Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.481-487, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.481487
Abstract
The term ‘group Signature’ is inherited element of ‘digital signature’ that permits any group members to sign the messages on behalf of its group which they belongs too. The identity of original signer is hidden by this resulting signature. Subsequently, the identity of the original signer can be reveal by the group manager, who is only responsible to, open the signatures respectively. The efficient approach that combines the revocation mechanism into group signature schemes based on the robust RSA assumption. The security is an essential factor for a secure group signature scheme, and the third party introduction make the scheme more practical and simple than the previous schemes of this kind.
Key-Words / Index Term
Group signature scheme, Cloud computing, Revocation, RSA Algorithm
References
[1] J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,” in Proc. of IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014, pp. 2121–2129.
[2] B. Wang, L. Baochun, and L. Hui, “Public auditing for shared data with efficient user revocation in the cloud,” in Proc. Of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013, pp. 2904–2912.
[3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preservingpublic auditing for data storage security in cloud computing,”inProc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp. 525–533.
[4] Pushkar Zagade, Shruti Yadav, Aishwarya Shah, Ravindra Bachate “ Group User Revocation and Integrity Auditing of Shared Data in Cloud Environment” International Journal of Computer Applications (0975 – 8887) Volume 128 – No.12, October 2015.
[5] Subhra Mishra and Tilak Rajan Sahoo” A Survey on Group Signature Schemes” Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela.
[6] Tao Jiang, Xiaofeng Chen, and Jianfeng Ma” Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation” 2015 IEEE.
[7] He Ge “An Effective Method to Implement Group Signature with Revocation”.
[8] Rupeng Li, Jia Yu, Jin Wang,Guowen Li, Daxing Li” Key-Insulated Group Signature Scheme with Verifier-Local Revocation” 2007 IEEE.
[9] Aayush Agarwal, Rekha Saraswat “A Survey of Group Signature Technique, its Applications and Attacks” International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 10, April 2013.
[10] J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 10, pp. 2402–2415, Oct. 2017.
[11] X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure multi-owner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib.Syst., vol. 24, no. 6, pp. 1182–1191, Jun. 2013.
[12] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. Conf. Inf. Commun., 2010, pp. 1–9.
[13] T. Jiang, X. Chen and J. Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation," in IEEE Transactions on Computers, vol. 65, no. 8, pp. 2363-2373, 1 Aug. 2016.
[14] Dan Boneh and Hovav Shacham. 2004. Group signatures with verifier-local revocation. In Proceedings of the 11th ACM conference on Computer and communications security (CCS `04). ACM, New York, NY, USA, 168-177.
[15] S. Cui, X. Cheng and C. W. Chan, "Practical group signatures from RSA," 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA`06), Vienna, 2006
[16] R. Li, J. Yu, J. Wang, G. Li and D. Li, "Key-Insulated Group Signature Scheme with Verifier-Local Revocation," Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), Qingdao, 2007
[17] X. Yi, “Identity-based fault-tolerant conference key agreement,” IEEE Trans. Depend. Sec. Comput., vol. 1, no. 3, pp. 170–178, Jul. 2004.
[18] Evgeny Milanov “The RSA Algorithm” published on 3 June 2009
[19] Ako Muhamad Abdullah “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data” 16 June 2017.
[20] Mr. Mangesh Nagarkar , Prof. Patole R.G “Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation” International Journal of Advanced Research in Computer and Communication Engineering. Vol. 5, Issue 11, November 2016.
Citation
Rohit Rai, Upasna Singh, "Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.481-487, 2018.
Issues and Challenges with Blockchain: A Survey
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.488-491, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.488491
Abstract
Blockchain is one of the latest trends in Information Technology domain. It has changed a way of thinking for IT professional. Companies are focusing on implementation of blockchain with their services to ensure security and reliability. Still they are facing challenges and issues for development and implementation of blockchain based services. This paper discusses those issues and challenges to be considered in development and implementation.
Key-Words / Index Term
Blockchain, Smart contracts, Issues and Challenges (key words)
References
[1] Iuon-Chang Lin, Tzu-Chun Liao, ”A Survey of Blockchain Security Issues and Challenges”, International Journal of Network Security, Vol 19, No. 5, pp. 653-659, 2017
[2] Jacek Bastin,” Blockchain technology issues and solutions: a complete overview”, 2018
[3] Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, Kari Smolander, ”Where Is Current Research on Blockchain Technology? -A Systematic Review “, PloS one Vol. 11, 10 ,2016
[4] Tobias Bamert, Christian Decker, Roger Wattenhofer, Samuel Welten,” Bluewallet: The secure bitcoin wallet”, International Workshop on Security and Trust Management. Springer, pp 65–80, 2014
[5] Joppe W Bos, J Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow, “Elliptic curve cryptography in practice”, International Conference on Financial Cryptography and Data Security, Springer, pp.157–175, 2014
[6] Melanie Swan, “Blockchain: Blueprint for a new economy”, O’Reilly Media, Inc., 2015
[7] Zibin Zheng ,Shaoan Xie, Hong-Ning Dai, “Blockchain challenges and opportunities: a survey”, International Journal of Web and Grid Services, Vol. 14, No. 4, pp. 352-375, 2018
[8] A. S. Elmaghraby and M. M. Losavio, “Cyber security challenges in smart cities: Safety,security and privacy”, Journal of Advanced Research, Vol. 5, pp. 491-497, 2014
[9] Archana Prashanth Joshi, Meng Han_ and Yan Wang, “A survey on security and privacy issues of blockchain technology”, Mathematical Foundations of Computing, Vol. 1, No. 2, pp. 121-147, 2018
Citation
Divyakant Meva, "Issues and Challenges with Blockchain: A Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.488-491, 2018.
A Survey on Internet of Things
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.492-496, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.492496
Abstract
Internet has made a significant impact on our economy and society. With the advances in information and communication technologies, Internet of Things (IoT) has emerged as one of the most powerful communication paradigms of the 21st century representing the trend of future networking and is leading the wave of the IT industry revolution. Advancement in technology related to data collection, such as embedded devices and RIFD technology had led to increase in number of devices that are connected to the net and transmit the data continuously. The continuation of this trend is poised to evolve as an “Internet of Things” where the web will provide a medium for objects to become interactive. IoT makes internet more pervasive by extending the concept of internet to accommodate each and every object existing in this world or likely to exist in the coming future. These objects continuously generate information about the physical world, communicate with other objects and the seamless interactions among them lead to many different applications such as home automation, smart grid, smart city, traffic management, etc. This paper addresses different perspectives, challenges, applications and current world wide activities related to IoT.
Key-Words / Index Term
Internet of Things, IoT
References
[1] J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions”, Future Generation Computer Systems, 29, no. 7, pp.1645–1660 , 2013.
[2] T. Lu and N. Wang, “Future internet: The internet of things", 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010.
[3] S. Chen, H.Xu, D. Liu, B. Hu and H. Wang, “A Vision of IoT: Applications, Challenges and Opportunities With China Perspective ”, IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 4, pp. 349-359, AUGUST 2014.
[4] H. Yinghui and G. Li,"Descriptive models for Internet of Things", International Conference on Intelligent Control and Information Processing (ICICIP), 2010.
