Fuzzy Clustering Exploiting Neighbourhood Information for Non-image Data
Research Paper | Journal Paper
Vol.12 , Issue.2 , pp.1-8, Feb-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i2.18
Abstract
We propose an enhanced variant of the traditional Fuzzy C-Means (FCM) algorithm tailored for leveraging neighbourhood information in non-image datasets residing in Euclidean space. Our novel methodology aims to capitalize on spatial contextual cues inherent in such datasets, thereby complementing the inherent fuzziness of individual data points. Through the incorporation of neighbourhood information, our approach extends beyond the limitations of conventional FCM, leading to improved clustering performance. We validate the efficacy of our method using synthetic and real datasets, demonstrating its superiority over conventional FCM in capturing spatial relationships within the data. Our findings underscore the effectiveness of our approach in enhancing clustering outcomes by strategically incorporating neighbourhood information into the FCM framework for non-image data in Euclidean space.
Key-Words / Index Term
Clustering, spatial FCM, nonimage data, Euclidian neighbour, FCMS.
References
[1] J. C. Bezdek, “Patteren recognition with fuzzy objective function algorithms”. New York: Plenum, 1981.
[2] J. C. Bezdek and S. Pal, “Fuzzy models for pattern recognition: Methods that search for structures in data”. IEEE Transactions on Systems, Man, and Cybernetics, Vol. 26(3), pp. 388-402, 1996.
[3] Y. Cheng & H. Zhang, “Fuzzy c-means clustering and classification algorithms”, IEEE Transactions on Systems, Man, and Cybernetics- Part B, Vol. 28(3), pp. 418-428, 1996.
[4] I. Despotovic, B. Goossens, W. Philips, “MRI segmentation of the human brain: challenges, methods, and applications”, Computational and Mathematical methods in medicine, Article ID 450341, 2015.
[5] S. K. Adhikari, J. K. Sing, D. K. Basu, M. Nasipuri, “Conditional spatial fuzzy c-means clustering algorithm for segmentation of MRI images”, Applied Soft Computing, Vol. 34, pp. 758-769, 2015.
[6] D. L. Pham, “Fuzzy clustering with spatial constraints”, Proceedings of International Conference on Image Processing, Vol. 2, IEEE, 2002.
[7] K. S. Chuang, H. L. Tzeng, S. Chen, J. Wu, T. J. Chen, “Fuzzy c-means clustering with spatial information for image segmentation”, Computerized medical imaging and graphics, Vol. 30 (1), pp. 9-15, 2006.
[8] W. Cai, S. Chen, D. Zhang, “Fast and robust fuzzy c-means clustering algorithms incorporating local information for image segmentation”, Pattern Recognition, Vol. 40 (3), pp. 825-838, 2007.
[9] H. Y. Yu, J. L. “Fan, Three-level image segmentation based on maximum fuzzy partition entropy of 2-D histogram and quantum genetic algorithm”, International Conference on Intelligent Computing, Springer, pp. 484-493, 2008.
[10] N. P. Caldairou, P. A. Habas, C. Studholme, F. Rousseau, “A non-local fuzzy segmentation method: application to brain MRI”, Pattern Recognition, Vol. 44 (9), pp. 1916-1927, 2011.
[11] F. Zhao, L. Jiao, H. Liu, “Fuzzy C-means clustering with non-local spatial information for noisy image segmentation”, Frontiers of Computer Science in China, Vol. 5 (1), pp. 45-56, 2011.
[12] W. Q. Deng, X. M. Li, X. Gao, C. M. Zhang, “A modified fuzzy c-means algorithm for brain MRI image segmentation and bias field correction”, Journal of Computer Science and Technology, Vol. 31 (3), pp. 501-511, 2016.
[13] H. Zhang, J. Liu, “Fuzzy c-means clustering algorithm with deformable spatial information for image segmentation”, Multimedia tools and applications, Springer link, Vol. 81, pp. 11239-11258, 2022
[14] X. Zeyu, L. Xiao, Z. Defang, “Fuzzy c-means clustering algorithm based on superpixel merging and multi-feature adaptive fusion measurement”, IET Image Processing, September, 2023.
[15] Q. Wang, X. Wang, C. Fang and W. Yang, “Robust fuzzy c-means clustering algorithm with adaptive spatial & intensity constraint and membership linking for noise image segmentation”, Applied Soft Computing, Vol. 92, 2020.
[16] L. Wang, S. Niu and L. Geng, “Kernel Fuzzy c-means clustering with new spatial constraints”, International conference on Artificial Intelligence and Security, Vol. 1253, pp. 3-14, 2020.
[17] R. Solanki and D. Kumar, “Probabilistic intuitionistic fuzzy c-means algorithm with spatial constraint for human brain MRI segmentation”, Multimedia tools and applications, Vol. 82, pp. 33663-33692, 2023.
[18] H. Zhang, H. Li, N. Chen, “Novel fuzzy clustering algorithm with variable multi-pixel fitting spatial information for image segmentation”, Pattern recognition, Vol. 121, 2022.
