Analysis of Disease in plant leaves by image segmentation method
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.46-49, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.4649
Abstract
A new plant cell image segmentation algorithm is presented in this paper. The difficulty of the segmentation of plant cells lies in the complex shapes of the cells and their overlapping, often present due to recent cellular division. The algorithm presented tries to imitate the human procedure for segmenting overlapping and touching particles. In this context, one of the principal technical challenges remains the faithful detection of cellular contours, principally due to variations in image intensity throughout the tissue. Watershed segmentation methods are especially vulnerable to these variations, generating multiple errors due notably to the incorrect detection of the outer surface of the tissue.
Key-Words / Index Term
Segment, tissue, watershed, cellular
References
[1] J. MacQueen, Some methods for classification and analysis of multivariate ob-servations, In Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, 281–297.
[2] A. K. Jain, M. N. Murty, and P. J. Flynn, “Data clustering: a review,” ACM Computing Surveys, vol. 31, issue 3, pp. 264-323, Sep. 1999.
[3] M. R. Anderberg, Cluster Analysis for Applications, Academic Press, Inc., New York. S. Ray and R. H. Turi., “Determination of number of clusters in k-means clus-tering and application in colour image segmentation,” Presented at 4th In-ter-national Conference on Advances in Pattern Recognition and Digital Tech-niques(ICAPRDT’99), Dec 1999.
[4] G. H. Ball, and D. J. Hall, ISODATA, A Novel Method of Data Analysis and Pattern Classification, Menlo Park, CA: Stanford Res. Inst. 1965.
[5] D. Comaniciu and P. Meer, “Mean shift: a robust approach toward feature space Analysis,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 5, pp. 603-619, May 2002.
[6] Y. Cheng, “Mean shift, mode seeking, and clustering,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 17, no. 8, pp. 790-799, Aug. 1995.
[7] Manjit Chintalapalli, “Image segmentation by Clustering”. Schmid, P.: Image segmentation by color clustering, http://www.schmid-saugeon.ch/publications.html, 2001.
[8] Rafael C. Gonzalez, Richard E.Woods and Steven L.Eddins, “Digital Image Processing”, Pearson Education, 2nd Edition
[9] Anil K. Jain, “Fundamentals of Digital Image Processing”,PHI.
Citation
Sachin Singh, J.P. Upadhyay, Shivangi Singh, "Analysis of Disease in plant leaves by image segmentation method", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.46-49, 2019.
Analysis of Indian Election using Random Forest Algorithm
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.50-57, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.5057
Abstract
The proliferation of social media in the recent past has provided end users a powerful platform to voice their opinions. Businesses (or similar entities) need to identify the polarity of these opinions in order to understand user orientation and thereby make smarter decisions. One such application is in the field of politics, where political entities need to understand public opinion and thus determine their campaigning strategy. Sentiment analysis on social media data has been seen by many as an effective tool to monitor user preferences and inclination. Sentiment analysis is the computational study of opinions, sentiments, evaluations, attitudes, views and emotions expressed in text. It refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive or negative sentiment. Sentiment analysis over Twitter offers people a fast and effective way to measure the public’s feelings towards their party and politicians. The primary issues in previous sentiment analysis techniques are classification accuracy, as they incorrectly classify most of the tweets with the biasing towards the training data. We performed data (text) mining on thousands of tweets collected over a period of a month that referenced five national political parties in India, during the campaigning period for general state elections in 2018. We made use of both supervised and unsupervised approaches. We utilized Dictionary Based, Random Forest algorithm as the main algorithm to build our classifier and classified the test data as positive, negative and neutral. We identified the sentiment of Twitter users towards each of the considered Indian political parties. The result of the analysis was for the Bhartiya Janta Party. Proposed algorithm predicted a chance that the BJP would win more elections in the general election. Therefore, here we adopt a lexicon based sentiment analysis method, which will exploit the sense definitions, as semantic indicators of sentiment. Our method also uses a negation handling as a pre-processing step in order to achieve high accuracy.
Key-Words / Index Term
Negation Handling; Sentiment Analysis; WordNet; SentiWordNet; Word Sense Disambiguation
References
[1] Pak and P. Paroubek, Twitter as a corpus for sentiment analysis and opinion mining Proceedings of the 7th International Conference on Language Resources and Evaluation, 2010, pp.1320-1326.
[2] “Number of monthly active Twitter users worldwide from 1st quarter 2010 to 3rd quarter 2017 “, Availabe at “https://www.statista.com/statistics/282087/number-ofmonthly- active-twitter-users/. “ [Online; accessed 4-December-2017].
[3] K. Bannister, “Sentiment Analysis”. Available: “ https://www.brandwatch.com/blog/understanding-sentimentanalysis/ ”.
[4] J. Dean and S. Ghemawat, “MapReduce: Simplified data processing on large clusters,” in Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation, Volume 6, pp. 10–10, 2004.
[5] Xiaohui Yu, Yang Liu, Jimmy Xiangji Huang, Aijun An, “Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA, vol. 24, No.4, APRIL 2012.
[6] Andrei Oghina, Mathias Breuss, Manos Tsagkias&Maarten de Rijke. (2012) Predicting IMDB movie ratings using social media. Proceedings of the 34th European conference on Advances in Information Retrieval, pp. 503-507.
