“Breast Cancer Diagnosis and Classification Using Support vector machines With Diverse Datasets”
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.442-446, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.442446
Abstract
Breast cancer is the most prevalent cancer among women around the world. However, increased survival is due to the dramatic advances in the screening methods, early diagnosis, and breakthroughs in treatments. Different strategies of breast cancer classification and staging have evolved over the years. Intrinsic (molecular) sub composing is fundamental in clinical preliminaries and well comprehension of the sickness of the disease. To analyze machine learning systems have been utilized to define a set trained with the “bagging” method. Support vector machines (SVM) have been appeared to outflank numerous related methods. However, there have been very few studies focused on examining the classification performances of different classification. The trial comes about demonstrate that SVM classifier can be the better decision for classification, where accuracy of the algorithm is improved by tuning the parameters of the dataset.
Key-Words / Index Term
Machine Learning, Support Vector Machine(SVM)
References
[1]. U.S. Cancer Statistics Working Group. United
[2]. States Cancer Statistics: 1999–2008 Incidence and Mortality Web-based
[3]. Report. Atlanta (GA): Department of Health and Human Services, Centers for Disease Control and Prevention, and National Cancer Institute; 2012.
[4]. Siegel RL, Miller KD, Jemal A. Cancer Statistics , 2016.
[5]. Noble WS. What is a support vector machine? Nat Biotechnol.
[6]. Rish I. An empirical study of the naive Bayes
[7]. classifier. IJCAI Work Empir methods ArtifIntell. 2001.
[8]. Quinlan JR. C4.5: Programs for Machine Learning.
[9]. Larose DT. Discovering Knowledge in Data.
[10]. Hoboken, NJ, USA: John Wiley & Sons, Inc.; 2004.
[11]. X. Wu, V. Kumar, J. R. Quinlan, J. Ghosh, Q. Yang,H. Motoda, G. J. Mclachlan, A. Ng, B. Liu, P. S. Yu, Z. Z. Michael, S.
[12]. David, and J. H. Dan, Top 10 algorithms in data mining. 2008.
[13]. Datafloq - Top 10 Data Mining Algorithms,
[14]. Demystified.
[15]. 44. Accessed December 29, 2015.V. Chaurasia and S. Pal, “Data Mining Techniques : To Predict and Resolve Breast Cancer Survivability,” vol. 3,2014.
[16]. Djebbari, A., Liu, Z., Phan, S., AND Famili, F. International journal of computational biology anddrug design (ijcbdd). 21st Annual Conference on Neural Information Processing Systems (2008).
[17]. S. Aruna and L. V Nandakishore, “KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST,”
[18]. A. C. Y, “An Empirical Comparison of Data Mining Classification Methods,” vol. 3, no. 2, 2011.
[19]. A. Pradesh, “Analysis of Feature Selection with Classification : Breast Cancer Datasets,” Indian J. Comput. Sci. Eng., vol. 2, no.5, 2011.
[20]. Thorsten J. Transductive Inference for Text
[21]. Classification Using Support Vector Machines.
[22]. Icml. 1999.
[23]. L. Ya-qin, W. Cheng, and Z. Lu, “Decision tree based predictive models for breast cancer
[24]. survivability on imbalanced data,” 2009.
[25]. D. Delen, G. Walker, and A. Kadam, “Predicting breast cancer survivability: a comparison of three data mining methods,” Artif. Intell. Med., vol. 34, pp. 113–127, 2005. W. Version, “Machine Learningwith WEKA,” 2004.
[26]. “UCI Machine Learning Repository: Breast Cancer Wisconsin (Original) Data Set.” [Online].
[27]. “SUGI 31 Statistics and Data Analysis Receiver Operating Characteristic ( ROC ) Curves MithatGönen , Memorial Sloan-Kettering Cancer Center SUGI 31 Statistics and Data Analysis FN + FP,”, 2001.
[28]. Olutobi Owoputi, Brendan O’Connor, Chris Dyer, Kevin Gimpel, Nathan Schneider, and Noah A. Smith. 2013. Improved part-of-speech tagging for online conversational text with word clusters. In Proceedings of NAACL-2013, pages 380–390.
[29]. Fabian Pedregosa, Gael Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Edouard Duchesnay. 2011. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830.
[30]. M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma,M. McCauley, M. Franklin, S. Shenker, and I. Stoica.Resilient Distributed Datasets: A fault-tolerantabstraction for in-memory cluster computing. In NSDI, 2012.
[31]. M. Bostock, V. Ogievetsky, and J. Heer. D3: Data-Driven Documents. In InfoVis, 2011.
[32]. Pandey, Neha, B. K. Singh, and Ankur Singh Bist. "A novel feature learning for image classification using wrapper approach in GA." Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on. IEEE, 2015.
[33]. M. Li, T. Zhang, Y. Chen, and A. J. Smola. Efficient mini-batch training for stochastic optimization. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’14, pages 661–670, New York, NY, USA, 2014.ACM. ww.cs.cmu.edu/˜muli/file/minibatch sgd.pdf.
