“Glaucoma Detection and Classification: A Review”
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.543-547, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.543547
Abstract
Digital image processing techniques enable ophthalmologists to detect and treat several eye diseases like diabetic retinopathy and glaucoma. Glaucoma is an eye problem that affects the retina and weakens the nerve cells that assist in visual recognition. Glaucoma, the most common cause of blindness is the disease of the optic nerve of the eye and can lead to ultimate blindness if not treated at an early stage. Raised intraocular pressure, increase in cup to disk ratio and visual field test are some of the measures for such a disease. This paper presents a succinct of different types of image processing methods employed for the detection of Glaucoma The main objective of this project is to find an automated tool to detect glaucoma at an early stage and to classify this disease based on its severity and damage of the optic fibre. In this paper different existing methods are reviewed and their performance are evaluated so that it can help the researchers in their work.
Key-Words / Index Term
Glaucoma, Cup-Disc Ratio, Image Processing, Glaucoma Stages
References
[1] H. A. Quigley, “Number of people with glaucoma worldwide,” The British Journal of Opthalmology, 80(5), pp. 389–393, 1996
[2] Erik linner, “The early detection of glaucoma” Springer, Chapter Public Health Opthalmology Volume 5 of the series Documenta Ophthalmologica pp 23-24.
[3] http://www.glaucoma.org/glaucoma/types-of-glaucoma.php
[4]http://www.claruseye.com/portfoliopost/glaucoma/
[5] Tehmina Khalil, Samina Khalid and Adeel M. Syed ‘Review of Machine Learning Techniques for Glaucoma Detection and Prediction’ Science and Information Conference 2014 August 27-29, 2014 | London, UK
[6] R.N. Weinreb, and P.T. Khaw, “Primary open-angle glaucoma,” The Lancet, vol. 363, pp. 1711–1720, 2004.
[7] A.Murthi & 2M.Madheswaran ‘Enhancement Of Optic Cup To Disc Ratio Detection In Glaucoma Diagnosis’ 978-14577-1583-9/12/$26.00 © 2012 IEEE
[8] Li Xiong, Huiqi Li and Yan Zheng ‘Automatic Detection of Glaucoma in Retinal Images’ 978-14799- 43159/14/$31.00_c 2014 IEEE.
[9] Hafsah Ahmad, Abubakar Yamin, Aqsa Shakeel, Syed Omer Gillani, Umer Ansari ‘Detection of Glaucoma Using Retinal Fundus Images’ 978-14799-5132-1/14/$31.00 ©2014 IEEE.
[10] Tangelder, G.J.M., Reus, N.J., and Lemij, H.G., “Estimating the clinical usefulness of optic disc biometry for detecting glaucomatous change over time,” Eye, vol. 20, pp. 755–763, 2006.
[11] Kevin Noronha, Jagadish Nayak, S.N. Bhat, “Enhancement of retinal fundus Image to highlight the features for detection of abnormal eyes”.
[12] J. Xu, O. Chutatape, E. Sung, C. Zheng, and P. C. T. Kuan, “Optic Disk Feature Extraction Via Modified Deformable Model Technique for Glaucoma Analysis”, Pattern Recognition, 2007, Vol. 40, pp. 2063–2076
[13] Mei-Ling Huang, Hsin-Yi Chen, Jian-Jun Huang: “Glaucoma detection using adaptive neuro-fuzzy inference system”, Expert Systems with Applications 32 (2007) 458–468.
[14] Jyotika Pruthi, Dr.Saurabh Mukherjee: “Computer Based Early Diagnosis of Glaucoma in Biomedical Data Using Image Processing and Automated Early Nerve Fiber Layer Defects Detection using Feature Extraction in Retinal Colored Stereo Fundus Images”, International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April 2013.
[15] U. Rajendra Acharya, Sumeet Dua, Xian Du, “Automated Diagnosis of Glaucoma Using Texture and Higher Order Spectra Features”, IEEE Transactions On Information Technology In Biomedicine, May 2011, pp 449-455.
[16] J.B. Jonas, M.C. Fernández, and G.O.H. Naumann, “Glaucomatous parapapillary atrophy:occurrence and correlations,” Ophthalmology, vol. 110, pp. 214–222, 1992.
[17] Inoue, Kenji Yanashima, Kazushige Magatani, Takuro Kurihara, Naoto, “Development Of A Simple Diagnostic Method For The Glaucoma Using Ocular Fundus Pictures”, in the Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference Shanghai, China, September 1-4, 2005
[18] R¨udiger Bock, J¨org Meier, Georg Michelson, L´aszl´o G. Ny´ul, and Joachim Hornegger, “Classifying Glaucoma with Image-Based Features from Fundus Photographs”, DAGM 2007, LNCS 4713, pp. 355–364, 2007. Springer-Verlag Berlin Heidelberg 2007.
[19] S. Sekhar, W. Al-Nuaimy, and A.Nandi, “Automated localisation of retinal optic disk using hough transform,” in: Proceedings of 5th IEEE International Symposium on Biomedical Imaging: From Nano to Macro., pp. 1577–1580, 2008.
[20] J. Cheng, J. Liu, Y. Xu, F. Yin, D. Wing, K. Wong, N. Tan, and D. Tao, “Superpixel Classification Based Optic Disc and Optic Cup Segmentation for Glaucoma Screening”, IEEE Transactions On Medical Imaging, Vol. 32, no. 6, 2013, pp. 1019– 1032.
[21] Hafsah Ahmad, Abubakar Yamin, Aqsa Shakeel et al. ,”Detection of glaucoma using retinal fundus images”, IEEE 2014.
[22] Sobia Naz, Sheela Rao, “Glaucoma detection in color fundus images using cup to disc ratio”, IJES 2014.
[23] Anindita Septiarini, Agus Harjoko, “Automatia glaucoma detection based on the type of features used: A Review”, JATIT 2015.
Citation
Kajal Patel, Yogesh Kumar Rathore, "“Glaucoma Detection and Classification: A Review”," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.543-547, 2019.
Missing Value Imputation-A Review
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.548-558, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.548558
Abstract
The problems of missing values in the field of data mining have become emerging areas of research in recent years. It has been a great challenge in research for quite a long time. The missing values may occur due to several reasons. The missing values in the data set can affect accuracy and performance of result when any algorithm is implemented on it. Presence of missing values leads to less efficiency and difficulty in extracting meaningful information. As we go through the literature we can find there are various imputation techniques basing on type of missing value. Since the amount of data is increasing day by day, there is a need for an appropriate technique to handle the missing values in the data set. In this paper a brief year wise study of existing methods are being done so that it would be a great help while formulating and implementing a new one towards solving the problem of missing values.
Key-Words / Index Term
Data Mining, Data Set, Missing Values, Algorithm, Information, Imputation
References
[1] Qian Ma, Yu Gu, Wang-Chien Lee and Ge Yu, ”Order-Sensitive Imputation for Clustered Missing Values”, IEEE Transactions on Knowledge and Data Engineering, 1041-4347 ©2018.
