Comparative Study of Chronic Kidney Disease Prediction using Machine Learning Techniques
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.501-506, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.501506
Abstract
The healthcare industry is producing massive amount of data which need to be mine to discover hidden information for effective prediction, exploration, diagnosis and decision making. Chronic kidney disease (CKD), also known as chronic renal disease involves conditions that damage your kidneys and decrease their ability to keep you healthy. Early detection and treatment can often keep chronic kidney disease from getting worse. Machine learning techniques are commonly used to predict this situation. This research work mainly focused on finding the best classification algorithm based on different evaluation criteria like performance accuracy and root mean square error. We have performed a comparative study of the performance of machine learning algorithms J48, Support Vector Machine and Multilayer perceptron. The results show that MLP is giving minimum root mean square error value compared to J48 and SVM.
Key-Words / Index Term
Data Mining, Neural Network, machine Learning, Kidney Disease Prediction, MLP, J48, SVM
References
[1]. Dr. S. Vijayarani1 , Mr.S.Dhayanand2 Assistant Professor1 , M.Phil Research Scholar2 “Kidney Disease Prediction Using SVM And ANN Algorithms”in 2015 international Journal of Computing and Business Research (IJCBR) Volume 6 Issue 2 March 2015
[2]. Parul Sinha, Poonam Sinha “Comparative Study of Chronic Kidney Disease Prediction using KNN and SVM” in 2015 International Journal of Engineering Research & Technology (IJERT) Vol. 4 Issue 12, December-2015
[3]. Harshali Patil, Manisha Divate “Kidney Disease Detection In Indian Patients In An Early Stage Using Weka Tool” in 2018 Proceedings of International Conference on Advances in Computer Technology and Management (ICACTM) In Association with Novateur Publications IJRPET-ISSN No: 2454-7875 ISBN No. 978-81-921768-9- 5 February, 23rd and 24th, 2018
[4]. N. Afhami “Prediction of Diabetic Chronic Kidney Disease Progression Using Data Mining Techniques”in 2018 International Journal of Computer Science Engineering (IJCSE), Vol. 7 No.02 Mar-Apr 2018
[5]. Lambodar Jena, Narendra Ku. Kamila “Distributed Data Mining Classification Algorithms for Prediction of Chronic- Kidney-Disease”, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-4, Issue-11) Research Article November 2015
[6]. S.S. Senthil priya1, P. Anitha “ Comparison Of Feature Selection Methods For Chronic Kidney Data Set Using Data Mining Classification Analytical Model”,International Research Journal Of Engineering And Technology (Irjet), Volume: 06 Issue: 2 | Feb 2019
[7]. https://archive.ics.uci.edu/ml/datasets.php
[8]. El-Houssainy A.RadyaAyman S.Anwarb “Prediction of kidney disease stages using data mining algorithms”, Informatics in Medicine Unlocked 15 (2019) 100178
[9]. Pushpa M. Patil “Review On Prediction Of Chronic Kidney Disease Using Data Mining Techniques”, International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 5, Issue. 5, May 2016
[10]. Sujata Drall, Gurdeep Singh Drall, Sugandha Singh, Bharat Bhushan Naib, “Chronic Kidney Disease Prediction: A Review”, International Journal of Management, Technology And Engineering, ISSN No : 2249-7455, Volume 8, Issue V, May/2018
[11]. Dr. S. Sasikala1, Dr. S. Jansi2, Ms. S. Saranya3,Ms. P. Deepika4, Ms. A. Kiruthika “Anticipating the Chronic Kidney Disorder (CKD) using Performance Optimization in AdaBoost and Multilayer Perceptron”, Imperial Journal of Interdisciplinary Research (IJIR) Vol-3, Issue-2, 2017
[12]. International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256)
Citation
Sayali Jadhav, Priya Chandran, Suhasini Vijaykumar, "Comparative Study of Chronic Kidney Disease Prediction using Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.501-506, 2019.
Tunable Monopole Circular Microstrip Antenna for Dual frequency Covering L, C and X band Applications
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.507-511, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.507511
Abstract
In this paper, we have presented simulated and measured results of tunable monopole circular microstrip antenna for dual frequency which covers L, C, and X band applications. The proposed antenna consists of two identical stubs placed along the patch axis having fixed width WS =1.0 cm. The slot is placed on left side of feed axis which is having fixed L1= 1.279 cm, L2 =1.3 cm and width W1= 0.1 cm. The upper and lower length of two identical stub is varied from LUS=0.483 to 1.83 cm and LLS=0.257 to 0.957 cm to tune an antenna for dual band. The first band varies from 1.8325 GHz to 1.5175 GHz having tuning range of 17.48% and 16.0% and second band varies from 8.5375 GHz to 7.2775 GHz having tuning range of 14.77% and 12.48% when simulated and measured respectively. The maximum impedance bandwidth of 111 % and 30.9 % is achieved for first and second band respectively. The antenna has peak gain of 3.0 dB. The VSWR is less 2 than for all tuned frequencies. The proposed antenna covers applications of L, C and X band. The simulated results are in good agreement with experimental results. The radiation patterns are nearly omni-directional nature both in E and H plane.