[34]. C. J. Maddison, A. Huang, I. Sutskever, and D. Silver. Move evaluation in Go using deep convolutional neural networks. arXiv preprint arXiv:1412.6564, 2014. arxiv.org/abs/1412.6564.
[35]. F. McSherry, M. Isard, and D. G. Murray. Scalability! But at what COST? In Proceedings of the 15th USENIX Conference on Hot Topics in Operating Systems, HOTOS’15, Berkeley, CA, USA, 2015. USENIX Association. www.usenix.org/system/files/conference/hotos15/hotos15-paper-mcsherry.pdf.
[36]. P. Moritz, R. Nishihara, I. Stoica, and M. I. Jordan. SparkNet: Training deep networks in Spark. In International Conference on Learning Represntations, 2016. arxiv.org/abs/1511.06051.
[37]. Kriti Jain1, Megha Saxena2andShweta Sharma3 “Breast Cancer Diagnosis Using Machine Learning Techniques” IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 5 Issue 5, May 2018 ISSN (Online) 2348 – 7968
Citation
Vikas S, Thimmaraju S N, "“Breast Cancer Diagnosis and Classification Using Support vector machines With Diverse Datasets”," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.442-446, 2019.
Clinic Management Software
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.447-450, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.447450
Abstract
This inventory management system keeps all records and transaction details for a particular clinic. User can handle this project by using a single screen through using its different menus and submenus. A clinic inventory has to deal with various fields and sections along with different modules. So, to make it simple so that user can handle this project in a simple way. When the patient will visit on clinic, they will ask to provide their name, address, sex, age and type or problems. As this system will have built in feature that will assign the doctor by taking their type of problem as their input. After entering these fields, user will provide with a registration slip including their name, address, sex, age, name of doctor and chamber number. Each registration form will have unique registration number, arrival time of patient. The doctor will prescribe medicines using patient registration number. For taking medicine user have to give their registration number to the clinic medical shop, where they will get all the medicines.
Key-Words / Index Term
Clinic Management, Medicine
References
1. Pro C# 5.0 and .Net 4.5 frame work (By: Andrew Troelsen)
2. C# 6.0 Cookbook (By: Jay Hilyard, Stephen Teihet)
3. Adaptive Code via C#: Agile coding with design patterns and SOLID principles (Developer Reference) (By: Gary McLean Hall)
4. C# Unleased (By: Bart De Smet)
Sites:
http://stackoverflow.com/
https://msdn.microsoft.com/en-us/library/
http://codereview.stackexchange.com/
http://www.c-sharpcorner.com/
http://csharp.net-informations.com/
Citation
Pruthviraj M A , "Clinic Management Software," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.447-450, 2019.
Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0)
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.451-456, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.451456
Abstract
Cryptographic algorithms attempt to generate ciphertexts which are as seemingly unrelated to the plain text as possible. We attempt to add a further improvement to existing bit level encryption by incorporating chaos through Game of Life. Chaos is introduced in our algorithm to make the enciphering process even more random. This is made possible by using a reversible encryption process using XOR operation in the encryption algorithm. The algorithm is very bit sensitive i.e. any change in plain text bits will produce a completely different result: cipher text using the same key. The main focus of our algorithm was to introduce randomness in encryption which has been achieved by generating a random matrix consisting of dead and alive cells. The said matrix is used for encryption. The matrix generated is seemingly random depending upon the key given. Thus, achieving the desired target of making the encryption and decryption algorithm even more complex.
Key-Words / Index Term
Bit level encryption; differential attack; brute force attack; leftshift; rightshift; chaos using game of life matrix; DNAsequence
References
[1]. Asoke Nath, Soumyadip Ray, Salil Anthony Dhara, Sourav Hazra
“3-DIMENSIONAL BIT LEVEL ENCRYPTION ALGORITHM VERSION-3 (3DBLEA-3)” International Journal of Latest Trends in Engineering and Technology Vol.(10)Issue(2), pp.347-353 May 2018
[2]. Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian edition 2007, Tata Mc-Graw Hill publishing company limited
[3]. Asoke Nath, Ayan Ghosh, Enakshi Ghosh and Jayisha Saha, ”3-Dimensional Bit Level Encryption Algorithm Ver-2(3DBLEA-2)”, , International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol. 4, page: : 8611-8618 Issue 5, MAY 2017.
[4]. Asoke Nath, Saima Ghosh, MeheboobAlam Mallik, “Symmetric Key Cryptography using Random Key generator” Proceedings of International conference on security and management (SAM-10) held at Las Vegas, USA, July 12-15, 2010, Vol-2, Page: 239-244(2010).
Citation
Asoke Nath, Suchandra Datta, Souptik Kumar Majumdar, "Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0)," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.451-456, 2019.
Mobile Based OCR Systems: State-of-the-art Survey for Indian Scripts
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.457-461, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.457461
Abstract
Few decades ago, approach to character recognition was limited to desktop scanner. The usability of such system was limited as they were non portable because of large size. With the advent of technology and portable computing devices such as mobile phone, PDA, iPhone etc. new trends of research has emerged, where Mobile phones are the most commonly used electronic device, eliminating the need for bulky devices like scanners, desktops and laptops. The convergence of powerful processors and high resolution cameras on mobile devices has directed the focus of research to development of mobile applications, where image processing applications such as OCR’s are in demand. This paper present State-of-the-Art survey of Character Recognition systems for mobile devices and summarize some commercially available OCR applications.
