A Review of Mining Activities on Land Cover and Land Use Detection Technique in Remote Sensing
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.535-541, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.535541
Abstract
Land Use and Land Cover Change (LUCC) can reflect the pattern of human land use in a region, and plays an important role in space soil and water conservation. The study on the change of land use patterns in the world is of great significance to cope with global climate change and sustainable development. This paper reviews the main research progress of LUCC at home and abroad, and suggests that land use change has been shifted from land use planning and management to land use change impact and driving factors. The development of remote sensing technology provides the basis and data for LUCC with dynamic monitoring and quantitative analysis. However, there is no uniform standard for land use classification at present, which brings a lot of inconvenience to the collection and analysis of land cover data. Globeland30 is an important milestone contribution to the study of international LUCC system. More attention should be paid to the accuracy and results contrasting test of land use classification obtained by remote sensing technology.
Key-Words / Index Term
Remote Sensing, Land Use and Land Cover, Mining Activities, Classification
References
[1] Aaron E. M and Michael P.S., 2013. Assessing landform alterations induced by mountaintop mining. Natural Science,229-237.
[2] Abdelhafid Essalhi, Mourad Essalhi, Abdeslam Toummite, 2016. Environmental Impact of Mining Exploitation: A Case Studyof Some Mines of Barite in the Eastern Anti-Atlas of Morocco. Scientific Research Puplishing. Journal of Environmental Protection,7:1473-148.
[3] Abubakar, A. Z, 2015. effects of Urbanizationon Landuse/Landcoverchanges in Birnin KebbI, KEBBI STATE, NIGERIA. Msc. Thesis. Nigeria.
[4] Abudagga, B.A, 2015.Integrated Remot Sensing and Gis Techniques for Assesing and Mapping Landuse/Land cover Changes.Gaza Strip,Palestine.Msc Thesis.
[5] Addis Ababa Environmental Protection Agency (AAEPA), 2016. Quarry mining licensees in Addis Ababa.
[6] Addisu Amera, 2015.Effects of Urban Sprawl on the livelihood of suburban agricultural community: The case of Sara Ampol, Yeka Tafo and Chorizo Area, Yeka Sub City, Addis Ababa (Ethiopia).
[7] Ajayi, Michael Ajide Oyinloye and Gabriel Esan, 2015. Environmental Impact Assesment of Quarry Activitiesin OBA-ILE, Ondo State Nigeria. The Journal of MacroTrends in Energy and Sustainability Vol 3.
[8] Amna Butt, Rabia Shabbir, Sheikh Saeed Ahmad, Neelam Aziz, Mohammad Nawaz and Muhammad Tahir Ali Shah, 2015. Land cover classification and change detection analysis of rawal watershed using remote sensing data. Journal of Biodiversity and Environmental Sciences (JBES), 6: 236-248.
[9] Angela Akanwa O., Faustina Onwuemesi E. , Gladys Chukwurah O. and Maurice Officha C, 2016. Effects of Open Cast Quarrying Technique on Vegetation Cover and the Environment in South-Eastern Nigeria. American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), 21.
[10] Areendran, Prakash rao, Krishna Raj, Sraboni Mazumdar and Kanchan Puri, 2013. Land use/land cover change dynamics analysis in mining areas of Singrauli district in Madhya Pradesh, India. International Society for Tropical Ecology.
[11] Aswathy Asok,Smitha Asok V. and Rajesh Reghunath, 2016. Assessment of Temporal Changes in Land use Pattern over the Kinfra-Vizhinjam Stretch in Thiruvananthapuram City. International and Inter University Centre for Natural Resources Management.
[12] Kumar, Abdullah F. Alqurashi and Lalit, 2013. Investigating the Use of Remote Sensing and GIS Techniques to Detect Land Use and Land Cover Change: A Review."Advances in Remote Sensing 193-204.
[13] Lad, S. R. J. Samant J.S, 2014. Environmental and Social Impacts of Stone Quarrying-A CasE Study of KolhapuR District. International Journal of Current Research , 5664-5669.
[14] National Merological Agency of Ethiopia, 2016. Climate data from 1995-2016 in Addis abab bole,Akaki and kotebe stations.Norasmanizan Abdullah, M. N. (n.d). The Implementation of Preprocessing Data Through Remote Sensing and Gis Methods In Land Suitabilityand Soil Compaction Studies . School of Environmental Engineering, Universiti Malaysia Perlis .
[15] Reddy, Praveen Kumar Mallupattu and Jayarama Reddy Sreenivasula, 2013. Analysis of Land Use/Land Cover Changes Using Remote Sensing Data and GIS at an Urban Area, Tirupati, India. The ScientificWorld Journal.
Citation
P.Nithya, G. Arulselvi, "A Review of Mining Activities on Land Cover and Land Use Detection Technique in Remote Sensing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.535-541, 2018.
Enhancement of Power System Stability using FACTS devices
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.542-546, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.542546
Abstract
The dynamic system damping can be measured by using the rate of dissipation of transient energy. This paper deals with the different control methods for minimizing unwanted electromechanical perturbations and disturbances in power system with STATCOM (Static Compensator), SSSC (Static Synchronous Series Capacitor), and UPFC (Unified Power Flow Controller). A SMIB (Single Machine Infinite Bus) was simulated under several variations of situations. The results concluded depicts the functionality and robustness of these devices on power system stability.
Key-Words / Index Term
FACTS, STATCOM, TCSC, UPFC, Stability, Generator output power, Rotor Angle
References
[1] E.V. Larsen, D.A. Swann. Jones, “Applying power system stabilizers Parts I and II”, IEEE Trans.PAS, vol. 100, pp. 3017–3046. 1981.
