A Deep Study of Hybrid Trust Built To Improve Security Technique against Sybil Attack in MANET Based IoT Network
Research Paper | Journal Paper
Vol.9 , Issue.12 , pp.1-8, Dec-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i12.18
Abstract
The location of the mobile nodes in the MANET IoT changes continuously that`s why the communication among them is difficult. The different devices or nodes in the Internet of Things (IoT) connect with each other over the internet or convey information to each other if they are immediately in range. The existence of an attacker is a difficult issue in a network since it lowers routing performance and has an impact on node battery life. Secure routing is critical to the adoption and deployment of many IoT applications. Sybil attacks may be destructive to MANET IoT and constitute a significant problem for building effective IoT security solutions. In this dissertation, proposes the Hybrid trust based enhanced security technique to protect the MANET IoT network against Sybil Attack. The preceding Sec Trust method is recommended as a dependable approach in IoT to safeguard communication from Sybil attack. The proposed system also decreases energy usage, which increases network life time. The performance of both the schemes is measured in different node density situations, but Hybrid trust performs better. The Sec trust system is dependable and secure, but it is inefficient in routing between the source and destination. The efficient routing technique decreases network overhead, which reduces packet flooding and, as a result, improves routing efficiency. The Hybrid trust method enhances routing reliability by consuming the energy consumption of mobile nodes in an MANET IoT network.
Key-Words / Index Term
IoT-MANET, Nodes, Hybrid Trust, Sec trust, Routing, Sybil Attacker
References
[1] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile Ad Hoc Networking: Imperatives and Challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 12-64, 2003.
[2] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, “Delay-Tolerant Networking Architecture,” RFC 4838, IETF, 2007.
[3] J. N. Al-Karaki, and A. E. Kamal, “Routing Rechniques in Wireless Sensor Networks: A Survey,” IEEE Wireless Communications, vol. 11, no. 6, pp. 6-28, Dec. 2004.
[4] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A urvey,” Computer Networks, vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
[5] P. Juang, H. Oki, and Y. Wang, “Energy Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet, ”International Conference on Architectural Support for Programming Languages and Operating Systems, San Jose, CA, Oct. 2002, pp. 96-107.
[6] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A Survey of Routing Attacks in Mobile Ad Hoc Networks,” IEEE Wireless Communications, vol. 14, no. 5, pp. 85-91, Oct. 2007.
[7] K. Pelechrinis, C. Koufogiannakis, and S. V. Krishnamurthy, “On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks,” IEEE Transactions on Wireless Communications, vol. 9, no. 10, pp. 3258- 3271, October 2010.
[8] Aditya Tandon, Prakash Srivastava, “Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT” 2019 IEEE.
[9] Ismail Butun, Member, IEEE, et.al.“Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures” Manuscript received March 5, 2019.
[10] Wang, Yizhong, “Secure routing protocol over mobile Internet of Things wireless sensor networks” Monterey, California 2018.
[11] Ruchi Mehta, M.M.Parmar, “A Survey on Security Attacks and Countermeasures in RPL for Internet of Things”IJARSE April 2018.
[12] VISHAL SHARMA, (Member, IEEE), et. al “Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey” IEEE ACCESS Received July 28, 2020, accepted August 26, 2020.
[13] Hassan I. Ahmed, Abdurrahman A, et. al.“A survey of IoT security threats and defenses” International Journal of Advanced Computer Research, Vol. 9(45), 2019.
[14] Weidong Fang, Wuxiong Zhang,et.al.“Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey” Hindawi Wireless Communications and Mobile Computing Volume 2020,
[15] Anhtuan Le, Jonathan Loo, Aboubaker Lasebae et. al.“The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks” IEEE Sensors Journal, Vol. 13, No. 10, October 2013.
[16] Divya Sharma, Ishani Mishra, et. al. “A Detailed Classification of Routing Attacks against RPL in Internet of Things” 2017, IJARIIT.
[17] Nasr Abosata, Saba Al-Rubaye Et.Al. “Internet Of Things For System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications” Sensors 2021.
[18] Karen Avila, Daladier Jabba, et. al. “Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT”MDPI Published: 17 September 2020.