[19] C. Wang, W. Pedrycz, Z. Li, M. Zhou, S. S. Ge, “G-image segmentation: similarity-preserving fuzzy c-means with spatial information constraint in wavelet space”. IEEE Transactions on Fuzzy systems, pp: 3887-3898, 2020.
[20] M. N. Ahmed, S. M. Yamany, N. Mohamed, A. A. Farag, and T. Moriarty, “A modified fuzzy C-means algorithm for bias field estimation and segmentation of MRI data”, IEEE Transaction on Medical Imaging, Vol. 21, pp. 193-199, 2002.
[21] S. Chen and D. Zhang, “Robust Image Segmentation Using FCM With Spatial Constraints Based on New Kernel-Induced Distance Measure”, IEEE Transaction on Systems, Man, and Cybernetics, Vol. 34, No. 4, 2004.
[22] A. Strehl and J. Ghosh, “Cluster ensembles-a knowledge reuse framework for combining multiple partitions”, Journal of Machine Learning Research, Vol. 3, pp. 583-617, 2002.
[23] G. Fisher, “The adjusted rand statistics: A SAS macro”, Computational Psychometrica, Vol. 53, No. 3, pp. 417-423, 1988.
[24] E. Hullermeier, M. Rifqi, S. Henzgen and R. Senge, “Comparing fuzzy partitions: a generalization of the rand index and related measures”, IEEE Transactions on Fuzzy Systems, pp. 546 - 556 Vol. 20, Issue: 3, 2012.
Citation
Kaushik Sarkar, Rajani K. Mudi, "Fuzzy Clustering Exploiting Neighbourhood Information for Non-image Data," International Journal of Computer Sciences and Engineering, Vol.12, Issue.2, pp.1-8, 2024.
Joint Optimization Techniques to Mitigate Latency and Minimize the Jitter in Wireless Networks
Research Paper | Journal Paper
Vol.12 , Issue.2 , pp.9-17, Feb-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i2.917
Abstract
Latency and jitter are two critical factors that can significantly impact performance of wireless networks. As reliance on wireless communication grows, it becomes imperative to address these issues to ensure seamless connectivity and enhance user experience. This abstract presents an overview of the challenges posed by latency and jitter in wireless networks and highlights potential solutions to mitigate these issues. Latency refers to the time delay experienced when data packets travel from the source to the destination across a network. Factors such as signal interference, network congestion, distance, and processing delays contribute to latency in wireless networks. High latency can disrupt real-time applications like video conferencing, online gaming, and voice calls, leading to compromised quality and user frustration. Jitter, on the other hand, represents the variation in packet arrival times at the receiving end. Inconsistencies in network traffic, packet routing, and transmission delays contribute to jitter. It can result in packet loss, out-of-order delivery, and disruptions in audio and video streams, particularly impacting time-sensitive applications such as streaming media and real-time communication. To address latency and jitter issues in wireless networks, several solutions can be implemented. Quality of Service (QoS) prioritization allows for the efficient management of network resources and prioritization of time-sensitive traffic, reducing latency and minimizing jitter for critical applications. Network optimization techniques, including strategic placement of access points, channel allocation, and signal strength optimization, can minimize interference and improve overall network performance. Bandwidth management techniques such as traffic shaping, prioritization, and bandwidth reservation help allocate network resources effectively, reducing congestion-induced latency and jitter. Implementing error correction mechanisms such as forward error correction (FEC) and retransmission techniques can compensate for packet loss and minimize the impact of jitter on data transmission. Optimizing signal strength and range through adjustments in transmit power, deploying additional access points, or utilizing signal repeaters extends the network`s coverage, reducing latency caused by distance and signal attenuation. By addressing these strategies, wireless networks can mitigate the effects of latency and jitter, resulting in improved performance and a better user experience. As wireless communication continues to play a vital role in our interconnected world, it becomes essential to focus on minimizing latency and jitter issues, ensuring reliable and efficient wireless connectivity.
Key-Words / Index Term
Wireless Networks, Latency, Jitter, Network Optimization, Quality of Service, Retransmission, Scalability
References
[1] Parvez, I., Rahmati, A., Guvenc, I., Sarwat, A. I., & Dai, H. A survey on low latency towards 5G: RAN, core network and caching solutions. IEEE Communications Surveys & Tutorials, Vol.20, Issue.4, pp.3098-3130, 2018.
[2] Zhang, Q., Gong, H., Zhang, X., Liang, C., & Tan, Y. A. A sensitive network jitter measurement for covert timing channels over interactive traffic. Multimedia Tools and Applications, 78, pp.3493-3509, 2019.
[3] Brodnevs, D., & Kutins, A. An experimental study of ground-based equipment real time data transfer possibility by using cellular networks. The Scientific Journal of Riga Technical University-Electrical, Control and Communication Engineering, 12, pp.11-19, 2017.
[4] Hu, B., & Gharavi, H. A hybrid wired/wireless deterministic network for smart grid. IEEE wireless communications, Vol.28, Issue.3, pp.138-143, 2021.