[5] R. Khan, S. Khan, R. Zaheer and S. Khan, “Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges”, 10th International Conference on Frontiers of Information Technology, 2012
[6] S. Chandrakanth ,K. Venkatesh ,J. U. Mahesh,,Dr. K.V.Naganjaneyulu, “INTERNET OF THINGS”, International Journal of Innovations & Advancement in Computer Science, Volume 3, Issue 8 ,October 2014.
[7] Huang, Yinghui, and G. Li., "A semantic analysis for internet of things", International Conference on Intelligent Computation Technology and Automation (ICICTA), 2010.
[8] C. Perera, C. H. Liu, S. Jayawardena and M. Chen, “A Survey on Internet of Things From Industrial Market Perspective”, IEEE Access , Volume 2, 2014.
[9] Draft Policy on Internet of Things. Department of Electronics & Information Technology (DeitY) ,Ministry of Communication and Information Technology , Government of India.
[10] B. Sniderman and M. E. Raynor,“Power Struggle : Customers, Companies and Internet of Things”, Deloitte Review, Issue 17,2015.
[11] S. M. Riazul Islam, D. Kwak, Md. H. Kabir , M. Hossain and K. Kwak, “The Internet of Things for Health Care: A Comprehensive Survey ”, IEEE Access , Volume 3, 2015.
[12] F. Hu, D. Xie, S. Shen, “On the Application of the Internet of Things in the Field of Medical and Health Care”, IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing,2013.
[13] A. M. Sapkal, V. Bairagi, “Telemedicine in India: a review challenges and role of image compression”, Journal of Medical Imaging Health Inform 1(4), pp. 300–306, 2011.
[14] N. Kulkarni, V. K. Bairagi, “Diagnosis of Alzheimer disease using EEG signals”, International Journal of Engineering Research & Technology (IJERT) , vol. 3, Issue 4, pp. 1835–1838, 2014.
[15] V. K. Bairagi , A. M. Sapkal & A. Tapaswi, “Texture-Based Medical Image Compression”, Springer Journal of Digital Imaging ,26, pp. 65–71, 2013.
[16] L. Chunli, “Intelligent Transportation based on the Internet of Things”, 2nd International Conference on Consumer Electronics, Communications and Networks,2012.
[17] T. M. Bojan, U. R. Kumar and V. M. Bojan, “An Internet of Things based Intelligent Transportation System”, IEEE International Conference on Vehicular Electronics and Safety (ICVES) December 16-17, 2014.
[18] L. B. Campos, C. E. Cugnasca, “Applications of RFID and WSNs Technologies to Internet of Things”,RFID,2014.
[19] Zanella, Andrea, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi. "Internet of things for smart cities", Internet of Things Journal, IEEE 1, vol. no. 1, pp. 22-32, 2014.
[20] Elyamany, Hany F., and A. H. AlKhairi, "IoT-academia architecture: A profound approach", International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015.
[21] D. Singh, G. Tripathi, A. J. Jara, “A survey of Internet-of-Things: Future Vision, Architecture, Challenges and Services”, IEEE World Forum on Internet of Things (WF-IoT), 2014.
[22] S. Ziegler, C. Crettaz , I. Thomas, “IPv6 as a global addressing scheme and integrator for the Internet of Things and the Cloud ”, 28th International Conference on Advanced Information Networking and Applications Workshops, 2014.
[23] M. M. Hossain, M. Fotouhi and R. Hasan, “Towards an Analysis of Security Issues, Challenges and Open Problems in the Internet of Things”, IEEE World Congress on Services, 2015.
[24] Bandyopadhyay, Debasis and J. Sen, "Internet of things: Applications and challenges in technology and standardization", Wireless Personal Communications 58.1, pp. 49-69,2011.
[25] D. Christin, A Reinhardt, P. S. Mogre, R. Steinmetz ,"Wireless sensor networks and the internet of things: Selected challenges", Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze ,pp. 31-34,2009.
[26] Chen, Yen-Kuang. "Challenges and opportunities of internet of things." Design Automation Conference (ASP-DAC), 2012 17th Asia and South Pacific. IEEE, 2012.
[27] Coetzee, Louis, and J. Eksteen, "The Internet of Things-promise for the future? An introduction", IST-Africa Conference Proceedings, IEEE, 2011.
[28] Ma, H. Dong,"Internet of things: Objectives and scientific challenges",Journal of Computer science and Technology 26.6 , pp. 919-924, 2011.
[29] P. B. Gaikwad, V. K. Bairagi, “Hand Gesture Recognition for Dumb People using Indian Sign Language”, International Journal of Advanced Research in computer Science and Software Engineering, pp:193-194, 2014.
[30] P. Bohr, R. Gargote, R. Vhorkate, R.U. Yawle, V. K. Bairagi, "A No Reference Image Blur Detection Using Cumulative probability Blur Detection (CPBD) Metric", International Journal of Science and Modern Engineering, vol. 1, no. 5, April 2013.
Citation
V.K.Bairagi, S.L. Joshi, S.H. Barshikar, "A Survey on Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.492-496, 2018.
A Study on Lung Nodule Segmentation and Classification using Supervised Machine Learning Techniques
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.497-503, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.497503
Abstract
Lung cancer is one of the dangerous and life taking disease in the world. However, early diagnosis and treatment can save our life. Although, CT scan imaging is best imaging technique in medical field, it is difficult for doctors to interpret and identify the cancer from CT scan images. Therefore computer aided diagnosis(CAD) can be helpful for doctors to identify the cancerous cells accurately. Many computer aided model using image processing and Machine Learning Technique(MLT) has been researched and developed. The main goal of this research work is to evaluate the various computer-aided model, analyzing the current best model and finding out their limitation and drawbacks and finally proposing the new model with improvements in the current best model. The model utilized that lung cancer detection model were sorted and arranged on the basis of their detection accuracy. The model were developed on each step and overall limitation, drawbacks were pointed out. It is found that some has low accuracy and some has higher accuracy, but not nearer to 100%. Therefore, this research targets to increase the accuracy towards 100%.
Key-Words / Index Term
Image Processing, Data Mining, Segmentation, Classification, Lung Cancer, Prediction
References
[1] Krishnaiah V, Narsimha G, Chandra NS. “Diagnosis of Lung Cancer Prediction System Using Data Mining Classification Techniques”. International Journal of Computer Science and Information Technologies. 2013; 4(1):39-44.
[2] Ahmed K, Emran AA, Jesmin T, Mukti RF, Rahman MDZ, Ahmed F. “Early Detection of Lung Cancer Risk Using Data Mining”. Asian Pacific Journal of Cancer Prevention. 2013;14(1):595-97.
[3] Thangaraju P, Barkavi G, Karthikeyan T. “Mining Lung Cancer Data for Smokers and Non-Smokers by Using Data Mining Techniques”. International Journal of Advanced Research in Computer and Communication Engineering. 2014; 3(7):7622-5.
[4] Pandya R, Pandya J. “C5.0 algorithm to improved decision tree with feature selection and reduced error pruning”. International Journal of Computer Applications. 2015; 117(16):18-51.
[5] Er.Tapas Ranjan Baitharu, Dr.Subhendu Kumar Pani, “A Comparative Study of Data Mining Classification Techniques Using Lung Cancer Data”, International Journal Of Computer Trends And Technology (IJCTT) – Volume 22 Number 2–April 2015.