[19] D.Sterne, P.Balasubramanyam, D.Carman, B.Wilson, R. Talpade, C.Ko, R. Balupari, C.-Y. Tseng, T.Bowen, K.Levitt and J.Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs”, Proc. IEEE International Workshop on Information Assurance (IWIA 05), 2005.
[20] Y. Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, USA, 2003.
[21] B. Pahlevanzadeh and A. Samsudin, “Distributed Hierarchical IDS for MANET over AODV”, Proc. IEEE International Conference on Telecommunications, Malaysia, May 2007.
[22] Soni G., Chandravanshi K., Jhariya M.K., Rajput A. (2022) An IPS Approach to Secure V-RSU Communication from Blackhole and Wormhole Attacks in VANET. In: Sarma H.K.D., Balas V.E., Bhuyan B., Dutta N. (eds) Contemporary Issues in Communication, Cloud and Big Data Analytics. Lecture Notes in Networks and Systems, vol 281. Springer, Singapore. https://doi.org/10.1007/978-981-16-4244-9_5
[23] P. Yi, Y. Jiang, Y. Zhong and S. Zhang, “Distributed Intrusion Detection for Mobile Ad Hoc Networks”, Proc. IEEE Application and Internet Workshop, 2005.
[24] G. Soni, M. K. Jhariya, K. Chandravanshi and D. Tomar, "A Multipath Location based Hybrid DMR Protocol in MANET," 2020 3rd International Conference on Emerging Technologies in Computer Engineering: Machine Learning and Internet of Things (ICETCE), pp. 191-196, 2020. doi: 10.1109/ICETCE48199.2020.9091778.
[25] J.C. Kao and R. Marculescu, “Eavesdropping Minimization via Transmission Power Control in Ad Hoc Wireless Networks”, Proc. IEEE Sensors and Ad hoc Communication and Networks SECON, 2006.
[26] T. He, H. Wang and K.W. Lee, “Traffic analysis in anonyms MANETs”, Proc. IEEE Military Communication Conference MILCOM, November 2008.
[27] J. Kong, X. Hong and M. Gerla, “A new set of passive routing attacks in Mobile ad hoc networks”, Proc. IEEE Military Communication Conference MILCOM, October 2003.
[28] E. Perkins and M. Royer, “Ad Hoc On Demand Distance Vector Routing”, Sun MicroSystem Laboratories Advance Development Group, Proceeding of the IEEE MOBICOM, pp 90-100, 1999.
[29] B. Johnson and A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, Proc. Mobile Computing Journal, Vol.353, pp 153-181, 1996.
[30] Kamlesh Chandravanshi, Akrosh Tiwari And Mukesh Bathre, “Intrusion Detection system in Wireless Ad-Hoc Network”, Computer and Network Technology, pp. 267-271, 2009. https://doi.org/10.1142/9789814289771_0052
[31] M. Pirrete and R. Brooks, “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence”, International Journal of Distributed Sensor Networks, Vol.2, No.3, pp 267-287, 2006.
Citation
Prince Kumar, Rachana kamble, "A Deep Study of Hybrid Trust Built To Improve Security Technique against Sybil Attack in MANET Based IoT Network," International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.1-8, 2021.
Unsupervised Context-Based Probabilistic Text Classification
Research Paper | Journal Paper
Vol.9 , Issue.12 , pp.9-14, Dec-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i12.914
Abstract
Text classification is the one of the primary tasks in Natural Language Processing (NLP). Key phrase extraction is the fundamental component that aids the mapping of documents to a set of emblematic phrases. For example, a category that includes IT documents can be described as “Information and Computer” or “Information and Technology”. If a text document includes keywords such as “issue” and “order”, then it belongs to “Issue Category”. Multiple pre-trained and deep learning approaches are available now-a-days for semantic analysis. Word embeddings are predominant technique that provides light to find the semantic similarity between tokens/phrases using word vectors. The most widely used word embeddings are GloVe, Word2vec, BERT etc. Experimental results show that the strategy produced by this study have more precision and simplicity than that of other methods.