Key-Words / Index Term
Mobile OCR, Document Image Processing, Text Recognition
References
[1] D. Doermann, J. Liang and H. Li,”Progress in Camera-Based Document Image Analysis”, IEEE International Conference on Document Analysis and Recognition (ICDAR’03), pp. 606-616, 2003.
[2] D. Ma, Q. Lin and T. Zhang,” Mobile Camera Based Text Detection and Translation,” Stanford University, November 2000.
[3] X. P. Luo, J. Li and L. X. Zhen, “Design and Implementation of a Card Reader based on build-in Camera”, IEEE International Conference on Pattern Recognition, pp. 417-420, 2004.
[4] X. Luo, L. X. Zhen, G. Peng, J. Li and B. H. Xiao, “Camera based Mixed-Lingual Card Reader for Mobile Device”, 8th International Conference on Document Analysis and Recognition, pp. 665-669, 2005.
[5] M. Laine and O. S. Nevalainen, “A Standalone OCR System for Mobile Camera-Phones”, Personal, Indoor and Mobile Radio Communications, IEEE 17th International Symposium, pp. 1-5, September 2006.
[6] J. Liang, D. Menthon and D Doermann, “Geometric Rectification of Camera-Captured Document Images”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, issue 4, pp. 591-605, April 2008.
[7] R. Smith, “An overview of the Tesseract OCR Engine” IEEE 9th International Conference on Document Analysis and Recognition(ICDAR 2007), Curitiba, Brazil, pp. 629-633, September 2007.
[8] M. A. Hasnat, M. R. Chowdhury and M. Khan, "Integrating Bangla Script Recognition support in Tesseract OCR", Proceeding of the Conference on Language & Technology, pp. 108-112, 2009.
[9] S. Mahbub, U. Zaman and T. Islam, ”Application of Augmented Reality: Mobile Camera Based Bangla Text Detection and Translation”, B.Sc.(CSE)- Thesis report, BRAC University, 2012.
[10] N. Mishra, C. Patvardhan, C. V. Lakshmi and S Singh, ”Shirorekha Chopping Integrated Tesseract OCR Engine for Enhanced Hindi Language Recognition”, International Journal of Computer Applications, vol. 39, issue 6, pp. 19-23, February 2012.
[11] S. Badla, ”Improving the efficiency of Tesseract OCR Engine”, Master of Science – Thesis report, San José State University, 2014.
[12] A. Chowdhury, A. Foysal and S. Islam, ”Bangla Character Recognition for Android Devices” International Journal of Computer Applications, vol. 136, issue 11, pp. 13-19, February 2016.
[13] Loh Zhi Chang, Zhou Zhi Ying and Steven, ”Robust Pre-processing Techniques for OCR Applications on Mobile Devices”, ACM Proceedings of 6th International Conference on Mobile Technology, Application & Systems, article no. 60, 4 pages, 2009.
[14] A. F. Mollah, N. Majumder, S. Basu and M. Nasipuri, ”Design of an Optical Character Recognition System for Camera based Handheld Devices”, International Journal of Computer Science, vol. 8, issue 4, pp. 283-289, July 2011.
[15]Tuan Nguyen, Don Nguyen, Phu Nguyen,” UIT-ANPR: toward an open framework for automatic number plate recognition on smartphones ”, ACM Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, January 2014.
[16] M. B Gosavi, I. V Pund, H. V Jadhav and S. R Gedam, ” Mobile Application with Optical Character Recognition Using Neural Network”, International Journal of Computer Science and Mobile Computing, vol. 4, issue 1, pp. 483-489, January 2015.
[17] M. V. Chandrashekhar, M. S Kumar, M. B. N. Taj and K. Asha, ”Optical Character Recognition on the Android Operating System for Kannada Characters using Kohonen Neural Network”, International Journal of Advanced Technology in Engineering and Science, vol. 3, special issue 1, pp. 247-251, May 2015.
[18] M. Cutter and R. Manduchi, “Improving the Accessibility of Mobile OCR Apps Via Interactive Modalities”, ACM Transactions on Accessible Computing, Vol. 10, No. 4, Article 11, 27 pages, August 2017.
Citation
Ravneet Kaur, Dharam Veer Sharma, "Mobile Based OCR Systems: State-of-the-art Survey for Indian Scripts," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.457-461, 2019.
Feature Selection and Summarization of Customer reviews using Fitness based BPSO
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.462-467, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.462467
Abstract
Significant growth of e-commerce has led to huge number of reviews for a product or service. It provides different aspects of service or a product for the users. Sentiment analysis techniques are used to extract feature and opinion in a concise summary form from the customer reviews. Feature based summarization system uses term frequency and feature opinion learner to generate the summary. Fitness value based binary particle swarm optimization for feature selection is proposed to select the best feature subset. The feature selection in BPSO uses fitness value based on the term frequency and opinion score. In BPSO efficient summary is generated using the multi-objective function based on feature weight score and similarity between term frequency and position. The Recall-Oriented Understanding for Gisting Evaluation (ROUGE) toolkit is used to measure the performance of the Multi objective fitness based BPSO. An experimental result proves that multi-objective FBPSO algorithm improves the feature selection and summary generation accuracy.
