Implementation and Challenges of Cognitive IoT
Review Paper | Journal Paper
Vol.07 , Issue.16 , pp.60-64, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.6064
Abstract
The current research on IOT deals with how the individual things, devices will enable themselves to see hear and smell, it also deals with how these objects can be connected. But for major applications of our day to day life, just connecting the devices is not enough, the objects need to have the capability of learning, thinking and understanding. In other words, the objects need to think like brain of human being. That is adding cognitive feature to the connected devices. In this work, a detailed survey of the present scenario is done and the challenges ahead for cognitive IoT is discussed.
Key-Words / Index Term
Cognitive Internet of Things
References
[1] Amit Sheth, “Internet of Things to Smart IoT Through Semantic, Cognitive, and Perceptual Computing”, IEEE Computer Society, March/ April 2016
[2] Floriano De Rango, Domenico Barletta, Alessandro Imbrogno, “Energy aware Communication between Smart IoT Monitoring Devices”, 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), July 2016.
[3] Seraphin B. Calo, Maroun Touna, Dinesh C. Verma, Alan Cullen, “Edge Computing Architecture for applying AI to IoT”, IEEE International Conference on Big Data (BIGDATA), 2017.
[4] Shuo Feng, Peyman Setoodeh, and Simon Haykin, “Smart Home: Cognitive Interactive People-Centric Internet of Things”, IEEE Communications magazine, February 2017.
[5] Cory Henson, Amit Sheth, Krishnaprasad Thirunarayan, “Semantic Perception: Converting Sensory Observations to Abstractions”, IEEE Computer Society, March 2012.
[6] Amit Sheth, Pramod Anantharam, Cory Henson, “Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience”, IEEE Computer Society, March 2016.
[7] Qihui Wu, Guoru Ding, Yuhua Xu, Shuo Feng, Zhiyong Du, Jinlong Wang, Keping Long, “Cognitive Internet of Things: A New Paradigm Beyond Connection”, IEEE Internet of Things journal, Vol 1, No 2, April 2014.
Citation
Vaishak Sundaresh, Surekha K Basavanagowda, T G Basavaraju, "Implementation and Challenges of Cognitive IoT", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.60-64, 2019.
Review of Cloud Storage Techniques
Review Paper | Journal Paper
Vol.07 , Issue.16 , pp.65-68, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.6568
Abstract
The term “cloud” is very common term and is used in both biological plus technical fields. During rainy reasons cloud plays a very important role in the life of human beings as it stores all molecules for showering the water and humans can preserve the water for future living. In the same way, in technical fields it offers a list of facilities for the user with respect to data such as data storage, security to data, data sharing, and data preservation for the future, updation and maintenance. Cloud is one such platform which allows the user to store the data and application together at one place and it is made available irrespective of the place of access at any time. Cloud can be used by an individual or a company for many purposes such as storing, retrieving and sharing documents, photos, e-mails, etc. The big question which always runs on every researcher’s mind is the need of cloud. The main problem is to find a place to store the huge growing amount of data. According to a survey done by Peter Lyman and HAL R Varian, world produces approximately two Exabyte’s of data every year which means that each individual contribution is around 250 megabytes. So it is possible to fit this much amount of data in any storage medium like papers, magnetic tapes, disks and drives. This paper gives a brief insight into the existing cloud storage techniques which are used by organizations.
Key-Words / Index Term
IAAS, PAAS, SAAS, GDS-LC, SPMCloud, etc
References
[1]. Anthony V. Velte, Toby J. Velte, Robert Elsenpeter, “Cloud Computing-A Practical Approach”, McGraw-Hill Companies, in 2010.
[2]. Rajkumar Buyya, James Broberg, Andrzej Goscinski, “Cloud Computing-Principles and Paradigms”, John Wiley & Sons, in 2011.
[3]. Abhishek Parakh, Subhash Kak, “Online data storage using implicit security”, an Elsevier Article Published in May 2009.
[4]. Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, “Identity-Based Authentication for Cloud Computing”, Springer- Verlag Berlin Heidelberg 2009.
[5]. Hao Jin, Ke Zhou, Hong Jiang, “Dynamic and Public Auditing with Fair Arbitration for Cloud Data”, an Article in IEEE Transactions on Cloud Computing, February 2016.
[6]. Swapnali More, Sangita Chaudhari, “Third Party Public Auditing Scheme for Cloud Storage”, an Article in Procedia Computer Science (Elsivier), December 2016.
[7]. Bibing Hou and Feng Chen, “GDS-LC: A Latency and Cost Aware Client Caching scheme for Cloud Storage”, ACM Transactions on Storage, November 2017.
[8]. Chuan Qin, Jingwei Li and Patrick P.C. Lee, “The Design and Implementation of a Rekeying Aware Encrypted Deduplication Storage System”, ACM Transactions on Storage, February 2017.
[9]. Michael Vrable, Stephen Savage, Geoffrey M. Voelker, “Cumulus: File System Backup to Cloud”, ACM Transactions on Storage, December 2009.
[10]. Alysson Bessani Miguel Correia, Bruno Quaresma, Fernando Andre and Paulo Sousa, “DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds”, ACM Transactions on Storage, December 2013.
[11]. Luis Angel, D. Bathen and Nikhil D. Dutt, “SPM Cloud: Towards the Single-Chip Embedded ScratchPad Memory-Based Storage Cloud”, ACM Transactions on Design Automation of electronic system, in June 2014.
[12]. Marcus Branden Burger, Christian Cachin and Nikola Knezevic, “Don’t trust the cloud, verify: Integrity and Consistency for object stores”, ACM Transactions on privacy and security, July 2017.
[13]. Hasan Mohamed Ibou, “OpenStack: The Cloud OS”, A Technical Report, October 2013.
[14]. Hui Tian , Yuxiang Chen , Chin-Chen Chang , Hong Jiang , Yongfeng Huang , Yonghong Chen , Jin Liu, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, IEEE Transactions on Services Computing, Volume: 10 , Issue: 5 , PP: 701-714,Sept.-2017.
[15]. Jia Yu , Kui Ren , Cong Wang , Vijay Varadharajan, “Enabling Cloud Storage Auditing With Key-Exposure Resistance”, IEEE Transactions on Information Forensics and Security, Volume: 10 , Issue: 6 , PP: 1167-1179, June 2015.
[16]. Bo Mao ; Hong Jiang , Suzhen Wu , Lei Tian, “Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud”, IEEE Transactions on Computers , Volume: 65 , Issue: 6 , PP: 1775 – 1788, June,2016.
[17]. Lan Zhou , Vijay Varadharajan , K. Gopinath, “A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records”, The Computer Journal ( Volume: 59 , Issue: 11 , Nov. 2016.