[6] Jaimini Majali, Rishikesh Niranjan, Vinamra Phatak, Omkar Tadakhe, “Data Mining Techniques For Diagnosis And Prognosis Of Cancer”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 3, March 2015
[7] Hilal Almarabeh, “A Study of Data Mining Techniques Accuracy for Healthcare”, International Journal of Computer Applications, Volume 168 – No.3, June 2017.
[8] J.Jamera banu, “A Study on Mining Lung Cancer Data for Increasing or Decreasing Disease Prediction Value by Using Ant Colony Optimization Techniques”, Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA) Page 150.
[9] Neha Panpaliya, Neha Tadas, Surabhi Bobade, Rewti Aglawe, Akshay Gudadhe, “A Survey On Early Detection And Prediction Of Lung Cancer”, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.1, January- 2015, pg. 175-184.
[10] .G. Krishnaveni, Prof. T.Sudha, “A Novel Technique To Predict Diabetic Disease Using Data Mining – Classification Techniques”, International Journal of Advanced Scientific Technologies, Engineering and Management Sciences (IJASTEMS, Volume.3,Special Issue.1,March.2017
[11] K. Arutchelvan, “Prognosis of Lung Cancer Using Data Mining Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 3, March 2016
[12] N.V. Ramana Murty, “A Critical Study of Classification Algorithms for LungCancer Disease Detection and Diagnosis”, International Journal of Computational Intelligence Research, pp. 1041-1048
[13] Durairaj M, Deepika R, “Comparative Analysis of Classification Algorithms for the Prediction of Leukemia Cancer”, International Journal of Advanced Research in Computer science and Software Engineering, Volume 5, Issue 8, August 2015.
[14] P. Thamilselvan, “An Enhanced K Nearest Neighbor Method To Detecting And Classifying Mri Lung Cancer Images For Large Amount Data”, International Journal Of Applied Engineering Research Issn 0973-4562 Volume 11, Number 6 (2016) Pp 4223-4229
[15] Suganya, A., Mohanapriya, N. and Kalaavathi, B. 2015. “Lung Nodule Classification Techniques for Low Dose Computed Tomography (LDCT) Scan Images as Survey”. International Journal of Computer Applications, 131(14), pp.12-15.
[16] Zhang, F., Song, Y., Cai, W., Lee, M.Z., Zhou, Y., Huang, H., Shan, S., Fulham, M.J. and Feng, D.D. 2014. “Lung nodule classification with multilevel patch-based context analysis”. IEEE Transactions on Biomedical Engineering, 61(4), pp.1155-1166.
[17] Aggarwal, T., Furqan, A., & Kalra, K. (2015) “Feature extraction and LDA based classification of lung nodules in chest CT scan images.” 2015 International Conference On Advances In Computing, Communications And Informatics (ICACCI), DOI: 10.1109/ICACCI.2015.7275773.
[18] Jin, X., Zhang, Y., & Jin, Q. (2016) “Pulmonary Nodule Detection Based on CT Images Using Convolution Neural Network.” 2016 9Th International Symposium On Computational Intelligence And Design (ISCID). DOI: 10.1109/ISCID.2016.1053.
[19] Sangamithraa, P., & Govindaraju, S. (2016) “Lung tumour detection and classification using EK-Mean clustering.” 2016 International Conference On Wireless Communications, Signal Processing And Networking (Wispnet). DOI: 10.1109/WiSPNET.2016.7566533.
[20] Roy, T., Sirohi, N., & Patle, A. (2015) “Classification of lung image and nodule detection using fuzzy inference system.” International Conference On Computing, Communication & Automation. DOI: 10.1109/CCAA.2015.7148560.
[21] Ignatious, S., & Joseph, R. (2015) “Computer aided lung cancer detection system.” 2015 Global Conference On Communication Technologies (GCCT), DOI: 10.1109/GCCT.2015.7342723.
[22] Rendon-Gonzalez, E., & Ponomaryov, V. (2016) “Automatic Lung nodule segmentation and classification in CT images based on SVM.” 2016 9Th International Kharkiv Symposium On Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW).
Citation
K. Narmada, G.Prabakaran, R.Madhan Mohan, "A Study on Lung Nodule Segmentation and Classification using Supervised Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.497-503, 2018.
A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery from Database
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.504-509, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.504509
Abstract
Data mining and knowledge discovery in databases have been considered as an important research area in education and industry. This survey presents an overview, a description and future direction which denotes a standard for knowledge discovery using dynamic data mining process model. The paper mentions particular real-world applications, data mining techniques, challenges incorporated in real-world application of knowledge discovery, current and future research concepts in the field. The applications to both academic and industrial concerns are discussed. The major target of the survey is the integration of the research in this particular area and thereby assisting in improving the existing model by using dynamic data mining. The bonding between the knowledge discovery and dynamic data mining in real world is reviewed with appropriate examples. The survey critically evaluates the area of knowledge discovery database to inform users about various models and to develop various models using dynamic data mining. The knowledge discovery database management standards will help in promoting the industry growth and pushing the industry beyond the edge.
Key-Words / Index Term
Knowledge Discovery Database, Data Mining, Dynamic Data Mining Real World Application
References
[1] K. S., Hemanth, C. M., Vastrad, S. Nagaraju, “Data Mining Technique for Knowledge Discovery from Engineering Materials Data Sets”, In International Conference on Computer Science and Information Technology,Springer, Berlin, Heidelberg, pp. 512-522,2011
[2] U. Fayyad, G. Piatetsky-Shapiro, P. Smyth, “From data mining to knowledge discovery in databases”, AI magazine, Vol.17, Issue.3, pp.37, 1996
[3] M. Panda, M. R. Patra, “Evaluating machine learning algorithms for detecting network intrusions”, International journal of recent trends in engineering, Vol.1, Issue.1, pp. 472, 2009.
[4] D. Y. Yeung, C. Chow, “Parzen-window network intrusion detectors” In Object recognition supported by user interaction for service robots, IEEE, Vol. 4, pp. 385-388, 2002.
[5] J. Han, M. Kamber, “Data Mining: Concepts and Techniques”, 2/e San Francisco: CA. Morgan Kaufmann Publishers, an imprint of Elsevier. pp-5-38, 2006
[6] L. L. Berry, “Relationship marketing of services—growing interest, emerging perspectives”, Journal of the Academy of marketing science, Vol. 23, Issue. 4, pp. 236-245, 1995.
[7] R. Agrawal, H. Mannila, R. Srikant, H. Toivonen, A. I. Verkamo, “Fast discovery of association rules”, Advances in knowledge discovery and data mining, Vol. 12, Issue.1, pp. 307-328, 1996.
[8] C. Priyadharsini, A. S. Thanamani, “An Overview of Knowledge Discovery Database and Data mining Techniques”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue.1, 2014.
[9] T. E. Senator, H. G. Goldberg, J. Wooton, M. A. Cottini, A. U. Khan, C. D. Klinger, R. W. Wong, “Financial Crimes Enforcement Network AI System (FAIS) Identifying Potential Money Laundering from Reports of Large Cash Transactions.” AI magazine, Vol.16, Issue.4, pp. 21, 1995.
