Software Dependability Estimation: Implementation through Fuzzy AHP
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.1-8, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.18
Abstract
Achieving dependability has always been a challenging task for the software developers. Ensuring the selection of suitable dependability attributes for the software development is crucial for the development of dependable software and to maintain trust among software developers. For multi criteria decision making a very helpful tool is identified called Fuzzy Analytic Hierarchy Process (FAHP). For the comparison of different factors and sub-factors (attributes) and to know the impact of one factor over the other the FAHP has been identified by researchers. The main objective of this paper is to implementation of Fuzzy Analytic Hierarchy Process for the estimation of software dependability, By which we can identify the most suitable dependability attributes and ranked them as per their weight-ages. The Fuzzy Analytic Hierarchy Process uses a defined range of values rather than a single crisp value to vanish the decision maker’s uncertainty. Using the definite range of values, the decision makers can choose the value that shows his confidence and also they can specify their stance like optimistic, pessimistic or moderate. This paper reveals the implementation of Fuzzy AHP technique to calculate the weight-ages of dependability attributes and ranked them. This study can be a guide of the methodology to be implemented by software developers for the selection of appropriate dependability factors and sub-factors for the development of dependable software
Key-Words / Index Term
Software Dependability; Dependability Factors; Dependability Sub-Factors (Attributes); AHP; FAHP
References
[1] C. W. Chang, C. R. Wu, H. L. Lin, “Integrating Fuzzy Theory and Hierarchy concepts to evaluate software quality”, Software Quality Journal Vol. 16, pp. 263-276, 2008.
[2] S. Saif Ahmad Abidi, F. Farouqui, “Analytical Hierarchical Process for Software Dependability”, Proceedings of 6th International Conference on “Computing for Sustainable Global Development”, pp. 1456-1460, 13th – 15th March, 2019, New Delhi (INDIA)
[3] T.L. Saaty, “The analytic hierarchy process”. McGraw-Hill, New York 1980
[4] Zadeh, L. A. (1965). Fuzzy sets. Information and Control 8, 338-353.
[5] D. Chatterjee and B.Mukherjee, ”Study of fuzzy-AHP model to search the criterion in the evaluation of the best technical institutions: a case study”, International Journal of Engineering Science and Technology, Vol. 2, No. 7, pp. 2499-2510, 2010.
[6] Yan Z, Wang X, FuY. “Study on early warning model of coal mining engineering with fuzzy ahp”, International symposium on engineering emergency management, Systems Engineering Procedia. 2012; 5:113–8.
[7] A. Mardani, A. Jusoh, & E.K. Zavadskas, “Fuzzy multiple crieteria decision-making techniques and applications- Two decades review from 1994 to 2014”. Expert Systems with Applications, 42(8). 4126-4148, 2015.
[8] Chander Diwaker, Pradeep Tomar, "Identification of Factors and Techniques to Design and Develop Component Based Reliability Model", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.107-114, 2017
[9] I. Syamsuddin, & J. Hwang, “A new fuzzy MCDM framework to evaluate e-government security strategy”. Paper presented at 2010 4th international conference on application of information and communication technologies, Uzbekistan, October 2010
[10] Kanza Gulzar, Jun Sang, Adeel Akbar Memon, Muhammad Ramzan,” A Practical Approach for Evaluating and Prioritizing Situational Factors in Global Software Project Development”, International Journal of Advanced Computer Science and Applications, Vol. 9, No. 7, 2018.
[11] Seyedeh Sarah Hosseini,” Identification and ranking the factors affecting lean manufacturing by using FAHP technique”, International Academic Journal of Science and Engineering Vol. 4, No. 3, pp. 20-27, 2017.
[12] Surabhi Saxena, Devendra Agarwal, "Realiability Assessment Model to Estimate Quality of the Effective E-Procurement Process in Adoption", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.3, pp.65-68, 2018
[13] S. Saif Ahmad Abidi, F. Farouqui, “Software Dependability: Classification and Categorization”, Proceedings of 6th International Conference on “Computing for Sustainable Global Development”, pp. 1461-1465, 13th – 15th March, 2019, New Delhi (INDIA)
[14] S. K. Dubey, A. Rana, A. Sharma, “Measurement of Object Oriented Software Usability using Fuzzy AHP”,international journal of Computer Science and telecommunications, vol.3, issue 5, May 2012.
[15] T. S. Lious, M. J. J. Wang, “Ranking fuzzy numbers with integral value”, Fuzzy Sets and Systems, 50(3), pp. 247–255, 1992.
Citation
Syed Saif Ahmad Abidi, Mohd. Faizan Farooqui, A.A Zilli, "Software Dependability Estimation: Implementation through Fuzzy AHP," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1-8, 2019.
Implementation and Analysis of Depression Detection Model using Emotion Artificial Intelligence
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.9-12, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.912
Abstract
Depression is considered as one of the main psychological well-being issues in this day and age. Affecting contrarily on physical wellbeing, social consideration and scholarly accomplishment, one`s emotional wellness issue remain a critical general medical issue. This examination accepts to prevent emotional wellness issues from creating and plans to spare people and families from misery and spare huge assets for the wellbeing framework. The initial step to begin with the treatment procedure is to recognize wretchedness. In this model tweets from twitter is examined with the assistance of Natural Language Processing and Python code. Tweepy and TextBlob are utilized for further usage.
