Internet of Things based Waste Management System for Smart Cities: A real time route optimization for waste collection vehicles
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.496-503, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.496503
Abstract
Waste management has become an immense concern in the context of today’s modern cities. Improper waste management leads to unclean, unhygienic conditions in the city hence spreading lots of diseases and leads to improper management of logistic and human resources. However, Internet of Things (IoT) has brought about a revolution in the traditional system to develop a smart city project in various fields. Our proposed idea is for proper waste management and optimization of waste collection and disposal system to avoid scenarios of waste overflow in the context of technology enabled smart cities. In this research work waste bins are divided into three categories namely (i) biodegradable, (ii) non-biodegradable and (iii) metallic. A real-time monitoring of the garbage level inside the waste bin is periodically sent from each location to a centralized cloud platform. Whenever the garbage level inside waste bin reaches the threshold, the waste collection vehicles are routed according to the decreasing order of percentage of waste filled in the dustbins of different areas. The main objective of the project is to save resources and strict constraint of the overflowing of waste bins. In this project, HCSR04 ultrasonic sensors are used with Arduino UNO for developing the prototypes. ESP8266 is used to send real-time sensor data to cloud.
Key-Words / Index Term
Internet of Things (IoT), Waste Management System, ThingSpeak, Route Optimization, ESP8266, Smart City
References
[1] Sneha Patil, Snehal Mohite, Aishwarya Patil, Dr. S.D.Joshi, “IoT Based Smart Waste Management System for Smart City,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 7, Issue 4, pp- 1-6, April 2017.
[2] Nagajothi.S, Durga.J, Jayasurya.K, Vishnuvarshini.M.D, Nadhiya.M, “Smart Waste Management using IOT,” International Journal of Advanced Research in Computer and Communication Engineering( IJARCCE), Vol. 7, Issue 3, pp-160-163, March 2018.
[3] Abhishek Apte, Dhiraj Ghadi,Devang Deasai, Hiral Raveshiya, Nidhi Sanghavi, “Waste Management System using IOT,” International Journal of Recent Trends in Engineering & Research, Vol. 4, Issue 4, pp- 220-229, April 2018.
[4] D.Anuradha , A.Vanitha ,S.Padma Priya ,S.Maheshwari, “Waste Management System Using IoT,” International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 2, pp- 152-155, Mar – Apr 2017.
[5] Najaf Ali ,M. Muzammul and Ayesha Zafar, “Intelligent System for Garbage collection: IoT technology with Ultrasonic sensor and Arduino Mega,” IJCSNS International Journal of Computer Science and Network Security, Vol. 18 No.9, pp- 102-107, September 2018.
[6] G.Jenilasree, Dr.N.Shenbagavadivu , Dr.M.Bhuvaneswari, “A Study on Automatic Solid Waste Management System for Smart City,” IJCRT1704217 International Journal of Creative Research Thoughts (IJCRT), Volume 5, Issue 4, pp- 1682-1689, November 2017.
[7] Tushar Kaple ,Raghunath Kundgir, Punam Kadam, Mrs. Chaitali Raje, Dr.D.Y. Patil, “Review on Smart Garbage Management for Smart Cities Using IoT,” International Journal of Innovative Research in Computer and Communication Engineering Vol. 5, Issue 4, pp-9019-9023, April 2017.
[8] Akhil Nair .R,Dr. P. Valarmathie, “IOT Based Waste Management System for Smart Cities,” International Journal of Advance Research Ideas And Innovations In Technology, Volume 3, Issue 3, pp-1276-1280, June 2017.
[9] Kasliwal Manasi H, Suryawanshi Smitkumar B, “A Novel Approach to Garbage Management Using Internet of Things for Smart Cities,” International Journal of Current Trends in Engineering & Research (IJCTER), Volume 2, Issue 5, pp-765-769, May 2016.
[10] Krishna Nirde , Prashant S. Mulay , Uttam M.Chaskar, “IoT based solid waste management system for smart city,” International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, pp- 666-669, 2017.
[11] Parkash , Prabu V, “IoT Based Waste Management for Smart City,” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4 , Issue 2, pp- 2923-2927, February 2016.
[12] S.A. Mahajan, Akshay Kokane, Apoorva Shewale, Mrunaya Shinde , Shivani Ingale, “Smart Waste Management System using IoT,” International Journal of Advanced Engineering Research and Science (IJAERS),Vol-4, Issue-4, pp-93-95, Apr- 2017.
[13] Andrea Zanella, Nicola But, Angelo Castellani,Lorenzo Vangelista,Michele Zorzi, “Internet of Things for Smart Cities”, IEEE Internet of Things Journal, Volume 1, Issue 1, pp- 22-32, Feb. 2014.
[14] Kanchan Mahajan, Prof J.S. Chitode, ”Waste bin monitoring system using integrated technology”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.20, Issue 1, pp-64-76, Feb 2018.
[15] S.S.Navghane, M.S.Killedar, Dr.V.M.Rohokale, ”IoT based smart garbage and waste collection bin”, international journal of advance research in electronics and communication engineering, volume 5, Issue 5, May 2016.
[16] P. Masek, K. Zeman, Z. Kuder, J. Hosek, S. Andreev, R. Fujdiak F. Kropfl, “Wireless M-BUS: An Attractive M2M Technology for 5G- Grade Home Automation”, In EAI International Conference CYber physiCaL systems, iOt and sensors Networks (CYCLONE 2015). Rome, 2015.