[2] M.Noroozian, L. Anguish, M. Bhandari, and Anderson, “Use of UPFC for optimal power flow control”, IEEE Trans. on Power Systems, vol. 12, no. 4, pp. 1629–1634. 1997.
[3] Mehrdad Ahmadi Kamarposhti, MostafaAlinezhad, “Effects of STATCOM, TCSC, SSSC and UPFC on Static Voltage Stability”, International Review of Electrical Engineering, vol. 4, no. 6, pp. 1376–1382. 2009.
[4] E. Z. Zhou, “Application of Static VAR Compensators to increase Power System Damping”, IEEE Transactions on Power System, vol. 8, no. 2, pp. 655–661. 1993.
[5] P. Kundur, Power System Stability and Control, Example13.1, page 863 McGraw-Hill, New York, 1994.
[6] Siddhartha Panda and Cardio, “Real coded genetic algorithm for robust power system stabilizer”, World Academy of Science Engineering and Technology, vol.
45, pp.571 –579.2008.
[7] M.H. Hague, “Improvement of first stability limit by utilizing full benefit of shunt FACTS devices”, IEEE transactions on power systems, vol. 19, no.4, pp. 1894 – 1902. November 2004.
[8] H.F. Wang, “Static synchronous series compensator to damp power system oscillations”, Electric Power System Research, vol.54, no.4, pp.113–119. 2000.
[9] “Optimal allocation and sizing of SSSC controller to minimise power production cost and transmission loss” by Shuma Adikari and Nidul Sinha, International Journal of Computer Science and Engineering, Vol.7, Issue 3, July 2012
[10] Eskandar Gholipour and Shahrokh Saadate, “Improving Transient Stability of Power Systems” International Journal of Computer Science and Engineering.
Citation
Shailesh U. Kakaiya, Okumu Cephas, Geeta N. Paichaure, Bhupendra R. Parekh, "Enhancement of Power System Stability using FACTS devices," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.542-546, 2018.
Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.547-552, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.547552
Abstract
Today the capabilities of mobile devices have improved real world user friendly applications, storage and feature support. The storage capacity can tremendously be increased with the use of cloud computing. Cloud computing is a flexible, cost effective and proven delivery platform for providing services. Mobile cloud computing means the availability of cloud computing services in a mobile environment. There are various authentication techniques being used like password, log off system, Biometric techniques. This process serves as a protection against different sorts of attacks where the goal is to confirm the identity of a user and the user requests services from cloud servers. Multiple authentication technologies have been put forward so far that confirm user identity before giving the permit to access resources. Authentication in cloud was fully explained in this paper together with the existing methods and the factors with its limitations.
Key-Words / Index Term
cloud computing , mobile cloud computing, authentication techniques
References
[1] Yogesh patel, Nidhi sethi, “Enhancing Security in Cloud Computing using Multilevel Authentication”,International Journal of Electrical and Electronics & computer Science Engineering, Vol. 1, Issue 1, February 2014, ISSN: 2348-2273, pp. 320-325.
[2] DeeptiSahu, Shipra Sharma, VandanaDubey, AlpikaTripathi” Cloud Computing in Mobile Applications”InternationalJournal of Scientific and Research Publications, Volume 2,Issue 8, August 2012.
[3] Wikipedia, http://en.wikipedia.org/wiki/MCC_stored data.
[4] Her Tyan Yeh, Bing chang chen, Yi-cong wu, “Mobile user Authentication System in Cloud Environment”,International Journal of Security and Communication Networks, November 2012, pp. 74-79.
[5] Indrajit Das, Riya Das, “Mobile Security (OTP) by Cloud Computing”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2, Issue 4, August 2013, ISSN: 2319-1058, pp. 114-118.
[6] Mahnoush Babau Zadeh, Majit Bhaktiari, Mohol Aizaini Maar, “Keystroke Dynamic Authentication in Mobile Cloud Computing”, International Journal of Computer Applications, Vol. 90, No.1, March 2014, ISSN: 0975-8887, pp. 35-39.
[7] Jin mookkim, Jeong-Kyung moon, “Secure Authentication System for Hybrid Cloud service in Mobile Communication Environments”, International Journal of Distributed Sensor Networks, Vol. 2, July 2014, pp. 62-66.
[8] Davit Hakobyan, “Authentication and Authorization Systems in Cloud Environments, International Journal of Information and Communication Technology, Vol. 4, Issue 5, October 2012, pp. 165-169.
[9] Richard Chaw, Markus Jakobsson, Ryusuke Arasuoka, “Authentication in the Clouds: A Framework and its Application to Mobile Users”, CCSW, ACM, October 2012, pp. 352-358.
[10] R. Gokaj, M. Ali Aydin, R, Selami Z bey, “Mobile Cloud Authentication and Secure Communication”, In Proc. of International Conference on Information Security and Cryptology, September 2013, pp. 42-45.
[11] Google books accessed via,http://books.google.com (2016)
[12] R. W. Lucky, “Cloud computing”, IEEE Journal of Spectrum, Vol. 46, No. 5, May 2009, pages 27-45.
[13] cloud computing, www.wikipedia.com.
[14]http://www.crn.com/news/cloud/231900862/box-net-one-ups-apple-icloud-with-50-gb-free-cloud-storage.htm
Citation
Manjusha Anant Shinde, Jadhav Shradha Ramesh, "Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.547-552, 2018.