Key-Words / Index Term
Natural Language Processing, Depression, Twitter, Python, Tweepy, TextBlob
References
[1] Mandar Deshpande, VigneshRao- “Intelligent Sustainable Systems” (ICISS2017)IEEE Xplore Compliant - Part Number:CFP17M19-ART, ISBN:978-1-5386-1959-9
[2] Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali Review Paper on “Predicting Mood Disorder Risk Using Machine Learning” International Journal of Scientific Research in Computer Sciences and Engineering Vol.7 , Issue.1 , pp.16-22, Feb-2019
[3] Shrija Madhu, “An approach to analyze suicidal tendency in blogs and tweets using Sentiment Analysis” International Journal of Scientific Research in Computer Sciences and Engineering Vol.6 , Issue.4 , pp.34-36, Aug-2018
[4] Xinyu Wang, Chunhong Zhang, Yang Ji1, Li Sun1, and Leijia “A Depression Detection Model Based on Sentiment Analysis in Micro-blog Social Network”
[5] Shweta Oak “Depression Detection analysis”
[6] Stankevich, VadimIsakov, Dmitry Devyatkin and Ivan SmirnovInstitute for Systems Analysis, Federal Research Center ”Computer Science and Control” of RAS, a. Moscow, Russian Federation, Feature Engineering for Depression Detection in Social Media Maxim
[7] Shubham Dham, Anirudh Sharmay , Abhinav Dhallz “Depression Scale Recognition from Audio, Visual and Text Analysis” Department of Computer Science and Engineering, Indian Institute of Technology (IIT) Ropar, India
[8] A.K.Jose, N.Bhatia, and S.Krishna, “Twitter
Sentiment Analysis,” National Institute of Technology,
Calicut,2010.
[9] Sharath Chandra Johannes CEichst “Detecting depression and mental illness on social media: an integrative review”
Citation
Unnati Chawda, Shanu K Rakesh, "Implementation and Analysis of Depression Detection Model using Emotion Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.9-12, 2019.
Linear Norm Tree Based Least Square TSVM Scheme for Wilt Diseased Trees Classification
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.13-17, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.1317
Abstract
The latest generation of Least Square Twin Support Vector Machine has achieved amazing outcomes in the field of image classification. This paper presents a new method Linear Norms Tree based Least Square Twin Support Vector Machine for developing a plant disease recognition system, which is based on high-resolution multispectral satellite imagery. This proposed model can identify and classify different kinds of plant diseases. Dataset is a composition of diseased trees and other land cover. That are used to identify whether the tree is diseased or not. Experiments with wilt disease data set carried out indicate that new classifier, Linear Norms Tree based Least Square Twin Support Vector Machine, yields a progressively balanced classification accuracy between classes compared to different classification schemes in resolving the imbalanced classification problem.
Key-Words / Index Term
Twin SVM, SVM, Norm, wilt, diseases, least square, imbalance data
References
[1] K. A. Garrett, S. P. Dendy, E. E. Frank, M. N. Rouse, and S. E. Travers, “Climate change effects on plant disease: genomes to ecosystems,” Annual Review of Phytopathology, Vol. 44, pp. 489–509, 2006.
[2] J. G. Arnal Barbedo, “Digital image processing techniques for detecting, quantifying and classifying plant diseases,” SpringerPlus, Vol. 2, article 660, pp. 1–12, 2013.
[3] Srdjan Sladojevic, Marko Arsenovic, Andras Anderla, Dubravko Culibrk, and Darko Stefanovic, “Deep Neural Networks Based Recognition of Plant Diseases by Leaf Image Classification,” Computational Intelligence and Neuroscience, Vol. 2016, pp 1-11, 2016..
[4] L. Kurvonen, M.T. Hallikainen, “Textural Information of Multitemporal ERS-1 and JERS-1 SAR Images with Applications to Land and Forest Type Classification in Boreal Zone,” IEEE Transactions On Geoscience And Remote Sensing, Vol. 37(2) , pp. 680-689,1999.
[5] N. Kosaka, T. Akiyama, B. Tsai, T. Kojima, “Forest type classification using data fusion of multispectral and panchromatic high-resolution satellite imageries,” In International Geoscience and Remote Sensing Symposium, Vol. 4, pp. 2980- 2983, 2005.
[6] X.Yang, N. Rochdi, J Zhang, J. Banting, D. Rolfson, C King, B. Purdy, “Mapping tree species in a boreal forest area using RapidEye and LiDAR data,” In Geoscience and Remote Sensing Symposium (IGARSS), IEEE International, pp. 69-71, 2014.
[7] M.S.M. Pozi, M. N. Sulaiman, N. Mustapha and T. Perumal, “A new classification model for a class imbalanced data set using genetic programming and support vector machines: case study for wilt disease classification,” Remote Sensing Letters, 6:7, 568-577, 2015.
[8] M. A. Chandra & S. S. Bedi, “Survey on SVM and their application in image classification,” International Journal of Information Technology, pp 1–11, 2018.
[9] C. Cortes and V. Vapnik, “Support-vector network,” Machine Learning 20(3):273–297, 1995.