Key-Words / Index Term
Identical stubs, slot, CMCMSA and TMCMSADF
References
[1] S.O. Kundukulam, M. Paulson, C. K. Anandan, and P. Mohanan,
“Slot-loaded compact microstrip antenna for dual-frequency operation”, Microwave Optical Technological Letters, Vol. 31 , Issue.5, pp.379–381, 2001.
[2] G. Kumar and K. P.Ray,. “Broad Band Microstrip Antennas”, Artech House, 2003
[3] Garg, R, P. Bhartia, I . Bhal and A.Ittipiboon,”Microstrip Antenna Design Hand Book”, Artech Inc., 2001.
[4] Balnis C .A , “Antenna theory, Analysis and design”, 2nded, Wiley, New York 1997.
[5] Jia-Wei Dai, Hong-Li Peng, Yao-Ping Zhang, and Jun-Fa Mao, “A Novel Tunable Microstrip Patch Antenna Using Liquid Crystal”, Progress In Electromagnetics Research C, Vol. 71, pp.101–109, 2017.
[6] Shubham Chouhan ,and Rajdeep Shrivastava, “Design and Analysis of Different Types of Modern Methods Using Line Feed of Microstrip Antenna Using CST Software” , International Journal of Computer Sciences and Engineering Vol.7(4), pp.594-603,Apr 2019.
[7] R C. Jain, M M. Kadam , “A Novel Design of Compact Planner UWB Antenna with Multiple Band Rejection Function”, International Journal of Scientific Research in Network Security and Communication, Vol. 5(2) , May 2017.
[8] A. E. Daniel & G. Kumar, “Tunable dual & triple frequency stub loaded rectangular microstrip antenna (MSA)”, Proc. IEEE antennas propagation symposium , pp.2140-2143, 1995.
[9] K. P. Ray, S. Nikhil and A. Nair,“Compact Tunable and Dual band Circular Microstrip Antenna for GPS and Bluetooth Applications”, International Journal of Microwave and Optical Technology, Vol.4, no.4, pp.205-210, July 2009.
[10] Serrano-Vaello. Á. and Sánchez-Hernández, D,“PrintedAntennas for dual-band GSM/DCS1800 mobile handsets”, Electronics Letters, Vol. 34, No. 2, pp. 140-141, Jan. 1998.
[11] X. L. Sun, S. W. Cheung, And T. I. Yuk “,Dual-Band Monopole Antenna With frequency-Tunable Feature For Wimax Applications” , IEEE Antennas And Wireless Propagation Letters, Vol. 12, pp. 100-103, 2013.
[12] Shweta Singh and Namrata Sahayam,“New 2GHz Broadband microstrip patch antenna for C-band Pervasive wireless Communication”, International Journal of Engineering Science & Advanced Technology , Volume-2, Issue-4, pp, 971 – 974, Jul-Aug 2012.
Citation
Biradar Rajendra, S. N. Mulgi, "Tunable Monopole Circular Microstrip Antenna for Dual frequency Covering L, C and X band Applications," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.507-511, 2019.
Dynamic PID based approach for preventing DDOS attack in IP network
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.512-517, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.512517
Abstract
One of the most common attack known as DDOS(distributed denial-of-service) attack are threat to the net. In DDOS attack the intruder makes use of scattered zombies in order to transfer a huge quantity of traffic to the targeted host, so that the legal users will not be able to access the network services or resources. The main cause for this attack to happen is the use of static PID’s, as this static PID’s remain constant throughout the session the intruder can easily trap these PID’s used and launch the DDOS attack. In order to overcome this problem, here in this project work we plan, estimate and evaluate the use of dynamic PID. Here we make use of 16 characters pseudorandom dynamic PID’s . In dynamic mode these PID’s keep on changing throughout the session , this makes hard for the intruders to track the PID’s and launch the attack
Key-Words / Index Term
DDOS, Static PID, Zombies, Dynamic PID
References
[1]. Yang Xiang, Ke Li, and Wanlei Zhou, Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 2, JUNE 2011.
[2]. Vijayalakshmi, Shalinie, Arun Pragash, IP Traceback System for Network and Application Layer Attacks, Recent Trends In Information Technology (ICRTIT), 2012 International Conference
[3]. Ahmad Sanmorino1, Setiadi Yazid2, DDoS Attack detection method and mitigation using pattern of the flow,2013 International conference of Information and communication technology(ICoICT)
[4]. Muhammad Aamir , Muhammad Arif, Study and Performance Evaluation on Recent DDoS Trends ofAttack & Defense, I.J. Information Technology and Computer Science, 2013, 08, 54-65
[5]. PyungKoo Park, SeongMin Yoo, Chungnam Nat, Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router , 2013 International Conference on Information Science and Applications (ICISA)
[6]. Saman Taghavi Zargar, Joshi, Member, IEEE, and David Tipper,A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION (2013)
[7]. Ilker Ozcelik, Yu Fu , Richard R. Brooks ,DoS Detection is Easier Now, 2013 Second GENI Research and Educational Experiment Workshop.