[7] Liu, Bing, and Lei Zhang. "A survey of opinion mining and sentiment analysis." In Mining text data, pp. 415-463. Springer US, 2012.
[8] P. Burnap, R. Gibson, L. Sloan, R. Southern, and M. Williams, 140 characters to victory?: Using Twitter to predict the UK 2015 General Election Journal of Electoral Studies, vol. 41, pp. 230-233, 2016.
[9] M.P. Cameron., P. Barrett, and B. Stewardson, Can social media predict election results? Evidence from New Zealand Journal of Political Marketing, vol. 15, pp. 416-432, 2016.
[10] D. Gayo- Limits of electoral predictions using Twitter Proceedings of the 5th ICWSM, 2011, pp. 178 18.
[11] H.T. Le, G.R. Boynton, Y. Mejova, Z. Shafiq, and P. Srinivasan, Revisiting The American Voter on Twitter Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017, pp. 4507-4519.
[12] A. Pak and P. Paroubek, Twitter as a corpus for sentiment analysis and opinion mining Proceedings of the 7th International Conference on Language Resources and Evaluation, 2010, pp.1320-1326.
[13] B.O. Connor, R. Balasubramanyan, B.R. Routledge, and N.A. Smith,” From tweets to Polls: Linking Text Sentiment to public opinion time series” Proceedings of the 4th ICWSM, 2010, pp 122 129.
[14] Rui Xia, FengXu, ChengqingZong, QianmuLi, Yong Qi, and Tao Li, August 2015,” Dual Sentiment Analysis: Considering Two Sides of One Review”, IEEE transactions on knowledge and data engineering, Vol.27, AnNo.8.
[15] Pang, Bo, Lillian Lee, and Shivakumar Vaithyanathan. "Thumbs up?: sentiment classification using machine learning techniques." Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10. Association for Computational Linguistics, 2002.
[16] Go, Alec, Richa Bhayani, and Lei Huang. "Twitter sentiment classification using distant supervision." CS224N Project Report, Stanford 1.2009 (2009).
[17] Mohammad, Saif M., Svetlana Kiritchenko, and Xiaodan Zhu. "NRC Canada: Building the state-of-the-art in sentiment analysis of tweets."arXiv preprint arXiv:1308.6242 (2013).
[18] Pontiki, Maria, et al. "SemEval-2016 task 5: Aspect based sentiment analysis." ProWorkshop on Semantic Evaluation (SemEval-2016). Association for Computational Linguistics, 2016.
[19] Rosenthal, Sara, Noura Farra, and Preslav Nakov. "SemEval-2017 task: Sentiment analysis in Twitter." Proceedings of the 11th International Workshop on Semantic Evaluation (SemEval-2017). 2017.
[20] Yang, Ang, et al. "Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination." Security and Privacy in Social Networks and Big Data (SocialSec), 2015 International Symposium on. IEEE, 2015.
[21] Amitava Das, SivajiBandopadaya, SentiWordnet for Bangla, Knowledge Sharing Event -4: Task, Volume 2, 2010.
[22] Amitava Das, SivajiBandopadaya, ”SentiWordnet for Indian Languages”, Proceedings of the 8th Workshop on Asian Language Resources, Pages 5663, Beijing, China, August 2010.
[23] Yakshi Sharma, VeenuMangat, MandeepKaur, A practical Approach to Semantic Analysis of Hindi tweets”, 1st International Conference on Next Generation Computing Technologies(NGCT-2015), Dehradun, India,Page No(677-680), September 4-5, 2015.
[24] Yu Huangfu, Guoshiwu, Yu Su Jing Li, Pengfei Sun Jie Hu, “Än Improved Sentiment Analysis Algorithm for Chinese news”, 12th International Conference on Fuzzy Systems and Knowedge Discovery(FSKD), Page No(1366-1371), 2015.
[25] Purtata Bhoir, Shilpa Kolte, “Sentiment Analysis of Movie Reviews using Lexicon approach”, IEEE International Conference on Computational Intelligence and Computing Research, 2015.
Citation
Kirti Chouksey, Amit Ranjan, "Analysis of Indian Election using Random Forest Algorithm", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.50-57, 2019.
Application of Improved K-Medians for VM Migration
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.58-63, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.5863
Abstract
Use of Data mining techniques for managing Virtual Machine migration has been used in the past. Many researchers have applied different data mining techniques for the same and has been proven to be encouraging. Specially in cloud environment where thousands of virtual machines are employed at a time. For this proactive evaluation methods has been used by many researchers In this paper, such methods have been studied and improved k-median technique has been proposed for such migration. The results obtained discussed are showing better accuracy and performance.
