A Review on Genetic Algorithm Operations and Application in Telecommunication Routing
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.373-377, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.373377
Abstract
Genetic algorithm is a powerful tool and wide class of global optimization methods. It belongs to the large class of evolutionary algorithm and an efficient way to get optimal solutions. There is a large class of optimization problems that are quite hard to solve by conventional optimization technique but genetic algorithm (GA) is very efficient in that case too. Genetic Algorithm is used to solve many real world problems, some applications are as automotive design, Robotics, Optimized Telecommunications Routing, Biometric invention, Trip-traffic and Shipment routing, Computer gaming, Gene expression profiting, Marketing and Merchandising, etc. The main goal of this work is to solve the telecommunication routing problem by using Genetic Algorithm.
Key-Words / Index Term
Genetic Algorithm, Telecommunication Routing, Optimization Technique, Evolutionary Algorithm
References
[1] J. Holland, “Adaptation in Natural and Artificial Systems”, University of Michigan Press, Ann Arbor. (Technical Report ORA Projects 01252 and 08226).Ann Arbor: University of Michigan, Department of Computer and Communication Sciences, (1975).
[2] D. E. Goldberg, “Genetic Algorithms in Search, Optimization and Machine Learning”, Addison- Wesley Publishing Co., Inc., Reading, Mass, (1989).
[3] R. Sivaraj and T. Ravichandran, “Review of selection methods in genetic algorithm”, International Journal of Engineering Science and Technology (IJEST), 2011, Vol. 3, Issue 5, pp. 3792-3797.
[4] T. Weise, Global Optimization Algorithms – Theory and Application Second Ed., Self-Published. (2009).
[5] J. Kennedy, and R. Eberhart, "Particle Swarm Optimization."IEEE, 7. (1995).
[6] Y. Kaya, M. Uyar, and R. Tekdn, "A Novel Crossover Operator for Genetic Algorithms: Ring Crossover." (2011).
[7] A. Otman and A. Jaafar, "A Comparative Study of Adaptive Crossover Operators for Genetic Algorithms to Resolve the Traveling Salesman Problem."International Journal of Computer Applications, 9.(2011), 31(11).
[8] M. J. Varnamkhasti, L. S. Lee, M. R. A. Bakar and W. J. Leong, "A Genetic Algorithm with Fuzzy Crossover Operator and Probability." Hindawi Publishing Corporation, Advances in Operations Research, 2012, 16. (2011).
[9] D. Vrajitoru, "Crossover improvement for the genetic algorithm in information retrieval." (1998).
[10] M. Srinivas and L. M. Patnaik, "Adaptive Probabilities of Crossover and Mutation in Genetic Algorithms." IEEE Transactions on systems, man and cybernetic, (1994), 24(4), 656-667.
[11] Tomasz Dominik Gwiazda, “Genetic Algorithms Reference”, Volume –I, Poland: Tomasz Gwiazda, 2006.
[12] David E. Goldberg and Robert Lingle Jr., “Alleles, loci and the traveling salesman problem”, Proceedings of the 1st International Conference on Genetic Algorithms, 1985,pp. 154- 159.
[13] I. M. Oliver, D. J. Smith, and J. R. C. Holland, “A study of permutation crossover operators on the TSP”, Proceedings of the 2nd International Conference on Genetic Algorithms on Genetic Algorithms and their Application, 1987, pp. 224-230.
[14] Lawrence Davis, “Applying adaptive algorithms to epistatic domains”, Proceedings of the 9th international joint conference on Artificial Intelligence, 1985, Vol. 1, pp. 162- 164.
[15] Gilbert Syswerda, “Schedule optimization using genetic algorithms”, Handbook of Genetic Algorithms, 1991, pp. 332- 349, New York: Van Nostrand Reinhold.
[16] H. Muhlenbein, “Parallel genetic algorithms, population genetics and combinatorial optimization”, Proceedings of Workshop on Parallel Processing: Logic, Organization and Technology, 1991, pp. 398-406.
[17] Michael Meise, Vasileios Pappas, Lixia Zhang, “A taxonomy of biologically inspired research in computer network”, Computer Network, 54(2010), pp. 901-916, ELSEVIER.
[18] International Journal of Scientific Research in Computer Sciences and Engineering (ISSN: 2320-7639)
[19] International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256)
Citation
Neha Singh, P. K. Chaurasia, "A Review on Genetic Algorithm Operations and Application in Telecommunication Routing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.373-377, 2019.
Cloud Security Based on PaaS Model
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.378-385, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.378385
Abstract
Paas provide consumers easier way to produce and deploy software and cloud infrastructure [4], thus Paas doubtless occurs the best impact over any other aspect of cloud computing because it brings custom software development to the cloud. National Institute of Standards and Technology describes Paas as: “The capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider.”[2]. Thus Paas security which is based on framework, environment, interface and different elements with connected data security. In this paper a secure model is proposed with is based on tokenization and masking technique with key management system. This paper conjointly fulfils the SPI service delivery model and FISMA ACT for PAAS security problems in any cloud service.