[10] S. Tao, D Chen, W. Zhao, “Fast pruning algorithm for multi-output LS-SVM and its application in chemical pattern classification,” Chemometrics and Intelligent Laboratory Systems - hemometrics and Intelligent Laboratory Systems Vol.96 (1), pp. 63-69, 2009.
[11] O. L. Mangasarian and David R. Musicant, “Lagrangian Support Vector Machines” Journal of Machine Learning Research Vol. 1, pp. 161-177, 2001.
[12] J. A. K Suykens and J. Vandewalle, “Least squares support vector machine classifiers,” Neural Process, Letter. 9, pp. 293-300, 1999.
[13] Jayadeva, R. Khemchandani, S. Chandra, “Twin support vector machines for pattern classification”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, Issue 5, pp. 905–910, 2007.
[14] B. Johnson, R. Tateishi, N. Hoan, A hybrid pansharpening approach and multiscale object-based image analysis for mapping diseased pine and oak trees, International Journal of Remote Sensing, Vol. 34(20), pp. 6969-6982, 2013.
[15] J. G. Arnal Barbedo, Digital image processing techniques for detecting, quantifying and classifying plant diseases, Springer-Plus, Vol. 2, article 660, pp. 1–12, 2013.
[16] A. K. Mahlein, T. Rumpf, P. Welke et al., Development of spectral indices for detecting and identifying plant diseases, Remote Sensing of Environment, Vol. 128, pp. 21–30, 2013.
[17] W. Xiuqing,W. Haiyan, and Y. Shifeng, Plant disease detection based on near-field acoustic holography, Transactions of the Chinese Society for Agricultural Machinery, Vol. 2, article 43,2014.
[18] J. K. Patil and R. Kumar, “Feature extraction of diseased leaf images,” Journal of Signal & Image Processing, Vol. 3, no. 1, pp. 60, 2012.
[19] T. Rumpf, A.-K.Mahlein, U. Steiner, E.-C. Oerke, H.-W. Dehne, and L. Pl¨umer, “Early detection and classification of plant diseases with Support VectorMachines based on hyperspectral reflectance,” Computers and Electronics in Agriculture, Vol. 74, no. 1, pp. 91–99, 2010.
[20] A. Anagaw, and YL Chang, “A new complement naïve Bayesian approach for biomedical data classification,” Journal of Ambient Intelligence and Humanized Computing pp 1–9 (2018).
[21] M F Unlersen and K. Sabanci, “The Classification of Diseased Trees by Using kNN and MLP Classification Models According to the Satellite Imagery,” International Journal of Intelligent Systems and Applications in Engineering, Vol 4, No 2 (2016).
[22] D. Sheela Jeyarani, A. Pethalakshmi, “An Efficient Fuzzy Entropy Based Feature Selection Algorithm for High Dimensional Data,” International Journal of Advanced Research in Computer Science, Vol. 6, No. 6, June - July 2015.
[23] U Mahdiyah, M. I. Irawan, E. Imah, “Integrating Data Selection and Extreme Learning Machine for Imbalanced Data,” International Conference on Computer Science and Computational Intelligence (ICCSCI 2015), Procedia Computer Science 59, 221 – 229, 2015.
[24] C. K. Reddy, D. Hiranmayi, K. Eswaran, G. G. Likhita, B.Saritha, “Classification of Diseased Plants using Separation of Points by Planes,” International Journal of Engineering Technology Science and Research, Vol. 4, Issue 9 September 2017.
[25] D. Tomar, S. Agarwal, “Twin Support Vector Machine: A review from 2007 to 2014,” Egyptian Informatics Journal Volume 16, Issue 1, March 2015, Pages 55-69.
[26] M A. Kumar, M, Gopal, “Least squares twin support vector machines for pattern classification,” Expert System Appl 36(3):7535– 7543, 2009
[27] M.A. Chandra and S.S. Bedi, “Benchmarking tree-based least squares twin support vector machine classifiers,” International Journal of Business Intelligence and Data Mining.10.1504/IJBIDM.2018.10009883.
Citation
Mayank Arya Chandra, S S Bedi, "Linear Norm Tree Based Least Square TSVM Scheme for Wilt Diseased Trees Classification," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.13-17, 2019.
Robust & Secure Image Reverse Watermarking using Data Encryption Standard & RNS
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.18-23, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.1823
Abstract
In the modern field of Internet with the advance development of digital communication, image security is the important concern to store data for communication in various organizations. By the use of cryptography techniques, it provides best strength and reliability to encrypt the images more essentially in the differe¬¬¬¬¬¬nt type of organizations such as criminal law enforcement, Ministry of Defence. Reverse watermarking is used for authentication and to authorize the users of the respective panel where the original image and watermark image gets recover. In this paper, original secrete image is encrypted through S-DES (Simple-Data Encryption Standard) with the use of a key image. This encrypted image is called watermarked image and on this watermarked image, we applied RESIDUE NUMBER SYSTEM and get the DES watermarked RESIDUE NUMBER SYSTEM encoded image. For decoding, we go for reverse process and get the secrete image back
Key-Words / Index Term
Image Security, Watermark Image, Data Encryption Standard, Residue Number System
References
[1] S. Samanta, S. Dutta, G. Sanyal, "An Enhancement of Security of Image using Permutation of RGB-Components", IEEE 3`d International Conference on Electronics Computer Technology (ICECT), Vol: 2, pp. 404-408, 2011.