[17] J. Hosek, P. Masek, D. Kovac, M. Ries, F. Kropfl, “Universal Smart Energy Communication Platform,” International Conference on Intelligent Green Building and Smart Grid (IGBSG)-2014, Taipei, Taiwan( IEEE), pp- 1-4, 2014.
[18] M.N.K. Boulos and N.M. Al-Shorbaji, “On the Internet of Things,smart cities and the WHO Healthy Cities”, International Journal of Health Geographics. 2014.
[19] ReTHINK, “Low power networks hold the key to IoT”, Rethink Technology Research Ltd. 2015.
[20] Palaghat Yaswanth Sai, “IOT Smart Garbage Monitoring System in Cities-An Effective Way to Promote Smart City”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 7, Issue 2, pp- 99-102, Feb-2017.
[21] D. V. Rojatkar and P. A. Hande, “IoT Based Garbage Mangement System” International Journal of Trend in Scientific Research and Development (IJTSRD), Vol. 1 Issue 06, pp- 865-867, Oct-2017.
[22] Raghumani Singh, C. Dey, M., “Solid waste management of Thoubal Municipality, Manipur- a case study”, International Conference Green Technology and Environmental Conservation (GTEC 2011), Chennai, pp-21 – 24, 2011.
[23] Ayaskanta Mishra, "Performance Analysis of TCP Tahoe, Reno and New Reno for Scalable IoT Network Clusters in QualNet® Network Simulator", International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.347-355, Aug 2018.
[24] R. Zade, N. Khadgi, M. Kasbe, T. Mujawar, "Online Garbage Monitoring System Using Arduino and LabVIEW", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.6, pp.5-9, Dec-2018.
[25] Bhanudas Suresh Panchabhai, Anand Jayantilal Maheshwari, Sunil DhonduMone, "The Road Map of Cloud Computing to Internet of Things", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.37-42, Jan-2018.
Citation
Ayaskanta Mishra, Nisha Ghosh, Pujarini Jena, "Internet of Things based Waste Management System for Smart Cities: A real time route optimization for waste collection vehicles," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.496-503, 2019.
Comparison of Tree Based Supervised Classification Methods with Mammogram Data Set
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.504-506, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.504506
Abstract
This paper discusses the different classification techniques. It also compares the efficiency of Tree Based Classifiers Random Forest, REP Tree and J48 Classifiers for the detection of masses in mammogram images and compares their robustness through various measures. The mammogram images used in this research have been taken from MIAS database and the classification is performed with the help of open source machine learning tool. Finding the best classifier is a tough task and this paper gives opportunity to researchers to drill down efficient research works for evaluating different classifiers
Key-Words / Index Term
Mammogram, Classification, Random Forest (RF), REP tree, J48 classifiers
References
[1 ] DM. Parkin Bray F, Ferlay J, Pisani P. Global cancer statistics, 202. CA Cancer J Clin, 55(2): PP 74- 108 , 2005
[2 ] American Cancer Society, “ Breast cancer facts & figures 2015-2016,”Atlanta, American Cancer Society , 2015
[3 ] F. Fauci, S. Bagnasco, R. Bellotti, D. Cascio, S.C. Cheran, F. De Carlo, G. De Nunzio, M.E. Fantacci, G. Forni, A. Lauria, E.L. Torres, R. Magro, G.L. Masala, P. Oliva, M.Quarta, G. Raso, A. Retico, S. Tangaro: "Mammogram Segmentation by Contour Searching and Massive Lesion Classification with Neural Network", IEEE Nuclear Science Symposium Conference Record, Rome, Italy, Vol. 5, pp. 2695-2699 2004.
[4 ] Kella BhanuJyothi, K. Hima Bindu and D. Suryanarayana, “ A Comparative Study of Random Forest & K-Nearest Neighbours on HAR dataset using Caret”, IJIRT, Volume 3, Issue 9 ISSN: 2349-6002., 2017.
[5 ] Dadye,Harold Buko and Richard Rimiru, “Effects of Different Pre-processing Strategies :A Comparative Study on Decision Tree Algorithms”, International journal of Digital Content Technology and its Applications 7.7 : pp 935-939,2013
[6 ] Liaw, Andy and Matthew Wiener, “Classification and regression by Random Forest”, R News : pp 18-22, 2002
[7 ] Goldstein, Benjamin .A, Polley Eric. C and Briggs, Farren. B.S, “Random Forests for Genetic Association Studies”, Statistical Applications in Genetics and Molecular Biology, Vol.10. Iss.1. Article 32, DOI: 10.2202/1544-6115.1691, 2011
[8 ] H. Hu , “Mining patterns in disease classification forests” Journal of Biomedical Informatics Volume 43 pp . 820-827, 2010
[9 ] I H Witten and E Frank . “Data mining: practical machine learning tools and techniques “– 2nd ed. , Morgan Kaufmann series in data management systems, United States of America, 2005
[10 ] Quinlan, J, ”Simplifying Decision trees”, International Journal of Man Machine Studies, 27(3), pp 221–234, 1987
[11 ] S.K. Jayanthi and S. Sasikala, “ REP Tree Classifier for identifying Link Spam in Web Search Engines” , IJSC, Volume 3, Issue 2 , pp 498 – 505, 2013
[12 ] WEKA: Waikato environment for knowledge analysis .http://www.cs.waikato.ac. nz/ml/weka
[13 ] Hussam Elbehiery,” Optical Fiber Cables Networks Defects Detection using Thermal Images Enhancement Techniques”, International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.1, pp.22-29 , 2018
Citation
M. Vasantha, "Comparison of Tree Based Supervised Classification Methods with Mammogram Data Set," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.504-506, 2019.
