the 15th Int. Conf. on Relational and Algebraic methods in Computer Science, RAMiCS 2015, Braga, Portugal, pp. 312-325 , 2015.
[5] A. A. Hakim, A. Erwin, K. I. Eng, M. Galinium and W. Muliady, “Automated document classification for news article in Bahasa Indonesia based on term frequency inverse document frequency (TF – IDF) approach”, In Proc. of the 6th Int. Conf. on Information Technology and Electrical Engineering, ICITEE 2014, Yogyakarta, Indonesia, pp. 1-4, 2014.
[6] S. Qiu, M. Jiang, Z. Zhang, Y. Lu and Z. Pei, “Chinese News Text Classification of the Stacked Denoising Auto Encoder Based on Adaptive Learning Rate and Additional Momentum Item”, In Proc. of the 15th Int. Symposium on Neural Networks, ISNN 2018, Minsk, Belarus, pp. 578-584, 2018.
[7] C. Li, G. Zhan and Z. Li, “ News Text Classification Based on Improved Bi-LSTM-CNN,” In Proc. of the 9th Int. Conf. on Information Technology in Medicine and Education, ITME 2018, Hangzhou, China, pp. 890-893, 2018.
[8] M. Fanjin, H. Ling and T.J.W. Xinzheng, “The Research of Semantic Kernel in SVM for Chinese Text Classifiction” , In Proc. of the 2nd Int. Conf. on Intelligent Information Processing, IIP’17 2017, Bangkok, Thailand, 2017.
[9] A.D. Patel and Y.K. Sharma, “Web Page Classification on News Feeds Using Hybrid Technique for Extraction”, In Proc. of the 3rd Int. Conf. on Information and Communication Technology for Intelligent Systems, ICTIS 2018, Ahmedabad, India, pp. 399-305, 2018.
[10] F. Kabir, S. Siddique, M. R. A. Kotwal and M. N. Huda, “Bangla text document categorization using Stochastic Gradient Descent (SGD) classifier”, In the Int. Conf. on Cognitive Computing and Information Processing, CCIP 2015, Noida, India, pp. 1-4, 2015.
[11] S. Brindha, K. Prabha and S. Sukumaran, “A survey on classification techniques for text mining" , In Proc. of the 3rd Int. Conf. on Advanced Computing and Communication Systems, ICACCS 2016, Coimbatore, India, pp. 1-5, 2016.
[12] M. Lichman, “News Aggregator Data Set”, UCI Machine Learning Repository, 2013. (https://archive.ics.uci.edu)
Citation
Feroz Ahmed, Shabina Ghafir, "Linear Support Vector Machine (SVM) with Stochastic Gradient Descent (SGD) training & multinomial Naïve Bayes (NB) in News Classification," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.360-363, 2019.