Mutated Random grid Approach to Share Secret Image into Visually Pleasing Shares
Research Paper | Journal Paper
Vol.9 , Issue.5 , pp.1-6, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.16
Abstract
Visual cryptography is a technique to diffuse and disguise a secret image into a 2D pattern of black and white pixels, called shares. Individual or any k-1 shares have no clue about the secret image, but any k shares out of n, can decode the secret image. These meaningless shares are subject to suspect for the intruders. Stacking of shares reconstructs the secret image populated with noisy pixels. In addition to these traditional visual cryptography suffer with pixel alignment problem. To resolve these problems this paper proposes a (2, 2) mutated random grid approach to share a secret image into visually pleasing shares. The solution to the problem is based on assignment of instances of random two dimensional matrix of binary numbers and its XOR operation with respective pixels with auxiliary gray image. It requires lightweight computing device to decode the secret image. Comparative analysis of the experimental results with that of existing fundamental approaches shows that proposed approach performs better.
Key-Words / Index Term
Visually Pleasing Shares, Mutated Random grids, XOR, Visual Secret Sharing, Light weight Computation, Pixel Expansion, Contrast-loss
References
[1] M., Naor, and A. Shamir, “Visual cryptography”, In Workshop on the Theory and Applicationof of Cryptographic Techniques Springer, Berlin, Heidelberg, pp. 1-12, 1994
[2] Ateniese G, Blundo C, De Santis A, Stinson DR,”Visual cryptography for general access structures”, Information and Computation. Vol.129, Issue.2, pp.86-106, 1996 Sep 15
[3] Liu F, Wu C, Lin X., “Step construction of visual cryptography schemes”, IEEE Transactionson Information Forensics and Security, Vol.5, Issue.1, pp.27-38, 2010
[4] Ateniese G, Blundo C, De Santis A, Stinson DR, “Extended capabilities for visual cryptography”, Theoretical Computer Science, Vol.250.Issue.1, pp.143-161, 2001 Jan 6
[5] Lee KH, Chiu PL., “An extended visual cryptography algorithm for general access structures”, ieee transactions on information forensics and security, Vol.7, Issue.1, pp.219-229, 2012
[6] Zhou Z, Arce GR, Di Crescenzo G., “Halftone visual cryptography. IEEE transactions onimage processing”, Vol.15, Issue.8, pp.2441-2453, 2006 Aug
[7] Wang Z, Arce GR, Di Crescenzo G., “Halftone visual cryptography via error diffusion”, IEEEtransactions on information forensics and security, Vol.4, Issue.3, pp.383-396, 2009 Sep
[8] Hofmeister T, Krause M, Simon HU., “Contrast-optimal k out of n secret sharing schemes invisual cryptography”,. Theoretical Computer Science, Vol.240, Issue.2, pp.471-485, 2000 Jun 17
[9] Krause M, Simon HU., “Determining the optimal contrast for secret sharing schemes invisual cryptography”, Combinatorics, Probability and Computing, Vol.12, Issue.3, pp.285-299, 2003 May
[10] Ito R, Kuwakado H, Tanaka H., “Image size invariant visual cryptography”, IEICE transactions on fundamentals of electronics, communications and computer sciences, Vol.82, Issue.10, pp.2172-2177, 1999 Oct 25
[11] Cimato S, De Prisco R, De Santis A., “Probabilistic visual cryptography schemes”, TheComputer Journal, Vol.49, Issue..1, pp.97-107, 2005 Dec 1
[12] Yang, Ching-Nung., “New visual secret sharing schemes using probabilistic method.” Pattern Recognition Letters, Vol.25, Issue.4, pp.481-494, 2004
[13] Kafri, O., and Keren, E. “Encryption of pictures and shapes by random grids”, Optics letters, Vol.12, Issue.6, pp.377-379, 1987
[14] Shyu, S. J., “Image encryption by random grids”, Pattern Recognition, Vol.40, Issue.3, pp.1014-1031, 2007
[15] Shyu, S. J., “Image encryption by multiple random grids”, Pattern Recognition, Vol.42, Issue.7, pp.1582-1596, 2009
[16] Wu X, Sun W., “Generalized random grid and its applications in visual cryptography”, IEEE Transactions on Information Forensics and Security, Vol.8, Issue.9, pp.1541-1553, 2013 Sep
[17] Wu, X., and Sun, W., “Random grid-based visual secret sharing for general access structures with cheat-preventing ability”, Journal of Systems and Software, Vol.85, Issue.5, pp.1119-1134, 2012
[18] Chen, T. H., and Tsao, K. H., “Visual secret sharing by random grids revisited. Pattern Recognition, Vol.42, Issue.9, pp.2203-2217, 2009
[19] Wu, X., and Sun, W., “Random grid-based visual secret sharing with abilities of OR and XOR decryptions”, Journal of Visual Communication and Image Representation, Vol.24, Issue.1, pp.48-62, 2013
[20] Tuyls, P., Hollmann, H. D., Van Lint, J. H., and Tolhuizen, L. M. G. M., “XOR-based visual cryptography schemes. Designs, Codes and Cryptography”, Vol.37, Issue.1, pp.169-186, 2005
[21] Wu X, Sun W., “Improving the visual quality of random grid-based visual secret sharing”, Signal Processing., Vol.93, Issue.5, pp.977-995, 2013 May 31
[22] Wu, X., Ou, D., Dai, L., and Sun, W., “Xor-based meaningful visual secret sharing by generalized random grids”, In Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 181-190, 2013
[23] Pang L, Miao D, Lian C., “Userfriendly randomgridbased visual secret sharing for generalaccess structures” Security and Communication Networks, Vol.9, Issue.10, pp.966-976, 2016 Jul 10
[24] S.B. Bhagate, P.J. Kulkarni, "Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes", International Journal of Computer Sciences and Engineering, Vol.06, Special Issue.01, pp.43-47, 2018
[25] Komal S. Patil, Suhas B. Bhagate, "Progressive Visual Secret Sharing Scheme for QR Code Message", International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.882-887, 2019.
Citation
Jasvant Kumar, Suresh Prasad Kannojia, "Mutated Random grid Approach to Share Secret Image into Visually Pleasing Shares," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.1-6, 2021.
