Non-Deterministic Finite Automata to Deterministic Finite Automata Conversion by Subset Construction Method using Python
Research Paper | Journal Paper
Vol.10 , Issue.1 , pp.1-5, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.15
Abstract
The theory of finite automata, formal languages and complexity are the modern branches in the field of computer theory and their mathematical models play a very important role in the practical world. This makes it really important, in theory as well as practice to translate a Non-deterministic Finite Automata (NFA) into a Deterministic Finite Automata (DFA). Many different approaches are developed for doing so. In this paper, an optimized algorithm for transition from NFA to DFA is given. This method is implemented using the programming language called python3. Along with this we have also used the pandas library of python for constructing the transition tables for NFA as well as DFA. A website for the same is also created to make it more user friendly by using the streamlit library of python.
Key-Words / Index Term
DFA, Finite Automata, NFA, NFA to DFA, Streamlit Web Application
References
[1] Jing Maohua, G.-R. Li, W.-B. Shi, S.-X. Cai, “Improved conversion algorithm from NFA to DFA”, Dongbei Daxue Xuebao/Journal of Northeastern University, Vol.33(4), April 2012.
[2] C. H. Chanh, R. Paige, “From regular expression to DFA using compressed NFA”, Theoretical Computer Science, Vol.178, Issue.1-2, pp.1-36, May 1997.
[3] N.Murugesan, O. V. Shanmuga Sundaram, “A General Approach to DFA Construction”, International Journal of Research in Computer Science, Vol.2, Issue.4, pp.12-17, 2015.
[4] P. Linz, “An Introduction to formal languages and Automata”, D. C. Health and Company, 1996.
[5] K. Salomaa, S. Yu, “NFA to DFA conversion for finite languages”, Lecture Notes in Computer Science, pp.149-158, 2006.
[6] M. Sipser, “An Introduction to the Theory of Computation”, Second Edition, Thomson Course Technology, 2006.
[7] M. Davoudi-Monfared, R. shafiezadeh garousi, E. S. Haghi, S. Zeinali and S.Mohebali, “Converting different automata with programming C++”, International Journal of Advanced Computer Research, Vol.5, Issue.21, December 2015.
[8] Raza, Mir Adil, Kuldeep Baban Vayadande, and H. D. Preetham. "DJANGO MANAGEMENT OF MEDICAL STORE.", International Research Journal of Modernization in Engineering Technology and Science, Vol.2, Issue.11, November 2020.
[9] K.B. Vayadande, Nikhil D. Karande,” Automatic Detection and Correction of Software Faults: A Review Paper”, International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653, Vol.8, Issue.4, April 2020.
[10] Kuldeep Vayadande, Ritesh Pokarne, Mahalaxmi Phaldesai, Tanushri Bhuruk, Tanmai Patil, Prachi Kumar, “SIMULATION OF CONWAY’S GAME OF LIFE USING CELLULAR AUTOMATA” International Research Journal of Engineering and Technology, Vol.9, Issue.1, Jan 2022, e-ISSN: 2395-0056, p-ISSN: 2395-0072.
[11] Kuldeep Vayadande, Harshwardhan More, Omkar More, Shubham Mulay, Atharva Pathak, Vishwam Talnikar, “ Pac Man: Game Development using PDA and OOP”, International Research Journal of Engineering and Technology (IRJET), Volume: 09 Issue: 01 | Jan 2022, e-ISSN: 2395-0056, p-ISSN: 2395-0072.
Citation
Kuldeep Vayadande, Krisha Patel, Nikita Punde, Shreyash Patil, Srushti Nikam, Sudhanshu Pathrabe, "Non-Deterministic Finite Automata to Deterministic Finite Automata Conversion by Subset Construction Method using Python," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.1-5, 2022.
Study of e-Tendering Solution Implemented by Government of Goa
Research Paper | Journal Paper
Vol.10 , Issue.1 , pp.6-12, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.612
Abstract
The paper focuses a comprehensive review on implementation of e-Tendering solution in comparison to the conventional envelop-Box (manual Tendering) method in the State of Goa (India). Some of the key issues like Comparative analysis of pre-deployment and post deployment scenarios with the launch of e-Tendering Solution, highlighting the day-to-day problems faced by the System Users. And also, to consider the best practices that can be followed in improving rollout of e-Tendering solution. The study inferred that in spite of several challenges, how Vendors/Contractors and Departmental Users has accepted the e-Tendering system over manual tendering. This research paper is based on the descriptive and exploratory methods used for analysis of collected responses as the primary data for the study from Vendors/Contractors and Departmental Users through the online mode. This paper has targeted the end user of the e-Tendering solution their day-to-day issues and challenges and describing the advancement made by the Government for easy run of Tendering system.
Key-Words / Index Term
e-Procurement, e-Tender, Goa, Government, Vendors, Contractors, e-Payment
References
[1] Dr. Shruti Singh, Rubee Singh, “Impact of E-Governance in India: Opportunities & Challenges”, International Journal for Innovative and Management Research, Vol 07 Issue07, Jun 2018
[2] Nilesh B. Fal Dessai, Gaurav A. Naik, Vinay B. P., “e-Tendering Solution with e-Payment Integration for the State of Goa”, International Conference Series on Theory and Practice of Electronic Governance(ICEGOV`17) :March 2017.