Security Testing on Web Based Application
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.553-557, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.553557
Abstract
Prime objective of security testing [1] is to find out how vulnerable a system may be and to determine whether its data and resources are protected from potential intruders. Online transactions have increased rapidly of late making security testing as one of the most critical areas of testing for such web applications. Now a days, privacy and security play an important role. Software applications need to focus on data and its operations security which requires urgent attention, but it’s ignored. Security resembles the essential feature in software. In fact, our main intention is to focus on the web based testing which is one of the types of application testing with its importance, implementation and its methodologies that has been defined from developer’s point of view which is extremely helpful to the developers. Software Testing is an important process in SDLC [2] which provides assurance for quality to both software developer’s (Company) and users as well. Just like testing the performance of an application, it is also important to perform security testing before the app is open to real users. Security testing is performed to detect vulnerabilities in an application, while ensuring that the data is protected and that the application works as required .Web testing is a software testing practice to test the websites or web applications for potential bugs. It’s a complete testing of web-based applications [3] before making live. A web-based system needs to be checked completely from end-to-end before it goes live for end users [4]. By performing web site testing, an organization can make sure that the web-based system is functioning properly and can be accepted by real-time users. The UI design and functionality are the captains of website testing.
Key-Words / Index Term
Security Testing, Software Tesing, Web based Testing, Web-based Applications
References
[1] Gu Tian-yang, Shi Yin-sheng, and Fang You-Yuan, “Research on Software Security Testing”, World Academy of Science, Engineering and Technology, Vol. 70, p 647-651, September 2010.
[2] Qianxiang WANG, Lining QUAN, Fuchen YING, ―Online Testing of Web-Based Applications‖, 0730-3157/04 2004 IEEE.
[3] K.K. Aggarwal, Yogesh Singh, “Software Engineering”, (3rd ed.), Copyright © New Age International Publishers, 01-Jan-2005.
[4] Yu Qi, David Kung and Eric Wong, ―Leveraging User-Session Data to Support Web Application Testing‖, IEEE Transactions on Software Engineering, vol. 31, no. 3, March 2005.
[5] Gencer Erdogan, Ketil Stolen, "Risk-driven Security Testing versus Test-driven Security Risk Analysis", First Doctoral Symposium on Engineering Secure Software and Systems.
[6] Mohd. Ehmer Khan& Farmeena Khan, “A Comparative Study of White Box, Black Box and Grey Box Testing Techniques”, International Journal of Advanced Computer Science and Applications, (IJACSA) Vol. 3, No.6, 2012.
[7] Jovanovich, Irena, “Software Testing Methods and Techniques”.
[8] Ould, M. A. (1999). Managing software quality and business risk. Chichester: John Wiley & Sons.
[9] B. Potter, G. McGraw, “Software Security Testing,” IEEE Security & Privacy, v2, n5, 81-85, Sept.-Oct. 2004.
[10] S. Barnum, G. McGraw, “Knowledge for Software Security”, IEEE Security & Privacy, v3, n2, 74- 78, March-April 2005.
[11] Thompson, H.H., “Why security testing is hard”, IEEE Security & Privacy, v 1, n 4, 83-6, July-Aug. 2003.
[12] DeMarco, T. and T. Lister (2003). Waltzing with Bears: Managing Risk on Software Projects. New York: Dorset.
[13] Bruce Potter & Gary McGraw, “Software Security Testing”, IEEE Security & Privacy, 2004, pp. 32-36.
[14] Suhel Ahmad Khan, Raees Ahmad Khan “Software Security Testing Process”, Proc. of the Intl. Conf. on Recent Trends In Computing and Communication Engineering-- RTCCE 2013, p39-42.
[15] J. Viega and G. McGraw, Building Secure Software: How to Avoid Security Problems the Right Way, Addison Wesley, 2001.
[16] Arora A., Sinha M. ―Web Application Testing: A Review on Techniques, Tools and State of Art‖, International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 ISSN 2229-5518.
[17] G. McGraw, “Testing for Security During Development: : Why We Should Scrap Penetrate-and-Patch,” IEEE Aerospace and Electronic Systems, Vol. 13, no. 4, 1998, pp 13-15.
Citation
A. Punitha, D. Sukanya Bai, K. Lavanya, "Security Testing on Web Based Application," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.553-557, 2018.
A Hybrid Audio Steganography Method
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.558-562, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.558562
Abstract
In this era of smartphones and gadgets assisted by high speed internet connectivity, the volume of data transmission and storage have gained a lot. As a result data security and confidentiality has become more important issue than ever. Steganography is one data hiding technique which helps to send some secret message to the receiver by concealing it in a cover file. In this paper, we have focused on the Audio Steganography method. The major challenge in audio steganography is to obtain robust high capacity steganographic systems. This paper presents a secure data transfer technique using Audio Steganography. Here we have proposed a hybrid method combining modified Least Significant Bit (LSB) and spread spectrum based audio steganography methods. We have implemented the proposed method and compared the results with the other methods using two quality measurement techniques, namely, Peak signal to noise ratio (PSNR) and Mean Square Error (MSE).
Key-Words / Index Term
Audio Steganography, confidentiality, Data security, Internet, Peak signal to noise ratio(PSNR), Mean Square Error(MSE)
References
[1] M. Zamani, A. B. A. Manaf, R. B. Ahmad, F. Jaryani, H. Taherdoost, A. M. Zeki, "A Secure Audio Steganography Approach", Internet Technology and Secured Transactions, 9-12 Nov. 2009.
[2] G. Nehru, P. Dhar, “A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, PP 1694-0814,2012.
[3] B. G. Kodge, “Information Security: A Review on Steganography with Cryptography for Secured Data Transaction”, International Journal of Scientific Research in Network Security and Communication, Volume-5, Issue-6, PP 1-4, 2017.