Citation
Madhura K, Alamelu Mangai J, "Review of Cloud Storage Techniques", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.65-68, 2019.
A Survey on Interlinking in Linked Open Data
Survey Paper | Journal Paper
Vol.07 , Issue.16 , pp.69-74, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.6974
Abstract
Semantic Web interconnects diverse data sources on the Web, thereby presenting a global database of Web resources. Interlinking is an important activity in establishing semantic links between applications on the World Wide Web. During the interlinking activity, first, link discovery is done to identify the datasets to be linked, and subsequently, link generation is done to generate the matching links, based on appropriate comparator algorithms. The paper presents a literature review on linked open data, focusing on the interlinking activity. Furthermore, the paper presents a novel map-reduce based approach for comprehensively presenting the interlinking algorithms. Lastly, the paper throws some insights on the LOD datasets available in the LOD Cloud 2018.
Key-Words / Index Term
Semantic Web, Linked open data, Resource description framework, LOD Cloud, Hadoop Map-Reduce
References
[1]. Semantic Web techopedia [Online] Available: https://www.techopedia.com/definition/27961/semantic-web
[2]. S. S. Rao and A. Nayak, LinkED: A Novel Methodology for Publishing Linked Enterprise Data”, CIT. Journal of Computing and Information Technology, Vol. 25, No. 3, 191–209 191 doi:10.20532/cit.2017.1003477 September 2017.
[3]. State of the LOD Cloud. [Online; accessed June-2018]. https://lod-cloud.net/#diagram
[4]. C. Bizer , T. Heath, and T. Berners-lee, ``Linked Data ‒ The Story So Far``, International Journal on Semantic Web and Information Systems, vol. 5, no. 3, pp. 1‒22, 2009. http://dx.doi.org/10.4018/jswis.200908191
[5]. G. Antoniou and F. Van Harmelen.”A Semantic Web Primer” MIT Press second edition 2008.
[6]. T. Berners-Lee, “ Linked data”,2006. [Online] Available: http://www.w3.org/DesignIssues/LinkedData.html
[7]. L. Jie, L. Wei and L. Liming, “Linked Open Data Query Based on Natural Language”, Chinese Journal of Electronics Vol.26, No.2, March 2017
[8]. https://www.researchgate.net/publication/315323934_Linked_Open_Data_Query_Based_on_Natural_Language
.
[9]. C. K. Pereira, S. W. Matsui Siqueira et al., “Linked data in Education: a survey and a synthesis of actual research and future challenges”, IEEE Transaction Journal Citation information: DOI 10.1109/TLT.2017.2787659, 1939-1382, 2017 https://ieeexplore.ieee.org/document/8240662
[10]. W. Beek, L. Rietveld, S Schlobach and F. V. Harmelen, "LOD Laundromat Why the Semantic Web Needs Centralization (Even If We Don’t Like It)”, IEEE Journals and magazines Systems, vol. 20, no. 2, pp. 78-81, 2016. https://ieeexplore.ieee.org/document/7420493
[11]. D2R Server: Accessing databases with SPARQL and as Linked Data. [Online] Available: http://d2rq.org/d2r-server#features
[12]. A. Zaveri et al., ``Quality Assessment for Linked Data: A Survey``, Semantic Web Journal, vol. 7, no. 1, pp. 63‒93, 2015. http://dx.doi.org/10.3233/SW-150175
[13]. https://www.completesoftware.net/2012/02/interlinking-of-data-what-is-it-and-why-is-it-important/
[14]. M. Rani H G et al, “An Investigate Study on the Quality Aspects of Linked Open Data”, ACM ISBN 978-1-4503-6576-5/18/10 DOI: http://doi.org/10.1145/3291064.3291074
[15]. E. Rajabi et al, “Interlinking Educational Data: An Experiment with GLOBE Resources”, 2013 ACM 978-1-4503-2345-1/13/11 http://dx.doi.org/10.1145/2536536.2536588
[16]. W. Leyh et al,”Interlinking Standardized OpenStreetMap Data and Citizen Science Data in the OpenData Cloud”, Springer International Publishing AG 2018 DOI 10.1007/978-3-319-60366-7_9
[17]. https://www.lesliesikos.com/lod-datasets/
[18]. Z. Zhang et al, “An unsupervised data-driven method to discover equivalent relations in large linked datasets”, Semantic Web 8 2017, 197-223, DOI 10.3233/SW-150193.
[19]. J. Debattista et al, “ Luzzu- A Methodology and Framework for Linked Data Quality Assessment”, ACM Journal of Data and Information Quality, Vol. 8, No. 1, Article 4, October 2016.
[20]. T. Kawamura, A ohsuga, “Applying Linked Open Data to Green Design”, IEEE Journal, Volume 30, issue 1, page 28-35 2015. https://ieeexplore.ieee.org/document/6916497
[21]. R. Stojanov and S Gramatikov et al, “ Linked Data Authorization Platform”, IEEE Journal, Volume 6, page s :1189-1213, Year 2018. https://ieeexplore.ieee.org/document/8120116
[22]. S. Subhashree, R Irny, et al, “Review of Approaches for Linked Data Ontology Enrichment", Springer ICDCIT 2018, LNCS 10722, pp. 27–49, 2018 https://doi.org/10.1007/978-3-319-72344-0_2
[23]. A. Subramanian and S. Srinivasa, “Semantic Integration of Structured Data Powered by Linked Open Data”, ACM. ISBN 978-1-4503-3293-4/15/07 July 13 - 14, 2015, http://dx.doi.org/10.1145/2797115.2797130
[24]. A. Torre-Bastida et al, “A Rule Based Transducer for Querying Incompletely Aligned Datasets”, ACM transactions on the web, vol. 12, No. 4, Article 23. Date September 2018.
[25]. Radulovic, F., Mihindukulasooriya, N., García-Castro, R., &Gómez-Pérez, A. 2018. A comprehensive quality model for Linked Data. Semantic Web, 9, 3-24. DOI=10.3233/SW- 170267
[26]. https://www.journaldev.com/8734/introduction-to-bigdata
[27]. https://www.tutorialspoint.com/hadoop/hadoop_mapreduce.htm
[28]. Stravoskoufos, K., Petrakis, E.G., Mainas, N., Batsakis, S., & Samoladas, V. 2016. SOWL QL: Querying Spatio-Temporal Ontologies in OWL. Journal on Data Semantics, 5, https://link.springer.com/article/10.1007/s13740-016-0064-5
[29]. http://linkeddatabook.com/editions/1.0/
Citation
Shweta S A, Shreyas Suresh Rao, "A Survey on Interlinking in Linked Open Data", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.69-74, 2019.