[3] Circular bearing No. 7/13/2011/Fin-Exp dated 07/06/2011 issued by Government of Goa, Finance (Expenditure) Department, Secretariat, Porvorim-Goa.
[4] Circular bearing No. 7/13/2011/Fin-Exp dated 13/10/2011 issued by Government of Goa, Finance (Expenditure) Department, Secretariat, Porvorim-Goa.
[5] Circular bearing No. 7(314)/2009/DOIT/e- Tendering/e-Procurement/849 dated 04/08/2011 issued by Department of Information Technology, Government of Goa.
[6] Circular bearing No 7(373)2011/DOIT/e-Procurement correspondence/1053 dated 17/10/2019 issued by Department of Information Technology, Government of Goa.
[7] https://goaenivida.gov.in Goa e-Nivida e-Tendering portal
[8] https://infotech.goa.gov.in Info Tech Corporation of Goa Limited, Government of Goa Undertaking
[9] Vinit Parida, Kittipong Sophonthummapharn, Upasana Parida, “Understanding E-procurement: Qualitative Case Studies.
[10] Funlade T. Sunmolaa, Yusuf U. Shehua, “A Case Study on Performance Features of Electronic Tendering Systems”,30th International Conference on Flexible Automation and Intelligent Manufacturing (FAIM2021)
[11] K Bikshapathi, P Raghuveer, “Implementation of e-procurement
in the Government of Andhra Pradesh: A Case Study”,
[12] Sara Belisari, Daniele Binci, Andrea Appolloni, “E-Procurement Adoption: A Case Study about the Role of Two Italian Advisory Services”, Sustainability 2020, 12, 7476; doi:10.3390/su12187476
[13] Ewa Roszkowska , “Rank Ordering Criteria Weighting Methods – A Comparative Overview”, Jan 2013
[14] Mukhtar A. Kassem, Muhamad Azry Khoiry, Noraini Hamzah, “Using Relative Importance Index Method for Developing Risk Map in Oil and Gas Construction Projects”, Jurnal Kejuruteraan 32(3) 2020: 85-97
[15] Rakesh Rana, Richa Singhal, “Chi?square Test and its Application in Hypothesis Testing”, Journal of the Practice of Cardiovascular Sciences • January 2015
[16] Dr. Jenny V. Freeman, Steven A. Julious, “The visual display of quantitative information”, Book
Citation
Gaurav A. Naik, Vinita Korgaonkar, "Study of e-Tendering Solution Implemented by Government of Goa," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.6-12, 2022.
Simulation and Testing of Deterministic Finite Automata Machine
Research Paper | Journal Paper
Vol.10 , Issue.1 , pp.13-17, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.1317
Abstract
This article describes a JavaScript and GUI-based visualization tool for constructing, debugging, and testing DFA that can be utilized in the automata theory classroom. In automata, DFA is an important problem. What DFA is, DFA refers to deterministic finite automata. Deterministic refers to the uniqueness of the computation. If the machine reads an input string one symbol at a time, the finite automata are termed deterministic finite automata. In DFA, there is only one path from the current state to the next state for specific input. The null move is not accepted by DFA, which means it cannot change the state without any input character. Multiple final states can be found in DFA. Like other automata visualization tools, users can edit and construct DFA by adding states and transitions and can observe transition execution by providing string input for testing. This DFA simulator allows users to construct DFA by adding states, marking any state as a final state, and also checking for string if it is valid for constructed DFA or not.
Key-Words / Index Term
HTML, CSS, jQuery, JavaScript, Bootstrap CSS, finite automata, visualization, simulator
References
[1] M. T. Morazán, J. M. Schappel, and S. Mahashabde, “Visual designing and debugging of deterministic finite-state machines in FSM,” Electronic Proceedings in Theoretical Computer Science, vol. 321, pp. 55–77, 2020.
[2] S. H. Rodger, A. O. Bilska, K. H. Leider, M. Procopiuc, O. Procopiuc, J. R. Salemme, and E. Tsang, “A collection of tools for making automata theory and formal languages come alive,” Proceedings of the twenty-eighth SIGCSE technical symposium on Computer science education - SIGCSE `97, 1997.
[3] H. Raffelt, M. Merten, B. Steffen, and T. Margaria, “Dynamic testing via Automata Learning,” International Journal on Software Tools for Technology Transfer, vol. 11, no. 4, pp. 307–324, 2009.
[4] P. G. Naik, S. G. Patil, and G. R. Naik, “Natural language interface for querying hardware and software configuration of a local area network,” International Journal of Computer Sciences and Engineering, vol. 7, no. 2, pp. 949–963, 2019.
[5] D. Ficara, S. Giordano, G. Procissi, F. Vitucci, G. Antichi, and A. Di Pietro, “An improved DFA for fast regular expression matching,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 5, pp. 29–40, 2008.
[6] Jiwei Xue, Yonggao Li and Bo Nan, "Application research of finite automaton in distance education," 2010 4th International Conference on Distance Learning and Education, 2010, pp. 129-133, doi: 10.1109/ICDLE.2010.5606024.
[7] Raza, Mir Adil, Kuldeep Baban Vayadande, and H. D. Preetham. "DJANGO MANAGEMENT OF MEDICAL STORE.", International Research Journal of Modernization in Engineering Technology and Science, Volume:02 Issue:11 November -2020
[8] K.B. Vayadande, Nikhil D. Karande,” Automatic Detection and Correction of Software Faults: A Review Paper”, International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653, Volume 8 Issue IV Apr 2020.