Identification of Brain Tumor Using Projection Pursuit Bivariate Multilayer Perceptred Classification
Research Paper | Journal Paper
Vol.9 , Issue.5 , pp.7-14, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.714
Abstract
The method of identifying the disease with person’s symptoms and signs is medical diagnosis. Brain tumour is the stimulating disorder that has to be identified at early stage for treatment. Many classification techniques have been introduced for performing brain tumour identification. However, the brain tumour identification accuracy level was not enhanced and time consumption was not lessened. In order to address these problems, Projection Pursuit Feature Selective Bivariate Multilayer Perceptred Classification (PPFSBMPC) Method is introduced. PPFSBMPC Method comprises two processes, namely feature selection and classification for brain tumour identification. To select the relevant features from the input database, Projection Pursuit Feature Selection process is carried out in PPFSBMPC Method. After performing the feature selection, Bivariate Multilayer Perceptred Classification process is accomplished for brain tumor identification. In addition, the classification process comprised multiple layers to categorize the input data as normal data or tumour diseased data. By this way, PPFSBMPC Method increases the brain tumor identification performance with higher accuracy and lesser time consumption. Experimental evaluation of PPFSBMPC Method is carried out with Epileptic Seizure Recognition Dataset on factors such as brain tumour identification accuracy, execution time, and error rate with respect to number of patient data. The experimental result demonstrates that the PPFSBMPC Method enhances the brain tumour identification accuracy and reduces the execution time when compared to state-of-the-art-works.
Key-Words / Index Term
Medical diagnosis, brain tumour, classification, feature selection, classification process, identification, seizure
References
[1] Varsha Harpale and Vinayak Bairagi, “An adaptive method for feature selection and extraction for classification of epileptic EEG signal in significant states”, Journal of King Saud University - Computer and Information Sciences, Elsevier, Pages 1-9 2018.
[2] Musa Peker, Baha Sen and Dursun Delen, “A Novel Method for Automated Diagnosis of Epilepsy Using Complex-Valued Classifiers”, IEEE Journal of Biomedical and Health Informatics, Volume 20, Issue 1, Pages 108-118,2016.
[3] Danda Shashank Reddy, Chinta Naga Harshitha and Carmel Mary Belinda, “Brain tumor prediction using naïve Bayes’ classifier and decision tree algorithms”, International Journal of Engineering &Technology, Volume 7, Pages 137-141,2018.
[4] ?ostas ?. Tsiouris , Vasileios C. Pezoulas , Michalis Zervakis, Spiros Konitsiotis, Dimitrios D. Koutsouris, Dimitrios I. Fotiadis, “A Long Short-Term Memory deep learning network for the prediction of epileptic seizures using EEG signals”, Computers in Biology and Medicine, Elsevier ,Volume 99, Pages 24-37, 2018.
[5] S Raghu, Natarajan Sriraam, Alangar Sathyaranjan Hegde, Pieter L Kubben, “A novel approach for classification of epileptic seizures using matrix determinant”, Expert Systems with Applications, Elsevier, Volume 127, Pages 323-341, 2019.
[6] Yuanfa Wang, Zunchao Li, Lichen Feng, Chuang Zheng, and Wenhao Zhang, “Automatic Detection of Epilepsy and Seizure using Multiclass Sparse Extreme Learning Machine Classification”, Computational and Mathematical Methods in Medicine, Hindawi Publishing Corporation, Volume 2017,Pages1-10, June 2017.
[7] Md. Kamrul Hasan, Md. Asif Ahamed, Mohiuddin Ahmad, and M. A. Rashid, “Prediction of Epileptic Seizure by Analysing Time Series EEG Signal Using k-NN Classifier”, Applied Bionics and Biomechanics, Hindawi, Volume 2017, Pages 1-12, August 2017.
[8] Md. Faizul Bari and Shaikh Anowarul Fattah, “Epileptic seizure detection in EEG signals using normalized IMFs in CEEMDAN domain and quadratic discriminant classifier”, Biomedical Signal Processing and Control, Elsevier, Volume 58, Pages 1-8, April 2020.
[9] Sandeep Kumar Satapathy, Satchidananda Dehuri, Alok Kumar Jagadev, “ABC optimized RBF network for classification of EEG signal for epileptic seizure identification”, Egyptian Informatics Journal, Elsevier, Volume 18, Issue 1, Pages 55-66,2017.
[10] Shamsul Huda, John Yearwood, Herbert F. Jelinek, Mohammad Mehedi Hassan, “A Hybrid Feature Selection with Ensemble Classification for Imbalanced Healthcare Data: A Case Study for Brain Tumor Diagnosis”, IEEE Access, Volume 4, Pages 9145- 9154, 2016.
[11] Lingraj Dora, Sanjay Agrawal, Rutuparna Pand and Ajith Abraham, “Optimal breast cancer classification using Gauss-Newton representation based algorithm”, Expert Systems with Applications, Elsevier, Volume 85, Pages 134-145, November 2017.
[12] Chih-Jen Tseng, Chi-Jie Lu, Chi-Chang Chang and Gin-Den Chen and Chalong Cheewakriangkrai, “Integration of data mining classification techniques and ensemble learning to identify risk factors and diagnose ovarian cancer recurrence”, Artificial Intelligence in Medicine, Elsevier, Volume 78, Pages 47-54, May 2017.
[13] Chu-Yu Chin, Sun-Yuan Hsieh and Vincent S. Tseng, “eDRAM: Effective early disease risk assessment with matrix factorization on a large-scale medical database: A case study on rheumatoid arthritis”, PLoS ONE, Volume 13, Issue 11, Pages 1-19. 2018.
[14] Varun Jain and Sunila Godara, “Comparative Study of Data Mining Classification Methods in Brain Tumour Disease Detection”, International Journal of Computer Science & Communication, Volume 8, Issue 2, Pages 12-17, March 2017.
[15] Abeg Kumar Jaiswal and Haider Banka, “Local pattern transformation based feature extraction techniques for classification of epileptic EEG signals”, Journal of Medical and Biological Engineering, Springer, Volume 38, Issue 2, Pages 222-235, April 2018.
