Feature Selection on High Dimensional Big Data of Gens Expression Using Filter Based Feature Selection Methods
Research Paper | Journal Paper
Vol.07 , Issue.03 , pp.105-108, Feb-2019
Abstract
Feature selection approach solves the dimensionality problem by removing irrelevant and redundant features. Recently, big data is widely available in information systems and data mining has pulled in a major thoughtfulness regarding analysts to transform such information into helpful learning. This implies the presence of low quality, questionable, excess and uproarious information which contrarily influence the way toward watching learning and helpful example. As follows, researchers require related big data utilizing feature selection methods. The process of feature selection is identifying the most relevant attributes and removing the redundant and irrelevant attributes. In this paper, find out the result of different feature selection methods based on a recognized dataset (i.e., gens expression dataset) and classification algorithms were used to evaluate the performance of the algorithms. In this study revealed that feature selection methods are capable to improve the performance of learning algorithms. Still, there are no any single filter based feature selection method is the best. Taken as a whole, Classifier AttEval, CorrelationAttributeEval, Principal Components, and ReliefAttEval methods performed better results than the others.
Key-Words / Index Term
Feature selection, Lung cancer, Gens expression, Classifier, Subset
References
[1] A. Tsymbal and S. Puuronen. (2010). Local feature selection with dynamic integration of classifiers. Foundations of Intelligent Systems, 363–375.
[2] Ashraf, M., Chetty, G., & Tran, D. (2013). Feature Selection Techniques on Thyroid , Hepatitis , and Breast Cancer Datasets, 3(March), 1–8.
[3] Bhattacharjee, a, Richards, W. G., Staunton, J., Li, C., Monti, S., Vasa, P., … Meyerson, M. (2001). Classification of human lung carcinomas by mRNA expression profiling reveals distinct adenocarcinoma subclasses. Proc Natl Acad Sci U S A, 98(24), 13790–5.
[4] Dimitoglou, G., Adams, J. a, & Jim, C. M. (2012). Comparison of the C4.5 and a Naive Bayes Classifier for the Prediction of Lung Cancer Survivability. Journal of Neural Computing, 4(8), 1–9.
[5] Hall, M. (1999). Correlation-based Feature Selection for Machine Learning. Methodology, 21i195-i20(April), 1–5.
[6] Holte, R. C. (1993). Very Simple Classi fi cation Rules Perform Well on Most Commonly Used Datasets. Machine Learning, 11(1), 63–91.
[7] http://www.cs.waikato.ac.nz/ml/weka. (n.d.). WEKA: Weka 3: Data Mining Software in Java.
[8] Huang, S. H., Wulsin, L. R., Li, H., & Guo, J. (2009). Dimensionality reduction for knowledge discovery in medical claims database: Application to antidepressant medication utilization study. Computer Methods and Programs in Biomedicine, 93(2), 115–123
[9] Inza, I., Larrañaga, P., Blanco, R., & Cerrolaza, A. J. (2004). Filter versus wrapper gene selection approaches in DNA microarray domains. Artificial Intelligence in Medicine, 31(2), 91–103.
[10] Jolliffe, I. T. (2002). Principal Component Analysis, Second Edition. Encyclopedia of Statistics in Behavioral Science, 30(3), 487.
[11] Kohavi, R., & John, G. H. (1997). Wrappers for feature subset selection. Artificial Intelligence, 97(1–2), 273–324.
[12] Leach, M. (2012). Parallelising feature selection algorithms. University of Manchester.
[13] Lee, I.-H., Lushington, G. H., & Visvanathan, M. (2011). A filter-based feature selection approach for identifying potential biomarkers for lung cancer. Journal of Clinical Bioinformatics, 1(1), 11.
[14] Liu, H., Setiono, R., Science, C., & Ridge, K. (1995). Chi2: Feature Selection, 388–391.
[15] Novaković, J., Strbac, P., & Bulatović, D. (2011). Toward optimal feature selection using ranking methods and classification algorithms. Yugoslav Journal of Operations Research, 21(1), 119–135.
[16] Patil, T. R. (2013). Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification. International Journal Of Computer Science And Applications, ISSN: 0974-1011, 6(2), 256–261.
[17] Roslina, A. H., & Noraziah, A. (2010). Prediction of hepatitis prognosis using support vector machines and wrapper method. Proceedings - 2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010, 5(Fskd), 2209–2211.
[18] Sathyadevi, G. (2011). Application of CART algorithm in hepatitis disease diagnosis. International Conference on Recent Trends in Information Technology, ICRTIT 2011, 1283–1287.
[19] Witten, I. H., Frank, E., & Hall, M. a. (2011). Data Mining: Practical Machine Learning Tools and Techniques (Google eBook). Complementary literature None.
[20] Yasin, H. (2011). Hepatitis-C Classification using Data Mining Techniques, 24(3), 1–6.
Citation
A. K. Shrivas, Prem Kumar Chandrakar, "Feature Selection on High Dimensional Big Data of Gens Expression Using Filter Based Feature Selection Methods", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.105-108, 2019.
