Automatic Classification of Research Papers to a Predefined Category Using Machine Learning
Research Paper | Journal Paper
Vol.07 , Issue.09 , pp.47-51, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.4751
Abstract
With the technology growing exponentially, there are a lot of researches and inventions taking place in all the fields. New innovations and discoveries are put forth in the form of research papers. There are thousands of research papers today that pertain to different disciplines such as Computer Science, Mathematics, Biology, Chemistry etc. Finding papers pertaining to a specific domain is time consuming and a tedious task. Classification of papers to a specific discipline, subject or a category reduces the task of searching. This task if done manually consumes lot of human effort and time where as if done automatically, saves the time of users by preventing them from going through the entire research paper. The proposed work uses a novel strategy to automatically classify the research papers based by analyzing the structure of abstracts of research papers to assign them to a specific predefined discipline. Machine Learning technique is used to build a learning model to learn the properties or characteristics of documents manually, in some cases semi automatically, so that the more it gets trained the more efficient will be the model to predict or classify the test documents. Support Vector Machine (SVM) algorithm is used to vectorize the training data set and plot them in an n-dimensional space and then to find the hyper plane that will separate the data into a predefined category. The data is then learnt and later used to categorize the data. The performance of SVM is compared with Naïve Bayes and Decision Tree algorithms also. The experimental result proves the outstanding performance of SVM to predict the category of research papers over the other two algorithms mentioned above. The main objective of the proposed work is to develop a system that has the ability to learn from a training set of data, improvise from the experiences without explicitly programming for it and later classify any research paper given to it into a discipline.
Key-Words / Index Term
Support Vector Machine (SVM), Bag-Of-Words (BOW), Machine Learning (ML)
References
[1] Junfei Qiu, Qihui Wu, Guoru Ding , Yuhua Xu and Shuo Feng, “A survey of Machine Learning for big data processing”, Qiu et al. EURASIP Journal on Advances in Signal Processing (2016) 2016:67, DOI 10.1186/s13634-016-0355-x.
[2] A Sandryhaila, JMF Moura, “Big data analysis with signal processing on graphs: representation and processing of massive data sets with irregular structure”, IEEE Signal Proc Mag 31(5), 80–90 (2014).
[3] Diksha Khurana, Aditya Koli, Kiran Khatter, Sukhdev Singh, “Natural Language Processing: State of The Art, Current Trends and Challenges”, arxiv.org/pdf/1708.05148, August 17, 2017.
[4] D. Saidulu, Dr. R. Sasikala, “Machine Learning and Statistical Approaches for Big Data: Issues, Challenges and Research Directions”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 11691-11699.
[5] Sheetal Shimpikar, Sharvari Govilkar, “A Survey of Text Summarization Techniques for Indian Regional Languages”, International Journal of Computer Applications (0975 – 8887), Volume 165 – No.11, May 2017.
[6] Vladimir Nasteski, “An overview of the supervised machine learning methods”, Journal of advances in information technology, DOI10.20544/HORIZONS.B.04.1.17.P05,UDC 04.85.021:519.718, Jan 4, 2017.
[7] Mowafy M, Rezk A, El-bakry HM, “An Efficient Classification Model for Unstructured Text Document”. American Journal of Computer Science and Information Technology, Vol.6 No.1: 16, ISSN 2349-3917, 2018.
[8] Rajeswari RP, Juliet K, Aradhana, “Text Classification for Student Data Set using Naive Bayes Classifier and KNN Classifier”, International Journal of Computer Trends and Technology, – Volume 43 Number 1 – January 2017.
[9] M. Kepa, J. Szymanski, “Two stage SVM and k-near neighbor text documents classifier”, In the Proceedings of the 6th International Conference, on Pattern Recognition and Machine Intelligence PReMI 2015, Warsaw, Poland, June 30-July 3, 2015, DOI: 10.1007/978-3-319-19941-2_27, pp.279-289.
[10] R. C. Barik and B. Naik, "A Novel Extraction and Classification Technique for Machine Learning using Time Series and Statistical Approach", International Journal of Innovative Research in Computer and Communication Engineering, DOI: 10.15680/IJIRCCE.2018.0605115, Vol. 6, Issue 5, May 2018.
[11] R. Bruni and G. Bianchi, "Effective Classification Using a Small Training Set Based on Discretization and Statistical Analysis", IEEE Transactions On Knowledge And Data Engineering, Vol. 27, No. X, XXXXX 2015.
[12] A. Chaudhuri, "Modified fuzzy support vector machine for credit approval classification," Journal AI Communications, Volume 27 Issue 2, April 2014, Pages 189-211.
[13] E. Baralis, L. Cagliero, and P. Garza, "EnBay: A novel pattern-based Bayesian classifier", IEEE Transactions on Knowledge & Data Engineering, pp. 2780-2795, vol. 25, Dec. 2013.