[9] Kuldeep Vayadande, Ritesh Pokarne, Mahalaxmi Phaldesai, Tanushri Bhuruk, Tanmai Patil, Prachi Kumar, “SIMULATION OF CONWAY’S GAME OF LIFE USING CELLULAR AUTOMATA” International Research Journal of Engineering and Technology (IRJET), Volume: 09 Issue: 01 | Jan 2022, e-ISSN: 2395-0056, p-ISSN: 2395-0072
[10] K. B. Vayadande, N. D. Karande, and S. Yadav, “A review paper on detection of moving object in dynamic background,” International Journal of Computer Sciences and Engineering, vol. 6, no. 9, pp. 877–880, 2018.
[11] Varad Ingale, Kuldeep Vayadande, Vivek Verma, Abhishek Yeole, Sahil Zawar, Zoya Jamadar. “Lexical analyzer using DFA”, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
[12] Kuldeep Vayadande, Harshwardhan More, Omkar More, Shubham Mulay, Atharva Pathak, Vishwam Talnikar, “ Pac Man: Game Development using PDA and OOP”, International Research Journal of Engineering and Technology (IRJET), Volume: 09 Issue: 01 | Jan 2022, e-ISSN: 2395-0056, p-ISSN: 2395-0072
[13] Rohit Gurav, Sakshi Suryawanshi, Parth Narkhede, Sankalp Patil, Sejal Hukare, Kuldeep Vayadande,” Universal Turing machine simulator”, International Journal of Advance Research, Ideas and Innovations in Technology, (Volume 8, Issue 1 - V8I1-1268, ISSN: 2454-132X
Citation
Kuldeep B. Vayadande, Parth Sheth, Arvind Shelke, Vaishnavi Patil, Srushti Shevate, Chinmayee Sawakare, "Simulation and Testing of Deterministic Finite Automata Machine," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.13-17, 2022.
IMDb Movie Data Classification using Voting Classifier for Sentiment Analysis
Research Paper | Journal Paper
Vol.10 , Issue.1 , pp.18-23, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.1823
Abstract
Social networking sites have become popular and common places in which short texts share emotional diversity. These emotions are sadness, happiness, fear, anxiety, and so on. In order to identify sentiments expressed by the crowd, it helps in analyzing short texts. On IMDb movie reviews, sentiment analysis identifies a reviewer`s overall sentiment or opinion on a movie. We worked on the IMDb movie dataset in this paper. which was retrieved from Kaggle which was crawled and labelled positive/negative. The available dataset consists of emoticons, Id, Data, Query, username and converted into a standard from. We get these results by utilizing a Voting Classifier with Logistic Regression & Random Forest, which is a traditional machine learning algorithm. Furthermore, the results of these algorithms were compared using five evaluation criteria. metrics – accuracy(89.34),precision(88.71),recall(90.35), F1 measure(89.52),and Area under Curve (89.33).
Key-Words / Index Term
Sentiment Analysis, Feature Extraction, Voting classifier, Machine Learning, IMDb data
References
[1] Tajinder singh, Madhu Kumari, “Role of Text Pre-Processing in Twitter Sentiment Analysis”, Procedia Computer Science 89 (2016), pp.549-554.
[2] Isha Gandhi, Mrinal Pandey, “Hybrid Ensemble of Classifiers using Voting”, Green Computing and Internet of Things (ICGCIoT), 2015, DOI: 10.1109/ICGCIoT.2015.7380496.
[3] Bin Lu, K.T. Benjamin,” Combining A Large Sentiment Lexicon And Machine Learning For Subjectivity Classification”, Machine Learning and Cybernetics (ICMLC), 2010,DOI: 10.1109/ICMLC.2010.5580672.
[4] Zamahsyari, Arif Nurwidyantoro, “Sentiment Analysis of Economic News in Bahasa Indonesia Using Majority Vote Classifier”, Data and Software Engineering (ICoDSE), 2016, DOI:10.1109/ICODSE.2016.7936123.
[5] Andrew L. Maas, Raymond E. Daly, Peter T. Pham, Dan Huang, Andrew Y. Ng, Christopher Pos, “Learning Word Vectors for Sentiment Analysis”,2011 In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Portland, Oregon, USA, 142–150. http://www.aclweb.org/anthology/P11-1015
[6] Kumar, V., & Subba, B. (2020). A TfidfVectorizer and SVM based sentiment analysis framework for text data corpus. 2020 National Conference on Communications (NCC). doi:10.1109/ncc48643.2020.9056085
[7] Mahmud, Q. I., Mohaimen, A., Islam, M. S., & Marium-E-Jannat. (2017). A support vector machine mixed with statistical reasoning approach to predict movie success by analyzing public sentiments. 2017 20th International Conference of Computer and Information Technology (ICCIT). doi:10.1109/iccitechn.2017.8281803
[8] Xu, G., Yu, Z., Yao, H., Li, F., Meng, Y., & Wu, X. (2019). Chinese Text Sentiment Analysis Based on Extended Sentiment Dictionary. IEEE Access, 7, 43749–43762. doi:10.1109/access.2019.2907772
[9] Sahu, T. P., & Ahuja, S. (2016). Sentiment analysis of movie reviews: A study on feature selection & classification algorithms. 2016 International Conference on Microelectronics, Computing and Communications (MicroCom). doi:10.1109/microcom.2016.7522583
[10] Hourrane, O., Idrissi, N., & Benlahmar, E. H. (2019). An Empirical Study of Deep Neural Networks Models for Sentiment Classification on Movie Reviews. 2019 1st International Conference on Smart Systems and Data Science (ICSSD). doi:10.1109/icssd47982.2019.9003171
[11] Manjunath, D. R., & Hadimani, B. S. (2019). Hierarchical Clustering and Regression Classification based Review analysis on Movie based Applications. 2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE). doi:10.1109/icatiece45860.2019.9063861
[12] Gladence L, Karthi M, Anu V. A statistical comparison of logistic regression and different Bayes classification methods for machine learning. ARPN J Eng Appl Sci. 2015;10(14):5947–53.