[4] Sanju, Y. Mamta, “Audio Steganography”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 3, Issue 6, PP 66-70, 2018
[5] N. Cvejic and T. Seppnen, “Increasing the capacity of LSB based audio steganography”, In the Proceeding of 5th IEEE International Workshop on Multimedia Signal Processing, pp. 336338, 2002.
[6] S. Roy, A.K. Singh, J. Parida and A. S. Sairam, “Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization”, In the Proceeding of CCSEIT-12, India, 2012.
[7] H. Kumar, Anuradha, “Enhanced LSB technique for Audio Steganography”, In the Proceeding of ICCCNT`12, India, 2012.
[8] A. Mane, G. Galshetwar and A. Jeyakumar, “Data Hiding Technique: Audio Steganography using LSB Technique”, International Journal of Engineering Research and Applications Vol. 2, Issue 3, 2012.
[9] P. P. Balgurgi, S. K. Jagtap, “Audio Steganography Used for Secure Data Transmission,” In Proceedings of International Conference on Advances in Computing, pp. 699–706, India, 2012.
[10] K. Geetha, P. V. Muthu, “Implementation of ETAS (embedding text in audio signal) model to ensure secrecy,” International Journal on Computer Science and Engineering, vol. 2, no. 4, pp. 1308–1313, 2010.
[11] M. Wakiyama, Y. Hidaka, K. Nozaki, “A Novel Phase Coding Technique for Steganography in Auditive Media”, In Proceedings of Sixth International Conference on Availability, Reliability and Security, IEEE 2011.
[12] Z. Kexin, “Audio Steganalysis of Spread Spectrum Hiding Based on Statistical Moment”, In Proceedings of 2nd International Conference on Signal Processing Systems (ICSPS-2010), IEEE, vol. 3, pp. 381-384, 2010.
[13] M. Nutzinger, C. Fabian, M. Marschalek, “Secure Hybrid Spread Spectrum System for Steganography in Auditive Media”, In Proceedings of Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing ,IEEE, pp. 78-81,2010.
[14] F. Rezaei, T. Ma, M. Hempel, D. Peng, H. Sharif, “An Anti-Steganographic Approach for Removing Secret Information in Digital Audio Data hidden by Spread Spectrum Methods”, In Proceedings of IEEE Communication and Information Systems Security Symposium , 2013.
[15] F. Djebbar, B. Ayad, H. Hamam, K. Abed-Meraim, “A view on latest audio steganography techniques,” in Proceedings of the 7th International Conference on Innovations in Information Technology (IIT), pp. 409–414, United Arab Emirates, 2011.
[16] R. Kaur, J. Bhatia, H. S. Saini, R. Kumar, "Multilevel Technique to Improve PSNR and MSE in Audio Steganography" International Journal of Computer Applications , Volume 103, No.5,pp 1-4, 2014.
Citation
T. Acharjee, A. Choudhury, P. Kumar, "A Hybrid Audio Steganography Method," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.558-562, 2018.
Effect of Thermal Radiation on a Linearly Accelerated Vertical Plate with Variable Mass Diffusion and Uniform Temperature Distribution in a Rotating Medium
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.563-569, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.563569
Abstract
A theoretical study has been done on the effect of radiative heat transfer on a linearly accelerated vertical plate with variable mass diffusion and uniform temperature distribution where the plate is placed in a rotating medium. A grey fluid is considered here, which has the tendency to absorb and emit radiation without any scattering. The dimension parameters of various quantities such as temperature, concentration, etc., are converted into dimensionless quantities. The converted dimensionless quantities are introduced and substituted in the governing equations with appropriate boundary conditions and an exact solution is obtained using the Laplace Transform technique for the complex velocity. In this paper, the effects of primary velocity and secondary velocity were scrutinized by varying various parameters such as radiation, thermal Grashof’s number, mass Grashof’s number, and rotational parameter. The temperature and concentration profiles of the plate were also studied in this paper by varying Prandtl number and Schmidt’s number respectively.
Key-Words / Index Term
Accelerated Vertical plate, mass diffusion, radiative heat transfer, uniform temperature, rotation, and concentration.
References
[1] E. Hemalatha and N. Bhaskar Reddy, “Effects of thermal radiation and chemical reaction on MHD free convection flow past a moving vertical plate with heat source and convective surface boundary condition”, Advances in Applied Science Research, Vol.6(9), pp. 128-143, 2015.
[2] V. M. Soundalgekar, “Effects of mass transfer on flow past a uniformly accelerated vertical plate,” Letters in heat and mass transfer, Vol. 9, pp. 65-72, 1982.
[3] A. J. Chamkha , M. C. Raju , T. Sudhakar Reddy and S. V. K. Varma, “Unsteady MHD free convection flow past an exponentially accelerated vertical plate with mass transfer, chemical reaction And thermal radiation”,International Journal of Microscale and Nanoscale Thermal and Fluid Transport Phenomena, Vol. 5, Issue 1, pp: 57-75, 2014.
[4] A. G. V. Kumar, S. V. K. Varma, “Thermal diffusion and radiation effects on unsteady MHD flow past an impulsively started exponentially accelerated vertical plate with variable temperature and variable mass diffusion”, Int. J. Appl. Math. Anlys. and appl. Vol.6, pp. 191-214, 2011.
[5] M. C. Raju, S.V.K Varma, N. Ananda Reddy, “Radiation and mass transfer effects on a free convection flow through a porous medium bounded by a vertical surface”, J. Future Engg. and Tech. Vol.7 (2), pp. 7-12, 2012.
[6] Hossain MA and Takhar HS, “Radiation effect on mixed convection along a vertical plate with uniform surface temperature”. Heat Mass Transfer. Vol.31, pp. 243-248, 1996.