[14] X. Fang, "Inference-Based Naive Bayes: Turning Naive Bayes Cost-Sensitive", IEEE Transactions on Knowledge and Data Engineering 25(10):2302-2313 • October 2013.
[15] C. H. Wan, L. H. Lee, R. Rajkumar, and D. Isa, "A hybrid text classification approach with low dependency on parameter by integrating K-nearest neighbor and support vector machine", International Journal of Innovative Research in Science, Engineering and Technology, Volume 3, Special Issue 3, March 2014.
[16] Maganti Syamala, Dr N J Nalini, Lakshamanaphaneendra, Dr. R Ragupathy, “Comparative Analysis of Document level Text Classification Algorithms using R”, IOP Conf. Series: Materials Science and Engineering 225 (2017) 012076 doi:10.1088/1757-899X/225/1/012076.
[17] M. Parchami, B. Akhtar, and M. Dezfoulian, "Persian text classification based on K-NN using wordnet”, book Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (pp.283-291), DOI: 10.1007/978-3-642-31087-4_30.
[18] Autade Sushma G., Dr.Gayatri M.Bhandari, “Text Categorization based on SVM and Bayesian Classification Approach Using Class-Specific Features”, International Journal of Advanced Research in Computer Engineering & Technology,Volume 06, Issue 06, June 2017, ISSN: 2278 – 1323.
Citation
Perpetua F Noronha, Prathiba R, Gauthami M, "Automatic Classification of Research Papers to a Predefined Category Using Machine Learning", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.47-51, 2019.
Precision Agriculture Using Artificial Intelligence & Machine Learning Techniques
Survey Paper | Journal Paper
Vol.07 , Issue.09 , pp.52-55, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.5255
Abstract
Many sensors have emerged for different applications nevertheless only rare of the sensor are in use for agriculture field to identify soil type and nutrients specifications this provides a vast space in research. Numerous agricultural research centers are developed and are still on work as an equipped lab for monitoring these data for farmer’s necessity. Getting soil from farmers processing in the lab and resulting in the required data is a common feature but realistic field monitoring sensors are a challenging task. This framework is to develop an easy man - handle sensor for identifying parameters such as: type of the soil, water scarcity, amount of nutrient present in the soil, type of seed for plantation, fertilizer required for the growth of crop, type of diseases that may infect, crop harvesting and cost estimation after cultivation. Classification of these substantial parameters are made using machine learning techniques and to correlate each parameter with its corresponding attributes to provide continuous field monitoring effective precision agriculture is the proposal work. This work focuses on all the parameter fixed together to a sensor listing out the production and cost estimation of any field.
Key-Words / Index Term
Machine learning, Soil nutrients, Deep learning, Fertilizers
References
[1] Hopfield. J. J. 1982. Neural Networks and Physical Systems with Emergent Collective Computational Abilities, In: Proceedings of the National Academy of Science of the United States of America, Vol. 79:2554–2558.
[2] Badia Melis. R et al., 2016. "Artificial neural networks and thermal image for temperature prediction in apples,"Food and Bioprocess Technology, vol.9 no.7, pp. 1089-1099.
[3] Sellers PJ, Randall DA, Collatz GJ, Berry JA, Field CB, Dazlich DA, Zhang C, Collelo GD, Nounoua L 1996. A revised land surface parameterization (SiB2) for atmospheric GCMS, Part 1: Modelformulation. Journal of Climate 9: 676–705.
[4] ASCE Task Committee on applications of artificial neural networks in hydrology (2000). Artificial Neural Networks in Hydrology I: Preliminary Concepts. Journal of Hydrol. Eng. 5: 115–123.
[5] Krause A, Singh A, Guestrin C 2008. Near-optimal sensor placements in Gaussian processes: Theory, efficient algorithms,and empirical studies. Journal of Machine Learning Research 9: 235–284.
[6] Gondal, M.D. and Y.N. Khan, Early Pest Detection from Crop using Image Processing and Computational Intelligence.
[7] Pahuja, R., H. Verma, and M. Uddin, A wireless sensor network for greenhouse climate control.IEEE Pervasive Computing, 2013. 12(2): p. 49-58.
[8] Lee, W.S. and R. Ehsani, Sensing systems for precision agriculture in Florida. Computers and Electronics in Agriculture, 2015. 112: p. 2-9.
[9] Osman J, Inglada J , Dejoux JF. Assessment of a Markov logic model of crop rotations for early crop mapping, Elsevier. Computers and Electronics in Agriculture. 2015; 113:234–43.
[10] S. Russell and P. Norvig, 2003. ArtificialIntelligence: A Modern Approach,Prentice Hall, New York.
[11] Bah, A., S.K. Balasundram and M.H.A. Husni, “Sensor Technologies for Precision Soil NutrientManagement and Monitoring”, American Journal of Agricultural and Biological Sciences 7 (1): 43-49, ISSN1557-4989, 2012.
