Sentence Level Sentiment Analysis from News Articles and Blogs using Machine Learning Techniques
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1-6, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.16
Abstract
Now a day’s sentiment analysis performs a very vital role in text mining. In essence web mining is a very broad area in a data mining field for extracts the sentiment of the text. To identify the sentiment of the textual data is a very challenging task. The present work focuses on sentence level negation identification and calculation from the News articles and Blogs. Two step approaches generally used for analysis namely preprocessing and post processing. Preprocessing consists of the tasks like stop word removing, punctuation mark removal, number removal, white space removal etc. Post processing comprises identification of sentiments from the text and calculation of score. The work analyses the performance of support vector machine, Naïve Bayes for the dataset collected online.
Key-Words / Index Term
Sentiment Analysis, Support Vector Machine, Naïve Bayes, Machine Learning Algorithm
References
[1] M. Thelwall, K. Buckley, G. Paltoglou, "Sentiment in twitter events", Journal of the American Society for Information Science and Technology 62(2), (2011) 406 418.
[2] Jagdale, R. S., Shirsat, V. S., Deshmukh, S. N, “Sentiment Analysis of Events from Twitter Using Open Source Tool.” International Journal of Computer Science and Mobile Computing (IJCSMC), Vol.5, Issue.4, April- 2016, pg. 475-485.
[3] L. Tan, J. Na, Y. Theng, K. Chang, "Sentence-level sentiment polarity classification using a linguistic approach, Digital Libraries: For Cultural Heritage", Knowledge Dissemination, and Future Creation (2011) 77 87.
[4] Wiebe, J., “Tracking point of view in narrative.‖ Computational Linguistics”, 20, 1994.
[5] Banfield, A., “Unspeakable sentences: Narration and Representation in the Language of Fiction”, Routledge and Kegan Paul, 1982.
[6] Quirk, R., “A Comprehensive Grammar of the English Language”, Longman Publishing House, 1985.
[7] Bing Liu, “Sentiment Analysis and Subjectivity”, Handbook of Natural Language Processing, Second Edition, 2010.
[8] Esuli, A. and F. Sebastiani, “SentiWordNet: A Publicly Available Resource for Opinion Mining”, In Proceedings of the 6th International Conference on Language Resources and Evaluation, LREC 2006, Italy, 2006.
[9] Shoukry, Amira, Collaboration Technologies and Systems (CTS), 2012 International Con-ference technologies and systems ,21-25 May 2012, Page(s):546 – 550
[10] Alexandra Balahur, Ralf Steinberger, ‘Rethinking Sentiment Analysis in the News”, Theory to Practice and back‖, European Commission, Joint Research Centre, University of Alicante, Department of Software and Computing Systems.WOMSA, pp.1-12, 2009.
[11] Ye, Q., Zhang, Z., Law, R.: Sentiment classification of online reviews to travel destinations by supervised machine learning approaches. Expert Syst. Appl. 36, 6527–6535 (2009)
[12] D. Liparas, Y. Hacohen-Kerner, A. Moumtzidou, S. Vrochidis and I. Kompatsiaris, “News articles classification using Random Forests and weighted multimodal features”, 3rd Open Interdisciplinary MUMIA Conference and 7th Information Retrieval Facility Conference (IRFC2014), Copenhagen, Denmark, November 10-12, 2014.
[13] D. Greene and P. Cunningham. "Practical Solutions to the Problem of Diagonal Dominance in Kernel Document Clustering", Proc. ICML 2006.
[14] Ye, Q., Zhang, Z., Law, R.: Sentiment classification of online reviews to travel destinations by supervised machine learning approaches. Expert Syst. Appl. 36, 6527–6535 (2009)
[15] Bhumika, M., Jadav, V., Vaghela, B.: Sentiment analysis using support vector machine based on feature selection and semantic analysis. Int. J. Comput. Appl. 146(13) (2016).
[16] BholaneSavita,D., Deipali, G.: Sentiment analysis on twitter data using support vector machine. Int. J. Comput. Sci. Trends Technol. 4(3) (2016)
[17] Rinker, T. W. (2018). sentimentr: Calculate Text Polarity Sentiment version 2.6.1. http://github.com/trinker/sentimentr
[18] Jockers ML (2015). Syuzhet: Extract Sentiment and Plot Arcs from Text. https://github.com/mjockers/syuzhet.
Citation
Vishal Shirsat, Rajkumar Jagdale, Kanchan Shende, Sachin N. Deshmukh, Sunil Kawale, "Sentence Level Sentiment Analysis from News Articles and Blogs using Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1-6, 2019.
A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.7-13, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.713
Abstract
In recent times, there exist several approaches for differential-style attacks like truncated differential attack, high-level differential attack, boomerang attack etc. This paper involves the study of boomerang-style attack on S-boxes and a new SAC analysis approach to test the strength of S-boxes against such attacks. The proposed analysis is tested on each input elements of 8 S-boxes of DES and 8 input elements on the S-box of AES. The vulnerability factor n⁄2 has been measured by calculating all 1`s of every column from the generated SAC matrix. Finally a comparison of standard deviation, coefficient of variance and other factors show the way towards the conclusion.
Key-Words / Index Term
Block Cipher, S-box, Differential Cryptanalysis, Boomerang attack, Truncated Differential
References
[1] Wagner D. (1999) The Boomerang Attack. In: Knudsen L. (eds) Fast Software Encryption. FSE 1999. Lecture Notes in Computer Science, vol 1636. Springer, Berlin, Heidelberg
[2] Cid C., Huang T., Peyrin T., Sasaki Y., Song L. (2018) Boomerang Connectivity Table: A New Cryptanalysis Tool. In: Nielsen J., Rijmen V. (eds) Advances in Cryptology – EUROCRYPT 2018. EUROCRYPT 2018. Lecture Notes in Computer Science, vol 10821. Springer, Cham
[3] Choy J., Yap H. (2009) Impossible Boomerang Attack for Block Cipher Structures. In: Takagi T., Mambo M. (eds) Advances in Information and Computer Security. IWSEC 2009. Lecture Notes in Computer Science, vol 5824. Springer, Berlin, Heidelberg
[4] Kim, Jongsung & Moon, Dukjae & Lee, Wonil & Hong, Seokhie & Lee, Sangjin & Jung, Seokwon. (2002). Amplified boomerang attack against reduced-round SHACAL. SIACRYPT 2002, LNCS 2501, pp. 243–253, 2002.c©Springer-Verlag Berlin Heidelberg 2002.doi: 10.1007/3-540-36178-2_15.
[5] Koo, Bonwook & Yeom, Yongjin & Song, Junghwan. (2010). Related-Key Boomerang Attack on Block Cipher SQUARE. IACR Cryptology ePrint Archive. 2010. 73. 10.1587/transfun.E94.A.3.
[6] H. Handschuh, D. Naccache, SHACAL, NESSIE project, October 2001.
[7] Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1-18.Springer, Heidelberg (2009)
[8] Avijit Datta, Dipanjan Bhowmik, Sharad Sinha, "A New Approach towards Confusion Analysis of S-boxes using Truncated Differential Cryptanalysis", International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.249-256, 2019.
[9] Biham, E., & Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1), 3–72. doi:10.1007/bf00630563
[10] Lai X., Massey J.L., Murphy S. (1991) Markov Ciphers and Differential Cryptanalysis. In: Davies D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg
[11] Cheung, Jennifer Miuling. "The design of S-boxes." PhD diss., Sciences, 2010.
[12] C. Adams and S. Tavares. The structured design of cryptographically good s-boxes.Journal of Cryptology, 3(1):27–41, 1990.