[8].Monowar H. Bhuyan1, H. J. Kashyap1,D. K.Bhattacharyya, Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions, The Computer Journal first published online March 28, 2013
Citation
Vinutha Yadav D, Nagaraj J, "Dynamic PID based approach for preventing DDOS attack in IP network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.512-517, 2019.
Design and Implementation of NYSC Orientation Posting scheme in Nigeria
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.518-522, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.518522
Abstract
NYSC Posting Information system is designed to overcome the problems encountered with the existing system in terms of insecurity, data redundancy, Information time management and data protection, misplacement and mismanagement of files etc. The new system is designed in such a way that information about each corps member is effectively managed within the database for easy retrieval of information. The Top-down design approach model was used in the course of this research and data collected were implemented using Visual Basic 6 for the front end design and Microsoft Access for the Back end.
Key-Words / Index Term
Corps, Database, Graduates, NYSC, Posting
References
[1] Adibe, M.O. (2003), Computer Literacy, Lagos: Brillace Nigeria limited.
[2] Aneke, (2005). Concepts and Application Technology in Information Technology. Enugu: Macmillian Nigeria plc.
[3] Egbe,T.(2003),Visual Basic 6.0 for Engineers and Scientists. Benin city: Joint Heir Nigeria limited.
[4] Nosike, L. (2003), Internet Literacy. Lagos: Longman publication
[5] Otwin Marenin (1990), Implementing Deployment Policies in the National Youth Service Corps of Nigeria: Goals and Constraints. University of Alaska Fairbanks. Volume: 22 issue: 4, page(s): 397-436. https://doi.org/10.1177/0010414090022004002
[6] Sargeanuts, M J. (1993), Operational Research for Management. London: William Heiman Ltd.
[7] Rob, G. R. & Coronel.(2001), Scientific Method in Database Systems. London: Oxford University Press
[8] Tsai,A.A & Sarah,W. C.,(2002), Providing Efficient Web services. New York: Prentice publications.
Citation
A. Sunday Olowookere, J. Oluwafemi Ayangbekun, S. Babatunde Oluwasola, "Design and Implementation of NYSC Orientation Posting scheme in Nigeria," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.518-522, 2019.
Medical Image Edge Detection Using Modified Morphological Edge Detection Approach
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.523-528, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.523528
Abstract
Medical imaging solution technology plays a vital role in the diagnosis and treatment of patients suffering from serious illness. In medical images, edge detection plays a vital role for recognition of the human organs. The performance of the edge detection determines the result of the processed image. Unfortunately, medical images like CT and MRI encounter a various number of noises such as Gaussian, Poisson and salt and pepper noise. Salt and pepper noise is frequently encountered in acquisition, transmission, and storage and processing of images. The presence of salt and pepper noise in an image may be either relatively high or low. Various filtering techniques have been proposed for removing salt and pepper noise. Conventional edge detection algorithms are belong to the high pass filtering which are not fit for noisy medical image edge detection because noise and edge belong to the scope of high frequency. In real world applications, medical images contain object boundaries, object shadows and noise. Therefore, they may be difficult to extract the edges in the presence of noise in medical images. Hence, a modified morphological edge detection algorithm is proposed to detect the edges in medical image. The performance of the proposed method is found to be better for detecting the edges and noise filtering than conventional techniques
Key-Words / Index Term
MRI, Edge Detection, Morphology, Image Analysis, Brain Tumor
References
[1] A.K.Jain, “Fundamentals of Digital Image Processing”, Prentice Hall, India, pp.80-123, 1989.
[2] J.Mehena,M.C.Adhikary, “Medical Image edge detection based on soft computing approach”, International Journal of Innovative Research in computer and communication Engineering, Vol. 3, pp.6801-6807, 2015.
[3] N.Senthilkumaran, R. Rajesh, “Edge Detection Techniques for Image Segmentation - a Survey”, Proceedings of the International Conference on Managing Next Generation Software Applications ,India, pp.749-760, 2008.
[4] S.Sridhar, “Digital Image Processing”, Oxford University Press,India, pp. 286–335, 2011.
[5] R.M. Haralick, “Digital step edges from zero-crossing of second directional derivatives”, IEEE Trans. Pattern Anal. Machine Intell., Vol. 6, pp. 58–68,1984.
[6] J.Canny, “A Computational Approach to Edge Detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence”, Vol. 8 , No.6, pp. 679-687, 1986.
[7] J.Kaur, S.Agrawal and R.Vig, “Comparative Analysis of Thresholding and Edge Detection Segmentation Techniques”, International Journal of Computer Applications, Vol.39, No. 15, pp.29-34, 2012.
[8] R.Maini,H. Aggarwal, “Study and Comparison of Various Image Edge Detection Techniques”, International Journal of Image Processing , Vol.3,No.1, pp.1-12, 2010.
[9] P.Maragos, “Differential Morphology and Image Processing”, IEEE Trans Image Processing, Vol. 5, pp. 922-937, 1996.
[10] A.Bhargava, V. S.Nigam, “Multi Objective Detection from High Resolution Satellite Images using Segmentation and Morphological Operation”, International Journal of Computer Sciences and Engineering, Vol.5, No.7, pp.1466-1470, 2019.