Phytochemical Screening and In Silico Analysis of Some Crude Stem Extracts against Skin Diseases
Research Paper | Journal Paper
Vol.07 , Issue.03 , pp.109-113, Feb-2019
Abstract
Curcumin is an important phytochemical present in curcuminoids (rhizome plants) essential; for control of skin diseases. The phytochemicals are more in Zingiber officinale followed by Aloe barbadensis, Curcuma longa and Curcuma angustifolia. Amino acids, Proteins, carbohydrates, tanins and terpenoids were almost present in all the selected plants. The plant Curcuma angustifolia aqueous extract has good composition of terpinoids and analysed for in silico studies of Curcumin with Staphylococcus aureus, Streptococcus pyogenes and Trichophyton rubrum proteins. Curcumin has shown good binding affinity with streptococcal superantigen (SSA) from Streptococcus pyogenes (-90.62 KCal/Mol) followed by exfoliative toxin B in Staphylococcus aureus (-85.01 KCal/Mol) and Aspartate Semialdehyde Dehydrogenase from Trichophyton rubrum (-82.96 KCal/Mol). Curcumin has shown good in silico activities against proteins/ antigens for skin diseases. Further isolation and identification through wetlab studies provide good scope in the field of phytochemistry
Key-Words / Index Term
Phytochemical screening, in silico studies, curcumin
References
[1] B. R David, H. W. Lim, D. Margolis, M. A. Weinstock, C. Goodman, E. Faulkner, C. Gould, E. Gemmen, T. Dall, "The burden of skin diseases: 2004: A joint project of the American Academy of Dermatology Association and the Society for Investigative Dermatology", Journal of the American Academy of Dermatology, Vol. 55, No. 3, pp. 490-500, 2006.
[2] J. M. McGinnis, P. Williams-Russo, J. R. Knickman, “The case for more active policy attention to health promotion”, Health affairs, Vol. 21, No. 2, pp. 78-93, 2002.
[3] K. P. High, S. F. Bradley, S. Gravenstein, D. R Mehr, V. J. Quagliarello, C. Richard, T. T. Yoshikawa, “Clinical practice guideline for the evaluation of fever and infection in older adult residents of long-term care facilities: 2008 update by the Infectious Diseases Society of America”, Clinical Infectious Diseases, Vol. 48, No. 2, pp. 149-171, 2009.
[4] R.N.S. Yadav, Munin Agarwala, "Phytochemical analysis of some medicinal plants." Journal of phytology, Vol. 3, No. 12, pp. 10-14, 2011.
[5] A. Wadood, M. Ghufran, S.B. Jamal, M. Naeem, A. Khan, R .Ghaffar, “Phytochemical Analysis of Medicinal Plants Occurring in Local Area of Mardan”, Biochem Anal Biochem, Vol. 2, pp. 144, 2013.
[6] N. P. Peteros, M. M. Uy, “Antioxidant and cytotoxic activities and phytochemical screening of four Philippine medicinal plants”, Journal of Medicinal Plants Research, Vol. 4, No. 5, pp. 407-414, 2010.
[7] W. F. Sule, I. O. Okonko, S. Omo-Ogun, J. C. Nwanze, M. O. Ojezele, O. J. Ojezele, J. A. Alli, E. T. Soyemi, T. O. Olaonipekun. "Phytochemical properties and in-vitro antifungal activity of Senna alata Linn. crude stem bark extract", Journal of medicinal plants research, Vol. 5, No. 2, pp. 176-183, 2011.
[8] I. Chattopadhyay, K. Biswas, U. Bandyopadhyay, R. K. Banerjee, “Turmeric and curcumin: Biological actions and medicinal applications”, CURRENT SCIENCE-BANGALORE, Vol. 87, pp.44-53, 2004.
[9] R. Aly, “Microbial Infections of Skin and Nails. In: Baron S, editor. Medical Microbiology”, 4th edition. Galveston (TX): University of Texas Medical Branch at Galveston, Chapter 98, 1996.
[10] E. Kunchandy, M.N.A. Rao, “Oxygen radical scavenging activity of curcumin”, International Journal of Pharmaceutics, Vol. 58, No. 3, pp. 237-240, 1990.
[11] C. Y. Hsieh, “Phase I clinical trial of curcumin, a chemopreventive agent, in patients with highrisk or pre-malignant lesions”, Anticancer Res, Vol. 21, pp. 2895-2900. 2001.
[12] P. Anand, A.B. Kunnumakkara, R.A. Newman, B. B. Aggarwal, “Bioavailability of curcumin: problems and promises”, Molecular pharmaceutics, Vol. 4, No. 6, pp. 807-818, 2007.
[13] B.B Aggarwal, A. Kumar, A.C. Bharti, “Anticancer potential of curcumin: preclinical and clinical studies”, Anticancer research, Vol. 23, No.1/A, pp. 363-398, 2003.
[14] S. A Jatoi, A. Kikuchi, S.A. Gilani, K. N. Watanabe, “Phytochemical, pharmacological and ethnobotanical studies in mango ginger (Curcuma amada Roxb.; Zingiberaceae)”, Phytotherapy Research: An International Journal Devoted to Pharmacological and Toxicological Evaluation of Natural Product Derivatives, Vol. 21, No. 6, pp. 507-516, 2007.
[15] S.V.G.K.D. Kaladhar, G.R. Duddukuri, K. Ramesh, V. Vadlapudi, N.S. Yarla, “In Vitro Protease Inhibition, Modulation of PLA2 Activity and Protein Interaction Studies on Calotropis gigantean”, Journal of Clinical & Cellular Immunology, Vol. 4, pp. 165, 2013.
Citation
Surbhi Dubey, Shweta Sao, "Phytochemical Screening and In Silico Analysis of Some Crude Stem Extracts against Skin Diseases", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.109-113, 2019.