Key-Words / Index Term
Cloud Computing, Fault Tolerance, Virtual Machines Migration, Resource Management
References
[1] R. Aluvalu, M. A. J. Vardhaman and J. Kantaria, "Performance evaluation of clustering algorithms for dynamic VM allocation in cloud computing," 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bangalore, 2017, pp. 1560-1563. doi: 10.1109/SmartTechCon.2017.8358627
[2] M. R. Desai and H. B. Patel, "Efficient Virtual Machine Migration in Cloud Computing," 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, 2015, pp. 1015-1019. doi: 10.1109/CSNT.2015.263
[3] Noshy, M., Ibrahim, A., & Ali, H. A. (2018). Optimization of live virtual machine migration in cloud computing: A survey and future directions. Journal of Network and Computer Applications, 110, 1–10. doi: 10.1016/ j.jnca.2018.03.002
[4] Anita Choudhary1, Mahesh Chandra Govil2, Girdhari Singh1, Lalit K. Awasthi3, Emmanuel S. Pilli1* and Divya Kapil4 A critical survey of live virtual machine migration techniques Journal of Cloud Computing: Advances, Systems and Applications Choudhary et al. Journal of Cloud Computing: Advances, Systems and Applications (2017) 6:23 DOI 10.1186/s13677-017-0092-1
[5] Nitishchandra Vyas1 , Prof. Amit Chauhan2 A Survey on Virtual Machine Migration Techniques In Cloud Computing International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 5, May 2016 ISSN 2319 – 4847
[6] Sandeep Kaur, Prof. Vaibhav Pandey A Survey of Virtual Machine Migration Techniques in Cloud Computing Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.6, No.7, 2015
Citation
Palash Soni, Ankur Mudgal, "Application of Improved K-Medians for VM Migration", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.58-63, 2019.
Authentication Using Improved Image Based OTP
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.64-67, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.6467
Abstract
Everything in our digital life requires an authentication mechanism to establish the identity of the user and protect his/her privacy. Since passwords are the most common form of authentication, our aim is to provide an alternative form that is not susceptible to the security risks and problems associated with passwords. However, the password may be foreseeable because it should be easy for users to memorize. Thus, an rival could get the passwords of users by brute-force attack in a short period of time. Two-Factor Authentication (TFA) can be used as a antidote to this weakness. One Time Password is mostly used authentication method now days. Our proposed idea is to enhance the security level of One Time Password by using improved and more secure image based OTP. In this method text fields are encrypted with image as key string to produce OTP. Proposed method keep resistance against token theft, man in the middle attack, reply attacks etc.
Key-Words / Index Term
Authentication, TFA, MFA, OTP, Image OTP
References
[1] Leeladhar, V. “Taking Banking services to the common man-financial inclusion”. Reserve Bank of India Bulletin, (2006).
[2] Davi, L., A. Dmitrienko, et al.,“Privilege Escalation Attacks on Android Information Security,” M. Burmester, G. Tsudik, S. Magliveras and I.Ilic, Springer Berlin /Heidelberg. 6531: 346-360, 2011.
[3] “Juniper Networks.Mobile Malware Development Continues To Rise,Android leads The Way”. Available at http://globalthreatcenter.com/?p=2492, 2011.
[4] Ausitn, Charles Frederick, Xingsheng Wan, and Andrew Wright. ”Two factor authentication”, U.S. Patent Application 13/748, 153
[5] K. Rieck, P. Stewin, and J.-P. Seifert ,“SMS-Based One-Time Passwords: Attacks and Defence” DIMVA 2013, LNCS 7967, Springer-Verlag Berlin Heidelberg 2013,pp. 150–159, 2013.
[6] “Man in the Middle” Available on http://securityblog.s21sec.com/2010/09/zeus-mitmo-man-in-mobile-i.html 2010
[7] Dr. Ananthi Shesashaayee, D. Sumathy” OTP Encryption Techniques in Mobiles for Authentication and Transaction Security” IJIRCCE Vol 2, Issue 10, Oct 2014.
[8] Mohammed Hamid Khan “OTP Generation using SHA-1” IJRITCC Vol 3, Issue 4, Apr 2015.
[9] Safa Hamdare, Varsha Nagpurkar, Jayashri Mittal “Securing SMS Based One Time Password Technique from Man in the Middle Attack”, (IJETT)-Volume 11 Issue 3- May 2014.
[10] Himika Parmar1, Nancy Nainan2 and Sumaiya Thaseen, “Generation 0f Secure One-Time Password Based On Image Authentication”, CS & IT-CSCP 2012.
[11] Pwc, “pwc cybersecurity,” Pricewaterhouse Coopers, 2016. [Online]. Available: http://www.pwc.com/gsiss. [Accessed 30 May 2016].
[12] TechTarget .(2015,March).Retrieved May 20, 2016,
[13] Hoyul Choi, Hyunsoo Kwon “A Secure OTP Algorithm Using a Smartphone Application”, IEEE-2015.
[14] Changsok Yoo, Byung-Tak Kang, Huy Kang Kim, ”Case study of the vulnerability of OTP implemented in internet banking systems of South Korea”, An International Journal Springer Science+Business Media New York 2014, 10.1007/s11042-014-1888-3, 2014.
Citation
Shweta Gupta, Prateek Gupta, Amit Ranjan, "Authentication Using Improved Image Based OTP", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.64-67, 2019.
Bandwidth Saving Approach For De-duplication
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.68-71, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.6871
Abstract
The critical challenge of cloud storage or cloud computing is the organization of the continuously growing volume of data. Data de-duplication fundamentally submits to the exclusion of redundant data. However, indexing of all data is quiet maintained should that data ever be required. In general the data de-duplication eradicates the duplicate copies of duplicate data. Data De-duplication mechanism attain popularity from the academics and industrial as well, because the storage utilization in cloud storage is more efficient to store the data with the help of the cloud service providers. In this method redundant data is replaced with a pointer to the unique data copy. This reduces the hardware used to store data and the bandwidth costs required for transmitting and receiving purposes. This paper represents study of de-duplication as well as proposes a method for saving bandwidth and storage.