[13] Parmar, A., Katariya, R., & Patel, V. (2018). A Review on Random Forest: An EnsembleClassifier. Lecture Notes on Data Engineering and Communications Technologies,758–763. doi:10.1007/978-3-030-03146-6_86.
[14] https://github.com/jalbertbowden/large-movie-reviews-dataset/tree/master/acl-imdb-v1
Citation
Karishma Kaushik, Mahesh Parmar, "IMDb Movie Data Classification using Voting Classifier for Sentiment Analysis," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.18-23, 2022.
A Comprehensive study on Internet of Things Applications and Challenges
Review Paper | Journal Paper
Vol.10 , Issue.1 , pp.24-27, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.2427
Abstract
The Internet of Things (IoT) is basically viewed as a system which consists of smart objects with various sensors, networks, & processing technologies. IoT transforms the way internet works and carries together the domains such as big data technologies, communication between different machines, artificial intelligence etc. to work underneath the similar canopy so that internet and humans are entangled together. Hence IoT offers pervasive computing giving growth to cyber systems. IoT is an integrated system and works collectively to offer smart services to the end-users. IoT gives several advantages to us by an environment where smart services are offered to use any activity anytime & anywhere. These smart services are offered through different applications executing in the IoT environment. IoT applications monitor & consequently assist in fast decision-making process for client management. In the present work, the different approaches of IoT and its applications unfolding the key components and features are presented. The present work also explores IoT challenges.
Key-Words / Index Term
IoT, Smart applications, Wireless Sensor Networks (WSNs), Quality of Service (QoS).
References
[1] S. Muralidharan, A. Roy, N. Saxena, “MDP-IoT: MDP based interest forwarding for heterogeneous traffic in IoT-NDN environment”, Future Generation Computer Systems, Vol. 79, Issue 3, pp. 892–908, 2018.
[2] J.M. Talavera, L.E. Tobón, J.A. Gómez, M.A. Culman, J.M. Aranda, D.T. Parra, L.A. Quiroz, A. Hoyos, L.E. Garreta, “Review of IoT applications in agro-industrial and environmental fields”, Computers and Electronics in Agriculture,Vol. 142, Issue A, pp. 283–297, 2017.
[3] L. Miao, K. Liu, “Towards a heterogeneous Internet-of-Things Testbed via Mesh inside a Mesh: Poster Abstract”, In: Proceedings of the Fourteenth ACM Conference on Embedded Network Sensor Systems CDROM, Stanford, CA, USA, pp. 368–369, 2016.
[4] T.R. Bennett, C. Savaglio, D. Luo, H. Massey, X. Wang, J. Wu, R. Jafari, “Motionsynthesis toolset (MoST): A toolset for human motion data synthesis and validation”, In: Proceedings of the 4th ACM MobiHoc workshop on Pervasive wireless healthcare, pp. 25–30, 2018.
[5] S. Redhu, M. Maheshwari, K. Yeotikar, R.M. Hegde, “Joint Data Latency and Packet Loss Optimization for Relay-Node Selection in Time-Varying IoT Networks”, In: Proceedings of the Twenty Fourth Annual International Conference on Mobile Computing and Networking, New Delhi, India, ACM, pp. 711-713, 2018.
[6] H. Shafagh, L. Burkhalter, A. Hithnawi, “Talos a platform for processing encrypted IoT data: demo abstract”, In: Proceedings of the Fourteenth ACM Conference on Embedded Network Sensor Systems, Stanford, CA, USA, ACM, pp. 308–309, 2016.
[7] M. Ghobaei-Arani, A. Souri, “LP-WSC: a linear programming approach for web service composition in geographically distributed cloud environments”, J. Supercomput., pp. 1–26, 2018.
[8] M. Ghobaei-Arani, A.A Rahmanian, A. Souri, A.M. Rahmani, “A moth-flame optimization algorithm for web service composition in cloud computing: simulation and verification”. Journal of Software Practice and Experience, Vol. 48, Issue 10, pp. 1865–1892, 2018.
[9] O. Bello, S. Zeadally, “Toward efficient smartification of the Internet of Things (IoT) services”, Future Generation Computer Systems,Vol. 92, pp. 663-673, 2019.
[10] F. Giancarlo, R. Wilma, S. Claudio, V. Mirko, Z. Mengchu, “ Modeling Opportunistic IoT Services in Open IoT Ecosystems”, In: Proceedings of the Seventeenth Workshop from Objects to Agents WOA, 2017.
[11] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications”, In: IEEE Communications Surveys & Tutorials, Vol. 17, Issue 4, pp. 2347-2376, 2015.