Consistent Product Moisture Prediction in Manufacturing using Time Series Analysis
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.507-510, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.507510
Abstract
Maintaining a consistent moisture environment for a product is one of the key objectives in a manufacturing process. Mostly the product moisture is maintained by a temperature sensor which is manually controlled by a human who knows knowledge about the system and also supervising the temperature by human does not assure complete moisture control of the system. To address this problem, a time series model trained with a custom product moisture dataset which can predict the temperature to be maintained with 97% accuracy in the storage system has been implemented in the temperature system. In this time series model, Longest Short Memory Network is used as neural network architecture with some defined hyper parameters to achieve target accuracy.
Key-Words / Index Term
Time Series Model, LSTM, Moisture Control
References
[1] Poonnoy P “.Artificial Neural Network Modeling for Temperature and Moisture Content Prediction in Tomato Slices Undergoing Microwave” - J Food Sci,2007
[2] Martinez - Martine .V baladron. C,Gomez , Ruiz Navas-Gracia LM, Aguiar JM, Carro B, “Temperature and relative humidity estimation and prediction in the tobacco drying process using Artificial Neural Networks” Department of Signal Theory, Communications and Telematics Engineering, University of Valladolid, 47011 Valladolid, Spain.
[3] Herve Debar, Monique Becker, Didier Siboni, "A Neural Network Component for an Intrusion Detection System" in , Les Ulis Cedex France, 1992.
[4] ason Brownlee, “On the Suitability of Long Short-Term Memory Networks for Time Series Forecasting J”, May 26, 2017
[5] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural Computation, vol. 9, no. 8, pp. 1735–1780, 1997.
[6] L. Wei, E. Keogh, "Semi-supervised time series classification", Proc. 12th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, pp. 748-753, 2006.
[7] Huarng ,Tiffany Hui kuang Yu ,Yu Wei Hsu, “A Multivariate Heuristic Model for Fuzzy Time-Series Forecasting” 2007
[8] A.B. Mahagaonkar, A.R. Buchade, “Application Layer Denial of Service Attack Detection using Deep Learning Approach”, vol 7, pp 44-48, 2019
[9] Dipankar Das, “Application of Multilayer Perceptron for Forecasting of Selected IIPs of India – An Empirical Analysis” vol 6, pp 400-406, 2018.
[10] D.K. Shetty, B. Ismail, “Forecasting Financial Time Series using a Hybrid Non-stationary Model with ANN”, vol 7, pp 323-326 2019
[11] Felix A Gers, Nicol N Schraudolph, Jürgen Schmid-huber, "Learning precise timing with LSTM recurrent networks", The Journal of Machine Learning Research, vol. 3, pp. 115-143, 2003.
[12] Xavier Glorot, Antoine Bordes, Yoshua Bengio, "Deep Sparse Rectifier Neural Networks", Aistats, vol. 15, no. 106, pp. 275, 2011.
[13] Sep Hochreiter,Jürgen Schmidhuber,"Long Short-term memory", Neural computation, vol. 9, no. 8, pp. 1735-1780, 1997.
[14] IS Isa et al., "Suitable MLP network activation functions for breast cancer and thyroid disease detection", 2010 Second International Conference on Computational Intelligence Modelling and Simulation, pp. 39-44, 2010.
[15] P. Anitha, D. Rajesh, K. Venkata Ratnam, “Machine Learning in Intrusion Detection – A Survey” vol 7, pp 112-119, 2019
Citation
V.P. Gladis Pushparathi, D. Robin Reni, M. Selva Kumar, V. Prasanna Kumar, M. Suriyakiran, "Consistent Product Moisture Prediction in Manufacturing using Time Series Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.507-510, 2019.
A Dynamic Analysis Model for Intrusion Detection in Mobile Network
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.511-515, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.511515
Abstract
A real time communication network having the open access features also suffers from various intruders. These intruders steal the communication information, disrupt the data or slow down the transmission. In this paper, a dynamic signature and parameter map based model is presented for intrusion detection. At earlier stage of this model, the log-event table map is performed to verify the authenticity of node. At this stage, the prevention from any external node is done under activity monitoring. In final stage, the communication observation under multiple parameters is done to identify the intrusion. The query pattern observation is applied in this stage to identify the attacked node and pattern. The proposed work model is simulated in NS2 environment with multiple query patterns. The observations show that the model has identified various attack patterns significantly.