[10] R. J. Brachman, T. Anand, “The process of knowledge discovery in databases”. In Advances in knowledge discovery and data mining (1996, February), American Association for Artificial Intelligence, pp. 37-57.
[11] S. S. Anand, A. R. Patrick, J G. Hughes, D. A. Bell, “A data mining methodology for cross-sales”, Knowledge-based systems, Vol.10, Issue.7, pp. 449-461, 1998.
[12] A. K. Jain, R. C. Dubes, “Algorithms for clustering data”, 1988.
[13] S. Butler, “An investigation into the relative abilities of three alternative data mining methods to derive information of business value from retail store-based transaction data”, Doctoral dissertation, BSc thesis, School of Computing and Mathematics, Deakin University, Australia, 2002.
[14] S. Moyle, M. Bohanec, E. Osrowski, “Large and tall buildings: a case study in the application of decision support and data mining”, Kluwer International Series In Engineering And Computer Science, pp. 191-202, 2003.
[15] K. J. Cios, G. W. Moore, “Medical data mining and knowledge discovery: Overview of key issues”, Studies in Fuzziness and Soft Computing, Vol.60, pp. 1-20, 2001.
[16] J. P. Sacha, K. J. Cios, L. S. Goodenday, “Issues in automating cardiac SPECT diagnosis”, IEEE Engineering in Medicine and Biology Magazine, Vol.19, Issue.4, pp. 78-88, 2000.
[17] H. Sak, A. Senior, F. Beaufays, “Long short-term memory recurrent neural network architectures for large scale acoustic modeling”. In Fifteenth annual conference of the international speech communication association ,2014.
[18] D. J. Hand, “Deconstructing statistical questions. Journal of the Royal Statistical Society”, Series A (Statistics in Society), pp. 317-356, 1994.
[19] J. Hall, G. Mani, D. Barr, “Applying computational intelligence to the investment process”, Proceedings of CIFER-96: Computational Intelligence in Financial Engineering. Washington, DC: IEEE Computer Society ,1996.
[20] R. S. Manikantan, Ostermann, B. Tjaden, “Detecting Anomalous Network Traffic with Self-organizing Maps”, Ohio University, pp.37, 2003.
[21] Y. Jing, T. Li, H. Fujita, B. Wang, N. Cheng, “An incremental attribute reduction method for dynamic data mining”, Information Sciences, Vol.465, pp. 202-218, 2018
[22] H. A. Nguyen, D. Choi, “Application of data mining to network intrusion detection: classifier selection model”, In Asia-Pacific Network Operations and Management Symposium, Springer, Berlin, Heidelberg, pp. 399-408, 2008
[23] R. Burbidge, B. Buxton, “An introduction to support vector machines for data mining”, Keynote papers, young OR, Vol.12, pp. 3-15, 2001
[24] H. Bhavsar, M. H. Panchal, “A review on support vector machine for data classification”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol.1, Issue.10, pp. 185, 2012.
[25] K. Suresh, C. Jnaneswari, G. L. Kranthi, K. Bindu, “Knowledge Discovery in Datamining Using Soft Computing”, Vol.3, pp. 3952-3957, 2012.
[26] K. Kusum, S. Bharti, Shukla, S. Jain, “Intrusion detection using clustering”, Vol.1, Issue. 2, 3, 4, pp.6, 2010.
[27] A. N. Huy, D. Choi, “Application of Data Mining to Network Intrusion Detection: Classifier Selection Model”, pp.1, 2008.
[28] P. Mrutyunjaya, M. R. Patra, “Evaluating Machine Learning Algorithms for Detecting Network Intrusions”, International Journal of Recent Trends in Engineering, Vol.1, Issue.1, May 2009.
[29] M. Ramadas, S. Ostermann, B. Tjaden, “Detecting anomalous network traffic with self-organizing maps”, In International Workshop on Recent Advances in Intrusion Detection September, Springer, Berlin, Heidelberg, pp. 36-54, 2003
[30] R. O. Duda, P. E. Hart, “Pattern Classification and Scene Analysis”, New York: Wiley, pp: 78, 1973.
[31] W. V. Qiang, Megalooikonomou, “A Clustering Algorithm for Intrusion Detection”, pp. 3, 2004.
[32] KNN Model-Based Approach in Classification, Gongde Guo1, Hui Wang , David Bell , Kieran Greer School of Computer Science, Queen`s University Belfast, BT7 1NN, UK. partly European Commission project ICONS, project no. IST-2001-32429,2001.
[33] Priyanka, Sana Khan, Tulsi Kour, "Investigation on Smart Health Care Using Data Mining Methods", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.31-36, 2016.
[34] Prakash Singh , "Efficient Deep Learning for Big Data: A Review", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.36-41, 2016.
Citation
D. Ramana Kumar, S. Krishna Mohan Rao, "A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery from Database," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.504-509, 2018.
Application of Artificial Neural Network in Power System with Examples A Review
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.510-516, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.510516
Abstract
Forecasting Power load is a prime function of power system planning and management. However, it has proved to be a complicated task because of many unstable factors. There are a substantial growth rate and application levels of neural network (NN) in the power system. This review paper explores the forecasting methodology derived from the specific neural network. The electric power industries are presently undergoing transformations and extraordinary reforms. The most exciting and probably profitable developments in recent times are growing Artificial Intelligence (AI) usage of techniques. Therefore, this paper takes an overview of NN techniques and their application in power sectors. According to NN growth rate statistics, in certain power system issues, this paper considers the load forecasting, security assessment, economic dispatch, fault diagnosis, and harmonic analysis. The various disadvantages and advantages of NN applications in this aspect, envisaging the major challenges in this field are explained while considering NN applications in the power system operations and control. The comparison is made regarding several published IEEE papers from 1990 onwards until the present date, which clearly showed that this subject has attracted the maximum awareness in the last one decade, concerning; Load forecasting; Fault diagnosis and fault location; Economic Dispatch; Security Assessment; and Transient Stability.
Key-Words / Index Term
Economic dispatch, Fault diagnosis, Harmonic is analyzing, Load forecasting, Neural network, Power system
References
[1] D.J. Sobajic, Y.H. Pao, "Artificial Neural Net Based Dynamic Security Assessment for Electric Power Systems," IEEE Transactions on Power Systems, Vol. 4, No. 1, pp. 220-228, 1989
[2] R. E., Bourguet, P. J. Antsaklis, "Artificial Neural Networks in Electric Power Industry,” Technical Report of the ISIS (Interdisciplinary Studies of Intelligent Systems) Group, No. ISIS-94-007, Univ of Notre Dame, Vol. 3, pp. 6, 1994.
[3] M. Tektaş, “Weather forecasting using ANFIS and ARIMA models,” Environmental Research, Engineering and Management, Vol. 51, Issue.1, pp. 5-10, 2010.
[4] A. Krenker, Janez Bešter, Andrej Kos, “Introduction to the Artificial Neural Networks,” Artificial Neural Networks, Kenji Suzuki, IntechOpen, Vol. 34, pp. 34-36, 2011.
[5] H.S. Hippert, C.E. Pedreira, R.C. Souza, “Neural networks for short-term load forecasting: a review and evaluation,” IEEE Transactions on Power Systems, Vol. 16, Issue 1, pp. 5-7, 2001.