[12] S. Li, L.D. Xu, S. Zhao, “The internet of things: a survey” Inf. Syst. Front., Vol. 17, Issue 2, pp. 243–259, 2015.
[13] K. Ramachandran, M. Sundararajan, “A Reconfigurable Method for Time Correlated Mimo Channels with a Decision Feedback Receiver”, International Journal of Applied Engineering Research,Vol. 12, pp. 5234, 2017.
[14] K. Ramachandran, M. Sundararajan, M., “PSO based out-of-order (OoO) execution scheme forth-MPSOC”, Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, pp. 1969-1986, 2017.
[15] K. Ramachandran, M. Sundararajan, M., “Design and Implementation of Low Power Testing Using Advanced Razor Based Processor”, International Journal of Applied Engineering Research, Vol. 12, pp. 6384-6390, 2017.
[16] K. Ramachandran, M. Sundararajan, “A novel 3-D-IC test architecture-a review”, International Journal of Engineering and Technology, Vol. 7, Issue 1.1, pp. 582-586, 2018.
[17] K. Ramachandran, P. Selvaprasanth, M. Prabaharan, “ Integrated System for Regional Navigator and Seasons Management ”, Journal of Global Research in Computer Science, Vol.9, Issue 4, pp.11-15, 2018.
[18] R. Karthick, A.M. Prabaharan, P. Selvaprasanth, N. Sathiyanathan, A. Nagaraj, “High Resolution Image Scaling Using Fuzzy Based FPGA Implementation”, Asian Journal of Applied Science and Technology (AJAST), Vol. 3, Issue 1, pp. 215-221, 2019.
[19] R. Karthick, M. Sundararajan, “Hardware Evaluation of Second Round SHA-3 Candidates Using FPGA”, International Journal of Advanced Research in Computer Science & Technology (IJARCST), Vol. 2, Issue 2, 2014.
[20] R. Ma, Y. Liu, C. Shan, X.L. Zhao, X.A. Wang, “Research on identification and addressing of the Internet of Things”, In Proc. IEEE 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow, Vol. 4, pp. 810–814, 2015.
[21] L. Farhan, A.E. Alissa, S.T. Shukur, M. Alrweg, U. Raza, R. Kharel, “A survey on the challenges and opportunities of the Internet of Things (IoT)”, In Proc. IEEE 11th International Conference on Sensing Technology, Sydney, AU, 2017.
[22] L. Farhan, R. Kharel, O. Kaiwartya, M. Hammoudeh, B. Adebisi, “Towards green computing for Internet of Things: Energy oriented path and message scheduling approach”, Sustainable Cities and Society, Vol. 38, pp. 195 – 204, 2018.
[23] S. Muralidharan, B.J.R. Sahu, N. Saxena, A. Roy, “PPT: A push pull traffic algorithm to improve QoS provisioning in IoT-NDN environment”, IEEE Communications Letters, Vol. 21, Issue 6, pp. 1417–1420, 2017.
[24] L. Farhan, A.E. Alissa, S.T. Shukur, M. Hammoudeh, R. Kharel, “An energy efficient long hop (LH) first scheduling algorithm for scalable Internet of Things (IoT) networks”, In Proc. IEEE 11th International Conference on Sensing Technology, Sydney, AU, 2017.
[25] L. Farhan, R. Kharel, O. Kaiwartya, M. Quiroz-Castellanos, A. Alissa, M. Abdulsalam, “A Concise Review on Internet of Things (IoT) -Problems, Challenges and Opportunities”, In: 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), pp.1-6, 2018.
[26] S. Pallakku, N. Sathiyanathan, “A Brief Study on IoT Applications”, Journal of Scientific Research and Development, Vol. 4, pp. 23-27, 2020.
[27] A. Chaudhary, S. Kolhe, R. Kamal, “A hybrid ensemble for classification in multiclass datasets: An application to oil seed disease dataset”, Computers and Electronics in Agriculture, Vol. 124, pp. 65–72, 2016.
[28] A. Chaudhary, S. Kolhe, R. Kamal, “An improved random forest classifier for multi-class classification”, Information Processing in Agriculture, Vol. 3, Issue 4, pp. 215-222, 2016.
[29] A. Chaudhary, S. Kolhe, R. Kamal, “A particle swarm optimization based ensemble for vegetable crop disease recognition”, Computers and Electronics in Agriculture, Vol. 178, pp. 1-7, 2020.
[30] A. Thakur, R. Thakur, “Machine Learning Algorithms for Intelligent Mobile Systems”, International Journal of Computer Sciences and Engineering, Vol. 6, Issue 6, pp. 1257–1261, 2018.
[31] A. Chaudhary, “Performance Enhancement Method for Machine Learning Algorithm”, International Journal of Innovative Technology and Exploring Engineering, Vol. 9, Issue 11, pp. 320-322, 2020.
[32] A. Thakur, “Crop Disease Recognition using Machine Learning Algorithms”, International Journal of Innovative Technology and Exploring Engineering, Vol. 9, Issue 11, pp. 164-166, 2020.
[33] R. Jain, A.Thakur, “Comparative Study of Machine Learning Algorithms for Document Classification”, International journal of Computer Sciences and Engineering, Vol. 7, Issue 11, pp.1189 – 1191, 2019.
Citation
A. Thakur, "A Comprehensive study on Internet of Things Applications and Challenges," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.24-27, 2022.