Key-Words / Index Term
Signature, Query Pattern, Intrusion Detection, Activity Monitoring
References
[1] Axel Krings," Neighborhood Monitoring in Ad Hoc Networks", CSIIRW ’10, April 21-23, 2010, Oak Ridge, Tennessee, USA ACM 978-1-4503-0017-9
[2 Ying Li," Component-Based Track Inspection Using Machine-Vision Technology", ICMR’11, April 17-20, 2011, Trento, Italy ACM 978-1-4503-0336-1/11/04
[3] Bogdan Carbunar," JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks", WiSe’04, October 1, 2004, Philadelphia, Pennsylvania, USA. ACM 1-58113-925-X/04/0010
[4] Johann Schlamp," How to Prevent AS Hijacking Attacks", CoNEXT Student’12, December 10, 2012, Nice, France. ACM 978-1-4503-1779-5/12/12
[5] Joshua Goodman," Stopping Outgoing Spam", EC’04, May 17–20, 2004, New York, New York, USA. ACM 1-58113-711-0/04/0005
[6] Danny Dhillon," Implementation & Evaluation of an IDS to Safeguard OLSR Integrity in MANETs", IWCMC’06, July 3–6, 2006, Vancouver, British Columbia, Canada. ACM 1-59593-306-9/06/0007
[7] Ahmed Khurshid," VeriFlow: Verifying Network-Wide Invariants in Real Time", HotSDN’12, August 13, 2012, Helsinki, Finland. ACM 978-1-4503-1477-0/12/08
[8] Evan Cooke," Toward Understanding Distributed Blackhole Placement", WORM’04, October 29, 2004, Washington, DC, USA. ACM 1-58113-970-5/04/0010
[9] Umair Sadiq," CRISP: Collusion–Resistant Incentive–Compatible Routing and Forwarding in Opportunistic Networks", MSWiM’12, October 21–25, 2012, Paphos, Cyprus. ACM 978-1-4503-1628-6/12/10
[10] Mauro Conti," A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks", MobiHoc’07, September 9-14, 2007, Montréal, Québec, Canada. ACM 978-1-59593-684-4/07/0009
[11] Garima Gupta," Reference based approach to Mitigate Blackhole Attacks in Delay Tolerant Networks", Q2SWinet’12, October 24–25, 2012, Paphos, Cyprus. ACM 978-1-4503-1619-4/12/10
Citation
Lavlish Goyal, Nitika, "A Dynamic Analysis Model for Intrusion Detection in Mobile Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.511-515, 2019.
Detection, Classification and Identification of Pest in Crops Using Video Segmentation Techniques
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.516-520, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.516520
Abstract
Agriculture is an important component of every individual`s livelihood. During farming infestation of insect pests in crops are inevitable. Manual detection and identification of type is the most challenging process. The proposed architecture will pave a way to develop an automatic detection system to do the identification of pest present in videos. Through this system, the pest infestation can easily be identified and suitable management techniques can be applied early to improve the quality of crops. The proposed architecture incorporates the following techniques for effective detection insects in crops: key frame extraction by calculating a threshold from histogram difference of consecutive frames, best frame selection by finding PSNR and MSE value of key frames, filtering, color image segmentation through K – Means clustering segmentation, feature extraction through Neural Network techniques with a pre trained network VGG19 and classification by using multi class SVM classifier. By using this proposed algorithm, this system identifies five types of pests namely, tuta absoluta, fall armyworm, leaf hopper, epilachna beetle and corn borer with accuracy of 98.46%.
Key-Words / Index Term
Key frame extraction, K-Means clustering Segmentation, Convolutional Neural Networks (CNN), VGG19, Support Vector Machine (SVM)
References
[1] Bashish, Dheeb Al, Braik, Malik and Bani-Ahmad, Sulieman, “Detection and Classification of Leaf Diseases using K-means-based Segmentation and Neural-networks-based Classification”, Information Technology Journal, Vol.10, pg. 267-275, 2011
[2] Gondal, Muhammad Danish, Khan, Yasir Niaz , “Early Pest Detection from Crop using Image Processing and Computational Intelligence”, FAST-NU Research Journal (FRJ), Vol.1, Issue. 1, pg. 59-68, 2015
[3] Premalatha C., “Automatic Smart Irrigation System Using IOT”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.1-5, 2019
[4] Denan Xia, Peng Chen, Bing Wang, Jun Zhang and Chengjun Xie (2018), “Insect Detection and Classification Based on an Improved Convolutional Neural Network”, Sensors MDPI.
[5] Uma Rani, Amsini,“Pest Identification in Leaf Images using SVM Classifier”, International Journal of Computational Intelligence and Informatics, Vol. 6: Issue.. 1, pg. 30-41,2016
[6] Dang, Chinh, Radha, Hayder (2014), “RPCA-KFE: Key Frame Extraction for Video using Robust Principal Component Analysis”, IEEE Transactions on Image Processing, Vol. 24: Issue. 11, pg. 3742-3753,2016
[7] Sakshi kathuria, “A Survey on Security Provided by Multi-Clouds in Cloud Computing”, International Journal of Scientific Research in Network Security and Communication , Vol. 6, Isuue:3,pg. 23-27
[8] Ghatak, Sanjoy,“Key Frame Extraction using Threshold Technique”, International Journal of Engineering Applied Sciences and Technology, Vol. 1, Issue. 8, pg. 51-56, 2016.
[9] Sladojevic, Srdjan, Arsenovic, Marko, Anderla, Andras, Culibrk, Dubravko and Stefanovic, Darko, “Deep Neural Networks Based Recognition of Plant Diseases by Leaf Image Classification”, Hindawi Publishing Corporation Computational Intelligence and Neuroscience, Vol. 2016, pg. 1-11, 2016
[10] Sreelakshmi M, Padmanayana ,“Early Detection and Classification of Pests Using Image Processing”, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, Vol. 3, Issue. 1, pg. 239-242, 2015
Citation
S. Iswarya, S. Pitchumani Angayarkanni, "Detection, Classification and Identification of Pest in Crops Using Video Segmentation Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.516-520, 2019.