Key-Words / Index Term
Feature selection, Multi-objective, Fitness, Binary Particle Swarm Optimization, Summarization
References
[1] ArtiBuche, Dr.M.BChandak, Akshay Zadgaonkar, “Opinion Mining and Analysis: A Survey”, Proceedings of the International Journal on Natural Language Computing, Volume 2, No. 3, pp. 39-48, 2013.
[2] Gamgarn Somprasertsri, Pattarachai Lalitrojwong, “Mining Feature-Opinion in Online Customer Reviews for Opinion Summarization”, Journal of Universal Computer Science, Vol.16, No.6, pp. 938-955, 2010.
[3] Dim En Nyaung, Thin Lai Lai Thein, “Feature-Based Summarizing and Ranking from Customer Reviews”, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol: 9, No: 3, 2015.
[4] Li-Ping Jing, Hou-Kuan Huang, Hong-Bo, “Improved Feature Selection Approach TFIDF in Text Mining”, Proceedings of the First International Conference on Machine Learning and Cybernetics, Vol. 2, 2002.
[5] J. Wiebe, E. Riloff, “Creating Subjective and Objective Sentence Classifiers from Unannotated Texts”, In Proceedings of the 6th International Conference on Computational Linguistics and Intelligent Text Processing (CICLing-10), Vol: 3406, pp. 486-497, 2010.
[6] Florian Wogenstein, J. Drescher, D. Reinel, S. Rill, J. Scheidt, “Evaluation of an Algorithm for Aspect-Based Opinion Mining Using a Lexicon-Based Approach”, WISDOM ’13, Proceedings of the Second International Workshop on Issues of Sentiment Discovery and Opinion Mining, Article No. 5, 2013.
[7] Bing Xue, Mengjie Zhang and Will N. Browne, ‘Single Feature Ranking and Binary Particle Swarm Optimisation Based Feature Subset Ranking for Feature Selection’, Proceedings of the Thirty-Fifth Australasian Computer Science Conference, Melbourne, Australia, Vol.122, ACS, pp. 27-36, 2012.
[8] Zhou Z, Liu X, Li P, Shang L, “Feature selection method with Proportionate Fitness based Binary Particle Swarm Optimization”, In: Simulated evolution and learning, pp. 582–592. Springer, New York, 2014.
[9] Ahmed M. Al-Zahrani, Hassan Mathkour, Hassan Abdalla, “PSO-Based Feature Selection for Arabic Text Summarization”, Journal of Universal Computer Science, Vol. 21, No.11, pp. 1454-1469, 2015.
[10] Rasim M. Alguliev, Ramiz M. Aliguliyev, Nijat R. Isazade, “MR&MR-SUM: Maximum Relevance and Minimum Redundancy Document Summarization Model”, International Journal of Information Technology and Decision Making, Vol.12, No.3, pp. 361-393, 2013.
[11] Mohammed Salem Binwahlan , Naomie Salim2 , Ladda Suanmali, “Swarm Based Features Selection for Text Summarization”, International Journal of Computer Science and Network Security, Vol.9, No.1, 2009.
[12] Houda Oufaida, Omar Nouali, Philippe Blache, "Minimum Redundancy and Maximum Relevance for Single and Multi-document Arabic Text Summarization”, Journal of King Saud University – Computer and Information Sciences, Volume 26, Issue 4, pp. 450–461, 2014.
[13] B.Suganya, V.Priya, “Particle Swarm Optimization Based Feature Selection and Summarization of Customer Reviews”, International Conference on Emerging trends in Engineering, Science and Sustainable Technology, pp. 131-135, 2017.
[14] Lin Shang, Zhe Zhou, Xing Liu, “Particle Swarm Optimization-based Feature Selection in Sentiment Classification”, Journal of Soft Computing – A Fusion of Foundations, Methodologies and Applications, Vol.20, Issue.10, pp. 3821-3834, 2016.
[15] Bing Xue, Mengjie Zhang and Will N.Browne, “Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach”, IEEE Transactions on Cybernetics, 43(6), pp. 1656-71, 2012.
[16] Josef Steinberger, Karel Jezek, “Evaluation Measures For Text Summarization”, Computing and Informatics, Vol. 28, pp. 1001–1026, 2009.
Citation
B. Suganya, S.C. Lavanya , T. Gowrisankari, "Feature Selection and Summarization of Customer reviews using Fitness based BPSO," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.462-467, 2019.