[13] J. Cobas and J. Brugos. Complexity-theoretical approaches to the design and analysis of cryptographical boolean functions. InComputer Aided Systems Theory–EUROCAST2005, Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany, 2005.
[14] A.Datta, D.Bhowmick, S. Sinha, “A Novel Technique for Analysing Confusion in S-boxes.” International Journal of Innovative Research in Computer and Communication Engineering, 2016. 4(6): p. 11608-11615.
[15] A.Datta, D.Bhowmick, S. Sinha, “Implementation of SAC Test for Analyzing Confusion in an S-box Using a Novel Technique.” International Journal of Scientific Research in Computer Science Applications and Management Studies, Vol. 7, Issue 3, No. 182
[16] D.Bhowmick, A.Datta, S. Sinha. “A Bit-Level Block Cipher Diffusion Analysis Test.” Springer International Publishing Switzerland 2015: S.C.Satpathy et. al. (eds), Proc of 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 2014-Col. I, Advances in Intelligent Systems and Computing 327. pp: 667-674.
[17] P. Sharma, D. Mishra, V.K. Sarthi, P. Bhatpahri, R. Shrivastava, "Visual Encryption Using Bit Shift Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.57-61, 2017
Citation
Avijit Datta, Dipanjan Bhowmik, Sharad Sinha, "A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.7-13, 2019.
Content Based Video Retrieval for Indian Traffic Signage’s
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.14-20, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.1420
Abstract
The new arrivals and trends in the technology have attracted many different areas to make the world modernized and smart. The autonomous driverless car is unique example in the category. The aim of this work is to presents a computer vision-based system for real-time traffic sign identification, recognition and retrieval system for Indian traffic signage’s. The system consists of two phases. Firstly the signage’s are detected and recognized for a given video using state-of-art detector method known as aggregated channel features. Second, retrieval of videos is performed using two distance measures known as Euclidean and Jaccard matrices. Compared to the previous approaches our method offers the detection recognition and retrieval of signage’s of different shape and colors in heterogeneous climatic conditions. The results demonstrate the proposed method performs good detection, recognition, and retrieval accuracy with 60 frames per second in less time complexity.
Key-Words / Index Term
Traffic Signage’s, identification, recognition, retrieval, Traffic Sign recognition system
References
[1] Andreas Mogelmose, Dongran Liu, Mohan Manubhai Trivedi, “Detection of US Traffic signs”, IEEE Transactions on intelligent transport system, 2015.
[2] Ayoub Elrahyani, Mohamed EL ANSARI, Ilyas EL JAAFARI, “Traffic Sign Detection and Recognition using Features of Combination and Random Forests”, International journal of Advanced Computer Science and Applications, Vol 7, No.1, 2016.
[3] Yuan Yuan, Zhitong Xiong, and Qi Wang, “An Incremental Framework for Video-Based Traffic Sign Detection, Tracking, and Recognition”, IEEE Transactions on Intelligent Transportation Systems, Vol. 18, No. 7, July 2017.
[4] P. Dollar. R.Appel, S.Belongie, and P.Perona, “Fast Feature Pyramids for Object Detection”, Pattern Analysis and Matching Intelligence, IEEE Transactions on, vol.36, no. 8,pp. 1532-1545, Aug 2014.
[5] S. Sathiya, m. Balasubramanian, and, S. Palanivel, “International Journal of Engineering and Technology”, vol.6, no.2, Apr-May 2014.
[6] Aryuanto Soetedjo and I Komang Somawirata, “An Efficient Algorithm for Implementing Traffic Sign Detection on low cost Embedded System”, International Journal of Innovative Computing, Information and Control, vol. 14, no.1, February 2018.
[7] Huda Noor Dean, and Jabir K V.T, “Real Time Detection and Recognition of Indian Traffic Signs using Matlab”, International Journal of Scientific and Engineering research, vol.4, Issue 5, May 2013.
[8] K. Arun Kumar, S.Gowtham, M. Manoj Kumar, and A. Lakshmi, “Automatic Recognition of Sign-Boards using myROI”, International Journal of Pure and Applied Mathematics, vol.119, no.12, 2018.
[9] Markus Mathias, Radu Timofte, Rodrigo Benenson, and Luc Van Gool, “Traffic sign Recognition- How far we are from the solution”, International joint Conference on Neural Networks, ISBN:978-1-4673-6129-3, January 2014.
[10] Hee Seok Lee and Kang Kim, “Simultaneous Traffic Sign Detection and Boundary Estimation using Convolution Neural Network ”, IEEE Transactions on Intelligent Transportation Systems, vol.19, no.5, pp. 1652-1663, Feb 2018.
[11] Shivanand S Gornale, Ashvini K Babaleshwar, Pravin L Yannawar, " Detection and Classification of Signage’s from Random Mobile Videos Using Local Binary Patterns", International Journal of Image, Graphics and Signal Processing(IJIGSP), vol.10, No.2, pp. 52-59, 2018.
[12] Dipika H Patel, “Content-Based Video Retrieval using Enhanced Feature Extraction”, International Journal of Computer Applications 0975-8887, vol.119, pp.4-8, 2015.
[13] Madhav Gitte, Harshal Bawaskar, Sourabh Sethi, Ajinkya Shinde, “Content BasedVideo Retrieval System”, IJRET: International Journal of Researchmin Engineering and Tecnology, vol.3, pp.430-435, 2014.
[14] Milan R.Shetake. Sanjay. B. Waikar, “Content Based Image and Video Retrieval”, Proceedings of 33th IRF International Conference, pp.34-37, 2015.
[15] Navdeep Kaur, Mandeep Singh,“Content-Based Video Retrieval with Frequency domain Analysis using 2- D Correlation Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering ,vol.4, pp.388-393,2014.
[16] J. Fan, A. K. Elmagarmid, X. Zhu, W. G. Aref, and L. Wu, “Classview: hierarchical video shot classification, indexing, and accessing”, Multimedia, IEEE Transactions , pp. 70–86, 2004.
[17] Xingxiao Wu, Dong Xu, LixinDuan, JieboLuo, "Action Recognition Using MultilevelFeatures and Latent Structural SVM", IEEE Transactions on Circuits and Systems for Video Technology, vol.23, pp.1422-1431, 2013.
[18] Hamdy K. Elminir, Mohamed Abu ElSoud, Sahar F. Sabbeh, Aya Gamal “Multi feature content based video retrieval using high level semantic concept “IJCSI International Journal of Computer Science Issues, vol.9, pp.254-260, 2012.
[19] B. V. Patel, A. V. Deorankar, B. B. Meshram, "Content Based Video Retrieval using Entropy, Edge Detection, Black and White Color Features", Proc. 2nd International Conference on Computer Engineering and Technology (ICCET), vol.6, pp.V6-272 - V6-276, 2010
[20] S. B. Mahalakshmi, Capt. Dr.Santhosh Baboo, “Efficient Video Feature Extraction and Retrieval on Multimodal Search”, International Journal of Advanced Research in Computer and Communication Engineering, vol.4, pp.355-357, 2015.
[21] D.Asha, Madhavee Lata, V.S.K. Reddy, “Content based video retrieval system using Multiple Features”, International Journal of pure and Applied Mathematics, vol. 118, pp.287-294, 2018.
[22] Avinash N Bhute and B B Meshram, “System Analysis and Design for Multimedia Retrieval Systems”, The International Journal of Multimedia and Its Applications (IJMA), vol.5, pp.25-44, 2013.
[23] Tam T. Le, Son T. Tran, SeichiiMita, and ThucD.Nguyen, “Real Time Trafffic sign Detection using Color and Shape-Based Features”, ACIIDS 2010, partII, LNAI 5991, pp.268-278, 2010, springer-verlag berlin Heidelbery 2010.