Classification of Chronic Kidney Disease using Combination Feature Selection Techniques and Classifiers
Research Paper | Journal Paper
Vol.07 , Issue.03 , pp.114-117, Feb-2019
Abstract
The aim of the study is to predict significant features from dataset of Chronic Kidney Disease features. It represents the data in a tabular and graphical manner to form its clear understanding. This investigation helps in the crucial role of features and experimental features in the CKD dataset and their associations, their dependability for coming up with any classification system. It also shows that how CKD can be diagnosis by exploiting data mining techniques. The Data Mining algorithm is an inspirational force in detecting abnormalities in various data sets and with a good success utilized in various classification and feature selection task. The different kinds of Decision Tree-based classifiers like RF (Random Forest), J48 (C4.5), C5.0, and CART (Classification and Regression Tree) and their ensemble model have experimentally validated CKD dataset and our result is evaluated. Our result representation that the ensemble models classifier reached the most favourable performances on the identification of CKD dataset before and after the feature selection.
Key-Words / Index Term
Chronic Kidney Disease, Feature Selection Techniques, Classification, Random Forest, J48(C4.5), C5.0, CART, Ensemble model, Genetic Search, Greedy Stepwise
References
[1] M. P. Webster A.C., Nagler E.V., R.L., “Chronic Kideny disease,” 2016. [Online]. Available: http://www.worldkidneyday.org/faqs/chronic-kidney-disease/. [Accessed: 28-Feb-2018].
[2] M. S. McManus and S. Wynter-Minott, “Guidelines for Chronic Kidney Disease: Defining, Staging, and Managing in Primary Care,” J. Nurse Pract., vol. 13, no. 6, pp. 400–410, 2017.
[3] J. Han, M. Kamber, and J. Pei, Data mining: concepts and techniques, Third. Elsevier, 2012.
[4] I. H. Witten, E. Frank, and M. A. Hall, Data mining. 2011.
[5] A. Pujari, Data mining techniques, Third. University press, 2013.
[6] I. Guyon and A. Elisseeff, “An Introduction to Variable and Feature Selection,” J. Mach. Learn. Res., vol. 3, no. 3, pp. 1157–1182, 2003.
[7] A. Bhalla and R. K. Agrawal, “Microarray gene-expression data classification using less gene expressions by combining feature selection methods and classifiers,” Int. J. Inf. Eng. Electron. Bus., vol. 5, no. 5, pp. 42–48, 2013.
[8] A. K. Shrivas, S. K. Sahu, and H. S. Hota, “Classification of Chronic Kidney Disease with proposed Union Based Feature Selection Technique,” no. 2007, pp. 503–507, 2018.
[9] A. Subasi, E. Alickovic, and J. Kevric, “Diagnosis of Chronic Kidney Disease by Using Random Forest,” C. 2017 Proc. Int. Conf. Med. Biol. Eng. 2017, vol. 7, no. 1, pp. 589–594, 2017.
[10] B. Boukenze, A. Haqiq, and H. Mousannif, “Predicting Chronic Kidney Failure Disease Using Data Mining Techniques,” vol. 397, 2017.
[11] A. Charleonnan, T. Fufaung, T. Niyomwong, W. Chokchueypattanakit, S. Suwannawach, and N. Ninchawee, “Predictive analytics for chronic kidney disease using machine learning techniques,” 2016 Manag. Innov. Technol. Int. Conf., p. MIT-80-MIT-83, 2016.
[12] D. N. R. S.Ramya, “Diagnosis of Chronic Kidney Disease Using Machine Learning Algorithms,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 4, no. 1, pp. 812–820, 2016.
[13] M. Arora and E. A. Sharma, “Chronic Kidney Disease Detection by Analyzing Medical Datasets in Weka,” Int. J. Comput. Appl., vol. 6, no. 4, pp. 20–26, 2016.
[14] M. Kumar, “Prediction of Chronic Kidney Disease Using Random Forest Machine Learning Algorithm,” Int. J. Comput. Sci. Mob. Comput., vol. 5, no. 2, pp. 24–33, 2016.
[15] R. Nagalla, P. Pothuganti, and D. S. Pawar, “Analyzing Gap Acceptance Behavior at Unsignalized Intersections Using Support Vector Machines, Decision Tree and Random Forests,” Procedia Comput. Sci., vol. 109, no. 2016, pp. 474–481, 2017.
[16] R. Parimala and R. Nallaswamy, “A Study of Spam E-mail classification using Feature Selection package,” Glob. J. Comput. Sci. Technol., vol. 11, no. 7, pp. 45–54, 2011.
[17] A. K. Shrivas, S. K. Sahu, and S. K. Singhai, “Decision support system for classification of chronic kidney disease with principle component analysis,” vol. 14, no. 2, pp. 105–110, 2017.
[18] Sivanandam and Deepa, Principles of Soft Computing, Second. wiley, 2014.
[19] S. Haykin, Neural Networks and Learning Machines, vol. 3. 2008.
[20] C. Arun Kumar, M. P. Sooraj, and S. Ramakrishnan, “A Comparative Performance Evaluation of Supervised Feature Selection Algorithms on Microarray Datasets,” Procedia Comput. Sci., vol. 115, pp. 209–217, 2017.
[21] D. E. Goldberg, “Genetic Algorithms in Search Optimization & Machine Learning.” p. 412, 1989.
[22] M. Hall, “Correlation-based Feature Selection for Machine Learning,” Methodology, vol. 21i195-i20, no. April, pp. 1–5, 1999.
[23] “UCI Machine Learning Repository of machine learning databases,” 2015. [Online]. Available: https://archive.ics.uci.edu/ml/datasets/Chronic_Kidney_Disease. [Accessed: 01-Jan-2016].