[16] Mengni Zhou, Cheng Tian, Rui Cao, Bin Wang, Yan Niu, Ting Hu, Hao Guo and Jie Xiang, “Epileptic Seizure Detection Based on EEG Signals and CNN”, Frontiers in Neuroinformatics, Pages 1-15, December 2018.
[17] Diah P. Wulandari, Nomala G. P. Putriz, Yoyon K. Suprapto and Santi W. Purnami, Anda I. Juniani and Wardah R. Islamiyah, “Epileptic Seizure Detection Based on Bandwidth Features of EEG Signals”, Procedia Computer Science, Elsevier, Volume 161, Pages 568-576, 2019.
[18] Zeynab Mohammadpoory, Mahda Nasrolahzadeh and Javad Haddadnia, “Epileptic seizure detection in EEGs signals based on the weighted visibility graph entropy”, Seizure, Elsevier, Volume 50, Pages 202-208 August 2017.
[19] Anurag Nishad and Ram Bilas Pachori, “Classification of epileptic electroencephalogram signals using tunable-Q wavelet transform based filter-bank”, Journal of Ambient Intelligence and Humanized Computing, Springer, Pages 1-15, 2020.
[20] G. Ravi Shankar Reddy and Rameshwar Rao “Automated identification system for seizure EEG signals using tunable-Q wavelet transform”, Engineering Science and Technology, an International Journal, Elsevier .Volume 20, Issue 5, Pages 1486-1493, October 2017.
Citation
Renjeni P.S., B. Mukunthan, "Identification of Brain Tumor Using Projection Pursuit Bivariate Multilayer Perceptred Classification," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.7-14, 2021.
Face Recognition & AI Based Smart Attendance Monitoring System
Research Paper | Journal Paper
Vol.9 , Issue.5 , pp.15-21, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.1521
Abstract
In today’s generation, authentication is one of the biggest problems in our society. So, one of the most known techniques used for authentication is human face recognition, which is also known as HFR. For example- nowadays we can unlock our phone using the face recognition feature. In the existing system, Our lecturers take attendance manually which is somewhat time-consuming and old school type. So, our Artificial Intelligence-based attendance monitoring system will be capturing the faces of every student in a class during attendance and the result will get stored in the database automatically. There will be no extra Radio frequency Identification card, people need to carry anymore and this system will be the most authentic system of taking attendance. The system stores the faces that are detected and automatically uploads the attendance to the database. Using This process our primary goal is to help lecturers as well as students to track and manage student`s attendance and absenteeism.
Key-Words / Index Term
Artificial Intelligence, Face Recognition, Attendance Monitoring System, Database, Smart Attendance Monitoring System, Facial Recognition Based Automated Attendance System, Chatbots
References
[1] Nandhini R, Duraimurugan N, S.P. Chokkalingam, “Face Recognition Based Attendance System”,International Journal of Engineering and Advanced Technology (IJEAT), Vol.8, Issue-3S, February 2019.
[2] Pradeepa .M, H P Mohan Kumar,”Face Detection and Recognition for Automatic Attendance System Using Artificial Intelligence Concept”, International Journal of Engineering Science and Computing, Volume 8 Issue No.5,2018.
[3] K.P.N. Reddy, Alekhya T, Sushma Manjula T, Rashmi K, “AI-Based Attendance Monitoring System”,International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, Issue 2S, December 2019.
[4] K. L. Bhatti , L. Mughal , F. Y. Khuhawar , S. Ahmed Memon,”Smart Attendance Management System Using Face Recognition” , EAI Endorsed Transactions on Creative Technologies, Volume 5 , Issue 17 ,2018.
[5] A. Przegalinska, L. Ciechanowski, A. Stroz, P. Gloor, G. Mazurek,”In bot we trust: A new methodology of chatbot performance measures”,Science Direct, Volume 62, Issue 6, Pages 785-797, November–December 2019.
[6] Kavita, M. Kaur, “A Survey paper for Face Recognition Technologies”, International Journal of Scientific and Research Publications, Vol. 6, Issue 7, July 2016.
[7] Y.S.V. Lakshmi, V.J. Kumar, International Journal of Computer Sciences and Engineering, “Smart Biometric Attendance and Monitoring System”, International Journal of Computer Sciences and Engineering, Vol. 7, Issue 6, June 2019.
[8] S.Patel, P. Kumar, S. Garg , R. Kumar, “Face Recognition based smart attendance system using IOT”,International Journal of Computer Sciences and Engineering, Vol.6, Issue 5, pp.871-877, May 2018.
[9] Md. Abdur Rahim, Md. Najmul Hossain, T. Wahid & Md. S. Azam, “ Face Recognition using Local Binary Patterns”, Global Journal of Computer Science and Technology Graphics & Vision, Volume 13, Issue 4 , Version 1.0, 2013.
[10] A.Patil, Priya K.P, P. More, A. Joshi, A.R. Kamble,“Attendance Monitoring using Face Recognition and Machine Learning”,International Journal of Future Generation Communication and Networking, Vol. 13,No. 3s,pp. 94–102, 2020.
[11] S.Babu, R.R. Rao, Shruddha, S. Lahari, V.V. Shetty, “AN EXPLORATORY STUDY ON FACE RECOGNITION BASED ATTENDANCE MONITORING SYSTEM”,International Journal of Creative Research Thoughts (IJCRT), Volume 9, Issue 2, February 2021.
[12] M.Dahiya,”A Tool of Conversation: Chatbot”,International Journal of Computer Sciences and Engineering, Volume-5, Issue-5, pp.158-161, 2017
Citation
Ankur Hati, Sagar Saha, Ankita Mandal, Preeti Saha, Sudipta Sahana, Dharampal Singh, "Face Recognition & AI Based Smart Attendance Monitoring System," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.15-21, 2021.