[6] M. S. Tsai, Y. H. Lin, “Modern development of an adaptive non-intrusive appliance load monitoring system in electrical energy conservation.” Applied Energy Vol. 96, pp. 55–73, 2012.
[7] M. T. Haque, A. M. Kashtiban. Application of Neural Networks in Power Systems; A Review World Academy of Science, Engineering and Technology, Vol.1, No. 6, pp. 889-893, 2007.
[8] M.T., Vakil, N. Pavesic, “Training RBF Network with Selective Backpropagation,” Neurocomputing Elsevier Journal, Vol. 22, pp. 39-64, 2004.
[9] Yu-Hsiu Lin, Y. H. Lin, “Electrical Energy Management Based on a Hybrid Artificial Neural Network,” MDPI Journal, Vol. 12, pp. 236; 2018,
[10] S. Wei, L. Mohan, “Application of improved artificial neural networks in short-term power load forecasting,” Journal of Renewable and Sustainable Energy Vol. 7, pp. 43-46, 2015.
[11] S. J. Lakshmi, V. Balaji, Sarma S. Subramanya, “An Artificial Neural Network Controlled SVC for Dynamic Stability Enhancement of Power Transmission System,” International Journal of Scientific & Engineering Research, Vol. 5, Issue 4, pp. 233, 2014.
[12] R. Sharda, R. Patil, “Neural Networks as forecasting experts: an empirical test,” In Proceedings of the 1990 International Joint Conference on Neural Networks, Vol-I, pp. 491-494, 1990.
[13] A. Pannu, “Artificial Intelligence and its Application in Different Areas,” International Journal of Engineering and Innovative Technology, Vol. 4, pp. 10, 2015.
[14] C. Woodford, “Artificial Neural Networks,” Industrial and Control Engineering Applications, Vol. 22, pp. 12-14, 2018.
[15] T., W Saksornchai, J. Lee,. M., Methaprayoon, J., Liao, “Improve the Unit Commitment Scheduling by Using the Neural Network Based Short Term Load Forecasting,” IEEE Trans. Power Delivery, Vol. 36, pp. 33-39, 2004.
[16] H. S. Hippert, C.E. Pedreira, “Estimating temperature profiles for short-term load forecasting: neural networks compared to linear models,” IEEE Trans. on distribution and Generation Conference, Vol. 44, pp. 543-547, 2004.
[17] Y.H. Lin, Y.C. Hu, “Residential consumer-centric demand-side management based on energy disaggregation-piloting constrained swarm intelligence: towards edge computing,” Sensors, Vol. 18, pp. 136, 2018.
[18] K. Warwick, A. Ekwure, R. Aggarwal, “Artificial Intelligence Techniques in Power Systems,” IEEE Power Engineering Series 22, Bookcratt Printed, Vol. 12, pp.. 17-19, 1997.
[19] A. G. Bahbah, A. A. Mathew, “New Method for Generator`s Angles and Angular Velocities Prediction for Transient Stability Assessment of Multi Machine Power Systems Using Recurrent Neural Network,” IEEE Trans of Power System, Vol. 19, pp. 1015-1022, 2006.
[20] M.T. Vakil, N. Pavesic, “Training RBF Network with Selective Backpropagation,” Neurocomputing Elsevier Journal, Vol. 33, pp. 39-64, 2004.
[21] A. K. Sinha, “Short Term Load Forecasting Using Artificial Neural Networks,” IEEE Trans. on Power System Distribution, Vol. 26, pp. 548-553, 2000.
[22] M. S. Kandil, S.M., El-Debeiky, N.E. Hasanien, “Long-term, Load Forecasting for Fast Developing Utility Using a Knowledge-Based Expert System,” IEEE Trans. on Power Systems, Vol. 17, No. 2, pp. 491-496, 2002.
[23] S. K., Mishra Ganapati Panda, Sukadev Meher, "Chebyshev Functional Link Artificial Neural Networks for Denoising of Image Corrupted by Salt and Pepper Noise,” International Journal of Recent Trends in Engineering,Academy publisher, Finland, ISSN: 1797-9617. Vol. 1, No. 1, pp. 413-417, 2009.
[24] A, Khosravi, S. Nahavandi, D. Creighton, “Short term load forecasting using Interval Type-2 Fuzzy Logic Systems, Fuzzy Systems (FUZZ),” IEEE International Conference; Vol. 27-32, pp. 502-508, 2011.
[25] C. Ying, “Short-term Load Forecasting: Similar Day-Based Wavelet Neural Networks,” IEEE Trans. Power System, Vol. 25, pp. 322-330, 2010.
[26] M. Cenek, R. Haro R. B. Sayers, J. Peng, “Climate Change and Power Security: Power Load Prediction for Rural Electrical Microgrids Using Long Short Term Memory and Artificial Neural Networks,” Applied Science, Vol. 8, pp. 749, 2018.
[27] M. A. Sartori, P. J. Antsaklis, “A Simple Method to Derive Bounds on the Size and to Train MultiLayer Neural Networks,” IEEE Trans. On Neural Networks, Vol.2, 4, pp. 467-471, 1991.
[28] P.J. Antsaklis, “Educational Special Issue on Neural Networks in Control Systems,” IEEE Control System Magazine, Vol.12, pp. 8-57, 1992.
[29] A. Jain, E. Srinivas, R. Rauta, “Short term load forecasting using Fuzzy adaptive inference and similarity,” World Congress on Nature & Biologically Inspired Computing; Vol. 9-11, pp. 173-174, 2009.
[30] K. Yang, L. Zhao L, “Application of Mamdani Fuzzy System Amendment on Load Forecasting Model, Symposium on Photonics and Optoelectronics; Vol.4, pp. 1-4, 2009.
[31] A. Singh, H. Chen, A.C. Canizares, “ANN-based short term load forecasting in electricity markets, In Proceedings of the IEEE power engineering society transmission and distribution conference, Vol. 34, pp. 411-415, 2001.
[32] W.J. Taylor, E.P. McSharry, M.L. de Menezes, “A comparison of variation methods used for forecasting electricity demand up to a year ahead,” International Journal of Forecasting, Vol. 22, pp. 1-16, 2006.
[33] N., Saksomchai, W. J. Lee, K. Methaprayoon, J. Liao, “Improve the Unit Commitment Scheduling by Using the Neural Network Based Short Term Load Forecasting,” IEEE, Vol. 4, pp. 33-39, 2004.
[34] L. Zhao, “Load forecasting based on amendment of Mamdani Fuzzy System,” Wireless communications, networking & mobile computing; Vol. 26, pp. 1-4, 2009.
[35] L. Shaikh, K. Sawlani, “A Rainfall Prediction Model Using Articial Neural Network,” IJSRNSC, Network Security and Communication, Review Paper, Vol.5, pp. 1, 2017.
[36] N. S. Lele, “Image Classification Using Convolution Neural Network, “International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp. 22-26, 2018.
[37] C. Hernández-Hernández, F. Rodríguez, J.C. Moreno, da Costa Mendes, P.R. Normey-Rico, J.E.J.L. Guzmán, “The Comparative Study, Short-Term Prediction Methods to Enhance the Model Predictive Controller Applied to Microgrid Energy Management,” Energies, Vol. 10, pp. 884, 2017.