[2] Teresa Pamuła, “Impact of Data Loss for Prediction of Traffic Flow on an Urban Road Using Neural Networks”, IEEE Transactions On Intelligent Transportation Systems 1524-9050 © 2018.
[3] Siamak Zamani Dadaneh , Edward R. Dougherty and Xiaoning Qian , “Optimal Bayesian Classification With Missing Values”, IEEE Transactions On Signal Processing, Vol. 66, No. 16, August 15, 2018.
[4] Aiguo Wang, Ye Chen, Ning An, Jing Yang, Lian Li, and Lili Jiang, “Microarray Missing Value Imputation: A Regularized Local Learning Method”, IEEE, 1545-5963 ©2018.
[5] Wujun Si, Qingyu Yang , Leslie Monplaisir and Yong Chen, “Reliability Analysis of Repairable Systems With Incomplete Failure Time Data”, IEEE , 0018-9529 © 2018.
[6] Nur Afiqah Zakaria, Norazian Mohamed Noor,” Imputation Methods For Filling Missing Data In Urban Air Pollution Data For Malaysia”, Urbanism. Arhitectură. Construcţii, Vol. 9 , No. 2 , 2018.
[7] Xiaolong Xu, Weizhi Chong, Shancang Li, Abdullahi Arabo, “Missing Data Imputation Based On The Evidence Chain”, IEEE Access, Vol. 6, 2169-3536, 2018.
[8] Zeng Yu, Tianrui Li, Shi-Jinn Horng, Yi Pan, Hongjun Wang and Yunge Jing, “An Iterative Locally Auto-Weighted Least Squares Method for Microarray Missing Value Estimation”, IEEE Transactions On Nanobioscience, Vol. 16, No. 1, January 2017.
[9] Ivan Markovsky,” A Missing Data Approach to Data-Driven Filtering and Control”, IEEE Transactions On Automatic Control, Vol. 62, No. 4, April 2017.
[10] Weiwei Shi, Yongxin Zhu, Philip S. Yu, Jiawei Zhang, Tian Huang, Chang Wang, and Yufeng Chen, “Effective Prediction of Missing Data on Apache Spark over Multivariable Time Series”, IEEE Transactions on Big Data ,DOI 10.1109/TBDATA.2017.2719703.
[11] R. Misir and R.K. Samanta,”A Study on performance of UCI Hungarian dataset using missing value management techniques”, IJCSE, Volume-5, Issue-3, 2017.
[12] Malay Mitra and R. K. Samanta,”
A Study on Missing Data Management”, IJCSE, Volume-5, Issue-2, E-ISSN: 2347-2693, 2017.
[13] Yelipe UshaRani, Dr.P.Sammulal, “An Innovative Imputation and Classification Approach for Accurate Disease Prediction”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14 S1, February 2016.
[14] Darryl ND, Rahman MM, “Missing Value Imputation Using Stratified Supervised Learning for Cardiovascular Data”, Global J Technol Optim 7:6 DOI: 10.4172/2229-8711. S1:113,2016.
[15] Tejal Patil, “Systematic Mapping Study of Missing ValuesTechniques using Naive Bayes”, IRJET, e-ISSN: 2395 -0056, Volume: 03, Issue: 03 , Mar-2016.
[16] Y.Usha Rani1, P. Sammulal, “A Novel Approach for Imputation of Missing Attribute Values for Efficient Mining of Medical Datasets – Class Based Cluster Approach”, Rev. Téc. Ing. Univ. Zulia. Vol. 39, No 2, 184 - 195, 2016.
[17] R. Naveen Kumar, M. Anand Kumar, “Enhanced Fuzzy K-NN Approach for Handling Missing Values in Medical Data Mining”, Indian Journal of Science and Technology, Vol 9(S1), DOI: 10.17485/ijst/2016/v9iS1/94094 , December 2016.
[18] Jocelyn T. Chi, Eric C. Chi, and Richard G. Baraniuk, “k-POD A Method for k-Means Clustering of Missing Data”, arXiv:1411.7013v3 [stat.CO] 27 Jan 2016.
[19] Swati Jain & Mrs. Kalpana Jain, “Estimation of Missing Attribute Value in Time Series Database in Data Mining”, Global Journals Inc. (USA), Volume 16, Issue 5, Version 1.0, Year 2016.
[20] P.Saravanan,P.Sailakshmi, “Missing Value Imputation Using Fuzzy Possibilistic C Means Optimized With Support Vector Regression And Genetic Algorithm”, JATIT & LLS, Vol.72, No.1, 2015.
[21] Elsiddig Elsadig Mohamed Koko, Amin Ibrahim Adam Mohamed, “Missing Data Treatment Method On Cluster Analysis”, International Journal of Advanced Statistics and Probability, Vol.3,No.2 ,191-209, 2015.
[22] Huseyin Ozkan, Ozgun Soner Pelvan, and Suleyman S. Kozat, “Data Imputation Through the Identification of Local Anomalies”, IEEE Transactions On Neural Networks And Learning Systems, Vol. 26, NO. 10, October 2015.
[23] Edgar Acuna ,Caroline Rodriguez, “The treatment of missing values and its effect in the classifier accuracy”, Research Gate, DOI: 10.1007/978-3-642-17103-1_60, 2015 .
[24] Artur Matyja, “Comparison of Algorithms for Clustering Incomplete Data, Foundations Of Computing And Decision Sciences”, Vol.39, No.2, DOI: 10.2478/fcds-2014-0007, ISSN 0867-6356, 2014.
[25] Minakshi, Dr. Rajan Vohra, Gimpy, “Missing Value Imputation in Multi Attribute Data Set”, IJCSIT, Vol. 5 (4) , 5315-5321, 2014,.
[26] Xiaoping Zhu, “Comparison of Four Methods for Handling Missing Data in Longitudinal Data Analysis Through a Simulation Study”, Open Journal of Statistics, 4, 933-944, 2014.
[27] Jiri Kaiser, “Dealing with Missing Values in Data, Journal Of Systems Integration”, 2014/1.
[28] Tapas Ranjan Baitharu and Subhendu Kumar Pani, “Effect of Missing Values on Data Classification, JETEAS”, 4(2): 311-316, (ISSN: 2141-7016), 2013.
[29] Luciano C. Blomberg, Duncan Dubugras A. Ruiz, “Evaluating the Influence of Missing Data on Classification Algorithms in Data Mining Applications”,SBSI,2013.
[30] Jing Tian, Bing Yu, Dan Yu, and Shilong Ma, “Clustering-Based Multiple Imputation via Gray Relational Analysis for Missing Data and Its Application to Aerospace Field”, The ScientificWorld Journal, Article ID 720392, 10 pages, 2013.
[31] Sujatha.R, “Enhancing Iterative Non-Parametric Algorithm for Calculating Missing Values of Heterogeneous Datasets by Clustering”, IJSR Publications, Volume 3, Issue 3, March 2013.