[2] G. Huayong, H. Mingsheng, W. Qian, "Steganography and Steganalysis Based on Digital Image", IEEE 4th International Congress on Image and Signal Processing (CISP), Vol: 1, pp. 252-255, 2011.
[3] P. Bandyopadhyay, S.Das, S. Paul, A. Chaudhuri, M. Banerjee, "A Dynamic Watermarking Scheme for Color Image Authentication", IEEE Trans., International Conference on Advances in Recent Technologies in Communication and Computing, pp. 314-318, 2009.
[4] B. Madhu, G. Holi, S. Murthy, “An Overview of Image Security Techiques” International Journal of Computer Applications Vol. 154, No.6, pp. 37-46, 2016.
[5] B.D. Parameshachari, K. M. S. Soyjaudah, M.V. Chaaitanyakumar, "A Study on Different Techniques for Security of an Image", International Journal of Recent Technology and Engineering, ISSE: 2277-3878, Vol.- 1, Issue-6, pp. 14-19, 2013.
[6] P. Bhangale, A. Gawad, J. Maurya, R.S. Raje, “Image Security using AES and RNS with Reversible Watermarking”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 4, Issue 5, pp. 350-355, 2017.
[7] D. Younes, P. Steffan, "Efficient Image Processing Application using Residue Number System", 20th International Conference on Mixed Design of Integrated Circuits and Systems (MIXDES), Gdynia, Poland, pp. 468-472, 2013.
[8] H.K. Maitya, S.P. Maity, “Joint Robust and Reversible Watermarking for Medical Images”, 2nd International Conference on Communication, Computing & Security, Procedia Technology pp. 275 – 282, 2012.
[9] M. abdullatif, A. M. Zeki, J. Chebil, T.S. Gunawan, "Properties of Digital Image Watermarking", IEEE 9th International Colloquium on Signal Processing and its Application (CSPA), Kuala Lumpur, Malaysia, pp. 235-240, 2013.
[10] M. K. Ramaiya, N. Hemarajani, and A. K. Saxena, "Security Improvisation in Image Steganography using DES", 3`d IEEE International Advance Computing Conference, pp. 1094-1099, 2013.
[11] A. Rahman, M. T. Naseem, 1. M. Qureshi, M. Z. Muzaffar, "Reversible Watermarking using Residue Number System", IEEE Trans., 7th International Conference on Information Assurance and Security (lAS), pp. 162-166, 2011.
[12] S.S. Mamarde, S.A. Ladhake, “A Review on Secret Image Protection using Reversible Watermarking”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 6, Issue 1, pp. 188-190, 2017.
[13] S. Aguru , B.M. Rao, “Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.6-9, 2019.
[14] S. Bansal, “Data Security by Steganography: A Review”, International Journal of Scintific Research in Network Security and Communication, Vol.7, Issue-1 pp. 10-12, 2019.
[15] M. Mundher, D. Muhamad, A. Rehman, T. Sab and F. Kausar, “Digital Watermarking for Images Security using Discrete Slantlet Transform”, Applied Mathematics & Information Sciences, An International Journal, Appl. Math. Inf. Sci. Vol. 8, No. 6, pp. 2823-2830, 2014.
[16] P. Parmar, N. Jindal, “Image Security with Integrated Watermarking and Encryption”, IOSR Journal of Electronics and Communication Engineering, Vol. 9, Issue 3, pp. 24-29, 2014.
[17] N. Chandra, J. Bagga, "Performance Comparison of Digital Image Watermarking Techniques: A Survey", International Journal of Computer Application Technology and Research, Vol. 2, lssue 2, pp. 126-130, 2013.
[18] M. Mangtani, N. Limbad, “A Survey on Various Watermarking and Cryptography Techniques for Data Hiding in Medical Images”, IJSRD - International Journal for Scientific Research & Development, Vol. 3, Issue 09 , pp. 633-637, 2015.
[19] L. Bin, L. Lichen, Z. Jan, "Image Encryption Algorithm based on Chaotic Map and S-DES”, IEEE 2nd International Conference on Advanced Computer Control (ICACC), pp. 41-44, 2010.
[20] A. Al-Haj, N. Hussein and G. Abandah, "Combining cryptography and digital watermarking for secured transmission of medical images," 2nd International Conference on Information Management (ICIM), London, pp. 40-46, 2016.
Citation
J. Jain, A. Singh, "Robust & Secure Image Reverse Watermarking using Data Encryption Standard & RNS," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.18-23, 2019.
Stock Market Prediction using Deep Neural Networks
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.24-28, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.2428
Abstract
Stock Market Prediction is the demonstration of attempting to decide the future estimation of an organization stock or other money related instrument exchanged on a trade. Prediction on stock market is a great challenge as it is complex, dynamic and non-linear in nature. The main focus is on closing price of next day. High, Low, Volume is of importance but the closing price is of more value. There are numerous instances of Machine Learning algorithms possessed the capacity to achieve attractive outcomes while doing that kind of forecast. In this paper, the LSTM networks are used to predict future closing price of stock market based on the price history, alongside with technical analysis indicators. For that objective, a forecast model was built, and a series of experiments were performed and their outcomes were examined against various measurements to survey if this kind of calculation presents and enhancements when contrasted with other Machine Learning techniques.