Key-Words / Index Term
Paas[1], SPI Model[5], Framework Security[7], FISMA[6], Component Security[8], Security[10], Tokenization of sensitive data[13], Interface Security[11], Sensitive Data, Trusted Compute Pools[12].
References
[1] Ankit Kumar Singh, Saroj Kumar, Abhishek Rai “Secure Cloud Architecture based on YAK and ECC” International Journal of Computer Applications (0975 – 8887) Volume 90– No.19, March 2014.
[2] The NIST Definition of Cloud Computing, Special Publication 800-145
[3] Gartner® Says 2011 Will Be the Year of Platform as a Service, March 14, 2011, Gartner Newsroom.
[4] Sosinsky B, Cloud Computing Bible. 1st ed. Wiley; 2011.
[5] S. Subashini and V. Kavitha, "A Survey on Security Minimal issues in service delivery models of cloud computing” Journal of Network and Computer Applications, 34(1), 2011, pp 1-11.
[6] Title III of the E-Government Act, entitled the Federal Information Security Management Act of 2002 (FISMA).
[7] Ayesha Malik, Muhammad Mohsin Nazir “Security Framework for Cloud Computing Environment: A Review” Journal of Emerging Trends in Computing and Information Sciences, ISSN 2079-8407, VOL. 3, NO. 3, March 2012.
[8] A. Buecker, M. Borrett, C. Lorenz, and C. Powers. Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security. http://www.redbooks.ibm.com/redpapers/pdfs/redp4614.pdf.
[9] Deyan Chen, Hong Zhao “Data Security and Privacy Protection Issues in Cloud Computing” 2012 International Conference on Computer Science and Electronics Engineering.
[10] Bowers KD, Juels A, Oprea A. Proofs of retrievability: Theory and implementation. In: Sion R, ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 43.54. [doi:10.1145/1655008.1655015].
[11] Practical Security Stories and Security Tasks for Agile Development Environments; http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf.
[12] NIST Interagency Report 7904: Trusted Geolocation in the Cloud: Proof of Concept Implementation (Draft) http://csrc.nist.gov/publications/drafts/ir7904/draft_ nistir_7904.pdf.
[13] Tokenization: What’s Next After PCI?, 2012, EMC Corporation http://www.emc.com/collateral/white-papers/h11918-wp-tokenization-rsa-dpm.pdf.
[14] F. Hao.“ON ROBUST KEY AGREEMENT BASED ON PUBLIC KEY AUTHENTICATION” Proceedings of the 14th International Conference on Financial Cryptography and Data Security, Tenerife, Spain, LNCS 6052, pp. 383-390, Jan 2010.
[15] Arjun Kumar, Byung Gook Lee,Hoonjae Lee,Anu. ”SECURE STORAGE AND ACCESS OF DATA IN CLOUD COMPUTING ” IEEE 2012 P.336339.
[16] S. Ramgovind, M. M. Eloff, E. Smith. “The Management of Security in Cloud Computing” In PROC 2010 IEEE International Conference on Cloud Computing 2010.
[17] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, JinLi ,”Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transactions On Parallel And Distributed Systems, Vol.22, No. 5, 2011
[18] S. Kamara and K. Lauter. Cryptographic cloud storage. In Financial Cryptography and Data Security (FC`10), volume 6054 of LNCS, pages 136{149. Springer, 2010
[19] http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
[20] M. Jensen, J. Schwenk, N. Gruschka and L. L. Iacono, "On Technical Security Issues in Cloud Computing." in PROC IEEE ICCC, Bangalore 2009, pp. 109-116.
[21] N. Gruschka, L. L. Iancono, M. Jensen and J. Schwenk. “On Technical Security Issues in Cloud Computing” In PROC 09 IEEE International Conference on Cloud Computing, 2009 pp 110-112.
[22] Ruj S, Nayak A, Stojmernovic I. DACC: distributed access control in clouds. 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, IEEE Computer Society, 2011: 91-98
[23] M. Klems, A. Lenk, J. Nimis, T. Sandholm and S. Tai. “What’s Inside the Cloud? An Architectural Map of the Cloud Landscape.” IEEE Xplore, pp 23-31, Jun. 2009
[24] B. Grobauer, T. Walloschek and E. Stöcker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 201
[25] G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551,
[26] Security Alliance (CSA) “Security Guidance for critical Areas of Focus in Cloud Computing” ,April 2009
[27] Sze Ming Chow “New Privacy Preserving Architecture for Identity/Attribute Based Encryption” ,New York University 2010.