[5] Karim, A., Ahmed, E., Azam, S., Shanmugam, B., & Ghosh, P. Mitigating the Latency Induced Delay in IP Telephony through an Enhanced De-Jitter Buffer. In Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2021 pp.1-16, 2022.
[6] Farajiparvar, P., Ying, H., & Pandya, A. A brief survey of telerobotic time delay mitigation. Frontiers in Robotics and AI, 7, pp.578805, 2020.
[7] Sundaram, J. P. S., Du, W., & Zhao, Z. A survey on lora networking: Research problems, current solutions, and open issues. IEEE Communications Surveys & Tutorials, Vol.22, Issue.1, pp.371-388, 2019.
[8] Li, L., Zhao, G., & Blum, R. S. A survey of caching techniques in cellular networks: Research issues and challenges in content placement and delivery strategies. IEEE Communications Surveys & Tutorials, Vol.20, Issue.3, pp.1710-1732, 2018.
[9] Chen, M., Gündüz, D., Huang, K., Saad, W., Bennis, M., Feljan, A. V., & Poor, H. V. Distributed learning in wireless networks: Recent progress and future challenges. IEEE Journal on Selected Areas in Communications, Vol.39, Issue.12, pp.3579-3605, 2021.
[10] Li, L., Zhao, G., & Blum, R. S. (2018). A survey of caching techniques in cellular networks: Research issues and challenges in content placement and delivery strategies. IEEE Communications Surveys & Tutorials, Vol.20, Issue.3, pp.1710-1732, 2018.
[11] Chen, M., Gündüz, D., Huang, K., Saad, W., Bennis, M., Feljan, A. V., & Poor, H. V. Distributed learning in wireless networks: Recent progress and future challenges. IEEE Journal on Selected Areas in Communications, Vol.39, Issue.12, pp.3579-3605, 2021.
[12] Hao, X., Yao, N., Wang, L., & Wang, J. Joint resource allocation algorithm based on multi-objective optimization for wireless sensor networks. Applied Soft Computing, 94, pp.106470, 2020.
[13] Guercin, S. R. Performance Evaluation of Opportunistic Routing Protocols for Multi-hop Wireless Networks (Doctoral dissertation, Université d`Ottawa/University of Ottawa), 2019.
[14] Li, S., Kim, J. G., Han, D. H., & Lee, K. S. (2019). A survey of energy-efficient communication protocols with QoS guarantees in wireless multimedia sensor networks. Sensors, Vol.19, Issue.1, pp.199, 2019.
[15] Kim, B. S., Shah, B., He, T., & Kim, K. I. A survey on analytical models for dynamic resource management in wireless body area networks. Ad Hoc Networks, 135, pp.10293, 2022.
Citation
S. Mohanarangan, G. Shoba, K. Vaidegi, M. Hemamalini, "Joint Optimization Techniques to Mitigate Latency and Minimize the Jitter in Wireless Networks," International Journal of Computer Sciences and Engineering, Vol.12, Issue.2, pp.9-17, 2024.
Autism Spectrum Disorder Detection from Parents Dialogues Using Multinomial Naïve Bayes and XGBoost Models
Research Paper | Journal Paper
Vol.12 , Issue.2 , pp.18-29, Feb-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i2.1829
Abstract
To indicate the proper development of a child, there are certain baseline milestones. If a child is not reaching the milestones at the expected rate, it can indicate that there is an issue that needs to be addressed. By early intervention, the development of the child can be improved and the long-term impact of the developmental delays may be reduced. One such constraint of child development is Autism spectrum disorder. The ASD-affected children exhibit difficulties in communication, socialization and challenges in physical, social, and emotional development. This neurodevelopmental disorganization may exhibit an extensive range of effects and symptoms including challenges in communication, social interactions, and physical, social, and emotional behaviours. To identify ASD symptoms in a child, the range of ASD symptoms must be available as datasets to the researchers. The difficult phenomenon is that parents are not able to identify or detect early-age indications of ASD in their children. This proposed research work aims to detect the symptoms of ASD from parents’ dialogues. The dataset has collected data from many autism groups from social media and organizations for special children. To understand the sentiment of parents’ dialog there are two important and popular machine learning models, the Multinomial Naïve Bayes and the XGBoost. Naïve Bayes is based on a probabilistic machine learning model and XGBoost is an ensemble-oriented model. If new data comes from a new parent, the sentiment of that data is also predicted by these models. By using these two models, sentiment analysis can help to identify ASD symptoms. Based on the prepared data, the accuracy of these two models is 70% and 70% respectively.
Key-Words / Index Term
Autism Spectrum Disorder, Machine Learning, ASD Detection, ML-based Framework, Traditional Machine Learning, Multinomial Naïve Bayes, XGBoost
References
[1] A. Tewari, S. D. Khanna, R. Bathija, R. Daryani, A. Reejhsinghani, “ASD (Autism Spectrum Disorder): Early Detection Intervention using Machine Learning”, International Journal of Innovative Science and Research Technology, Vol.5, No.1, pp.7-13, 2020.