Overview of the Predictive Data Mining Techniques
Review Paper | Journal Paper
Vol.10 , Issue.1 , pp.28-36, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.2836
Abstract
Data mining conciliations talented ways to expose secreted designs within huge volumes of data. These hidden designs can possibly be used to prediction forthcoming performance. The descriptive data mining tasks characterize the general properties of the data present in the database, while in contrast predictive data mining technique perform inference from the current data for making prediction. This overview briefly introduces these two most important techniques that perform data mining task as Predictive and Descriptive. Between this predictive and descriptive they consist of their own method as Classification, clustering, Data mining (knowledge discovery from data) may be viewed as the abstraction of interesting (non-trivial, implicit, previously unknown and potentially useful) patterns and models from observed data or a method used for analytical process designed to explore data. We know Data mining as knowledge discovery. Basically, Extraction or “MINING” means knowledge from large amount of data. the prediction analysis technique provided by the data mining the future scenarios regarding to the current information can be predicted. The prediction analysis is the combination of clustering and classification. In order to provide prediction analysis there are several techniques presented through many researchers. In this paper describes various techniques proposed by various authors are analysed to understand latest trends in the prediction analysis.
Key-Words / Index Term
Extraction, Predictive Techniques, Database, Classification, SVM, Clustering
References
[1] AbdelghaniBellaachia and ErhanGuven “Predicting Breast Cancer Survivability Using Data Mining Techniques”, Washington DC 20052, vol. 6, pp. 234-239,2010.
[2] Oyelade, O. J, Oladipupo, O. O and Obagbuwa, I. C “Application of k-Means Clustering algorithm for prediction of Students’ Academic Performance”, International Journal of Computer Science and Information Security, vol. 7, pp. 23-128,2010.
[3] AzharRauf, Mahfooz, Shah Khusro and HumaJaved“Enhanced K-Mean Clustering Algorithm to Reduce Number of Iterations and Time Complexity”, Middle-East Journal of Scientific Research, vol. 12, pp. 959-963,2012.
[4] Osamor VC, Adebiyi EF, Oyelade JO and Doumbia S “Reducing the Time Requirement of K-Means Algorithm” PLoS ONE, vol. 7, pp-56-62,2012
[5] AzharRauf, Sheeba, SaeedMahfooz, Shah Khusro and HumaJaved (2012), “Enhanced K-Mean Clustering Algorithm to Reduce Number of Iterations and Time Complexity,” Middle-East Journal of Scientific Research, vol. 5, pp. 959-9632012.
[6] Thair Nu Phyu, “Survey of Classification Techniques in Data Mining”, Proceedings of the International Multi Conference of Engineers and Computer Scientists, volume 3, issue 12, pp551-559, IMECS,2009.
[7] Chuan-Yu Chang, Chuan-Wang Chang, Yu-Meng Lin, Application of Support Vector Machine for Emotion Classification”, 2012 Sixth International Conference on Genetic and Evolutionary Computing, volume 12, issue 5, pp- 103- 111 ,2012.
[8] Himani Bhavsar, Mahesh H. Panchal, “A Review on Support Vector Machine for Data Classification”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 10,2012.
[9] Min Chen, YixueHao, Kai Hwang, Fellow, IEEE, Lu Wang, and Lin Wang “Disease Prediction by Machine Learning over Big Data from Healthcare Communities”, IEEE, vol. 15, pp- 215-227 ,2017.
[10] Akhilesh Kumar Yadav, DivyaTomar and SonaliAgarwal Clustering of Lung Cancer Data Using Foggy KMeans”, International Conference on Recent Trends in Information Technology (ICRTIT), vol. 21, pp.121-126.,2014.
[11] [Sanay Chakrabotry, Prof. N.K Nigwani and Lop Dey “Weather Forecasting using Incremental K-means Clustering”, vol. 8, pp. 142-147.2014.
[12] Chew Li Sa., Bt Abang Ibrahim, D.H., Dahliana Hossain, E. and bin Hossin, M. "Student performance analysis system (SPAS)", in Information and Communication Technology for The Muslim World (ICT4M),The 5th International Conference on, vol.15, pp.1-6.,2014.
[13] Qasem A. Al-Radaideh, Adel Abu Assaf and EmanAlnagi Predicting Stock Prices Using Data Mining Techniques”, the International Arab Conference on Information Technology (ACIT’2013), vol. 23, pp. 32-38, (2013),
[14] K. Rajalakshmi, Dr. S. S. Dhenakaran and N. Roobin “Comparative Analysis of K-Means Algorithm in Disease Prediction”, International Journal of Science, Engineering and Technology Research (IJSETR), Vol. 4, 2015.
[15] BalaSundar V, T Devi and N Saravan, “Development f a Data Clustering Algorithm for Predicting Heart”, International Journal of Computer Applications, vol. 48, pp. 423-428,2012.
[16] DaljitKaur and KiranJyot “Enhancement in the Performance of K-means Algorithm”, International Journal of Computer Science and Communication Engineering, vol. 2 pp. 724-729,2013.
[17] Ming, J., Zhang, L., Sun, J.& Zhang, Y, “Analysis models of technical and economic data of mining enterprises based on big data analysis”, International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 2018, IEEE, 3rHimani Rani et al, International Journal of Computer Science and Mobile Computing, Vol.8 Issue., pg. 15-22, 5 may 2019.