Citation
A. K. Shrivas, Sanat Kumar Sahu, "Classification of Chronic Kidney Disease using Combination Feature Selection Techniques and Classifiers", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.114-117, 2019.
Customer Perception towards Shopping Malls in Chennai
Review Paper | Journal Paper
Vol.07 , Issue.03 , pp.118-121, Feb-2019
Abstract
Consumer becomes a customer by a frequency of visits to shopping malls. The main objectives of the study are to identify and examine the perception of customer. Customer perception towards shopping malls in Chennai city is analyzed by the various factors such as ambience of the mall/shop, mall change the life style of consumers, mall enhances the consumer’s belief of want satisfaction, the physical facilities are visually appealing, perception way of shopping, identifying merchandise and convenience.
Key-Words / Index Term
Perception, Shopping Malls
References
[1] (The mall story 2.0/THE HINDU Business Line/20/09/2017).
[2] J ay D. Lindquist /M.Joseph Sirgy “Consumer Behavior” 2009/Cengage Learning India Private Limited.
[3] Leon G.Schiffman, Leslie Lazar Kanuk, “Consumer Behavior”2009/Pearson Education, Inc.
[4] Shaphali Gupta (2015)” Effect of Shopping Value on Service Convenience, Satisfaction and Customer Loyalty: A Conceptual Framework” , SAMVAD: SIBM Pune Research Journal, Vol X, pp.78-85.
[5] Muzzafar Ahmad Bhat and AmitKumar(2016)” Customer Perception and its Implications in Modern Retail Sector: A Case Study of Big Bazaar”, International Journal of Research in IT, Management and Engineering, 6.123, Vol. 06, Issue 07, pp. 55-60.
[6] Shashikala.R.Mrs., Dr. A. M. Suresh Vishwakarma (2013)” Consumer Perception of Servicescape in Shopping Malls”, Vishwakarma Business Review, Volume III , 2, pp.68-75.
[7] IoanaNicoletaAbrudan, Dan-CristianDabijaa (2014) “ Emerging Market Queries in Finance and Business Measuring clients` satisfaction toward shopping centers - Empirical evidences from Romania” , Science Direct Procedia Economics and Finance 15, pp. 1243 –1252.
[8] Elangovan. D., Sangeetha. R (2016)” A study on customer’s perception and preferences towards shopping malls in Coimbatore”, International Journal of Multidisciplinary Research and Development, Vol. 3, Issue 3, pp.296-298.
[9] Mullick Naushadul Haque, “Enhancing the image & brand equity of a shopping mall”, Studies in Business and Economics, pp.72-81.
[10] NikamHarshalDnyandeo (2014) “A Study of Factors Affecting on Buying Decisions & Customer Preference towards Phoenix Market city Pune”, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 12, pp. 60-67.
[11] ThitipannKernsom and Nopadon Sahachaisaeree (2011) “Compostional Design as Sale Strategy: Shopping mall window display”, Journal of ASIAN Behavioural Studies 1(1), January 2011 (Maiden Issue).
[12] Neelotpaul Banerjee (2012) “A Study on the attractiveness dimensions of shopping malls- An Indian perspective”, International Journal of Business and Social Science, Vol.3 No.2 [Special Issue] 102.
[13] Ala`Eddin Mohammad Khalaf Ahmad (2012)” Attractiveness Factors Influencing Shoppers’ Satisfaction, Loyalty, and Word of Mouth: An Empirical Investigation of Saudi Arabia -Shopping Malls”, International Journal of Business Administration Vol. 3, No. 6; pp.101-112.
Citation
K.Girija, G.Ravi, "Customer Perception towards Shopping Malls in Chennai", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.118-121, 2019.
A Review on Impact of Deceptive Advertisement on Consumer Behaviour
Review Paper | Journal Paper
Vol.07 , Issue.03 , pp.122-124, Feb-2019
Abstract
An influential tool nowadays for any organization is Advertisement, as it not only helps in communicating the information to the customers about new product launched in the market but also induces them to purchase them. Companies usually follow unethical means to advertise their products, the term used for it is Misleading Advertisements. Misleading or false Advertisements is the use of wrong statements in advertisements for influencing customers to purchase the products, but it may negatively impact many customers. Many governments around the world use regulations and frame policies to control false and misleading advertisements, as advertisements have the potential to induce customers to buy products. The concept of the advertisements was that all the necessary information related to the product should be provided to customers using a global media that is the advertisement. This study is conducted to comprehend the impact of advertisements on customers using Medias and what can be done to improve the effectiveness.
Key-Words / Index Term
Deceptive, Advertisement, Consumer Behaviour
References
[1] Becker GS, Murphy KM. “A simple theory of advertising as a good or bad, Quarterly Journal of Economics”.; 108:941-964. 1993.
[2] Friedman. “Endorser Effectiveness by product Type”, Journal of Advertising Research.; Vol. 19(5),pp 63-71. 2003.
[3] Daugeliene R., Liepinyte , M., “Interrelation of misleading advertising and solutions of consumers: legal regulation and institutional background in Lithuania”, Issn 1822–8402 ,European integration studies.Vol.6, pp-192-201. 2012.
Citation
P. Shukla, B.Karmakar, "A Review on Impact of Deceptive Advertisement on Consumer Behaviour", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.122-124, 2019.