[32] Aasha.M, “Imputation in Mixed Attribute Datasets using Higher Order Kernel Functions”, IJIET, Vol. 2 Issue 3, ISSN: 2319-1058, June 2013.
[33] Santosh Dane, Dr. R. C. Thool, “Imputation Method for Missing Value Estimation of Mixed-Attribute Data Sets”, IJARCSSE, Volume 3, Issue 5, ISSN: 2277 128X, May 2013.
[34] Ji Liu, Przemyslaw Musialski, Peter Wonka, and Jieping Ye, “Tensor Completion for Estimating Missing Values in Visual Data”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 35, No. 1, January 2013.
[35] Bhavisha Suthar, Hemant Patel, Ankur Goswami,”A Survey: Classification of Imputation Methods in Data Mining”,IJETAE, ISSN 2250-2459, Volume 2, Issue 1, January 2012.
[36] R.Devi Priya, S.Kuppuswami, “A Genetic Algorithm Based Approach for Imputing Missing Discrete Attribute Values in Databases”, WSEAS Transactions On Information Science And Applications, E-ISSN: 2224-3402, Volume 9, Issue 6, June 2012.
[37] Noel Lopes, Bernardete Ribeiro, “Handling Missing Values Via A Neural Selective Input Model” Neural Network World 4/12, 357-370, ICS AS CR 2012.
[38] Julian Luengo, Jose A. Saez, Francisco Herrera,”Missing data imputation for fuzzy rule-based classification systems”, 16:863–881 DOI 10.1007/s00500-011-0774-4, 2012.
[39] Satish Gajawada, Durga Toshniwal, “Missing Value Imputation Method Based on Clustering and Nearest Neighbours”, International Journal of Future Computer and Communication, Vol. 1, No. 2, August 2012.
[40] K. Raja , G. Tholkappia Arasu ,Chitra. S. Nair, “Imputation Framework for Missing Values, International Journal of Computer Trends and Technology”, volume3,Issue2,2012.
[41] Ganga.A.R, B.Lakshmipathi, “Higher Order Kernel Function Algorithm for Imputing Missing Values”,IJARCS, Volume 3, No. 3, ISSN No. 0976-5697, May-June 2012,.
[42] Ibrahim Berkan Aydilek and Ahmet Arslan, “A Novel Hybrid Approach To Estimating Missing Values In Databases Using K-Nearest Neighbors And Neural Networks”, International Journal of Innovative Computing, Information and Control, ISSN 1349-4198,Volume 8, Number 7(A), pp. 4705-4717, July 2012,.
[43] R.S. Somasundaram, R. Nedunchezhian, “Missing Value Imputation using Refined Mean Substitution”, IJCSI, Vol. 9, Issue 4, No 3, July 2012.
Citation
Dipalika Das, Maya Nayak, Subhendu Kumar Pani, "Missing Value Imputation-A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.548-558, 2019.
Review of Machine Learning Method for Resolving Issues of Big Data Analytics
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.559-563, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.559563
Abstract
In this technology bound era, data analytics is a decisive way to deal with this enormous amount of data that is getting collected from various sources such as social media, banking, healthcare etc. With the growing volume of this data, it has been getting more and more difficult to analyze the same with the existing techniques. This is where the concept of Machine Learning (ML) has turned out to be an indispensable way for giving this data an intelligent structure i.e. by sorting the clusters of data into data sets and drawing associations from previous information. However, the traditional machine learning methods are not helpful in manipulating the data in a way that we require as we are advancing in these various fields involving big data. In our research we have reviewed the various ML algorithms and learning paradigms for handling the big data problems by associating them with the challenges of the 6 big data dimensions- Volume, Veracity, Velocity, Variety, Visualization and Value. We have studied the similar approach of research given by Alexandera et al. and Gandomi and Haider. Adding on to their findings and methods we have considered two more V’s – Visualization and Value and associated their characteristic challenges with the ML methods. We have mentioned the use of ML in preserving the privacy and security of the data as securing the data being generated is also a significant problem that needs to be addressed.
Key-Words / Index Term
Big data analytics, Machine Learning, V’s of big data, algorithms, learning paradigms
References
[1] L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, 2002
[2] A.Vinothini and Dr.S.Baghavathi Priya “Survey of Machine Learning Methods for Big Data Applications” International Conference on Computational Intelligence in Data Science, 2017.
[3] Xi Fang and Juanjuan Wang, “The Application of Big Data Technology and Method in Moral Education in Colleges and a Universities”, International conference on Intelligent Transportation, Big data and Smart City (ICITBS)
[4] S. R. Sukumar, “Machine Learning in the Big Data Era: Are We There Yet?” in Proceedings of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining: Workshop on Data Science for Social Good (KDD 2014), 2014.
[5] M. M. Najafabadi, F. Villanustre, T. M. Khoshgoftaar, N. Seliya, R. Wald, and E. Muharemagic, “Deep Learning Applications and Challenges in Big Data Analytics,” Journal of Big Data, vol. 2, Feb. 2015.
[6] J. Qiu, Q. Wu, G. Ding, Y. Xu, and S. Feng, “A Survey of Machine Learning for Big Data Processing,” EURASIP Journal on Advances in Signal Processing, vol. 67, 2016.
[7] J.Qiu et al., “A survey of machine learning for big data processing,” Signal Processing for Big Data, 28 May,2016
[8] O. Y. Al-Jarrah, P. D. Yoo, S. Muhaidat, G. K. Karagiannidis, and K. Taha, “Efficient Machine Learning for Big Data: A Review,” Big Data Research, vol. 2, no. 3, Apr. 2015.
[9] A. L`Heureux, K. Grolinger, H. F. Elyamany, and M. A. M. Capretz, “Machine Learning with Big Data: Challenges and Approaches,” IEEE Access, vol. 5.
[10] A. Gandomi and M. Haider, “Beyond the Hype: Big data Concepts, Methods, and Analytics,” International Journal of Information Management, vol. 35, Apr. 2015.
[11] S.Athmaja, M.Hanumanthapa and V.Kavitha, “A Survey Of Machine Learning Algorithms For Big Data Analytics,” International Confrence on Innovations in Information, Embedded Communication Systems(ICIIECS),2017
[12] H. Liu and H. Motoda, Instance Selection and Construction for Data Mining, vol. 608. Springer Science & Business Media, 2013.
[13] A. Buades, B. Coll, and J. Morel, “A Review of Image Denoising Algorithms, with a New One,” Multiscale Modeling & Simulation, vol. 4, no. 2, 2005.
[14] H. Park, R. Ikeda, and J. Widom, “RAMP: A System for Capturing and Tracing Provenance in MapReduce Workflows.,” Proceedings of the VLDB Endowment, vol. 4, no. 12, 2011.
[15] R. Agrawal and R. Srikant, “Privacy-preserving data mining,” in ACM Sigmod Record, vol. 29, no. 2. ACM, 2000.
[16] K. Liu, H. Kargupta, and J. Ryan, “Random projection-based multiplicative data perturbation for privacy preserving distributed data mining,” IEEE Transactions on knowledge and Data Engineering, vol. 18, no. 1, 2006.