[24] Shanxin Zhang, Cheng Wang, ZhuangY, Chenglu Wen, Jonathan Li, and Chenhui Yang, “Traffic Sign Timely Visual RecognizabilityEvalution Based on 3D measurable point clouds”, Journal of LATEX class Files, vol.14, No.8,August 2015.
[25] Chu-Hong Hoi, Wei Wang, and Michael R. Lyu, 2003, “A Novel Scheme for Video Similarity Detection”, Department of Computer Science and Engineering, the Chinese University of Hong Kong ©Springer-Verlag Berlin Heidelberg. Pp.373–382, 2003.
[26] Yasira Beevi C P et.al.2009, “An efficient Video Segmentation Algorithm with real time Adaptive Threshold Technique ”, International Journal of Signal Processing, Image Processing and Pattern Recognition vol.2, pp.13-27.
[27] Wu, Chuan, Yuwen He, Li Zhao, and Yuzhuo Zhong. "Motion feature extraction scheme for content-based video retrieval." In Electronic Imaging 2002, pp. 296-305. International Society for Optics and Photonics, 2001.
[28] T.N.Shanmugam, and Priya Rajendran “An Enhanced Content-Based Video Retrieval System Based on QueryClip”, International Journal of Research and Reviews in Applied Sciences, vol.1, pp.236-253, 2009.
[29] Hong Jiang Zhang ,Jianhua Wu, Di Zhong and Stephen W. Smoliar “An Integrated System For Content-Based Video Retrieval And Browsing”,Institute of System Science, National university of Singapore Pattern recoganition. vol.30, pp.643-658, 1997.
[30] Jaimon Jacob, Sudeep Ilayidon, V.P.Devassia, “Content Based Video Retrieval System Using Video Indexing”, Internation Journal of Computer Sciences and Engineering, vol.7, Issue.4, pp.478-482, 2019.
Citation
Shivanand S Gornale, Ashvini K Babaleshwar, Pravin L Yannawar, "Content Based Video Retrieval for Indian Traffic Signage’s," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.14-20, 2019.
Usability testing of Moodle application in the Context of M-learning in HE in India with Special Reference to MBA and MCA courses
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.21-27, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.2127
Abstract
This paper presents a usability testing of a Moodle mobile application which is Learning Management System (LMS) in the context of HE students and teachers perspectives. This paper begins with discussing how mobile learning could help in teaching learning process. Digitization has changed the complete teaching-learning process in higher education in India. During last decade or so usage of mobile devices has been increased tremendously as mobile technology allows the learners to perform various tasks as far as education is concerned. In M-learning technology, usability of mobile applications plays a vital role in the context teaching-learning process. ISO defines usability as “The extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use”. Aim of this research study is to test Moodle application in the context of HE (Higher Education) in India with special reference to MBA and MCA courses. With this research, we tried to acquire important finding and information for administrator, teachers and students on how Moodle is effective in teaching-learning process. In this paper researchers have used convenience sampling method to collect qualitative and quantitative data from students and teacher of MBA and MCA courses. This research study conducted using One hundred forty three (143) students and seventy two (72) teachers from the professional courses like MCA and MBA. The paper concludes with a discussion of how various usability dimensions makes impact on M-Learning application in the context of Higher Education is concerned.
Key-Words / Index Term
Moodle, Usability Testing , M-Learning, Higher Education, Learning Management System
References
[1] ISO 9241-11, Ergonomic requirements for office work with visual display terminals (VDTs) —Part 11: Guidance on Usability, 1998.
[2] Nielsen, J. & Landauer, T.K. A mathematical model of the finding of usability problems. In Procedding of the SIGCHI Conference on Human Factors in Computing Systems, ACM Press, 206-213, 1993.
[3] Al-Ajlan, A.; Zedan, H., "Why Moodle Future Trends of Distributed Computing Systems”, . FTDCS `08. 12th IEEE International Workshop on , vol., no., pp.58,64, 21-23 Oct 2008.
[4] Alnuaim, A., Designing and evaluating a contextual mobile learning application to support situated learning. PhD, University of the West of England. Available from: http://eprints.uwe.ac.uk/25274
[5] Ashraf Mousa Saleh, Usability Evaluation Frameworks Of Mobile Application: A Mini-Systematic Literature Review, Proceeding Of The 3rd Global Summit On Education Gse 2015 (E- Isbn 978-967-0792-01-1), Kuala Lumpur, Malaysia. Organized By World Conferences.Net, Pp 231-239, 2015.
[6] Ashraf Saleh, Extension Of Pacmad Model For Usability Evaluation Metrics Using Goal Question Metrics (GQM) Approach, Journal Of Theoretical And Applied Information Technology. Vol.79. No.1, Pp 90-100, 2015.
[7] A. Hussain and E. Ferneley, Presented at the Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, 2008.
[8] Azham Hussain, et al., A Usability Evaluation of Lazada Mobile Application, The 2nd International Conference on Applied Science and Technology (ICAST’17), 2017.
[9] Azham Hussain, A user experience evaluation of Amazon Kindle mobile application, The 2nd International Conference on Applied Science and Technology (ICAST’17) AIP Conf. Proc. 1891, 020057-1–020057-5, 2017. https://doi.org/10.1063/1.5005390.
[10] Azham Hussain, et al. (2017), Assessing the usability of Shazam mobile app, The 2nd International Conference on Applied Science and Technology 2017 (ICAST’17) AIP Conf. Proc. 1891, 020057-1–020057-5; https://doi.org/10.1063/1.5005390.
[11] Beatty, B.; Ulasewicz, C., “Faculty Perspectives on Moving from Blackboard to the Moodle Learning Management System”, TechTrends, Volume 50, Issue 4, pp.36,45,1 August 2006.
[12] Hussain, Azham & Mkpojiogu, Emmanuel & Jamaludin, Hafiza & T L Moh, Somia. A Usability Evaluation of Lazada Mobile Application. AIP Conference Proceedings. 1891, 2017. https://doi.org/10.1063/1.5005392.
[13] Fatima Zahra, Azham Hussain, and Haslina Mohd, Usability Evaluation of Mobile Applications; Where Do We Stand?, The 2nd International Conference on Applied Science and Technology (ICAST’17) AIP Conf. Proc. 1891, 020056-1–020056-6, 2017; https://doi.org/10.1063/1.5005389.
[14] Indrani Kalita and Binod Deka , Mobile learning: Usability of mobile device app to support learning in ODL with special reference to KKHSOU, International Journal of Applied Research Vol. 4, issue 1, 63-68, 2018.
[15] Itmazi, Jamil & Gea, Miguel & Paderewski-Rodríguez, Patricia & Vela, Francisco Luis, A comparison and evaluation of open source learning managment systems.. 80-86, 2005.
[16] Kumar B., Sujit & Wotto, Marguerite & Bélanger, Paul. E-learning, M-learning and D-learning: Conceptual definition and comparative analysis. E-Learning and Digital Media. 15. pp.191-216, 2018.
[17] Karima Moumane, Usability evaluation of mobile applications using ISO 9241 and ISO 25062 standards, Springer Open 2016. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4851667/
[18] Kakasevski, G.; Mihajlov, M.; Arsenovski, S.; Chungurski, S., "Evaluating usability in learning management system Moodle," Information Technology Interfaces, 2008. ITI 2008. 30th International Conference on, vol., no., pp.613,618, 23-26 June 2008.
[19] Kukulska-Hulme, A., Mobile Usability and User Experience. In A. Kukulska-Hulme & J. Traxler, J. (Eds.) Mobile Learning: A handbook for educators and trainers (pp. 45-56). London: Routledge, 2005.