[38] M. B. Abdul Hamid, T. K., Abdul Rahman, “Short Term Load Forecasting Using an Artificial Neural Network Trained by Artificial Immune System Learning Algorithm,” 12th International Conference on Computer Modeling and Simulation (UKSim), Vol. 11, pp.. 408-413, 2010.
[39] M. T. Haque, A. M. Kashtiban, “Application of Neural Networks in Power Systems; A Review,” World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, Vol. 1, No.6, pp. 897-901, 2007.
Citation
Anamika Singh, M.K. Srivastava, "Application of Artificial Neural Network in Power System with Examples A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.510-516, 2018.
A Survey on Incremental Attribute Reduction Method for Dynamic Data mining Decision Systems
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.517-519, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.517519
Abstract
In dynamic data mining situations, the attribute decrease issue has three issues: variety of protest sets, variety of trait sets and variety of property estimations. For the initial two issues, a couple of accomplishments have been made. For variety of the property estimations, current characteristic decrease approaches are not productive, in light of the fact that the strategy turns into a non-incremental or wasteful one sometimes. With the end goal to address this, we initially present the idea of an irregularity degree in a deficient choice framework and demonstrate that the property decrease dependent on the irregularity degree is proportional to that dependent on the positive area. At that point, three refresh procedures of irregularity degree for dynamic fragmented choice frameworks are given. At long last, the system of the incremental attribute decrease calculation is proposed.
Key-Words / Index Term
DIDS, mechanism in DIDS
References
[1]R.W. Swiniarski, A. Skowron, Rough set methods in feature selection and recognition, Pattern Recognit. Lett. 24 (2003) 833–849.
[2]M. Moshkov, B. Zielosko, Combinatorial Machine Learning: A Rough Set Approach, Studies in Computational Intelligence, vol.360, Springer, Berlin, 2011.
[3]Z. Pawlak, A. Skowron, Rudiments of rough sets, Inf. Sci. 177 (2007) 3–27
[4]Z. Pawlak, Rough set, Int. J. Comput. Inf. Sci. 11 (1982) 341–356.
[5]W. Ziarko, Variable precision rough set model, J. Comput. Syst. Sci. 46 (1993) 39–59.
[6]Z. Pawlak, Rough set theory and its application to data analysis, Cybern. Syst. 29 (1998) 661–668.
[7]A.K. Jain, R.P.W. Duin, J. Mao, Statistical pattern recognition: a review, IEEE Trans. Pattern Anal. Mach. Intell. 22 (2000) 4–37.
[8]D. Chen, C. Wang, Q. Hu, A new approach to attribute reduction of consistent and inconsistent covering decision systems with covering rough sets, Inf. Sci. 177 (2007) 3500–3518.
[9]Y. Yao, Y. Zhao, Attribute reduction in decision-theoretic rough set models, Inf. Sci. 178 (2008) 3356–3373.
[10]Y. Qian, J. Liang, W. Pedrycz, Positive approximation: an accelerator for attribute reduction in rough set theory, Artif. Intell. 174 (2010) 597–618
[11]J. Stefanowski, A. Tsoukias, Incomplete information tables and rough classification, Comput. Intell. 17 (2001) 545–566
[12]F. Hu, G. Wang, H. Huang, Incremental attribute reduction based on elementary sets, in: International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, Springer-Verlag, 2005, pp.185–193.
[13]J.Y. Liang, W. Wei, Y.H. Qian, An incremental approach to computation of a core based on conditional entropy, Chin. J. Syst. Eng. Theory Pract. 4 (2008) 81–89.
[14]D. Liu, T.R. Li, D. Ruan, W.L. Zou, Anincremental approach for inducing knowledge from dynamic information systems, Fundam. Inform. 94 (2009) 245–260.
[15]Y.N. Fan, C.C. Huang, C.C. Chern, Rule induction based on an incremental rough set, Expert Syst. Appl. 36 (2009) 11439–11450.
[16]J. Liang, F. Wang, C. Dang, A group incremental approach to feature selection applying rough set technique, IEEE Trans. Knowl. Data Eng. 26 (2014) 294–308.
[17]W. Shu, W. Qian, An incremental approach to attribute reduction from dynamic incomplete decision systems in rough set theory, Data Knowl. Eng. 100 (2015) 116–132.
[18]Y. Jing, T. Li, F. Fujita, et al., An incremental attribute reduction approach based on knowledge granularity with a multi-granulation view, Inf. Sci. 411 (2017) 23–38.
[19]A. Zeng, T. Li, D. Liu, A fuzzy rough set approach for incremental feature selection on hybrid information systems, Fuzzy Sets Syst. 258 (2015) 39–60.
[20]C.C. Chan, A rough set approach to attribute generalization in data mining, Inf. Sci. 107 (1998) 169–176.
[21]T.R. Li, D. Ruan, W. Geert, J. Song, Y. Xu, A rough sets based characteristic relation approach for dynamic attribute generalization in data mining, Knowl.-Based Syst. 20 (2007) 485–494.
Citation
D. Ramana Kumar, S. Krishna Mohan Rao, K. Rajeshwar Rao, "A Survey on Incremental Attribute Reduction Method for Dynamic Data mining Decision Systems," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.517-519, 2018.
Analysis of Naïve Bayes Classification for Diabetes Mellitus
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.520-524, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.520524
Abstract
Data Mining plays a major role in the decision making process of any application as in Health Care, Artificial Intelligence, military and weather forecasting. In particular, Classification is used to implement the real time Clinical Decision Support System (CDSS) in health care industry. Thus the CDSS can be viewed as if it predicts the decisions through the supervised learning instances from the training dataset. Here a discrete set of algorithms and techniques are in vogue in the backdrop of classification through supervised learning and hence termed as classification algorithms. Among these classification algorithms, Naïve Bayes is the most familiar which uses the historical data as supervised learning instances. This paper surveys the application of Naïve Bayes classification in health care with specific pertinence to analyzing Diabetic Mellitus disease. It also focuses on the implementation of this specific algorithm in the Diabetic domain to expertise an application.
Key-Words / Index Term
Classification, Text Classification, Naïve Bayes, Semantic Analysis, Health Care
References
[1] D. Lewis, ―Naive Bayes at Forty: The Independence Assumption in Information Retrieval‖, Proceedings of the 10th European Conference on Machine Learning(ECML-98), 1998.
[2] Christopher D. Manning, Prabhakar Raghavan and Hinrich Schütze, ―An Introduction to Information Retrieval‖, Cambridge University Press, page 181, 2009.
[3] A. Basu, C. Waters and M.Shepherd, ―Support Vector Machines for Text Categorization‖, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003. For Conference
[4] Gongde Guo, Hui Wang, David Bell, Yaxin Bi and Kieran Greer, ―KNN Model-Based Approach in Classification‖, Proceedings of the ODBASE, pp- 986 – 996, 2003.
[5] Kamal Nigam, John Lafferty and Andrew McCulllum, ―Using Maximum Entropy for Text Classification‖, IJCAI-99, Workshop on Machine learning for Information Filtering, pp. 61-67, 1999.
[6] Stuart, A.; Ord, K. (1994), Kendall`s Advanced Theory of Statistics: Volume I—Distribution Theory, Edward Arnold, §8.7.