[17] Seref Sagiroglu and Duygu Sinanc, “Big Data: A Review”, IEEE jornal,2013
[18] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, “l-diversity: Privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, 2007.
[19] R. Salakhutdinov and G. E. Hinton, “Deep Boltzmann Machines,” in Proceedings of the International Conference on Artificial Intelligence and Statistics, 2009.
[20] G. Hinton, “Deep Belief Nets,” in Encyclopedia of Machine Learning, Springer, 2010, pp. 267–269.
[21] CW Tsai, CF Lai, MC Chiang, LT Yang, “Data mining for the internet of things: a survey”. IEEE Commun Surv Tut 16(1), 77–97 (2014)
[22] X Wu, X Zhu, G Wu, W Ding, “Data mining with big data”. IEEE Trans Knowl Data Eng 26(1), 97–107 (2014)
[23] U Fayyad, G Piatetsky-Shapiro, P Smyth, “From data mining to knowledge discovery in databases”. AI Mag 17(3), 37–54 (1996)
[24] Mohammed Z. Omer and Hui Gao, “Privacy Preserving in Distributed SVM Data Mining on Vertical Partitioned Data”, 3rd International Conference on Soft Computing & Machine Intelligence, 2016.
[25] M. M. Najafabadi, F. Villanustre, T. M. Khoshgoftaar, N. Seliya, R. Wald, and E. Muharemagic, “Deep Learning Applications and Challenges in Big Data Analytics,” Journal of Big Data, Feb. 2015.
[26] C. L. Philip Chen and C. Y. Zhang, “Data-Intensive Applications, Challenges, Techniques and Technologies: a Survey on Big Data,” Information Sciences, vol. 275, 2014.
[27] S. G. Teo, S. Han, and V. C. Lee, “Privacy preserving support vector machine using non-linear kernels on hadoop mahout,” in Computational Science and Engineering (CSE), 2013 IEEE 16th International Conference on. IEEE, 2013, pp. 941–948.
[28] Y. Rahulamathavan, S.Veluru, R. C.-W. Phan, J. A. Chambers, and M. Rajarajan, “Privacy-preserving clinical decision support system using gaussian kernel-based classification,” IEEE journal of biomedical and health informatics, vol. 18, no. 1, pp. 56–66, 2014.
[29] Long Xu and Yihua Yan, “Machine Learning for Astronomical Big Data Processing”, IEEE,2017
[30] A.Vinothini, S.Baghavati, “Survey of Machine Learning for Big Data Applications,” International Confrence on Computational Intelligence in Data Science(ICCIDS),2017
[31] C.Augenstein, N.Spangenberg and Bogdan Franczyk, “Applying Machine Learning to Big Data Streams,”4th IEEE International Conference on Soft Computing and Machine Intelligence,2017
Citation
M. Sharma, I.S. Sohal, R.M.Singh, A. Wadhwa, D. Garg, "Review of Machine Learning Method for Resolving Issues of Big Data Analytics," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.559-563, 2019.
Eyeopen for Predicting of Flood Flow by Statistical and Machine Learning Model
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.564-568, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.564568
Abstract
Floods are rare and dangerous disaster in minimum duration, which have the most destructive impact within urban and rural areas. The research on the advancement of flood prediction models contributed to risk reduction, to prevent the loss of human life, and reduction the property damage in floods. This paper structure the machine learning models, two separate models based on including and excluding the river flow were developed for each variable to quantify the importance of the river flow on the accuracy of the flood forecasting models. In this paper, aims to discovering more accurate and efficient prediction models. In recent research, two main approaches are developed in hydrological forecasting. The first approach is based on mathematical modeling. It models the physical dynamics between the principal components of the hydrological system. The second approach is based on modeling the statistical relationship between the hydrologic input and output, without explicitly considering the relationships that exist among the involved physical processes. The water level flow is deducted in this research, river flow proves the most and least improvement on the efficiency of the models applied for flood forecasting. As a result, this paper describes the most promising prediction methods for both long-term and short-term floods. This paper can be used as a predicting the flood by choosing the proper Machine Learning (ML) algorithm such as Support Vector Machine(SVM) and Artificial Neural Network(ANN) algorithm for showing higher accuracy.
Key-Words / Index Term
flood prediction, hydrological model, machine learning, flood prediction, artificial intelligence, time series prediction
References
[1] H. Shahraiyni, M. Ghafouri, S. Shouraki, B. Saghafian, and M. Nasseri, “Comparison between active learning method and support vector machine for runoff modeling,” J. Hydrol. Hydromechanics, vol. 60, no. 1, pp. 16–32, 2012.
[2] S. H. Elsafi, “Artificial Neural Networks (ANNs) for flood forecasting at Dongola Station in the River Nile, Sudan,” Alexandria Eng. J., vol. 53, no. 3, pp. 655–662, 2014.
[3] J. Noymanee, N. O. Nikitin, and A. V. Kalyuzhnaya, “Urban Pluvial Flood Forecasting using Open Data with Machine Learning Techniques in Pattani Basin,” Procedia Comput. Sci., vol. 119, no. 2017, pp. 288–297, 2017.
[4] O. I. Abiodun, A. Jantan, A. E. Omolara, K. V. Dada, N. A. E. Mohamed, and H. Arshad, “State-of-the-art in artificial neural network applications: A survey,” Heliyon, vol. 4, no. 11, p. e00938, 2018.
[5] R. UshaRani, T. K. R. Krishna Rao, and R. Kiran Kumar Reddy, “An Efficient Machine Learning Regression Model for Rainfall Prediction,” Int. J. Comput. Appl., vol. 115, no. 23, pp. 24–30, 2015.
[6] J. Abbot and J. Marohasy, “Forecasting of Medium-term Rainfall Using Artificial Neural Networks: Case Studies from Eastern Australia,” Eng. Math. Top. Rainfall, 2018.
[7] F. Liu, F. Xu, and S. Yang, “A Flood Forecasting Model Based on Deep Learning Algorithm via Integrating Stacked Autoencoders with BP Neural Network,” Proc. - 2017 IEEE 3rd Int. Conf. Multimed. Big Data, BigMM 2017, pp. 58–61, 2017.
[8] M. Hitokoto and M. Sakuraba, “Applicability of the Deep Learning Flood Forecast Model Against the Inexperienced Magnitude of Flood,” vol. 3, pp. 901–893, 2018.
[9] P. Misra and S. Shukla, “Implementation of Neuro-Fuzzy and Statistical Technique for Flood Forecasting in Cauvery Basin , India,” no. 6, 2018.
[10] S. Vandana, D. D. Raj, B. Rushika, and V. M. Venkatesh, “Open Access,” no. 11, pp. 444–447, 2018.
Citation
D. Suganya, V. Savithri, "Eyeopen for Predicting of Flood Flow by Statistical and Machine Learning Model," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.564-568, 2019.