Key-Words / Index Term
Document Categorization, Keywords Extraction, Concept Learning, Multi-class Probabilistic Classification, Content Mining
References
[1] An Jiyuan and Chen, Yi?Ping Phoebe 2005, "Keyword text extraction for text categorization", in Proceedings of the 2005 International Conference on Active Media Technology, pp.556?56 June 2005
[2] Bhumika, Prof Sehra SS, Prof Nayyar A, “A review paper on algorithms used for text classification,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, Issue 3, March 2013.
[3] R Shrihari C, Desai A, “A review on knowledge discovery using text classification techniques in text mining,” International Journal of Computer Applications (0975 – 8887), vol. 111 – No 6, February 2015.
[4] Dang, S., & Ahmad, P.H ,”A Review of Text Mining Techniques Associated with Various Application Areas”, International Journal of Science and Research (IJSR), Vol.4, No.2, pp.2461-2466,2015.
[5] Mehmet Fatih KARACA and Safak BAYIR "Examining the Impact of Feature Selection Methods on Text Classification" Published by : (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 12 , 2017.
[6] R. Janani1, S. Vijayarani "Text Classification: A Comparative Analysis of Word Embedding Algorithms", International Journal of Computer Sciences and Engineering, Vol.7, Issue-4, April 2019.
[7] Riya Tyagi "Review of Extraction and Classification of Key-Phrases in Scientific Publications using CRF and WEDP" Published by : International Journal of Engineering Research & Technology, Volume 09, Paper ID : IJERTV9IS060480, 2020.
[8] Rafly Indra and Abba Suganda Girsang "Classification of User Comment Using Word2vec and Deep Learning" Published by : Advances in Science, Technology and Engineering Systems Journal, Volume 9 No.1 , Page 643– 648 , 2021.
[9] S. Sreedhar, S. Ahmed, P. Flora, LS Hemanth, J. Aishwarya, R. Naik "An Improved Approach of Unstructured Text Document Classification Using Predetermined Text Model and Probability Technique",Published by : International Journal of Recent Technology and Engineering, ISSN: 2277-3878, Volume-8 Issue-2S10. January 2021.
Citation
Ananya Srivastava, Lavanya Gunasekar, Bagya Lakshmi V., Navneeth Devaraj, "Unsupervised Context-Based Probabilistic Text Classification," International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.9-14, 2021.
Channel Characterization of a Dense UMTS and LTE Network for Improved Services in South-West, Nigeria
Research Paper | Journal Paper
Vol.9 , Issue.12 , pp.15-22, Dec-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i12.1522
Abstract
The need for excellent delivery in wireless communication and the demand for high data rate transmission have resulted in the investigation of propagation mechanisms for higher-order frequencies, with enormous prospects in increasing data rate with respect to higher bandwidth. Deficiencies in the wireless channel such as poor signal quality, blocked calls, dropped calls, interference problems, etc make it eminent for the development of path loss prediction and estimation models that predict the signal strength of any given terrain. This research is focused on determining the mathematical model that characterizes the propagation environment of a dense urban area in Lagos, Nigeria (Festac town). The RSS measured was used to characterize the environment and a path loss model was developed for both UMTS and LTE in the test environment as ???????? (d) = 77 + 32 ???????????? (????) and ???????? (????????) = 81 + 26 ???????????? (????) respectively. The path loss model developed was tested and its goodness of fit (R^2) was found to be 0,83 for both UMTS and LTE network respectively. This serves as a basis for predicting the path loss of measured data in the environment under research with greater precision and helps in optimizing the overall performance of the wireless mobile network in proffering seamless services in Lagos, Nigeria.
Key-Words / Index Term
Path-loss, Channel Characterization, LTE, UMTS, Lagos
References
[1] Abhayawardhana V. S. Wassel I. J. Crosby D., Sellers M. P., & M. G., Brown, “Comparison of empirical propagation path loss models for fixed wireless access systems,”, 61th IEEE Technology Conference, Stockholm, vol. 1, pp. 73-77, 2005.
[2] Seybold J. S., Introduction to RF propagation. John Wiley and Sons Inc., New Jersey; 2005 Sep. p. 352, 2005.