A Recurrent Gini Index based Fuzzy Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.521-525, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.521525
Abstract
Deep learning has been playing a crucial role in making applications much smarter than before and more reliable. The reliability of a model can be marked out using parameters like accuracy. Recurrent Neural Networks, is a complicated deep learning model, which can be hard to develop but can be more reliable if properly trained. A good collection of data alone cannot give good accuracies. Fuzzy Logic is a statistical approach that can be used to mold the data based on the degree of truth. Gini index based fuzzification is a technique that builds the data by finding relations within the data and then fuzzifying it. In this paper, the gini index based fuzzification is applied on the data set and this fuzzified data is used in training and testing the RNN model. Here, better Accuracy is observed for RNN model with fuzzy data compared to the actual data.
Key-Words / Index Term
Deep Learning, Recurrent Neural Networks, RNN, Fuzzy logic, Gini Index
References
[1] B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, And A. Torralba, “Learning Deep Features For Discriminative Localization,” In Proceedings Of The Ieee Conference On Computer Vision And Pattern Recognition , Pp. 2921–2929, 2016
[2] Jürgen Schmidhuber, Deep Learning in neural networks: An Overview, Elsevier(Neural networks), vol 61, p 85-117, 2015
[3] Anirban Sarkar, Aditya Chattopadhyay, Prantik Howlader, V. Balasubramanian, Grad-Cam++: “Generalized Gradient-Based Visual Explanations For Deep Convolutional Networks”, Proceedings Of Ieee Winter Conference On Applications Of Computer Vision (Wacv`18), Mar 2018. [Arxiv].
[4] Bing Cheng, D.M.Titterington, Neural Networks: A Review from a Statistical Perspective.
[5] Yann LeCun, Yoshua Bengio & Geoffrey Hinton, Deep learning,Nature volume 521, pages 436–444 (28 May 2015)
[6] Michael Hüsken, Peter Stagge Recurrent neural networks for time series classification, Neurocomputing Volume 50, Pages 223-235,January 2003
[7] Yuan, Y., & Michael, J. S. (1995). Induction of fuzzy decision trees. Fuzzy Sets and Systems, 69, 125–139.
[8] Cristina, O., & Wehenkel, L. (2003). A complete fuzzy decision tree technique. Fuzzy Sets and Systems, 138, 221–254
[9] Ching-Hsue Cheng, Jing-RongChang, Che-AnYeha, Entropy-based and trapezoid fuzzification-based fuzzy time series approaches for forecasting IT project cost, Technological Forecasting and Social Change Volume 73, Issue 5, June 2006, Pages 524-542
[10] Clarence W. de Silva, Fundamentals of Fuzzy Logic, Intelligent Control
[11] M Anidha1, K Premalatha, An application of fuzzy normalization in miRNA data for novel feature selection in cancer classification, Biomedical Research 2017; 28 (9): 4187-4195
[12] B.chandra, P.Paul Varghese, fuzzifying gini index based decision trees, Elsevier ( Expert systems with applications 36 (2009), pp 8549 - 8559.
[13] S.V.G.Reddy, K.Thammi Reddy, V.Valli Kumari, Enhancing the Speed, Accuracy of Deep Learning Classifier using Gini index based Fuzzy decision trees
[14] Accurate occupancy detection of an office room from light, temperature, humidity and CO2 measurements using statistical learning models. Luis M. Candanedo, Véronique Feldheim. Energy and Buildings. Volume 112, 15 January 2016, Pages 28-39.
[15] Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng, Google Brain, TensorFlow: A System for Large-Scale Machine Learning.
Citation
S.V.G. Reddy, K. Thammi Reddy, V. Valli Kumari, P. Sanjay Varma, S.V.S. Nitish Kumar Gupta, "A Recurrent Gini Index based Fuzzy Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.521-525, 2019.
Network Intrusion Detection System using Threat Intelligence and Deep Learning Approach
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.526-531, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.526531
Abstract
Network Intrusion Detection System (NIDS) is one of the best solutions against network attacks. Attackers also dynamically change tools and technologies. Powerful network security analytics is not a function of making use of simply one approach. To detect emerging threats, a network intrusion detection system should be able to use a mixture of techniques. In this research we start off evolved via collecting the proper information for complete visibility and the usage of analytical strategies along with behavioral modeling and deep learning. All that is supplemented by means of global threat intelligence that is aware about the malicious campaigns and maps the suspicious conduct to a recognized threat for extended fidelity of detection. In this research we prepare multichannel deep learning approach and incremental learning approach to enhance detection rate.
Key-Words / Index Term
Network Intrusion Detection System, Network Security, Deep Learning, Threat Intelligence, Performance Evolution.
References
[1] Almseidin, Mohammad, et al. "Evaluation of machine learning algorithms for intrusion detection system." Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium on. IEEE, 2017.
[2] Choudhury, Sumouli, and AnirbanBhowal. "Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection." Smart technologies and management for computing, communication, controls, energy and materials (ICSTM), 2015 International conference on. IEEE, 2015.
[3] Hamid, Yasir, M. Sugumaran, and LudovicJournaux. "Machine learning techniques for intrusion detection: a comparative analysis." Proceedings of the International Conference on Informatics and Analytics. ACM, 2016.
[4] Haq, Nutan Farah, et al. "Application of machine learning approaches in intrusion detection system: a survey." IJARAI-International Journal of Advanced Research in Artificial Intelligence 4.3 (2015): 9-18.
[5] Dhanabal, L., and S. P. Shantharajah. "A study on NSL-KDD dataset for intrusion detection system based on classification algorithms." International Journal of Advanced Research in Computer and Communication Engineering 4.6 (2015): 446-452.