[28] Kaufman, Lori M. "Can public-cloud security meet its unique challenges?."Security & Privacy, IEEE 8.4 (2010): 55-57.
[29] Ren, Kui, Cong Wang, and Qian Wang. "Security challenges for the public cloud." Internet Computing, IEEE 16.1 (2012): 69-73
[30] Bao Zhang, Changgen Peng, Zhipin Xu “Identity-based distributed cloud storage encryption scheme”, IEEE 2011, pages 610-614.
Citation
Saroj Kumar, Santosh Kumar, "Cloud Security Based on PaaS Model," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.378-385, 2019.
A Medical Expert System for Tropical Diseases Diagnosis
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.386-390, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.386390
Abstract
In Nigeria, tropical diseases such as Malaria and Typhoid are prevalent because of insects such as mosquitoes and flies, which are the common carriers of these diseases. Therefore, there is need for an expert system to help the inadequacy of the medical personnel in the diagnosis of these diseases. This paper presents the design of an expert system that aims at providing the patient with background for suitable diagnosis and treatments (Especially typhoid and malaria diseases). The system is able to give appropriate diagnosis and treatment for two diseases namely; typhoid and malaria. Fuzzy logic type 2 has proved to be the remarkable tool for building intelligent decision making for approximate reasoning that can appropriately handle both the uncertainties and imprecisions. The proposed methodology is composed of four stages: the first stage is receiving the symptoms from the patient, second stage, it uses information from the patient to make some analysis and investigation to improve correct decision in the diagnosis and the third stage, is performing diagnosis on patient according to information supplied by the patient (symptoms, analysis and investigation). The system was able to diagnose tropical diseases by the different symptoms using the fuzzy logic rule. The need to arrive at the most accurate medical diagnosis in a timely manner that reduces further complications is the main outcome of the system.
Key-Words / Index Term
Expert system, fuzzy logic, typhoid and malaria, tropical diseases, diagnosis
References
[1]. Bruce, Varun Chadha2, Chamandeep Maini, “A Review of Development and Applications of Expert System”, International Journal of Advanced Research in Computer Science and Software Engineering Vol.10, Issue.15, pp.319-325, 2015.
[2]. Jackson W, Heist RS, Liu G, et al. “Circulating 25-hydroxyvitamin D levels predict survival in early-stage non-small-cell lung cancer patients”, J Clinoncol; Vol.25, Issue.43, pp.479–485, 2000.
[3]. Feigenbaum Wells CK, Lee CH, Howard DH, Feinstein AR, “Variability in radiologists’ interpretations of mammograms”, N Engl J Med, Vol.1, Issue.22, pp.1493-1499, 2014.
[4]. Edward, N., Doumpos, M., and Zopounidis, C., “Knowledge acquisition and representation for expert systems in the field of financial analysis”. Expert Systems with Applications, Vol.12 Issue.25, pp.247-262, 2004.
[5]. Angeli, C. "Diagnostic expert systems: From expert’s knowledge to real-time systems." Advanced knowledge based systems: Model, applications & research Vol.1 pp.50-73, 2010.
[6]. Hochreiter and Schmidhuber, “Expert Systems Advances In Education”, NCCI National Conference On Computational Instrumentation CSIO Chandigarh 1999.
[7]. Jefferson D., & Negru, V., “An extensible environment for expert system development. In Knowledge-Based Intelligent Information and Engineering Systems”, Vol.45, Issue.72, pp.1016–1022, 2013.
[8]. Sushil, S. S., Sushil S., and Ali, M. S., "Fuzzy expert systems (FES) for medical diagnosis." International Journal of Computer Applications Vol.63, Issue.11, 2013.
[9]. Prihatini, P. M. and I. Ketut, G. D. P., "Fuzzy knowledge-based system with uncertainty for tropical infectious disease diagnosis.", International Journal of Computer Science Issues (IJCSI), Vol.9, Issue.4, pp.157, 2012.
[10]. Shortlife, B. G., and Shortliffe, E. H. “Rule-based expert systems: The MYCIN experiments of the Stanford Heuristic Programming.” Reading, MA: Addison-Wesley Vol.6 Vol.10, pp.34-60, 2014.
[11]. Pereira DC, Ramos RP, do Nascimento MZ., “Segmentation and detection of breast cancer in mammograms combining wavelet analysis and genetic algorithm.” Computer Methods Programs Biomed Apr, Vol.114, Issue.1, pp.88-101, 2014.
[12]. Denzin S. Abu Naser, Abu Zaiter A. Ola, “An Expert System for Diagnosing Eye Diseases Using CLIPS”, Journal of Theoretical and Applied Information Technology, Vol.15, Issue.25, pp.923-930, 2014.