[18] Sakhare, A. V., & Kasbe, P. S “A review on road accident data analysis using data mining techniques”, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017
[19] Chauhan, C., & Sehgal, S, “A review: Crime analysis using data mining techniques and algorithms”, International Conference on Computing, Communication and Automation (ICCCA), 2017
[20] Anoopkumar M, & Rahman, A. M. J. M. Z, “A Review on Data Mining techniques and factors used in Educational Data Mining to predict student amelioration, International Conference on Data Mining and Advanced Computing.
[21] Lee, E., Jang, Y., Yoon, D.-M., Jeon, J., Yang, S., Lee, S, “Kim, K.-JGame Data Mining Competition on Churn Prediction and Survival Analysis” using Commercial Game Log Data Transactions on Games, IEEE, 2018.
[22] Mortenson, M. J., Doherty, N. F., & Robinson, S. (Operational research from Taylorism to tera bytes:a research agenda for the analytics age. European Journal of OperationalResearch, 583-595,2014
[23] Delen, D., &Demirkan, H. Data, information and analytics as services. Decision Support Systems, 359- 363.2013.
[24] .Lechevalier, D., Narayanan, A., &Rachuri, S. Towards a DomainSpecific Framework for PredictiveAnalytics in Manufacturing. IEEE International Conference on Big Data Gaithersburg: National Institute of Standards and Technology, (pp. 987-995),2014.
Citation
C. Ganesh, E. Kesavulu Reddy, "Overview of the Predictive Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.28-36, 2022.
Analysis and Solutions of Silent Heart Attack Using Python
Survey Paper | Journal Paper
Vol.10 , Issue.1 , pp.37-40, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.3740
Abstract
We live in the twenty-first century, which is full of computers and electrical technologies that make human existence simpler. Artificial intelligence and machine learning are crucial in making life simpler for humans. In contrast, several ailments have evolved as a result of making life simpler, one of which is silent heart attack. Although there are medical treatments for this condition, there are only a few approaches that can forecast the silent heart. We can create models that can predict and detect heart attacks using artificial intelligence and machine learning. Some analysis has been done in this research while working on the road of predicting and detecting heart disease. Artificial neural network techniques are applied. Age , sex , cholesterol are some of the parameters that are set to predict silent heart attack.
Key-Words / Index Term
predict, silent heart attack, analyze
References
[1] Silent heart attack: What are the risks? Available on www.mayoclinic.org
[2] What is a Silent Heart Attack? Available on: https://www.goredforwomen.org/en/about-heart-disease-in-women/signs-and-symptoms-in-women/silent-heart-attack-symptoms-risks
[3] 4 silent heart attack signs Available on https://www.pennmedicine.org/updates/blogs/heart-and-vascular-blog/2019/august/4-silent-heart-attack-signs
[4] What Is a Silent Heart Attack? Avaiable on https://www.verywellhealth.com/silent-heart-attacks-1746018
[5] Silent Heart Attacks Available on : https://familydoctor.org/condition/silent-heart-attacks/
[6] G. Aditi; Gouthami Kokkula; Isha Pandya;D Kailas, ” Prediction of Heart Disease Using Machine Learning , 2018 . Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)”.
[7] S .Rachana R H.S.Guruprasada, “Analysis of performance metrics of heart failured patients using Python and machine learning algorithms”, Elsevier B.V. on behalf of KeAi Communications Co. Ltd. 2021.
[8] R.Paul M. , “Evaluating Novel Cardiovascular Risk Factors: Can We Better Predict Heart Attacks?” , 1999 , https://acpjournals.org/.
[9] A. Mehrdad , M. Manvi , H. Jung Ki , Watson , “Predicting Heart Attack Through Explainable Artificial Intelligence”, Part of the Lecture Notes in Computer Science book series (LNCS, volume 11537). 2019.
[10] T. Chandrasegar, D. Anudeep , R. Rajasekhar, “ Decision making system using machine learning and Pearson for heart attack” , International conference of Electronics, Communication and Aerospace Technology (ICECA), 2017.
[11] K. Srinivas , G. Raghavendra Rao , A. Govardhan , “ Analysis of coronary heart disease and prediction of heart attack in coal mining regions using data mining techniques”, 5th International Conference on Computer Science & Education. 2010.
[12] O. Thankgod , M. Omair Shafiq, “Towards comparing and using Machine Learning techniques for detecting and predicting Heart Attack and Diseases”, IEEE International Conference on Big Data (Big Data). 2019.
[13] T. Bach Xuan ,ORCID, L. Carl A. , T.Giang Thu , N. Huong Lan Thi ,Son Nghiem ,Ming-Xuan Tan ,Zhi-Kai Lim , “The Current Research Landscape of the Application of Artificial Intelligence in Managing Cerebrovascular and Heart Diseases: A Bibliometric and Content Analysis” , 2019 , Int. J. Environ. Res. Public Health 2019, 16(15), 2699.
[14] A . Nimai Chand Das , “PREVENTION OF HEART PROBLEM USING ARTIFICIAL INTELLIGENCE”, International Journal of Artificial Intelligence and Applications (IJAIA). 2018.
[15] MilosHauskrechta , HamishFraserb , “Planning treatment of ischemic heart disease with partially observable Markov decision processes” , 2000, Computer Science Department, Box 1910, Brown University, Providence, RI 02912, USA
[16] G.Suraj Kumar, S. Aditya , S. P. Upadhyay, C.Pawan Kumar , “A Machine Learning Approach for Heart Attack Prediction”, International Journal of Engineering and Advanced Technology (IJEAT). 2021.