Survey on Virtual Reality
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.569-574, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.569574
Abstract
Virtual Reality is based on the notion of immersion i.e. a new technological advancement in the field of human machine interaction bringing it closer to real life. It is a technology for simulation of a real or virtual world in which one can immerse, touch, & sense the objects with the virtual presence in that 3-D world. Virtual Reality (VR) is a well-known concept and has been proven to be beneficial in various areas such as entertainment, research, military training, medical training, etc. Also, many applications using VR technology in education have been reported. This paper reviews the ideas & concepts behind the architectural representation, supporting software & hardware implementations, various categorized languages & modelling tools etc. This paper also studies current research objectives, comparison with other virtualized environments, development trends of VR, & modeling methods. Based on the analysis of structure & functioning of virtual reality environment, this paper presents various applications of virtual reality & different categories of issues related to it.
Key-Words / Index Term
Virtual Reality , Human – Machine Interaction , Modeling and techniques
References
[1] https://en.wikipedia.org/wiki/Virtual_reality
[2] Namrata Singh; Sarvpal Singh, “Virtual Reality: A brief Survey”, International Conference on Information Communication and Embedded Systems (ICICES), 2017
[3] L. Liu, “Virtual reality applications in simulated course for tour guides”, IEEE Proc. Of 7th Int. Conf. on Computer Science & Education (ICCSE), pp. 1672 – 1674, 2012.
[4] V. Kovalcík, J. Chmelík, M. Bezdeka and J. Sochor, “Virtual Reality System as a Tool for Education”, 20th International Conference on Computer Graphics, Visualization and Computer Vision, p. 15-18, 2012.
[5] Zhenjiang Shen, Yan Ma, Kenichi Sugihara, Zhenhan Lei, Evan Shi, “Technical possibilities of cloud based Virtual Reality Implementing SaaS for online collaboration in Urban Planning”, Int. J. Communications, Network and System Sciences, 2014, 7, 463-473.
[6] Science in China Series F: Information Sciences, 2009.
[7] A. Hendaoui, A. Limayem, C.W. Thompson, “3D social virtual world: research issues and challenges”, IEEE Internet Computing (Jan/Feb 2008) 88–92.
Citation
Prabhat K. Pushkar, Vishnu Nair, Himanshu Gupta, Akash Ubbu, Swati Gajbhiye, "Survey on Virtual Reality," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.569-574, 2019.
Green Virtual Mouse Using OpenCV
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.575-580, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.575580
Abstract
There has been a greater development of virtual technologies in the recent arena. Some of them increased the computing performances of the functioning systems. One of those highly used virtualized technology is the virtual mouse. The moments that the mouse detects are converted into the pointer movements on a display that enables the management of Graphical User Interface (GUI) on a computer platform. This paper advocates an approach for Human-Computer Interaction (HCI) where a real-time camera is used in handling the cursor movements. The Virtual mouse colour recognition program acquires real-time images continuously which will then go through a series of filtration and transformation. As the process completes the program will apply an image processing technique to capture the coordinates of the position of the targeted colours from the changed frames. Then a set of different combinations of functions are operated and then by analyzing the set of different colours thereby a program will execute the mouse function and then it is translated as an actual mouse for user’s machine.
Key-Words / Index Term
Virtual Mouse, Graphical User Interface, Colour Recognition, Human-Computer Interaction, Calibration Phase, Recognition Phase
References
[1] Banerjee A, Ghosh A, Bharadwaj K,& Saikia H, “Mouse Control using a Web Camera based on color Detection”, IJCTT vol. 9 no. 1,March 2014.
[2] Piyush Kumar, Siddharth S. Rautaray, Anupam Agrawal., “Hand data glove: A new generation real-time mouse for Human-Computer Interaction”, IEEE; 07 May 2012.
[3] R. Meena Prakash, T. Deepa, T. Gunasundari, N. Kasthuri,“Gesture recognition and fingertip detection for human computer interaction”, ICIIECS; 18 Mar 2017.
[4] “Kalman Filtering: Theory and Application”, IEEE Press, 1985.
[5] R. A. Brooks, “The Intelligent Room project, Proceedings of the 2nd International Conference on Cognitive Technology” (CT `97), p.271, August 25-28, 1997
[6] Michael Coen, Brenton Phillips, Nimrod Warshawsky, Luke Weisman, Stephen Peters, and Peter Finin, “Meeting the computational needs of intelligent environments: The meta glue system.” In Proceedings of MANSE`99, 1999.
[7] Donald J. Cohen, Laurence Prusak, “In good company: how social capital makes organizations work”, Ubiquity, January 2001.
[8] Michael Dertouzos. “The future of computing”, Scientific American, 1999.
[9] Krzysztof Gajos, Rascal - “A Resource Manager for Multi Agent Systems in Smart Spaces, Revised Papers from the Second International Workshop of Central and Eastern Europe on Multi-Agent Systems: From Theory to Practice in Multi-Agent Systems”, p.111-120, September 26-29, 2001.
[10] Ajay Kulkarni. “A reactive behavioural system for the intelligent room”. Technical report, MIT AI Lab, 2002.
[11] “Employees on the move, Steelcase Workplace Index Survey”, April 2002.
[12] Max Van Kleek, “Intelligent environments for informal public spaces: the Ki/o Kiosk Platform”. M.Eng. Thesis, Massachusetts Institute of Technology, Cambridge, MA, February 2003.
[13] P Viola and M Jones. “Rapid object detection using a boosted cascade of simple features. In Proceedings of Computer Vision and Pattern Recognition, IEEE 2001
Citation
Manne Vamshi Krishna, Gopu Abhishek Reddy, B. Prasanthi, M. Sreevani, "Green Virtual Mouse Using OpenCV," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.575-580, 2019.
A Survey on QoS aware Web Service Selection for Reactive Service Composition
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.581-587, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.581587
Abstract
The Reliable service composition of web services is considered as imperative for ensuring continuous services to the users since they are accountable for consolidating varsity number of applications in spite of their opportunity. The significant enhancement in web services field in the terminal two decades facilitate the privilege of devising peculiar service composition and service selection schemes for optimal performance and success rate of the effective web service composition. Based on the analytic works proposed the effective service composition was proved to be devised using the aspects of QoS or Transactional features of workflow. This survey paper discusses the essential demand for service composition, the enforced technologies to execute service composition and also it figures out the worst candidate services from the state-of-art approaches. It further affords many different composition procedures, exhibiting early implementations of various approaches based on few currently existing service composition platforms and frameworks.
Key-Words / Index Term
QoS constraints, Web Service Selection, Service Composition, Transactional features
References
[1] Hwang, S.-Y., Lim, E.-P., Lee, C.-H., & Chen, C.-H. (2008). Dynamic Web Service Selection for Reliable Web Service Composition. IEEE Transactions on Services Computing, 1(2), 104–116. doi:10.1109/tsc.2008.2
[2] Kang, X., Liu, X., Sun, H., Huang, Y., & Zhou, C. (2010). Improving Performance for Decentralized Execution of Composite Web Services. 2010 6th World Congress on Services.doi:10.1109/services.2010.38
[3] G. Zhang, L. Chen, and W. Ha, “Service selection of ensuring transactional reliability and QoS for web service composition,” Mathematical Problems in Engineering, vol. 2012, 641361, 2012.