[13]. Djam, X. Y., Wajiga, G. M., Kimbi, Y. H. and Blamah. N. V., “A fuzzy expert system for the management of malaria." 2011.
[14]. Iliff, E. C. and Calif, L. J., Computerized medical diagnostic and treatment advice system including list based processing, United States Patent, pp.1-38, 1999.
Citation
N.A. Ibiobu, N.D. Nwiabu, "A Medical Expert System for Tropical Diseases Diagnosis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.386-390, 2019.
Plant Disease Detection Methods using Image Processing
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.391-395, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.391395
Abstract
The image processing is the technique which can process the information stored in the form of pixels. The disease of the plants can be detected using the methods of image processing. The plant image has various types of noises which can affect accuracy of plant disease detection. In this work, various image de noising methods are reviewed and analyzed in terms of certain parameters
Key-Words / Index Term
Plant disease detection, De noising, feature extraction
References
[1] Jayamala K. Patil and Raj Kumar, “ Advance in image Processing for detection of plant disease”, Journal of Advanced Bioinformatics Applications and Research ISSN 0976-2604 Vol 2, Issue 2, June-2011, pp 135-141
[2] Laxman Poudal , Bhola Thapa, Bim “Application of Digital Image Processing for Shape Characterization of Sand Particles”, 2011
[3] Jie Zhao, Xu Zhao and Yuncai Liu, “A Method for Detection and Classification of Glass Defects in Low Resolution Images,” Sixth International Conference on Image and Graphics, 2011, pp.642-647.
[4] Luo Juan & Oubong Gwun,” A Comparison of SIFT, PCA-SIFT and SURF, International Journal of Image Processing (IJIP) Volume(3), Issue(4),2009,pp. 143-152
[5] F. Adamo, F. Attivissimo, A. Di Nisio, M. Savino, An Automated visual inspection system for the glass industry,In: Proc. of 16th IMEKO TC4 Symposium, Florence, Italy, Sept. 22–24, 2008.
[6] Krystian Mikolajczyk and Cordelia Schmid,” A performance evaluation of local descriptors”, Pattern Analysis and Machine Intelligence, IEEE Transactions on Pattern Analysis and Machine Intelligence ,Volume 27 , Issue 10 ,2005, pp 1615 – 1630.
[7] Yan K, Rahul Sukthankar, “pca-sift: a more distinctive representation for local image descriptors” Computer Vision and Pattern Recognition, 2004, CVPR 2004.,Proceedings of the 2004, IEEE Computer Society Conference on ,2004 pp.506-513.
[8] K. Seeliger, M. Fritsche, U. Guclu, S. Schoenmakers, J.-M. Schoffelen, S. E. Bosch, M. A. J. van Gerven, “Convolutional Neural Network-based Encoding and Decoding of Visual Object Recognition in Space and Time”, 2017, ScienceDirect
[9] Edna Chebet Too, Li Yujian, Sam Njuki, Liu Yingchun, “A comparative study of fine-tuning deep learning models for plant disease identification”, 2018, Computers and Electronics in Agriculture
[10] Ye Xu, Yun Chi, Ye Tian, “Deep Convolutional Neural Networks for Feature Extraction of Images Generated from Complex Networks Topologies”, Springer Science+Business Media, LLC, part of Springer Nature 2018
[11] Konstantinos P. Ferentinos, “Deep learning models for plant disease detection and diagnosis”, Computers and Electronics in Agriculture 145 (2018) 311–318
[12] Xiaolong Zhu, Meng Zhu, Honge Ren, “Method of plant leaf recognition based on improved deep convolutional neural network”, Cognitive Systems Research 52 (2018) 223–233
[13] Soniya, Sandeep Paul, Lotika Singh, “A Review on Advances in Deep Learning”, 2015, IEEE
[14] Jayme Garcia, Arnal Barbedo, “A review on the main challenges in automatic plant disease identification based on visible range images”, 2016, Biosystem Engineering 144, 52-60
[15] Weibo Liu, Zidong Wang, Xiaohui Liu, Nianyin Zeng, Yurong Liu, and Fuad E. Alsaadi, “A Survey of Deep Neural Network Architectures and Their Applications”, 2016, Neurocomputing; ScienceDirect Publications
[16] Federico Martinelli, Riccardo Scalenghe, Salvatore Davino, Stefano Panno, Giuseppe Scuderi, Paolo Ruisi, Paolo Villa, Daniela Stroppiana, Mirco Boschetti, Luiz R. Goulart, “Advanced methods of plant disease detection. A review”, Springer, 2014
[17] Jayme Garcia, Arnal Barbedo, “An Automatic Method to Detect and Measure Leaf Disease Symptoms Using Digital Image Processing”, 2014 The American Phytopathological Society
Citation
Pankaj Gumber, Lal Chand, "Plant Disease Detection Methods using Image Processing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.391-395, 2019.