A Survey on Performance Optimization of Cache Memory in the Individual Nodes of Wireless Sensor Networks
Survey Paper | Journal Paper
Vol.07 , Issue.16 , pp.75-80, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.7580
Abstract
The wireless networks are constrained networks with limited battery backup and memory. The nodes in the Wireless Sensor Network use memory buffers to keep track of the sequence number of the Transport layer segments. This helps to resend the packets during the time of packet loss. The fast retransmission of the lost packets is done by nodes of Wireless Sensor Network with the help of fastest form of memory called as cache memory. This helps to achieve reliability. Understanding the working of cache memory in fulfilling such a great responsibility is a challenge. The survey has been conducted to understand the different types of processors and memories that could be used in the nodes of wireless sensor networks. An overview of optimization methods on cache memory and cache mapping mechanisms to improve the performance of the cache are also studied.
Key-Words / Index Term
Wireless Sensor Networks (WSN), Cache memory, performance optimization, survey
References
[1] Waltenegus Dargie and Christian Poellabauer, “Fundamentals of Wireless sensor theory and practice”
[2] Safaa S. Omran and Ibrahim A. Amory, “Design of Two-Dimensional Reconfigurable Cache memory using FPGA”, IEEE 10.1109/ICEDSA.2016.7818502, 2016,
[3] Santana Gil, A. D. Benavides Benitez, J.I., Hernandez Calviño, M. , Herruzo Gómez, E , “Reconfigurable Cache implemented on an FPGA”, International Conference on Reconfigurable Computing, IEEE 10.1109/ReConFig.2010.26, 2010
[4] Dinesh Kumar Gupta, “A Review on Wireless Sensor Networks”, Inter-national Conference on Recent Trends in Applied Sciences with Engineering Applications, ISSN 2224- 610X, Vol.3, No.1, IEEE 10.1109/ICAL.2012.6308240, 2013
[5] Melchizedek I. Alipio and Nestor Michael C. Tiglao,” Analysis of Cache-based Transport Protocol at Congestion in Wireless Sensor Networks”, International Conference on Information Networking (ICOIN), IEEE, 10.1109/ICOIN.2017.7899459, 2017
[6] Bruno Marchil, Antonio Grilo, Mario Nunes, “DTSN: Distributed Transport for Sensor Networks”, 12th IEEE Symposium on Computers and Communications, IEEE, 1-4244-1521-7/0, 2007
[7] Adam Dunkels, Juan Alonso, Thiemo Voigt, “Distributed TCP caching for wireless sensor networks”, SICS Technical Report T2004:06 ISSN 1100-3154 ISRN: SICS-T–2004/06- SE, 2004.
[8] Atif Sharif, Vidyasagar M. Potdar, A. J. D Rathnayaka, “ERCTP: End-to-end Reliable and Congestion aware Transport layer Protocol for heterogeneous WSN”, Scalable Computing: Practice and Experience, vol. 11, no. 4, 2010.
[9] Ahmed Ayadi, Patrick Maill´e, and David,” Improving Distributed TCP Caching for Wireless Sensor Networks”, The 9th IFIP Annual Mediterranean AdHoc Networking Workshop (Med-Hoc-Net), IEEE 10.1109/MEDHOCNET.2010.5546858, 2010.
[10] Su Liu1, Yan Tang*, Yonghua Liu2, “A survey of transport protocol for wireless sensor networks”, 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), IEEE 10.1109/CECNet.2012.6202037, 2012
[11] Fred Stann, John Heidemann, “RMST: reliable data transport in sensor networks”, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, IEEE 10.1109/SNPA.2003.1203361, 2003
[12] Chieh-Yih Wan, Andrew T. Campbell, Member, IEEE, and Lakshman Krishnamurthy, “Pump-slowly, fetch quickly (PSFQ): a reliable transport protocol for sensor networks”, IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, IEEE 10.1109/JSAC.2005.843554 , 2005
[13] Yuhua Liu and Hao Huang, “Multi-path-based Distributed TCP Caching for Wireless Sensor Networks”, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD), IEEE 10.1109/SNPD.2007.297, 2007
[14] Noel Eisley, Li-ShiuanPeh, and _Li Shang, “ In- Network Cache Coherence”, IEEE Computer Architecture Letters , Vol. 5, IEEE Computer Architecture Letters, 2006
[15] Wei Ye, John Heidemann, Deborah Estrin , “An Energy-Efficient MAC Protocol for Wireless Sensor Networks”, Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE 10.1109/INFCOM.2002.1019408, 2002
[16] Markus Kowarschik and Christian Wei, “An Overview of Cache Optimization Techniquesand Cache Aware Numerical Algorithms”, Deutsche Forschungsgemeinschaft (German Science Foundation), projects Ru 422/7-1,2,3.
[17] J.L. Hennessy and D.A. Patterson, “Computer Architecture: A Quantitative Approach” Morgan Kaufmann Publisher, Inc., San Francisco, California, USA, second edition, 1996.
[18] M.S. Lam, E.E. Rothberg, and M.E. Wolf, “The Cache Performance and Optimizations of Blocked Algorithms” In Proc. of the Fourth Int. Conference on Architectural Support for Programming Languages and Operating Systems, pp 63-74,Palo Alto, California, USA, 1991.
[19] J. Torrellas, M. Lam, and J. Hennessy, “Shared Data Placement Optimizations to Reduce Multiprocessor Cache Miss Rates”, In Proc. of the Int. Conference on Parallel Processing, volume 2, pp 266-270, Pennsylvania, USA, 1990.
[20] G. Rivera and C.-W. Tseng, “Data Transformations for Eliminating Conflict Misses” In Proc. of the ACM SIGPLAN Conference on Programming Language Design and Implementation, Montreal, Canada, 1998.
[21] T. Jeremiassen and S. Eggers, “Reducing False Sharing on Shared Memory Multiprocessors through Compile Time Data Transformations” In Proc. of the Fifth ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, pp 179-188, Santa Barbara, California, USA, 1995.
[22] R. Allen and K. Kennedy, “Optimizing Compilers for Modern Architectures” Morgan Kaufmann Publishers, San Francisco, California, USA, 2001.
[23] Y. Song and Z. Li, “New Tiling Techniques to Improve Cache Temporal Locality”, In Proc. of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pp 215-228, Atlanta, Georgia, USA, 1999.
[24] M.E. Wolf and M.S. Lam “A Data Locality Optimizing Algorithm” In Proc. of theSIGPLAN`91 Symposium on Programming Language Design and Implementation, volume 26 of SIGPLAN Notices, pp 33-44, Toronto, Canada, 1991.