[4] Liu, H., Zhang, W., Ren, K., Zhang, Z., & Liu, C. (2009). A Risk-Driven Selection Approach for Transactional Web Service Composition. 2009 Eighth International Conference on Grid and Cooperative Computing.doi:10.1109/gcc.2009.68
[5] Omer, A. M., & Schill, A. (2009). Dependency Based Automatic Service Composition Using Directed Graph. 2009 Fifth International Conference on Next Generation Web Services Practices, 2(1), 15-23.
[6] J. El Haddad, M. Rukoz and M. Manouvrier, "TQoS: Transactional and QoS-Aware Selection Algorithm for Automatic Web Service Composition," in IEEE Transactions on Services Computing, vol. 3,no.,pp.73-85,2010. doi:10.1109/TSC.2010.5
[7] Wang, R., Ma, L., & Chen, Y. (2010). The Application of Ant Colony Algorithm in Web Service Selection. 2010 International Conference on Computational Intelligence and Software Engineering, 2(1), 34-43.
[8] Paik, H., Lemos, A. L., Barukh, M. C., Benatallah, B., & Natarajan, A. (2017). Web Service Composition: Data Flows. Web Service Implementation and Composition Techniques, 193-202.
[9] Xiaoqin Fan and Xianwen Fang, 2010. On Optimal Decision for QoS-Aware Composite Service Selection. Information Technology Journal, 9: 1207-1211.
[10] Liu, H., Zhong, F., Ouyang, B., & Wu, J. (2010). An Approach for QoS-Aware Web Service Composition Based on Improved Genetic Algorithm. 2010 International Conference on Web Information Systems and Mining.doi:10.1109/wism.2010.128.
[11] Alexander, T, & Kirubakaran, E. (2014). Optimal QoS based Web Service Choreography using Ant Colony Optimization. International Journal of Computer Applications, 102(11), 39-46.
[12] Rostami, N. H., Kheirkhah, E., & Jalali, M. (2014). An Optimized Semantic Web Service Composition Method Based on Clustering and Ant Colony Algorithm. International journal of Web & Semantic Technology, 5(1),1-8.
[13] Cardinale, Y., Haddad, J. E., Manouvrier, M., & Rukoz, M. (2011). CPN-TWS: A colored petri-net approach for transactional-QoS driven Web Service composition. International Journal of Web and Grid Services, 7(1), 91.
[14] Blanco, E., Cardinale, Y., Vidal, M., El Haddad, J., Manouvrier, M., & Rukoz, M. (2012). A Transactional-QoS Driven Approach for Web Service Composition. Resource Discovery, 1(1), 23-42.
[15] Wang, X., Xu, X., Sheng, Q. Z., Wang, Z., & Yao, L. (2016). Novel Artificial Bee Colony Algorithms for QoS-Aware Service Selection. IEEE Transactions on Services Computing, 2(1), 1-1.
[16] Dahan, F., El Hindi, K., & Ghoneim, A. (2017). Enhanced Artificial Bee Colony Algorithm for QoS-aware Web Service Selection problem. Computing, 99(5), 507-517.
[17] Gao, W., & Liu, S. (2012). A modified artificial bee colony algorithm. Computers & Operations Research, 39(3), 687–697.
[18] Dahan, F., El Hindi, K., & Ghoneim, A. (2017). Enhanced Artificial Bee Colony Algorithm for QoS-aware Web Service Selection problem. Computing, 99(5), 507-517.
[19] Zhou, J., & Yao, X. (2016). A hybrid artificial bee colony algorithm for optimal selection of QoS-based cloud manufacturing service composition. The International Journal of Advanced Manufacturing Technology, 88(9-12), 3371–3387.doi:10.1007/s00170-016-9034-1
[20] Zhu, G., & Kwong, S. (2010). Gbest-guided artificial bee colony algorithm for numerical function optimization. Applied Mathematics and Computation, 217(7), 3166–3173.
[21] Wang, X., Xu, X., Sheng, Q. Z., Wang, Z., & Yao, L. (2016). Novel Artificial Bee Colony Algorithms for QoS-Aware Service Selection. IEEE Transactions on Services Computing, 2(1), 1-1.
[22] Amiri, M. A., & Serajzadeh, H. (2012). Effective web service composition using particle swarm optimization algorithm. 6th International Symposium on Telecommunications (IST).doi:10.1109/istel.2012.6483169.
[23] Ghobaei-Arani, M., Rahmanian, A. A., Aslanpour, M. S., & Dashti, S. E. (2017). CSA-WSC: cuckoo search algorithm for web service composition in cloud environments. Soft Computing.doi:10.1007/s00500-017-2783-4.
[24] Yiwen Zhang, Guangming Cui, Yan Wang, Xing Guo, & Shu Zhao. (2015). An optimization algorithm for service composition based on an improved FOA. Tsinghua Science and Technology, 20(1), 90–99.doi:10.1109/tst.2015.7040518.
[25] Cristina Bianca, P., Viorica Rozina C., Ioan S., Ramona Bianca.,& Georgiana C.(2011). A Hybrid Firefly-Inspired Approach For Optimal Semantic Web Service Composition. Scalable Computing: Practice and Experience Volume 12, Number 3, pp. 363–369.
[26] Siva Kumar Gavvala , Chandrashekar Jatoth , G.R. Gangadharan , Rajkumar Buyya.(2019) QoS-aware cloud service composition using eagle strategy, Future Generation Computer Systems 90 (2019) 273–290.
[27] Samia Sadouki Chibani, Abdelkamel Tari.(2017) Elephant Herding Optimization for Service Selection in QoS-Aware Web Service Composition International Journal of Computer and Information Engineering Vol:11, No:10, 2017.
[28] Abd Elaziz, M., Oliva, D., & Xiong, S. (2017). An improved Opposition-Based Sine Cosine Algorithm for global optimization. Expert Systems with Applications, 90(2), 484-500.
Citation
N. Arunachalam, A. Amuthan, "A Survey on QoS aware Web Service Selection for Reactive Service Composition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.581-587, 2019.
Privacy preservation and Privacy by Design techniques in Big Data
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.588-593, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.588593
Abstract
Big Data is a common term referring to a data revolution in information technology that makes it easy to collect, store and analyze user data online at relatively low costs. In simpler words, any human activity using technology leaves a ‘digital exhaust’ or a trace data, a footprint. Broadly speaking, the big pool of all these collected footprints is called Big Data. However, it’s not just a collection of these footprints but it also contains various other information like weather, train information, payments, etc. Generally these footprints may not have any apparent or obvious meaning, but they start to make sense when combined with other recorded datasets. This information could be processed using powerful analytic tools to give greater meaning and context to it while also enabling the system to ‘predict’ the unknown or missing information in the dataset. Today, we are already surrounded by a sea of ubiquitous sensors (sensors on your phones, punching access cards or swiping credit cards, etc). With each advancement, like the advent of the Internet of Things, coupled with the ‘smartphone revolution’ linking more and more information to your social media accounts, it is getting easier to gather more information and make sense of it. In this paper we discussed pseudonymization and privacy by design as the processing of personal data in such a way that the data can no longer be attributed to a specific data subject without the use of additional information.