[6] Buczak, Anna L., and ErhanGuven. "A survey of data mining and machine learning methods for cyber security intrusion detection." IEEE Communications Surveys & Tutorials 18.2 (2016): 1153-1176.
[7] Belavagi, Manjula C., and BalachandraMuniyal. "Performance evaluation of supervised machine learning algorithms for intrusion detection." Procedia Computer Science 89 (2016): 117-123.
[8] Shanmugavadivu, R., and N. Nagarajan. "Network intrusion detection system using fuzzy logic." Indian Journal of Computer Science and Engineering (IJCSE) 2.1 (2011): 101-111.
[9] Shone, Nathan, et al. "A deep learning approach to network intrusion detection." IEEE Transactions on Emerging Topics in Computational Intelligence 2.1 (2018): 41-50.
[10] Park, Kinam, Youngrok Song, and Yun-Gyung Cheong. "Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm." 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService). IEEE, 2018.
[11] Papernot, Nicolas, et al. "Towards the science of security and privacy in machine learning." arXiv preprint arXiv:1611.03814(2016).
[12] Lee, Chie-Hong, et al. "Machine learning based network intrusion detection." Computational Intelligence and Applications (ICCIA), 2017 2nd IEEE International Conference on. IEEE, 2017.
[13] Jiang, Feng, et al. "Deep Learning based Multi-channel intelligent attack detection for Data Security." IEEE Transactions on Sustainable Computing (2018).
[14] Haque, MdEnamul, and Talal M. Alkharobi. "Adaptive hybrid model for network intrusion detection and comparison among machine learning algorithms." International Journal of Machine Learning and Computing 5.1 (2015): 17.
[15] Ahmed, Mohiuddin, AbdunNaser Mahmood, and Jiankun Hu. "A survey of network anomaly detection techniques." Journal of Network and Computer Applications 60 (2016): 19-31.
[16] Liu, Qiang, et al. "A survey on security threats and defensive techniques of machine learning: a data driven view." IEEE access 6 (2018): 12103-12117.
[17] https://en.wikipedia.org/wiki/Machine_learning
[18] https://en.wikipedia.org/wiki/Random_forest
[19] https://machinelearningmastery.com/a-tour-of-machine-learning-algorithms/
[20] Bromiley, Matt. "Threat intelligence: What it is, and how to use it effectively." SANS Institute InfoSec Reading Room (2016).
[21] https://en.wikipedia.org/wiki/Intrusion_detection_sy-stem
[22] Gaddam, Ravi Teja, and M. Nandhini. "Analysis of Various Intrusion Detection Systems with a Model for Improving Snort Performance." Indian Journal of Science and Technology10.20 (2017).
[23] Kumar, Sailesh. "Survey of current network intrusion detection techniques." Washington Univ. in St. Louis (2007).
[24] Kwon, Donghwoon, et al. "A survey of deep learning-based network anomaly detection." Cluster Computing (2017): 1-13.
[25] Jasper, Scott E. "US cyber threat intelligence sharing frameworks." International Journal of Intelligence and Counter Intelligence 30.1 (2017): 53-65.
[26] Suman Sharma, Yogesh Verma, Amit Nadda, "Information Security: Cyber Security Challenges", International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.10-15, 2019
[27] Shailja Sharma, Sheeba Khan, "Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.1, pp.13-15, 2019
Citation
Kushal Jani, Punit Lalwani, Deepak Upadhyay, M. B. Potdar, "Network Intrusion Detection System using Threat Intelligence and Deep Learning Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.526-531, 2019.
Hand Gesture Speaking Unit for Mute People
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.532-535, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.532535
Abstract
The primary aim of this paper is to efficiently act as a substitution of voice and ear by translating gestures performed by hand to the corresponding text which can be understood by any person who can read. The purpose of this research is to analyze and evaluate how the device can reduce the difficulty in Communication among people having listening and speech disability and find out the limitations of the device in comparison to the other technologies and devices working towards the similar objective. Their communications with others only involve the use of motion by their hands and expressions. We have designed a technique called artificial speaking mouth for dumb people. It will be very helpful for them to convey their thoughts to others. For mute people, there is a meaning behind every motion this message is kept in a database. So when the information generated by the flex sensors as per the gesture is being fed to the microcontroller. Microcontroller Atmega 328 matches the gesture data with the data in the database and the relevant gesture name is determined from the output.
Key-Words / Index Term
artificial speaking mouth, Atmega 328, Microcontroller
References
[1] “Overview: human-computer interaction An globally uses technique in society” Nidhi manchanda, sarita, saurabh mukherjee
[2]“Flex sensor based robotic arm controller using micro controller” Abidhusain syed, zamrrud taj h agasbal, thimmannagouday melligeri, bheemesh gudur
[3] “Embedded control for manipulating video game objects in real time Using hand gesture recognition” Pranav pawar, kiran tupe, sanket somvanshi, vishal shinde, sudam pawar
[4] “Giving voice to mute people “Ijariie” issn(o)-2395-4396, A.h. ansari, jori ashwini sanjay, dolas ashwini shesherao , gaikwad prajakta chandrakant
[5] “Communication interface for mute and hearing impaired people”Issn 2278-0181, garima rao , laksh narang ,abhishek solanki, kapil singh , karamjit kaur , neeraj gupta
[6] “Speaking system to mute people using hand gesture “P-issn: 2395-0072 e-issn: 2395-0056, S .k imam basha , s ramasubba reddy
[7]”Design and development of hand gesture recognition system “Kavitha sood, kathakali majumder, aishwarya muralidharan, ayesha sultana, aliya farheen
[8] “Hand gesture recognition and voice conversion system for dumb people “ v.padmanabhan m.sornalatha
Citation
Pallavi Nagarkar, Pravar Chaturvedi, Bhumika Neole, "Hand Gesture Speaking Unit for Mute People," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.532-535, 2019.