[12] Nanyang Zhu1,2, Xu Liu1,2, Ziqian Liu1,2, Kai Hu1,2, Yingkuan Wang3, Jinglu Tan4, Min Huang1,Qibing Zhu1, Xunsheng Ji1, Yongnian Jiang5, Ya Guo1,2,4*, “ Deep learning for smart agriculture:Concepts, tools, applications, and opportunities”, Int J Agric & Biol Eng, Vol. 11 No.4, July, 2018
[13] Kaushik Bhagawati, Amit Sen, Kshitiz Kumar Shukla, Rupankar Bhagawati, “Application and Scopeof Data Mining in Agriculture “ International Journal of Advanced Engineering Research and Science(IJAERS) [Vol-3, Issue-7, July- 2016]
[14] S.Veenadhari, 2Dr. Bharat Misra, 3Dr. CD Singh, “ Data mining Techniques for PredictingCrop Productivity – A review article”, International Journal of Computer Sci ence and Technology,Vol. 2, Iss ue 1, March 2011
[15] Deepa V. Ramane, Supriya S. Patil, A. D. Shaligram, “ Detection of NPK nutrients of soil usingfiber Optic Sensor”, International Journal of Research in Advent Technology (E-ISSN: 2321-9637)Special Issue National Conference “ACGT 2015”, 13-14 February 2015
Citation
K.R. Radhakrishnan, T. KohilaKanagalakshmi, Mohit Agarwal, "Precision Agriculture Using Artificial Intelligence & Machine Learning Techniques", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.52-55, 2019.
A Comparative Model of Feature Engineering With and Without Domain Knowledge
Research Paper | Journal Paper
Vol.07 , Issue.09 , pp.56-59, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.5659
Abstract
One of the key aspects of building a good machine learning model is Feature engineering. Feature engineering is a process where we create new features from existing raw features. To create new features, we require domain experts who have knowledge of the subject. By using their knowledge they create new features which are helpful for a machine to learn better. The time taken by the domain experts to understand the data and then create new features is time-consuming and expensive. This problem is addressed with a neural network which will not require domain experts to engineer new features. Current paper deals with the case study pertaining to the data of Human Action Recognition. Using the data, the machine predicts the various physical actions and appearances of a person like if the person is sitting, standing, walking, walking up stairs, and walking downstairs or lying. We compare the accuracy of the model using data which was feature engineered by experts and the model which was not feature engineered by the domain experts.
Key-Words / Index Term
Machine Learning, Feature Engineering, Domain Knowledge, Human Action Recognition, Neural Networks
References
[1] B. Fish A. Khan N. Chehade C. Chien and G. Pottie, “Feature selection-based on mutual information for human
activity recognition,” IEEEInternational Conference on Acoustics, Speech and Signal Processing,vol.37,
pp.1729-1732, 2012.
[2] D.Anguita A. Ghio L. Oneto X. Parra and J. Reyes-Ortiz, “Human Activity Recognition on Smartphones Using
a Multiclass Hardware- Friendly Support Vector Machine.” International Conference on Ambient Assisted
Living and Home Care, pp.216-223, 2012.
[3] C. Schuldt, I. Laptev, and B. Caputo, “Recognizing human actions:A local SVM approach,” in Proc. Int. Conf.
Pattern Recognit., vol. 3.2004, pp. 32–36.
[4] Changki Lee, Gary Geunbae Lee, “Information gain and divergence based feature selection for machine learning
based textcategorization,” Information Processing & Management, vol. 42,Issue 1, pp. 155-165, January 2006.
[5] J. Yang, J. Wang and Y. Chen, “Using acceleration measurements foractivity recognition: An effective learning algorithm for constructingneural classifiers,” in Pattern Recognition Letters, vol.29, no.16, pp. 2213-2220,
2008.
[6] M. B. Holte, C. Tran, M. M. Trivedi, and T. B. Moeslund, “Human pose estimation and activity recognitionfrom multi-view videos: Comparative explorations ofrecent developments,” IEEE Journal of Selected Topicsin Signal Processing, vol. 6, pp. 538–552, 2012.
[7] K. Charalampous and A. Gasteratos, “On-line deep learningmethod for action recognition,” Pattern Anal. Appl., pp. 1–18,Aug. 2014.
[8] Q. Li J. Stankovic M. Hanson and A. Barth, “Accurate, Fast Fall Detection Using Gyroscopes and
Accelerometer-Derived Posture Information,”Sixth International Workshop on Wearable and Implantable Body SensorNetworks, pp.138-143, 2009.
[9] N. Gkalelis, N. Nikolaidis, and I. Pitas, “View independent human movement recognition from multi-view video exploiting a circular invariant posture representation,” in 2009 IEEE International Conference on Multimedia and Expo, June 2009, pp. 394–397.