[7] R. C. Chaudhary, Arpita Jain, “Combined heat and mass transfer effects on MHD free convection flow past an oscillating plate embedded in porous medium”, Rom. Journ. Phys., Vol. 52, Nos. 5–7, pp. 505–524, Bucharest, 2007.
[8] K. Anwar, “MHD unsteady free convection flow past a vertical porous plate”, ZAMM, Vol.78, pp. 255-270, 1998.
[9] Agrawal A K, Samria N K, and Gupta S N, “Study of heat and mass transfer past a parabolic started infinite vertical plate”, Journal of Heat and mass transfer, Vol.21, pp.67-75, 1999.
[10] A R Vijayalakshmi, Albert Paul Florence Kamalam, “Combined effects of thermal radiation and MHD of flow past an accelerated vertical plate in a rotating fluid with variable temperature” - International Journal of Science and Research (IJSR), pp. 384-388, 2008.
[11] Jyotsna Rani Pattnaik, Gouranga Charan Dash, SupravaSingh, “Radiation and mass transfer effects on MHD flow through porous medium past an exponentially accelerated inclined plate with variable temperature”, Ain Shams Engineering Journal, Vol. 8, Issue 1, pp. 67-75, 2017.
[12] Tasawar Hayat, Sajid Qayyum, Ahmed Alsaedi and Saleem Ashgar“Radiation effects on the mixed convection flow induced by an inclined stretching cylinder with non-uniform heat source/sink”, PLoS One, Vol.12(4): e0175584, 2017.
[13] Abramowitz, B.M. and Stegun, I.A., "Hand Book of Mathematical Functions with Formulas, Graphs and Mathematical Tables", Washington, U.S. Govt. Printing, 1964.
Citation
S. Mohana Murali, A.R. Vijayalakshmi, "Effect of Thermal Radiation on a Linearly Accelerated Vertical Plate with Variable Mass Diffusion and Uniform Temperature Distribution in a Rotating Medium," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.563-569, 2018.
Machine Learning Tools and Toolkits in the Exploration of Big Data
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.570-575, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.570575
Abstract
Machine learning (ML) is the best way to make progress towards human level artificial intelligence, which allows software applications to become more accurate in predicting results. It is the most promising technique that has profound realization in reorganizing practices pertaining to various fields viz. healthcare, education world industry, retail and manufacturing sectors, traffic and urban planning etc. The compilation and storage followed by specific training of the stored data are some of the salient features of the machine learning process that has tremendous scope in discovering novel output in various relevant fields. There are plenty of tools in ML that may help in the training of data without being explicitly programmed. Tools are categorized into- framework, platform, library, and interface. For the successful development and effective execution of ML, one can categorically manipulate various related tools. Working through such tools advances the process as applied to the various applications. In the present study, we intend to exploit recommendation engines for the development of tools that can handle the huge quantity of data. The usage of the overwhelming quantity of multimodal data and streamlining the same for its personalized usage are some of the unique features of the study. We also focus on the evaluation of a toolkit with loads of data and furthering several ML tools along with their features and use for the desired application in the relevant field.
Key-Words / Index Term
Big data, Application Programming Interface (API), Command Line Interface (CLI), Graphic User Interface (GUI), Machine learning, Tool, Toolkits, Platform, Library, Interface
References
[1] https://www.simplilearn.com/what-is-machine-learning-and-why-it-matters-article
[2] https://dzone.com/articles/5-open-source-machine-learning-frameworks-and-tool
[3] https://www.forbes.com/sites/ciocentral/2018/02/28/gartner-magic-quadrant-whos-winning-in-the-data-machine-learning-space/
[4] J. V. N. Lakshmi and A. Sheshasaayee, “A Big Data Analytical Approach for Analyzing Temperature Dataset using Machine Learning Techniques,” Int. J. Sci. Res. Comput. Sci. Eng., vol. 5, no. 3, pp. 92–97, 2017.
[5] C. E. Sapp, “Preparing and Architecting for Machine Learning,” 2017.
[6] https://www.gartner.com/it-glossary/big-data/
[7] https://www.quora.com/How-are-big-data-and-machine-learning-related
[8] Rakesh. S.Shirsath, VaibhavA.Desale, Amol. D.Potgantwar, "Big Data Analytical Architecture for Real-Time Applications", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.1-8, 2017
[9]https://www.forbes.com/sites/ciocentral/2018/02/28/gartner-magic-quadrant-whos-winning-in-the-data-machine-learning-space/#3995d9407dab
[10] https://www.sas.com/en_us/insights/analytics/machine-learning.html
[11] https://towardsdatascience.com/gui-fying-the-machine-learning-workflow-towards-rapid-discovery-of-viable-pipelines-cab2552c909f
[12] https://machinelearningmastery.com/machine-learning-tools/
[13] https://knowm.org/machine-learning-tools-an-overview/
[14] https://blogs.opentext.com/choosing-the-right-programming-language-for-machine-learning-algorithms-with-apache-spark/amp/
[15] https://medium.com/@UdacityINDIA/machine-learning-programming-languages-why-is-the-best-and-why-56f9f370cb99
[16] https://www.analyticsindiamag.com/machine-learning-framework-10-need-know/
[17] https://searchenterpriseai.techtarget.com/feature/How-to-make-a-wise-machine-learning-platforms-comparison
[18] V. Vinothina, “MACHINE LEARNING TOOLS-AN OVERVIEW,” in International Conference on Recent Trends in Engineering Science, Humanities and Management, 2017, pp. 629–637.
