Multiple Image Hiding Using Arnold Transformation
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.295-299, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.295299
Abstract
Dct and Arnold transform is used for a procedure called encryption where encryption is a process of adding extra bits top the information which can be read by the end to end sender and receiver. Example of encryption can defined as let’s consider a sentence ‘’there code is 100052’’ this is very confidential which should be known only to two persons which is sender and receiver. Here sender adds some information using some algorithms and the sentence becomes ‘thereacodeaisa1a0a0a0a5a2’ or a by using a circuit called encoder. The same when the receiver uses the same encoded algorithm to remove the extra bits added here is the original data is obtained by using decoder circuit which performs the inverse operation of that of encoder. To hide the information or a string were a image consists of 4 parts by applying the 2nd level LWT. Low frequency sub bands LL2 and LH2 are then converted by DCT. And the 2 image are converted using DCT and again one of the converted image is the n again applied to ARNOLD. The output of Arnold is the water marked image.
Key-Words / Index Term
RDWT and SVM, Watermarking, Encoding.
References
[1] N. Otsu, “A threshold selection method from gray-level histograms,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 9, no. 1, pp. 62–66, 1979.
[2] J. Kapur, P. Sahoo, and A. Wong, “A new method for gray-level picture thresholding using the entropy of the histogram,” Computer Vision, Graphics, and Image Processing, vol. 29, no. 3, pp. 273–285, 1985.
[3] W. Niblack, An introduction to digital image processing. Englewood Cliffs: Prentice Hall, 1986.
[4] J. Sauvola and M. Pietikäinen, “Adaptive document image binarization,” Pattern Recognition, vol. 33, no. 2, pp. 225–236, 2000.
[5] B. Gatos, I. Pratikakis, and S. Perantonis, “Adaptive degraded document image binarization,” Pattern Recognition, vol. 39, no. 3, pp. 317–327, 2006.
[6] D. Bradley and G. Roth, “Adaptive thresholding using the integral image,” Journal of Graphics Tools, vol. 12, no. 2, pp. 13–21, 2007.
[7] C. Wolf and J.-M. Jolion, “Extraction and recognition of artificial text in multimedia documents,” Formal Pattern Analysis & Applications, vol. 6, no. 4, pp. 309–326, 2004.
[8] M.-L. Feng and Y.-P. Tan, “Adaptive binarization method for document image analysis,” in Proc. 2004 IEEE International Conference on Multimedia and Expo (ICME), vol. 1, June 2004, pp. 339–342.
[9] M.F. M. El Bireki, M. F. L. Abdullah, Ali A. M. Ukasha and Ali A. Elrowayati , “Digital Image Watermarking Based On Joint (DCT-DWT) and Arnold Transform” in International Journal of Security and Its Applications Vol. 10, No. 5 , pp.107-118,2016.
[10] Vivek Singh Verma , Rajib Kumar Jha, “Improved watermarking technique based on significant difference of lifting wavelet coefficients” in Springer ,2014. DOI 10.1007/s11760-013-0603-6.
[11] Sushma G. Kejgir, Manesh Kokare, “Lifting Wavelet Transform with Singular Value Decomposition for Robust Digital Image Watermarking ” in International Journal of Computer Applications • February 2012.Document Recognition and Retrieval XVI, vol. 7247, 2009, pp. 7247– 7247–9.
[12]L. P. Saxena, “Niblack’s binarization method and its modifications to real-time applications: a review,” Artificial Intelligence Review, pp. 1–33, 2017.
[13] R. F. Moghaddam and M. Cheriet, “AdOtsu: An adaptive and parameterless generalization of Otsu’s method for document image binarization,” Pattern Recognition, vol. 45, no. 6, pp. 2419–2431, 2012.
[14] C.-H. Chou, W.-H. Lin, and F. Chang, “A binarization method with learning-built rules for document images produced by cameras,” Pattern Recognition, vol. 43, no. 4, pp. 1518–1530, 2010.
[15] V. Kulyukin, A. Kutiyanawala, and T. Zaman, “Eyes-free barcode detection on smartphones with Niblack’s binarization and Support Vector Machines,” in Proceedings of the 16th International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV’2012) at the World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP, vol. 1. CSREA Press, 7 2012, pp. 284–290.
Citation
Vinjamuri Roopaswi, V.V. Hari Babu, "Multiple Image Hiding Using Arnold Transformation," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.295-299, 2019.
Heuristic Approach in Association Rule Hiding- A Study
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.300-305, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.300305
Abstract
Privacy preserving data mining Extracts relevant knowledge from large amount of data and at the same time protect sensitive information from the data miners. People in business, hospitals, educational institutions, and banks need a secure and safe transaction of their data. To serve this need Privacy Preserving Data Mining (PPDM) was created. PPDM solves the problem related to designing accurate models about combined data without requiring the access to exact information in individual data record. PPDM is the most important research area for protecting the perceptive data or knowledge. The important technique of PPDM is Association rule hiding that protects the association rules generated by association rule mining. This study presents a survey of association rule hiding approach for preserving privacy of the user data. Association rule hiding methodology consists of five approaches namely Heuristic, Border, Exact, Cryptography and Reconstruction The study has briefly explained the Heuristic approach.
Key-Words / Index Term
Privacy preserving Data Mining, Association Rule Hiding approaches. Heuristic Approach
References
[1]. S. Verykios, A. K. Emagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE Transactions on Knowledge and Data Engineering, 16(4):434–447, 2004.
[2]. Inan and Y. Saygin. Privacy preserving spatio-temporal clustering on horizontally partitioned data. In Proceedings of the 8th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2006), pages 459–468, 2006.
[3]. Peng Cheng1,3 • John F. Roddick2 • Shu-Chuan Chu2 • Chun-Wei Lin1 Privacy preservation through a greedy, distortion-based rule-hiding method, Springer Science+Business Media New York 2015 , Appl Intell (2016) 44:295–306 DOI 10.1007/s10489-015-0671-0.
[4]. Telikani, A. Shahbahrami and R. Tavoli,Data sanitization in association rule mining based on impact factor, Journal of AI and Data Mining Vol 3, No 2, 131-140. 2015.
[5]. Syam Menon and Sumit Sarkar privacy and big data: scalable approaches to sanitize large transactional databases for sharing, big data & analytics in networked business MIS Quarterly Vol. 40 No. 4, pp. 963-981/December 2016.
[6]. Afrah Farea, Ali Karcı Applications of Assoiation Rules Hiding Heuristic Approaches, SİU-2015: Sinyal İşleme Ve İletişim Uygulamalari Kurultayi.