Enhanced Security Model for Information and Online Transaction Processing System Using Mandatory Access Control (MAC) Mechanism
Research Paper | Journal Paper
Vol.9 , Issue.5 , pp.22-30, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.2230
Abstract
With the increasing popularity of the internet as well as the evolving acceptance of cashless policy, information and online transaction processing systems are generally more susceptible to direct attack and abuse than their offline counterparts. Various security techniques have previously been developed to regularly assess the vulnerability of these systems and provide security to users. However, a number of these security techniques have proved to have bottlenecks thereby, putting sensitive financial information, services and products at risk of cyber-attacks. In this work, an enhanced security model that improves the security of the online transaction processing system is designed. This algorithm combines the features of Multilevel Security (MLS) and the Bell-Lapadulla model (BLM) to ensure the secure state of the system. Additionally, Mandatory Access Control (MAC) mechanism was used to enhance the security of the sensitive information/data shared during the online transaction processing. The methodology adopted was Object Oriented Hypermedia and Design Methodology (OOHDM) which is well suited for analyzing and designing objects that make up the new security enhanced system. Microsoft Visual Studio 2010 was used as our development environment. The programming language used was PHP and Java Script, while MySQL Server 2008 was used in the development of the database engine. Enhancing the security requirement(s) of the system was considered. The results showed that the enhanced security model using Mandatory Access Control (MAC) mechanism offered a highly secured system where users and organizations felt protected while carrying out transactions online.
Key-Words / Index Term
MAC, OOHDM, MLS, BLM
References
[1] Agbo, A. (2016). Cyber Security Made Easy: Cyber Security Threats and Solutions. Business Journal, 16(1), 18-27, 2016.
[2] Chen, D.; Cong, J.; Gurumani, S.; Hwu, W.; Rupnow, K. & Zhang, Z. (2016). Cyber-Physical Systems: Theory & Applications. Journal of the Institution of Engineering and Technology, 1 (1), 70-77, 2016.
[3] Allan, K. (2015). Cyber Security and the Internet of Things. Indian Journal of Computer Science and Engineering, 3(4), 356-365, 2015.
[4] Burden, F. & Palmer, W. (2014). Controlling Threats: Computing & Control Engineering. New York: Momentum Press, 29-35, 2014.
[5] Bottino, J. & Hughes, V. (2015). Understanding and Managing Cybercrime. Boston: Allyn & Bacon, 202-244, 2015.
[6] Geers, K. (2011). From Cambridge to Lisbon: the quest for strategic cyber defense. Journal of Homeland Security and Emergency Management, 8 (1), 1-16, 2011.
[7] Anthony, R. J. (2007). Policy-centric Integration and Dynamic Composition of Autonomic Computing Techniques. International Conference on Autonomic Computing (ICAC), IEEE, 103-116, 2007.
[8] McLean, Reddy, G. N. & Reddy, G. J. U. (2014). A Study of Cyber Security Challenges and Its Emerging Trends on Latest Technologies. International Journal of Engineering and Technology, 4 (1), 48-51, 2014.
[9] Reddy, G. N. & Reddy, G. J. U. (2014). A Study of Cyber Security Challenges and Its Emerging Trends on Latest Technologies. International Journal of Engineering and Technology, 4 (1), 48-51, 2014.
[10] Calhoun, C. D. & Nichols, J. I. (2015). Developing a Comprehensive Cyber Security Curriculum with a Collaborative Learning Environment. National Cyber Security Institute Journal, 2 (2), 1-56, 2015.
[11] Boardman, A. & Sauser, M. (2016). Computer Security Issues & Trends. California: Sogeti and IBM, 105-119, 2016.
[12] Bayuk, J. L.; Healey, J.; Rohmeyer, P.; Sachs, M. H.; Schmidt, J. & Weiss, J. (2012). Cyber Security Policy Guidebook. New Jersey: John Wiley & Sons, Inc., 1056-1088, 2012.
[13] Li, Z.; Jin, D.; Hannon, C.; Shahidehpour, M. & Wang, J. (2016). Assessing and Mitigating Cyber Security Risks. Journal of the Institution of Engineering and Technology, 1 (1), 60-69, 2016.
[14] Oltramari, A.; Cranor, L. F.; Walls, R. J. & McDaniel, P. (2016). Building an Ontology of Cyber Security. International Symposium on Information, Computer, and Communications Security, 1(1), 54-61, 2016.
[15] Liang, F.; Cole, F. & Mark, H. (2017). Security of Virtual Working on Cloud Computing Platforms. Journal of the Institution of Engineering and Technology, 2(1), 79-87, 2017.
[16] Amurthy, P. K. & Redddy, M. S. (2012). Implementation of ATM Security by Using Fingerprint Recognition and GSM. International Journal of Electronics Communication and Computer Engineering, 3 (1), 83-86, 2012.
[17] Onyesolu, M. O. & Ezeani, M. I. (2012). ATM Security Using Fingerprint Biometric Identifier: An Investigative Study. International Journal of Advanced Computer Science and Applications, 3 (5), 67-74, 2012.
[18] Allan, K. (2015). Cyber Security and the Internet of Things. Indian Journal of Computer Science and Engineering, 3(4), 356-365, 2015.
Citation
Allwell Ononiwu Akanwa, Virginia. E. Ejiofor, "Enhanced Security Model for Information and Online Transaction Processing System Using Mandatory Access Control (MAC) Mechanism," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.22-30, 2021.
Food Image Classification Using Machine Learning Techniques: A Review
Review Paper | Journal Paper
Vol.9 , Issue.5 , pp.31-36, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.3136
Abstract
The recognition of image is one of the most important fields in the image processing and computer vision. Image recognition has many branches but the food image classification is very unique. In today’s world people are very conscious about their health. Many people around the world use some dietary assessment system for planning of their diet. In dietary assessment system people make the use of food image classification to classify the food from the image and provide the total amount of calories present in the food. The classification of food images is a very difficult task as the dataset of food images is highly non-linear. In this paper, we are going to use different types of neural network models to show, which neural network provides the best accuracy result in the recognition of food images and is most efficient to use. We are using a food image dataset (food-11) which contains 16643 images in it.
Key-Words / Index Term
Deep Learning, CNN, RNN, Computer Vision, Image processing, DCNN
References
[1] Md Tohidul Islam, Sagidur Rahman, B.M. Nafiz Karim Siddique, Taskeed Jabid, “Image Recognition with Deep Learning,” 2018 International Conference on Intelligent Informatics and Biomedical, Bangkok, Thailand, pp. 106-110, 2018.
[2] “Health effects of overweight and obesity in 195 countries over 25 years,”, New England Journal of Medicine 377, no. 1, 13–27, PMID: 28604169, 2017.