Citation
Amulya V, Mohan K G, Ramesh Babu H. S, "A Survey on Performance Optimization of Cache Memory in the Individual Nodes of Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.75-80, 2019.
Fake News Detection: A Survey
Survey Paper | Journal Paper
Vol.07 , Issue.16 , pp.81-87, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.8187
Abstract
Social media plays a vital role in online news circulation due to its ease of access, low cost, swift diffusion of information. The news or information can be of any topic, propagated in multiple modalities. Because of the huge amount of information exchange through online or through different social media platforms such as Facebook, twitter, differentiating true news from the low quality news that leads to the problem of fake news, which may affect the individual or the growth of the society, has become a challenging task. This calls for identification and filtering of fake news. In this paper our focus is on exploring the existing methods or approaches on content (i.e. text) based fake news identification, existing standard data sets, evaluation metric(s), tools and future scope, which helps the researchers to turn up with different and efficient approaches to identify fake news.
Key-Words / Index Term
Fake news, Social networks, Multimedia
References
[1] Kai Shuy, Amy Slivaz, Suhang Wangy, Jiliang Tang, and Huan Liu “ Fake News Detection on Social Media:A Data Mining Perspective”.
[2] Monther Aldwairi, Ali Alwahedi “Detecting Fake News in Social Media Networks”,2018.
[3] Kelly Stahl “ Fake news detection in social media” 15 May 2018.
[4] Sakeena m. Sirajudeen, nur fatihah a. Azmi, adamu i. Abubakar, “online fake news detection algorithm” 2005.
[5] Jiawei Zhang1, Limeng Cui2, Yanjie Fu3, Fisher B. Gouza “Fake News Detection with Deep Diffusive Network Model”.
[6] Sneha Singhania(B), Nigel Fernandez, and Shrisha Rao “3HAN: A Deep Neural Network for Fake News Detection” 2017.
[7] Samir Bajaj “The Pope Has a New Baby!” Fake News Detection Using Deep Learning, 2017.
[8] Shivam B. Parikh and Pradeep K. Atrey “Media-Rich Fake News Detection: A Survey” 2017.
[9] Kai Shu, Deepak Mahudeswaran, and Huan Liu “ FakeNewsTracker: A Tool for Fake News Collection, Detection, and Visualization”.
[10] Ver´onica P´erez-Rosas1, Bennett Kleinberg2, Alexandra Lefevre1 Rada Mihalcea “Automatic Detection of Fake News”.
[11] Greatmoon hoax. https://en.wikipedia.org/wiki/Great_Moon_Hoax. [Online; accessed 25-September-2017].
[12] S. Adali, T. Liu, and M. Magdon-Ismail. Optimal link bombs are uncoordinated. In AIRWeb, 2005.
[13] L. Akoglu, R. Chandy, and C. Faloutsos. Opinion fraud detection in online reviews by network effects. In ICWSM, 2013.
[14] H. Allcott and M. Gentzkow. Social media and fake news in the 2016 election. Journal of Economic Perspectives, 2017.
[15] E. Arisoy, T. Sainath, B. Kingsbury, and B. Ramabhadran. Deep neural network language models. In WLM, 2012.
[16] K. Bharat and M. Henzinger. Improved algorithms for topic distillation in a hyperlinked environment. In SIGIR, 1998.
[17] C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Silvestri. Know your neighbors: web spam detection using the web topology. In SIGIR, 2007.
[18] C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines, Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm, 2001.
[19] K. Chellapilla and D. Chickering. Improving cloaking detection using search query popularity and monetizability. In AIRWeb, 2006.
[20] E. Convey. Porn sneaks way back on web. The Boston Herald, 1996.
[21] H. Allcott, and M. Gentzkow. “Social media and fake news in the 2016 election”. Journal of Economic Perspectives, Vol. 31, No. 2, 2017, pp. 211–236.
[22] V.S. Foster, Vincent S. "The Great Moon Hoax." In Modern Mysteries of the Moon, Springer International Publishing, 2016, pp. 11-44.
[23] v. pickard, "media failures in the age of trump." the political economy of communication vol. 4, no.2, 2017, pp. 118- 122.g. lee.
[24] Bernard e m jones “Exploring the role of punctuation in parsing natural text” .
[25] http://www.journalism.org/2016/05/26/news-use-acrosssocial- media-platforms-2016/
[26] http://www.bbc.com/news/uk-36528256
[27] https://en.wikipedia.org/wiki/Pizzagate conspiracy theory
[28] https://www.buzzfeed.com/craigsilverman/viralfake-election-news-outperformed-real-news-onfacebook?utm term=.nrg0WA1VP0#.gjJyKapW5y
[29] http://time.com/4783932/inside-russia-social-media-waramerica/
[30] https://www.nytimes.com/2016/11/28/opinion/fakenews-and-the-internet-shell-game.html? r=0
[31] http://lit.eecs.umich.edu/downloads.html.
[32] Ronald Dekker “The importance of having data-sets” 2006.
[33] https://en.wikipedia.org/wiki/Precision_and_recall.
[34] https://en.wikipedia.org/wiki/Psycholinguistics.
[35] https://stackoverflow.com/questions/45963174/what-is-f1-score-and-what-its-value-indicates.
Citation
Divya, N. Mehala, "Fake News Detection: A Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.81-87, 2019.
A Survey on Architecture, Elements, Protocols and Issues of Internet of Things
Survey Paper | Journal Paper
Vol.07 , Issue.16 , pp.88-92, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.8892
Abstract
In current era Internet of Things(IoT) is one of the trending technology. Automation system made up of IoT service reduces the human effort. This paper provides an overview of IoT three layer and five architecture, fundamental elements of IOT, protocols and about issues to be considered while developing IoT system.
Key-Words / Index Term
Identity-related service, Collaborative aware service, Ubiquition Service
References
[1] Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash” Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications” Ieee Communication Surveys & Tutorials, Vol. 17, No. 4, Fourth Quarter 2015.
[2] Pallavi Sethi and Smruti R. Sarangi “Internet of Things: Architectures, Protocols, and Applications”. Hindawi Journal of Electrical and Computer Engineering Volume 2017, Article ID 932403
[3] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future Internet: The Internet of Things architecture, possible applications and key challenges,” in Proc. 10th Int. Conf. FIT, 2012, pp. 257–260.
[4] Muhammad Burhan , Rana Asif Rehman , Bilal Khan and Byung-Seo Kim “IoT Elements,Layered Architectures and security issues: A comprehensive survey” Sensors 2018,18, 2796; doi:10.3390/s18092796
[5] Chayan Sarkar, Akshay Uttama Nambi S. N, R. Venkatesha Prasad, Abdur Rahim, Ricardo Neisse “DIAT: A Scalable Distributed Architecture for IoT”. Ieee Internet Of Things Journal, Vol. 2, No. 3, June 2015
[6] D. Yang, F. Liu, and Y. Liang, “A survey of the Internet of Things,” in Proc. 1st ICEBI, 2010, pp. 358–366.