Key-Words / Index Term
Stock Market, Prediction, LSTM
References
[1] Kumar, D. Ashok, and S. Murugan. "Performance analysis of Indian stock market index using neural network time series model." In Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013 International Conference on, pp. 72-78. IEEE, 2013.
[2] Abhishek, Kumar, Anshul Khairwa, Tej Pratap, and Surya Prakash. "A stock market prediction model using ANN." In Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on, pp. 1-5. IEEE, 2012.
[3] Hagenau, Michael, Michael Liebmann, Markus Hedwig, and Dirk Neumann. "Automated news reading: Stock price prediction based on financial news using context-specific features." In System Science (HICSS), 2012 45th Hawaii International Conference on, pp. 1040-1049.IEEE, 2012.
[4] US. Sutton and A.G. Barto, Reinforcement Learning, The MIT Press, 1998.
[5] R.S. Sutton, ``Learning to foresee by the technique for worldly contrasts," Machine Learning, 3:9-44, 1988.
[6] P.J. Werbos, “Building and understanding adaptive systems: A statistical/numericaI approach to factory automation and brain research,” IEEE Transactions on Systems, Man, and Cybernetics, 17:7-20, 1987.
[7] S.M. Kendall and K. Ord, Time Series, Oxford University Press, New York, 1997.
[8] N. BaBa and M. Kozaki, “An intelligent forecasting system of stock price using neural networks,” Proc. IJCNN, Baltimore, Maryland, 652-657, 1992.
[9] R.J. Kuo, “A decision support system for the stock market through integration of fuzzy neural networks and fuzzy Delphi,” Applied Arlijkial Intelligence, 6501 -520, 1998.
[10] Sheta, A. F., Ahmed, S. E. M., & Faris, H. (2015). A comparison between regression, artificial neural networks and support vector machines for predicting stock market index. Soft Computing, 7, 8.
[11] oone, L., Giorno, C., & Richardson, P. (1998), Stock market fluctuations and consumption behaviour: some recent evidence (No. 208). OECD Publishing.
[12] Gharehchopogh, F.S., Mohammadi, P., &Hakimi, P. (2012). Application of Decision Tree Algorithm for Data Mining in Healthcare Operations: A Case Study. International Journal of Computer Applications, 52(6), 21-26.
Citation
Rohit Kumar, Rohit Gajbhiye, Isha Nikhar, Dyotak Thengdi, Sofia Pillai, "Stock Market Prediction using Deep Neural Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.24-28, 2019.
A Review Paper on Various Attacks on Wireless Sensor Networks
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.29-35, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.2935
Abstract
As we know wireless sensor network have many advantages such as its high speed and high quality which increase its use in modern time. As so the security in wireless sensor network became the most important factor. There are many security issues but the most important is “eavesdropping”. Eavesdropping is a type of attack in which the information being transmitted is attained or captured by some other devices. It is not possible to tell if a system had faced some kind of eavesdropping or not. In this paper various advantages and disadvantages will be discussed. There will be some application of WSNS and some introduction of eavesdropping issue with some techniques to detect this issue. We will also see various other attacks which leads to effect the security of wireless sensor networks. This paper will help in improving security in wireless sensor networks. This paper will further help in improving accuracy of wireless sensor networks. This paper will also light up various advantages and disadvantage of the technique which is being used for improving the security of wireless sensor networks.
Key-Words / Index Term
Wireless sensor networks (WSNS), eavesdropping and security enhancement
References
[1]. .Xu, Q., Ren, P., Song, H., & Du, Q. (2016). Security Enhancement for IoT Communications Exposed to Eavesdroppers with Uncertain Locations. IEEE Access, 4, 2840-2853.
[2]. 2) Di Pietro, R., Guarino, S., Verde, N., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks –A survey. Computer Communications, 51, 1-20. [12] Di Pietro, R., & Viejo, A. (2011).Location privacy and resilience in wireless sensor networks querying.Computer Communications, 34(3), 515-523.
[3]. 3) Chen, X., Zhang, Z., Chen, H., & Zhang, H. (2015). Enhancing wireless information and power transfer by exploiting multi-antenna techniques.IEEE Communications Magazine, 53(4), 133-141.
[4]. 4) Li, C., & Lee, C. (2012). A novel user authentication and privacy-preserving scheme with smart cards for wireless communications.Mathematical and Computer Modelling, 55(1-2), 35-44.
[5]. He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications.Computer Communications, 34(3), 367-374. doi: 10.1016/j.comcom.2010.02.031
[6]. .6 )Demakis, C., &Merinos, L. (2004). Security in third-generation mobile systems.IEE Colloquium on Security in Networks, 27, 638-650. doi: 10.1016/j.comcom.2003.12.004. Plößl, K., &Federrath, H. (2008). A privacy-aware and efficient security infrastructure for vehicular ad hoc networks.Computer Standards & Interfaces, 30(6), 390-397.
[7]. Raj, A. B., Ramesh, M. V., Kulkarni, R. V., & T., H. (2012). Security Enhancement in Wireless Sensor Networks Using Machine Learning.2012 IEEE 14th International Conference on High-Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, 1264-1269. 1196 Dr. Charanjit Singh and Dr. RajbirKaur, MitthatmeerKaur
[8]. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293-315
[9]. A.H. Farooqi and F.A. Khan, Intrusion Detection Systems for Wireless Sensor Networks: A Survey, in FGCN/ACN 2009, CCIS, vol. 56, pp. 234-241.