[7]. R.Hemalatha 2 M.Elamparithi Privacy Preserving Data Mining Using Sanitizing Algorithm, International Journal of Computer Science and Information Technologies, Vol. 6 (5) , 4174-4179, ISSN -0975-9646 2015.
[8]. Divya C. Kalariya , Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule International Journal of Computer Applications Volume 122 – No.8 (0975 – 8887), July 2015
[9]. Saad M. Darwish, Magda M. Madbouly, and Mohamed A. El-Hakeem, A Database Sanitizing Algorithm for Hiding Sensitive Multi-Level Association Rule Mining, International Journal of Computer and Communication Engineering, Vol. 3, No. 4, July 2014.
[10]. Rahat Ali SHAH,Sohail ASGHAR Privacy preserving in association rules using a genetic algorithm , Turkish Journal of Electrical Engineering & Computer Sciences, (2014) 22: 434 { 450, doi:10.3906/elk-1206-66.
[11]. Dr.Vijayalakshmi M N1 S.Anupama Kumar2 Kavyashree BN3, Investigating Interesting Rules Using Association Mining for Educational Data, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 2, February 2014.
[12]. Tapan Sirole ,Jaytrilok Choudhary , A Survey of Various Methodologies for Hiding Sensitive Association Rules, International Journal of Computer Applications (0975 – 8887) Volume 96– No.18, June 2014.
[13]. Dhiren R. Patel, Ph.D Khyati B. Jadav Jignesh Vania , A Survey on Association Rule Hiding Methods, International Journal of Computer Applications (0975 – 8887) Volume 82 – No 13, November 2013
[14]. Suma B. Suma B. Association Rule Hiding Methodologies: A Survey, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 6, June – 2013.
[15]. Dhyanendra Jain 1,Amit sinhal2,Neetesh Gupta3, Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s), International Journal of Artificial Intelligence & Applications (IJAIA), Vol.3, No.2, March 2012.
[16]. Shyue-LiangWang, Tzung-Pei Hong • Chun-Wei Lin •Kuo-Tung Yang, Using TF-IDF to hide sensitive itemsets, Appl Intell (2013) 38:502–510 DOI 10.1007/s10489-012-0377-5.
[17]. Nidhi Porwal, Sunil Kumar Mahaveer Singh , An Algorithm for Hiding Association Rules on Data Mining, National Conference on Communication Technologies & its impact on Next Generation Computing CTNGC 2012 Proceedings published by International Journal of Computer Applications® (IJCA).
[18]. Gwadera GLR, Gkoulalas-Divanis A (2013) Permutation-based sequential pattern hiding. In: IEEE International Conference on Data Mining (ICDM), pp 241–250
[19]. Mariscal, G., Marban, O. & Fernandez, C. (2010).A survey of data mining and knowledge discovery process models and methodologies. The Knowledge Engineering Review, vol. 5, no. 2, pp. 137-166.
[20]. Vignani, B. & Satapathy, S. C. (2014). D-pattern evolving and inner pattern evolving for high performance text mining. Advances in Intelligent Systems and Computing, vol. 247, pp. 501-507.
[21]. Jena, L. K., Kamila, N. & Mishra, S. (2014). Privacy preserving distributed data mining with evolutionary computing. Advances in Intelligent Systems and Computing, vol. 247, pp. 259-267.
[22]. Lijffijt, J., Papapetrou, P. & Puolamäki, K. (2014).A statistical significance testing approach to mining the most informative set of patterns. Data Mining and Knowledge Discovery, vol. 28, pp. 238-263.
[23]. Verykios, V. 2013. “Association Rule Hiding Methods,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery (3:1), pp. 28-36.
[24]. T. Tassa, “Secure Mining of Association Rules in Horizontally Distributed Databases”, IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, (2014) April, pp. 970-983.
[25]. R. Nilesh, and P. b. Nilesh, S. H. Krupali, “Privacy Preserving in Association Rule mining”, international journal of advanced and innovative research (IJAIR), Vol.2, No. 4, 2013, pp. 2278-7844.
[26]. H.Hamilton, DBD: data mining projects", University of Regina Available at:http://www2.cs.uregina.ca/dbd/cs831/index.html, 2000{9, Last accessed: 15.03.2012
[27]. Maulesh R. Chhatrapati Shilpa Sherasiya Privacy Preserving Data Mining Using Heuristic Approach IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 10 | March 2015 ISSN (online): 2349-6010.
[28]. Saiyed Wafa Ahsan* R. K. Gupta A Heuristic Approach to Association Rule Mining International Journal of Advanced Research in Computer Science and Software Engineering. Volume 6, Issue 2, February 2016 ISSN: 2277 128X.
[29]. Hitesh Chhinkaniwala 1 and Dr. Sanjay Garg2 Privacy Preserving Data Mining Techniques: Challenges & Issues. Proceedings of International Conference on Computer Science & Information Technology, CSlT – 2011.
[30]. Mrs. P.Cynthia Selvi, Dr. A.R.Mohamed Shanavas An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 5, Issue 1 (Sep-Oct. 2012), PP 06-11
Citation
S. Sharmila, S. Vijayarani, "Heuristic Approach in Association Rule Hiding- A Study," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.300-305, 2019.
Indo-Privacy-Barometerv 1.0: Discerning Trends in the Privacy Attitude of Indian Users of Social Networking Sites
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.306-314, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.306314
Abstract
In an era of online social networking, the data privacy is becoming on important topic for researchers to explore. To regulate collection, use and processing of personal data, one needs to understand the behavioral attitude of users of internet so that their need for a law can be assessed. Several studies in this regard have been conducted in other parts of the world where data privacy law is in place, but in India the data privacy was not even a right till recently, when Supreme Court of India declared data privacy as part of the fundamental right of privacy in accordance with constitution of India. The present study is a maiden attempt in India to understand the privacy attitude of the Indian users of social networking sites.
Key-Words / Index Term
Indobarometer, Data Privacy, Privacy Attitudes, Social Networking Sites, SNSs, Human behavior in Cyber Space
References
[1] H. J. Smith, T. Dinev, and H. Xu, "Information privacy research: an interdisciplinary review," MIS quarterly, vol. 35, no. 4, pp. 989-1016, 2011. MIS quarterly
[2] A. F. Westin, "Social and political dimensions of privacy," Journal of social issues, vol. 59, no. 2, pp. 431-453, 2003.
[3] M. Z. Yao, "Self-protection of online privacy: A behavioral approach," in Privacy Online: Springer, 2011, pp. 111-125.
[4] I. Ajzen, "From intentions to actions: A theory of planned behavior," in Action control: Springer, 1985, pp. 11-39.