Application of Cat Swarm Optimization for Recognition of Handwritten Numerals
Research Paper | Journal Paper
Vol.07 , Issue.03 , pp.125-130, Feb-2019
Abstract
Accurate recognition of optical handwritten numeral is still an open and demanding problem in present digital world. The basic objective of the present work is to develop a novel method for recognition of off line unconstrained handwritten Odia numeral using curvature feature and functional link artificial neural network (FLANN) based cat swarm optimization (CSO) technique. In this paper preprocessing and feature extraction steps are carried out before the recognition of numerals. For feature extraction curvature based approach is applied. For recognition of handwritten Odia numeral hybrid architecture has been proposed where the classification task is performed by FLANN classifier and cat swarm optimization is used for finding a suitable set of weights for the FLANN classifier. The proposed model is evaluated on database consisting of 4000 number of handwritten Odia numerals. The combined effect of curvature based feature extraction approach and FLANN based cat swarm optimization technique yielded a high accuracy which exhibits the effectiveness of CSO based FLANN optimization model (FLANN-CSO) for recognition of Odia handwritten numerals.
Key-Words / Index Term
Odia numeral recognition, FLANN, CSO, Preprocessing, Feature extraction, classification
References
[1] M. Shia, Y. Fujisawab, T. Wakabayashia, F. Kimuraa, “Handwritten numeral recognition using gradient and curvature of gray scale image,” Journal of Pattern Recognition, Vol. 35, pp. 2051 – 2059, 2002
[2] A. Desai, “Gujarati handwritten numeral optical character reorganization through neural network” , The Journal of Pattern Recognition, Vol. 43, pp. 2582–2589, 2010.
[3] S. Mahmoud, “Recognition of writer-independent off-line handwritten arabic (indian) numerals using hidden Markov models,” Journal of Signal Processing, Vol. 88, pp. 844–857, 2008.
[4] Z. Kamranian, S.A. Monadjemi and N. Nematbakhsh, “A novel free format persian/arabic handwritten zip code recognition system,” Journal of Computers and Electrical Engineering, Vol. 39, pp:1970–1979, 2013.
[5] B. Majhi, J. Satpathy and M. Rout, “Efficient recognition of odia numerals using low complexity neural classifier,” In Proceedings of IEEE International Conference on Energy, Automation and Signal , pp. 140-143, 2011.
[6] T.K.Mishra, B. Majhi, S. Panda, “A comparative analysis of image transformations for handwritten Odia numeral recognition,” In Proceedings of IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013, pp. 790-793.
[7] Prashant M. Kakde, S. M. Gulhane, “ A comparative analysis pf particle swarm optimization and support vector machines for Devnagri character recognition: An android application”, Procedia Computer Science, Proceedings of International conference on communication, computing and virtualization (ICCCV) 2016, volume 79, 2016, Pages 337-343
[8] Alejandro Baldominos , Yago Saez, Pedro Isasi, Evolutionary convolutional neural networks: An application to handwritten recognition”, Neuro Computing, Volume 283, 29 March 2018, Pages 38-52
[9] Adarsh Trivedi, Siddhant Srivastava, Aproova Mishra, Anupam Shukla, Ritu Tiwari,” Hybrid evolutionary approach for Devanagari handwritten numeral recognition using convolutional neural network”, Procedia Computer Science, Volume 125, 2018, Pages 525-532
[10] Joseph Tarigan, Nadia, Ryanda Diedan, Yaya Suryana, “ Plate recognition using backpropagation neural network and genetic algorithm”, Procedia Computer Science, Volume 116, 2017, Pages 365-372
[11] W-D Weng, C-S Yang and R-C Lin, A channel equalizer using reduced decision feedback Chebyshev functional link artificial neural networks, Information Sciences, Elsevier, vol.177, issue 13, pp.2642-2654, July 2007. (FLANN)
[12] B. Naik, J. Nayak and H. S. Behera, A global-best harmony search based gradient descent learning FLANN (GbHS-GDL-FLANN) for data classification, Egyptian Informatics Journal, Elsevier,21 October 2015(In press). (FLANN)
[13] C.M.Anish and B. Majhi, Hybrid nonlinear adaptive scheme for stock market prediction using feedback FLANN and factor analysis, Journal of the Korean Statistical Society, July 2015 (in press). (FLANN)
[14] R. Majhi, G. Panda and G. Sahoo, Development and performance evaluation of FLANN based model for forecasting of stock markets, Expert Systems with Applications, Elsevier, vol.36, pp. 6800-6808, June 2012. (FLANN)
[15] B. Majhi and P. K. Sa, FLANN-based adaptive threshold selection for detection of impulsive noise in images, AEU- International Journal of Electronics and Communications, Elsevier, vol. 61, issue 7, pp.478-484, July 2007. (FLANN)
[16] J. C. Patra and A. Bos, Modelling of an intelligent pressure sensor using functional link artificial neural networks, ISA transactions, Elsevier, vol.39, issue 1, pp.15-17, February 2000. (FLANN)
[17] S. K. Behera, D. P. Das and B. Subudhi, Functional link artificial neural network applied to active noise control of a mixture of tonal and chaotic noise, Applied soft computing, Elsevier, vol. 23, pp. 51-60, October 2014. (FLANN)
[18] Chu, S.-C., & Tsai,P.-W, Computational intelligence based on the behavior of cats. International journal of innovative computing, Information and control, 3, pp.163-173
[19] G. Panda, P.M.Prahan, B. Majhi, IIR system identification using cat swarm optimization, Expert system with applications, 38(2011), pp.12671-12683
[20] A.D. Parkins, A.K. Nandiembers, “Genetic programming techniques for hand written digit recognition”, Signal Processing, Volume 84, Issue 12, pp: 2345-2365, December 2004.
[21] Moayad Yousif Potrus, Umi Kalthum Ngah, Bestoun S. Ahmed, “An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition”, Ain Shams Engineering Journal, Volume 5, Issue 4, pp. 1129-1139, December 2014.