Fragmentation of Data for Security in Cloud Services
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.468-472, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.468472
Abstract
The data compromise could occur thanks to attacks by different users and nodes inside the cloud. Therefore, high security measures square measure needed to safeguard knowledge inside the cloud. However, the utilized security strategy should additionally take into consideration the improvement of the information retrieval time. In our proposed system propose the Division and Replication of Data in the Cloud for Optimal Performance and Security with NTRU Algorithm that for file storage and data security. In this system consist of two phase they are NTRU Encryption method and FDSCS methodology. In this methodology, we tend to divide a file into fragments, and replicate the fragmented knowledge over the cloud nodes. Each fragment is encrypted by NTRU Encryption Algorithm. Each of the nodes stores solely one fragment of a selected record that ensures that even just in case of an eminent attack, no meaningful information is revealed to the attacker. Moreover, the nodes storing the fragments square measure separated with bound distance by means that of graph T-coloring to ban associate assaulter of dead reckoning the locations of the fragments. Finally our Experimental result shows our proposed method ensures complete security of the data, reduce the data overhead and reduction the encryption and decryption time.
Key-Words / Index Term
Fragmentation, NTRU algorithm, T-coloring, cloud security, optimization
References
[1] K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A.Y.Zomaya,“Quantitative comparisons of the state of the art data center architectures,” Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, 2013, pp. 1771-1783.
[2] Sirisha Aguru, Batteri MadhavaRao, "Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms", International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.6-9, 2019
[3] Poonam Devi , "Attacks on Cloud Data: A Big Security Issue", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.15-18, 2018
[4] Mazhar Ali ; Kashif Bilal ;Samee U. Khan ;Bharadwaj Veeravalli ; Keqin Li ; Albert Y. Zomaya “FDSCS: Division And Replication Of Data In Cloud Foroptimal Performance And Security” Volume: 6 , Issue: 2 , April-June 1 2018
[5] K. Bilal, M. Manzano, S. U. Khan, E. Calle, K. Li, and A. Zomaya, “On the characterization of the structural robustness of data center networks,” IEEE Transactions on Cloud Computing, Vol. 1, No. 1, 2013, pp. 64-77.
[6] Y. Chen, V.Paxson, and R. H. Katz, “Whats new about cloud computing security,” University of California, Berkeley Report No. UCB/EECS-2010-5, Jan. 20, 2010.
[7] K.Hashizume, D. G. Rosado, E. Fernndez-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing,” Journal of Internet Services and Applications, Vol. 4, No. 1, 2013, pp. 1-13..
[8] Y. Deswarte, L. Blain, and J-C. Fabre, “Intrusion tolerance in distributed computing systems,” In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland CA, pp. 110-121, 1991.
[9] B.Grobauer, T.Walloschek, and E. Stocker, “Understanding cloud computing vulnerabilities,” IEEE Security and Privacy, Vol. 9, No. 2, 2011, pp. 50-57.
[10] W. K. Hale, “Frequency assignment: Theory and applications,” Proceedings of the IEEE, Vol. 68, No. 12, 1980, pp. 1497-1514.
[11] W. A. Jansen, “Cloud hooks: Security and privacy issues in cloud computing,” In 44th Hawaii IEEE International Conference onSystem Sciences (HICSS), 2011, pp. 1-10.
[12] A. N. Khan, M.L. M. Kiah, S. A. Madani, and M. Ali, “Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing, The Journal of Supercomputing, Vol. 66, No. 3, 2013, pp. 1687-1706 .
Citation
S.Daniel, P. Azeem ul haq, S. Sureshkrishnan, "Fragmentation of Data for Security in Cloud Services," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.468-472, 2019.
Cluster Analysis in Precision Agriculture
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.473-477, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.473477
Abstract
In this paper, the use of clustering techniques in the field of precision agriculture has been discussed. Types of clustering techniques discussed are k means clustering, mean shift clustering; Density based spatial clustering of applications with noise (DBSCAN), Expectation–Maximization (EM) Clustering using Gaussian Mixture Models (GMM) and Hierarchical clustering. As clustering is a method of identifying similar groups of data in a data set, Clustering has a huge number of uses spread crosswise over different spaces. In data science clustering analysis is used to gain some valuable insights from the data by looking at what groups the data point belongs to which group when clustering algorithm is applied. Few applications of cluster analysis in the field of agriculture are using k means, hierarchical agglomerative clustering approach, pam clustering method and divisive clustering approach to form the clusters based on soil fertility, crop production, irrigation requirements etc.
Key-Words / Index Term
Precision Agriculture, k_means clustering, Density based spatial clustering of applications with noise(DBSCAN), Expectation–Maximization (EM) Clustering using Gaussian Mixture Models (GMM), Pam clustering, Hierarchial clustering
References
[1] Mamta Tiwari, Dr.Bharat Misra,”Application of Cluster Analysis in Agriculture”, International Journal of Computer Applications Volume 36– No.4, (0975 – 8887), December 2011.
[2] K.Ranjini, Dr.N.Rajalingam,”Performance Analysis of Hierarchical Clustering Algorithm”, Int. J. Advanced Networking and Applications Volume: 03, Issue: 01, Pages: 1006-1011, 2011.
[3] R.S. Walse, G.D. Kurundkar, P. U. Bhalchandra, "A Review: Design and Development of Novel Techniques for Clustering and Classification of Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.19-22, 2018.
[4] Shilpa Mahajan, “Convergence of IT and Data Mining with other technologies”, International Journal of Scientific Research in Computer Science and Engineering, Vol.01, Issue.04, pp.31-37, 2013.