[5] I. Ajzen, "The theory of planned behavior," Organizational behavior and human decision processes, vol. 50, no. 2, pp. 179-211, 1991.
[6] I. Ajzen and M. Fishbein, "The influence of attitudes on behavior," The handbook of attitudes, vol. 173, no. 221, p. 31, 2005.
[7] R. Gross and A. Acquisti, "Information revelation and privacy in online social networks," in Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 2005, pp. 71-80: ACM.
[8] B. Debatin, J. P. Lovejoy, A.-K. Horn, and B. N. Hughes, "Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Con-sequences," Journal of Computer-Mediated Communication, vol. 15, pp. 83-108, 2009. Journal of Computer-Mediated Communication
[9] F. Stutzman and J. Kramer-Duffield, "Friends only: examining a privacy-enhancing behavior in facebook," in Proceedings of the SIGCHI conference on human factors in computing systems, 2010, pp. 1553-1562: ACM.
[10] Z. Tufekci, "Grooming, gossip, Facebook and MySpace: What can we learn about these sites from those who won`t assimilate?," In-formation, Communication & Society, vol. 11, no. 4, pp. 544-564, 2008.
[11] S. Eurobarometer, "359. 2011," Attitudes on Data Protection and Electronic Identity in the European Union, p. 42, 2011.
[12] D. Borsboom, Conceptual issues in psychological measurement. Universiteit van Amsterdam [Host], 2003.
[13] M. Lovelace and P. Brickman, "Best practices for measuring students’ attitudes toward learning science," CBE-Life Sciences Edu-cation, vol. 12, no. 4, pp. 606-617, 2013.
[14] A. Agresti, "An introduction to categorical data analysis, 2nd edn. Hoboken," ed: NJ: Wiley-Interscience, 2007.
[15] S. Jamieson, "Likert scales: how to (ab) use them," Medical education, vol. 38, no. 12, pp. 1217-1218, 2004.
[16] H. J. Gardner and M. A. Martin, "Analyzing ordinal scales in studies of virtual environments: Likert or lump it!," Presence: Tele-operators and Virtual Environments, vol. 16, no. 4, pp. 439-446, 2007.
[17] H. M. Marcus-Roberts and F. S. Roberts, "Meaningless statistics," Journal of Educational Statistics, vol. 12, no. 4, pp. 383-394, 1987.
Citation
Sandeep Mittal, Priyanka Sharma, "Indo-Privacy-Barometerv 1.0: Discerning Trends in the Privacy Attitude of Indian Users of Social Networking Sites," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.306-314, 2019.
Deep learning aiding Health Informatics in Drug discovery
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.315-320, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.315320
Abstract
The changes that occur are exciting and more challenging in our industry. There has been a massive increase in the amount of data in health informatics in the last decade. Over the years, deep learning is raising with its extraordinary success in the research areas of artificial intelligence. If we form larger neural network and then we train it with more available data and fast enough computers their performance then continues to arise. Earlier, machine-learning tools such as QSAR (quantitative structure-activity relationship) modeling have been used to identify potential biological active molecules from millions candidate compounds for drug discovery. But, in this era of big data machine learning approaches lack efficiency. Hence, deep learning evolved as a solution to the problem of big data. In this paper we discuss various deep learning approaches studied for various applications of health informatics with special reference to drug discovery.
Key-Words / Index Term
Deep learning, Deep neural network, Convolutional neural network, Recurrent neural network, Deep Autoencoder, Health informatics
References
[1] Jacobson Ralph (2013, April 24) 2.5 quintillion bytes of data created every day. How does CPG & Retail manage it? https://www.ibm.com/blogs/insights-on-business/consumer-products/2-5- quintillion-bytes-of-data-created-every-day-how-does-cpg-retail-manage-it/ (accessed on august 15, 2018)
[2] Goodfellow, I., Bengio, Y., Courville, A., &Bengio, Y. (2016). Deep learning (Vol. 1). Cambridge: MIT press.
[3] Yao, X. J., Panaye, A., Doucet, J. P., Zhang, R. S., Chen, H. F., Liu, M. C., ... & Fan, B. T. (2004). Comparative study of QSAR/QSPR correlations using support vector machines, radial basis function neural networks, and multiple linear regression. Journal of chemical information and computer sciences, 44(4), 1257-1266.
[4] https://en.wikipedia.org/wiki/Deep_learning (accessed on august 15, 2018)
[5] Bilal AfaanArtificial Neural Networks and Deep Learning. Retrieved from https://becominghuman.ai/artificial-neural-networks-and-deep-learning-a3c9136f2137 (accessed on august 15, 2018)
[6] King Paul (2016, April 17) https://www.quora.com/How-do-artificial-neural-networks-work (accessed on august 15, 2018)
[7] Ruder, S. (2016). An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747.
[8] Chen, H., Engkvist, O., Wang, Y., Olivecrona, M., &Blaschke, T. (2018). The rise of deep learning in drug discovery. Drug discovery today.
[9] Cortes, C. and Vapnik, V. (1995) Support-vector networks. Mach. Learn. 20, 273–297
[10] Ho, T.K. (1998) The random subspace method for constructing decision forests. IEEE Trans. Pattern Anal. Mach. Intell. 20, 832–844
[11] Schmidhuber, J. (2015). Deep learning in neural networks: An overview. Neural networks, 61, 85-117.
[12] Lee, H., Grosse, R., Ranganath, R., & Ng, A. Y. (2011). Unsupervised learning of hierarchical representations with convolutional deep belief networks. Communications of the ACM, 54(10), 95-103.
[13] Fernández, S., Graves, A., &Schmidhuber, J. (2007). An application of recurrent neural networks to discriminative keyword spotting. In International Conference on Artificial Neural Networks (pp. 220-229). Springer, Berlin, Heidelberg.
[14] Sak, H., Senior, A., &Beaufays, F. (2014). Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In Fifteenth annual conference of the international speech communication association.
[15] Bengio, Y. (2009) Learning deep architectures for AI. Found. Trends Mach. Learn. 2, 1–127
[16] Krizhevsky, A., & Hinton, G. E. (2011, April). Using very deep autoencoders for content-based image retrieval. In ESANN.
[17] Ravı, D., Wong, C., Deligianni, F., Berthelot, M., Andreu-Perez, J., Lo, B., & Yang, G. Z. (2017). Deep learning for health informatics. IEEE journal of biomedical and health informatics, 21(1), 4-21.
[18] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proc. IEEE, vol. 86, no. 11,pp. 2278–2324, Nov. 1998.
[19] D. H. Hubel and T. N.Wiesel, “Receptive fields, binocular interaction and functional architecture in the cat’s visual cortex,” J. Physiol., vol. 160, no. 1, pp. 106–154, 1962.