[20] Kukulska-Hulme, A., Mobile Usability in Educational Contexts: What have we learnt? Mobile Learning: A handbook for educators and trainers (pp. 45-56). London: Routledge, 2007.
[21] Kumar, S.; Gankotiya, A.K.; Dutta, K., "A comparative study of Moodle with other e-learning systems," Electronics Computer Technology (ICECT), 2011 3rd International Conference on , vol.5, no., pp.414,418, 8-10 April 2011.
[22] Machado, M.; Tao, E. (2007), "Blackboard vs. Moodle: Comparing user experience of learning management systems," Frontiers In Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports, FIE `07. 37th Annual, vol., no., pp.S4J-7, S4J-12, 2007.
[23] Martin, Ludivine, "Usability in e-Learning Platforms: heuristics comparison between Moodle, Sakai and dotLRN." Sixth International Conference on Community based environments. Guatemala, 2008.
[24] Munya Saleh Ba Matraf and Azham Hussain, Usability Evaluation Model for Mobile E-Book Applications, The 2nd International Conference on Applied Science and Technology (ICAST’17) AIP Conf. Proc. 1891, 020056-1–020056-6, 2017. https://doi.org/10.1063/1.5005389.
[25] Nidhi N Patel and Pankaj Dalal, Usability Evaluation of Mobile Applications, International Journal of Engineering Research & Technology (IJERT) , ISSN 2278-0181 Vol. 2 Issue 11, 2013.
[26] Park Y. A., Pedagogical Framework for M-learning: Categorizing Educational Applications of Mobile Technologies into Four Types, International Review of Research in Open and Distance Learning; 12(2):78-102, 2011.
[27] P Mathur, “Usability Testing Methods for Mobile Learning Applications”, International Journal of Computer Science and Mobile Applications, Vol.5 Issue. 10, pg. 1-9, 2017.
[28] Ryan Alturki, Valerie Gay, Usability Testing of Fitness Mobile Application: Case Study Aded Surat App, International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 5, 105-125, 2017.
[29] Raptis, D., User Experience of Mobile Devices: Physical Form, Usability and Coolness. Department of Computer Science, Aalborg University. Ph.D Thesis, 2015.
[30] Siah Sim Tee, User Testing for Moodle Application, University Kebangsaan Malaysia, Selangor, Malaysia, International Journal of Software Engineering and Its Applications Vol.7, No.5, pp. 243-252, 2013. http://dx.doi.org/10.14257/ijseia.2013.7.5.22
[31] S. Ssemugabi, “Usability evaluation of a web-based e-learning application: a study of two evaluation method”,2011. http://uir.unisa.ac.za/bitstream/handle/10500/1515/dissertation.pdf?sequence=1
[32] G. K. Tereza, A. C. Carlos and K. Claudio, “Usability Evaluation of the Moodle System from the Teachers’ Perspective”, IADIS International Conference e-Learning, pp. 371-378, 2008.
[33] J. F. Hair, W. C. Black, B. J. Babin, and R. E. Anderson, “Multivariate data analysis: A global perspective,” Up. Saddle River, 2010.
[34] Deepak Rathore, A. Julwania, D.K. Dixit, "AMS: Attendance Management System using Android Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.20-25, 2016.
[35] Pradeep Chouksey, "Introduction of MANET", International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.2, pp.15-19, 2016.
Citation
Kamlesh A. Meshram, Manimala Puri, "Usability testing of Moodle application in the Context of M-learning in HE in India with Special Reference to MBA and MCA courses," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.21-27, 2019.
Diagnosis of Dyslexia Students Using Classification Mining Techniques
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.28-33, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.2833
Abstract
Now a day, all over the world 70-80% of people with poor reading skills are likely dyslexic. One in five a student, or 15-20% of the population, has a language based learning disability. Dyslexia is the most common of the language based learning disabilities. Nearly the same percentage of males and females has dyslexia. Children suffering from a learning disability might face difficulties with reading, writing or mathematics but they excel in other areas of interests. It is in the interest of the society and especially the parents to identify the problem early in the development of the child and steer him/her towards a preferred field. They might lose their sense of self-worth and blame themselves for their situation. The model being proposed is a Web-based tool incorporating machine learning techniques (Decision trees) for predicting whether children (8-10 years) are at a risk of having Specific Learning Disability by showing the areas of learning disability on the basis of the clinical information and research.
Key-Words / Index Term
Dyslexia, Weka, SVM, Naïve Bayes, J48 Decision Tree, Neural Network
References
[1] Disability World, 2003,”UNICEF and Disabled Children and Youths”, Disability World, No. 19, (online at www.disabil ity-world.org/ 06 − 08 03/index.htm).
[2] Athanasios S. Drigas and Rodi-Eleni Ioannidou,”A Review on Arti-ficial Intelligence in Special Education”, Ag.Paraskevi, 15310, Athens, Greece, 2013.
[3] Julie M. David, Kannan Balakrishnan: Machine Learning Approach for Prediction of Learning Disabilities in School Age Children, Int. J. of Computer Applications, ISSN-0975-8887, 9(10), Nov. 2010, pp 7-14. http://www.ijcaonline.org/archives/volume9/ number 1/1432-1931.
[4] Manghirmalani et al, “Learning Disability Diagnosis and Classifi-cation-a Soft Computing Approach”, IEEE World Congress on In-formation and Communication Technologies (WICT); https://doi.org/10.1109/WICT.2011.6141292.
[5] Kohli, M., Prasad, T.V, “Identifying Dyslexic Students by Using Artificial Neural Networks”, Proceedings of the World Congress on Engineering, London, U.K, vol. 1(2010).
[6] Anuradha, J et al, “Diagnosis of ADHD using SVM algorithm”, Proceedings of the Third Annual ACM Bangalore Conference (2010) https://doi.org/10.1145/1754288.1754317.
[7] Hernadez, J et al, “Learning Difficulties Diagnosis for Children’s Basic Education using Expert Systems”, WSEAS Transactions on Information Science and Applications (2009).
[8] Jain et al, “Computational Diagnosis of Learning Disability”, Inter-national Journal of Recent Trends in Engineering (2009).
[9] Arthi. K and Tamilarasi, A, ”Prediction of autistic disorder using neuro fuzzy system by applying ANN technique”, International Journal of Developmental Neuroscience 26, 699–704 (2008).
[10] Lineu C. Fonseca et al, “Quantitative EEG in children with learning disabilities”, Analysis of band power, 64(2-B):376-381, 2006.
[11] Martin Macas et al, “Bioinspired methods for analysis and classifi-cation of reading eye movements of dyslexic children”, Department of Cybernetics, Czech Technical University in Prague, Czech Re-public NiSls Symposium 2005.
[12] Md. Mustafizur Rahman, S. M. Ferdous, Syed Ishtiaque, “Increas-ing Intelligibility in the Speech of the Autistic Children by an Inter-active Computer Game”, Multimedia(ISM), pp 383 – 387, 2010.
[13] Joan F. Santos, NiritBrosh, Tiago H. Falk, Lonnie Zwaigenbaum, Susan E. Bryson, Wendy Roberts, Isabel M. Smith, Peter Szatmari and Jessica A. Brian, “Very early detection of autism spectrum dis-orders based on acoustic analysis of pre-verbal vocalizations of 18-month old toddlers”, International Conference on Acoustics, Speech and Signal Processing, pp 7567 – 7571, 2013.