[3] Ekpenyong M, Robinson S, & Isabona J., Macro cellular propagation predictionfor wireless communications in urban environments. Georgian Electronic Scientific Journal: Computer Science and Telecommunications. 10 (3):130–6, 2010.
[4] Nadir Z, & Ahmad M. I. (2010), Path loss determination using Okumura-Hata model and cubic regression for missing data in Oman. Proceeding of the International Multi-conference of Engineers and Computer Scientists (IMECS). 2010 Mar 17–19; II:1–4. PMCid: PMC3552452
[5] Applebaum S. , “Adaptive arrays,” Technical Report SPL TR-66 001, Syracuse Univ. Rec., Corp. Report, 1965.
[6].Erceg, V. and et al, “An Empirically Based Path Loss Model for Wireless Channels in Suburban Environments” IEEE journal on selected areas in communications, vol. 17, no. 7, 1999.
[7] Augustus E. I, Agbotiname L. I, Simeon O. A, Samuel N. J, Charles U. N & Francis E. I. (2017), An Empirical Propagation Model for Path Loss Prediction at 2100MHz in a Dense Urban Environment ISSN (Print) : 0974-6846, ISSN (Online) : 0974-5645, Indian Journal of Science and Technology, Vol 10(5), DOI: 10.17485/ijst/2017/v10i5/90654, February 2017
[8] Aymen Z. & Milan D. (2017), Performance Analysis of Path loss Prediction Models in Wireless Mobile Networks in Different Propagation Environments. Proceedings of the 3rd World Congress on Electrical Engineering and Computer Systems and Science (EECSS`17) Paper No. VMW 103 ISSN: 2369-811X DOI: 10.11159/vmw17.103, Rome, Italy – June 4 – 6, 2017.
[9] Azubogu, A.C.O et al (2010) “Empirical-Statistical Propagation Pathloss Model for Suburban environment of Nigeria at 800MHz band”, The IUP Journal of Science and Technology, India.
[10]Nadir Z., Elfadhil, N. and Touati, F., (2008) “Path loss Determination Using Okumura-Hata Model and Spline Interpolation for Missing Data for Oman Proceedings of the World Congress on Engineering” Vol I WCE 2008, July 2 - 4, 2008, London, U.K.
[11]Rappaport T. S., Wireless communications: principles and practice. 2nd. Ed, Prentice Hall, New Delhi, 2005.
[12]Ghosh P. M. Hossain M. A., Zainul-Abadin, K. & Karmakar, K. (2012), “Comparison among different large scale path loss models for high sites in urban, suburban and rural areas,” International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 2, pp. 287-290, 2012.[13]Pan Y. H. Lataeif K. Cao Z. (2004),” Dynamic Spatial Subchannel Allocation with Adaptive Beamforming for MIMO/OFDM Systems,”, IEEE Trans. Wireless Commun., vol. 3, pp. 2097-2107, 2004.
[14]Medeisis & Kajackas, “ Use of the Universal Okumura Hata Propagation Prediction Model in Rural Area’’ Vehicular Technology Conference Proceedings, VTC Tokyo, Vol 3 pp 1818, 2000.
[15]Ubom E. A, Idigo V. E, Azubogu A. C. O, Ohaneme C. O, & Alumona T. L. (2011) Path loss characterization of wireless propagation for south-south region of Nigeria. International Journal of Computer Theory and Engineering. 3(3):478–82, 2011.
Citation
Nnebe Scholastica U., Odeh I. Ochim, Nwankwo Vincent I., "Channel Characterization of a Dense UMTS and LTE Network for Improved Services in South-West, Nigeria," International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.15-22, 2021.
Pest Detection System
Research Paper | Journal Paper
Vol.9 , Issue.12 , pp.23-25, Dec-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i12.2325
Abstract
Pests are organisms that spread diseases as well as causes destruction to the crops. Detection of pests is a must-do in the field of agriculture as growing plants to their fullest requires making the plant free from diseases. Although there are pesticides and insecticides available in the market, proper use of them and selection of them is a must to avoid excessive use or improper use of pesticide and insecticide. In this proposed system, pests are first attracted to a chemical named 1-Octen-3-ol above which flypaper is placed which will trap the small insects after which those insect gets detected using a USB digital microscope endoscope magnifier video camera and YOLO real-time object detection algorithm. The experiment has shown accurate results and might be a useful solution for preventing pests from destroying crops.