[2] P. Mesa-Gresa, H. Gil-G´omez, L. Quilis, G. Gomez, “Effectiveness of virtual reality for children and adolescents with autism spectrum disorder: an evidence-based systematic review”, Sensors, Vol.18, No.8, Art. No.2486, 2018.
[3] S. E. Bryson, L. Zwaigenbaum, W. Roberts, “The early detection of autism in clinical practice”, Pediatrics & Child Health, Vol.9, No.4, pp.219–221, 2004.
[4] S. Islam, T. Akter, S. Zakir, S. Sabreen, M. I. Hossain, “Autism Spectrum Disorder Detection in Toddlers for Early Diagnosis Using Machine Learning”, IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), pp.1-6, 2020.
[5] R. Murugan, L. Senbagamalar, “Prediction of Autism Spectrum Disorder using Machine Learning”, Journal of Emerging Technologies and Innovative Research (JETIR), Vol.9, No.2, pp.c950-c959, 2022.
[6] D. Bone, M. S. Goodwin, M. P. Black, C. C. Lee, K. Audhkhasi, and S. Narayanan, “Applying Machine Learning to Facilitate Autism Diagnostics: Pitfalls and promises”, Journal of Autism and Developmental Disorders, pp.1-48, 2014.
[7] A. Saranya, R. Anandan, “Autism Spectrum Prognosis using Worm Optimized Extreme Learning Machine (WOEM) Technique”, International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp.636–641, 2021.
[8] N. Zaman, J. Ferdus, A. Sattar, “Autism Spectrum Disorder Detection Using Machine Learning Approach”, 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, pp.1-6, 2021.
[9] V. Kavitha, R. Siva, “Classification of Toddler, Child, Adolescent and Adult for Autism Spectrum Disorder Using Machine Learning Algorithm”, 9th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, pp.2444-2449, 2023.
[10] S. Islam, T. Akter, S. Zakir, S. Sabreen, M. I. Hossain, “Autism Spectrum Disorder Detection in Toddlers for Early Diagnosis Using Machine Learning”, IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), Gold Coast, Australia, pp.1-6, 2020.
[11] J.R. Adams, A. C. Salem, H. MacFarlane, R. Ingham, S. D. Bedrick, E. Fombonne, J. K. Dolata, A.P. Hill, and J. V. Santen, “A Pseudo-Value Approach to Analyze the Semantic Similarity of the Speech of Children With and Without Autism Spectrum Disorder”, Front. Psychol., pp.1-10, 2021.
[12] K. E. Prescott, J. M. Scott, T. Reuter, J. Edwards, J. Saffran, S. E. Weismer, “Predictive language processing in young autistic children”, Autism Research, pp.1-12, 2022.
[13] C. Orasan, R. Evans, R. Mitkov, “Intelligent text processing to help readers with autism”, Intelligent Natural Language Processing: Trends and Applications, pp.713-740, 2017.
[14] T. Zhang, A. M. Schoene, S. Ji, S. Ananiadou, “Natural language processing applied to mental illness detection: a narrative review”, NPJ Digital Medicine, pp.1-13, 2022.
[15] G. Anurekha, P. Geetha, “Performance Analysis of Supervised Approaches for Autism Spectrum Disorder Detection”, International Journal of Trend in Research and Development, pp.1-3, 2017.
[16] N. Ajaypradeep and R. Sasikala, “Child Behavioral Analysis: Machine Learning based Investigation for Autism Screening and Early Diagnosis”, International Journal of Early Childhood Special Education, Vol.13, No.2, pp.1199-1208, 2021.
[17] I. A. Ahmed, E. M. Senan, T. H. Rassem, M. Ali, H. S. A. Shatnawi, S. M. Alwazer, and M. Alshahrani, “Eye Tracking-Based Diagnosis and Early Detection of Autism Spectrum Disorder Using Machine Learning and Deep Learning Techniques”, MDPI Electronics, Vol.11, pp.1-27, 2022.
[18] A. Yasumura, M. Omori, A. Fukuda, J. Takahashi, Y. Yasumura, E. Nakagawa, T. Koike, Y. Yamashita, T. Miyajima, T. Koeda, M. Aihara, H. Tachimori, M. Inagaki, “Applied Machine Learning Method to Predict Children With ADHD Using Prefrontal Cortex Activity: A Multicenter Study in Japan”, Journal of Attention Disorders, pp.1-9, 2017.
[19] A. Vahid, A. Bluschke, V. Roessner, S. Stober, and C. Beste, “Deep Learning Based on Event-Related EEG Differentiates Children with ADHD from Healthy Controls”, Journal of Clinical Medicine, pp.1-15, 2019.
[20] A. Tenev, S. M. Simoska, L. Kocarev, J. P. Jordanov, A. Müller, G. Candrian, “Machine learning approach for classification of ADHD adults”, International Journal of Psychophysiology, pp.1-5, 2013.