[10]. Y. Zhang, N. Meratnia, and P. Havinga, "Outlier Detection Techniques for Wireless Sensor Networks: A Survey", IEEE Commun. Surveys Tutorials, vol. 12, no. 2, 2010.
[11]. T. Bhattasali, and R. Chaki, A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network, in 4th International Conference on Network Security and Applications (CNSA-2011), Springer, 2011, pp. 268- 280.
[12]. Nabil Ali Alrajeh, S. Khan, and Bilal Shams, Intrusion Detection Systems in Wireless Sensor Networks: A Review, International Journal of Distributed Sensor Networks Volume 2013 (2013), Article ID 167575
[13]. S. Khan, N. Mast, and J. Loo, “Denial of service attacks and mitigation techniques in IEEE 802.11 Wireless mesh networks,” , vol. 12, pp. 1–8, 2009.
[14]. M. Ngadi, A.H. Abdullah, and S. Mandala, “A survey on MANET intrusion detection”, International J.Computer Science and Security, volume 2, number 1, pages 1-11, 2008.
[15]. Y. Zhang, W. Lee, and Y.A. Huang, “Intrusion detection techniques for mobile wireless networks”, J. Wireless Networks, vol. 9, num. 5, pp. 545-556, 2003.
[16]. S. Khan, K. K. Loo, and Z. U. Din, “Framework for intrusion detection in IEEE 802.11 wireless mesh networks,” , vol. 7, no. 4, pp. 435–440, 2010.
[17]. N. Noury, T. Herve, V. Rialle, G. Virone, E. Mercier, G. Morey, A. Moro, T. Porcheron,“Monitoring behavior in home using a smart fall sensor”, IEEE-EMBS Special Topic Conference on Micro-technologies in Medicine and Biology, October 2000, pp. 607–610.
[18]. K. Nagarathna, Kiran Y. B, J D. Mallapur, S. Hiremath (2012) worked on “Trust Based Secured Routing in Wireless Multimedia Sensor Networks”, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.
[19]. Theodore Zahariadis, Helen Leligou, Panagiotis Karkazis, Panagiotis Trakadas, Ioannis Papaefstathiou, Charalambos Vangelatos, Lionel Besson, “Design And Implementation Of A Trust-Aware Routing Protocol For Large Wsns”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010.
[20]. Idris M.Atakli ,Hongking Hu, Yu Chan, “ Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evalution ,” The Symposis on Simulation of systems Security(SSSS 08),Ottawa,Canada, April 14 17,2008.
[21]. Janani.C and Mrs. P.Chitra, “Trust Evaluation Based Security In Wireless Sensor Network”, (IJITR) International Journal Of Innovative Technology And Research, Volume No. 1, Issue No. 1, December-January 2013, 054-060.
Citation
M. Dahiya, A. Sangwan, "A Review Paper on Various Attacks on Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.29-35, 2019.
Weather Prediction using Scikit-Learn
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.36-40, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.3640
Abstract
Weather is the most important factor in terms of farming and agriculture. It continuous, data-intensive, multidimensional, and chaotic process. These properties of weather make its forecasting a formidable challenge. The most technologically challenged problems of the last century are weather forecasting. The harvest of crops is dependent on this factor. To make an accurate weather prediction is one of the major challenges that is being faced all over the world. Scientists have tried their best to forecast environmental characteristics using a number of methods and some of these methods are more accurate than others. Weather forecasts provide critical information about future weather. Every year notorious weather harms the life, property and many government activities which is usually heavily funded is destroyed, as a result weather forecasting would help government to plan out things in advance to prepare its citizens for the worst of the weather. There are many different methodologies that have come into observation regarding weather prediction. This paper describes one of the many techniques used for prediction of weather which will be beneficial for the farmers, agricultural and scientists. It will help them to better understand the weather for yielding crops and for studying environment too.
Key-Words / Index Term
Regression, Pandas, Scikit Learn, Numpy
References
[1]. Pushpa Mohan, Dr. Kiran Kumari Patil,” Survey on Crop and Weather Forecasting based on Agriculture related Statistical Data”, International Journal of Innovative Research in Computer and Communication Engineering, Bangalore, India, Vol. 5, Issue 2, February 2017, pp no. 2320-9801. [1]
[2]. Sneha S. Gumaste, Anilkumar J. Kadam, “Future weather prediction using genetic algorithm and FFT for smart farming”, India.[2]
[3]. M. Manikandan , R. Mala,” Optimal Prediction of Weather Condition Based on C4.5 Classification Technique”, International Journal of Computer Sciences and Engineering, Vol.-6, Issue-10, Oct 2018, pp no. E-ISSN: 2347-2693 [3]
[4]. K.P. Mangani, R. Kousalya, “Big Data Approach for Weather Based Crop Insurance”, IJSRNSC Volume-5, Issue-3, June 2017, pp no. E-ISSN: 2347-2693 [4]
[5]. Amit Palve, Ajit Patil, Amol Potgantwar, “Big Data Analysis Using Distributed Approach on Weather Forecasting Data”, Volume-5, Issue-3, June 2017, India, pp no. ISSN: 2321-3256[5]
[6]. L. Shaikh, K. Sawlani,“A Rainfall Prediction Model Using
[7]. Articial Neural Network”, IJSRNSC Volume-5, Issue-1,
[8]. April 2017, pp no. ISSN: 2321 3256.[5]
Citation
Sudhnya Kashikar, Sumedha Patil, Ameya Vedantwar, Shivani Katpatal, Sofia Pillai, "Weather Prediction using Scikit-Learn," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.36-40, 2019.