[11] J.Serra, “Image Analysis and Mathematical Morphology”, Academic Press, New York, pp.101-112, 1982.
[12] Z.Wang, A.C. Bovik, H.R.Sheikh, and E.P. Simoncelli, "Image quality assessment: From error measurement to structural similarity", IEEE Transactions on Image Processing, Vol. 13, No.1, pp.2356-2362, 2004.
[13] M.Kini,R.Pandey,A.R.Das and S.K. Malani, “Comprehensive Image Processing for Automated Detection of Hypertrophic Cardiomyopathy”, International Journal of Computer and Electronics Research ,Vol.3,No.2, pp.512-519,2014.
[14] N.Senthilkumaran, C.Kirubakaran,N.Tamilmani “Fuzzy Edge Detection Using Minimum Cross Entropy Thresholding for MRI Brain Image”, International Journal of Computer Sciences and Engineering, Vol.6, No.7, pp.271-274, 2018.
[15] J.Mehena,M. C. Adhikary, “Brain Tumor Segmentation and Extraction of MR Images Based on Improved Watershed Transform”,IOSR Journal of Computer Engineering, Vol.17,No.1,pp.01-05, 2015.
Citation
J. Mehena , "Medical Image Edge Detection Using Modified Morphological Edge Detection Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.523-528, 2019.
Mining High Utility Pattern from Sequential Database
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.529-533, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.529533
Abstract
Now-a-days, finding an interesting pattern from the given dataset is an emerging trend to learn more about user behaviour and patterns of interest. Prior work on this problem many pattern mining approaches use two-phase pattern mining with one exception that are however inefficient and scalable to mine high utility sequential pattern mining. The way mention above suffers scalability issue for numerous candidates and growing sequence. This paper proposes an approach to apply tight upper bound for pruning patterns. Whereas, the freshness lies in the implemented algorithm that helps to prune tight sequence utility. The applied data structure helps us to maintain sequence patterns whose values are greater than applied thresholds. Extensive experiments on real datasets show that the defined algorithm is able to mine high utility sequential pattern incrementally.
Key-Words / Index Term
Data-mining, High Utility Patterns, Sequential Pattern Mining, Pattern Mining, Pruning, Itemset share framework
References
[1] J.Liu, Ke Wang, Benjamin C.M.Fung, "Mining High Utility Patterns in One Phase without Generating Candidates", IEEE Trans.Knowl. Data Eng., vol. 28, no.5, pp-1245-1247, May 2016.
[2] S. Dawar and V. Goyal, “UP-Hist tree: An efficient data structure for mining high utility patterns from transaction databases,” in Proc. 19th Int. Database Eng. Appl. Symp., 2015, pp. 56–61.
[3] V. S. Tseng, B.-E. Shie, C.-W. Wu, and P. S. Yu, “Efficient algorithms for mining high utility itemsets from transactional databases,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 8, pp. 1772–1786, Aug. 2013.
[4] A. Erwin, R. P. Gopalan, and N. R. Achuthan, “Efficient mining of high utility itemsets from large datasets,” in Proc. 12th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining, 2008, pp. 554–561.
[5] H. Yao and H. J. Hamilton, “Mining itemset utilities from transaction databases,” Data Knowl. Eng., vol. 59, no. 3, pp. 603–626, 2006.
[6] R. Agarwal, C. Aggarwal, and V. Prasad, “Depth first generation of long patterns,” in Proc. ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2000, pp. 108–118
[7] R. Agrawal and R. Srikant, “Fast algorithms for mining association rules,” in Proc. 20th Int. Conf. Very Large Databases, 1994, pp. 487–499.
[8] C. F. Ahmed, S. K. Tanbeer, B.-S. Jeong, and Y.-K. Lee, “Efficient tree structures for high utility pattern mining in incremental databases,” IEEE Trans. Knowl. Data Eng., vol. 21, no. 12, pp. 1708– 1721, Dec. 2009.
[9] R. Bayardo and R. Agrawal, “Mining the most interesting rules,” in Proc. 5th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 1999, pp. 145–154.
[10] F. Bonchi, F. Giannotti, A. Mazzanti, and D. Pedreschi, “ExAnte: A preprocessing method for frequent-pattern mining,” IEEE Intell. Syst., vol. 20, no. 3, pp. 25–31, May/Jun. 2005.
[11] F. Bonchi and B. Goethals, “FP-Bonsai: The art of growing and pruning small FP-trees,” in Proc. 8th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining, 2004, pp. 155–160.
[12] F. Bonchi and C. Lucchese, “Extending the state-of-the-art of constraint-based pattern discovery,” Data Knowl. Eng., vol. 60, no. 2, pp. 377–399, 2007.
[13] T. De Bie, “Maximum entropy models and subjective interestingness: An application to tiles in binary databases,” Data Mining Knowl. Discovery, vol. 23, no. 3, pp. 407–446, 2011
[14] P. Fournier-Viger, C.-W. Wu, S. Zida, and V. S. Tseng, “FHM: Faster high-utility itemset mining using estimated utility cooccurrence pruning,” in Proc. 21st Int. Symp. Found. Intell. Syst., 2014, pp. 83–92.