Key-Words / Index Term
Cloud computing, de-duplication, saving storage, bandwidth reduction
References
[1] Yukun Zhou, Dan Feng, Wen Xia, Min Fu, Fangting Huang, Yucheng Zhang, Chunguang Li,“SecDep: A User-Aware Efficient Fine-Grained Secure Deduplication Scheme with Multi-Level Key Management”, IEEE Mass Storage Systems and Technologies (MSST) 2015 31st Symposium, Year – 2013.
[2] B.Tirapathi Reddy, U.Ramya, Dr.M.V.P.Chandra Sekhara Rao, “A comparative study on data deduplication techniques in cloud storage”, IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 18521-18530.
[3] Wen Xia, Hong Jiang, Dan Fen, “A Comprehensive Study of the Past, Present, and Future of Data De-duplication”, Vol. 104, No. 9, IEEE 2016
[4] Heidi Biggar. Experiencing data de-duplication: Improving efficiency and reducing capacity requirements. White paper February, The Enterprise Strategy Group, 2007
[5] Heidi Biggar. Experiencing data de-duplication: Improving efficiency and reducing capacity requirements. White paper February, The Enterprise Strategy Group, 2007.
[6] Benjamin. Zhu, Kai Li, and Hugo Patterson. Avoiding the disk bottleneck in the Data Domain deduplication file system. In Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST). USENIX, 2008.
[7] Xiang Zhang, Zhigang Huo, Jie Ma, and Dan Meng. Exploiting data deduplication to accelerate live virtual machine migration. In Proceedings of the 2010 IEEE International Conference on Cluster Computing (CLUSTER), pages 88–96. IEEE, September 2010
[8] Avani Wildani, Ethan L. Miller, and Ohad Rodeh. HANDS: A heuristically arranged non-backup in-line deduplication system. Technical Report UCSC-SSRC-12-03, University of California, Santa Cruz, March 2012
[9] Yoshihiro Tsuchiya and Takashi Watanabe. DBLK: Deduplication for primary block storage. In Proceedings of the 27th IEEE Symposium on Mass Storage Systems and Technologies (MSST), pages 1–5. IEEE, May 2011
[10] Ms. P. Minisha priya, Dr. S.Maheswari, “Performance Analysis of Cloud Storage Using Chunking Algorithm”, IEEE-2018
[11] Haonan Su, Dong Zheng, Yinghui Zhang, “An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage”, IEEE-2017
[12] Huijun Wu, Chen Wang, Kai Lu, Yinjin Fu,” One Size Does Not Fit All: The Case for Chunking Configuration in Backup Deduplication” Liming Zhu, IEEE-2018.
Citation
Roshni Jaiswal, Nagendra Kumar, "Bandwidth Saving Approach For De-duplication", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.68-71, 2019.
Cloud Resource Cost Minimization using PSO Algorithm
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.72-77, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.7277
Abstract
In the current scenario, Cloud computing carved itself as an emerging technology which enables the organization to utilize hardware, software and applications without any upfront cost over the internet. A very efficient computing environment is provided by cloud computing where the customers or several tenants are in need of multiple resources to be provided as a service over the internet. The challenge before the cloud service provider is, how efficiently and effectively the underlying computing resources like virtual machines, network, storage units, and bandwidth etc. should be managed so that no computing device is in under-utilization or over-utilization state in a dynamic environment. A good task scheduling technique is always required for the dynamic allocation of the task to avoid such a situation. A Particle Swarm Optimization (PSO) package is integrated in our simulator so as to achieve an effective result where PSO will randomly find the suitable Physical host in heterogeneous environment so as to transfer the load. Through this paper we are going to present the new Algorithm based on task scheduling technique, which will distribute the load effectively among the virtual machine so that the overall cost should be minimal. A comparison of this proposed Algorithm is performed on our simulator which shows that, this will outperform the existing techniques like EFT.
Key-Words / Index Term
Cloud Computing, Task Scheduling, Resource Optimization, EFT, PSO, QoS
References
[1]. W A. Karthick, E. Ramaraj, and R. Subramanian, “An efficient multi queue job scheduling for cloud computing,” in proc. IEEE world congress on computing and communication technologies (wccct), Trichirappalli, India, pp. 164-166, Mar. 2014.
[2]. P. Samal, and P. Mishra, “Analysis of variants in round robin algorithms for load balancing in cloud computing,“ International Journal of Computer Science and Information Technologies (IJCSIT), vol. 4 (3) , pp 416-419, 2013
[3]. P. Gupta, and N. Rakesh, “Different job scheduling methodologies for web application and web server in a cloud computing environment,” in Proc. IEEE Third International Conference on Emerging Trends in Engineering and Technology, Goa, India, pp. 569-572, Nov. 2010.
[4]. W. Saber, R. Rizk, W. Moussa, and A. Ghonem, "LBSR: Load balance over slow resources," in Proc. International Conference on Computer Applications & Technology (ICCAT), Cairo, Egypt, Jan. 28-29, 2017.
[5]. M. Brototi, K. Dasgupta, P. Dutta, "Load balancing in cloud computing using stochastic hill climbing-a soft computing approach," in Proc. Procedia 2nd International Conference on Computer, Communication, Control and Information Technology (C3IT), vol. 4, pp. 783–789,Feb. 2012.