[14] Suresh P. and Raja, B. K, 2011, “A Review on Analysis and Quan-tification of Specific Learning Disability (SLD) with fMRI using Image Processing Techniques”, IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI) , vol. 5, pp. 24-29, Foundation of Computer Science.
[15] Prud’hommeaux et al., “Classification of atypical language inau-tism”, in Proceedings of the 2nd Workshop on Cognitive Modelin-gand Computational Linguistics, pp: 88-96, 2011.
[16] Kathleen T Quach et al., “Application of Artificial Neural Net-worksin Classification of Autism Diagnosis Based on Gene Expres-sionSignatures”.
[17] Alexander Genkin et al., “Large-scale Bayesian logistic regression fortext categorization”, Technometrics, pp: 291-304, 2007. RachnaAhuja et al, / (IJCSIT) International Journal of Computer Science and Information Technologies https://doi.org/10.1198/004017007000000245.
[18] Morris, R. D., 1988, “Classification of learning disabilities: Old problems and new approaches”, Journal of Consulting and Clinical Psychology, vol. 56, no. 6, pp.789-794. https://doi.org/10.1037/0022-006X.56.6.789.
[19] Folorunsho, Olaiya. "Comparative Study of Different Data Mining Techniques Performance in knowledge Discovery from Medical Database." International Journal 3, no. 3 (2013). International Journal of Engineering & Technology 3411
[20] Cohen, I.L., Sudhalter, V., Landong-Jimenez, D. and Keogh, M., 1993, “A Neural Network Approach to the Classification of Au-tism”, Journal of Autism and Developmental Disorders, vol. 23, no. 3, pp. 443-466. https://doi.org/10.1007/BF01046050.
[21] James Freeman and David Skapura, “Neural networks: Algorithms, applications and Programming Techniques”, Pearson Education, 2007.
Citation
H. Selvi, M.S. Saravanan, "Diagnosis of Dyslexia Students Using Classification Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.28-33, 2019.
Analyzing Adhoc Network’s performance on QoS requirements by varying Packet size and measuring the node’s remaining energy
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.34-40, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.3440
Abstract
In a adhoc network, the performance of the network will be measured by the PDR (Packet Delivery Ratio), PLR (Packet Lost Ratio), Delay and throughput. There are various parameters that affects these network performance measuring characteristics, among others one parameter packet size is important. Node survival and the draining speed of the node’s energy is another very important factor for consideration of the nodes presence in the network. In this research paper, we have presented two set of results recorded. In the first set of results PDR, PLR, Delay, and throughput are recorded by varying the packet size from 48 bytes to 80 KB in an adhoc network of 25 nodes. In the second set, the remaining energy and node’s draining energy speed is recorded at different time stamps during the communication in the adhoc network with the same setup of 25 nodes.
Key-Words / Index Term
adhoc network, QoS, packet size, PDR, PLR, Delay, throughput
References
[1] A. Hannan XIAO, Winston K.G. Seah, Anthony LO, and Kee Chaing CHUA, “A flexible quality of Service Model for Mobile Ad-Hoc Networks”, VTC 2000, ISBN : 07803-5718-3, pp. 445-449.
[2] P. Mohapatra, J. Li and C. Gui, “QoS in Mobile Ad Hoc Networks”, QoS in Next Generation, Wireless Multimedia Communication Systems, IEEE Wireless Communications , June 2003, pp 44-52, ISSN : 1536-1284/03/$17.00 © 2003 IEEE
[3] G. Santhi, and A. Nachiappan, “A SURVEY OF QOS ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS”, International journal of computer science & information Technology (IJCSIT) Vol.2, No.4, August 2010
[4] Orchu Aruna, A.K. Prathipati, “QoS Signing and Routing in MANET”, International Journal of Engineering Science Invention, ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org ||Volume 6 Issue 9|| September 2017 || PP. 14-19
[5] Dmitri D. Perkins, and Herman D. Hughes, “A survey on quality-of-service support for mobile ad hoc networks”, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING 2002; 2:503–513 (DOI: 10.1002/wcm.73), pp 503-513
[6] Ash Mohammad Abbas and Øivind Kure, “Quality of Service in mobile ad hoc networks: a survey”, International Journal of Ad Hoc and Ubiquitous Computing • June 2010, pp 1-24
[7] Mrs. S.Rajanandini, K.Reshma, “QUALITY OF SERVICE IN MANET”, IJCSMC, Vol. 5, Issue. 3, March 2016, pg. 186 – 191, ISSN 2320–088X
[8] N. Verma, S. Soni, “A review of different routing protocols in MANET”, Volume 8, No. 3, March – April 2017, International Journal of Advanced Research in Computer Science, pp. 338-342
[9] Jayanti, Vikram Nandal, “Routing Protocols in MANET: Comparative Study”, IJCSMC, Vol. 3, Issue. 7, July 2014, pg. 119 – 125
[10] J. Sathiamoorthy, B. Ramakrishnan, Usha M., “Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs”, Journal of Information Security and Applications, vol. 36 (2017), pp. 43–58
[11] M. K. Garg, N. Singh, P. Verma, “Fuzzy rule-based approach for design and analysis of a Trust-based Secure Routing Protocol for MANETs”, International Conference on Computational Intelligence and Data Science (ICCIDS 2018), published in Elsevier, Procedia Computer Science, vol 132 (2018), pp. 653–658
[12] X. Yang, Q. Chen, C. Chen, J. Zhao, “Improved ZRP Routing Protocol Based on Clustering”, 8th International Congress of Information and Communication Technology (ICICT-2018), Elsevier, Procedia Computer Science, vol. 131 (2018), pp. 992–1000
[13] P. Joshi, “Security issues in routing protocols in MANETs at network layer”, WCIT-2010, Elsevier, Procedia Computer Science, vol. 3 (2011), pp. 954–960
[14] A. Ladas, Deepak G. C. , N. Pavlatos, C. Politis, “A selective multipath routing protocol for ubiquitous networks”, Elsevier, Ad Hoc Networks, vol. 77 (2018), pp. 95–107
[15] G. Singal, V. Laxmi, M.S. Gaur, S. Todi, V. Rao, M. Tripathi, R. Kushwaha, “Multi-constraints link stable multicast routing protocol in MANETs”, Elsevier, Ad Hoc Networks, vol. 63 (2017), pp. 115–128
[16] S. S. Basurra, M. De Vos, J. Padget, Y. Ji, T. Lewis, S. Armour, “Energy efficient zone based routing protocol for MANETs”, Elsevier, Ad Hoc Networks, vol. 25 (2015), pp. 16–37
[17] A. Tahir, S.A. Abid, Nadir Shah, “Logical clusters in a DHT-Paradigm for scalable routing in MANETs”, Elsevier, Computer Networks, vol. 128 (2017), pp. 142–153
[18] M. Malathi, S. Jayashri, “Robust against route failure using power proficient reliable routing in MANET”, Elsevier, Alexandria Engineering Journal (2018), vol. 57, pp. 11–21
[19] H. Khayou, B. Sarakbi, “A validation model for non-lexical routing protocols”, Journal of Network and Computer Applications, vol. 98 (2017), pp. 58–64
[20] H. Abdul wahid, B. Dai, B. Huang, Z. Chen, “Scheduled-links multicast routing protocol in MANETs”, Elsevier, Journal of Network and Computer Applications, vol. 63 (2016), pp. 56–67
[21] H. Safa, M. Karam, B. Moussa, “PHAODV: Power aware heterogeneous routing protocol for MANETs”, Elsevier, Journal of Network and Computer Applications, vol. 46 (2014), pp. 60–71