[7] Priyanka, Sana Khan, Tulsi Kaur—Investigation on Smart Health Care using Data Mining Methods‖, International Journal of Scientific Research in Computer Sciences and Engineering (IJSRCSE), Vol 4, Issue 2, pp 31-36, 2320–088X, 2016
[8] Ankita R. Borkar and Dr. Prashant R. Deshmukh , ―Naïve Bayes Classifier for Prediction of Swine Flu Disease‖, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, pp. 120-123, 2277 128X, 2015.
[9] Ms.Rupali R.Patil, ―Heart Disease Prediction System using Naive Bayes and Jelinek-Mercer smoothing‖, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 5, pp. 6787-6792, : 2278-1021 2014.
[10] Shweta Kharya, Shika Agrawal and Sunita Soni, ―Naive Bayes Classifiers: A Probabilistic Detection Model for Breast Cancer‖, International Journal of Computer Applications (0975 – 8887) Volume 92 – No.10, pp.26-31, 2014 [10] UCI Machine Learning Repository, http://ics.uci.edu/ mlearn/MLRepository.html. 0975 – 8887.
[12] Stephanie J. Hickey, ―Naive Bayes Classification of Public Health Data with Greedy Feature Selection‖, Communications of the IIMA, Volume 13, Issue 2 Article 7, pp. 87-98, 2013.
[13] A.Ambica, Satyanarayana Gandi and Amarendra Kothalanka, ―An Efficient Expert System For Diabetes By Naïve Bayesian Classifier‖, International Journal of Engineering Trends and Technology (IJETT) –Volume 4 Issue 10, pp.4634-4639, 2231-5381 2013
[14] Pablo Gamallo, Marcos Garcia and Santiago Fernández-Lanza, ―TASS: A Naive-Bayes strategy for sentiment analysis on Spanish tweets‖, Workshop on Sentiment Analysis at SEPLN (TASS2013), pp. 126-132, 2013.
Citation
S. Sankaranarayanan, T. Pramananda Perumal, "Analysis of Naïve Bayes Classification for Diabetes Mellitus," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.520-524, 2018.
A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery Database
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.525-530, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.525530
Abstract
Data mining and knowledge discovery in databases have been considered as a significant research area in industry. This survey presents an overview, description and future directions which depict a standard for knowledge discovery and data mining process model. The paper mentions particular real-world applications, specific data mining techniques, challenges involved in real-world application of knowledge discovery, current and future research ideas in the field. The applications to both academic and industrial problems are discussed. The main target of the review is the consolidation of the research in this particular area and thereby helping in enhancing the existing model by embedding other current standards.
Key-Words / Index Term
Knowledge discovery database, data mining, real world application
References
[1] Kurgan, L. A., &Musilek, P. (2006). A survey of Knowledge Discovery and Data Mining process models. The Knowledge Engineering Review, 21(1), 1-24.
[2] Han, J., & Fu, Y. (1994, July). Dynamic Generation and Refinement of Concept Hierarchies for Knowledge Discovery in Databases. In KDD Workshop (pp. 157-168).
[3] Fayyad, U., Piatetsky-Shapiro, G., & Smyth, P. (1996). From data mining to knowledge discovery in databases. AI magazine, 17(3), 37.
[4] Jing, Y., Li, T., Fujita, H., Wang, B., & Cheng, N. (2018). An incremental attribute reduction method for dynamic data mining. Information Sciences, 465, 202-218.
[5] Agrawal, R., Mannila, H., Srikant, R., Toivonen, H., &Verkamo, A. I. (1996). Fast discovery of association rules. Advances in knowledge discovery and data mining, 12(1), 307-328.
[6] Apte, C., & Hong, S. J. (1994, July). Predicting Equity Returns from Securities Data with Minimal Rule Generation. In KDD Workshop (pp. 407-418).
[7] Berry, L. L. (1995). Relationship marketing of services—growing interest, emerging perspectives. Journal of the Academy of marketing science, 23(4), 236-245.
[8] Brachman, R. J., & Anand, T. (1996, February). The process of knowledge discovery in databases. In Advances in knowledge discovery and data mining (pp. 37-57). American Association for Artificial Intelligence.
[9] Jain, A. K., &Dubes, R. C. (1988). Algorithms for clustering data.
[10] Brodley, C. E., & Smyth, P. (1997). Applying classification algorithms in practice. Statistics and Computing, 7(1), 45-56.
[11] Senator, T. E., Goldberg, H. G., Wooton, J., Cottini, M. A., Khan, A. U., Klinger, C. D. & Wong, R. W. (1995). Financial Crimes Enforcement Network AI System (FAIS) Identifying Potential Money Laundering from Reports of Large Cash Transactions. AI magazine, 16(4), 21.
[12] Sak, H., Senior, A., &Beaufays, F. (2014). Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In Fifteenth annual conference of the international speech communication association.
[13] Priyadharsini, C., &Thanamani, A. S. (2014). An Overview of Knowledge Discovery Database and Data mining Techniques. International Journal of Innovative Research in Computer and Communication Engineering, 2(1).
[14] Burbidge, R., & Buxton, B. (2001). An introduction to support vector machines for data mining. Keynote papers, young OR12, 3-15.
[15] Du, J., Zhou, J., Li, C., & Yang, L. (2016, August). An overview of dynamic data mining. In Informative and Cybernetics for Computational Social Systems (ICCSS), 2016 3rd International Conference on (pp. 331-335). IEEE.
[16] Suresh, K., Jnaneswari, C., Kranthi, G. L., & Bindu, K. Knowledge Discovery in Datamining Using Soft Computing. vol, 3, 3952-3957.
[17] Al-mamory, S. O., &Jassim, F. S. (2013). Evaluation of different data mining algorithms with KDD CUP 99 Data Set. Journal of University of Babylon, 21(8), 2663-2681.
[18] Bhavsar, H., & Panchal, M. H. (2012). A review on support vector machine for data classification. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(10), pp-185.
[19] Yeung, D. Y., & Chow, C. (2002). Parzen-window network intrusion detectors. In Object recognition supported by user interaction for service robots (Vol. 4, pp. 385-388). IEEE.
[20] Duda, R. O., & Hart, P. E. (1973). Pattern classification and scene analysis. A Wiley-Interscience Publication, New York: Wiley, 1973.
[21] Panda, M., & Patra, M. R. (2009). Evaluating machine learning algorithms for detecting network intrusions. International journal of recent trends in engineering, 1(1), 472.
[22] Ramadas, M., Ostermann, S., &Tjaden, B. (2003, September). Detecting anomalous network traffic with self-organizing maps. In International Workshop on Recent Advances in Intrusion Detection (pp. 36-54). Springer, Berlin, Heidelberg.
[23] Nguyen, H. A., & Choi, D. (2008, October). Application of data mining to network intrusion detection: classifier selection model. In Asia-Pacific Network Operations and Management Symposium (pp. 399-408). Springer, Berlin, Heidelberg.
[24] Bharti, K. K., Shukla, S., & Jain, S. (2010). Intrusion detection using clustering. Proceeding of the Association of Counseling Center Training Agencies (ACCTA), 1.