[22] Saurabh Shrivastava, Manu Pratap Singh, “Performance evaluation of feed-forward neural network with soft computing techniques for hand written English alphabets”, Applied Soft Computing, Volume 11, Issue 1, pp: 1156-1182, January 2011.
[23] C. De Stefano, F. Fontanella, C. Marrocco, A. Scotto di Freca, “A GA-based feature selection approach with an application to handwritten character recognition”, Pattern Recognition Letters, Volume 35, Pages 130-141, 1 January 2014
[24] M. Kherallah, F. Bouri, A.M. Alimi, “On-line Arabic handwriting recognition system based on visual encoding and genetic algorithm”, Engineering Applications of Artificial Intelligence, Volume 22, Issue 1, pp: 153-170, February 2009.
Citation
Puspalata Pujari, Babita Majhi, "Application of Cat Swarm Optimization for Recognition of Handwritten Numerals", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.125-130, 2019.
Review of Big Data Science and its relation with Cloud Technology
Review Paper | Journal Paper
Vol.07 , Issue.03 , pp.131-133, Feb-2019
Abstract
Big data science is the new emerging term in the field of computer technology. During the emergence of computer science the database is used to store the data but with the emergence of social networking sites the data is generated exponentially that is not able to store in the conventional method of storage so the new technology is derived that is used to store data in cloud technology. Cloud technology is a technology that is used to store data in a safe and secure manner. And it also gives the opportunity to use the data when required. We can mine the data with data mining algorithm and take decisions on the basis of that data.
Key-Words / Index Term
Cloud Technology, Big data, Virtualization
References
[1] Vouk A. Mladen.” Cloud Computing-Issues Research and Implementation”, Journal of Computing and Information Technology- CIT 16(2008).
[2] Fan Wei et al. “, Mining Big Data: Current Status, and Forecast to the Future”, SIGKDD Explorations, Vol 14, Issue 2,(2012).
[3] Jha Anupama et al. ,” A Review on the Study and Analysis of Big Data using Data Mining Techniques”, “ International Journal of Latest Trends in Engineering and Technology (IJLTET). Vol (6), Issue 3 January (2016) ISSN: 2278-621X
[4] Sivarajah Uthayasankar,” Critical Analysis of Big Bata challenges and analytical methods”, “Journal of Business of Research”, (2017).
[5] SAGIROGLU Seref,” Big Data: A Review”, IEEE (2013).
[6] V. Spoorthy et al., “A Survey on Data Storage and Security in Cloud Computing”,” InternationalJournal of Computer Science and Mobile Computing”, ISSN 2320-088X ,(2014), pg.306 – 313.
[7] Kumar Santosh et al.,” Cloud computing- Research Issues, Challenges, Architecture, Platforms and Applications: A Survey”, International Journal of Future Computer and Communication, Vol 1 No-4 (2012).
[8] Sivarajah Uthayasankar et al. ,” Critical Analysis of Big Data challenges and analytical methods”, “ Journal of Business Research” pg 263286 (2017).
Citation
R. Milan, K.K. Pandey, D. Shukla, "Review of Big Data Science and its relation with Cloud Technology", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.131-133, 2019.
A Study on The Factors That Influence the Acceptance of LMS’s In Higher Educational Institution’s
Research Paper | Journal Paper
Vol.07 , Issue.03 , pp.134-140, Feb-2019
Abstract
This study is designed to investigate the acceptance of Learning Management Systems (Moodle) in Higher Educational Institutions (HEI’s) of Oman. Due to the technological developments the importance of using learning Management system in Higher Educational Institutes (HEI’s) are increasing day by day. This study is to investigate the acceptance of Learning Management Systems in different HEI’s of Sultanate of Oman. To investigate the factors that influence the use of LMS’s in HEI’s the 5-point likert questionnaire has been made and distributed electronically through e-mail and Social media applications. The questionnaire sent to the students of different HEI’s of Sultanate. Data were collected from 137 respondents belongs to various HEI’s in which 132 are the valid responses. The questionnaire consists of 5 demographic question and 13 survey questions. The variables used in this research are perceived playfulness, perceived usefulness, and perceived ease of use, attitude, and intention to use. The research is based on the Technology Acceptance Model (TAM). The Structural equation modelling (SEM) technique is used to evaluate the causal model and to extreme the validity of model. This research paper tested the 7 hypotheses.
Key-Words / Index Term
Moodle (Modular Object Oriented Dynamic Learning Environment), Higher Educational Institutions, learning Management system, E-mail, Technology acceptance model, Structural equation modelling
References
[1] About Moodle. (n.d.) retrieved from https://docs.moodle.org/32/en/About_Moodle#Built_for_learning.2C_globally
[2] Adeyemo, S. A., Adedoja, G. O., & Adelore, O. (2013). Mobile technology: Implications of its application on
[3] learning. Open Praxis, 5(3), 249-254.
[4] Ajzen, I., & Fishbein, M. (1975). Belief, attitude, intention and behavior: An introduction to theory and research.
[5] In: Reading, MA: Addison-Wesley.
[6] Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behaviour.
[7] Chung, C., & Ackerman, D. (2015). Student reactions to classroom management technology: learning styles and attitudes toward moodle. Journal of Education for Business, 90(4), 217-223.
[8] Davis Jr, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems:
[9] Theory and results. Massachusetts Institute of Technology,
[10] Davis, F. (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, [18] 13(3), 1989. 319-339.
[11] Fowler Jr, F. J. (2013). Survey research methods: Sage publications.