[15] Y.-C. Li, J.-S. Yeh, and C.-C. Chang, “Isolated items discarding strategy for discovering high utility itemsets,” Data Knowl. Eng., vol. 64, no. 1, pp. 198–217, 2008.
Citation
A. A. Tale, N. R. Wankhade, "Mining High Utility Pattern from Sequential Database," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.529-533, 2019.
Preperation of Materia and Their Chemical, Physical and Electrical Analysis for HEV
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.534-537, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.534537
Abstract
Electrical and electrochemical properties of PEO based hot pressed nanocomposite polymer electrolyte (NCPE) membrane (1-x)[70PEO:30AgNO3]:xTiO2 where x=0-20 wt% , casted by using a novel hot pressed technique for prperation of electrochemical devices viz. supercapacitor, battery etc. have been studied. Solid Polymer Electrolyte (SPE) composition (70PEO:30AgNO3) reported earlier identified as highest conducting film at room temperature, has been used as 1st phase host matrix and nano-size (~8nm) filler TiO2 as 2nd phase dispersion. As a consequence of dispersal in SPE host, highest conductivity was achieved in at 5wt% of TiO2. This composition has been referred as optimum composing composition (OCC). Addition of KOH is OCC shows further increase in conductivity. The ion transport behavior in NCPE membrane have been discussed on the basis of ionic conductivity(σ), ionic transferred number(tion) and activation energy Ea. Morphology study and compositional veriation also performs by SEM .
Key-Words / Index Term
Hot pressed polymer electrolyte, ionic conductivity, Activation energy,Scanning electron microscopic(SEM),
References
[1] Nan C, Fan L, Lin Y & Cai Q, Phys Rev Lett, 91,26(2033)
[2] Thokchom J S, Chen C, Abraham K M & Kumar B, Solid State Ionics, 176(2005)
[3] Armand T Reddy M J & Rao UVS, , J of Power Source, 268,93(2005)
[4] Fenton D , E Parker J M & Wright PV, Polymer,14, 93 (2001) 268.
[5] Fenton D E, Parker J M & Wrigth P V, Polymer, 14,589(1973)
[6] Armand M P, Chabagno J M & Duclot M, Fast Ion Transport in solid (EDs) P Vashistha, M Mundy and G K Sheny,131 (North Holland, 1979)
[7] Chung N K, Kwon Y D & Kim D, J Power Source, 124, 128 (2003)
[8] Chandra Angesh & Chandra Archana, Hot-Pressed polymer electrolyte: Synthesis and Characterization (Lanbert Academic Pub. Bermany,2010)
[9] Pandey G P, Kumar Y & Hasmi S A, Indian J Chemistry, 49, 743 (2010)
[10] Appetecchi G B, Croce F, Hasson J, Scrosati B & Salomon M , Cassel F, J Power Sources, 114,105(2003)
[11] Crpce F, Settimi L, Scrosati B, Electrochemistry Commu, 8, 346 (2006)
[12] Agrwal R C, Chandra A, Bhatt A & Mahipal Y K, New J Physics 42,135 (2009)
[13] Chandra A, Agrwal R C, Mahipal Y K, J Physics D Applied Physics 42,135 (2009)
[14] Chandra A , Dur Phys J Appl Phys, 50,21101 (2010)
[15] Nirbhay K. Singh, Mohan L. Verma , CSVTU Journal Vol-05 2012.
[16] J. R. Dygas, Solid State Ionics 176, 2065 (2005).
[17] M. A. Ratner, A.Nitzan, Conductivity in polymer ionics. dynamic disorder and correlation, Faraday Discuss. Chem. Soc., 88 (1989) 19−42
[18] M. J. Reddy, P. P. Chu, U.V. S. Rao, Study of multiple interactions in mesoporous composite PEO electrolytes, J. Power Sources, 158 (2006) 614-619
[19] W. Wieczorek, D. Raducha, A. Zalewska, J. R. Stevens, Effect of salt concentration on the conductivity of PEO-based composite polymeric electrolytes, J.
Phys. Chem. B, 102 (1998)8725-8731
[20] S. J. Wen, T. J. Richardson, D. I. Ghantous, K.A. Striebel, P.N. Ross, E.J. Cairns, FTIR characterization of PEO+LiN(CF3SO2)2 electrolytes, J. Electroanaly. Chem., 408 (1996) 113-118.
[21] J. Zhou, S. Fedkiw, Ionic conductivity of composite electrolytes based on oligo(ethylene oxide) and fumed oxides, Solid State Ionics 166 (2004) 275-293
Citation
Satpreet Singh Gill, Manish Kurre, "Preperation of Materia and Their Chemical, Physical and Electrical Analysis for HEV," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.534-537, 2019.