[21] S. P. Barus, “Implementation of Naïve Bayes Classifier-based Machine Learning to Predict and Classify New Students at Matana University”, International Conference on Science Education and Technology (ICOSETH), pp.1-7, 2020.
Citation
Prasenjit Mukherjee, Sourav Sadhukhan, Manish Godse, "Autism Spectrum Disorder Detection from Parents Dialogues Using Multinomial Naïve Bayes and XGBoost Models," International Journal of Computer Sciences and Engineering, Vol.12, Issue.2, pp.18-29, 2024.
Recommendation Systems in Online Retail: A Comprehensive Survey of AI Techniques
Review Paper | Journal Paper
Vol.12 , Issue.2 , pp.30-36, Feb-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i2.3036
Abstract
Recommender systems play a vital role in providing pertinent content across diverse domains, such as entertainment, social networks, healthcare, education, travel, cuisine, and tourism. This review offers a thorough examination of cutting-edge recommender systems, as well as hybrid recommender systems. Hybrid models, combining different recommendation approaches, have gained prominence in enhancing system performance. The study classifies several models of hybridization and arranges the literature depending on the hybrid model and the applied machine learning methods in each study. Additionally, a systematic literature review examines the landscape of recommender systems over the last few years, emphasizing the quantitative aspects of research in this field. The review explores challenges, data mining techniques, recommendation strategies. It identifies common issues, such as addressing cold-start, accuracy, scalability and data sparsity, and highlights emerging challenges, including adapting to evolving user contexts and tastes.. Given the ongoing significance of hybrid recommenders, the review proposes exploring fresh possibilities such as utilizing parallel hybrid algorithms, and handling more extensive datasets, to address the evolving requirements of users.
Key-Words / Index Term
Artificial Intelligence, Collaborative Filtering, Recommendation System, Hybrid Recommendation System, Data Mining.
References
[1] R. Sharma, S. Rani and S. Tanwar, "Machine Learning Algorithms for building Recommender Systems," 2019 International Conference on Intelligent Computing and Control Systems (ICCS), Madurai, India, pp.785-790, 2019.
[2] G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of [1] Çano, E. and Morisio, M., 2017. Hybrid recommender systems: A systematic literature review. Intelligent Data Analysis, Vol.21, Issue.6, pp.1487-1524, 2017.
[3] Ricci, F., Rokach, L. and Shapira, B., 2011. Introduction to recommender systems handbook. In Recommender systems handbook. Springer, Boston, MA. pp.1-35, 2011.
[4] Jannach, D., Zanker, M., Felfernig, A. and Friedrich, G., 2010. Recommender systems: an introduction. Cambridge University Press. 2010.
[5] Hu, Y., Koren, Y., & Volinsky, C. (2008). Collaborative filtering for implicit feedback datasets. 2008 Eighth IEEE International Conference on Data Mining, pp.263-272, 2008.
[6] Herlocker, J.L., Konstan, J.A., Terveen, L.G. and Riedl, J.T., 2004. Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems, 22, pp.5-53, 2004.
[7] He, X., Liao, L., Zhang, H., Nie, L., Hu, X., & Chua, T. S. (2017). Neural collaborative filtering. Proceedings of the 26th international conference on World Wide Web, pp.173-182, 2017.
[8] Shani, G., Gunawardana, A. (2011). Evaluating Recommendation Systems. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P. (eds) Recommender Systems Handbook. Springer, Boston, MA. 2011.
[9] Thorat, P.B., Goudar, R.M. and Barve, S., 2015. Survey on collaborative filtering, content-based filtering and hybrid recommendation system. International Journal of Computer Applications, 110(4), pp.31-36, 2015.
[10] Pazzani, M.J., Billsus, D. (2007). Content-Based Recommendation Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds) The Adaptive Web. Lecture Notes in Computer Science, vol 4321. Springer, Berlin, Heidelberg. 2007.
[11] Burke, R. (2007). Hybrid Web Recommender Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds) The Adaptive Web. Lecture Notes in Computer Science, vol 4321. Springer, Berlin, Heidelberg. 2007.
[12] Balabanovic, Marko & Shoham, Yoav. (1997). Fab: Content-Based, Collaborative Recommendation. Communications of the ACM. 40. 66-72. 10.1145/245108.245124.
[13] Adomavicius, Gediminas & Mobasher, Bamshad & Ricci, Francesco & Tuzhilin, Alexander. (2011). Context-Aware Recommender Systems. AI Magazine. 32. 67-80. 10.1609/aimag.v32i3.2364.
[14] Burke, R. (2002). Hybrid recommender systems: Survey and experiments. User Modeling and User-Adapted Interaction, Vol.12, Issue.4, pp.331-370, 2002.
[15] G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions," in IEEE Transactions on Knowledge and Data Engineering, June, Vol.17, No.6, pp.734-749, 2005, doi: 10.1109/TKDE.2005.99.
[16] Linas Baltrunas, Bernd Ludwig, and Francesco Ricci. 2011. Matrix factorization techniques for context aware recommendation. In Proceedings of the fifth ACM conference on Recommender systems (RecSys `11). Association for Computing Machinery, New York, NY, USA, pp.301–304, 2011.