[7] Farzad Samie , Vasileios Tsoutsouras , Lars Bauer , Sotirios Xydis , Dimitrios Soudris , J¨org Henkel “Computation Offloading and Resource Allocation for Low-power IoT Edge Devices“ 978-1-5090-4130-5/16/$31.00 c_2016 IEEE
[8] Venkateswara Raju Konduru , Manjula R. Bharamagoudra “Challenges and Solutions of Interoperability on IoT How far have we come in resolving the IoT interoperability issues” 2017 International Conference On Smart Technology for Smart Nation
[9] Koustav Routh, Tannistha Pal” A survey on technological, business and societal aspects of Internet of Things by Q3, 2017”, 978-1-5090-6785-5/18/$31.00 © 2018 by IEEE
[10] Er. Pooja Yadav, Er. Ankur Mittal, Dr. Hemant Yadav “IoT: Challenges and Issues in Indian Perspective” 978-1-5090-6785-5/18/$31.00 © 2018 by IEEE.
[11] D. Macedo, L. A. Guedes, and I. Silva, “A dependability evaluation for Internet of Things incorporating redundancy aspects,” in Proc. IEEE 11th ICNSC, 2014, pp. 417–422.
[12] I. Silva, R. Leandro, D. Macedo, and L. A. Guedes, “A dependability evaluation tool for the Internet of Things,” Comput. Electr. Eng., vol. 39, no. 7, pp. 2005–2018, Oct. 2013.
[13] T. Elsaleh, A. Gluhak, and K. Moessner, “Service continuity for
subscribers of the mobile real world Internet,” in Proc. IEEE ICC Workshops, 2011, pp. 1–5.
[14] Mirza Abdur Razzaq, Muhammad Ali Qureshi, Sajid Habib Gill, Saleem Ullah ”Security Issues in the Internet of Things (IoT): A Comprehensive Study”,(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 6, 2017.
[15] Cheena Sharma, Dr. Naveen Kumar Gondhi “Communication Protocol Stack for Constrained IoT Systems” 978-1-5090-6785-5/18/$31.00 © 2018 by IEEE.
[16] Luca Mainetti, Luigi Patrono, Antonio Vilei “Evolution of Wireless Sensor Networks towards the IoT:A Survey”.
[17] Shadi Al-Sarawi, Mohammed Anbar , Kamal Alieyan , Mahmood Alzubaidi ”Internet of Things (IoT) Communication Protocols : Review” 2017 8th International Conference on Information Technology (ICIT)
[18] Surapon Kraijak1 , Panwit Tuwanut ”A Survey On Iot Architectures, Protocols, Applications, Security, Privacy, Real-World Implementation And Future Trends”
Citation
Meghana N M, Surekha K B, Basavaraju TG, "A Survey on Architecture, Elements, Protocols and Issues of Internet of Things", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.88-92, 2019.
Pre-processing and Classification of Prostate Images for Cancer Detection: A Survey
Survey Paper | Journal Paper
Vol.07 , Issue.16 , pp.93-97, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.9397
Abstract
In the recent years, prostate cancer has become the major cause of deaths in the male population around the world. Numerous computer aided techniques such as, Computer Aided Diagnosis (CAD) systems have been designed in order to detect prostate cancer. The CAD systems majorly consist of four stages namely preprocessing, segmentation, feature extraction and finally the classification stages that are interdependent on one another. The CAD systems perform the analysis based on the various screening techniques such as X-Ray, CT scans, TRUS images, MRI scan, and mp-MRI scans. Though the existing CAD systems are considered feasible, the major research challenge is in improving the accuracy, specificity, speed and usability of the existing CAD systems. This paper presents a survey on the various methodologies used for detecting the prostate carcinoma using various types of screening images.
Key-Words / Index Term
MRI(Magnetic Resonance Imaging), TRUS (Trans rectal Ultrasound), mp-MRI (Multi parametric-Magnetic ResonanceImaging).
References
[1] T. F. Cootes, A. Hill, C. J. Taylor, J. Haslam, The Use of Active Shape Model for Locating Structures in Medical Images, Image and Vision Computing 12 (1994) 355–66.
[2] R. G. Aarnink, S. D. Pathak, J. J. M. C. H. de la Rosette, F. M. J. Debruyne, Y. Kim, H. Wijkstra, Edge Detection in Prostatic Ultrasound Images Using Integrated Edge Map, Ultrasonics (1998) 635–42
[3] X. Tang, Y. Jeong, R. J. Radke, G. T. Y. Chen, Geometric Model Based Segmentation of the Prostate and Surrounding Structures for Image Guided Radiotherapy, in: Proceedings of the SPIE Medical Imaging : Visual Communications and Image Processing, SPIE, USA, 2004, pp. 168–76.
[4] Mark A. Sheppard and Liwen Shih, “Efficient Image Texture Analysis and Classification for Prostate Ultrasound Diagnosis”, Proceedings of the 2005 IEEE Computational Systems Bioinformatics Conference Workshops (CSBW’05).
[5] Y. Zhu, S. Williams, R. Zwiggelaar, Computer Technology in Detection and Staging of Prostate Carcinoma: A Review, Medical Image Analysis 10 (2006) 178–99.
[6] M. Samiee, G. Thomas, R. Fazel-Rezai, Semi-Automatic Prostate Segmentation of MR Images Based on Flow Orientation, in: IEEE International Symposium on Signal Processing and Information Technology, IEEE Computer Society Press, USA, 2006, pp. 203–7.
[7] J. Li, S.S. Mohamed, M.M.A. Salama, and G.H. Freeman, “Prostate Tissue Texture Feature Extraction for Cancer Recognition in TRUS Images Using Wavelet Decomposition”, M. Kamel and A. Campilho (Eds.): ICIAR 2007, LNCS 4633, pp. 993–1004, 2007. © Springer-Verlag Berlin Heidelberg 2007.
[8] X. Liu, D. L. Langer, M. A. Haider, Y. Yang, M. N. Wernick, I. S. Yetik, Prostate Cancer Segmentation with Simultaneous Estimation of Markov Random Field Parameters and Class, IEEE Transactions on Medical Imaging 28 (2009) 906–15.
[9]R.Manavalan and K.Thangave, “Evaluation ofTextural Feature Extraction from GRLM for Prostate Cancer TRUS Medical Images”, International Journal of Advances in Engineering & Technology, Jan 2012. ©IJAET.