Key-Words / Index Term
Pests, Agriculture, Microscope, Endoscope, Insecticide, Pesticide, YOLO, Deep learning, Image Processing.
References
[1] D. Gondal, Y. Khan, “Early Pest Detection from Crop using Image Processing and Computational Intelligence”, FAST-NU Research Journal (FRJ), Volume 1, Issue 1, January 2015
[2] https://plantmethods.biomedcentral.com/articles/10.1186/s13007-019-0475-z
[3] https://assets.researchsquare.com/files/rs242641/v1/9584bc73-4d82-4f48-8474 aea00f7d704f.pdf?c=1631874347
[4] P. Ashok, J. Jayachandran, “Pest Detection and Identification by Applying Color Histogram and Contour Detection by Svm Model”, Volume 8, Issue 3S, February 2019
[5] L. Deng, Y. Wang, “Research on insect pest image detection and recognition based on bio-inspired methods”, Volume 169, Pages 139-148, May 2018
[6] Faithpraise Fina, “AUTOMATIC PLANT PEST DETECTION AND RECOGNITION USING k-MEANS CLUSTERING ALGORITHM AND CORRESPONDENCE FILTERS”, IJABR, Vol 4, Issue 2, 2013, pp 189-199
[7] Jun Lui, “Tomato Disease and Pest Detection based on Improved YOLO V3 CNN”, Frontiers, 16 June 2020
[8] Aparajita Datta, “Classification of Agricultural Pests Using Statistical and Color Feature Extraction and Support Vector Machine”, IJCSE, Volume 7, Issue 1, Page no. 37-41, Jan 2019
[9] D. Sindhu, “Image Processing Technology Application for Early Detection and Classification of Plant Diseases”, IJCSE, Volume 7, Issue 5, Page no. 92-97, May 2019
Citation
Harshil Rana, Reema Pandya, "Pest Detection System," International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.23-25, 2021.
Review on Major Cyber security Issues in Educational Sector
Review Paper | Journal Paper
Vol.9 , Issue.12 , pp.26-29, Dec-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i12.2629
Abstract
The demand for information security in higher education will continue to grow. A lack of risk management has already resulted in catastrophic data breaches, and these incidents are expected to continue. Academics, students, and universities around the world have been subjected to a constant torrent of attacks. This study relies on a review of several educational surveys. As a result of this research, new lines of study will be opened up for higher education security. Various sources have been analysed in this report to provide an overview of cyber security challenges. We categorise our review mostly based on the research questions that we address. In order to gain a foothold in the educational community, it will be beneficial to both corporations and academics.
Key-Words / Index Term
Threats, Virtual learning Environment, Issues, E-Learning
References
[1] Bongiovanni, I. The least secure places in the universe? A systematic literature review on information security management in higher education. Comput. Secur. 86, 350–357, 2019.
[2]Report on Business-standard. Available on: https://www.business-standard.com/article/technology/indian-tops-global-cyber-attacks-on-education-sector-report-121081801000_1.html
[3] FireEye, Inc. Cyber tHreats to the Education Industry. White Paper, 2016. Library Catalog. Available online: www.fireeye.com (accessed on 28 January 2021).
[4] Adams A; Blanford," A. Security and Online Learning: To Protect and Prohibit. In Usability Evaluation Of Online Learning Programs"; IGI Global: Hershey, PA, USA, pp. 331–359, 2003.
[5] J. ChapmanHow Safe Is Your Data? Cyber-Security in Higher Education. HEPI Policy Note, April ISO/IEC 27002:2013 Information Technology–Security Techniques–Information Security Risk Management; Standard; InternationalOrganization for Standardization: Geneva, Switzerland, 2018.
[6] G.Wangen,C.Hallstensen ,E.Snekkenes "A framework for estimating information security risk assessment method completeness.Int. J. Inf. Secur. 2017.