A Review on Image Classification Using Bag of Features Approach
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.538-542, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.538542
Abstract
Bag of Features or BoF approach has been used in many computer vision tasks, including image classification, video search, robot localization, and texture recognition. It is so widely popular because of its simplicity. These methods are based on unordered collections of image descriptors which are then quantized and are discarded spatial information, therefore conceptually and computationally simpler than many alternative methods, because of this; BoF based systems have set new performance standards on popular image classification benchmarks and have achieved scalability breakthroughs in image retrieval. This paper reviews related works based on the issues of improving and/or applying BoF. Emphasis is placed on recent techniques that mitigate quantization errors, improve feature detection, and speed up image retrieval. Meanwhile, unresolved issues and fundamental challenges are also raised. Among those issues the best techniques for sampling images, describing local image features, and evaluating system performance. Among those the fundamental challenges are how the BoF methods can contribute in localizing the objects in more complex images, or associating high-level semantics with natural images. Moreover, many recent works are compared in terms of the methodology of BoF feature generation and experimental design. Different Classification Models are also discussed.
Key-Words / Index Term
Bag Of Features, Feature Extraction, Quantization, Clustering, Image Representation, Image Classification, Support Vector Machine
References
[1] Olivier Chapelle, Patrick Haffner, and Vladimir N. Vapnik,“Support Vector Machines for Histogram-Based Image Classification”,IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 10, NO. 5, SEPTEMBER 1999.
[2] T. Dharani, I. Laurence Aroquiaraj IEEE Member “Content Based Image Retrieval System using Feature Classification with Modified KNN Algorithm”, arXiv preprint:130.4717,2013
[3] A. Bosch, X. Munoz, and R. Mart , “Which is the best way to organize/classify images by content?” Image and Vision Computing, vol. 25, no. 6, pp. 778–791, 2007.
[4] Chih-Fong Tsai, “Bag-of-Words Representation in Image Annotation: A Review”, International Scholarly Research Network, Volume 2012, Article ID 376804, 19 pages doi:10.5402/2012/376804.
[5]K. Mikolajczyk, B. Leibe, and B. Schiele, “Local features for object class recognition,” in Proceedings of the 10th IEEE International Conference on Computer Vision (ICCV ’05), pp. 1792–1799, October 2005.
[6] T. Tuytelaars and K. Mikolajczyk, “Local invariant feature detectors: a survey,” Foundations and Trends in Computer Graphics and Vision, vol. 3, no. 3, pp. 177–280, 2007.
[7] K. Mikolajczyk, T. Tuytelaars, C. Schmid et al., “A comparison of affine region detectors,” International Journal of Computer Vision, vol. 65, no. 1-2, pp. 43–72, 2005.
[8] E. Horster and R. Lienhart, “Fusing local image descriptors ¨ for large-scale image retrieval,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ’07), pp. 1–8, June 2007.
[9] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, 2004.
[10] D. Gokalp and S. Aksoy, “Scene classification using bag-of- ¨ regions representations,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ’07), pp. 1–8, June 2007.
[11] A. Bosch, A. Zisserman, and X. Munoz, “Scene classification via pLSA,” in European Conference on Computer Vision, pp. 517–530, 2006.
[12] J. Sivic and A. Zisserman, “Video google: a text retrieval approach to object matching in videos,” in Proceedings of the 9th IEEE International Conference on Computer Vision (ICCV ’03), pp. 1470–1477, October 2003.
[13] J. Sivic, B. C. Russell, A. A. Efros, A. Zisserman, and W. T. Freeman, “Discovering objects and their location in images,” in Proceedings of the 10th IEEE International Conference on Computer Vision (ICCV ’05), pp. 370–377, October 2005.
[14] A. Bosch, A. Zisserman, and X. Munoz, “Scene classification via pLSA,” in European Conference on Computer Vision, pp. 517–530, 2006.
[15] F. Jurie and B. Triggs, “Creating efficient codebooks for visual recognition,” in Proceedings of the 10th IEEE International Conference on Computer Vision (ICCV ’05), pp. 604–610, October 2005.
[16] L. Fei-Fei and P. Perona, “A bayesian hierarchical model for learning natural scene categories,” in Proceedings of the 6th IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ’05), pp. 524–531, June 2005.
[17] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, 2004.
[18] Y. Ke and R. Sukthankar, “PCA-SIFT: a more distinctive representation for local image descriptors,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ’04), pp. 506–513, July 2004.
[19] J. R. R. Uijlings, A. W. M. Smeulders, and R. J. H. Scha, “Real-time visual concept classification,” IEEE Transactions on Multimedia, vol. 12, no. 7, pp. 665–681, 2010.
[20] K. Mikolajczyk and C. Schmid, “A performance evaluation of local descriptors,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 10, pp. 1615–1630, 2005.
[21] J. Zhang, M. Marszałek, S. Lazebnik, and C. Schmid, “Local features and kernels for classification of texture and object categories: a comprehensive study,” International Journal of Computer Vision, vol. 73, no. 2, pp. 213–238, 2007.
[22] Z. Li, Z. Shi, X. Liu, Z. Li, and Z. Shi, “Fusing semantic aspects for image annotation and retrieval,” Journal of Visual Communication and Image Representation, vol. 21, no. 8, pp. 798–805, 2010.
Citation
Santosh Kumar Panda, Chandra Sekhar Panda, "A Review on Image Classification Using Bag of Features Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.538-542, 2019.