[6]. G. Gan, T. Huang, S. Gao, “Genetic simulated annealing algorithm for task scheduling based on cloud computing environment,” in Proc. IEEE International Conference on Intelligent Computing and Integrated Systems (ICISS), pp. 60–63 ,2010.
[7]. P. Yi, H. Ding, and B. Ramamurthy, “A tabu search based heuristic for optimized joint resource allocation and task scheduling in grid/clouds,” in Proc. IEEE International Conference on Advanced Networks and Telecommunications Systems, Kattankulathur, India, pp. 15–18, Dec. 2013.
[8]. Singh, S., Chana, I.: Q-aware: quality of service based cloud resource provisioning. Comput. Electr. Eng. Elsevier. doi:10.1016/j.compeleceng.2015.02.003
[9]. Chana, I., Singh, S.: Quality of service and service level agreements for cloud environments: issues and challenges. In: Cloud Computing-Challenges, Limitations and R&D Solutions, pp. 51–72. Springer International Publishing (2014).
[10]. Neeta Patil, Deepak Aeloor,” A REVIEW – DIFFERENT SCHEDULING ALGORITHMS IN CLOUD COMPUTING ENVIRONMENT”, IEEE 2017.
[11]. Tripathi, P. K., Bandyopadhyay, S., & Pal, S. K. (2007). Multiobjective particle swarm optimization with time variant inertia and acceleration coefficients. Information Sciences, 177(22), 5033-5049.
[12]. Shaobin Zhan,Hongying Huo Shenzhen “Improved PSO based Task Scheduling Algorithm in Cloud Computing”, Institute of Information Technology, Shenzhen,China Journal of Information and Computational Science 9:13 (2012) 3821–3829.
[13]. Ali Almaamari and Fatma A.Omara, “Task Scheduling Using PSO Algorithm in Cloud Computing Environments”, International Journal of Grid Distribution Computing.Vol. 8 No.5,(2015),pp.245-256.
[14]. Sandeep Rana,Sanjay Jasola,Rajesh Kumar, ”A review on Particle Swarm Optimisation algorithms and their applications to data Clustering”, Artif Itell Rev(2011) Springer(2010) 35:211-222.
[15]. S.Uma,K.R.Ganhi,E.Kirubakaran ,”A hybrid PSO with dynamic inertia weigh and GA approach for discovering classification rule in data mining”, International Journal of
Computer Applications, Vol.40.(2012).
[16]. A.I.Awada, A.El-Hefnawy, H.M.Abdel kader, ”Enhanced Particle Swarm Optimisation Task Scheduling in Cloud Computing Envionments”,International Conference on communication, management and Information Tchnology(ICCMIT 2015).Procedia Computer Science.
[17]. J.C.Bansal,P.K.Singh,Mukesh Saraswat,Abhishek Verma,Shimpi Singh Jadon,Ajith Abraham,”Inertia Weight Strategies in Particle Swarm Optimisation”,978-1-4577-1123-7 IEEE 2011.
[18]. Lei Zhang,Yuehui Chen,Runyuan Sun,Shan Jing and Bo Yang,”A Task Scheduling Algorithm Based on PSO for Grid Computing”, International Journal of Computational Intelligence Research. ISSN 0973-1873 Vol.4,No.1(2008),pp.37-43.
[19]. Jemini Priyadharshini, L.Arockiam,” PBCOPSO:A Parallel Optimisation Algorithm for Task Scheduling in Cloud Environment”, Indian Journal of Science and Technology, Vol 8(16), July 2015.
[20]. Solmaz Abdi, Seyyed Ahmad Motamedi, Saeed Sharifian.”Task Scheduling using Modified PSO Algorithm in Cloud Computing Environment”. International Conference on Machine Learning, Electrical and Mechanical Engineering(ICMLEME ‘2014)Jan.8-9,2014.Dubai(UAE).
[21]. Wang.Yu.,Li Bin.,Thomas.,Wang Jian yu.,Yuan Bo.,Tian Qiongjie,”Self adaptive learning based particle Swarm Opimisation”,Informations Science 181,4515-4538.2011.
[22]. Pooranian Z, Shojafar M, Abawajy JH,Abraham A.”An efficient metatheuristic algorithm for grid Computing”,J Comb Optim 2013:1-22.
[23]. Sivanandam SN, Visalakshi P,”Multiprocessor Scheduling Using Hybrid Particle Swarm Optimisation wit dynamically- Varying Inertia”, Int J Computer Sci Appl 4(3):95-106.
[24]. Izakian H.Ladani BT, Zamanifar K, Abraham A.”A novel particle swarm optimisation approach for grid job Scheduling”, Inf Syst Techno manage, Vol.31.Springer:2009.p.100-9.
[25]. Xingquan Zo, Guoxiang Zhang,Wei Tan,”Self Adaptive Learning PSO-Based Deadline Constrained Task Scheduling for Hybrid Iaas Cloud”,IEEE Transactions on Automation Science and Engineering ,Vol.11,No.2.April 2014.
Citation
Garima Singh Thakur, Sapna Choudhary, "Cloud Resource Cost Minimization using PSO Algorithm", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.72-77, 2019.