[7] J. Chapman "How Safe Is Your Data? Cyber-Security in Higher Education". HEPI Policy Note, April 2019.
[8] M. Whitman, H. Mattord, "Threats to Information Protection-Industry and Academic Perspectives: An annotated bibliography". J.Cybersecur. Educ. Res. Pract. 2016.
[9] K.Beaudin," The Legal Implications of Storing Student Data: Preparing for and Responding to Data Breaches".New Dir. InstitutionalRes. 37–48, 2017.
[10] K.Beaudi"College and university data breaches: Regulating higher education cybersecurity under state and federal law". J. Coll.Univ. Law 41, 657–693, 2015.
[11] H.S. Hussain,R.Din,N.Z Khidzir, K.A.M Daud, S.Ahmad, " Risk and Threat via Online Social Network among Academia at Higher Education". J. Physics: Conf. Ser. 1018, 012008 , 2018.
[12] I. Ajie, "A Review of Trends and Issues of Cybersecurity in Academic Libraries". Libr. Philos. Pract1–20. Available online:https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=5803&context=libphilprac (accessed on 28 January 2021).
[13] A.Diaz, A.T Sherman,A. Joshi, "Phishing in an Academic Community: A Study of User Susceptibility and Behavior". arXiv: 1811.06078, 2018.
[14] T. Cuchta, B. Blackwood, T.R Devine, R.J Niichel , K.M. Daniels, C.H.Lutjens, S. Maibach, R. J Stephenson. "Human Risk Factors in Cybersecurity". In Proceedings of the 20th Annual SIG Conference on Information Technology Education, Tacoma, WA,USA, 3–5 October; pp. 87–92, 2019.
[15] M. Dadkhah, G. Borchardt, T. Maliszewski, ,"Fraud in Academic Publishing: Researchers Under Cyber-Attacks". Am. J. Med. 130, 27–30, 2017.
[16] D. Teixeira ,J.Silva, A.Alkhatib, Tsigaris, P. "Spam emails in academia: Issues and costs". Scientometrics 122, 1171–1181, 2020.
[17] G. Wangen, N. Hellesen, H.Torres, E. Brækken, "An empirical study of root-cause analysis in information security management ".In Proceedings of the SECURWARE-The Eleventh International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA), Rome, Italy, 10–14 September 2017.
[18] H. Kashiwazaki, "Personal Information Leak in a University, and Its Cleanup". In Proceedings of the 2018 ACM SIGUCCS Annual Conference; Association for Computing Machinery: New York, NY, USA,; pp. 43–50, 2018.
[19] A.Deepa E. C. Blessie,”Input Analysis for Accreditation Prediction in Higher Education Sector by Using Gradient Boosting Algorithm”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.3, pp.23- 27, 2018.
[20]A Survey on Impact of IoT Enabled E – Learning Services, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.178-183, 2018.
Citation
Ankita sharma, "Review on Major Cyber security Issues in Educational Sector," International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.26-29, 2021.
Feature Extraction of Medical Images Using Moment Invariants
Research Paper | Journal Paper
Vol.9 , Issue.12 , pp.30-33, Dec-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i12.3033
Abstract
Automatic shape recognition and feature extraction from images has become very significant in today’s digital word as the use of digital images has grown exponentially over the last few decades. Image processing is a method which uses computer algorithms to extract various useful information from the digital images. Image processing mainly involves visualization, pattern recognition, feature extraction, classification etc. Moment invariants have been used as features for image processing. Moments can provide features of an object that uniquely represent its shape. These features are independent of translation, scale and rotation. The aim of this paper was to investigate the usefulness of moment invariants for the feature extraction from digital images. Two experiments were conducted to test the moment invariant for rotation invariance and scale invariance. The study found that most of the seven features had minor fluctuations when rotating or scaling the image.
Key-Words / Index Term
Moment Invariant, Image processing, Pattern recognition, Feature extraction
References
[1] R. E. Twogood and F. G. Sommer, “Digital Image Processing”, in IEEE Transactions on Nuclear Science, vol. 29, no. 3, pp. 1075-1086, 1982.