[12] Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS
[13] quarterly, 27(1), 51-90.
[14] Ghani, J. A., & Deshpande, S. P. (1994). Task characteristics and the experience of optimal flow in human—
[15] computer interaction. The Journal of psychology, 128(4), 381-391.
[16] Gupta, M., & Jana, D. (2003). E-government evaluation: A framework and case study. Government information
[17] quarterly, 20(4), 365-387.
[18] Gupta, M., & Goyal, E. (2011). Applicability of Mobile Learning Engine-Moodle in Computer Application Course.Journal of Information Technology Management, 22(3), 51-58.
[19] He, D., Lu, Y., & Zhou, D. (2008). Empirical study of consumers` purchase intentions in C2C electronic commerce.
[20] Tsinghua Science & Technology, 13(3), 287-292.
[21] Heeks, R. (2006). Health information systems: Failure, success and improvisation. International journal of medical
[22] informatics, 75(2), 125-137.
[23] Horton, W. (2011). E-learning by design: John Wiley & Sons.
[24] Ho, C.L., & Dzeng, R.J. (2010). Construction Safety Training via E-Learning: Learning Effectiveness and User Satisfaction. Computers & Education, 55 (2), 858-867.
[25] Hsu, H. H. (2013). The acceptance of Moodle: An empirical study based on UTAUT. Creative Education, 3(08), 44.
[26] Hsu, H. H., & Chang, Y. Y. (2013). Extended TAM model: Impacts of convenience on acceptance and use of Moodle. Online Submission, 3(4), 211-218.
[27] Junco, R., & Mastrodicasa, J. (2007). Connecting to the net. generation: What higher education professionals need
[28] to know about today`s students: NASPA, Student Affairs Administrators in Higher Education.
[29] Keller, J. M. (2008). First principles of motivation to learn and e3‐learning. Distance education, 29(2), 175-185.
[30] Kim, H., Kim, T., & Shin, S. (2009). Tourism Management, 30(null), 266.
[31] Klopping, I. M., & McKinney, E. (2004). Extending the technology acceptance model and the task-technology fit model to consumer e-commerce. Information Technology, Learning, and Performance Journal, 22(1), 35.
[32] Lin, F., Fofanah, S. S., & Liang, D. (2011). Assessing citizen adoption of e-Government initiatives in Gambia: A validation of the technology acceptance model in information systems success. Government Information Quarterly, 28(2), 271-279.
[33] Moodle Statistics. (n.d.) retrieved on (Apr 2017) from https://moodle.net/stats/
[34] Moodle Overview (n.d.) retrieved on (Apr 2017) from https://moodle.com/moodle-lms/
[35] Moodle Partners (n.d.) retrieved on (Apr 2017) from https://moodle.com/partners/
[36] Marin, S. T., Garcia, F. B., Torres, R. M., Vázquez, S. G., & Moreno, A. L. (2005). Implementation of a web-based
[37] educational tool for digital signal processing teaching using the technological acceptance model. IEEE Transactions
[38] on Education, 48(4), 632-641.
[39] Masa`deh, R. e., Obeidat, B. Y., & Tarhini, A. (2016). A Jordanian empirical study of the associations among
[40] transformational leadership, transactional leadership, knowledge sharing, job performance, and firm performance:
[41] A structural equation modelling approach. Journal of Management Development, 35(5), 681-705.
[42] Ong, C.-S., Day, M.-Y., & Hsu, W.-L. (2009). The measurement of user satisfaction with question answering
[43] systems. Information & Management, 46(7), 397-403.
[44] Ong, C.-S., & Lai, J.-Y. (2006). Gender differences in perceptions and relationships among dominants of e-learning
[45] acceptance. Computers in human behavior, 22(5), 816-829.
[46] Padilla-MeléNdez, A., Del Aguila-Obra, A. R., & Garrido-Moreno, A. (2013). Perceived playfulness, gender
[47] differences and technology acceptance model in a blended learning scenario. Computers & Education, 63, 306-317.
[48] Qiyao Zhu, Wentao Guo, Yan Hu, 2012.mobile learning in higher education. Bachelor’s thesis within Informatics business and IT Management,
[49] Susana, O., Juanjo, M., Eva, T., & Ana, I. (2015). Improving graduate Students` learning through the use of Moodle. Educational Research and Reviews, 10(5), 604.
[50] Tarhini, A., Teo, T., & Tarhini, T. (2016). A cross-cultural validity of the E-learning Acceptance Measure (ElAM)
[51] in Lebanon and England: A confirmatory factor analysis. Education and Information Technologies, 21(5), 1269-
[52] 1282.
[53] Venkatesh, V. (2000). Information Systems Research, 22(null), 342.
[54] Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). MIS Quarterly, 27(null), 425.
[55] Webster, J., & Martocchio, J. J. (1992). Microcomputer playfulness: Development of a measure with workplace
[56] implications. MIS quarterly, 201-226.
[57] Wu, L., & Chen, J. L. (2005). An extension of trust and TAM model with TPB in the initial adoption of on-line tax: an empirical study. International Journal of Human-Computer Studies, 62(6), 784-808.
Citation
Ashish, "A Study on The Factors That Influence the Acceptance of LMS’s In Higher Educational Institution’s", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.134-140, 2019.