[17] Adomavicius, Gediminas & Kwon, YoungOk. (2007). New Recommendation Techniques for Multicriteria Rating Systems. Intelligent Systems, IEEE. 22. 48-55. 10.1109/MIS.2007.58.
[18] Robert M. Bell and Yehuda Koren. 2007. Lessons from the Netflix prize challenge. SIGKDD Explor. Newsl. 9, 2 (December 2007), pp.75-79, 2007.
[19] Shuai Zhang, Lina Yao, Aixin Sun, and Yi Tay. 2019. Deep Learning Based Recommender System: A Survey and New Perspectives. ACM Comput. Surv. 52, 1, Article 5 (January 2020), 38 pages.
[20] Mansur, Farhin & Patel, Vibha & Patel, Mihir. (2017). A review on recommender systems. pp.1-6, 2017. 10.1109/ICIIECS.2017.8276182.
[21] Zhang, Y., Zhao, M., & Wang, J. (2023). Exploiting temporal dynamics in recommender systems: A comprehensive survey. Knowledge and Information Systems, 1-28.
[22] Zhu, J., Zhang, P., Chen, X., Guo, M., & He, Q. (2023). A survey of graph neural networks for recommender systems. arXiv preprint arXiv:2301.07535.
[23] Liu, Y., Chen, L., Wu, X., Hu, B., & He, Q. (2023). Counterfactual recommendation with causal inference: A survey. arXiv preprint arXiv:2301.06765.
[24] Liu, Y., Li, M., & Zhu, X. (2023). Attention-based explainable ranking for fairness-aware recommendation. In Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp.331-340, 2023.
[25] Yu, J., Zhu, J., Shao, J., Jiang, J., & Wu, W. (2023). A Survey on Context-Aware Recommendation. IEEE Transactions on Knowledge and Data Engineering, Vol.35, Issue.7, pp.2209-2226, 2023.
Citation
Yash Patil, Samidha Ashtikar, Sakshi Shirodkar, Krishna Dudhate, Shraddha V. Pandit, "Recommendation Systems in Online Retail: A Comprehensive Survey of AI Techniques," International Journal of Computer Sciences and Engineering, Vol.12, Issue.2, pp.30-36, 2024.
Assessment of Phishing Websites Prediction using Machine Learning Approaches
Survey Paper | Journal Paper
Vol.12 , Issue.2 , pp.37-45, Feb-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i2.3745
Abstract
Phishing is a kind of cyberattack in which victims are tricked into divulging private information, including credit card numbers or passwords, by means of phoney emails or websites. Users may find it challenging to distinguish phishing websites from authentic websites due to their convincing appearance. This can lead to users entering their personal information on the phishing website, which can then be stolen by the attacker. An artificial intelligence technique called machine learning is used to train algorithms to find patterns in data. This can be used to create systems that automatically detect and alert users to potentially harmful websites, such as phishing website detection systems. The field of phishing website prediction currently faces some obstacles that require attention. The constant growth of phishing methods is one challenge. Artificial intelligence-based deep learning and machine learning techniques can identify phishing websites. Using machine learning techniques to predict phishing websites, we identify, monitor, and shield end users from monitoring based on phishing algorithms with respect to different publications. We present a machine learning method for phishing website identification in this research. Our method makes use of a number of characteristics, such as the URL structure, website content, and the existence of particular keywords or patterns, to discern between authentic and phishing websites. We test our method on a dataset of actual phishing websites, such as Google`s PhishCorp, Kaggle, and PhishTank, and we obtain a greater accuracy than the earlier studies on the detection of phishing websites. Our results show that machine learning can be an effective method for spotting phishing websites. With a better prototype and increased accuracy, our method is simple to use and can shield users from phishing assaults.
Key-Words / Index Term
Phishing Websites, Machine Learning, A I, Accuracy, Precision, Error rate.
References
[1] F. Yahva et al., “Detection of Phising Websites using Machine Learning Approaches,” 2021 Int. Conf. Data Sci. Its Appl. ICoDSA 2021, pp.40–47, 2021, doi: 10.1109/ICODSA53588.2021.9617482.
[2] S. M. Istiaque, M. T. Tahmid, A. I. Khan, Z. Al Hassan, and S. Waheed, “Artificial Intelligence Based Cybersecurity: Two-Step Suitability Test,” 2021 IEEE Int. Conf. Serv. Oper. Logist. Informatics, SOLI 2021, 2021, doi: 10.1109/SOLI54607.2021.9672437.
[3] N. Megha, K. R. Remesh Babu, and E. Sherly, “An Intelligent System for Phishing Attack Detection and Prevention,” Proc. 4th Int. Conf. Commun. Electron. Syst. ICCES 2019, Jul., pp.1577–1582, 2019. doi: 10.1109/ICCES45898.2019.9002204.
[4] H. Dao, J. Mazel, and K. Fukuda, “CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection,” IEEE Trans. Netw. Serv. Manag., Sep, Vol.18, No.3, pp.3873–3888, 2021, doi: 10.1109/TNSM.2021.3072874.