[5] Ms. Shilpa Ankalaki, Jharna Majumdar, “Applications of Clustering Algorithms for Analysis of Agriculture Data”, International Journal of Engineering & Technology, 7, 3, 638-643, 2018.
[6] Dileep Kumar Yadav,” A Comparative Analysis of Clustering Algorithm for Agriculture Data”, International Journal of Current Research Vol. 7, Issue, 07, pp.18361-18364, July, 2015.
[7] Jiawei Han, Micheline Kamber,” Data Mining Concept and Techniques “, 2nd Ed. - Morgan Kaufmann Publishers.
[8] JharnaMajumdar, Sneha Naraseeyappa and Shilpa Ankalaki,” Analysis of agriculture data using data mining techniques: application of big data”, Majumdar et al. J Big Data, 4:20 DOI 10.1186/s40537-017-0077-4, 2017.
[9] Vandana B, S. Sathish Kumar, “ Big Data Analysis through R for Weather Monitoring”, Global Journal of Engineering Science and Researches, ICRTCET-2018, pp 99-106, 2019
[10] Rahmah N, Sitanggang S. Determination of optimal epsilon (Eps) value on DBSCAN algorithm to clustering data on peatland hotspots in Sumatra. IOP conference series: earth and environmental. Science. 2016.
Citation
Vandana.B, S. Sathish Kumar, "Cluster Analysis in Precision Agriculture," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.473-477, 2019.
Content Based Video Retrieval System Using Video Indexing
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.478-782, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.478782
Abstract
Searching for a Video in World Wide Web has augmented expeditiously as there’s been an explosion of growth in video on social media channels and networks in recent years. At present video search engines use the title, description, and thumbnail of the video for identifying the right one. In this paper, a novel video searching methodology is proposed using the Video indexing method. Video indexing is a technique of preparing an index, based on the content of video for the easy access of frames of interest. Videos are stored along with an index which is created out of video indexing technique. The video searching methodology check the content of index attached with each video to ensure that video is matching with the searching keyword and its relevance ensured, based on the word count of searching keyword in video index. Video captions are generated by the deep learning network model by combining global local (glocal) attention and context cascading mechanisms using VIST-Visual Story Telling dataset. Video Index generator uses Wormhole algorithm, that ensure minimum worst-case time for searching a key with a length of L Also, Video searching methodology extracts the video clip where the frames of interest lies from the original huge sized source video. Hence, searcher can get and download a video clip instead of downloading entire video from the video storage. This reduces the bandwidth requirement and time taken to download the videos.
Key-Words / Index Term
Video Indexing, Video Searching methodology, VIST- Visual Story Telling dataset
References
[1] Cisco, “Visual Networking Index: Forecast and Trends, 2017–2022”, CISCO, February 27, 2019.
[2] Z. Cao, and M. Zhu, “An Efficient Video Similarity Search Algorithm”, IEEE Transactions on Consumer Electronics, Vol. 56, No. 2, May 2010.
[3] Q. Chen , K. Kotani , F. Lee and T. Ohmi, “A fast search algorithm for large video database using HOG based features”, David C., Wyld et al. (Eds) : ITCS, JSE, SIP, ARIA, NLP-2016, pp. 35–41, 2016.
[4] H.Aradhye, G. Toderici, and J. Yagnik. “Video2text: Learning to annotate video content”,.ICDM Workshop on Internet Multimedia Mining, Google, Inc,USA,2009.
[5] N. Krishnamoorthy, G. Malkarnenkar, R. J. Mooney, K. Saenko, and S. Guadarrama,. “Generating Natural-language video descriptions using text-mined knowledge”. In Proceedings of the Workshop on Vision and Natural Language Processing, pp 10-19,July 2013.
[6] J. Donahue, L. A. Hendricks, S. Guadarrama, M. Rohrbach, S. Venugopalan, K. Saenko, and T. Darrell, “Long-term recurrent convolutional networks for visual recognition and description”, arXiv:1411.4389v4 [cs.CV], May 2016
[7] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan, “Show and tell: A Neural Image Caption Generator”, arXiv:1411.4555v2 [cs.CV], April 2015.
[8] S. Venugopalan, H. Xu, J. Donahue, M. Rohrbach, R. Mooney, and K. Saenko. “Translating videos to natural language using deep recurrent neural networks”, arXiv:1412.4729v3 [cs.CV], April, 2015.
[9] J. Liu , Q. Yu , O. Javed , S.Ali, A. Tamrakar, A. Divakaran, H.Cheng, H. Sawhney “Video event recognition using concept attributes”, IEEE Workshop on Applications of Computer Vision (WACV), March 2013
[10] M. Mazloom, A. Habibian and C.G. M. Snoek ISLA,. “Querying for Video Events by Semantic Signatures from Few Examples”. Proceedings of the 21st ACM International Conference on multimedia, pp 609-612 October, 2013.
[11] S. Venugopalan, M. Rohrbach, J.Donahue Raymond Mooney, T. D. Kate Saenko, ”Sequence to Sequence – Video to Text”, Proceedings of the 2015, IEEE International Conference on Computer Vision (ICCV),Pages 4534-4542 December, 2015.