[19] https://www.oreilly.com/ideas/square-off-machine-learning-libraries
[20] https://machinelearningmastery.com/tour-weka-machine-learning-workbench/
[21] https://bookdown.org/rdpeng/rprogdatascience/history-and-overview-of-r.html
[22] https://en.wikipedia.org/wiki/SciPy
[23] https://github.com/scikit-learn/scikit-learn
[24] https://github.com/EdwardRaff/JSAT
[25] http://accord-framework.net/intro.html
[26] Pylearn2 Documentation Release dev, LISA lab, University of Montreal, 2015.
[27] https://www.csie.ntu.edu.tw/~cjlin/libsvm/
[28] Thomas A. Henzinger, Anmol V. Singh, Vasu Singh, Thomas Wies,DamienZufferey, “Static Scheduling in clouds”
[29] Mike Gashler, “Waffles: A Machine Learning Toolkit”, Journal of Machine Learning Research, 12 (2011), 2383-2387.
[30] G.Holmes, A.Donkin, I.H Witten, “WEKA: a machine learning workbench”, Proceedings of Second Australian and New Zealand conferences on Intelligent Information System, 1994.
[31] https://www.predictiveanalyticstoday.com/knime/
[32] https://rapidminer.com/products/studio/feature-list/
[33] https://orange.biolab.si/#Orange-Features
[34] http://126kr.com/article/yucgkiovd
[35] S¨orenSonnenburg et.al, “The SHOGUN Machine Learning Toolbox”, Journal of Machine Learning Research 11 (2010) , 1799-1802.
[36] https://mahout.apache.org/docs/latest/index.html
[37] http://cloudacademy.com/blog/aws-machine-learning/
[38] https://www.microsoft.com/en-us/research/blog/microsoft-open-sources-distributed-machine-learning-toolkit-for-more-efficient-big-data-research/
[39] https://www.predictiveanalyticstoday.com/microsoft-azure-machine-learning/
[40] https://spark.apache.org/mllib/
Citation
Afreen Khan, Swaleha Zubair, "Machine Learning Tools and Toolkits in the Exploration of Big Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.570-575, 2018.
Operating Systems for Mobiles until late 2018: A Comparative Survey and Overview
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.576-581, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.576581
Abstract
Smart phones and other latest technologies have been, and continue to be emerging in today’s world. The same has been observed to be showcased by the operating systems that supplement each of the said technologies. There are multiple operating systems available today and some of the select operating systems have been made compatible across various devices. For instance, macOS developed by Apple Inc for their lineup of Mac products can synchronize seamlessly with the iOS for other products from the same manufacturer while still promoting collaboration between their phone and laptop lineups. A universal platform was proposed by Microsoft to function across their range of laptops and smart phones. Also, Android which began for smart phones has now been extended to its own version for automobiles. At the same time, there are millions of new releases, both familiar and unfamiliar directed towards dominating the market today. All of these advancements raise questions as to which operating system is to be relied upon and for which application has the ability to outperform one another. This paper is dedicated specifically towards mobile operating systems employed by leading manufacturers followed by a parallel analysis of the same.
Key-Words / Index Term
Smartphones, Android, iOS, Mobile Technology, Mobile Operating Systems
References
[1] Bhargavi Padhya, Prasad Desai and Prof. Dipti Pawade, “Comparison of Mobile Operating Systems,” International Journal of Innovative Research in Computer and Communication Engineering, Volume 4, Issue 8, August 2016.
[2] Kiran Bala, Sumit Sharma and Gurpreet Kaur, “A Study on Smartphone based Operating System,” International Journal of Computer Applications, Volume 1, Issue 1, July 2015.
[3] Ankit Tiwari, “Comparative Analysis of Smartphone Operating System Android Apple iOS and Windows,” International Journal of Advance Research in Science and Engineering, Volume 6, Issue 10, October 2017.
[4] J Kiran Kumar and D Yugandhar, “A Study on Current Mobile Operating Systems,” International Journal of Scientific and Engineering Research, Volume 8, Issue 5, May 2017.
[5] Ms.Manasi Balasaheb Patil, Mr.Rohan Kishor Joshi, Mrs.Neha Chopade, “Comparative Study of Android and Windows Operating System,” International Journal of Current Trends in Engineering and Research, Volume 3, Issue 6, June 2017.
[6] K Divya and S Venkata Krishna Kumar, “Comparative Analysis of Smart Phone Operating Systems Android iOS and Windows”, International Journal of Scientific Engineering and Applied Science, Volume 2, Issue 2, February 2016.
[7] T N Sharma, Mahender Kr.Beniwal, Arpita Sharma, “Comparative Study of Different Mobile Operating Systems”, International Journal of Advancements in Research and Technology, Volume 2, Issue 3, March 2013.
[8] Aaditya Jain, Samridha Raj and Dr.Bala Buksh, “A Comparative Study of Mobile Operating Systems with Special Emphasis on Android OS”, International Journal of Computer and Mathematical Sciences, Volume 5, Issue 7, July 2016.
[9] Sundus Ayyaz and Saad Rehman, “The Most Secure Smartphone Operating System: A Survey,” World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Volume 10, Issue 2, 2016.
[10] Okediran O O, Arulogun O T, Ganiyu R A and Oyeleye C A, “Mobile Operating Systems and Application Development Platforms: A Survey,” International Journal of Advanced Networking and Applications, Volume 6, Issue 1, 2014.
[11] Ankit Tiwari, “Comprehensive Analysis of Smartphone OS Capbilities and Performance”, International journal of advanced research in Science and engineering,Vol-6 ,Issue-11,2017.