Overtime Planning Using Evolutionary Algorithms in Software Development
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.536-539, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.536539
Abstract
Programming building and advancement is outstanding to experience the ill effects of impromptu extra minutes, which causes pressure and sickness in designers and can prompt low quality programming with higher imperfections. As of late, we presented a multi-target choice help way to deal with assistance balance venture dangers and term against extra time, so programming designers can more readily design additional time. This methodology was observationally assessed on six genuine programming ventures and looked at against best in class developmental methodologies and right now utilized extra time techniques. The outcomes demonstrated that our proposition serenely beated every one of the benchmarks considered. This paper broadens our past work by exploring versatile multi-target ways to deal with meta-heuristic administrator choice, in this manner expanding and enhancing algorithmic execution. We additionally stretched out our experimental examination to incorporate two new true programming ventures, along these lines improving the logical proof for the specialized execution claims made in the paper. Our new outcomes, over each of the eight tasks contemplated, demonstrated that our versatile calculation beats the considered cutting edge multi-target approaches in 93 percent of the analyses. The outcomes likewise affirm that our methodology essentially beats current additional time arranging rehearses in 100 percent of the trials.
Key-Words / Index Term
Software building, the executives, arranging, look based programming designing, venture booking, additional time, hyper heuristic, multi-objective transformative calculations
References
[1] J. Ren, M. Harman, and M. Di Penta, “Cooperative co-evolutionary optimization on software project staff assignments and job scheduling,” in Proc. 3rd Int. Symp. Search Based Softw. Eng., Sept. 10–11, 2011, pp. 127–141.
[2] P. Kapur, A. Ngo-The, G. Ruhe, and A. Smith, “Optimized staffing for product releases and its application at chartwell technology,” J. Softw.Maintenance Evol.: Res. Practice, vol. 20,no. 5, pp. 365–386, 2008.
[3] C. Stylianou, S. Gerasimou, and A. Andreou, “A novel prototype tool for intelligent software project scheduling and staffing enhanced with personality factors,” in Proc. IEEE 24th Int. Conf. Tools Artif. Intell., Nov. 2012, pp. 277–284.
[4] J. D. Knowles, L. Thiele, and E. Zitzler, “A tutorial on the performance assessment of stochastic multiobjective optimizers,” Computer Engineering and Networks Laboratory, ETH Zurich, Switzerland, Tech. Rep. 214, 2006.
[5] H. Meunier, E.-G. Talbi, and P. Reininger, “A multiobjective genetic algorithm for radio network optimization,” in Proc. Congr. Evol. Comput., 2000, pp. 317–324.
[6] E. Zitzler and L. Thiele, “Multiobjective evolutionary algorithms: A comparative case study and the strength Pareto approach,” IEEE Trans. Evol. Comput., vol. 3, no. 4, pp. 257–271, Nov. 1999.
[7] E. Zitzler, L. Thiele, M. Laumanns, C. Fonseca, and V. da Fonseca, “Performance assessment of multiobjective optimizers: An analysis and review,” IEEE Trans. Evol. Comput., vol. 7, no. 2, pp. 117–132, Apr. 2003.
[8] D. A. V. Veldhuizen and G. B. Lamont, “Multiobjective evolutionary algorithm research: A history and analysis,” Department of Electrical and Computer Engineering, Wright-Patterson AFB, Ohio, Tech. Rep. TR-98-03, 1998.
[9] A. Arcuri and L. Briand, “A practical guide for using statistical tests to assess randomized algorithms in software engineering,” in Proc. 33rd Int. Conf. Softw. Eng., 2011, pp. 1–10.
[10] P. Royston, “An extension of Shapiro and Wilk’sWtest for normality to large samples,” Appl. Statist., vol. 31, no. 2, pp. 115–124, 1982.
[11] J. Cohen, Statistical Power Analysis for the Behavioral Sciences, 2nd ed. Denmark: Lawrence Earlbaum Associates, 1988.
[12] A. Vargha and H. D. Delaney, “A critique and improvement of the CL common language effect size statistics of mcgraw and wong,” J. Edu. Behavioral Statist., vol. 25, no. 2, pp. 101–132, jan 2000.
[13] G. Neumann, M. Harman, and S. Poulding, “Transformed Vargha-Delaney effect size,” in Proc. 7th Int. Symp. Search-Based Softw. Eng., 2015, pp. 318–324.
[14] S.-J. Huang and N.-H. Chiu, “Optimization of analogy weights by genetic algorithm for software effort estimation,” Inform. Softw. Technol., vol. 48, no. 11, pp. 1034–1045, 2006.
[15] F. Ferrucci, M. Harman, and F. Sarro, “Search-based software project management,” in Software Project Management in a Changing World, G. Ruhe and C. Wohlin, Eds. Berlin, Germany: Springer, 2014, pp. 373–399.