[5] A. K. Dutta, “Detecting phishing websites using machine learning technique,” PLoS One, October , Vol.16, No.10, pp.1–17, 2021, doi: 10.1371/journal.pone.0258361.
[6] E. Gandotra and D. Gupta, “An Efficient Approach for Phishing Detection using Machine Learning,” pp.239–253, 2021, doi: 10.1007/978-981-15-8711-5_12.
[7] A. Joshi and P. T. R. Pattanshetti, “Phishing Attack Detection using Feature Selection Techniques,” SSRN Electron. J., Jul. 2019, doi: 10.2139/SSRN.3418542.
[8] S. Jain and C. Gupta, “A Support Vector Machine Learning Technique for Detection of Phishing Websites,” 2023 6th Int. Conf. Inf. Syst. Comput. Networks, ISCON 2023, 2023, doi: 10.1109/ISCON57294.2023.10111968.
[9] M. H. Alkawaz, S. J. Steven, A. I. Hajamydeen, and R. Ramli, “A comprehensive survey on identification and analysis of phishing website based on machine learning methods,” ISCAIE 2021 - IEEE 11th Symp. Comput. Appl. Ind. Electron., Apr., pp.82–87, 2021, doi: 10.1109/ISCAIE51753.2021.9431794.
[10] F. Salahdine, Z. El Mrabet, and N. Kaabouch, “2022 IEEE 13th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2022,” 2022 IEEE 13th Annu. Ubiquitous Comput. Electron. Mob. Commun. Conf. UEMCON 2022, 2022.
[11] R. B. Lokitha, R. R. Monisha, N. S. Neha, T. Nadu, and T. Nadu, “Phishing Detection System using Random Forest Algorithm,” vol. 8, no. 4, pp. 510–514, 2023.
[12] V. Muppavarapu, A. Rajendran, and S. K. Vasudevan, “Phishing detection using RDF and random forests,” Int. Arab J. Inf. Technol., Vol.15, No.5, pp.817–824, 2018.
[13] R. Yang, K. Zheng, B. Wu, C. Wu, and X. Wang, “Phishing website detection based on deep convolutional neural network and random forest ensemble learning,” Sensors, Vol.21, No.24, pp.1–18, 2021, doi: 10.3390/s21248281.
[14] Z. Alshingiti, R. Alaqel, J. Al-Muhtadi, Q. E. U. Haq, K. Saleem, and M. H. Faheem, “A Deep Learning-Based Phishing Detection System Using CNN, LSTM, and LSTM-CNN,” Electron., Vol.12, No.1, pp.1–18, 2023, doi: 10.3390/electronics12010232.
[15] M. Selvakumari, M. Sowjanya, S. Das, and S. Padmavathi, “Retraction: Phishing website detection using machine learning and deep learning techniques,” J. Phys. Conf. Ser., Vol.1916, No.1, 2021, doi: 10.1088/1742-6596/1916/1/012169.
[16] G. K. Kamalam, P. Suresh, R. Nivash, A. Ramya, and G. Raviprasath, “Detection of Phishing Websites Using Machine Learning,” 2022 Int. Conf. Comput. Commun. Informatics, ICCCI 2022, no. June, 2022, doi: 10.1109/ICCCI54379.2022.9740763.
[17] I. Tyagi, J. Shad, S. Sharma, S. Gaur, and G. Kaur, “A Novel Machine Learning Approach to Detect Phishing Websites,” 2018 5th Int. Conf. Signal Process. Integr. Networks, SPIN 2018, Sep., pp.425–430, 2018, doi: 10.1109/SPIN.2018.8474040.
[18] R. Mahajan and I. Siddavatam, “Phishing Website Detection using Machine Learning Algorithms,” Int. J. Comput. Appl., Vol.181, No. 23, pp.45–47, 2018, doi: 10.5120/ijca2018918026.
[19] Shashwat Tiwari, “Phishing Dataset for Machine Learning | Kaggle,” Kaggle, 2021.
[20] “Kaggle: Your Home for Data Science.” https://www.kaggle.com/datasets/isatish/phishing-dataset-uci-ml- csv?select=uci-ml-phishing-dataset.csv (accessed Jul. 27, 2023).
[21] Z. Fan, “Detecting and Classifying Phishing Websites by Machine Learning,” Feb., pp.48–51, 2022, doi: 10.1109/ICAML54311.2021.00018.
[22] N. B. M. Noh and M. Nazmi Bin M Basri, “Phishing Website Detection Using Random Forest and Support Vector Machine: A Comparison,” 2021 2nd Int. Conf. Artif. Intell. Data Sci. AiDAS 2021, Sep. 2021, doi:10.1109/AIDAS53897.2021.9574282.
Citation
Ankit Prajapati, Chetan Agarwal, Pawan Meena, "Assessment of Phishing Websites Prediction using Machine Learning Approaches," International Journal of Computer Sciences and Engineering, Vol.12, Issue.2, pp.37-45, 2024.