[10] Clara Mosquera-Lopez, SosAgaian, Alejandro Velez-Hoyos, and Ian Thompson, “Computer-aided Prostate Cancer Diagnosis from Digitized Histopathology: A Review on Texture-based Systems”, IEEE Reviews in Biomedical Engineering, ©2013 IEEE.
[11] Aaron Greenblatt, Clara Mosquera-Lopez, SosAgaian, “Quaternion Neural Networks Applied to Prostate Cancer Gleason Grading”, 2013 IEEE International Conference on Systems, Man, and Cybernetics, ©2013 IEEE.
[12] Eman Magdy, Nourhan Zayed, and Mahmoud Fakhr, “Automatic Classification of Normal and Cancer Lung CT Images Using Multiscale AM-FM Features”, International Journal of Biomedical Imaging, Volume 2015, September 2015
[13] Duc Fehra, Harini Veeraraghavana, Andreas Wibmerb , Tatsuo Gondoc , Kazuhiro Matsumotoc ,Herbert Alberto Vargasb, EvisSalab, HedvigHricakb , and Joseph O. Deasya, “Automatic classification of prostate cancer Gleason scores from multiparametric magnetic resonance images”, PNAS Published online November 2, 2015.
[14] Chuan-Yu Chang, Hui-Ya Hu, Yuh-Shyan Tsai, “Prostate Cancer Detection in Dynamic MRIs”, ©2015 IEEE.
[15] Islam Reda, Ahmed Shalaby, Fahmi Khalifa, Mohammed Elmogy, Ahmed Aboulfotouh, Mohamed Abou El-Ghar, Ehsan Hosseini-Asl, Naoufel Werghi, Robert Keynton, and Ayman El-Baz, “COMPUTER-AIDED DIAGNOSTIC TOOL FOR EARLY DETECTION OF PROSTATE CANCER”, 978-1-4673-9961-6/16 ©2016 IEEE.
[16] Yunjie Chen, Liangbin Zhang, Wenjun Ma, Su Zhang, Fen Gao, Yunkai Zhu, Yaqing Chen, “Cancer Lesion Screening in MRI for Prostate Biopsy”, ©2016 IEEE.
[17] Pooja R. Katre; AnuradhaThakare, “ Detection of lung cancer stages using image processing and data classification techniques”, IEEE 2nd International Conference for Convergence in Technology (I2CT), pp 402-404, ISBN: 978-1-5090-4307-1, April 2017
[18] LilikAnifah; Haryanto; RinaHarimurti; ZaimahPermatasari; PuputWanartiRusimamto; Adam RidianthoMuhamad, “Cancer lungs detection on CT scan image using artificial neural network backpropagation based gray level coocurrence matrices feature”, IEEE International Conference on Advanced Computer Science and Information Systems (ICACSIS), pp 327-332, ISBN: 978-1- 5386 - 3172 – 0, October 2017, Jakarta, Indonesia
[19] Ying Liu and Xiaomei An, “A Classification Model for the Prostate Cancer Based on Deep Learning”, 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI 2017).
[20] Salsabil Amin El-Regaily; Mohammed Abdel Megeed Salem; Mohamed Hassan Abdel Aziz; Mohamed Ismail Roushdy, “ Lung nodule segmentation and detection in computed tomography”, IEEE Eighth International Conference on Intelligent Computing and Information Systems (ICICIS),pp 72-78, ISBN 977-237-172-3,December 2017, Egypt.
[21] Islam Reda, Ahmed Shalaby, Mohammed Elmogy, Mohammed Ghazal, Ahmed Aboulfotouh, Mohamed Abou El-Ghar, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz, “A New Fast Framework for Early Detection of Prostate Cancer Without Prostate Segmentation”, 978-1-5386-6628-9/18 ©2018 IEEE.
[22] Xiang-Xia Li; Bin Li; Lian-Fang Tian; Li Zhang, “ Automatic benign and malignant classification of pulmonary nodules in thoracic computed tomography based on RF algorithm”, IET Image processing Journal , volume 12, issue 7, pp 1253-1264, 2018, Print ISSN: 1751-9659
[23] R.R. Wildeboer , A.W. Postema , L. Demi , M.P.J. Kuenen , H. Wijkstra and M. Mischi “Multiparametric Dynamic Contrast-Enhanced Ultrasound Classification of Prostate Cancer “, ©2016 IEEE.
[24] Islam Reda, Ahmed Shalaby , Mohamed Abou El-Ghar, Fahmi Khalifa, Mohammed Elmogy, Ahmed Aboulfotouh1 , Ehsan Hosseini-Asl, Ayman El-Baz, and Robert Keynton, “A NEW NMF-AUTOENCODER BASED CAD SYSTEM FOR EARLY DIAGNOSIS OF PROSTATE CANCER”, ©2016 IEEE.
[25] Yujie Feng, Fan Yang, Xichuan Zhou Member, IEEE, Yanli Guo, Fang Tang, Fengbo Ren, Jishun Guo, Shuiwang Ji Member, IEEE, “A Deep Learning Approach for Targeted Contrast-Enhanced Ultrasound Based Prostate Cancer Detection”, IEEE 2018.
[26] aapm.onlinelibrary.wiley.com Internet Source.
[27] ijarcet.org Internet Source.
[28] hal.archives-ouvertes.fr Internet Source.
[29] www.africaangel.com Internet Source.
[30] www.pcf.org Internet Source.
Citation
Swetha.P.C, Mohan G Kabadi, Srivinay, "Pre-processing and Classification of Prostate Images for Cancer Detection: A Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.93-97, 2019.
Mining Medical Data: A Comprehensive Study
Review Paper | Journal Paper
Vol.07 , Issue.16 , pp.98-100, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.98100
Abstract
Health care industry generates huge volumes of data that comprises of complex information pertaining to patients’ data and their medical history. Data mining methodologies have the abilities to discover hidden patterns and associations among the attributes in the medical dataset. Due to Data Mining’s enormous applications, there has been an upsurge in usage of data mining techniques on medical data for discovering useful trends or knowledge patterns that are used in strategic decision-making process or disease diagnosis and treatment process. This paper focuses on need for mining medical data, issues and challenges surrounding Mining Medical Data.
Key-Words / Index Term
Data Mining, Health care, Knowledge Discovery (KDD), Decision-making
References
[1] Anusha N, Rajashree, Srikanth Bhat K “A Survey On Medical Data By Using Data Mining Techniques”.