[10] O. Banos J. Galvez M. Damas H. Pomares and I. Rojas, “Windowsize impact in human activity recognition,” Sensors, vol.14, no.4, pp.6474-6499, 2014.
Citation
Rohit Bohra, Pankaj Karki, Kumudavalli M V, "A Comparative Model of Feature Engineering With and Without Domain Knowledge", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.56-59, 2019.
Analysis of IOT in Daily Life
Survey Paper | Journal Paper
Vol.07 , Issue.09 , pp.60-62, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.6062
Abstract
One of the major key roll concepts in today’s technology is internet of things ,IOT which plays a very major role in daily life , with the help of IOT we can make our surroundings in the automated way. IOT is the concept of machine to machine communication , all the devices can be monitored and controlled in an automated way without the human presence, In this paper we discuss about the use of IOT , various applications of IOT , security issues in IOT. This survey will be helpful for the researchers to know about the IOT as well as introducing the new techniques for implementing the IOT in different applications with more advanced way.
Key-Words / Index Term
IOT,Applications,Attack
References
[1]Vandana Sharma , Ravi Tiwari , A review paper on IOT and its Smart Applications ,International Journal of Science Engineering and Technology Research , Volume-5 , Issue-2 , Feb 2016.
[2]Pradnya A Hukeri , P B Ghewari , Review Paper on IOT based Technology, International Research Journal of Engineering and Technology , Volume-4 , Issue-01, Jan 2017.
[3]M U Farooq , Mohammed Waseem etol , A Review on Internet of Things(IOT) , Volume-113 , Issue 1, March2015.
[4]Somayya Madakam , R Ramaswamy , Siddharth Tripathi , Internet of Things: A literature Review , Journal of Computer and Communications , May 2015
[5]K R Kundhavi , S Sridevi ,IOT and Big Data- The Current and FutureTechnologies: A Review , International Journal of Computer science and Mobile Computing , Volume-5 , Issue-1, Jan 2016.
[6] Mukrimah Nawir, Amiza Amir, Naimah Yaakob,Ong Bi Lynn , Internet of Things (IoT): Taxonomy of Security Attacks , 3rd International Conference on Electronic Design (ICED) , Aug 2016.
[7] S. M. Riazul islam1,daehan kwak, md. Humaun kabir1, mahmud hossain, kyung-sup kwak , The Internet of Things for Health Care: A Comprehensive Survey , IEEE , June 2015.
[8] Er. Pooja Yadav , Er. Ankur Mittal, Dr. Hemant Yadav, IoT: Challenges and Issues in Indian Perspective, IEEE , NOV 2018.
[9] Dina Fitria Murad,Meyliana, Achmad Nizar Hidayanto, HarjantoPrabowo, IoT for Development of Smart Public Transportation System: A Systematic Literature Review , International Journal of Pure and Applied Mathematics , Volume-118.
Citation
Sangamithra A, Margaret Mary J, "Analysis of IOT in Daily Life", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.60-62, 2019.
A Novel Approach on Tech Solutions to Mitigate Big Data Security Threats
Survey Paper | Journal Paper
Vol.07 , Issue.09 , pp.63-68, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.6368
Abstract
Big Data is the buzz word today. Numerous projects centering big data are booming. It hides in itself vital information which if unearthed would provide great insights into various areas. The growing need of this data is complicating security. Handling big data projects is a challenging task. To prevent a potentially disastrous data breach, big data security should be considered seriously. To prevent security issues, some simple steps should be implemented. It can be done with best practices and internal controls, like protecting against NoSQL Injection points. These points provide a way for attackers to access Big Data. This paper discusses the various big data security threats and different innovative Tech solutions to meet many of the security concerns hindering the Big Data persistence, analysis and presentation.
Key-Words / Index Term
Big Data, Big data security threats, Data Security, SQL injection, NoSQL injection
References
[1] Ahmed E. Youssef and Manal Alageel, “A Framework for Secure Cloud Computing”, International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 4, No 3, pp. 478-500, July 2012.
[2] A. Youssef and M. Alageel, “Security Issues in Cloud Computing”, the GSTF International Journal on Computing , Vol.1 No. 3, 2011.
[3] P. Groves, B. Kayyali, D. Knott and S. V. Kuiken, "The `big data` revolution in healthcare," McKinsey &Company, 2013.
[4] P. Institute, "Third Annual Benchmark Study on Patient Privacy and Data Security," Ponemon Institute LLC, 2012..
[5] Shoffner, M. (2012). Handling “hot” health data without getting burned. Presented at the Strata Rx Conference, San Francisco, CA, USA. http://strataconf.com/rx2012/public/schedule/detail/26231..
[6] Katal, A.; Wazid, M.; Goudar, R.H., "Big data: Issues, challenges, tools and Good practices," Contemporary Computing (IC3), 2013 Sixth International Conference on , vol., no., pp.404,409, 8-10 Aug. 2013.