[20] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Proc. Adv. Neural Inf.Process. Syst., 2012, pp. 1097–1105.
[21]M. D. Zeiler and R. Fergus, “Visualizing and understanding convolutional networks,” in Proc. Eur. Conf. Comput. Vision, 2014, pp. 818–833.
[22] C. Szegedyet al., “Going deeper with convolutions,” in Proc. Conf. Comput. Vis. Pattern Recognit., 2015, pp. 1–9.
[23] R. J. Williams and D. Zipser, “A learning algorithm for continually running fully recurrent neural networks,” Neural Comput., vol. 1, no. 2, pp. 270–280, 1989
[24] Y. Bengio, P. Simard, and P. Frasconi, “Learning long-term dependencies with gradient descent is difficult,” IEEE Trans. Neural Netw., vol. 5, no. 2,pp. 157–166, Mar. 1994.
[25] G. E. Hinton and R. R. Salakhutdinov, “Reducing the dimensionality of data with neural networks,” Science, vol. 313, no. 5786, pp. 504–507, 2006.
[26] C. Poultney et al., “Efficient learning of sparse representations with an energy-based model,” in Proc. Adv. Neural Inf. Process. Syst., 2006, pp. 1137–1144.
[27] P. Vincent, H. Larochelle, Y. Bengio, and P.-A. Manzagol, “Extracting and composing robust features with denoising autoencoders,” in Proc. Int. Conf. Mach. Learn., 2008, pp. 1096–1103.
[28] S. Rifai, P. Vincent, X. Muller, X. Glorot, and Y. Bengio, “Contractive auto-encoders: Explicit invariance during feature extraction,” in Proc.Int. Conf. Mach. Learn., 2011, pp. 833–840.
[29] J. Masci, U. Meier, D. Cires¸an, and J. Schmidhuber, “Stacked convolutional auto-encoders for hierarchical feature extraction,” in Proc. Int.Conf. Artif. Neural Netw., 2011, pp. 52–59.
[30] J. Ngiam, A. Coates, A. Lahiri, B. Prochnow, Q. V. Le, and A. Y. Ng, “On optimization methods for deep learning,” in Proc. Int. Conf. Mach. Learn., 2011, pp. 265–272.
[31] P. Domingos, “A few useful things to know about machine learning,” Commun. ACM, vol. 55, no. 10, pp. 78–87, 2012.
[32] V. N. Vapnik, “An overview of statistical learning theory,” IEEE Trans.NeuralNetw., vol. 10, no. 5, pp. 988–999, Sep. 1999.
[33] C. M. Bishop, “Pattern recognition,” Mach. Learn., vol. 128, pp. 1–737, 2006
[34] R. Fakoor, F. Ladhak, A. Nazi, and M. Huber, “Using deep learning to enhance cancer diagnosis and classification,” in Proc. Int. Conf. Mach. Learn., 2013, pp. 1–7.
[35] D. Quang, Y. Chen, and X. Xie, “Dann: A deep learning approach for annotating the pathogenicity of genetic variants,” Bioinformatics, vol. 31, p. 761–763, 2014.
[36] C. Angermueller, H. Lee, W. Reik, and O. Stegle, “Accurate prediction of single-cell dna methylation states using deep learning,” bioRxiv, 2016, Art. no. 055715.
[37] B. Ramsundar, S. Kearnes, P. Riley, D. Webster, D. Konerding, and V. Pande, “Massively multitask networks for drug discovery,” ArXiv e-prints, Feb. 2015
[38] D. Nie, H. Zhang, E. Adeli, L. Liu, and D. Shen, “3d deep learningfor multi-modal imaging-guided survival time prediction of brain tumorpatients,” in Proc. MICCAI, 2016, pp. 212–220. [Online]. Available:http://dx.doi.org/10.1007/978-3-319-46723-8_25
[39] J. Kleesieket al., “Deep MRI brain extraction: A 3D convolutionalneural network for skull stripping,” NeuroImage, vol. 129, pp. 460–469,2016.
[40] B. Jiang, X. Wang, J. Luo, X. Zhang, Y. Xiong, and H. Pang, “Convolutionalneural networks in automatic recognition of trans-differentiatedneural progenitor cells under bright-field microscopy,” in Proc. Instrum.Meas., Comput., Commun. Control, 2015, pp. 122–126.
[41] H.-I. Suk et al., “Hierarchical feature representation and multimodal fusion with deep learning for ad/mci diagnosis,” NeuroImage, vol. 101, pp. 569– 582, 2014.
[42] D. C. Rose, I. Arel, T. P. Karnowski, and V. C. Paquit, “Applying deeplayered clustering to mammography image analytics,” in Proc. Biomed.Sci. Eng. Conf., 2010, pp. 1–4.
[43] Y. Zhou and Y. Wei, “Learning hierarchical spectral-spatial features for hyperspectral image classification,” IEEE Trans. Cybern., vol. 46, no. 7, pp. 1667–1678, Jul. 2016.
[44] L. Sun, K. Jia, T.-H. Chan, Y. Fang, G. Wang, and S. Yan, “DL-SFA: Deeply-learned slow feature analysis for action recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2014, pp. 2625–2632.
[45] C.-D. Huang, C.-Y. Wang, and J.-C. Wang, “Human action recognition system for elderly and children care using three stream convnet,” in Proc. Int. Conf. Orange Technol., 2015, pp. 5–9.
[46] M. Zeng et al., “Convolutional neural networks for human activity recognition using mobile sensors,” in Proc. MobiCASE, Nov. 2014, pp. 197– 205. [Online]. Available: http://dx.doi.org/10.4108/icst. mobicase.2014.257786
[47] S. Ha, J. M. Yun, and S. Choi, “Multi-modal convolutional neural networks for activity recognition,” in Proc. Int. Conf. Syst., Man, Cybern., Oct. 2015, pp. 3017–3022.
[48] D. Ravi, C. Wong, B. Lo, and G. Z. Yang, “Deep learning for human activity recognition: A resource efficient implementation on low-power devices,” in Proc. 13th Int.Conf.Wearable Implantable Body Sens.Netw., Jun. 2016, pp. 71–76.
[49] P. Pouladzadeh, P. Kuhad, S. V. B. Peddi, A. Yassine, andS. Shirmohammadi, “Food calorie measurement using deep learningneural network,” in Proc. IEEE Int. Instrum. Meas. Technol. Conf. Proc.,2016, pp. 1–6.