Key-Words / Index Term
Ubiquitous, Pseudonymization, privacy by design
References
[1]. Lee Chung, H.; Cranage David, A. 2010. Personalisation-privacy paradox: The effects of personalisation and privacy assurance on customer responses to travel websites. Elsevier. http://www.elsevier.com/locate/tourman
[2]. Yanying Gu, Anthony Lo, 2009. A Survey of Indoor Positioning Systems for Wireless Personal Networks. IEEE Communications Surveys & Tutorials, Vol. 11, №1, First Quarter.
[3]. Manyika, J., et. al. (2011). Big data: The next frontier for innovation, competition, and productivity. McKinsey Global Institute. Online: http://www.mckinsey.com/Insights/MGI/Research/Technology_andInnovation/Big_data_The_next_frontier_for_innovation.
[4]. Tene, O., and Polonetsky J. (2012). Privacy in the age of big data: A time for big decisions. Stanford Law Review 64, 63.
[5]. Commission Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation), COM (2012) 11 final (Jan. 25, 2012). Online: http://ec.europa.eu/justice/ newsroom/data-protection/news/120125_en.htm.
[6]. Gantz. J., and Reinsel. D. (2011). Extracting value from chaos. IDC. Online: http://www.emc.com/ collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf
[7]. Jeff Jonas and Lisa Sokol (2009), “Data finds data,” in Segaran, T., and Hammerbacher, J. (eds.), Beautiful Data The Stories Behind Elegant Data Solutions, O’Reilly Media. p. 105.
[8]. Jonas, J. (Oct 11, 2010). On how data makes corporations dumb. GigaOm. Online: http://gigaom. com/2010/10/11/jeff-jonas-big-data/.
[9]. Marsella, A., and Banks, M. (2005). Making customer analytics work for you! Journal of Targeting, Measurement and Analysis for Marketing. 13(4), 299-303.
[10]. Jonas, J., and Harper, J. (2006). Effective counterterrorism and the limited role of predictive data mining. Policy Analysis. CATO Institute, Washington, DC, 584, 1-11. 13 Jonas, J. (2009). Data finds data. Online:http://jeffjonas.typepad.com/jeff_jonas/2009/07/data-findsdata.html
[11]. Privacy and Security by design is a crucial step for privacy protection., Least Authority Kingsmill, S. & Cavoukian, A. Privacy by Design: Setting a new standard for privacy certification
[12]. Maple, C., Security and privacy in the internet of things, Taylor and Francis Online
Citation
M. Suresh Babu, Mohammed Irfan, Suneetha. V, "Privacy preservation and Privacy by Design techniques in Big Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.588-593, 2019.
Design and Analysis of Different Types of Modern Methods Using Line Feed of Microstrip Antenna Using CST Software
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.594-603, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.594603
Abstract
Small size wideband microstrip patch antenna with horizontal slot and vertical slot in patch stacked patch and multiple patch is fed through microstrip line is presented. By inserting slot on patch, stacked patch supported by wall and the multiple patch, the bandwidth can improve significantly without significant change in the frequency. The bandwidth before adding the slot and the stacked patch was 5%, whereas after adding the slot and the stacked patch the bandwidth increased ranging from 2.42 to 2.50 GHz. The radiation pattern has acceptable response at both E-plane and H-plane. The ground plane size is 56 mm by 74 mm, the antenna designed is based on FR4 substrate with dielectric constant 4.4.For all that, the design of a microstrip antenna is not always an easy problem and the antenna designer is faced with difficulties coming from a) the inherent disadvantages of a printed resonant antenna element, for example the narrow impedance bandwidth, and b)the various requirements of the specific applications, which concern the operation of the radiating element, and cannot be satisfied by a printed scheme with an ordinary configuration[3]. Moreover, the rapid development in the field of Land Mobile Telephony as well as in the field of Wireless Local Area Networks (WLANs) demands devices capable to operate in more than one frequency bands [4].
Key-Words / Index Term
Bandwidth, gain, offset, stacking Broadband microstrip antenna
References
[1] W.L. Stutzman and G.A. Thiele, Antenna Theory and Design, 2nd ed. New York: Wiley, 1998
[2] C.A. Balani, Antenna Theory, 2nd ed. New York: John Wiley & Sons, Inc., 1997.
[3] H. F. AbuTarboush, H. S. Al-Raweshidy, “A Connected E-Shape and U-Shape Dual-Band Patch Antenna for
Different Wireless Applications”, the Second International EURASIP Workshop on RFID Technology, July,
2008.
[4] Nashaat DM, Elsadek H. Miniturized E-shaped dual band PIFA on FR4 substrates. Radio Science Conference,
2006 NRSC 2006 Proceedings of the Twenty Third National. 2006;0:1-6.
[5] FUJIMOTO T. Wideband stacked square microstrip antenna with shorting plates. IEICE Trans B:
Communications. 2008 May 1;E91-B(5):1669-72.
[6] Lin S-, Row J-. Bandwidth enhancement for dual-frequency microstrip antenna with conical radiation.
Electronics Letters. 2008;44(1):2-3.
[7] Anguera J, Cabedo A, Picher C, Sanz I, Ribo M, Puente C. Multiband handset antennas by means of
groundplane modification. Antennas and Propagation International Symposium, 2007 IEEE. 2007:1253-6.
[8] Mak CL, Chair R, Lee KF, Luk KM, Kishk AA. Half U-slot patch antenna with shorting wall. Electronics
Letters. 2003;39(25):1779-80.
[9] H. F. AbuTarboush, H. S. Al-Raweshidy, R. Nilavalan,“Triple Band Double U-Slots Patch Antenna for WiMAX
Mobile Applications”, the 14th Asia-Pacific Conference on Communications, Japan, October 2008
[10] S. Weigand, G.H. Huff, K.H. Pan, and J.T. Bernhard, ‘Analysis and design of broadband single-layer rectangular U-Slot microstrip patch antenna,’ IEEE Transactions on Antennas and Propagation, AP-51, 3, pp. 457-468, 2003.