[3] Y. He, C. Xu, N. Khanna, C. J. Boushey and E. J. Delp, "Analysis of food images: Features and classification," IEEE International Conference on Image Processing (ICIP), Paris, pp. 2744-2748, 2014.
[4] Z. Zong, D. T. Nguyen, P. Ogunbona and W. Li, "On the Combination of Local Texture and Global Structure for Food Classification," IEEE International Symposium on Multimedia, Taichung, pp. 204- 211, 2010.
[5] S. J. Minija and W. R. S. Emmanuel, "Food image classification using sphere shaped — Support vector machine," International Conference on Inventive Computing and Informatics (ICICI), Coimbatore , pp. 109-113, 2017.
[6] Lukas Bossard, Matthieu Guillaumin, and Luc Van Gool, “Food-101 – mining discriminative components with random forests,” Computer Vision – ECCV (Cham) (David Fleet, Tomas Pajdla, Bernt Schiele, and Tinne Tuytelaars, eds.), Springer International Publishing, pp. 446–461, 2014.
[7] Chang Liu, Yu Cao, Yan Luo, Guanling Chen, Vinod Vokkarane, and Yunsheng Ma, “Deepfood: Deep learning-based food image recognition for computer-aided dietary assessment,” CoRR abs/1606.05675, 2016.
[8] K. Yanai and Y. Kawano, "Food image recognition using deep convolutional network with pre-training and fine-tuning," IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Turin, pp. 1-6, 2015.
[9] N. Hnoohom and S. Yuenyong, "Thai fast food image classification using deep learning," International ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI-NCON), Chiang Rai, pp. 116-119, 2018.
[10] G. Özsert Yi??i?t and B. M. Özyildirim, "Comparison of convolutional neural network models for food image classification," IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA), Gdynia, pp. 349-353, 2017.
[11] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jonathon Shlens, and Zbigniew Wojna, “Rethinking the inception architecture for computer vision,” CoRR abs/1512.00567 ,2015.
[12] J. Deng, W. Dong, R. Socher, L. J. Li, Kai Li and Li Fei-Fei, "ImageNet: A large-scale hierarchical image database," IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, pp. 248- 255, 2009.
[13] D. Ciregan, U. Meier and J. Schmidhuber, "Multi-column deep neural networks for image classification," IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, pp. 3642-3649, 2012.
[14] Kiyoharu Aizawa, Makoto Ogawa, “FoodLog: Smartphone based Multimedia Food Recording Tool” International Conference on Artificial Reality and Telexistence (ICAT), Tokyo, Japan, pp.143-144, 2013.
[15] Keigo Kitamura, Toshihiko Yamasaki, Kiyoharu Aizawa, “FoodLog: Capture, Analysis and Retrieval of Personal Food Images via Web” CEA, Beijing, China, pp. 23-29, 2009.
[16] Fengqing Zhu, Marc Bosch, Insoo Woo, SungYe Kim, Carol J. Boushey, David S. Ebert & Edward J. Del, “The Use of Mobile Devices in Aiding Dietary Assessment & Evaluation”, IEEE Journal of Selected Topics In Signal Processing, pp. 756-766, 2010.
[17] Mei Chen, Kapil Dhingra, Wen Wu, Lei Yang, Rahul Sukthankar, Jie Yang, “PFID: PITTSBURGH FAST-FOOD IMAGE DATASET”, ICIP, pp. 289-292, 2009.
[18] Wen Wu, Jie Yang, “FAST FOOD RECOGNITION FROM VIDEOS OF EATING FOR CALORIE ESTIMATION”, ICME, pp.1210-1213, 2009.
[19] Parisa Pouladzadeh, Shervin Shirmohammadi, Rana Al-Maghrabi, “Measuring Calorie and Nutrition from Food Image”, IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, pp. 1-10, 2014.
[20] Natta Tammachat, Natapon Pantuwong “Calories Analysis of Food Intake Using Image Recognition,” International Conference on Information Technology and Electrical Engineering (ICITEE), Yogyakarta, Indonesia, 2014
[21] Yoshiyuki Kawano and Keiji Yanai, “Real-time Mobile Food Recognition System”, IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1-7, 2013.
[22] Alex Krizhevsky, Iiya Sutskever, Geoffrey E. Hinton, “ImageNet Classification with Deep Convolutional Neural Networks”, ImageNet LSVRC-2010, pp.1-9, 2010.
Citation
Yash Baid, Avinash Dhole, "Food Image Classification Using Machine Learning Techniques: A Review," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.31-36, 2021.
Image classification Method in detecting Lungs Cancer using CT images: A Review
Review Paper | Journal Paper
Vol.9 , Issue.5 , pp.37-42, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.3742
Abstract
A tumour is an irregular mass of cells and it can either be benign (non-cancerous) or malignant (cancerous). Disease alludes to cells that outgrow control and attack different tissues. One of the reasons for malignancy passing in person is Lung Cancer. Clinical therapy with drugs intended to target lungs disease cell to diminish the spread all through the body may likewise conceivable yet before this it is must to perceive the malignant growth at the beginning phase. Physically disease recognizable proof is tad of tedious so that with the progression of innovation, Several Computer Aided Diagnosis (CAD) frameworks are created for distinguishing cellular breakdown in the lungs in its beginning phase. In this paper inclination in detail literature survey on various techniques that have been used in feature extraction and classification with its obtain accuracy.
Key-Words / Index Term
CAD, SIFT, SVM, ANN
References
[1] E. Cengil, A. Cinar, “A Deep Learning Based Approach to Lung Cancer Identification”, International Conference on Computer Science and Engineering, 2017.
[2] T.N. Shewaye, and A. A. Mekonnen, “Benign-malignant lung nodule classification with geometric and appearance histogram features” arXiv preprint arXiv:1605.08350, 2016.
[3] A. M. Suzan, and G. Prathibha. "Classification of Benign and Malignant Tumors of Lung Using Bag of Features.",International Journal of Scientific & Engineering Research, Volume 8, Issue 3, March-2017.