[50] P. Kuhad, A. Yassine, and S. Shimohammadi, “Using distance estimationand deep learning to simplify calibration in food calorie measurement,”in Proc. IEEE Int. Conf. Comput. Intell. Virtual Environ. Meas. Syst.Appl., 2015, pp. 1–6.
[51] H. Shin, L. Lu, L. Kim, A. Seff, J. Yao, and R. M. Summers, “Interleaved text/image deep mining on a large-scale radiology database for automated image interpretation,” CoRR, vol. abs/1505.00670, 2015. [Online]. Available: http://arxiv.org/abs/1505.00670
[52] Z. Che, S. Purushotham, R. Khemani, and Y. Liu, “Distilling knowledge from deep networks with applications to healthcare domain,” ArXiv e-prints, Dec. 2015.
[53] R. Miotto, L. Li, B. A. Kidd, and J. T. Dudley, “Deep patient: An unsupervised representation to predict the future of patien
[54] E. Putin et al., “Deep biomarkers of human aging: Application of deep neural networks to biomarker development,” Aging, vol. 8, no. 5, pp. 1–021, 2016.
[55] J. Futoma, J. Morris, and J. Lucas, “A comparison of models for predicting early hospital readmissions,” J. Biomed. Informat., vol. 56, pp. 229–238, 2015.
[56] Z. C. Lipton, D. C. Kale, C. Elkan, and R. C. Wetzel, “Learning to diagnose with LSTM recurrent neural networks,” CoRR, vol. abs/1511.03677, 2015. [Online]. Available: http://arxiv.org/abs/1511.03677
[57] B. T. Ong, K. Sugiura, and K. Zettsu, “Dynamically pre-trained deep recurrent neural networks using environmental monitoring data for predicting pm2. 5,” Neural Comput. Appl., vol. 27, pp. 1–14, 2015.
[58] B. Zou, V. Lampos, R. Gorton, and I. J. Cox, “On infectious intestinal disease surveillance using social media content,” in Proc. 6th Int. Conf. Digit. Health Conf., 2016, pp. 157–161.
[59] V. R. K. Garimella, A. Alfayad, and I. Weber, “Social media image analysis for public health,” in Proc. CHIConf. Human Factors Comput.Syst., 2016, pp. 5543–5547. [Online]. Available: http://doi.acm. org/10.1145/2858036.2858234
[60] L. Zhao, J. Chen, F. Chen, W. Wang, C.-T. Lu, and N. Ramakrishnan, “Simnest: Social media nested epidemic simulation via online semisupervised deep learning,” in Proc. IEEE Int. Conf. Data Mining, 2015, pp. 639–648.
[61] E. Horvitz and D. Mulligan, “Data, privacy, and the greater good,” Science, vol. 349, no. 6245, pp. 253–255, 2015.
[62] Molloy, C. (2017). Drug discovery tomorrow: how to Catapult ourselves into the future.
[63] Zhang, L., Tan, J., Han, D., & Zhu, H. (2017). From machine learning to deep learning: progress in machine intelligence for rational drug discovery. Drug discovery today.
[64] Miotto, R., Wang, F., Wang, S., Jiang, X., & Dudley, J. T. (2017). Deep learning for healthcare: review, opportunities and challenges. Briefings in bioinformatics.
[65] Xu, Y., Dai, Z., Chen, F., Gao, S., Pei, J., & Lai, L. (2015). Deep learning for drug-induced liver injury. Journal of chemical information and modeling, 55(10), 2085-2093.
[66] Altae-Tran, H., Ramsundar, B., Pappu, A. S., & Pande, V. (2017). Low data drug discovery with one-shot learning. ACS central science, 3(4), 283-293.
[67] Olivecrona, M., Blaschke, T., Engkvist, O., & Chen, H. (2017). Molecular de-novo design through deep reinforcement learning. Journal of cheminformatics, 9(1), 48.
[68] Wallach, I., Dzamba, M., & Heifets, A. (2015). AtomNet: A deep convolutional neural network for bioactivity prediction in structure-based drug discovery. arXiv preprint arXiv:1510.02855.
[69] Byvatov, E., Fechner, U., Sadowski, J., & Schneider, G. (2003). Comparison of support vector machine and artificial neural network systems for drug/nondrug classification. Journal of chemical information and computer sciences, 43(6), 1882-1889.
Citation
Malvika Jasrotia, Prabhpreet kaur, "Deep learning aiding Health Informatics in Drug discovery," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.315-320, 2019.
Analysis of Energy Efficient Techniques of IoT
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.321-325, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.321325
Abstract
With the demand in new technologies today internet of things has a big research area for the young researchers. It has a very vast area of field in almost every field of work today we are trying to implement the concept of internet of things. Researchers are focusing on the efficiency of the IOT networks. IOT’s provides a researcher or user to implement his/her own self-made sensor to the open environment to collect the necessary data and then to implement it accordingly with the help of wireless sensor networks. The Internet of Things is the decentralized kind of system where sensor hubs sense data and pass it to the base station. Because of self-designing and far organization of the system vitality utilization is a serious issue of IoT’s. The different methods have been planned by the creators to improve the lifetime of the system. In this paper, different vitality proficient systems are surveyed as far as specific parameters.
Key-Words / Index Term
IoT, Sensors, Lifetime
References
[1] Navroop Kaur, Sandeep K.Sood, “An Energy-Efficient Architecture for theInternet of Things (IoT)” IEEE SYSTEMS JOURNAL,2015
[2]PallaviSethhi, SmrutiR.Sarangi, “Internet of Things: Architectures, Protocols, and Applications” 26 January 2017
[3]Kiat Seng Yeo, Mojy Curtis Chian, Tony Chon Wee Ng and Do Anh Tuan, “Internet of Things: Trends, Challenges and Applications”
[4] S.Santiago, Dr.L.Arckiam,“Energy Efficiency in Internet of Things: An Overview”21 December 2016.
[5]https://www.engineersgarage.com/Articles/Internet-of-Things-Architecture
[6]S.Nisha, Balakannan.S.P, “An Energy Efficient Self Orgamizing Multicast Routing Protcol for Internet of Things” 2017
[7]AlgimantasVenckauskas, NerijusJusas, EgidijusKazanavicius, VytautasStuikys, “AN ENERGY EFFICIENT PROTOCOL FOR THE INTERNET OF THINGS” Journal of ELECTRICAL ENGINEERING, VOL. 66, NO. 1, 2015, 47–52
Citation
Neha Sharma, Neeru Bhardwaj, "Analysis of Energy Efficient Techniques of IoT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.321-325, 2019.