[12] N.Gayathri, K.Mahesh, “A Systematic study on Video Indexing”, International Journal of Pure and Applied Mathematics Volume 118 No. 8 2018, 425-428
[13] M.Ravinder, T.Venugopal, Sultanpur, Medak, ”Content-Based Video Indexing and Retrieval using Key frames Texture, Edge and Motion Features”, International Journal of Current Engineering and Technology, Vol.6, No.2,April,2016.
[14] N. Laokulrat, S. Phan, N. Nishida, R. Shu , Y.Ehara , N. Okazaki, Y. Miyao and H. Nakayama, “Generating Video Description using Sequence-to-sequence Model with Temporal Attention”, Proceedings of International Conference on Computational Linguistics: Technical Papers, pages 44–52, Osaka, Japan, December, 2016.
[15] A. Kumar , R. K. Goel , “An Efficient Algorithm for Text Localization and Extraction in Complex Video Text Images”, IEEE International Conference on Information Management in the Knowledge Economy,2013.
[16] T. Hao K. Huang, F. Ferraro, N.. Mostafazadeh, I. Misra, J. Devlin, A.Agrawal, R. Girshick, Xiaodong He, “Visual storytelling”. Annual Conference of the North American Chapter of the Association for Computational Linguistics”, arXiv:1604.03968v1 [cs.CL], 2016.
[17] T. Kim, M. OhHeo, S. Kyoung-WhaPark ,B. T. Zhang “GLAC-Net: GLobal Attention Cascading Networks for Multi-Image Cued Story Generation”, arXiv:1805.10973v3, Feb 2019.
[18] X. Wu, Fan Ni , S. Jiang, “Wormhole: A Fast Ordered Index for In-memory Data Management”, arXiv:1805.02200v2 [cs.DB], May 2018.
Citation
Jaimon Jacob, Sudeep Ilayidom, V.P. Devassia, "Content Based Video Retrieval System Using Video Indexing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.478-782, 2019.
Smart Intrusion Detection Using Machine Learning Techniques
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.483-488, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.483488
Abstract
Intrusion Detection is one of the most effective and widely used implementation against the attacks and threats .Further more attackers keeps on varying their attacking techniques and tools .In this paper we have tried to perform a simulation study to evaluate the performance of varied machine learning classifiers to detect intrusion detection based on KDD 99 cups data set [1] focusing on enhancing the proficiency of Intrusion Detection system (IDS).
Key-Words / Index Term
DoS- Denial Of Service; U2R-User to root; R2L: Root to local; CIA-Confidentilaity,Integrity,availability ; CM-Confusion Matrix; MLP-Multi Layer perceptron ; NEA-Nearest Cluster Algorithm.; GAU:- Gaussian; K-M: K means algorithm; CPE: - Cost Per example; Pd:Probabilty Detection; FaR:False alrm Rate
References
[1] A. M., C. and K., R. (2012). Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set. International Journal of Information and Network Security (IJINS), 1(4).
[2] K. Park and Y. Cheong, "Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm," 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), Bamberg, Germany, 2018, pp. 282-286
[3] Durcikova and M. E. Jennex, "Introduction to Confidentiality, Integrity, and Availability of Knowledge, Innovation, and Entrepreneurial Systems Minitrack," 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA, 2016, pp. 4010
[4] K. Alrawashdeh and C. Purdy, "Toward an Online Anomaly Intrusion Detection System Based on Deep Learning," IEEE International Conference 2016 on Machine Learning Applications , Anaheim, California, USA, 2017, pp. 195-200
[5] Levin,KDD-99 classifier learning Contest Llsofts Result Overview“,SIGKDD ,January 2000,Vol.I (2) pp 67-75.
[6] L.Ertoz,M.Steinbock and V.Kumar in finding cluster of different sizes and shapes,and densities in Noisy and high dimensional data“ Technical Report.
[7] D.Y Yeung and Chow „ Parzen Window network Intrsion Detection“.Sixteenth international conferance on platform recognition ,Quback city canada P.P 11-15.
[8] C4.5 Simulator downloaded from: https://github.com/scottjulian/C4.5/tree/master/src/main/java/myc45
[9] Zaghian, A. & Noorbehbahani, F. Pattern Anal Applic (2017) 20: 701. https://doi.org/10.1007/s10044-015-0527-6.
[10] Pérez-Miñana E. (1998) A Generative Learning Algorithm that uses Structural Knowledge of the Input Domain yields a better Multi-layer Perceptron. In: Bullinaria J.A., Glasspool D.W., Houghton G. (eds) 4th Neural Computation and Psychology Workshop, London, 9–11 April 1997. Perspectives in Neural Computing. Springer, London
[11] Parvin H., Mohamadi M., Parvin S., Rezaei Z., Minaei B. (2012) Nearest Cluster Classifier. In: Corchado E., Snášel V., Abraham A., Woźniak M., Graña M., Cho SB. (eds) Hybrid Artificial Intelligent Systems. HAIS 2012. Lecture Notes in Computer Science, vol 7208. Springer, Berlin, Heidelberg
[12] A. K. Amoura, J. König and E. Bampis, "Scheduling Algorithms for Parallel Gaussian Elimination With Communication Costs," in IEEE Transactions on Parallel & Distributed Systems, vol. 9, no. , pp. 679-686, 1998.
doi:10.1109/71.707547
[13] M. Ohsaki, et al.,"Confusion-Matrix-Based Kernel Logistic Regression for Imbalanced Data Classification" in IEEE Transactions on Knowledge & Data Engineering, vol. 29, no. 09, pp. 1806-1819, 2017.