[7] Nambiar, R.; Bhardwaj, R.; Sethi, A.; Vargheese, R., "A look at challenges and opportunities of Big Data analytics in healthcare," Big Data, 2013 IEEE International Conference on , vol., no., pp.17,22, 6-9 Oct. 2013.
[8] Sun, Jimeng, and Chandan K. Reddy. "Big data analytics for healthcare." Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2013.
[9] Smitha Rao, S.N.Suma, M.Sunitha. "Security Solutions for Big Data Analytics in Healthcare",2015 Second International Conference n Advances in Computing and Communication Engineering,2015.
[10] www.whishworks.com
[11] http://blog.sqlauthority.com
[12] www.ibmbigdatahub.com
[13] https://arxiv.org/ftp/arxiv/papers/1506/1506.04082.pdf
[14] “Analysis and Diminution of NoSQL Injection attacks” by Pritesh, Ashwini, Rachana Badekar
[15] https://thesai.org/Downloads/Volume8No11/Paper_78-NoSQL_Racket_A_Testing_Tool.pdf
[16] https://pdfs.semanticscholar.org/9e33/338f42d2d97349063cf24db36a74936f0613.pdf
[17] https://www.synopsys.com/software-integrity/resources/knowledge-database/sql-injection.html
https://www.acunetix.com/websitesecurity/sql-injection/
[17] www.synopsys.com
[18] www.acenutix.com
Citation
Suneetha V, Sunitha. M, Arshiya, "A Novel Approach on Tech Solutions to Mitigate Big Data Security Threats", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.63-68, 2019.
Big Healthcare Data Privacy Preservation –A Technological Perspective
Research Paper | Journal Paper
Vol.07 , Issue.09 , pp.69-75, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.6975
Abstract
In this digital world, by virtue of highly diversified data generating technologies – huge amount of data is being churned out by organizations like hospices, banks, e-commerce, retail and supply chain, etc.,. Heaps and loads of big data is being generated every minute, by humans and machines. Because of onset of big data the industries have fundamentally changes their way of handling data. The volume and velocity big data generated from the various sources can be managed and analyzed to take appropriate decisions to benefit the organization. One of the most promising fields where big data analytics can be applied is healthcare. Big healthcare data and its analytics has considerable potential to improve quality of patients’ life, gain valuable insights, prevent diseases, make healthcare more affordable. Securing data of patients and ensuring its security is major concern of data analytics. Unless the privacy and security issues of Big Data are addressed in healthcare industry it cannot be too useful. Invasion of patient privacy is a growing concern in big data analytics as emerging threats and vulnerabilities continue to grow. It is necessary to ensure a secure and sound environment for big data for better future in research by repairing the available solutions. In this paper, we present the security and privacy issues in big data applicable to healthcare industry. Also, we discuss the various Anonymization and Encryption techniques to preserve the privacy of the data, comparing their strengths and limitations.
Key-Words / Index Term
Healthcare; Healthcare privacy; Big data security; Big data Privacy; Data Anonymization, K-anonymity, T-closeness, L-diversity
References
[1]. Karim Abouelmehdi, Abderrahim Beni-Hssane, Hayat Khaloufi, Mostafa Saadi. "Big data security and privacy in healthcare: A Review", Procedia Computer Science, 2017
[2]. Aggarwal CC, Philip SY. A general survey of privacy-preserving data mining models and algorithms. Privacy-preserving data mining. Springer: US; 2008. p. 11–52.
[3]. Jiang R, Lu R, Choo KK. Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Gen Comput Syst. 2018;78:392–401.
[4]. Hettig M, Kiss E, Kassel J-F, Weber S, Harbach M. Visualizing risk by example: demonstrating threats arising from android apps. In: Smith M, editor. Symposium on usable privacy and security (SOUPS), Newcastle, UK, July 24–26, 2013.
[5]. Bayardo RJ, Agrawal A. Data privacy through optimal k-anonymization. In: Proceedings 21st international conference on data engineering, 2005 (ICDE 2005). Piscataway: IEEE; 2005.
[6]. Iyengar S. Transforming data to satisfy privacy constraints. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining. New York: ACM; 2002.
[7]. LeFevre K, DeWitt DJ, Ramakrishnan R. Incognito: efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD international conference on management of data. New York: ACM; 2005.
[8]. LeFevre K, DeWitt DJ, Ramakrishnan R. Mondrian multidimensional k-anonymity. In: Proceedings of the 22nd international conference (ICDE’06) on data engineering, 2006. New York: ACM; 2006.
[9]. Samarati, Pierangela, and Latanya Sweeney. In: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998.
[10]. Sweeney Latanya. Achieving k-anonymity privacy protection using generalization and suppression. In J Uncertain Fuzziness Knowl Based Syst. 2002;10(05):571–88.