[22] Jun Li, Y. Zhou, L. Lamont, F. Richard Yu, Camille-Alain Rabbath, “Swarm mobility and its impact on performance of routing protocols in MANETs”, Elsevier, Computer Communications, vol. 35 (2012), pp. 709–719
[23] D. Kang, Hyung-Sin Kim, C. Joo, S. Bahk, “ORGMA: Reliable opportunistic routing with gradient forwarding for MANETs”, Elsevier, Computer Networks, vol. 131 (2018), pp. 52–64
[24] H. Al Amri, M. Abolhasan, T. Wysocki, “Scalability of MANET routing protocols for heterogeneous and homogenous networks”, Elsevier, Computers and Electrical Engineering, vol. 36 (2010), pp. 752–765
[25] M. Zhang, M. Yang, Q. Wu, R. Zheng, J. Zhu, “Smart perception and autonomic optimization: A novel bio-inspired hybrid routing protocol for MANETs”, Elsevier, Future Generation Computer Systems, vol. 81 (2018), pp. 505–513
[26] P. LOBO, S. ACHARYA, R. O. D`SOUZA, “QUALITY OF SERVICE FOR MANET BASED SMART CITIES”, International Journal of Advanced Computational Engineering and Networking, Volume-5, Issue-2, Feb.-2017
[27] Seema, Dr. Y. Singh, Mr. V. Siwach, “Quality of Service in MANET”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 1, Issue 3, Oct 2012, ISSN: 2319 – 1058
[28] Surjeet, A. Parkash, and R. Tripathi, “QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs”, Communications and Network, 2013, vol. 5,pp. 1-8
[29] J. Kumar, R. K. Varun, R. Yadav, “Security Issues and Quality of Services Challenges in Mobile Ad-hoc Networks”, International Journal of Engineering Research and Development, Volume 2, Issue 9 (August 2012), PP. 33-36
[30] Soon Y. Oh, G. Marfia and M. Gerla, “MANET QoS support without reservations”, SECURITY AND COMMUNICATION NETWORKS, 2010
[31] E. S. A. Ahmed, and R. A. Saeed, “Review of Gateway Selection Schemes for MANET to Internet Connectivity”, International Journal of Computer Science and Telecommunications, Vol 5, Issue 11, November 2014, pp 17-23
Citation
Amit Garg, Ashish Kumar, Amit Chaturvedi, "Analyzing Adhoc Network’s performance on QoS requirements by varying Packet size and measuring the node’s remaining energy," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.34-40, 2019.
Generating Code-Smell Prediction Rules Using Decision Tree Algorithm and Software Metrics
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.41-48, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.4148
Abstract
Code smells identified by Fowler [1] is as symptoms of possible code or design problems. Code smells have adverse affecting the quality of the software system by making software challenging to understand and consequently increasing the efforts to maintenance and evolution. The detection of code smells is the way to improve software quality by recovering code smells and perform the refactoring processes. In this paper, we propose a code- smells detection approach based on a decision tree algorithm and software metrics. The datasets we used to train the models are built by reforming the datasets used by Arcelli Fontana et al. work [2]. We use two feature selection methods based on a genetic algorithm to select the most essential features in each dataset. Moreover, we use the grid search algorithm to tuning the decision tree hyperparameters. We extract a set of detection conditions using decision tree models, that are considered as prediction rules to detect each code smell in our binary-class datasets.
Key-Words / Index Term
code smells, code smells detection, Feature selection, decision tree, prediction rules
References
[1] M. Fowler, K. Beck, J. Brant, W. Opdyke, and D. Roberts, Refactoring: improving the design of existing code. Addison-Wesley Professional, 1999.
[2] F. Arcelli Fontana, M. V. Mäntylä, M. Zanoni, and A. Marino, “Comparing and experimenting machine learning techniques for code smell detection,” Empir. Softw. Eng., vol. 21, no. 3, pp. 1143–1191, 2016.
[3] I. C. S. S. E. S. Committee and I.-S. S. Board, “IEEE recommended practice for software requirements specifications,” 1998.
[4] L. Chung and J. C. S. do Prado Leite, “On non-functional requirements in software engineering,” in Conceptual modeling: Foundations and applications, Springer, 2009, pp. 363–379.
[5] P. Rai, A. Pradhan, M. Pradhan, A. Chettri, and B. Limboo, “Comparative Study on Various Techniques Used in Examination System : A Survey,” vol. 7, no. 2, pp. 24–28, 2019.
[6] E. J. Chikofsky and J. H. Cross, “Reverse engineering and design recovery: A taxonomy,” IEEE Softw., vol. 7, no. 1, pp. 13–17, 1990.
[7] A. Yamashita and L. Moonen, “Exploring the impact of inter-smell relations on software maintainability: An empirical study,” Proc. - Int. Conf. Softw. Eng., pp. 682–691, 2013.
[8] A. Yamashita and S. Counsell, “Code smells as system-level indicators of maintainability: An empirical study,” J. Syst. Softw., vol. 86, no. 10, pp. 2639–2653, 2013.
[9] A. Yamashita and L. Moonen, “Do code smells reflect important maintainability aspects?,” IEEE Int. Conf. Softw. Maintenance, ICSM, pp. 306–315, 2012.
[10] D. I. K. Sjoberg, A. Yamashita, B. C. D. Anda, A. Mockus, and T. Dyba, “Quantifying the effect of code smells on maintenance effort,” IEEE Trans. Softw. Eng., vol. 39, no. 8, pp. 1144–1156, 2013.
[11] D. SAHIN, M. KESSENTINI, S. BECHIKH, and K. DEB, “Code-Smells Detection as a Bi-Level Problem,” ACM Trans. Softw. Eng. Methodol., vol. 24, no. 1, 2014.
[12] E. Van Emden and L. Moonen, “Java quality assurance by detecting code smells,” Proc. - Work. Conf. Reverse Eng. WCRE, vol. 2002-Janua, no. November, pp. 97–106, 2002.
[13] M. Influential, P. Award, and E. Van Emden, “Assuring Software Quality by Code Smell Detection.”
[14] S. M. Olbrich, D. S. Cruzes, and D. I. K. Sjoøberg, “Are all code smells harmful? A study of God Classes and Brain Classes in the evolution of three open source systems,” IEEE Int. Conf. Softw. Maintenance, ICSM, 2010.
[15] M. Tufano et al., “When and why your code starts to smell bad,” Int. Conf. Softw. Eng. ICSE, vol. 1, pp. 403–414, 2015.
[16] O. Ciupke, “Automatic detection of design problems in object-oriented reengineering,” in Technology of Object-Oriented Languages and Systems, 1999. TOOLS 30 Proceedings, 1999, pp. 18–32.
[17] G. Travassos, F. Shull, M. Fredericks, and V. R. Basili, “Detecting defects in object-oriented designs: using reading techniques to increase software quality,” in ACM Sigplan Notices, 1999, vol. 34, no. 10, pp. 47–56.
[18] E. M. Dashofy, A. van der Hoek, and R. N. Taylor, “A comprehensive approach for the development of modular software architecture description languages,” ACM Trans. Softw. Eng. Methodol., vol. 14, no. 2, pp. 199–245, 2005.
[19] S. Vidal, H. Vazquez, J. A. Diaz-Pace, C. Marcos, A. Garcia, and W. Oizumi, “JSpIRIT: A flexible tool for the analysis of code smells,” Proc. - Int. Conf. Chil. Comput. Sci. Soc. SCCC, vol. 2016-Febru, 2016.
[20] R. Marinescu, “Measurement and quality in object-oriented design,” IEEE Int. Conf. Softw. Maintenance, ICSM, vol. 2005, pp. 701–704, 2005.