[4] R.Anirudh, J. J. Thiagarajan, T. Bremer, and H. Kim, “Lung nodule detection using 3D convolutional neural networks trained on weakly labeled data.” International Society for Optics and Photonics. 2016 Vol. 9785, p. 978532).
[5] Q.Song, L. Zhao, X. Luo, and X.Dou, "Using Deep Learning for Classification of Lung Nodules on Computed Tomography Images." Journal of healthcare engineering Journal of Healthcare Engineering, Volume , Article ID 8314740, 7 pages,2017
[6] S. M. Salaken, A. Khosravi, A. Khatami, S. Nahavandi, and M.A. Hosen, “Lung cancer classification using deep learned features on low population dataset,” In Electrical and Computer Engineering (CCECE), IEEE 30th Canadian Conference on (pp. 1-5). IEEE.2017.
[7] M.F. Serj, B. Lavi, G. Hoff,. and D. P. Valls, “A Deep Convolutional Neural Network for Lung Cancer Diagnostic,” arXiv preprint arXiv:1804.08170, 2018.
[8] E. Cengil, A. Çinar, and Z. Güler. "A GPU-based convolutional neural network approach for image classification." Artificial Intelligence and Data Processing Symposium (IDAP), 2017 International. IEEE, 2017.
[9] D. Jayaraj, S. Sathiamoorthy, “Random Forest based Classification Model for Lung Cancer Prediction on Computer Tomography Images” Second International Conference on Smart Systems and Inventive Technology (ICSSIT 2019).IEEE.
[10] Nidhi S. Nadkarni, Prof. Sangam Borkar,” Detection of Lung Cancer in CT Images using Image Processing” Proceedings of the Third International Conference on Trends in Electronics and Informatics (ICOEI 2019) IEEE.
[11] Kuntal Kumar Pal, Sudeep K. S , “ Preprocessing for Image Classification by Convolutional Neural Networks” IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 2016.
[12] Michael Blot, Matthieu Cord, Nicolas Thome, “MAX-MIN CONVOLUTIONAL NEURAL NETWORKS FOR IMAGE CLASSIFICATION”IEEE 2016
[13] Travis Williams, Robert Li, “Advanced Image Classification using Wavelets and Convolutional Neural Networks” 2016 15th IEEE International Conference on Machine Learning and Applications.
[14] K.Gopi, Dr.J.Selvakumar, “Lung tumor Area Recognition and Classification using EK-Mean Clustering and SVM”, IEEE 2017.
[15] Shubhangi Khobragade, Aditya Tiwari, C.Y. Pati1 and Vi kram Narke, “Automatie Deteetion of Major Lung Diseases Using Chest Radiographs and Classifieation by Feed-forward Artifieial Neural Network”, 1st IEEE International Conference on Power Electronics. Intelligent Control and Energy Systems (ICPEICES-2016).
[16] Sayali Satish Kanitkar, N. D. Thombare, S.S. Lokhande,” Detection of Lung Cancer Using Marker-Controlled Watershed Transform”, International Conference on Pervasive Computing (ICPC)
[17]Sheenam Rattan,Sumandeep Kaur,Nishu Kansal,Jaspreet Kaur, “An Optimised Lungs Cancer Classification System for Computed Tomography Images”, 2017 Fourth International Conference on Image Information Processing (ICIIP).
[18] Anam Tariq , M. Usman Akram and M. Younus Javed,”Lung Nodule Detection in CT Images using Neuro Fuzzy Classifier”, 2013 IEEE.
[19] Nooshin Hadavi, Md.Jan Nordin, Ali Shojaeipour,” Lung Cancer Diagnosis Using CT-Scan Images Based on Cellular Learning Automata”, 2014 IEEE..
[20] S.K. Vijai Anand,” Segmentation coupled Textural Feature Classification for Lung Tumor Prediction”, 2010 IEEE.
[21] E. Cengil, A. Ç?nar , E. Özbay,” Image classification with caffe deep learning framework,” In Computer Science and Engineering (UBMK), 2017 International Conference on (pp.440-444). IEEE.
[22]P. Mohanaiah, P Sathyanarayana ,L.GuruKumar,”Image Texture Feature Extraction using GLCM Approach”, International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013.
[23] Rahul Meena, Vighnesh Menon, Vivek Solavande, “Lung Image Classification Using Convolutional Neural Network And Prediction of Different Diseases”, International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.2347-2693, 2020.
[24] Zarli Cho1 , Khin Myo Kyi , Kyi Thar Oo, “Image Classification based on Feature Extraction with AlexNet Architecture”International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp. 2347-2693, 2020.
Citation
Astha Pathak, Avinash Dhole, "Image classification Method in detecting Lungs Cancer using CT images: A Review," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.37-42, 2021.
Sepsis Detection in newborn infants - Diagnosis using fuzzy inference system- A Review
Review Paper | Journal Paper
Vol.9 , Issue.5 , pp.43-46, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.4346
Abstract
The detection of a health problem, illness, disability, or other condition that an individual may have is known as disease diagnosis. Large data sets are available; however, the tools that can accurately evaluate trends and make predictions are limited. Traditional methods of diagnosing diseases are considered to be not effective in getting accuracy and prone to error. Artificial Intelligence (AI) is being used to forecast the future. AI with predictive techniques enables to provide auto diagnosis and reduces detection errors compared to exclusive human expertise. In this paper we have taken review of sepsis detection in newborn infants using techniques of AI, like Fuzzy Logic and identified limitations of these studies. The aim of this research paper is to reveal some key insights into medical techniques. Based on a series of open problems and challenges, the paper also suggests some directions for potential research on AI-based diagnostics systems.
Key-Words / Index Term
Disease, diagnosis, Sepsis Detection, Fuzzy logic
References
[1] Fernando, L., Nascimento, C., Paloma, M., Rizol, R and Abiuzl, L (2009) “Establishing the risk of neonatal mortality using a fuzzy predictive model”, Cad Saude Publicam Rio de Janeiro, 25(9), 2009.
[2] A.M. Reis, N.R.S. Ortega and P.S.P. Silveira, “Fuzzy expert system in the prediction of neonatal resuscitation”. Braz J Med Biol Res, Volume 37(5) 755-764, May 2004.