A Survey on Software defined Networking and different types of controllers
Survey Paper | Journal Paper
Vol.12 , Issue.2 , pp.46-52, Feb-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i2.4652
Abstract
Distributed Denial of Service (DDOS) attacks represent a tool wielded by hackers, cyber extortionist, and individuals involved in cyber terrorism. These malicious activities result in significant financial losses for the targeted victims. Although a myriad of scientific solutions are available, the frequency and intensity of DDOS attacks continue to escalate. In response to the evolving landscape of security threads, a novel network paradigm has emerged. Software Defined Networking (SDN) has garnered considerable attention from numerous researchers it addresses the specific requirement of modern data centres, drawing inspiration from its capabilities. Our study presents a comprehensive examination of current SDN-based solutions for detection and mitigating DDOS attacks. Building upon our findings, we propose an innovative framework designed for the detection and mitigation of DDOS attacks on a large scale network. The primary contribution of this paper is twofold. Firstly, we furnish an in-depth survey of SDN based DDOS attack detection and mitigation mechanisms. Secondly, we offer a detailed comparison of SDN- based controllers.
Key-Words / Index Term
DDOS, SDN, cyber terrorism, financial losses, Controllers.
References
[1]. Bawany, N.Z., Shamsi. J.A & Salah. K, “DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions”. Arab J Sci Eng 42, pp.425–441,2017.
[2]. YooJin Kwon, “A Survey on Defence Mechanism against Distrib-uted Denial of Service (DDoS) Attacks in Control System”, KEP-CO Journal on Electric Power and Energy, Sept., Vol.1, No.1, 2015.
[3]. Dutta Sai Eswari , P.V.Lakshmi, “A Survey On Detection Of Ddos Attacks Using Machine Learning Approaches”, Turkish Journal of Computer and Mathematics Education Vol.12, No.11, pp.4923-4931, 2021.
[4]. J. Kaur, “Mac Layer Management Frame Denial of Service At-tacks,’’ 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE), Ghaziabad, India, pp.155-160, 2016.
[5]. Mohammad Alhisnawi, Aladdin Abdulhassan, Mahmood Ahmadi, “A Comprehensive Survey on Software-Defined Network Controllers”, Next Generation of Internet of Things, pp.199-231.
[6]. Mahdi Nsaif Jasim, “POX Controller and Open Flow Performance Evaluation in Software Defined Networks (SDN) Using Mininet Emulator”, 3rd International Conference on Sustainable Engineer-ing Techniques (ICSET 2020), IOP Conf Series: Materials Science and Engineering 881, 012102, 2020.
[7]. F. Bannour, S. Souihi and A. Mellouk, “Distributed SDN Control: Survey, Taxonomy, and Challenges,’’ in IEEE Communications Surveys & Tutorials, Vol.20, No.1, pp.333-354, 2018.
[8]. J. K. Chahal, P. Kaur and A. Sharma, “Distributed Denial of Ser-vice (DDoS) Attacks in Software-defined Networks (SDN),” 2021 5th International Conference on Electrical, Electronics, Communi-cation, Computer Technologies and Optimization Techniques (ICEECCOT), Mysuru, India, pp.291-295, 2021.
[9]. T. Huang, F. R. Yu, C. Zhang, J. Liu, J. Zhang and Y. Liu, “A Sur-vey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and Challenges,’’ in IEEE Communications Surveys & Tutorials, Vol.19, No.2, pp.891-917, 2017.
[10]. Hoang, D. B., & Pham, M. “On software-defined networking and the design of SDN controllers”. 2015 6th International Conference on the Network of the Future (NOF), 2015.
[11]. Bawany, N.Z., Shamsi, J.A. & Salah, K. “DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solu-tions”, Arab J Sci Eng 42, pp.425–441, 2017.
[12]. K. M. Sudar, M. Beulah, P. Deepalakshmi, P. Nagaraj and P. Chin-nasamy, "Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques,"2021 International Con-ference on Computer Communication and Informatics (ICCCI), Coimbatore, India, pp.1-5, 2021. doi: 10.1109/ICCCI50826.2021.9402517..
[13]. B. Isong, R. R. S. Molose, A. M. Abu-Mahfouz and N. Dladlu, "Comprehensive Review of SDN Controller Placement Strategies," in IEEE Access, Vol.8, pp.170070-170092, 2020.
[14]. Mahadev, Vinod Kumar “Behaviour Analysis of DDoS Attack and Its Detection” International Journal of Computer Sciences and Engineering, May, Vol.6, Issue.5, 2018. E-ISSN: 2347-2693
[15]. Aakriti Aggarwal, Ankur Gupta “Detection of DDoS Attack Using UCLA Dataset on Different Classifiers”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, E-ISSN: 2347-2693.
Citation
R. Karhikeyani, E. Karthikeyan, "A Survey on Software defined Networking and different types of controllers," International Journal of Computer Sciences and Engineering, Vol.12, Issue.2, pp.46-52, 2024.