[21] N. Moha and Y. Guéhéneuc, “DECOR: A method for the specification and detection of code and design smells,” IEEE Trans. Softw. Eng., vol. 36, no. 1, pp. 20–36, 2010.
[22] F. A. Fontana, M. Zanoni, A. Marino, and M. V. Mäntylä, “Code smell detection: Towards a machine learning-based approach,” IEEE Int. Conf. Softw. Maintenance, ICSM, pp. 396–399, 2013.
[23] U. Azadi, F. A. Fontana, and M. Zanoni, “Machine learning based code smell detection through WekaNose,” Proc. 40th Int. Conf. Softw. Eng. Companion Proceeedings - ICSE ’18, no. June, pp. 288–289, 2018.
[24] F. Arcelli Fontana and M. Zanoni, “Code smell severity classification using machine learning techniques,” Knowledge-Based Syst., vol. 128, pp. 43–58, 2017.
[25] R. Marinescu, “Detection strategies: Metrics-based rules for detecting design flaws,” in Software Maintenance, 2004. Proceedings. 20th IEEE International Conference on, 2004, pp. 350–359.
[26] R. Ab’ilio, J. Padilha, E. Figueiredo, and H. Costa, “Detecting Code Smells in Software Product Lines--An Exploratory Study,” in Information Technology-New Generations (ITNG), 2015 12th International Conference on, 2015, pp. 433–438.
[27] G. Suryanarayana, G. Samarthyam, and T. Sharma, Refactoring for software design smells: managing technical debt. Morgan Kaufmann, 2014.
[28] B. Baudry, Y. Le Traon, G. Sunyé, and J.-M. Jézéquel, “Measuring and improving design patterns testability,” in Proceedings of Metrics Symposium 2003, 2003.
[29] G. Langelier, H. Sahraoui, and P. Poulin, “Visualization-based analysis of quality for large-scale software systems,” in Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering, 2005, pp. 214–223.
[30] E. Murphy-Hill and A. P. Black, “An interactive ambient visualization for code smells,” in Proceedings of the 5th international symposium on Software visualization, 2010, pp. 5–14.
[31] G. de F. Carneiro et al., “Identifying code smells with multiple concern views,” in Software Engineering (SBES), 2010 Brazilian Symposium on, 2010, pp. 128–137.
[32] J. Kreimer, “Adaptive detection of design flaws,” Electron. Notes Theor. Comput. Sci., vol. 141, no. 4, pp. 117–136, 2005.
[33] L. Amorim, E. Costa, N. Antunes, B. Fonseca, and M. Ribeiro, “Experience report: Evaluating the effectiveness of decision trees for detecting code smells,” in Software Reliability Engineering (ISSRE), 2015 IEEE 26th International Symposium on, 2015, pp. 261–269.
[34] F. Khomh, S. Vaucher, Y.-G. Guéhéneuc, and H. Sahraoui, “A bayesian approach for the detection of code and design smells,” in Quality Software, 2009. QSIC’09. 9th International Conference on, 2009, pp. 305–314.
[35] F. Khomh, S. Vaucher, Y.-G. Guéhéneuc, and H. Sahraoui, “BDTEX: A GQM-based Bayesian approach for the detection of antipatterns,” J. Syst. Softw., vol. 84, no. 4, pp. 559–572, 2011.
[36] E. Tempero et al., “The Qualitas Corpus: A curated collection of Java code for empirical studies,” in Software Engineering Conference (APSEC), 2010 17th Asia Pacific, 2010, pp. 336–345.
[37] A. J. Riel, Object-oriented design heuristics. Addison-Wesley Longman Publishing Co., Inc., 1996.
[38] M. A. Hall, “Correlation-based feature subset selection for machine learning,” Thesis Submitt. Partial fulfillment Requir. degree Dr. Philos. Univ. Waikato, 1998.
[39] D. W. Aha, D. Kibler, and M. K. Albert, “Instance-based learning algorithms,” Mach. Learn., vol. 6, no. 1, pp. 37–66, 1991.
[40] L. Rokach and O. Z. Maimon, Data mining with decision trees: theory and applications, vol. 69. World scientific, 2008.
[41] V. K. Gujare and P. Malviya, “Big Data Clustering Using Data Mining Technique,” vol. 5, no. 2, pp. 9–13, 2017.
[42] C. J. L. Chih Wei Hsu, Chih Chung Chang, “A Practical Guide to Support Vector Classification,” BJU Int., vol. 101, no. 1, pp. 1396–400, 2008.
Citation
Mohammad Y. Mhawish, Manjari Gupta, "Generating Code-Smell Prediction Rules Using Decision Tree Algorithm and Software Metrics," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.41-48, 2019.
Automatic Payment System in Tollgate Using Number Plate Recognition
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.49-51, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.4951
Abstract
Human beings are capable of identifying and recognizing patterns in an image but if these tasks are done in repetitive manner they are subjected to errors. The same happens in vehicle license plate recognition, especially because the number of vehicles is very large. That is why automated systems are required for this job. The objective is to extract and recognize vehicle registration numbers from vehicle images, process the image data finally utilize for access record and then use it for further necessity. Monitoring the vehicle traffic and the management of parking areas are most labor-intensive job. In this paper we propose a new technique for automatic payment method in tollgate
Key-Words / Index Term
Numberplate, Vehicle, Detection
References
[1] Muhammad Tahir Qadri and Muhammad Asif, “Automatic Number Plate Recognition System for Vehicle Identification Using Optical Character Recognition”, 2009 International Conference on Education Technology and Computer, pp. 335–338. 2009.
[2] Neng-Sheng Pai, Sheng-Fu Huang, Ying-Piao Kuo1, Chao-Lin Kuo, “License Plate Recognition Based on Extension Theory,” 2010 International Symposium on Computer, Communication, Control and Automation, pp. 164–167, IEEE 2010.
[3] Thanongsak Sirithinaphong and Kosin Chamnongthai, “The Recognition Of Vehicle License Plate For Automatic Parking System”, Fifth International Symposium on Signal Processing and its Applications, ISSPA `99, Brisbane, Australia, 22-25 August, 1999.
[4] S. Thanongsak, and C. Kosin, 1998, “Extracting of Vehicle License Plate Using Motor Vehicle Regulation and Character Pattern Recognition,” Proceedings of the 1998 IEEE APCCAS ‘98 Asia-Pacific Conference on Circuit and Systems, pp. 559-562, November 24-27, 1998.
[5] Sheng-Wen Chen, Chung-Huang Yang and Chien-Tsung Liu, “Design and Implementation of Live SD Acquisition Tool in Android Smart Phone”, 2011 Fifth International Conference on Genetic and Evolutionary Computing, pp. 157–162, IEEE Computer Society, 2011.
[6] “What is Android?”, android developer, http://developer.android.com/guide/basics/what-is-android.html, retrieved 2012-02-11.
[7] Ondrej Martinsky, “Algorithmic and Mathematical Principles of Automatic Number Plate Recognition Systems”, Brno University of Technology, pp. 20–23, 2007
Citation
G. Sudhakar Babu, K. Chandra sekhar Reddy, "Automatic Payment System in Tollgate Using Number Plate Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.49-51, 2019.