Enhancing The Prediction of Absenteeism By Decision Cluster Based Rule Generation
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.326-330, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.326330
Abstract
The Data analysis inspires many applications in the field of Computing. It may be a phase either in design or on-line operation. The procedures of Data analysis are dichotomized as exploratory and confirmatory. Irrespective of these two types, the primary component for both procedures is grouping or classification. It can be done based on either (i) goodness-of-fit to a postulated model or (ii) natural groupings (clustering) revealed through analysis. Clustering is a process of partitioning a set of data or objects into a set of meaningful sub-classes, called clusters based on similarity. Obliviously, clustering has its own impact in solving complex real world problems. This paper addresses the impact of clustering algorithms for one such problem i.e. for the prediction of absenteeism at work place. The proposed method will draw predictions about absenteeism at work place by decision cluster based rule generation.
Key-Words / Index Term
Computing, Data Analysis, Clustering, Classification
References
[1] A K Jain, M N Murty, P J Flynn, "Data Clustering : A Review", ACM Computing Surveys (CSUR) Journal, Volume 31 Issue 3, Pages 264-323, Sept. 1999.
[2] Richard C. Dubes and Anil K. Jain, Algorithms for Clustering Data, Prentice Hall, 1988.
[3] Gasparetti, F, "Modeling user interests from web browsing activities", Data Mining and Knowledge Discovery, Springer, Volume 31, Issue 2, pp 502–547, March 2017.
[4] Gayathri.T, "Data mining of Absentee data to increase productivity", International Journal of Engineering and Techniques - Volume 4 Issue 3, pp. 478- 480, ISSN: 2395-1303, , May 2018.
[5] Shivangi Bhardwaj, "Data Mining Clustering Techniques - A Review", International Journal of Computer Science and Mobile Computing, Vol.6 Issue.5, pg. 183-186, ISSN 2320–088X, May- 2017.
[6] Ricardo Pinto Ferreira et al., "Artificial Neural Network And Their Application In The Prediction Of Absenteeism At Work", International Journal of Recent Scientific Research, Vol. 9, Issue, 1(G), pp. 23332-23334, January, 2018.
[7] Saroj et al, "Study on Various Clustering Techniques", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3) , pp. 3031-3033, ISSN : 0975-9646, 2015.
[8] Cortez, Paulo & Morais, A. " A Data Mining Approach to Predict Forest Fires using Meteorological Data", 2007
[9] Gopinath Ganapathy and K.Arunesh, "Models for Recommender Systems in Web Usage Mining Based on User Ratings", Proceedings of the World Congress on Engineering 2011 Vol I, July 6 - 8, ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online), 2011.
[10] Pragati Shrivastava, Hitesh Gupta, “A Review of Density-Based clustering in Spatial Data,” IJACR, vol. 2, pp. 200-202, September 2012.
[11] Martiniano, A., Ferreira, R. P., Sassi, R. J., & Affonso, C., “Application of a neuro fuzzy network in prediction of absenteeism at work.” In Information Systems and Technologies (CISTI), 7th Iberian Conference on (pp. 1-4). IEEE, 2012.
[12] A.Deepa , E. Chandra Blessie, “Input Analysis for Accreditation Prediction in Higher Education Sector by Using Gradient Boosting Algorithm”, Int. J. Sci. Res. in Network Security and Communication, Vol.6(3), pp. 23-27, E-ISSN: 2321-3256, Jun 2018.
[13] T.SenthilSelvi , R.Parimala, “Improving Clustering Accuracy using Feature Extraction Method”, Int. J. Sci. Res. in Computer Science and Engineering, Vol-6(2), pp. 15-19 , E-ISSN: 2320-7639, April 2018.
[14] Gagandeep Kaur , Harmanpreet Kaur, “Ensemble based J48 and random forest based C6H6 air pollution detection”, Int. J. Sci. Res. in Computer Science and Engineering, Vol-6(2), pp 41-50, E-ISSN: 2320-7639, April 2018.
Citation
S. Adaekalavan, "Enhancing The Prediction of Absenteeism By Decision Cluster Based Rule Generation," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.326-330, 2019.
Refine Framework of Information Systems Audits in Indian Context
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.331-345, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.331345
Abstract
The information system audit is an important review process for any organization. Information system audit is essential to identify any venerability in information technology infrastructure. In this work, information system audit process was studied in Indian context and proposed a refine framework for the information system audit process to overcome the deficit in present auditing process. The proposed framework covers important aspect of information system audit such as security environment, website security auditing, software code security, network security, physical security, organization and administration aspects etc. Further, a case study on information security audit in the small a small business enterprise was performed. The systematic review and the report of audit process are reported based on the case study. Finally, some sensitive managerial issues and findings of an awareness survey of information security were presented.
Key-Words / Index Term
Information security management, information system security audit, data framework and applied model
References
[1] H Botha and J A Boon, “The information Audit: Principle and Guidelines”, Libri 53, pp. 23-38, 2003.
[2] Manual of Information Technology Audit, Office of the Comptroller and Auditor General of India, Vol 1 & 2, 2014.
[3] Information security audit (IS audit) - A guideline for IS audits based on IT-Grundschutz - German Federal Office for Information Security 2008 – Version 1.0
[4] National Audit Office of Finland - Auditor General Manual - Finland Registry no. 23/01/2015
[5] Coordinated Audit of Information Technology Security (with Shared Services Canada), Govt of Canada. https://www.canada.ca/en/treasury-board-secretariat/corporate/reports/coordinated-audit-information-technology-security.html [Last access on 14/04/2019]
[6] D M Chudasama, L K Sharma, N C Solanki, Priyanka Sharma , " A Comparative Study of Information Systems Auditing in Indian Context" , IPASJ International Journal of Information Technology (IIJIT) , Volume 7, Issue 4, April 2019 , pp. 020-028.
[7] Coordination for Website security audit [Go daddy-Website Domain Hosting]] https://www.godaddy.com/garage/how-to-do-your-own-website-security-audit/[Last access on 21/04/2019
[8] SSH standard and detailed technical documentation [SSH.com] https://www.ssh.com/ssh/protocol/[Last access on 21/04/2019]
[9] Coordination For Performing software code & security audit [Vera code] https://www.veracode.com/security/software-audit[Last access on 21/04/2019
[10] Coordination for Network Security audit [swissns] https://www.swissns.ch/site/2016/09/5-steps-of-performing-a-network-security-audit/[Last access on 21/04/2019
[11] Coordination for Network Security audit [Consolidated Technology Inc.] https://consoltech.com/blog/business-network-security-audit-say-yes/[Last access on 21/04/2019
[12] Coordination for Physical Security audit [Imgram] https://imaginenext.ingrammicro.com/Trends/November-2017/The-4-Step-Physical-Security-Audit[Last access on 21/04/2019
[13] Coordination for Physical Security audit [kisi blog] [Last access on 22/04/2019] https://www.getkisi.com/blog/physical-security-assessment-problems-it-can-uncover
[14] Coordination for Organization and administration audit [Smart data collective][https://www.smartdatacollective.com/4-easy-steps-conduct-security-audit-company/Last access on 23/04/2019]
[15] Coordination for small business preparing case study audit [Sans Institute] https://www.sans.org/reading-room/whitepapers/casestudies/case-study-risk-audit-small-business-1243 [Last access on 23/04/2019]
[16] Coordination for small business preparing case study audit, Concordia University, https://users.encs.concordia.ca/~clark/courses/1501-6150/scribe/L09b.pdf [Last access on 23/04/2019]
Citation
D M Chudasama, L. K. Sharma, N. C. Sonlanki, Priyanka Sharma, "Refine Framework of Information Systems Audits in Indian Context," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.331-345, 2019.