[12] Wei, M., Chandran, A., Chang, H.-P., Chang, J.-H. and Nichols, C. (2009) Comprehensive Analysis of Smartphone OS Capbilities and Performance.
[13] Albazaz, D. (2012) Designing a Mini-Operating System for Mobile Phone. The International Arab Journal of Information Technology, 9, 1-2.
[14] Sharma, T.N., Beniwal, M.Kr. and Sharma, A. (2013) Comparative Study of Different Mobile Operating Systems. International Journal of Advancements in Research & Technology, 2, 1-2.
[15] T.N.Sharma, Mahender Kr. Beniwal, Arpita Sharma, "Comparative study of different mobile operating system." Int. J. Adv. Res. Technol 2.3 (2013).
[16] The Blackberry MDS Runtime Environment. http://www.rim.com/symposium/press/pdf/BlackBerry_Mobile_Data_System_4.pdf
[17] BlackBerry Java Development Environment, Fundamental Guide. http://docs.blackberry.com/zh-cn/developers/deliverables/4526/BlackBerry_Java_Development_Environment-4.7.0-US.pdf
[18] Van der Hoorn, H. (2010) A Survey of Mobile Platforms for Pervasive Computing. Master’s Thesis, University of Groningen, Groningen, 16-36.
[19] Xiao Feng Li, Yong Wang, Jackie Wu, Kerry Jiang, Bing Wei Liu, “Mobile OS Architecture Trends”, Intel Technology Journal, Vol. 16, Issue 4, 2012.
[20] Rina , “A Comparative Analysis of mobile Operating Systems”, Internatinal journal of Computer science and engineering , Volume-6 , Issue-12 , Page no. 70-74, Dec-2018.
[21] Shinto urian K1 , K.Nirmala 2, “Mobile OS - High Level Glance”, Internatinal journal of Computer science and engineering, Volume-6 , Issue-11 , Page no. 182-193, Nov-2018.
Citation
Boppuru Rudra Prathap, "Operating Systems for Mobiles until late 2018: A Comparative Survey and Overview," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.576-581, 2018.
An Overview of Data Mining Techniques and its Realtime Applications
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.582-587, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.582587
Abstract
Data mining, also prevalently referred as Knowledge innovation from data, is the robotic or expedient withdrawal of patterns representing information implicitly hoard or confined in huge databases, data warehouses, the web, the data streams or other enormous information repositories. Data mining is the expertise that congregates up to the dispute of solving our pursuit for acquaintance from these cosmic data burdens. It affords us with a client oriented loom to novel concealed prototypes in data. This paper accomplishes a prescribed assessment of the perception of data-mining, the typical tasks engross in data-mining, its relevance in day to day field, techniques and methodology. In additional to that, this paper affords insight for concerning the data mining to vindicate the patterns and trends to be utilized suitably and to be a supportive for beginners in the research of data mining. The core intention of this manuscript is to congregate more interior perceptions and skills in data mining.
Key-Words / Index Term
Artificial Intelligence, Time series analysis, Regression, Prediction
References
[1] Kaithekuzhical Leena Kurien and Dr. Ajeet Chikkamannur, ”A Survey on Methodology of Fraud Detection using Data Mining”, International Journal of Trend in Scientific Research and development, Vol.1 ,Issue.6, pp. 38-42, 2017.
[2] D. Ramesh, B. Vishnu Vardhan, “Data Mining Techniques and Applications to Agricultural Yield Data”, International Journal of Advanced Research in Computer and Communication Engineering Vol.2, Issue.9, September 2013.
[3] Fayyad. U, Piatetsky-Shapiro. G., and Smyth. P, ”From Data Mining to Knowledge Discovery: An Overview”, MIT Press, pp.1-36,1996.
[4] H. Benjamin Fredrick David and A. Suruliandi, “Survey on Crime analysis and Prediction using Data mining techniques”, ICTACT Journal on Soft Computing, Vol.7, Issue.3, pp.1459-1466, 2017.
[5] R. Tamilsevi and S. Kalaiselvi, “An Overview of Data Mining Techniques and Applications”, International Journal of Science and Research, Vol.2, Issue.2, pp. 506-509, 2013.
[6] “Data mining tools”, by Ralf Mikut, Markus Reischl, 2011, “Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery”.
[7] Er. Rimmy Chuchra, “Use of Data Mining Techniques for the Evaluation of Student Performance: A Case Study” International Journal of Computer Science and Management Research Vol.1, Issue.3, October 2012.
[8] K. Chitra Lekha and Dr. S. Prakasam, “Data mining Techniques in detecting and predicting Cyber crimes in Banking sector”, IEEE – International Conference on Energy, Communication, Data Analytics and Soft Computing, No. 3, August 2017.
[9] Aakanksha Bhatnagar, Shweta P. Jadye, Madan Mohan Nagar” Data Mining Techniques & Distinct Applications: A Literature Review” International Journal of Engineering Research & Technology (IJERT) Vol.1 Issue 9, November- 2012.
[10] Ruxandra-Ştefania PETRE, “Data mining in Cloud Computing” Database Systems Journal vol. III, no. 3/2012.
[11] K. Chitra Lekha and Dr. S. Prakasam, “Implementation of Data mining techniques for Cyber crime Detection”, International Journal of Engineering, Science and Mathematics, Vol.7, Issue.4, pp. 607-613, 2018.
[12] K.Chitra Lekha and Dr. S. Prakasam, “A Survey on Data Mining Techniques in Cyber Crime”, IEEE –International Conference on Electrical, Electronics, Computers, Communications, Mechanical and Computing, No.2, January 2018.
[13] Mr. S. P. Deshpande and Dr. V. M. Thakare “Data Mining System and Applications: A Review” International Journal of Distributed and Parallel systems, Vol.1, Issue1, September 2010.