[2] Z. Hu, H. Zheng and J. Gui, “A Novel Interactive Image Processing Approach for DICOM Medical Image Data”, 2nd International Conference on Biomedical Engineering and Informatics, pp. 1-4, 2009.
[3] Huang Zhihu and Jinsong Leng, “Analysis of Hu`s moment invariants on image scaling and rotation”, 2nd International Conference Computer Engineering and Technology (ICCET), vol. 7, 2010.
[4] Jan Flusser, “Moment Invariants in Image Analysis”, Proceedings of World Academy of Science, Engineering and Technology, Vol 11, pp. 196-201, 2006.
[5] M. K. Hu, “Visual Pattern Recognition by Moment Invariants”, IRE Trans. on Information Theory, Vol. IT-8, pp. 179-187, 1961.
[6] R. Y. Wong and E. L. Hall, “Scene Matching with Invariant Moments”, Computer Graphics and Image Processing, vol. 8, pp. 16–24, 1978.
[7] J. Flusser and T. Suk, “Affine moment invariants: A new tool for character recognition”, Pattern Recognition Letters, vol. 15, pp. 433–436, 1994.
[8] S. O. Belkasim, M. Shridhar, and M. Ahmadi, “Pattern recognition with moment invariants: a comparative study and new results”, Pattern Recognition, vol. 24, pp. 1117–1138, 1991.
[9] T. H. Reiss, “The revised fundamental theorem of moment invariants”, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 13, pp. 830–834, 1991.
[10] L. van Gool, T. Moons, and D. Ungureanu, “Affine/photometric invariants for planar intensity patterns”, in Proc. 4th ECCV’96, Springer, vol. LNCS 1064, pp. 642–651, 1996.
[11] Jan Flusser, Barbara Zitova, Tomas Suk, “Moments and Moment Invariants in Pattern Recognition”, Wiley Publications, 2009.
[12] M. Fachrurrozi, Saparudin, A. Lestari, O. Arsalan, Samsuryadi and Ermatita, “Multiple Face Image Feature Extraction Using Geometric Moment Invariants Method”, International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), pp. 219-224, 2019.
[13] B. P. H. K. M. D. Senarathna and R. M. T. P. Rajakaruna, “Feature Descriptor for Sri Lankan Batik Patterns Using Hu Moment Invariants and GLCM”, 10th International Conference on Information and Automation for Sustainability (ICIAfS), pp. 197-202, 2021.
[14] S. Sharma and P. Khanna, “Computer-Aided Diagnosis of Malignant Mammograms using Zernike Moments and SVM”, Journal of digital imaging vol. 28, 1, pp. 77-90, 2015.
[15] S. Urooj and S. P. Singh, “Geometric invariant feature extraction of medical images using Hu`s invariants”, 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1560-1562, 2016.
[16] Y. M. Vaidya, B. S. V. Swati and N. Kantipudi, “Moment Invariants based feature techniques for segmentation of retinal images using supervised method”, International Conference on Industrial Instrumentation and Control (ICIC), pp. 1373-1377, 2015.
[17] Y. Jusman, M. K. Anam, S. Puspita and E. Saleh, “Machine Learnings of Dental Caries Images based on Hu Moment Invariants Features”, International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 296-299, 2021.
[18] Laura Keyes and Adam Winstanley, “Applying Computer Vision Techniques To Topographic Objects”, International Archives of Photogrammetry and Remote Sensing. Vol. XXXIII, Part B3, Amsterdam, pp. 480-487, 2000.
[19] Dehghan, M. and Faez, K., “Farsi Handwritten Character Recognition with Moment Invariants”, International Conference on Digital Signal Processing, Vol. 2, pp. 507-510, 1997.
[20] V. V. Agarkar, “Analysis of Sperm Morphology in Microscopic Images based on Moment Invariants”, M. Phil. Dissertation, Alagappa University, Karaikudi, 2009.
Citation
V.V. Agarkar, "Feature Extraction of Medical Images Using Moment Invariants," International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.30-33, 2021.