Distinction between Text and Non-Text Using Ensemble Classifier
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.52-56, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.5256
Abstract
In the recent era of technology, recognition of text and non-text images is a major challenge in the field of computer vision so as to efficiently extract the text from that image. There are many algorithms available for the extraction of the text from the image, however, the algorithm used for the extraction of the text from the images would have a higher efficiency if it is known beforehand that the image is a text image or a non-text image. However, in old manuscripts, the extraction of the text is very difficult. In that case, the algorithm for the distinction between the text and non-text becomes very easy for detection of any such text in the manuscript and extract the text from it. In our approach, we have built a system that takes any sort of image as an input. After the input of the image, it is then processed and converted into a binary image. Distance transform method is then applied and the measure of the distance between the various points in the image are then calculated. From the calculated points, duplicate points are merged into one point and are sorted in ascending order. The total area of the binary image is then calculated and also the image corresponding to each of the distance transform points are then calculated. The total area of the binary image is then divided by each of the area value of the corresponding distance transform points are the value extracted is known as the feature values. After getting all the feature values the whole value is then divided into small intervals and is then processed through the classifier. For our experimental purpose, we have chosen the ensemble classifier for our study and experimental analysis. The correctness of the classifier is then calculated and evaluated for the distinction between text and non-text images. This method is a very simple and accurate method for the distinction between the text and the non-text images and also helps in the extraction of the text from the image. Experiment have been done with simple text and non-text image dataset and the efficiency of the proposed method is then demonstrated.
Key-Words / Index Term
distinction between text and non-text, bar chart, classifier, ensemble classifier
References
[1]. Najwa Maria Chidiac, Pascal Damein and Charles Yacoub, “A robust algorithm for text extraction from images”, 39th International conference on Telecommunication and Signal Processing, 2016.
[2]. Radhika Patel and Suman K Mitra, “Extracting text from degraded documents”, 5th National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, 2015.
[3]. R. Malik and SeongAh chin, “Extraction of text in images”, Proceedings of International Conference on Information Intelligence and Systems, 1999.
[4]. Sezer Karaoglu, Ran Tao, Theo Gevers and Arnold W. M. Smeulders, “Words matter: Scene Text for Image Clssification and Retrieval”, IEEE transactions on multimedia, vol. 19, no. 5, may 2017.
[5]. Chengquan Zhang, Cong Yao, Baoguang Shi and Xiang Bai, “Automatic discrimination of text and non-text natural images”, 13th International Conference on Document Analysis and Recognition, 2015.
[6]. Vishal Chowrasia, Sanjay Shilakari and Rajeev Pandey, “Implementation of Optical Character Recognition Using Machine Learning”,International Journal of Computer Science and Engineering, Vol.-6, Issue-6, jun 2018.
Citation
Pradipta Karmakar, Chowdhury Md. Mizan, Sayak Dasgupta, Saptaparna Das, "Distinction between Text and Non-Text Using Ensemble Classifier," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.52-56, 2019.
Enhancement in Software Reliability Testing and Analysis
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.57-64, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.5764
Abstract
Reliability of software is an important factor of today’s software industry. The techniques involved in the designing, testing & evaluation of a software system is called as software reliability engineering. The increasing demand for the reliability of software products need to be estimated and the estimation of such software systems in reliability engineering aspects become more critical for large scale projects. The ability of a system to perform system required operations or functions under the given condition for a specified period of time is called the reliability of the system. Software reliability is described as the probability of failure-free software operation for a given period of time in assign environment. This paper proposes an algorithmic design of reliability analysis model for predicting quantitative & qualitative analysis of software reliability by using probability theory & statistical analysis with a set of techniques and models. Reliability of software is a squeeze with the prevention of errors, faults finding or detection of faults & removal. Reliability of hardware is not predicted with probabilistic functions where the reliability of software is measured of probabilistic function with the notion of time.
Key-Words / Index Term
Software Reliability, Reliability analysis, reliability growth model performance testing
References
[1] Sudsanguan Nagamsuriyaroj, Pak Rattidham, “Performance Evaluation of Load balanced Web”, IEEE 978-6- 7695- 4338 March 2011.
[2] M. Andreolini, M. Colajanni, and M. Pietri, “A scalable architecture for real-time monitoring of large information systems,” in IEEE Second symposium on network cloud computing & applications, 2012.
[3] Guanyin Zhao, Kaigui Wu, Tao Li, “Two-Dimensional Software Reliability Assessment with Multiple Change-points”, International Journal of Digital Content Technology and its Applications (JDCTA), Volume, DOI:10.4156/jdcta.vol6.issue13.60 No.13, July 2012.
[4] Manohar Singh, “Software Reliability Testing Tools: An Overview and Comparison”, International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue, Page No. 18886-18891, 11 Nov. 2016.
[5] Shiho Hayashida, Shinji Inoue, and Shigeru Yamada, “Software reliability assessment using exponential-type change-point hazard rate model”, International Journal of Reliability, Quality and Safety Engineering Vol. 21, No. 4, 1450019 (12 pages), World Scientific Publishing Company, DOI: 0.1142/S0218539314500193 (2014).
[6] G. Gayathry, and R. Thirumalai Selvi, “Classification of Software Reliability Models to Improve the Reliability of Software”, Indian Journal of Science and Technology, Volume 29, DOI: 10.17485 / v8i29/85287, November 2015.
[7] Durga Patel, Pallavi, “Software Reliability: Models”, International Journal of Computer Applications (0975 – 8887) Volume 152 – No.9, October 2016.
[8] Razeef Mohd, Mohsin Nazir, “Software Reliability Growth Models: Overview and Applications”, Journal of Emerging Trends in Computing and Information Sciences, VOL. 3, NO. 9, ISSN 2079-8407, SEP 2012.
[9] Mao Chengyong, LI Qiuying, “A testing-coverage software reliability growth model considering the randomness of the field environment”, IEEE International Conference on Software Quality, Reliability and Security Companion, 978-1-5090-3713-1/2016.
[10] Guoxin Su, David S. Rosenblum, “Reliability of Run-Time Quality-of- Service Evaluation using Parametric Model Checking”, IEEE/ACM 38th IEEE International Conference on Software Engineering, ICSE ’16, Austin, TX, USA, ACM. ISBN 978-1-4503-3900 - May 14-22, 2016.
[11] M.Ravichandran and A.V. Ramani, “A Methodology for Measuring Web Software Reliability”, Int. J. on Recent Trends in Engineering and Technology, ACEEE DOI: 01.IJRTET.7.1.70 Vol. 7, No. 1, July 2012
[12] Heiko Koziolek, Bastian Schlich, Steffen Becker, Michael Hauck, “Performance and reliability prediction for evolving service-orient software systems”, Empir Software Eng 18:746–790 DOI 10.1007/ s1 0664-012-9213-0-2013.
[13] Ian Andrusiak and Qusay H. Mahmoud, “A Reliability-Aware Framework for Service-Based Software Development”, IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), 978-1-5090-5538-8/2017.
[14] Suhas Honore, Santanu Kumar Rath, “A Web Service Reliability Prediction using HMM and Fuzzy Logic Models”, 6th International Conference On Advances In Computing & Communications, Cochin, India. ICACC 2016, 6-8, September 2016.
[15] D.Swamy doss, Dr. Kadhar Nawaz, “Enhanced version of growth model in web-based software reliability engineering”, Journal of Global Research in Computer Science, Volume 2, No. 12, December 2011.
[16] Divya Bindal, “Estimating Reliability of Web Application Using Markov Model”, International Journal of Advanced Research in Computer Science and Software Engineering, IJARCSSE Volume 3, Issue 6, June 2013.
[17] Md Umar Khan and Dr. T.V. Rao, “Web application’s reliability improvement through architectural patterns”, International Journal of Web & Semantic Technology (IJWesT) Vol.5, No.3, July 2014.
[18] Gurpreet Kaur, Kailash Bahl, “Software Reliability, Metrics, Reliability Improvement Using Agile Process”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 3, May 2014.
Citation
P. N. Moharil, S. Jena, V.M. Thakare, "Enhancement in Software Reliability Testing and Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.57-64, 2019.