[3] Pornchai Chanyagorn and Phattaradanai Kiratiwudhikul, “Automatic Control of Fraction of Inspired Oxygen in Neonatal Oxygen Therapy using Fuzzy Logic Control”, IEIE Transactions on Smart Processing and Computing, vol. 5, no. 2, April 2016.
[4] Tan, T., Snowden, C. Evans, Baxter, G. and Brownlee, K.G (2013) “Fuzzy Logic Expert System for Neonatal Ventilation”, Journal of Medical Engineering & Technology. 21(2), 2013.
[5] Sun, Y. Kohane, I. and Stark, A.R. “Fuzzy Logic Assisted Control of Inspired Oxygen in Ventilated Newborn Infants”, AMIA, Inc. 0195-4210, 1994.
[6] J.B. Awotunde, O.E. Matiluko, O.W Fatai (2014). “Medical Diagnosis System Using Fuzzy Logic”, Afr J. of Comp & ICTs Vol 7, No. 2. Pp 99-106, 2014.
[7] Simerjeet Kaur,Jimmy Singla,Lewia Nkenyeraye,”Medical Diagnostic Systems Using Artificial Intelligence AI)Algorithms: Principles and Perspectives”, date of publication December 3, 2020, date of current version December 31, 2020.
[8] Hadley TD, Pettit RW, Malik T, Khoei AA, Salihu HM, “Artificial Intelligence in Global Health -A Framework and Strategy for Adoption and Sustainability”.Int J MCH AIDS. 2020; 9(1):121-127. doi: 10.21106/ijma.296. Epub 2020 Feb 10.
Citation
M.S. Kalas, Nikita D. Deshpande, "Sepsis Detection in newborn infants - Diagnosis using fuzzy inference system- A Review," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.43-46, 2021.
Privacy Protection - Emerging Issues and Technological Responses
Review Paper | Journal Paper
Vol.9 , Issue.5 , pp.47-54, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.4754
Abstract
Privacy protection as a process of collection, processing and dissemination of Information is a burgeoning issue that is challenging researchers, scientists and regulators. A universal ethical concern of the organizations, individuals and society at large is how the Information is accessed and manipulated. Technology creates implications for the privacy of people in a variety of areas, and privacy Issues appear at a variety of platforms calling for the formation of standards and regulations. The regulations are still evolving and are not optimal since the technological contexts are highly dynamic. Our paper presents the privacy trends, regulation of privacy in some standard frameworks, technological contexts and emerging ethical considerations. We also highlight the ethical issues with privacy protection and motivates to develop new methodologies to handle privacy from a both legal and technological perspective. The technological context and legal framework go together for the protection of privacy. However, privacy issues are complex and will continue to evolve. People have to find the best ways of handling ethical issues in specific situations. Researches on the protection of privacy in various computing environments may be carried out given a specific technology environment that can in customizing for region-specific legislation.
Key-Words / Index Term
Privacy, Regulation, Standards, Data Security, GDPR, Technological Responses
References
[1] Neethling, J., Potgieter, J.M. & Visser, P.J. Neethling`s law of personality. Durban: Butterworths. 1996.
[2] Y. Sun, J. Zhang, Y. Xiong, and G. Zhu, “Data Security and Privacy in Cloud Computing,” International Journal of Distributed Sensor Networks, Vol. 10, Issue 7, p. 190903, 2014.
[3] R. L. Finn, D. Wright, and M. Friedewald, “Seven Types of Privacy,” European Data Protection: Coming of Age, pp. 3–32, 2012.
[4] Feng, D.-G, Zhang, M., Li, H., “Big data security and privacy protection”, JisuanjiXuebao/Chinese Journal of Computers, Vol. 37, pp. 246-258, 2014. 10.3724/SP.J.1016.2014.00246.
[5] P. J. Susn, "Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions," in IEEE Access, Vol. 7, pp. 147420-147452, 2019. DOI: 10.1109/ACCESS.2019.2946185.
[6] A. Ho, A. Maiga, and E. Aimeur, “Privacy protection issues in social networking sites,” 2009 IEEE/ACS International Conference on Computer Systems and Applications, 2009.
[7] Boeckl, K. and Lefkovitz, N.,“NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management”, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.CSWP.01162020,2020.
[8] Gruzd, A., & Hernández-García, Á., “Privacy concerns and self-disclosure in private and public uses of social media”, Cyberpsychology, Behavior, and Social Networking, Vol. 21, Issue 7, pp. 418-428, 2018. doi:10.1089/cyber.2017.0709.
[9] C. Pilton, S. Faily, and J. Henriksen-Bulmer, “Evaluating privacy - determining user privacy expectations on the web,” Computers & Security, Vol. 105, p. 102241, 2021.
[10] I. Fish, “GDPR: Global Privacy Regulations,” ITNOW, Vol. 61, Issue 2, pp. 30–30, 2019.
[11] F. Nahai, “General Data Protection Regulation (GDPR) and Data Breaches: What You Should Know,” Aesthetic Surgery Journal, Vol. 39, Issue 2, pp. 238–240, 2018.
[12] Treiblmaier, Horst & Madlberger, Maria & Knotzer, Nicolas & Pollach, Irene, “Evaluating Personalization and Customization from an Ethical Point of View: An Empirical Study”, Proceedings of the Hawaii International Conference on System Sciences, 37, 2004. 10.1109/HICSS.2004.1265434.
[13] J. S. Baik, “Data privacy against innovation or against discrimination?: The case of the California Consumer Privacy Act (CCPA),” Telematics and Informatics, Vol. 52, p. 101431, 2020.
[14] Zarsky, T., “Incompatible: The GDPR in the age of big data”, Seton Hall Law Review, Vol. 47, pp. 995-1020, 2017.
[15] R. Lenz, “Big Data: Ethics and Law,” SSRN Electronic Journal, 2019.
[16] K. P. L. Coopamootoo, “Usage Patterns of Privacy-Enhancing Technologies,” Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020.
[17] M. A. Will and R. K. L. Ko, “A guide to homomorphic encryption,” The Cloud Security Ecosystem, pp. 101–127, 2015.
[18] K. El Makkaoui, A. Ezzati and A. B. Hssane, "Challenges of using homomorphic encryption to secure cloud computing," 2015 International Conference on Cloud Technologies and Applications (CloudTech), Marrakech”, pp. 1-7, 2015, Doi: 10.1109/CloudTech.2015.7337011.