[14] V. Lesser, E. Durfee and D. Corkill, "Trends in Cooperative Distributed Problem Solving" in IEEE Transactions on Knowledge & Data Engineering, vol. 18, no. 01, pp. 63-83, 1989.
[15] G. Smith, et al., "Anatomy of a Real-Time Intrusion Prevention System," in Autonomic Computing, International Conference on, null, 2008 pp. 151-160.
[16] P. Anitha, D. Rajesh, K. Venkata Ratnam, "Machine Learning in Intrusion Detection – A Survey", International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.112-119, 2019.
[17] Madhavi Dhingra, "Survey on Intrusion Detection System Based on Feature Classification and Selection", International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.399-403, 2019.
[18] P. Patil, T. Bagwan, S. Kulkarni, C. Lobo, S.R. Khonde, "Multi-Attacks Detection in Distributed System using Machine Learning", International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.601-605, 2019.
Citation
Ashish Puri, Md Tabrez Nafis, "Smart Intrusion Detection Using Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.483-488, 2019.
Performance Evaluation of MOA v/s KNN Classification Schemes: Case Study of Major Cities in the World
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.489-495, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.489495
Abstract
Satellite imageries are widely available from various sources which can be used for Land use/Land cover analysis. Land use/Land cover analysis is necessary for environmental monitoring, urban planning and natural resource analysis. In this paper, we have used newly created algorithm- Multi Objective Algorithm (MOA) which is the combination of two metaheuristic algorithms for classification of satellite imageries. Classification result was compared with the KNN (K-Nearest Neighbour) algorithm. In this view, satellite imageries of Delhi and Shenyang were used for the experiment purpose. Also accuracy of classification was measured using the error matrix/kappa coefficient and was compared with the KNN classification technique. The classification results of the two major cities indicate a substantial difference in the percentage of overall accuracy and kappa coefficient value.
Key-Words / Index Term
Classification, Land use/Land Cover, K-Nearest Neighbour, MOA, Accuracy Assessment
References
[1] Congalton, R. G. (1991). A review of assessing the accuracy of classifications of remotely sensed data. Remote Sensing of Environment, 37(1), 35–46.
[2] Sanjay Srivas, P. G. Khot, (2018). Analysis & Visualization of Multidimensional GIS Images Using Multi Objective Algorithm (MOA). International Journal of Computer Sciences and Engineering, 6(8), 460-464.
[3] Darius Phiri, & Justin Morgenroth. (2017). Developments in Landsat Land Cover Classification Methods: A Review. Remote Sensing, 9(9), 967.
[4] Liu, X. Supervised Classification and Unsupervised Classification. 12.
[5] Kalra, K., Goswami, A. K., & Gupta, R. (2013). A Comparative Study of Supervised Image Classification Algorithms for Satellite Images. International Journal of Electrical, Electronics and Data Communication, 1(10), 7.
[6] Canty, M. J., & Nielsen, A. A. (2006). Visualization and unsupervised classification of changes in multispectral satellite imagery. International Journal of Remote Sensing, 27(18), 3961–3975.
[7] Cai, Y., Ji, D., & Cai, D. (2010). A KNN Research Paper Classification Method Based on Shared Nearest Neighbor. NTCIR, 5.
[8] Ahmad, A., & Quegan, S. (2012). Analysis of Maximum Likelihood Classification on Multispectral Data. Applied Mathematical Sciences, 6(129), 6425 - 6436.
[9] Yadav, J., & Sharma, M. (2013). A Review of K-mean Algorithm. International Journal of Engineering Trends and Technology, 4(7), 5.
[10] Scofield, G. B., Pantaleao, E., & Negri, R. G. (2015). A Comparison of Accuracy Measures for Remote Sensing Image Classification: Case Study In An Amazonian Region Using Support Vector Machine, International Journal Image Processing, 9(1), 11–21.
[11] Rwanga, S. S., & Ndambuki, J. M. (2017). Accuracy Assessment of Land Use/Land Cover Classification Using Remote Sensing and GIS. International Journal of Geosciences, 08(04), 611–622.
[12] Viera, A. J., & Garrett, J. M. (2005). Understanding Interobserver Agreement: The Kappa Statistic. Family Medicine, 37(5), 360-363.
[13] Olmsted, A. Calculating kappa measures of agreement and standard errors using SAS software: some tricks and traps. 6
[14] Bharatkar, P. S., & Patel, R. (2013). Approach to Accuracy Assessment tor RS Image Classification Techniques. International Journal of Scientific & Engineering Research, 4(12), 8.
Citation
Sanjay Srivas, P. G. Khot, "Performance Evaluation of MOA v/s KNN Classification Schemes: Case Study of Major Cities in the World," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.489-495, 2019.