[11]. Sweeney Latanya. k-Anonymity: a model for protecting privacy. Int J Uncertain, Fuzziness Knowl Based Syst. 2002;10(05):557–70.
[12]. Williams R. On the complexity of optimal k-anonymity. In: Proc. 23rd ACM SIGMOD-SIGACT-SIGART symp. principles of database systems (PODS). New York: ACM; 2004.
[13]. Machanavajjhala A et al. L-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE’06), 2006. Piscataway: IEEE; 2006.
[14]. Xiao X, Yufei T. Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD international conference on Management of data. New York: ACM; 2006.
[15]. Rubner Y, Tomasi T, Guibas LJ. The earth mover’s distance as a metric for image retrieval. Int J Comput Vision. 2000;40(2):99–121.
[16]. Priyank Jain* , Manasi Gyanchandani and Nilay Khare; Big data privacy: a technological perspective and review; Journal of Big data.
[17]. Karim Abouelmehdi*, Abderrahim Beni‑Hessane and Hayat Khaloufi; Big healthcare data: preserving security and privacy; Journal of Big data.
[18]. P. Ram Mohan Rao, S. Murali Krishna, A. P.Siva Kumar. "Privacy preservation techniques in big data analytics: a survey", Journal of Big Data, 2018 journalofbigdata.springeropen.com
[19]. Kajol Patel, G. B. Jethava. "Privacy Preserving Techniques for Big Data: A Survey", 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018.
[20]. OECD Health Care Quality Framework (OECD Health Working Paper No. 23, March 2006). https://eugdprcompliant.com/
Citation
Suneetha V, Srivatsala V, Kumara Swamy Y S, "Big Healthcare Data Privacy Preservation –A Technological Perspective", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.69-75, 2019.
Security Enhancement through Cryptography and Hardware Devices
Survey Paper | Journal Paper
Vol.07 , Issue.09 , pp.76-79, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.7679
Abstract
Security is being a hot topic in present digital era. The growing usage of technology for communication generates data which is available everywhere but data security is the important issue which draws the attention of all. Cryptography and security is a notion to secure the network and information transmission through wireless network. With ever progression in digital system security has been appeared as a major concern. In this era of virus and hackers of electronic bugs and electronic fraud security is primary. The concept of hardware security has been normally related with the cybersecurity and cryptography. Cyber-attacks are usually more due to lots of users connected to the internet. The basic issues in guarding the safe transmission of data through the web are concern of the security. This paper emphasizes on the key concepts of cryptography and security on critical infrastructure devices to overcome the threats of computer network security.
Key-Words / Index Term
Cryptography, Cybersecurity, Network Security, Hardware security
References
[1] Shyam Nandan kumar,” Review on Network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, 2015, Vol.3, No.1,1- 11.
[2] Jim Attridge, “An Overview of Hardware Security Modules” Version 1.2 of GSEC Practical Assignment for GIAC Certification, January 14, 2002.
[3] Yier Jin, “Introduction to Hardware Security”, Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32765, USA.|13 October 2015
[4] Dr Sandeep Tayal, Dr Nipin Gupta, Dr Pankaj Gupta, Deepak Goyal, Monika Goyal, “A Review paper on Network Security and Cryptography”, ISSN 0973-6107 Volume 10, Number 5, 2017.
[5] Sarita Kumari,”A research paper on cryptography Encryption and compression Techniques”, International Journal Of Engineering And Computer Science, ISSN:2319-7242 Volume 6,4 April 2017.
[6] Shivangi Goyal,”A Survey on the Applications of Cryptography”, International Journal of Engineering and Technology Volume 2 No. 3, March, 2012.
[7] Banga, M., Hsiao, M. VITAMIN,” Voltage Inversion Technique to Ascertain Malicious Insertion in ICs”, In proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA, USA, 27-27 July 2009, pp. 104-107.
[8] Love E. Jin, Makris Y,” Proof-Carrying Hardware Intellectual property: A Pathway to Trusted Module Acquisition”, IEEE Trans. Inf. Forensics Secure, 2012, 7, 25-40.
[9] Chakraborty R, Wolff F Paul, S Papachristou, C Bhunia, S. MERO, “A Statistical Approach for Hardware Trojan Detection”, In Cryptographic Hardware and Embedded Systems” CHES 2009, Springer: Berlin, Germany; Heidelberg, Germany, 2009, Volume 5747, pp. 396–410.
[10] Bloom G, Simha R, Narahari B, “OS Support for Detecting Trojan Circuit Attacks”, In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA, 27 July 2009, pp. 100–103.
[11] Banerjee, S.K. Pandey, “Research on software security awareness: problems and prospects”, ACM SIGSOFT Software Engineering 35(5):1-5 October 2010.