[14] Dr. E. Kesavulu Reddy, “Recent Trends in Data mining Techniques”, International Journal of Advance research in Computer Science and Management Studies, Vol.3, Issue.9, pp. 254-262, 2015.
[15] H.-P. Kriegel, K. M. Borgwardt, P. Kröger, A. Pryakhin, M. Schubert, and A. Zimek, “Future trends in data mining,” Data Mining Knowledge Discovery,Vol.15, Issue.1, pp.87-97, 2007.
Citation
K. Chitra Lekha, S. Prakasam, "An Overview of Data Mining Techniques and its Realtime Applications," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.582-587, 2018.
Hemodynamics Effects on Blood Movement through an Artery
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.588-593, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.588593
Abstract
Mathematical simulation of blood movement in the arterial system certainly provides the nature and physiology of the creature body. Hemodynamic play the main role to build arterial single or multiple stenoses in the body, which indicate to the abnormalities of the cardio system. Blood functioning, especially in the diseased arteries can be identified by mathematical simulation. Applications of mathematical simulation can be used in surgical planning and configuration of medical devices. The arteries are such organs which can accept the change in varying hemodynamic conditions. In some cases, unusual hemodynamic impacts make an abnormal clinically response. The stenosis becomes the reason for turbulence and flows choking. In the arrival time, the investigation of arterial blood movement will give the prediction of hemodynamic movements in any patient. The advancement of clinical tools to identify the disease and modeling of devices will give better results.
Key-Words / Index Term
Hemodynamic, Stenosis, Artery, Blood Flow
References
[1] D. F. Young, “Effect of a time-dependent stenosis on flow through a tube”, Journal of Engineering for Industry, Vol.90, Issue.2, 248-254, 1968.
[2] D. F. Young and F. Y. Tsai, “Flow characteristics in models of arterial stenosis-I, Steady flow”, Journal of Biomechanics, Vol.6, 395-410, 1973.
[3] D. F. Young, N. R. Cholvin, L. K. Richard, A. C. Roth, “Hemodynamics of arterial stenosis at elevated flow rate”, Circulation Res., Vol.41, 99-107, 1977.
[4] Y.L. Cho and K.R. Kensey, “Effects of the Non-Newtonian Viscosity of Blood Hemodynamic of Diseased Flows: Part 1, Steady Flow”, Biorheology, Vol.28, Issue.3, 241-262, 1991.
[5] C. A. Taylor, T. J. Hughes and C. K. Zarins, “Finite element modeling of blood flow in arteries”, Computer methods in applied mechanics and engineering, Vol.158, 155–196, 1998.
[6] R.N. Pralhad and D.H. Shultz, “Modeling of arterial stenosis and its applications to blood diseases”, Journal of Mathematical Biosciences, Vol.190, Issue.2, 203- 220, 2004.
[7] J. C. Misra, and G. C. Shit, “Blood flow through arteries in a pathological state: A Theoretical Study”, International Journal of Engineering Science, Vol.44, Issue.10, 662-671, 2006.
[8] F. Yilmaz and M. Y. Gundogdu, “A critical review on blood flow in large arteries; relevance to blood rheology, viscosity models, and physiologic conditions”, Korea-Australia Rheology Journal, Vol.20, Issue.4, 197-211, 2008.
[9] M. K. Sahu, S. K. Sharma and A. K. Agrawal, “Study of arterial blood flow in stenosed vessel using non-Newtonian couple stress fluid model”, International Journal of Dynamics of Fluids, Vol.6, 209–218, 2010.
[10] I. Abdullah, N. Amin, “A micropolar fluid model of blood flow through a tapered artery with a stenosis”, Mathematical methods in applied sciences, Vol.33, 1910–1923, 2010.
[11] R. Bali, and U. Awasthi, “A Casson fluid model for multiple stenosed artery in the presence of Magnetic field”, Applied Mathematics, Vol.3, Issue.5, 436-441, 2012.
[12] P. Mathur and S. Jain, “Mathematical modeling of non- Newtonian blood flow through artery in the presence of stenosis”, Applied Mathematical Biosciences, Vol.4, Issue.1, 1-12, 2013.
[13] T. Blessy and K. S. Sumam, “Blood Flow in Human Arterial System-A Review”, ICETEST & Procedia Technology, Vol.24, 339–346, 2016.
[14] M.Y.A. Jamalabadi, A. A. A. Bidokhti, H. K. Rah and P. Hooshiar, “Numerical Investigation of Oxygenated and Deoxygenated Blood Flow through a Tapered Stenosed Arteries in Magnetic Field”, PLOS ONE, Vol.11, Issue.12, e0167393, 2016.
[15] V. Mohan, J. Singh, and T.M. Sharma, “Heat transfer and blood flow in Arterioles: A Mathematical study”, IJERA, Vol.7, Issue.10, 8-13, 2017.
[16] V. Mwanthi, E. Mwenda and K.K. Gachoka, “Velocity Profiles of Unsteady Blood Flow through an Inclined Circular Tube with Magnetic Field”, Journal of Advances in Mathematics and Computer Science, Vol.24, Issue.6, 1-10, 2017.
[17] S. U. Siddiqui, C. Awasthi, and Geeta, “Mathematical Modelling on blood flow through Stenosed artery under the influence of Magnetic field”, International Journal of Mathematics Trends and Technology, Vol.49, Issue.4, 2017.
Citation
Sanjeev Kumar Sharma, Jyoti Singh Raghav, "Hemodynamics Effects on Blood Movement through an Artery," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.588-593, 2018.