Automation Testing Using Selenium+Sikuli Scripting
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.346-351, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.346351
Abstract
Automation testing is a methodology that uses an application to implement entire life cycle of the software in less time and provides high efficiency and effectiveness to the software. In automation testing the tester writes scripts by own with the help of any suitable application software in order to automate any target software application. Automation is basically an automated process that comprises lots of manual activities. In other words, Automation testing uses automation tools like Selenium, Sikuli, Appium etc. to write test script and execute test cases, with no or minimal manual involvement while executing an automated test suite. Usually, automation testers write test scripts for any test case using any of the automation tool and then group several test cases into test suites. Here, we will discuss a neat case study explaining the automation testing using hybrid test script.
Key-Words / Index Term
Automation testing, Selenium, Sikuli, ROI (Return on Investment), Hybrid automation testing
References
[1] Sarika Chaudhary, "Latest Software Testing Tools and Techniques: A Review ", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 7, Issue 5, May 2017 http://www.softwaretestingclass.com/software-testing-tools-list/.
[2] M. Jovanovic, Irena, "Software testing methods and techniques," IPSI BgD Journals, vol. 5, 2009.
[3] Shruti Malve, Pradeep Sharma, “Investigation of Manual and Automation Testing using Assorted Approaches”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.81-87, April (2017).
[4] T. Yeh, T. H. Chang and R. C. Miller, "Sikuli: Using gui screenshots for search and automation”, In the Proceedings of the 22nd annual ACM symposium on User interface software and technology Pages 183-192.
[5] Nisha Gogna, "Study of Browser Based Automated Test Tools WATIR and Selenium”, International Journal of Information and Education Technology, Vol. 4, No. 4, August 2014.
[6] Miika Kuutila, "Benchmarking configurations for Web-testing-Selenium versus Watir", researchgate, November 2016.
[7] P. Raulamo-Jurvanen, K. Kakkonen and M. Mäntylä, “Using Surveys and Web-scarping to Select Tools for Software Testing Consultancy”, In Proceedings of the 17th International Conference on Product-Focused Software Process Improvement, 2016.
[8] A Surabhi Saxena, Devendra Agarwal, “Realiability Assessment Model to Estimate Quality of the Effective E-Procurement Process in Adoption”, IJSRNSC, Volume-6, Issue-3, June 2018.
[9] Michiel Van Genuchte, “Why is software late? An empirical study of reasons for delay in software development”, IEEE Trans. on Software Eng. IEEE, Vol 17, Issue 6, pp.582-590, 1991.
[10] N. Uppal and V. Chopra, "Design and implementation in selenium ide with web driver", International Journal of Computer Application, vol. 46, 2012.
[11] Shilpa Garg, Paramjeet Singh, Shaveta Rani, "Comparative Study of Selenium WebDriver and Selenium IDE (Integrated Development Environment)", International Journal of Computer Sciences and Engineering, Vol.-6, Issue-7, July 2018.
[12] Inderjeet Singh and Bindia Tarika, “Comparative Analysis of Open Source Automated Software Testing Tools: Selenium, Sikuli and Watir”, International Journal of Information & Computation Technology, Volume 4, Number 15 (2014), pp. 1507-1518.
[13] Revathi.K, Prof.V.Janani “SELENIUM TEST AUTOMATION FRAMEWORK IN ON-LINE BASED APPLICATION”, International conference on Science, Technology and Management, 2015.
[14] Samiksha R. Rahate, Uday Bhave, “A Survey on Test Automation”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2016.
[15] Shuang Wang and Jeff Offutt, “Comparison of unit-level automated test generation tools in Software Testing, Verification and Validation Workshops”, ICSTW`09, International Conference on IEEE, 2009.
[16] Sonia Thakur, Amandeep Kaur, “Role of Agile Methodology in Software Development”, International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 2, Issue. 10, pg.86 – 90, October 2013.
[17] K. M and K. R, "Comparative study of automated testing tools: Testcomplete and quicktest pro," International Journal of Computer Application, vol. 24, 2011.
[18] Suliman A. Alsuhibany, “Evaluating the Usability of Optimizing Text-based CAPTCHA Generation”, IJACSA, Vol. 7, No. 8, 2016.
Citation
Ashish, Nishu, "Automation Testing Using Selenium+Sikuli Scripting," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.346-351, 2019.
Face Recognition Using K-NN Algorithm Along With PCA
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.352-354, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.352354
Abstract
Face Recognition is an exciting task in the field of machine learning. Various techniques and methods have been used to solve the problem of face recognition. In this paper, we have shown that how K Nearest Neighbors algorithm along with Principal Component Analysis can be used to recognize a face efficiently. K nearest neighbor algorithm is a non parametric learning algorithm that works on target values of K nearest data points of the query point and finalize the value of the query point. PCA uses the concept of Eigen vectors. An Eigen vector represents an image. PCA finds K Eigen vectors corresponds to K higher Eigen values. So PCA algorithm is an efficient method for feature extraction in face recognition. Implementation is done using python programming language. This paper shows the effect of combination of above mentioned technologies and their edge cutting results.
Key-Words / Index Term
Face Recognition, KNN, PCA, Eigen vectors
References
[1]. Mehran Kafai, Member, IEEE, Le An, Student Member, IEEE, and Bir Bhanu, Fellow, IEEE, “Reference Face Graph for Face Recognition”, IEEE, ISSN - 1556-6013 , 2013.
[2]. Kavita , Ms. Manjeet Kaur,” A Survey paper for Face Recognition Technologies”, International Journal of Scientific and Research Publications, ISSN 2250-3153, Volume 6, Issue 7, July 2016.