Computation on Bio-Informatics
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.78-81, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.7881
Abstract
Bioinformatics is an interdisciplinary field mainly involving molecular biology and genetics, computer science, mathematics, and statistics. Data intensive, large-scale biological problems are addressed from a computational point of view. The most common problems are modelling biological processes at the molecular level and making inferences from collected data. As an emerging discipline, it covers a lot of topics from the storage of DNA data and the mathematical modelling of biological sequences, to the analysis of possible mechanisms behind complex human diseases, to the understanding modelling of the evolutionary history of life, etc. It studies the DNA and genetic information.
Key-Words / Index Term
Bio-informatics, Prokaryotic, Eukaryotic, Peptides, genomics, pretomics, HGP
References
[1] Y. Lin () Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China e-mail: ylin@math.tsinghua.edu.cn R. Jiang MOE Key Laboratory of Bioinformatics and Bioinformatics Division, TNLIST/Department of Automation, Tsinghua University, Beijing 100084,
[2] M.Q. Zhang () Department of Molecular and Cell Biology, The University of Texas at Dallas, 800 West Campbell Rd, RL11, Richardson, TX, USA 75080 Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China e-mail: mzhang@cshl.edu A.D. Smith Cold Spring Harbor Laboratory, Cold Spring Harbor, NY, USA
[3]Unsupervised learning of multiple motifs in biopolymers using expectation maximization. Mach Learn 21(1–2):51–80 4. Bairoch A (1992) PROSITE: a dictionary of site and patterns in proteins. Nucl Acids Res 20:2013–2018
[4] R. Jiang et al. (eds.), Basics of Bioinformatics: Lecture Notes of the Graduate Summer School on Bioinformatics of China, DOI 10.1007/978-3-642-38951-1 3, © Tsinghua University Press, Beijing and Springer-Verlag Berlin Heidelberg 2013
[5] Zvelebil M, Baum J (2007) Understanding bioinformatics. Garland Science, New York, NY. ISBN 978-0815340249
[6] J. Chen and S. Lonardi, Biological Data Mining. Chapman & Hall/ CRC, 2010
[7] Mitton, Jeffery, B (2002). "Heterozygous Advantage". eLS. doi:10.10.38/npg.els.0001760.
[8] Keane MG; Pyeritz RE (May 2008). "Medical management of Marfan syndrome". Circulation. 117 (21): 2802–13. doi:10.1161/CIRCULATIONAHA.107.693523. PMID 18506019.
[9] Walker FO (2007). "Huntington`s disease". Lancet. 369 (9557): 218–28 [221]. doi:10.1016/S0140-6736(07)60111-1. PMID 17240289.
[10] Williams T. N.; Obaro S. K. (2011). "Sickle cell disease and malaria morbidity: a tale with two tails". Trends in Parasitology. 27 (7): 315–320. doi:10.1016/j.pt.2011.02.004.
[11] Kumar A* and Chordia N, School of Biotechnology, Devi Ahilya University, Khandwa Rd, Indore, Indore 452001,India,
Tel: +21674241888; Fax: 07312527532; E-mail:ak_sbt@yahoo.com
Citation
Shubham Naga, Sapna Choudhary, "Computation on Bio-Informatics", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.78-81, 2019.
Cyber Bullying Detection In Hinglish Language On Social Media
Review Paper | Journal Paper
Vol.07 , Issue.10 , pp.82-86, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.8286
Abstract
Now a day, most of people are using twitter, face book and micro blogging sites. They share their opinion, feeling for particular topic through comment, review. The volume of data generated daily is very large. So, it is important to analyse the data for gaining information from that. Sentimental analysis is used for mining various types of data for opinion through text analytics. It can be negative, positive or impartial. Twitter became one of the largest platform for people to show their opinion, share their thoughts and consistently updated about any organization, events etc. So, data collected is huge somewhat called big data. To process such a big data we need framework that manages this entire thing. In this paper, we attempt to perform cyber bullying detection in a supervised way by proposing a learning framework. More specifically, we first investigate whether sentiment information is correlated with cyber bullying behavior.
Key-Words / Index Term
Cyber bullying, social media, attacks, security, cyber crime
References
[1] Ditch the Label. The annual cyberbullying survey. http://ditchthelabel.org/downloads/cyberbullying2013.pdf. [Online; accessed January-2016].
[2] S. Hinduja and J. W. Patchin, “Bullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying,” Youth Violence And Juvenile Justice, vol. 4, 2006, pp. 148–169.
[3] H. Cowie. Cyberbullying and its impact on young people`s emotional health and well-being. The Psychiatrist, 37(5):167-170, 2013.
[4] D. Boyd, Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life. MacArthur Foundation Series on Digital Learning, Youth, Identity, and Digital Media, David Buckingham, Ed., MIT Press, Cambridge, MA, 2007
[5] Cybersafetysolutions.com. What can i do if i am cyber bullied. http://www.cybersafetysolutions.com.au-/factwhat- to-do-if-i-am-bullied.shtml. [Online; accessed January-2016]
[6] F. Mishra, M. Saini, and S. Solomon, Ongoing and online: Children and youth’s perceptions of cyber bullying. Children Youth Services Rev. 31, 12, 1222–1228, 2009
[7] K. Dinakar, R. Reichart, and H. Lieberman. Modeling the detection of textual cyberbullying. In The Social Mobile Web, 2011.
[8] F. Mishna, M. Saini, and S. Solomon, Ongoing and online: Children and youth’s perceptions of cyber bullying. Children Youth Services Rev. 31, 12, 1222–1228, 2009.