[19] D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” 2012 International Conference on Computer Science and Electronics Engineering, 2012.
[20] V. Biksham and D. Vasumathi, “Homomorphic Encryption Techniques for securing Data in Cloud Computing: A Survey,” International Journal of Computer Applications, Vol. 160, No. 6, pp. 1–5, 2017.
[21] Lindell, Yehuda, Pinkas, Benny, “Secure Multiparty Computation for Privacy-Preserving Data Mining”. IACR Cryptology ePrint Archive. 2008. 10.29012/jpc.v1i1.566.
[22] S. Balamurugan, Dr. Sanjay Pande, “Data Security and Cryptography in Cloud Environment”, International Journal of Engineering Research & Technology (IJERT), Vol. 4, Issue 6, 2015. Doi:10.17577/IJERTV4IS061013.
[23] S. L. Garfinkel, J. M. Abowd, and S. Powazek, “Issues Encountered Deploying Differential Privacy,” Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018.
[24] Feldman, M., Friedler, S. A., Moeller, J., Scheidegger, C., and Venkatasubramanian, S., “Certifying and Removing Disparate Impact”, In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ’15, pp. 259–268, Sydney, NSW, Australia, 2015. Doi: 10.1145/2783258.2783311.
[25] Gruschka N., V. Mavroeidis, K. Vishi and M. Jensen, "Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR," 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, , pp. 5027-5033, 2018. doi: 10.1109/BigData.2018.8622621
[26] Y. Shi, “Data Security and Privacy Protection in Public Cloud,” 2018 IEEE International Conference on Big Data (Big Data), 2018.
[27] Shirudkar, K. & Motwani, D. “Big-Data Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, Issue 3, pp. 1100-1109, 2015.
[28] R. Tahboub and Y. Saleh, “Data Leakage/Loss Prevention Systems (DLP),” 2014 World Congress on Computer Applications and Information Systems (WCCAIS), 2014.
[29] Islam, S. M. R., Kwak, D., Kabir, M. H., Hossain, M., and Kwak, K. “The internet of things for health care: a comprehensive survey”. IEEE Access, Vol. 3, pp. 678–708, 2015.
[30] Solangi, Zulfiqar, Solangi, Yasir, Murad, Shah, S Abd Aziz, Madihah, Hamzah, Mohd, Shah, Asadullah. “The future of data privacy and security concerns in Internet of Things”. Vol., 1-4, 2018. 10.1109/ICIRD.2018.8376320.
[31] A Mallareddy, R Sridevi, Ch G V N Prasad, "A Survey of Data Hiding methods for data security in Cloud", International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.690-694, 2019.
[32] Supriya J., Srusti K.S., Gamana G, S. Sukhaniya Ragani, Raghavendra S., Venugopal K.R., "A Survey on Ef?cient and Secure Techniques for Storing Sensitive Data on Cloud", International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1766-1777, 2019.
Citation
Ayush Gupta, Manvi Gupta, "Privacy Protection - Emerging Issues and Technological Responses," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.47-54, 2021.
Resource Utilization Using PowerVC Based Auto-Provisioning
Research Paper | Journal Paper
Vol.9 , Issue.5 , pp.55-60, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.5560
Abstract
AIX regression test suite execution will take place on every weekly build, and this requires one or more lpars with pre-defined configurations need to be dedicated per job( eg: for specific function/feature/area). and each lpar needs a NIM installation.This model has a limitation of most of the H/W remains unutilized till next execution starts (due to dedicated H/W per job) and reconfigurations to improve utilization involves admin efforts.To address this limitation, we are going with new approach where Lpar/VMs will be created with required config on demand when there is a requirement, and it will be recycled (Memory, CPU, and Disks) immediately once the work is done in automated way with the help of PowerVC
Key-Words / Index Term
VMs. Mem, Proc, storage, PowerVC, HMC, LPAR, FSP
References
[1] George Almasi, Jose G. Castanos, H. Franke, and M. A. L. Silva. 2016. Towardbuilding highly available and scalable OpenStack clouds. IBM J. of Res. and Devel.60 (2016).
[2] Marina Rodriguez Batalha, Raghavendra K Prasannakumar, and Hum-berto Tadashi Tsubamoto. 2016. Integrated Virtualization Manager for IBM PowerSystems Servers. An IBM Redbooks publication.
[3] Iain Campbell. [n. d.]. PowerVM Virtualization Essentials. Global KnowledgeTraining LLC White Papers. ([n. d.]). Oct. 2014. Accessed on 30 May 2017.
[4] Charlie Cler. 2015. HMC Architecture Options.IBM Systems Magazine(Feb. 2015).Accessed on 23 May 2017.
[5] Mel Cordero, Lucio Correia, Hai Lin, Vamshikrishna Thatikonda, Rodrigo Xavier,and Scott Vetter. 2013.IBM PowerVM Virtualization Introduction and Configuration.An IBM Redbooks publication.
[6] Sylvain Delabarre, Sorin Hanganu, and Thomas Libor. 2016.IBM Power SystemsHMC Implementation and Usage Guide. An IBM Redbooks publication.
[7] Jez Humble and Joanne Molesky. 2011. Why enterprises must adopt devops toenable continuous delivery.Cutter IT Journal24, 8 (2011), 6.
[8] IBM. [n. d.]. Adding the Virtual I/O Server installation files to the PowerVMNovaLink installer. IBM Knowledge Center. ([n. d.]). Apr. 2017. Accessed on 30 May 2017.
[9] IBM. [n. d.]. Installing PowerVM NovaLink. IBM Knowledge Center. ([n. d.]).Apr. 2017. Accessed on 30 May 2017.
[10] IBM. [n. d.]. Managing system management services. IBM Knowledge Center. ([n.d.]). ibm.com/support/knowledgecenter/POWER8/p8hb6/p8hb6_kickoff.htm,Feb. 2015. Accessed on 30 May 2017
Citation
Pavan G Yajurvedi, Vishwanath R. Hulipalled, "Resource Utilization Using PowerVC Based Auto-Provisioning," International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.55-60, 2021.