[3]. Ashutosh Chandra Bhensle, Rohit Raja,” An Efficient Face Recognition using PCA and Euclidean Distance Classification”, IJCSMC, ISSN 2320–088X, Vol. 3, Issue. 6, June 2014.
[4]. P Y kumbhar , Mohammad attaullah , Shubham Dhere , Shivkumar Hipparagi, “Real time face detection and tracking using OpenCV”, International Journal for Research in Emerging Science and Technology, ISSN: 2349-7610, Volume-4, Issue-4, Apr-2017.
[5]. Manik Sharma, J Anuradha, H K Manne and G S C Kashyap, “Facial detection using deep learning”, IOP Publishing, 14th ICSET, 2017.
[6]. Gaurav, Ritu Sindhu, “Python as a key for data science”, IJCSE, ISSN-2347-2693, Volume-6, Issue-4, Apr-2018.
[7]. Ing. Zdena Dobesova, “Programming Language Python for Data Processing”, IEEE, International Conference on Electrical and Control Engineering (ICECE), ISBN: 978-1-4244-8165-1, 2011 .
Citation
Nitin Kumar, Gaurav, Deepak Kumar, "Face Recognition Using K-NN Algorithm Along With PCA," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.352-354, 2019.
Comparative Analysis of Various Techniques of VM Live Migration in Cloud Computing
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.355-359, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.355359
Abstract
Cloud computing is a potent field with an on-demand resource provisioning and “Pay Per Use” facility to the customers. Virtualization is the most centered technology used in cloud computing. The virtual machine live migration is an important feature of virtualization which provides virtual machine migration from one host to another host when the services are still running. It provides fault tolerance, load balancing, power saving in data centers. The most efficient technique will have least total migration time and downtime. With an increasing data, we need data centers to store and process it, which leads to huge environmental destruction. Introduction of Virtual machines steps towards Green Computing. Virtual machine migration is of high importance for the uninterrupted and high-quality services. This paper reviews` various techniques for virtual machine migration with their merits and demerits.
Key-Words / Index Term
Virtualization, Virtual Machines, Live Migration, Downtime, Total Migration Time
References
[1] Kate Keahey, Umesh Deshpande, “Traffic Sensitive Live Migration of Virtual Machines”. In 2016 Future Generation Computer Systems.
[2] Wen-tao Wen, “Ant Colony Optimization based Scheduling Strategy on load Balancing in Cloud Computing algorithm.” In 2015 IEEE Ninth International Conference on Frontier of Computer Science and Technology.
[3] Wentian Cui, Meina Song, “Live memory migration with Matrix Bitmap Algorithm.” In 2010 IEEE 2nd Symposium on Web Society.
[4] Hai Jin, Li Deng, “Live Virtual Machine Migration with adaptive, memory compression.” In 2009 IEEE International Conference on Cluster Computing and Workshops.
[5] Xingjun Zhang, “Data De-duplication on Similar File Detection.” In 2014 IEEE Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[6] Praveen Jain, “An improved Pre-copy Approach for transferring the VM Data during the Virtual Machine Migration for the cloud environment.” In 2016 International Journal of Engineering and Manufacturing (IJEM).
[7] Bolin Hu, Zhou Lei, “A Time -Series Based Pre-copy Approach for live migration of Virtual Machines.” In 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[8] Petter Svard, John Tordsson, “High performance Live Migration through Dynamic Page Transfer Reordering and compression.” In 2011 IEEE Third International Conference on cloud Computing Technology and Science.
[9] Michael R. Hines, “Post-copy based live virtual machine migration using adaptive pre-paging and dynamic self-ballooning.” In 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual execution environment.
[10] Maolin Tang, Tusher Kumar, “A random key Genetic Algorithm for live migration of Multiple Virtual Machines in Data Centers.” In 2014 Springer International Conference on Neural Information Processing.
[11] Komarasamy, Dinesh, “A Novel Approach for Dynamic Load Balancing with Effective Bin Packing and VM Reconfiguration in Cloud.” In 2016 Indian Journal of Science and Technology.
[12] Ching-Chi Lin, “Energy -efficient Virtual Machine Provision Algorithms for Cloud Systems.” In 2011 IEEE 4th International Conference on Utility and Cloud Computing.
[13] Thiruvenkadam T, Kamalakkannan P, “Energy efficient multi -dimensional host load aware algorithm for virtual machine placement and optimization in cloud environment.” In 2015 Indian Journal of Science and Technology.
[14] H. Jin, L. Deng, S. Wu, X. H. Shi, and X. D. Pan, “Live Virtual Machine Migration with Adaptive Memory Compression.” In 2009 IEEE International Conference on Cluster Computing.
[15] Y Liu, Bo Gong, Yanbing Liu, “A virtual machine migration strategy based on Time series workload prediction using cloud model.” In 2014 Mathematical problems in Engineering.
[16] G Singh, “A review on migration techniques and challenges in live virtual machine migration.” In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization.
[17] Christoph Meinel, Mohamed Esam, “Enhanced Cost Analysis of Multiple Virtual Machines Live Migration in VMware Environment.” In 2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2).
[18] K. Mills, J. Filliben, “Comparing VM-Algorithms for On-Demand clouds.” In 2011 Third IEEE International Conference on Cloud Computing Technology and Series.
[19] MA Altahat, “Analysis and Comparison of Live Virtual Machine Migration Methods.” In 2018 IEEE 6th International Conference on Future Internet of Things and Cloud.
[20] Megha R. Desai, “Efficient Virtual Machine Migration in Cloud Computing.” In 2015 IEEE Fifth International Conference on Communication Systems and Network Technologies.
[21] Umesh Deshpande, “Agile Live Migration of Virtual Machines.” In 2016 IEEE International Parallel and Distributed Processing Symposium.
[22] Babu, KR Remesh, Amaya Anna Joy, and Philip Samuel, “Load Balancing of Tasks in Cloud Computing Environment Based on Bee Colony Algorithm.” In 2015 Fifth International Conference on Advances in Computing and Communications (ICACC), pp. 89-93. IEEE, 2015.
[23] Salem A.W Ba Hmaid, Sulsimsn A.M Ghaleb, Akram S.A Alhammadi, “Survey Study of Virtual Machine Migration Techniques in cloud computing.” In 2017 International Journel of Computer Application.
[24] Rajwinder Singh, Dr. K.S.Kahlon ,Sarabjit Singh,” Comparative Study of Virtual Machine Migration Techniques and Challenges in Post Copy Live Virtual Machine Migration.” In 2013 International Journal of Science and Research (IJSR).
Citation
Annie Pathania, Kiranbir Kaur, "Comparative Analysis of Various Techniques of VM Live Migration in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.355-359, 2019.