Renewable Distributed Generation and its Impact in Rural India
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.543-547, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.543547
Abstract
Despite many sincere attempts from the authorities to increase the quality of power supplied to the rural households of India, a large population of rural India is still remains power-deprived. To change this situation, renewable energy along with distributed generation can become a feasible solution. In this paper, an in-depth analysis of the potential of renewable distributed generation is presented to tackle this power crisis. It also takes into account the government initiatives taken so far and the challenges lying ahead in this field.
Key-Words / Index Term
Renewable, Distributed Generation, Grid, Utility, Supply
References
[1] Kartik Arunachalam, Venkateswaran Sankaran, Sanket Goel “De-centralised distributed generation in India: A review”, Journal of Renewable and Sustainable Energy, April 2016
[2] Apoorva Saxena, Subhash Chandra, “Rural Electrification in India using Distributed Generation: Current Scenario, Government Initiatives, Regulatory & Technical Issues”, American International Journal of Research in Science, Technology, Engineering & Mathematics, March-May, 2013, pp. 76-81
[3] A. A. Salam, A. Mohamed and M. A.Hannan, "Technical Challenges on Microgrids",ARPN Journal of Engineering and Applied Sciences, vol.3, no. 6, ISSN 1819-6608, Dec 2008.
[4] Pavlos S. Georgilakis, Nikos D. Hatziargyriou, “Optimal Distributed Generation Placement in Power Distribution Networks: Models, Methods, and Future Research”, Ieee Transactions On Power Systems, Vol. 28, No. 3, August 2013
[5] D. Mahinda Vilathgamuwa., L.P Chiang., L. Y. Wei, “Protection Of Microgrids During Utility Voltage Sags”, IEEE Trans Ind Electron. 53(5): 1427-36, 2006
[6] D. Velasco, C. L. Trujillo, G. Garcer´a, and E. Figueres, “Review Of Antiislanding Techniques In Distributed Generators,” Renewable Sustainable Energy Rev., vol. 14, no. 6, pp. 1608–1614, Aug. 2010.
[7] A. Etxegarai, P. Egu´ıa, and I. Zamora, “Analysis of Remote Islanding Detection Methods for Distributed Resources,” International Conference on Renewable Energies and Power Quality, ICREPQ, 2011, pp. 13–15.
[8] M. Nouni, S. Mullick, and T. Kandpal, “Providing Electricity Access To Remote Areas In India: An Approach Towards Identifying Potential Areas For Decentralized Electricity Supply,” Renewable and Sustainable Energy Rev. 12, 1187–1220 (2008).
[9] L. Coles and R. Beck, “Distributed Generation Can Provide an Appropriate Customer Price Response to Help Fix Wholesale Price Volatility,” IEEE Power Engineering Society Winter Meeting (2001), pp. 141–143.
[10] N. K. Sharma, P. K. Tiwari, and Y. R. Sood, “A Comprehensive Analysis of Strategies, Policies and Development of Hydropower In India: Special Emphasis On Small Hydro Power,” Renewable Sustainable Energy Rev. 18, 460–470 (2013).
Citation
Suranjana Bharadwaj, "Renewable Distributed Generation and its Impact in Rural India," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.543-547, 2019.
A Survey on Assured Data Deletion in Cloud Storage
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.548-553, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.548553
Abstract
With the rapid growth of cloud computing technology, more and more users store and share their data through cloud storage. Major concern is the inadvertent exposure of sensitive data of potential cloud users. Sometimes the cloud server may not delete the data honestly for financial intensives so that data deletion becomes a security challenge. Sometimes unintended disclosure leads to heavy financial penalties and reputational damage. The traditional approach to this problem is encryption of the data before outsourcing and destruction of the encryption key when detecting. Moreover, most of the existing methods can be summarized with the one-bit-return protocol. In which, cloud storage server deletes the data and returns one-bit as a result either 0 or 1 means failure/success. Sometimes this result misguides the user, but user has to believe the returned result because user can not verify it. As userslose their direct control over their data in cloud storage. Hence, assured data deletion is highly required in cloudstorage. In this paper, we aim to analyze assured deletion methods for the cloud, identifying the cloud features that pose a threat to assured deletion and described various assured deletion challenges.
Key-Words / Index Term
Assured data deletion, User assurance, Cloud storage, Cloud security
References
[1] P. Mell and T. Grance, “The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology”, NIST Special Publication, Vol. 145, pp. 7, 2011.
[2] G. Edition, “The Changing Face of Data Security 2019 Thales Data Threat Report”, 2019.
[3] P. Gutmann, “Secure Deletion of Data from Magnetic and Solid-State Memory”, 6th USENIX Security Symposium Proceedings, pp. 22-25 July, 1996, San Jose, California, 1996.
[4] Mather, Tim and Kumaraswamy, Subra and Latif, Shahed, “Cloud security and privacy: an enterprise perspective on risks and compliance”, O`Reilly Media, Inc., Sebastopol, CA, 2009.
[5] Garfinkel, S.L., Shelat, A., “Remembrance of data passed: A study of disk sanitization practices”, IEEE Security and Privacy, Vol. 1(1), pp. 17-27, 2003.