Review on LEACH (Low Energy Adaptive Clustering Hierarchy) Protocol for Enhancing Energy Efficiency of WSN
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.41-43, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.4143
Abstract
Wireless sensor network (WSN) consists of a number of dedicated sensors which are spatially dispersed for different purposes such as monitoring and recording the various physical conditions of the environment and organising the data collected at a central location for further operations. In wireless sensor networks, the sensor nodes have limited energy which affects the lifetime of the nodes. Hence the system performance can be enhanced by minimising energy dissipation and maximising the lifetime of the nodes in the wireless sensor networks. Low Energy Adaptive Clustering Hierarchy(LEACH) protocol is a very important energy efficient protocol .This protocol improves the method of selection of cluster heads among the various sensor nodes by examining the residual energy of the different nodes and then the node which is having more residual energy is made the cluster head for that group of nodes .This protocol is highly efficient as it reduces energy consumption and decreases system delay which results in improvement of lifetime of the sensor nodes. So, we propose to improve the protocol to enhance the wireless sensor nodes performance through the energy optimisation.
Key-Words / Index Term
WSN, LEACH
References
[1]. Sunkara Vinodh Kumar and Ajit Pal “Assisted-Leach (A-Leach) Energy Efficient Routing Protocol for Wireless Sensor Networks”, International journal of computer and communication engineering, Vol. 2, No. 4, pp. 420-424, 2013.
[2]. Shio Kumar Singh, M P Singh and D K Singh, "A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in Wireless Sensor Networks”, International Journal of Advanced Networking and Application Volume 02, Issue 02, Pages: 570-580, 2010.
[3]. BS Mathapati, SR Patil, VD Mytri, “Energy efficient reliable data aggregation technique for wireless sensor networks”, International Conference on Emerging Technology Trends in Electronics, Communication and Networking, 1-6, 2012
[4]. Hanady M. Abdulsalam and Layla K. Kamel, "W-LEACH Weighted Low Energy Adaptive Clustering Hierarchy Aggregation Algorithm for Data Streams in Wireless Sensor Network", IEEE International Conference on Data Mining Works, pp. 1 -8, 2010.
[5]. Bilal Abu Bakr and Leszek Lilien, “Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare Selection”, Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 277-282, 2011.
[6]. Hiren Thakkar, Sushruta Mishra and Alok Chakrabarty, “A Power Efficient Cluster-based Data Aggregation Protocol for WSN”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 4, April 2012.
[7]. Parul Khurana and Inderdeep Aulakh, “Wireless Sensor Network Routing Protocols: A Survey”, International journal of computer applications, vol. 75, No. 15, 2013.
[8]. Md. Faruqul Islam, Yogesh Kumar , Saurabh Maheshwari, Neeti Jain ,” Recent trends in Energy Efficient Clustering in WSN”, International Journal of Computer Applications, vol. 95, No.20, pp. 44-48,2014.
[9]. Pankaj Chauhan and Tarun Kumar," Power Optimization in Wireless Sensor Network: A Perspective", International Journal of Engineering and Technical Research (IJETR), vol. 3, issue 5, May 2015
[10]. Amit Bhattacharjee, Balagopal Bhallamudi and Zahid Maqbool, “Energy- Efficient Hierarchical Cluster Based Routing Algorithm in WSN: A Survey “, International Journal of Engineering Research & Technology (IJERT), Vol.2, Issue 5, may, 2013, pp.302-311
[11]. Sandeep Verma, Richa Mehta, Divya Sharma, Kanika Sharma, “Wireless Sensor Network and Hierarchical Routing Protocols: A Review”, International Journal of Computer Trends and Technology(IJCTT), Vol.4, Issue 8, August 2013,pp.2411 -2416
[12]. M Aslam, N Javaid, A Rahim, U Nazir, A Bibi, Z khan, ”survey of extended LEACH clustering routing protocols for wireless sensor networks”,2012 IEEE 14TH International Conference on High Performance Computing and Communication and 2012 IEEE 9TH International Conference on embedded software and systems,1232-1238,2012
[13]. Sudhanshu Tyagi, Neeraj Kumar,”A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks”, Journal of Network and Computer Applications 36(2), 623-645, 2013
[14]. Meena Malik, Yudhvir Singh, Anshu Arora,”Analysis of LEACH protocol in wireless sensor networks”, International Journal of Advanced Research in Computer Science and Software Engineering 3(2), 2013
[15]. M Shankar, M Sridar, M Rajani, “Performance evaluation of Leach Protocol in wireless network”, International Journal of Scientific and Engineering Research 3(1), 1, 2012
Citation
Deepika, Anil Sangwan, "Review on LEACH (Low Energy Adaptive Clustering Hierarchy) Protocol for Enhancing Energy Efficiency of WSN," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.41-43, 2019.