[16] E. Kocaguneli, T. Menzies, and J. W. Keung, “On the value of ensemble effort estimation,” IEEE Trans. Softw. Eng., vol. 38, no. 6, pp. 1403–1416, Nov./Dec. 2012.
[17] A. S. Hanna and G. Haddadl, “Overtime and productivity in - electrical construction,” in Proc. Construct. Res. Congr., 2009, pp. 1–10.
[18] C. K. Chang, C. Chao, S.-Y. Hsieh, and Y. Alsalqan, “Spmnet: A formal methodology for software management,” in Proc. 18th Annu. Int. Comput. Softw. Appl. Conf., Nov. 9–11, 1994, pp. 57–57.
[19] E. Alba and F. Chicano, “Software project management with gas,” Inform. Sci., vol. 177, no. 11, pp. 2380–2401, Jun. 2007.
[20] G. Antoniol, M. D. Penta, and M. Harman, “Search-based techniques applied to optimization of project planning for a massive maintenance project,” in Proc. 21st IEEE Int. Conf. Softw. Maintenance, 2005, pp. 240–249.
[21] G. Antoniol, M. Di Penta, and M. Harman, “The use of searchbased optimization techniques to schedule and staff software projects: An approach and an empirical study,” Softw.: Practice Experience, vol. 41, no. 5, pp. 495–519, Apr. 2011.
[22] M. Hericko, A. Zivkovic, and I. Rozman, “An approach to optimizing software development team size,” Inform. Process. Lett., vol. 108, no. 3, pp. 101–106, Oct. 2008.
[23] D. Kang, J. Jung, and D.-H. Bae, “Constrait-based human resource allocation in software projects,” Softw.: Practice Experience, vol. 41, no. 5, pp. 551–577, Apr. 2011.
[24] M. Lefley and M. J. Shepperd, “Using genetic programming to improve software effort estimation based on general data sets,” in Proc. Genetic and Evol. Comput. Conf., 2003, pp. 2477–2487.
[25] F. Ferrucci, C. Gravino, R. Oliveto, and F. Sarro, Using Tabu Search to Estimate Software Development Effort. Berlin, Germany: Springer, 2009, pp. 307–320.
Citation
Rahat Parween, "Overtime Planning Using Evolutionary Algorithms in Software Development," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.536-539, 2019.
Mobile SMS Spam Recognition Using Machine Learning Techniques with the help of Biasian and Spam Filters
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.540-542, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.540542
Abstract
Summary Spam SMS is unwanted messages to users who are worried and harmful from time to time. Currently, group survey papers are available on SMS detection techniques. Study and review their used techniques, approaches and algorithms, their advantages and disadvantages, evaluation measures, discussion of data sets, as well as the end result of the studies. Although the SMS spam detection techniques are additionally demanding as sms spam detection techniques, as the local content, the use of abbreviated words, unfortunately does not meet any of the existing research on these challenges. There is an enormous amount of emerging research in this region and this survey can serve as a point of reference for the upcoming direction of research.
Key-Words / Index Term
Mobile SMS spam detection
References
[1] K. Yadav, S. K. Saha, P. Kumaraguru, and R. Kumra,’’ take control of your smses: designing an usable spam sms filtering system,” in 2012 IEEE 13th International Conference on Mobile Data Management. IEEE, 2012, pp. 352–355.
[2] S. J. Warade, P. A. Tijare, and S. N.
Sawalkar, “An approach for sms spam detection.”
[3] A. Narayan and P. Saxena, “The curse of 140 characters: evaluating the efficacy of sms spam detection on android,” in Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices ACM, 2013, pp. 33–42.
[4] A. S. Onashoga, O. O. Abayomi-Alli,
A. S. Sodiya, and D. A.Ojo “An adaptive and collaborative server side sms spam filtering scheme using artificial immune system,” Information Security Journal: A Global Perspective, vol. 24, no. 4-6, pp. 133–145, 2015.
[5] J. W. Yoon, H. Kim, and J. H. Huh,
“Hybrid spam filtering for mobile communication,” computers & security, vol. 29, no. 4, pp. 446–459, 2010.
[6] Q. Xu, E. W. Xiang, Q. Yang, J. Du, and J. Zhong, “Sms spam detection using noncontent features,” IEEE Intelligent Systems, vol. 27, no. 6, pp. 44–51, 2012.
[7] I. Ahmed, D. Guan, and T. C. Chung,
“Sms classification based on naïve bayes classifier and apriori algorithm frequent itemset,” International Journal of machineLearning and computing, vol. 4, no. 2, p. 183, 2014.
[8] J. M. G´omez Hidalgo, G. C. Bringas, E. P. S´anz, and F. C. Garc´ıa, “Content based sms spam filtering,” in Proceedings of the 2006 ACM symposium on Document engineering. ACM, 2006, pp. 107–114.
[9] https://en.wikipedia.org/wiki/Support_ vector machine [last Accessed: 05-11-2016]
[10] https://en.wikipedia.org/wiki/Decision tree[Last Accessed:05-11-2016]
[11] http://en.wikipedia.org/wiki/K-
[12] http://fastml.com/bayesian-machine- learning/ [Last Accessed: 05-11-2016
[13] SMS Spam Collection data set from UCI Machine learning Repository,”http://archive.ics,uci.edu/ml/dataset/SMS+Spam+Collection
Citation
Ashok Koujalagi, "Mobile SMS Spam Recognition Using Machine Learning Techniques with the help of Biasian and Spam Filters," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.540-542, 2019.