[9] K. Dinakar, R. Reichart, and H. Lieberman. Modeling the detection of textual cyberbullying. In The Social Mobile Web, 2011.
[10] Bharti, S. K., Babu, K. S., & Jena, S. K, “Parsing-based sarcasm sentiment recognition in twitter data,” 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining(ASONAM), Paris, 2015, pp. 1373-1380.
[11] M. Bouazizi and T. Otsuki Ohtsuki, "A Pattern-Based Approach for Sarcasm Detection on Twitter," in IEEE Access, vol. 4, pp. 5477- 5488, 2016.
[12] Rajadesingan, A., Zafarani, R., & Liu, H. (2015). “Sarcasm detection on twitter: A behavioral modelling approach.” 2015 WSDM - Proceedings of the 8th ACM International Conference on Web Search and Data Mining, pp. 97-106.
[13] Tungthamthiti, P., Shirai, K., & Mohd, M. (2014). “Recognition of sarcasm in tweets based on concept level sentiment analysis and supervised learning approaches.” 28th Pacific Asia Conference on Language, Information and Computation, PACLIC 2014, pp. 404-413.
[14] Riloff, Ellen & Qadir, A & Surve, P & De Silva, L & Gilbert, N & Huang, R. “Sarcasm as contrast between a positive sentiment and negative situation.” Proceedings of EMNLP 2013, pp. 704-714.
[15] Clews P. & Kuzma J.(2017). “Rudimentary Lexicon Based Method for Sarcasm Detection.” International Journal of Academic Research and Reflection, 5(4), 24-33.
[16] N.Vijayalaksmi, Dr. A.Senthilrajan. “A hybrid approach for Sarcasm Detection of Social Media Data.” International Journal of 0Scientific and Research Publications (IJSRP), Volume 7, Issue 5, May 2017.
Citation
Anurag Upadhyay, Manish Maheshwari, "Cyber Bullying Detection In Hinglish Language On Social Media", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.82-86, 2019.
Design and Implementation of Low Power and Area Efficient 4 Bit ALU Using MGDI Technique
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.87-90, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.8790
Abstract
In this paper, the design of a 4-Bit Arithmetic Logic Unit (ALU) using Modified Gate Diffusion Input technique is being done which is implemented using minimum transistor full adder and also adapts hardware reuse method which has advantages of minimum transistors requirement, more switching speed and low power consumption with respect to the conventional CMOS techniques. 4-Bit Arithmetic Logic Unit (ALU) is being implemented with MGDI technique in DSCH 3.5 and layout generated in Microwind tool. The Simulation is done using 65 nm technology at 1.2 v supply voltage The results show that the proposed design consume less power uses less number of transistors, while achieving full swing operation compared to previous work
Key-Words / Index Term
MGDI, PTL, CMOS, Switching Delay, Power dissipation
References
[1] A. Morgenshtein, A. Fish, and I. Wagner, “Gate-diffusion input (GDI):a power-efficient method for digital combinatorial circuits,” IEEETransactions on Very Large Scale Integration (VLSI) Systems IEEE Trans.VLSI Syst., vol. 10, no. 5, pp. 566–581, 2002.
[2] A. Morgenshtein, I. Shwartz, and A. Fish, “Gate Diffusion Input (GDI)logic in standard CMOS Nanoscale process,” 2010 IEEE 26th Convention of Electrical and Electronics Engineers in Israel, 2010.
[3] A. Morgenshtein, V. Yuzhaninov, A. Kovshilovsky, and A. Fish, "Fullswing gate diffusion input logic—Case-study of low-power CLA adder design," Integration, the VLSI Journal, vol. 47, no. 1, pp. 62–70, Jan. 2014.
[4] N. Weste, D. Harris, CMOS VLSI Design a Circuits and Systems Perspective, 4th Ed, Addison-Wesley, 2011.
[5] M. Shoba, R. Nakkeeran, "GDI based full adders for energy efficient arithmetic applications", Engineering Science and Technology, an International Journal, vol. 19, no. 1, pp. 485–496, Mar. 2016
[6] Chandra Srinivasan, “Arithmetic Logic Unit (ALU) Design Using Reconfigurable CMOS Logic,” M.S. Thesis, Dept. of Electr. & Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA 2003.
[7] Vivechana Dubey, Ravimohan Sairam, “An Arithmetic and Logic Unit Optimized for Area and power” IEEE Fourth International Conference on Advanced Computing & Communication Technologies.,pp.330-334, 2014.
[8] G. Sree Reddy, K. V. Koteswara Rao,“32-Bit Arithmetic and Logic Unit Design With Optimized Area and Less Power Consumption By Using GDI Technique” International Journal of Research In Computer Applications and Robotics, Vol.3 Issue.4, pp. 51-66, April 2015.
[9] S. Usha, M. Rajendiran, A. Kavitha, “Low Power Area Efficient ALU With Low Power Full Adder” IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1500- 1505, 2016.
[10] Mahmoud Aymen Ahmed, M. A. Abdelghany " Low Power 4-Bit Arithmetic Logic Unit Using Full-Swing GDI Technique ", pp 193-196, 2018.
Citation
Nitin Singh , "Design and Implementation of Low Power and Area Efficient 4 Bit ALU Using MGDI Technique", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.87-90, 2019.