Citation
Bhuvan Sharma, Spinder Kaur, "Analysis and Solutions of Silent Heart Attack Using Python," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.37-40, 2022.
SecurityTAG’S
Research Paper | Journal Paper
Vol.10 , Issue.1 , pp.41-44, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.4144
Abstract
In this paper, initially we describe the present antivirus in aspects like –memory[1] they are consuming, and how efficiently they are protecting the system. In the next section of this paper we briefly discuss the design methodologies that are practiced presently, their drawbacks and limitations. Finally we describe an effective design methodology which uses SecurityTAG to protect the system. SecurityTAG is generated by the SecurityTAG generator which takes some parameters as inputs and gives the SecurityTAG as the output. This gives better protection against any virus and detection of infected files is very easy and effective.
Key-Words / Index Term
SecurityTAG, generator, key, virus
References
[1] Memory- memory refers to the main memory or physical memory.
[2] van der Meulen, M.J.P., et al. Protective Wrapping of Off-the-Shelf Components. in the 4th International Conference on COTS-Based Software Systems (ICCBSS `05). Bilbao, Spain: Springer. 2005.
[3] Strigini, L., Fault Tolerance Against Design Faults, in Dependable Computing Systems: Paradigms, Performance Issues, and Applications, H. Diab and A. Zomaya, Editors. J. Wiley & Sons. p. 213-241, 2005.
[4] http://www.raymond.cc/blog/archives/2008/07/11/ -free-antivirus-is-the-lightest-on-system-memory-usage/
[5] Fred Cohen, “Computer Viruses”, Computers €4 Security 0, 22-35.
[6] Computers & Security 7, Specid Issue on Viruses.
[7] Marvin Minsky, Computation: Finite and Infinite Machines, Prentice-Hall.
Citation
Boddepalli Kiran Kumar, Korla Swaroopa, "SecurityTAG’S," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.41-44, 2022.
House Price Prediction through Machine Learning Technique
Research Paper | Journal Paper
Vol.10 , Issue.1 , pp.45-48, Jan-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i1.4548
Abstract
This model for price estimation of houses helps in finding the deviation in price for houses. Prices of house are strongly related with various parameter such as crime rate, location, employment rate and market reach. For estimating we required to collect many other information related to real state for estimating the prices. Over the year there are lot of paper published about the use of traditional machine learning to estimate house price, but they rarely concern about the performance of individual model, but most of them are not focused on performance of each model and ignores the less popular yet complex models. So as a result, this research paper focuses on all the traditional and latest machine learning algorithms along with considering various required parameter to estimate house prices in more effective way. This research paper will provide sufficient study and references for various models to prove their efficiency in estimating house prices based on statistical operations and provide an optimistic method to achieve price estimating model.
Key-Words / Index Term
House price prediction, Linear regression, Inferential statistic, Machine learning, Ridge regression
References
[1] House Price Index. Federal Housing Finance Agency. https://www.fhfa.gov/, accessed September 1, 2019.
[2] Fan C, Cui Z, Zhong X. House Prices Prediction with Machine Learning Algorithms. Proceedings of the 2018 10th International Conference on Machine Learning and Computing - ICMLC 2018. doi:10.1145/3195106.3195133.
[3] Phan TD. Housing Price Prediction Using Machine Learning Algorithms: The Case of Melbourne City, Australia. 2018 International Conference on Machine Learning and Data Engineering (ICMLDE) 2018. doi:10.1109/icmlde.2018.00017.
[4] Mu J, Wu F, Zhang A. Housing Value Forecasting Based on Machine Learning Methods. Abstract and Applied Analysis 2014; 2014:1–7. doi:10.1155/2014/648047.
[5] Lu S, Li Z, Qin Z, Yang X, Goh RSM. A hybrid regression technique for house prices prediction. 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) 2017. doi:10.1109/ieem.2017.8289904.
[6] House Price Index. Federal Housing Finance Agency. https://www.fhfa.gov/, accessed September 1, 2019.
[7] Fan C, Cui Z, Zhong X. House Prices Prediction with Machine Learning Algorithms. Proceedings of the 2018 10th International Conference on Machine Learning and Computing - ICMLC 2018. doi:10.1145/3195106.3195133.
[8] House Price Index. Federal Housing Finance Agency. https://www.fhfa.gov/, accessed September 1, 2019.
[9] Fan C, Cui Z, Zhong X. House Prices Prediction with Machine Learning Algorithms. Proceedings of the 2018 10th International Conference on Machine Learning and Computing - ICMLC 2018. doi:10.1145/3195106.3195133.
[10] Rhan GJ. Housing Price Prediction Through Machine Learning Algorithms: The Case of Moskov City, Russia. 2019 International Conference on Machine Learning and Data Engineering (ICNLDE) 2019. dai:19.1209/icnlde.2019.00026.
[11] Su J, Tu G, Thang A. Housing Value Predicting Based on Machine Learning Methods. Abstract and Applied Analysis 2015; 2015:1–7. doi:10.1175/2015/647947.
Citation
Chandra Prakash Patidar, "House Price Prediction through Machine Learning Technique," International Journal of Computer Sciences and Engineering, Vol.10, Issue.1, pp.45-48, 2022.