[2] E. Mercy Beulah, S. Nirmala Sugirtha Rajini, N. Rajkumar “Application Of Data Mining In Healthcare: A Survey”,2016
[3] Hosseinkhah, Fatemeh, Hassan Ashktorab, And Ranjit Veen. "Challenges In Data Mining On Medical Databases." Database Technologies: Concepts, Methodologies, Tools, And Applications. Igi Global, 2009. 1393-1404.
[4] Ţăranu, Ionuţ. "Data Mining In Healthcare: Decision Making And Precision." Database Systems Journal 6.4 (2016): 33-40.
[5] Durairaj, Manoj, And Veera Ranjani. "Data Mining Applications In Healthcare Sector: A Study." International Journal Of Scientific & Technology Research 2.10 (2013): 29-35.
[6] Ahmad, Parvez, Saqib Qamar, And Syed Qasim Afser Rizvi. "Techniques Of Data Mining In Healthcare: A Review." International Journal Of Computer Applications 120.15 (2015)..
[7] Dr. C. Sunil Kumar, Dr. A. Govardhan, B. Sunil Srinivas “Data Mining Issues And Challenges In Healthcare Domian, 2014.
[8] Sujatha, R., R. Sumathy, And A. R. Nithya. "A Survey Of Health Care Prediction Using Data Mining." International Journal Of Innovative Research In Science, Engineering And Technology 5.8 (2016): 14538.
[9] Sujatha, R., R. Sumathy, And A. R. Nithya. "A Survey Of Health Care Prediction Using Data Mining." International Journal Of Innovative Research In Science, Engineering And Technology 5.8 (2016): 14538.
Citation
Rama Krishna K, K G Mohan, "Mining Medical Data: A Comprehensive Study", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.98-100, 2019.
Review of Energy Minimization Strategies for Eco friendly cloud in IT
Review Paper | Journal Paper
Vol.07 , Issue.16 , pp.101-104, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.101104
Abstract
The usage of cloud is increasing in day to day life which leads to consumption of energy.Cloud Computing with reduced energy consumption has been an important topic for the era of researchers and different computer users of computing systems. Cloud IT is an egressing technology which provides information about communication technologies, proposing new challenges for environmental protection. Green Cloud computing is a component of Green IT. The amount of carbon will be reduced with low energy consumption. This paper outlines the methods to reduce energy consumption in the cloud. To reduce the power in cloud, huge numbers of evaluations and optimizations have been done for successful energy efficiency. There are different methods to implement the cloud with minimum energy consumption like hardware, software and firmware. Hardware method includes reduction of energy in various components of cloud like server, etc. Software includes virtualization techniques, DVFS techniques, etc. Energy has to be reduced to create Eco-friendly environment.
Key-Words / Index Term
Cloud,optimization,energy efficiency
References
[1] Jonathan Koomey, “Implications of historical trends in the electrical efficiency of computing”, IEEE Annals of the History of Computing”, vol-33, 2011.
[2] A. Elgelany, “Integrated framework for green ICT: Energy efficiency by using effective metric and efficient techniques for green data centres”, Ph.D. dissertation, Comp. Sci., Sudan University of Science & Technology, 2015.
[3] Shaden M Alismail,”Review of Energy reduction Techniques for Green Cloud Computing”, IJACSA, Vol 7,No.1,2016.
[4] Altar Ur Rahman, “Energy efficiency techniques in cloud Computing”, International Journal of CSIS, vol.14, No.6, June 2016.
[5] H. Rong,H, H.Zhang, s.xiao, c.Li and c.Hu, “optimizing energy consumption for data centers”,vole 58, pp. 674-691, 2016.
[6] R.M. Calheiros, R. Ranjan, “CloudSim: A tool kit for modelling and simulation of cloud computing environment & evaluation of resource Provisioning nalgorithms”, Journal – Software Practice & Experience, vole 41, no.1, pp. 23-50, Jan 2011.
[7] N. Kord and H. Haghighi, “An energy-efficient approach for virtual machine placement in cloud based data centers,” in Proc. 5th Information and Knowledge Technology Conf., 2013, pp. 44–49.
[8] K.H Kim, A Beloglazov,” Power aware Provisioning of virtual machines for real time cloud service”,vol.23,pp. 1491-1505, 2011.
[9] Vrunda J Patel, Hitesh Bheda,” Reducing Energy Consumption with DVFS for Real time services in Cloud Computing”,IOSR Journal of Computer Engineering, e-ISSN:2278-0661,p-ISSN:2278-8727.
[10] Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng “A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing” Department of Computer Science and Engineering, Tatung University, Taiwan.
[11] Florence AP, shanthi V,” Energy Conservation using Dynamic voltage frequency scaling for computational cloud”, Article, Scientific World Journal, 2016.
[12] Abdul Majeed, Munam Ali shah, “Energy Efficiency in big data Complex systems”, Article, 2194-3206, 2015.
[13] R. Shinmonski, “Windows 2000 & win server 2003 clustering & load Balancing”, CA, USA (2003), P2, 2003.
[14] Hesham Hassan,Ahmed Shawky Moussa,” Power Aware Computing Survey”, International Journal of Computer Applications,Vol -90, 2013.
[15] Dmitry Zhurikhin, Andrey Belevantsev, Arutyun Avetisyan, Kirill Batuzov, and Semun Lee, 2009, ―Evaluating power-aware optimizations within GCC compiler‖, GCC Research Opportunities workshop, GROW.
[16] Gary Cook, 2012, ―How Clean is Your Cloud? ‖ catalysing an energy revolution.
[17] Dagfinn Bach, 2012, ―MusicTank Report- Dark Side of the Tune - The Hidden Energy Cost of Digital Music.
[18] Navneet Singh, Dr Vijay Dhir, “A Literature Review: Efficient VM migration techniques for energy reduction in cloud computing”, International Journal of Advanced Research in Computer Science, Volume 8, No. 9,2017
Citation
Vasantha kumari N, Arul Murugan, "Review of Energy Minimization Strategies for Eco friendly cloud in IT", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.101-104, 2019.
Analysis on Encryption and Compression Techniques for Information Security
Research Paper | Journal Paper
Vol.07 , Issue.16 , pp.105-112, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si16.105112
Abstract
This paper has investigated some of the encryption and compression techniques. The paper has also examined the implication of these techniques for the future of information security. Indeed, the threat environment has combined with corporate networks and made data security more complex. Therefore, an increasing number of data network users, who have turned to the cloud, have strived to secure their information systems beyond conventional virus scanners and firewalls. With an increasing demand for responsive information security systems, various techniques of data encryption and compression have evolved. Some of the devices, platforms, or information systems that have been targeted by these trends include websites, personal databases, and computers. Some of the specific algorithms that have been employed in data encryption include River-Shamir-Adleman (RSA) algorithm (in asymmetric encryption) and include Rivest Cipher (RC6) and Data Encryption Algorithm (DES) (in symmetric encryption). On the other hand, selected algorithms that have been used towards successful lossless data compression include lossless predictive coding, Arithmetic coding, Lempel-Ziv-Welch (LZW) compression, Huffman coding, and Run Length Encoding. These algorithms have gained application to situations involving platforms such as word processing files, tabular numbers, and executable codes. For lossy data compression, some of the algorithms that have gained increasing application include lossy predictive coding, wavelet coding, and transform coding. The implication for the future is that data encryption and compression techniques that will be responsive to the dynamic nature of the threat environment might prove successful in achieving the intended goals of data encryption and compression processes, hence assuring information system security.