Citation
Aruna Devi.T, Tejaswini S Majjigi, Shyam Vaibhav. M S, "Security Enhancement through Cryptography and Hardware Devices", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.76-79, 2019.
Role of Digital Marketing in Healthcare Ecosystem
Survey Paper | Journal Paper
Vol.07 , Issue.09 , pp.80-83, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.8083
Abstract
Healthcare in today’s world plays most crucial role in one ‘s life. It is imperative that the information related to health care must reach everyone, to make a healthy and a better world. Digital marketing and branding is a way of imparting information about your product or service through digital medium. Traditional marketing has been replaced largely by digital marketing i.e. “marketing online”. This paper discusses how digital marketing is crucial for healthcare in today’s world. The three main pillars of digital marketing are Content, data and technology. The above three aspects are crucial for healthcare as large amount of data belonging to the consumers/patients are put to use effectively to provide a better service to them. Private corporate healthcare industry and Government healthcare system aim to analyze the above data to devise new health care plans to cater to the patients’ needs. This paper discusses the technologies and tools pertaining to the digital marketing techniques implemented by healthcare industry. Digital marketing in healthcare is need of the hour in the world of advancing technology.
Key-Words / Index Term
Digital marketing, Healthcare Data, Content, Technology, Consumer Patient, Ecosystem
References
[1] “Optimizing Technical Ecosystem of Digital Marketing “ Smitha Rao (6) V. Srivatsala (6) V. Suneetha (6) DSCASC, Bangalore, India Artificial Intelligence and Evolutionary Computations in Engineering Systems
[2]Proceedings of ICAIECES 2015 Pages pp 691-703 Copyright 2016 DOI 10.1007/978-81-322-2656-7_63 Print ISBN 978-81-322-2654-3 Online ISBN 978-81-322-2656-7 Series Title Advances in Intelligent Systems and Computing Series Volume 394 Series ISSN 2194-5357 Publisher Springer India
[3]“Seven Big Challenges Facing Healthcare Marketers”-Patricio Robles May 25th 2016 Https://Econsultancy.Com/Seven-Big-Challenges-Facing-Healthcare-Marketers/
Citation
Veda D V, Sneha R V , Srivatsala V, "Role of Digital Marketing in Healthcare Ecosystem", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.80-83, 2019.
Natural Language Processing: Comprehensive Review
Review Paper | Journal Paper
Vol.07 , Issue.09 , pp.84-86, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.8486
Abstract
The emerging and most popular processing technique of Natural Language Processing (NLP) deals with computational algorithms to analyze and process human language. It also represents human language. The application of NLP enabled system ranges from search engine to voice assistant, machine translation and dialogue generation. It is concerned with interaction between computers and natural language such as human language. High-revenue non NLP-domain such as finance, government surveillance or marketing is the areas benefited from NLP. The main objective of this paper to review state-of-the art of NLP, its benefits and various processes in NLP enable the systems to deal with real-time data.
Key-Words / Index Term
Machine Learning, Internet of Things, Artificial Intelligence, Google, Voice Assistant
References
[1] E.U Reshma, P C Remya, A review of different approaches in natural language interfaces to databases, International Conference on Intelligent Sustainable Systems (ICISS), https://doi.org/10.1109/ISS1.2017.8389287,IEEE,2017.
[2] Joakim NIVRE, On Statistical Methods in Natural Language Processing.
[3] Hitoshi Isahar, Resource-based Natural Language Processing, International Conference on Natural Language Processing and Knowledge Engineering, https://doi.org/10.1109/NLPKE.2007.4368002, IEEE,2007.
[4] Ponnusamy, Ramalingan, A Systematic Survey of Natural Language Processing (NLP) Approaches in Different Systems, vol 4,2018.
[5] Machine Learning in the real world: https://techcrunch.com/2015/11/26/machine-intelligence-in-the-real-world/
[6] Daniel W, Otter, Julian R..Medina, Jugal K.Kalita, “A Survey of the usagse of Deep Learning in Natural Language Processing”, Computation and Language, Cornell University.
[7] Webber B.L. (1986) Natural Language Processing: A Survey. In: Brodie M.L., Mylopoulos J. (eds) On Knowledge Base Management Systems. Topics in Information Systems. Springer, New York, NY.
[8] Graeme Ritchie, “Survey of Natural Language Processing”, ACM Newsletter Issue 80, pp, 66, 1982.
[9] M.VasunthraDevi, Dr.R.Ponnusamy, “A Systematic survey on Natural Language Processing Approaches in Different systems”, International Journal of Computer Science and Engineering Vol 4, 7,pp-192-198.
[10] Natural Language Processing is Fun: https://medium.com/@ageitgey/natural-language-processing-is-fun-9a0bff37854e
[11] OLaronke G.Iroju, Janet O.Olaleke, “A Systematic Review of Natural Language Processing in Healthcare,I.J Information Technology and Computer Science, 08,pp-44-50,2015.