Sentimental Analysis of online study of College and School going Students
Research Paper | Journal Paper
Vol.9 , Issue.12 , pp.34-42, Dec-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i12.3442
Abstract
Online research opinion mining and sentiment analysis of college and school going students may accurately represent the students learning circumstances, providing the theoretical foundation for further revisions of teaching programmes. Analysis of student learning experiences using data mining and sentiment analysis in online learning community may lay the theoretical groundwork for future changes to teaching programmes. The term "online study" is the study that takes place using the internet. One of the objectives of the project is the creation and assessment of a conceptual model that incorporates students` learning and teaching preferences as well as technological experience, as well as their feelings about how these things impact their learning and teaching. An online survey of college and school going students was performed. It was found that some clusters of students were formed after applying k-means clustering machine learning algorithm which shows us that some changes should be adopted in the current online study scenario. Prediction and visualization of the data is done by seaborn, matplotlib python libraries which helps us to understand the pattern of the data. It is expected that this assessment would create a better system for students to study. Discoveries corroborate hypotheses about the influence of sentiment on factors such as attitude, favorite hobbies, and technological experience.
Key-Words / Index Term
online study, sentiment analysis, python, machine learning, clustering, k-means sert
References
[1]. Carnelley, K. B. & Rowe, A. C. Priming a sense of security: what goes through people’s minds? Journal of Social and Personal Relationships, vol.27, Issue 2,PP 253-261,2010
[2]. Kaklauskas, A., Zavadskas, E.K., Seniut, M.,” Recommender system to analyze student’s academic performance”, Expert Systems with Applications ,vol 40,Issue 15,PP 6150-6165,2013
[3]. Chu, K.M., & Li, F.,“Topic evolution based on LDA and topic association” J. Shanghai Jiao tong Univ. (Sci),vol. 44,Issue 11, PP 1501–1506,2010.
[4].Cerulo, L., & Distante, D,“Topic-driven semi-automatic reorganization of online discussion forums: A case study in an e-learning context”. Global Engineering Education Conference. IEEE, March 13–15, Berlin, Germany,2013.
[5]. Chen, Y.C. A novel algorithm for mining opinion leaders in social networks. World Wide Web-internet & Web Information Systems. 2018.
[6].Ethem, F.C., Aysu, E.C., & Fazli, C. ,“Multilingual sentiment analysis: An RNN-based framework for limited data” arXiv: 1806.04511,2018.
[7]. Colace, F., De Santo, M., & Greco, L.,“SAFE: A sentiment analysis framework for e-Learning” International Journal Of Emerging Technologies In Learning (IJET), vol 9 Issue 6, PP 37–41.,2014.
[8]. Gao, G., Luo J.M., & Wang, Y.,“Robust visual-textual sentiment analysis: When attention meets tree-structured recursive neural networks” 24th ACM international conference on multimedia, pp 1008-1017,2016.
[9]. Kohoulat, N., Hayat, A.A., Dehghani, M.R., Kojuri, J., & Amini, M.,“Medical students’ academic emotions: the role of perceived learning environment” Journal of Advances in Medical Education & Professionalism, vol 5,Issue2, 2017.
[10]. Hady, M.F.A., & Schwenker, F.,” Co-training by Committee: A New Semi-supervised Learning Framework” Workshops IEEE International Conference on Data Mining,2008.
[11].Vinodhini, G., “Sentiment mining using SVM-based hybrid classification model”. Advances in Intelligent Systems & Computing, volume 246, 2013.
[12]. Wang, J., Zuo, W., & Tao, P.,“Hyponymy graph model for word semantic similarity measurement”, Chinese Journal of Electronics, vol.24,Issue 1,2015.
[13].Zhang, Y.F., Li, H., Peng, L.H., & Hou, L.T.,“The usefulness classification algorithm and application of online reviews based on emotional semantic feature extraction” Data Analysis and Knowledge Discovery, volume1,Issue12,2017.
[14].Kanwar, A.; Daniel, J. Report to Commonwealth Education Ministers: From Response to Resilience; Commonwelath of Learning: Burnaby, BC, Canada, 2020.
[15]. Reema Tareja, “Data warehousing” ,2009
Citation
Mamta Tiwari, Swagata Dutta, "Sentimental Analysis of online study of College and School going Students," International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.34-42, 2021.