Key-Words / Index Term
Compression,Encryption,RSAalgorithm,RC6,Huffmancoding
References
[1] Jay ram P, Ranganatha HR, Anupama HS. Information Hiding Using Audiostegnography: A Survey. The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011
[2] M. Baritha Begum and Y. Venkataramani. A New Compression Scheme for Secure Transmission, International Journal of Automation and Computing, 10(6), December 2013, 578-586, DOI: 10.1007/s11633-013-0756-3
[3] Ajit Singh and Rimple Gilhotra -Data Security Using Private Key Encryption System Based On Arithmetic Coding. The International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.3, May 2011
[4] Bobby Jasujaand and AbhishekPandya –Crypto. Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications (0975 –8887) Volume 116, No. 21, April 2015
[5] Kumari S. "A Research Paper on Cryptography Encryption and Compression Techniques," International Journal of Engineering and Computer Science 2017; 6(4), pp. 20915-20919
[6] Emami SS. "Security Analysis of Cryptographic Algorithms," Ph.D. thesis, Macquarie University, Sydney, New South Wales; 2013
[7] Kandola S. "A Survey of Cryptographic Algorithms," Master thesis. St. Lawrence University, Saint Lawrence County, NY. 2013
[8] Mathur H and Alam Z. "Analysis in Symmetric And Asymmetric Cryptology Algorithm." International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2015; 4(1), pp. 44-46
[9] Chandra S and Bhattacharyya S. A Study and Analysis on Symmetric Cryptography," International Conference on Science Engineering and Management Research (ICSEMR), Chennai, India, 2014
[10] Hercigonja Z. "Comparative Analysis of Cryptographic Algorithms." International Journal of Digital Technology & Economy 2016; 1(2), pp. 127-134.
[11] Soni S, Agrawal H and Sharma M. "Analysis and Comparison between AES and DES Cryptographic Algorithm." International Journal of Engineering and Innovative Technology (IJEIT) 2012; 2(6), pp. 362-365
[12] Mahajan P and Sachdeva A. "A Study of Encryption Algorithms AES, DES and RSA for Security." Global Journal of Computer Science and Technology Network, Web & Security 2013; 13(15)
[13] Borda M. "Fundamentals In Information Theory and Coding." Springer-Verlag Berlin Heidelberg, Romania, 2013; pp. 95
[14] Shanmugasundaram S and Lourdusamy R. "A Comparative Study of Text Compression Algorithms." International Journal of Wisdom Based Computing 2011; 1(3), pp. 68-76
[15] Altarawneh H and Altarawneh M. "Data Compression Techniques on Text Files: A Comparison Study." International Journal of Computer Applications 2011; 26(5)
[16] Antil R and Gupta S. "Analysis and Comparison of Various Lossless Compression Techniques." International Journal for Research in Applied Science and Engineering Technology (IJRASET) 2014; 2(3), pp. 251-262
[17] Bodden E, Clasen M and Kneis J. "Arithmetic Coding Revealed." RWTH Aachen University, Aachen, Germany. 2004
[18] R. Pizzolante and B. Carpentieri, “Lossless, low-complexity, compression of three-dimensional volumetric medical images via linear prediction.” In Proceedings of the 18th International Conference on Digital Signal Processing, DSP `13, 2013
[19] Fenwick P. "Variable-Length Integer Codes Based on the Goldbach Conjecture, and Other Additive Codes." IEEE Transactions on Information Theory 2002; 48(8), pp. 2412-2417
[20] Waghulde R, Gurjar H, Dholakia V and Bhole GP. "New Data Compression Algorithm and its Comparative Study with Existing Techniques." International Journal of Computer Applications 2014; 102(7), pp. 35-38
[21] Klinc D. et al. "On Compression of Data Encrypted With Block Ciphers." IEEE Transactions on Information Theory 2012; 58(11), pp. 6989-7001
[22] Schonberg D, Draper SC and Ramchandran K. "On Blind Compression of Encrypted Correlated Data Approaching The Source Entropy Rate." Proceedings of 43rd Annual Allerton Conference on Communication, Control and Computing, Allerton, IL 2005; pp. 1538-1547
[23] C. P. Wu and C. C. J. Kuo, “Design of integrated multimedia compression and encryption systems.” IEEE Transactions on Multimedia 2005; vol. 7, no. 5, pp. 828–839
[24] Y. Zhang, B. Xu, and N. Zhou, “A novel image compression–encryption hybrid algorithm based on the analysis sparse representation.” Optics Communications 2017; vol. 392, pp. 223-233
[25] E. Setyaningsih and R. Wardoyo, “Review of image compression and encryption techniques.” International Journal of Advanced Computer Science and Applications 2017; vol. 8, No. 2
[26] T. Sharma and S. Bollavarapu, “Data Security using Compression and Cryptography Techniques.” International Journal of Computer Applications 2015; vol. 117, no. 14, pp. 15-18
[27] P. Albano, A. Bruno, B. Carpentieri et al., “Secure and distributed video surveillance via portable devices.” Journal of Ambient Intelligence and Humanized Computing 2014; vol. 5, no. 2, pp. 205-213
[28] R. Pizzolante, B. Carpentieri, A. Castiglione, and G. De Maio, “The AVQ algorithm: Watermarking and compression performances.” In Proceedings of the 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS `11; pp. 698-702. 2011
[29] U. Fiore, “Selective redundancy removal: a framework for data hiding.” Future Internet 2010; vol. 2, no. 1, pp. 30–40, 2010
[30] M. R. Ogiela and L. Ogiela, “On using cognitive models in cryptography.” In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, AINA `16, pp. 1055–1058, IEEE, Crans-Montana, Switzerland, March 2016
[31] Singh KJ & Manimegalai R. A Survey of Joint Compression and Encryption Techniques for Video Data. Journal of Computer Science 2012; 8(5), 731-736
Citation
Gowtham Mamidisetti, Ramesh Makala, Ravi Teja K, "Analysis on Encryption and Compression Techniques for Information Security", International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.105-112, 2019.