[12] Dr. Khaled M. Alhawiti,” Natural Language Processing and its Use in Education”, International Journal of Advanced Computer Science and Applications, Vol.5, No.12,2014.
[13] Machine learning in Business: https://emerj.com/ai-sector-overviews/machine-learning-in-finance/
[14] https://emerj.com/ai-sector-overviews/natural-language-processing-banking-current-applications/
[15] Cyril Joe Baby, Faizan Ayyub Khan, J. N. Swathi, “Home Automation using IoT and Chatbot using Natural Language Processing”, International Conference on Innocations in Power and Advanced computing Technologies ISBN, 978-1-5090-5682-8.
[16] M A Moni, “Application of Natural Language Processing Techniques in e-Governance”, International conference on Language and Development, 2009.
Citation
Vinothina V, "Natural Language Processing: Comprehensive Review", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.84-86, 2019.
Fog Computing and its Security Issues
Review Paper | Journal Paper
Vol.07 , Issue.09 , pp.87-90, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si9.8790
Abstract
Fog Computing is another worldview that increases the Cloud storage through figuring assets on the edges of a system. It is clearly well described as a cloud-like stage containing comparative information, computation and application administrations, yet is on a very basic level diverse in that it is decentralized. Furthermore, Fog computing are equipped for preparing a lot of information locally, work on-premise and are completely convenient. It can be on mixed equipment’s. These highlights make the Fog stage extremely reasonable for time and area for touchy applications. For instance, Internet of Things (IoT) Devices having lot of information and its required rapidly process for working. This large area of usefulness driven applications increases numerous confidentiality issues with respect to information, virtualization, isolation, organize, malware and observing. This paper reviews existing papers on Fog figuring applications to resolve regular security holes. Comparable advancements like Edge figuring, Cloudlets and Micro-server farms having same incorporated to give a comprehensive audit process. Most of Fog applications are roused by the longing for usefulness and end-user prerequisites, while the confidentiality aspects are frequently disregarded or measured as a bit of hindsight. This paper also determines the effect of those security issues and conceivable solution, giving prospect security-pertinent headings to those responsible for designing, emerging, and preserving Fog systems.
Key-Words / Index Term
Iot, Cloud, Fog, localized, Edge computing, Decoy, Hashing
References
[1] Lee, Kanghyo, et al. "On security and privacy issues of fog computing supported Internet of Things environment." Network of the Future (NOF), 2015 6th International Conference on the. IEEE, 2015.
[2] Wang, Yifan, Tetsutaro Uehara, and Ryoichi Sasaki. "Fog computing: issues and challenges in security and forensics." Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual. Vol.3, IEEE, 2015
[3] Yi, Shanhe, Zhengrui Qin, and Qun Li. "Security and privacy issues of fog computing: A survey." International Conference on Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2015.
[4] Ben-Salem M., and Stolfo Angelos D. Keromytis, “Fog computing: Mitigating Insider Data Theft Attacks in the Cloud,” IEEE symposium on security and privacy workshop (SPW) 2012.
[5] Arwinder Singh, Abhishek Gautam, Hemant Kumar, Er. C.K. Raina. "Decoy Technology in Fog Computing" International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 6, Issue 3, March 2017
[6] Thanh Dat Dang and Doan Hoang; A Data Protection Model for Fog Computing; IEEE Conference; 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC); 2017 IEEE; pp. 32-38.
[7] Hany F. Atlam, Robert J. Walters and Gary B. Wills; Fog computing and the internet of things: A Review; Big Data and Cognitive Computing; 2018,2,10; doi:10.3390/bdcc2020010
[8] Shubha Brata Nath, Harshit Gupta, Sandip Chakraborty, Soumya K Ghosh; A survey of fog computing and communication: Current researches and future directions; IEEE Communication Surveys and Tutorials; April 2018
[9] Sai Keerthi.Tulluru, Dr.Anuradha S.G. "Fog Computing a Paradigm: Scenarios And Security Issues"International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 5, Issue 4, April 2018
[10] Blesson Varghese, Nan Wang, Dimitrios S. Nikolopoulos and Rajkumar Buyya; Feasibility of Fog Computing; arXiv:1701.05451v1 [cs.DC] ; 19Jan 2017.
[11] Pengfei Hu, SahraouiDhelim, Huansheng Ning and Tie Qiu; Survey on Fog Computing: Architecture, Key Technologies, Applications and Open Issues; ELSEVIER Journal of Network and Computer Applications 98 (2017); DOI: 10.1016/j.jnca.2017.09.002; September 12, 2017
[12] Chiang, Mung, and Tao Zhang. "Fog and IoT: An overview of research opportunities." IEEE Internet of Things Journal 3.6 (2016): 854-864.
Citation
Keerthi T.R., Mohit Agarwal, "Fog Computing and its Security Issues", International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.87-90, 2019.