A Framework of Computational Methods for Recommender Engine
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.44-48, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.4448
Abstract
Personalization of services can be proclaimed as the fulcrum of today’s industries. Recommender engines are vastly employed to lend personal relevance to the consumers of services. Recommenders are a class of systems built upon the semantics derived off of consumer profiling, quantitative representations of preferences and so on. They draw a lot of their underlying mechanisms from the field of computational methods, that is, the use of mathematical models and methods to effect relevant suggestions. This paper proposes a framework for the creation of a recommender engine that is capable of predicting a rating matrix as well as providing suggestions. The key advantage introduced by the framework is that in addition to collaborative methods it also employs the techniques of topic modelling and fuzzy logic to find latent topics of interest that are not evidently visible as well as latent groupings of particulars modelled. This framework is a three-component engine consisting of an exploratory module augmented with statistical analysis, visualizations and algorithmic analysis, a latent factor analysis module built on the principles of topic modelling, fuzzy c means algorithm and a prediction-suggestion module built on the concept of singular value decomposition. Thus, this engine can be used in emerging problem domains of relevance to today’s society.
Key-Words / Index Term
Natural Language Processing, Topics Modelling, Recommender Systems, Latent Factor Analysis, Framework
References
[1] Pera, M.S. and Ng, Y.K. Recommending books to be exchanged online in the absence of wish lists. Journal of the Association for Information Science and Technology, 69(4), pp.541-552., 2018.
[2] Zhang, Z., Lin, H., Liu, K., Wu, D., Zhang, G. and Lu, J. A hybrid fuzzy-based personalized recommender system for telecom products/services. Information Sciences, 235, pp.117-129, 2013.
[3] Yan, B. and Chen, G. June. AppJoy: personalized mobile application discovery. In Proceedings of the 9th international conference on Mobile systems, applications, and services (pp. 113-126). ACM. 2011.
[4] Meehan, Kevin, Tom Lunney, Kevin Curran, and Aiden McCaughey. "Context-aware intelligent recommendation system for tourism." In 2013 IEEE international conference on pervasive computing and communications workshops (PERCOM workshops), pp. 328-331. IEEE, 2013..
[5] Aishwarya Rajamani, Alpha Vijayan, "A Survey on Realms and Applications of Social Media Data Analysis", International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.844-848, 2018.
[6] Amit Palve, Rohini D.Sonawane, Amol D. Potgantwar, "Sentiment Analysis of Twitter Streaming Data for Recommendation using, Apache Spark", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.99-103, 2017
[7] A.B. Patil, S.C. Pawar, "Keyword based Marathi Interface to the Database using Natural Language Processing", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.50-55, 2018
[8] Nasiri, M., Minaei, B. and Sharifi, Z. Adjusting data sparsity problem using linear algebra and machine learning algorithm. Applied Soft Computing, 61, pp.1153-1159, 2017.
[9] Huang, Z., Chung, W., Ong, T.H. and Chen, H, July. A graph-based recommender system for digital library. In Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries (pp. 65-73). ACM, 2002.
[10] Puntheeranurak, Sutheera, and Supitchaya Sanprasert. "Hybrid naive bayes classifier weighting and singular value decomposition technique for recommender system." 2011 IEEE 2nd International Conference on Software Engineering and Service Science. IEEE, 2011.
[11] Park, Han-Saem, Ji-Oh Yoo, and Sung-Bae Cho. "A context-aware music recommendation system using fuzzy bayesian networks with utility theory." International conference on fuzzy systems and knowledge discovery. Springer, Berlin, Heidelberg, 2006.
[12] Drineas, Petros, and Michael W. Mahoney. "RandNLA: randomized numerical linear algebra." Communications of the ACM 59.6 (2016): 80-90.
[13] Liang, Qianqiao, Xiaolin Zheng, Menghan Wang, Haodong Chen, and Pin Lu. "Optimize Recommendation System with Topic Modeling and Clustering." In 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE), pp. 15-22. IEEE, 2017.
Citation
Aishwarya Rajamani, Alpha Vijayan, "A Framework of Computational Methods for Recommender Engine," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.44-48, 2019.
Review Paper on Handling Big Data
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.49-51, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.4951
Abstract
Big data refers to voluminous amount of structured or unstructured data . This voluminous data is a blend of substantial and informational collections that has extensive volume of information, online networking examination, information administration proficiency, continuous information and so forth. Enormous information examination is the methodology of dissecting immense measures of information. Enormous Data has a few properties ie. volume, assortment, speed and veracity. For preparing such huge informational indexes there is an approach which is called Hadoop which handles the huge information.
Key-Words / Index Term
Big Data
References
[1] A Research Paper on Big Data and methodology by Shilpa and Manjit Kaur
[2] Review Paper on Use of Big Data in E-Governance of India by Shubham Kalbande, Sumant Deshpande
[3] Review paper on big data and Hadoop by Harshawardhan
S. Bhosale, Prof. Devendra P. Gadekar
[4] Big Data in Big Companies by Thomas H. Davenport Jill Dyché
[5] Big Data And Hadoop: A Review Paper by Rahul Beakta CSE Deptt., Baddi University of Emerging Sciences & Technology, Baddi, India
Citation
Harshit Gupta, "Review Paper on Handling Big Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.49-51, 2019.