[11] K.F. Tong and T.P. Wong, ‘Circularly polarized U-slot antenna’, IEEE Transaction on Antennas and Propagation, AP-55, 8, pp. 2382-2385, 2007
[12] K.F. Lee, S.L. Steven Yang, A. A. Kishk, ‘Dual and multiband U-slot patch antennas’, IEEE Antennas and Wireless Propagation Letters, Vol. 7, pp. 645-647, 2008
[13] H. Wang, X.B. Huang and D.G. Fang, ‘A single layer wideband U-slot microstrip patch antenna array,’ IEEE Antennas and Wireless Propagation Letters, Vol. 7, pp. 9-12, 2008
[14] Lingjian Li and Zhirum Hu, ‘A wideband linear U-slot microstrip patch antenna array for wireless applications’, International Journal of Electronics, Vol. 96, 7, pp. 755-765,
2009
[15] Kai Fong Lee, Shing Lung , Steven Yang, Ahmed A. Kishk and Kwai Man Luk, ‘The versatile U-slot patch antennas,’ IEEE Antennas and Propagation Magazine, Vol. 52, 1, pp. 71-88, 2010.
[16] K.F. Tong, K.M. Luk, K.F. Lee and R.Q. Lee, ‘A broadband U-slot rectangular patch antenna on a microwave substrate’, IEEE Transactions on Antennas and Propagation,
AP-48, 6, 954-969, 2000.
[17] R. Chair, K.F. Lee, C.L. Mak, K.M. Lukand A.A. Kishk, ‘Miniature wideband half U-slot and half E-Shaped patch’, IEEE Transactions on Antennas and Propagation, AP-53, vol.
8, pp. 2645-2652, 2005.
[18] A.A. Deshmukh and K.P. Ray, ‘Compact broadband slotted rectangular microstrip antenna’, IEEE Antennas and Wireless Propagation Letters ,Vol. 8, pp. 1410-1413, 2009.
[19] Y.X. Guo, A. Shackelford, K. F. Lee and K.M. Luk, ‘Broadband quarter-patch antenna with a U-shaped slot’, Microwave Opt. Technol. Lett. , Vol. 28, pp. 328-330, 2001
[20] A. Shackelford, K.F. Lee and K.M. Luk, ‘Design of small-size wid-bandwidth microstrip patch antennas’, IEEE Antennas and Propagation Magazine, Vol. 45, 1, pp. 75-83, 2003.
[21] C.L. Mak, R. Chair, K.F. lee, K.M. Luk AND a.a. Kishk, ‘Half U-slot patch antenna with shorting wall’, Electron. Lett. , Vol. 39, 1779-1780, 2003.
[22] K.L. Wong and W.H. Hsu, ‘A broadband rectangular patch antenna with a pair of wide slits”, IEEE Trans. Antennas and Propagation, Vol. 49, 9, pp. 1345-1347, 2001.
[23] W.H. Hsu and K.L. Wong, ‘A wideband circular patch antenna’, Microwave Opt. Technol.Lett., Vol. 25, pp. 327-328, June 5, 2000
[24] K.M. Pramod, R. Jyoti, S. S. Kumar, V.S.K. Reddy, ‘Simplified and efficient technique for designing of broadband patch antenna,’ Proc. of Applied Electromagnetics Conference
(AEMC), 2009
[25] L. Peng, C. Ruan, Y. Zhang, ‘A novel compact broadband microstrip antenna,’ Proc.Asia-Pasific Microwave Conference(APMC2007), 2007
[26] Y. Chen, S. Yang and Z. Nie, ‘ Bandwidth enhancement method for low profile Eshaped microstrip patch antennas,’ IEEE Trans. Antennas and Propagation, Vol. 58, 7, pp. 2442-2447, 2010.
[27] K.M. Pramod, S. S. Kumar, R. Jyoti, V.S.K. Reddy, and P.N.S. Rao, ‘Novel structural design for compact and broadband patch antenna,’ International Workshop on Antenna Technology (IWAT), 2010.
[28] S. Xiao, Z. Shao, B.Z. Wang, M.T. Zhou and M. Fujise, ‘Design of low profile microstrip antenna with enhanced bandwidth and reduced size,’ IEEE Trans. Antennas and
Propagation, Vol. 54, 5, pp. 1594-1599, 2006.
[29] S. Zhaohui, L. Meijia and D. Zhiyong, ‘ An improved design of microstrip Archimedeam spiral antenna’, Proc. of International Conference on Microwave and millimeterWave Technology(ICMMT), 2007.
Citation
Shubham Chouhan, Rajdeep Shrivastava, "Design and Analysis of Different Types of Modern Methods Using Line Feed of Microstrip Antenna Using CST Software," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.594-603, 2019.
A Comprehensive Study on Digital-Signatures with Hash-Functions
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.604-607, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.604607
Abstract
From last three decades people from all around the world continuously using services provided by Information Technology industry most probably in every area, in order to fulfill the needs of business to personal activities, but from decade ago demand tremendously increased. Though as we have lots of benefits of using IT services which made our current life smoother, easier and less-hardworking as compare to past yet there is strong need arises to protect our digital world by managing Confidentiality, Integrity, Availability, Authenticity of our resources from those who unwantedly wants to look into ours privacy whether by passive or active attacks. Digital Signature is most important part from Public-key Cryptography that provides a set of security capabilities that would be difficult to implement in any other way especially for proving the authenticity of data.
Key-Words / Index Term
Algorithm, Authenticity, Avalanche-Effect, Certificates, Confidentiality, Digest, Firewall, Integrity, Hash Function, Non-Repudiation
References
[1]. Rivest, MIT Laboratory for Computer Science and RSA Data Security, Inc, Request for Comments : 1321, April 1992.
[2]. FIPS180-3, Secure Hash Standard (SHS), National Institute of Standards and Technology, US Department of Commerce, Washington D. C., 2008.
[3]. Junling Zhang, ‘A Study on Application of Digital Signature Technology’, 2010 International Conference on Networking and Digital Society, 2010 IEEE, Pg.: 498-501, Wenzhou China, 30-31 May, 2010.
[4]. RavneetKaur, ‘Digital Signature’, 2012 International Conference on Computing Science, 2012 IEEE, Pg.: 295-301, India, 14-15 Sep 2012.
[5]. PriyankaYadev, ‘Digital Signature’, International Journal of Engineering and Management Science, Vol. 3(2), Pg.: 115-118, Year 2012.
[6]. PayelSaha, ‘A Comprehensive Study on Digital Signature for Internet Security’, ACCENTS Transaction on Information Security, Vol. 1(1), Year 2016.
[7]. Arvind Sharma, “Comparative Analysis of Cryptographic Hash Function”, International Conference on Big Data, Computer Science and Information Technology (ICBDCSIT), Proceedings of 18th IRF International Conference, New Delhi, India, 09th September, 2018.
[8]. Arvind Sharma, “Attacks on Cryptographic Hash Function and Advances”, IJICS, Vol 5, Issue-11, 2018.
[9]. William Stallings “Cryptography and Network Security Principles”, 5th Edition.
[10]. Forouzan, “Data Communication and Networking”, 4th Edition, McGraw Hill Pg.: 961-1023
[11]. https://en.wikipedia.org/wiki/Digital_Signature_Algorithm
Citation
Arvind K.Sharma, Satish.K.Mittal, "A Comprehensive Study on Digital-Signatures with Hash-Functions," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.604-607, 2019.