Election Prediction On Social Media
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.91-96, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.9196
Abstract
Social media today is the most popular medium of communication, due to its immediacy. According to Statista, the number of social media users in India is 226 million (2018) and this is expected to go up to 336 million by 2021. The 2014 Lok Sabha elections witnessed a significant usage of social media by political parties and leaders, especially the BJP and their then PM designate Narendra Modi to disseminate their ideology, policies and programmes and highlight the shortcomings / corruption-related scandals of the previous regime. All this helped in creating what is called the ‘Modi wave’, and led to BJP sweeping the 2014 polls. After 2014, most political parties realised the importance of social media and registered their presence on platforms like Facebook, Twitter, Instagram. About 65 percent of India’s population is within the age group 18-35. This group spends almost 4 hours on the internet. Political parties are therefore targeting this group of voters for mobilisation, as most of them use Twitter / Facebook to consume news. This paper represents various issues, methodologies, techniques and research work carried out for election prediction.
Key-Words / Index Term
Social media, performance indicators, sentiment analysis, prediction
References
[1]Kaplan, A.M and Haenlein, M. “Users of the world, unite! The challenges and opportunities of Social Media.” Business Horizons 53, 59-68, 2010.
[2]Hinton, S. and Hjorth, L. “Understanding Social Media” 1st edition, SAGE Publications, UK, London, 2013.
[3] Gil de Zúñiga, H., Molyneux, L. & Zheng, P. “Social Media, Political Expression, and Political Participation: Panel Analysis of Lagged and Concurrent Relationships” Journal of Communication 64 612–634 International Communication Association, 2014.
[4] Hong, S., and Nadler, D.” Does the early bird move the polls?: the use of the social media tool’twitter’by us politicians and its impact on public opinion.” In Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times, ACM, pp. 182–186, 2011.
[5] R. Effing, J. van Hillegersberg, and T. Huibers , “Social Media and Political Participation: Are Facebook, Twitter and YouTube Democratizing Our Political Systems?. “,ePart 2011, LNCS 6847, pp. 25–35, 2011.
[6] Lei Wang and John Q Gan, “Prediction of the 2017 French Election Based on Twitter Data Analysis” , IEEE 2017.
[7] Munaza Ramzan, E. Annapoorna, Shikha Mehta, “Are Tweets The Real Estimators Of Election Results?”, Proceedings of 2017 Tenth International Conference on Contemporary Computing IEEE 2017.
[8] Onur Varol, Emilio Ferrara, Filippo Menczer, Alessandro Flammini, “Early Detection of Promoted Campaigns on Social Media”, arXiv:1703.07518v1 [cs.SI] 22 Mar 2017.
[9] Ben Ltaifa Ibtihela,, Hlaoua Lobnab, Ben Jemaa Maher, “A Semantic Approach for Tweet Categorization”, 22nd International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Elsevier 2018.
[10] Parama Fadli Kurnia, Suharjito, “Business Intelligence Model to Analyze Social Media Information”, 3rd International Conference on Computer Science and Computational Intelligence 2018.
[11] Kaplan, A.M., Haenlein, M. “Users of the world, unite! The challenges and oppurtunities of Social Media”. Business Horizons, 53, 59-68. 2010.
[12] Constantinides, E., Fountain, S.J. . “Web 2.0: Conceptual foundations and marketing issues”. Journal of Direct, Data and Digital Marketing Practice, 9(3), 231244. 2008.
[13] Statista , ”U.S. Social Media visit share. Retrieved from Statista”, 2015.
[14] “Social Media KPIs”, measuring your social media and a kpi-cheat sheet, 2014.
[15] Neha S. Joshi, Suhasini A. Itkat, “ A Survey on Feature Level Sentiment Analysis” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014,
[16] Devika M D, Sunitha C, Amal Ganesha, “Sentiment Analysis:A Comparative Study On Different Approaches”, ICRTCSE Elsevier 2016
[17] Trusov, M., Bucklin, R.E., & Pauwels, K., “Monetary Value of word-of-mouth marketing in online communities. Quantifying the Effectiveness of Word-Of-Mouth Marketing”, 2009
[18] Akrimi, Y., & Khemakhem, R. “What Drive Consumers to Spread the Word in Social Media? Journal of Marketing Research & Case Studies, 1-14. “, http://dx.doi.org/10.5171/ 2012.
[19] Tumasjan, A., T. Sprenger, P. Sandner, & I. Welpe, “Predicting elections with Twitter: What 140 characters reveal about political sentiment”. In Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media, 178–185, 2010.
[20] Woolley, A.W., Chabris, C.F., Pentland, A., Hashmi, N., & Malone, T.W., “Evidence for a Collective Intelligence Factor in the Performance of Human Groups.” Science, 330, 686, 2010
[21] Sauter,T, & Bruns, A., “Exploring Emotions on Polarity, Conservativism and Public Performance in the Twitter Debate on Australian Politics”. Selected Papers of Internet Research, 2013.
[22] Aindrila Biswas, Nikhil Ingle and Mousumi Roy, “Influence of Social Media on Voting Behavior”, Journal of Power, Politics & Governance , Vol. 2, No. 2, pp. 127-155, June 2014.
Citation
Praveen Kumar Singh, Anurag Seetha, "Election Prediction On Social Media", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.91-96, 2019.