[6] T. Waizenegger, F. Wagner, “SDOS: Using Trusted Platform Modules for Secure Cryptographic Deletion in the Swift Object Store”, Proc. 20th International Conference on Extending Database Technology (EDBT), ISBN 978-3-89318-073-8, pp. 550–553, 2017.
[7] K. M. Ramokapane and J. M. Such, “Assured Deletion in the Cloud: Requirements, Challenges and Future Directions”,Proceedings of the 2016 ACM on Cloud Computing Security Workshop, pp. 97-108, NY, USA, 2016.
[8] Y. Luo and D. Wang, “Enabling Assured Deletion in the Cloud Storage by Overwriting”, Proceedings of the 4th ACM International Workshop on Security in Cloud Computing,pp. 17–23, NY, USA, 2016.
[9] F. Hao, D. Clarke, and A. F. Zorzo, “Deleting Secret Data with Public Verifiability,”IEEE Transactions on Dependable and Secure Computing, vol. 13, Issue. 6, pp. 617-628, 2015.
[10] S. Renuga, S. S. K. Jagetheeshwari, “Efficient Privacy-Preserving DataSanitization over Cloud Using Optimal GSA Algorithm”,The Computer Journal, Vol. 61, Issue 10, pp. 1577–1588, 2018.
[11] B. Chen, S. Jia, L. Xia, and P. Liu, “Sanitizing Data is Not Enough! Towards Sanitizing Structural Artifacts in Flash Media”,Proceedings of the 32nd Annual Conference on Computer Security Applications, ISBN: 978-1-4503-4771-6,pp. 496-507, California, USA, 2016.
[12] C. Y. B, J. Wang, X. Tao, and X. Chen, “Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage”, Information and Communications Security, Springer International Publishing, pp 445-458, Vol. 11149, 2018.
[13] C. Cachin, “Policy-based Secure Deletion”, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 259-270, Berlin, Germany, 2013.
[14] J. Reardon and H. Ritzdorf, “Secure Data Deletion from Persistent Media”,Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 271-284, Berlin, Germany, 2013.
[15] N. P. Karvelas and A. Kiayias, “Efficient Proofs of Secure Erasure”, Security and Cryptography for Networks, Springer Cham, pp. 520-537, Vol. 8642, 2014.
[16] M. Miao, J. Wang, J. Ma, and W. Susilo, “Publicly verifiable databases with efficient insertion / deletion operations”Journal of Computer and System Sciences archive, Vol. 86, Issue C, pp. 49-58, 2017.
[17] J. Reardon, D. Basin, and S. Capkun, “SoK : Secure Data Deletion”, 2013 IEEE Symposium on Security and Privacy, IEEE, pp. 1-15, Berkeley, CA, USA, 2013.
[18] J. Xiong et al., “A secure data self-destructing scheme in cloud computing”, IEEE Transactions on Cloud Computing, Vol. 2, Issue: 4, pp. 448-458, 2014.
[19] S. Ahmad and M. M. Afzal, “A Review of Assured Data Deletion Mechanism in Cloud Computing”, International Journal of Engineering & Technology, Vol. 7, pp. 329–332, 2018.
[20] H. Mu and Y. Li, “An assured deletion scheme for encrypted data in Internet of Things”, Advances in Mechanical Engineering, Vol. 11, No. 2, pp. 1–11, 2019.
[21] F. Shan et al., “An Attribute-Based Assured Deletion Scheme in Cloud Computing”, International Journal of Information Technology and Web Engineering (IJITWE), Vol.14, no. 2, pp. 74–91, 2019.
[22] A. Bentajer, M. Hedabou, K. Abouelmehdi, and S. El Fezazi, “An IBE-based design forassured deletion in cloud storage”, Journal Cryptologia, Taylor and Francis,Vol. 43, Issue. 3, pp. 1-12, 2019.
[23] D. Zhong, S. P. Liang, H. Xinfeng, D. U. Ruizhong, S. H. I. Pengliang, and H. E. Xinfeng, “Cloud data assured deletion scheme based on overwrite verification”,Journal on Communications, Vol. 40, Issue: 1,pp. 130-140, 2019.
[24] S. M. Diesburg and A. A. Wang, “A Survey of Confidential Data Storage and Deletion Methods”, ACM Computing Surveys (CSUR) Surveys, Vol. 43, Issue: 1, 2010.
[25] Y. Sun, J. Zhang, Y. Xiong, and G. Zhu, “Data Security and Privacy in Cloud Computing”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Vol. 2014, Volume 2014, Article ID 190903, 2014.
[26] L. Xue, Y. Yu, Y. Li, M. H. Au, X. Du, and B. Yang, “Efficient Attribute-based Encryptionwith Attribute Revocation for Assured Data Deletion”,Information Sciences, Vol. 479, pp. 640-650, 2018.
[27] Yang, X. Chen, and Y. Xiang, “Blockchain-Based Publicly Verifiable Deletion Scheme for Cloud Storage”, Journal of Network and Computer Applications, Vol. 103, pp. 185-193, 2018.
Citation
Seema B. Joshi, Shaileshkumar D. Panchal, "A Survey on Assured Data Deletion in Cloud Storage," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.548-553, 2019.