[25] Hemanth, K. S., Vastrad, C. M., &Nagaraju, S. (2011, January). Data Mining Technique for Knowledge Discovery from Engineering Materials Data Sets. In International Conference on Computer Science and Information Technology (pp. 512-522). Springer, Berlin, Heidelberg.
[26] Adhikari, A., Jain, L. C., & Prasad, B. (2017). A State-of-the-Art Review of Knowledge Discovery in Multiple Databases. Journal of Intelligent Systems, 26(1), 23-34.
[27] Han J, Kamber M. “Data Mining: Concepts and Techniques”. 2/e San Francisco: CA. Morgan Kaufmann Publishers, an imprint of Elsevier.2006. pp-5-38.
[28] Hiremath, R., & Patil, P. (2016). Astudy-Knowledge Discovery Approachesand Its Impact with Reference to Cognitive Internet of Things (Ciot). International Journal of Information, 6(1/2).
[29] Anand, S. S., Patrick, A. R., Hughes, J. G., & Bell, D. A. (1998). A data mining methodology for cross-sales. Knowledge-based systems, 10(7), 449-461.
[30] Butler, S. (2002). An investigation into the relative abilities of three alternative data mining methods to derive information of business value from retail store-based transaction data (Doctoral dissertation, BSc thesis, School of Computing and Mathematics, Deakin University, Australia).
[31] Cios, K. J., & Moore, G. W. (2001). Medical data mining and knowledge discovery: Overview of key issues. Studies in Fuzziness and Soft Computing, 60, 1-20.
[32] Moyle, S., Bohanec, M., &Osrowski, E. (2003). Large and tall buildings: a case study in the application of decision support and data mining. KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE, 191-202.
[33] Sacha, J. P., Cios, K. J., &Goodenday, L. S. (2000). Issues in automating cardiac SPECT diagnosis. IEEE Engineering in Medicine and Biology Magazine, 19(4), 78-88.
[34] Hand, D. J. (1994). Deconstructing statistical questions. Journal of the Royal Statistical Society. Series A (Statistics in Society), 317-356.
[35] Hall, J., Mani, G., & Barr, D. (1996). Applying computational intelligence to the investment process. Proceedings of CIFER-96: Computational Intelligence in Financial Engineering. Washington, DC: IEEE Computer Society.
[36] Suresh, K., Jnaneswari, C., Kranthi, G. L., & Bindu, K. Knowledge Discovery in Datamining Using Soft Computing. vol, 3, 3952-3957.
[37] Kusum K. Bharti, S. Shukla and S. Jain, “Intrusion detection using clustering”, vol.1, issue 2, 3, 4, pp.6, 2010
[38] Manikantan R., S. Ostermann, and B. Tjaden,” Detecting Anomalous Network Traffic with Self-organizing Maps”, Ohio University, pp.37, 2003.
[39] Huy A. N., D. Choi,” Application of Data Mining to Network Intrusion Detection: Classifier Selection Model”, pp:1, 2008.
[40] Mrutyunjaya P. and M. Ranjan Patra,” Evaluating Machine Learning Algorithms for Detecting Network Intrusions”, International Journal of Recent Trends in Engineering, vol. 1, no.1, May 2009.
[41] Richard O. Duda and P. E. Hart, “Pattern Classification and Scene Analysis”, New York: Wiley, pp: 78, 1973.
[42] Qiang W., V. Megalooikonomou, “A Clustering Algorithm for Intrusion Detection”, pp:3, 2004
Citation
D. Ramana Kumar, S. Krishna Mohan Rao, K. Rajeshwar Rao, "A Comprehensive Survey of Dynamic Data Mining Process in Knowledge Discovery Database," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.525-530, 2018.
Gradient Feature based Static Sign Language Recognition
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.531-534, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.531534
Abstract
In this paper, the work carried out to design the gradient feature based static sign language is presented. Sign languages are the gestures used by the hearing and speaking impaired people for communication. The sign languages are classified into static or dynamic or both static and dynamic sign languages. In static sign languages, still hand postures are used to convey information. In the dynamic sign languages, sequence of hand postures is used to convey information. In the present work, efforts have been made to design the computer vision based static sign language recognition system for the American Sign Language alphabets. The images that represent the static sign language alphabets are grouped into training and test images. The training sign language images are subjected to preprocessing. From the preprocessed images, magnitude and direction gradient features are extracted. These features are used to train the recognition system. The test images are subjected to preprocessing and feature extraction. The extracted features from the test sign language images are used to test the designed sign language recognition system. To classify the static sign language hand gestures, nearest neighbor classifier has been used. Independent experiments are carried out to evaluate the performance of the gradient magnitude and the gradient direction features. The average recognition accuracy of 95.4% for magnitude gradient feature and 80.3% for direction gradient feature are obtained.
Key-Words / Index Term
Sign Language Recognition System; American Sign Language; Static Sign Language; Gradient Features
References
[1] Mahmoud Elmezain, Ayoub Al-Hamadi, Omer Rashid, Bernd Michaelis, “Posture and Gesture Recognition for Human-Computer Interaction”, Advanced Technologies, Kankesu Jayanthakumaran (Ed.), InTech Publisher, pp. 415-440, 2009.
[2] Richard Bowden, Andrew Zisserman, Timor Kadir, Mike Brady, “Vision based Interpretation of Natural Sign Languages”, In the Proceedings of the 2003 Int. Conf. on Computer Vision System, pp. 391-401, 2003
[3] Prashan Premaratne, “Human Computer Interaction using Hand Gestures,” Springer, 2014.
[4] D. Karthikeyan, G. Muthulakshmi, “English Letters Finger Spelling Sign Language Recognition System”, Int. Jl. of Engineering Trends and Technology, Vol. 10, No. 7, pp. 334-339, 2014.
[5] Twinkel Verma, S.M. Kataria, “Hand Gesture Recognition Techniques”, Int. Research Jl. of Engineering and Technology, Vol. 03, Issue 4, pp. 2316-2319, 2016.
[6] R.M. McGuire, J. Hernandez-Rebollar, T. Starner, V. Hender-son, H. Brashear, D.S. Ross, “Towards a One-way American Sign Language Translator”, In the Proceedings of IEEE Int. Conf. on Automatic Face and Gesture Recognition, pp. 620-625, 2004.
[7] Qi Wang, Xilin Chen, Liang-Guo Zhang, Chunli Wang, Wen Gao, “Viewpoint Invariant Sign Language Recognition”, Computer Vision and Image Understanding, Vol. 1081, pp. 87–97, 2007.
[8] Nancy, Gianetan Singh Selhan, “An Analysis of Hand Gesture Technique using Finger Movement Detection based on Color Marker”, Int. Jl. of Computer Science and Communication, Vol. 3, No. 1, pp. 129-133, 2012.
[9] https://www.nidcd.nih.gov/sites/default/files/Content%20Images/NIDCD-ASL-hands-2014.jpg
[10] https://en.wikipedia.org/w/index.php?title=American_manual_alphabet&oldid=873597841
[11] https://www.kaggle.com/grassknoted/asl-alphabet/data
[12] Gonzalez R.C., Woods R.E., “Digital Image Processing”, 3rd Edn., Pearson Education, Inc., 2013.
Citation
M. Mahadeva Prasad, "Gradient Feature based Static Sign Language Recognition," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.531-534, 2018.