Current System of Banking: An Analysis in Reference of Capital Raipur of Chhattisgarh State
Review Paper | Journal Paper
Vol.07 , Issue.03 , pp.141-144, Feb-2019
Abstract
The proposed work is based on questionnaire base primary data and its analysis through numerically and linguistically terminology. The resultant is found as banking is an optimized principle known by the public as per essential but not as generalized. This paper proposed a new model of banking for the future prospective. We presented a new function based on economical & transaction application. There are some variants in banking found in the paper. These e variants will be formulated for the future banking is suggested as the resultant.
Key-Words / Index Term
questionaire, banking, numerically, linguistically
References
[1] Jhingan M.L., Money Banking International trade & public finance, Vrinda publication(p) ltd., 2012.
[2] Shekhar K C,Shekhar Lekshmy,Banking: theory & practice ,Vikas publishing,2013.
[3] Sethi Bhatia Nishwan, Elements of banking & insurance, PHI private limited,2004.
[4] Zacharias K.D. ,Legal & Regulatory aspects of banking(Indian Institute of banking & finance, Macmillan publishers India Ltd,2005
[5] Heffernan Shelagh,Modern banking,British Library Cataleging in publication data,2004.
[6] Desai Vasant: “Indian Financial system “ Himalaya Publishing House 2005.
[7] Tannan M.L., Banking law & practice in India,Indian law house,Delhi 2002.
[8] Sri.Jubair T.,Banking & finance,University of Calicut,School of distance education.
[9] Banking law & practice,The institute of company secretaries of India,2014.
[10] English Common law,United Dominions trust ltd, Vs Kirkwood,1966,English count of appeal.
Citation
Ruchi Gupta, Sunil Kumar Kashyap, "Current System of Banking: An Analysis in Reference of Capital Raipur of Chhattisgarh State", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.141-144, 2019.
A Fault Tolerant Model for Geometric Patterns of Swarm Agents
Survey Paper | Journal Paper
Vol.07 , Issue.03 , pp.145-151, Feb-2019
Abstract
Swarm robotics is based on the characteristics displayed by the insects and their colony and is applied to solve real world problems utilizing multi-robot systems. Research in this field has demonstrated the ability of such robot systems to assemble, inspect, disperse, aggregate and follow trails. A set of mobile and self-sufficient robots which has very restricted capabilities can form intricate patterns in the environment they inhabit. However, coordination of multiple robots to accomplish such tasks remains a challenging problem. Pattern formation is one of typical problems in the field of multi-robot cooperation. Compare to traditional multi-robot coordination algorithm, the method based on swarm robots to solve the issue of pattern formation has better scalability and dynamic adaptability and robustness. The swarm robots have only local perception and very limited local communication abilities, so one of the challenging tasks while designing swarm robotic systems with desired collective behaviour is to understand the effect of individual behaviour on the group performance. So fault tolerance is another issue to deal with. This paper reviews the background knowledge and some noticeable achievements in the field of pattern formation and fault tolerance.
Key-Words / Index Term
Swarm robotics, pattern formation, swarm intelligence, particle swarm intelligence, fault tolerance
References
[1] Bonabeau, E., Dorigo, M., and Theraulaz, G. (2000). Inspiration for optimization from social insect behaviour. Nature, 406(6791):39–42.
[2] Bonabeau, E., Dorigo, M., and Theraulaz, G. (1999). Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press, New York.
[3] Dorigo, M. and Sahin, E. (2004). Guest editorial. special issue: Swarm robotics. Autonomous Robots, 17:111–113.
[4] Nouyan, S., Campo, A., and Dorigo, M. (2008). Path formation in a robot swarm. Selforganized strategies to find your way home. Swarm Intelligence, 2(1):1–23.
[5] Sugihara, K. and Suzuki, I.: Distributed Algorithms for Formation of Geometric Patterns with Many Mobile Robots. Robotic Systems 13 (1996) 127–139
[6] Suzuki, I. and Yamashita, M.: Distributed Anonymous Mobile Robots: Formation of Geometric Patterns. SIAM J. on Computing 28 4 (1999) 1347–1363
[7] Prencipe, G.: Corda: Distributed Coordination of a Set of Atonomous Mobile Robots. In Proc. 4th European Research Seminar on Advances in Distributed Systems, May 2001, 185–190
[8] Prencipe, G.: Instantaneous Actions vs. Full Asynchronicity: Controlling and Coordinating a Set of Autonomous Mobile Robots. In Proc. 7th Italian Conf. on Theoretical Computer Science, October 2001, 185–190.
[9] Suzuki, I. and Yamashita, M.: Distributed Anonymous Mobile Robots – Formation and Agreement Problems. In Proc. 3rd Colloq. on Structural Information and Communication Complexity (1996) 313–330
[10] Defago X, Konagaya A (2002) Circle Formation for Oblivious Anonymous Mobile Robots with No Common Sense of Orientation. In Proceedings of the second ACM international workshop on Principles of mobile computing, pp.97-104.
[11] Ryan O. Abel, Soura Dasgupta And Jon G. Kuhl, “Coordinated Fault Tolerant Optimal Control Of Autonomous Agents: Geometry And Communications Architecture”. In Communications In Information And Systems Vol. 11, No. 2, pp. 173-196, 2011
[12] Debasish Pattanayak, Kaushik enMondal, H. Ramesh and Partha Sarathi Mandal, “Fault-Tolerant Gathering of Mobile Robots with Weak Multiplicity Detection”, ICDCN ’17 January 4–7, 2017, Hyderabad, India
[13] P. Flocchini, G. Prencipe, N. Santoro, and P. Widmayer. Hard tasks for weak robots: The role of common knowledge in pattern formation by autonomous mobile robots. In Proc. 10th Int`l Symp. on Algorithms and Computation (ISAAC`99), volume 1741 of LNCS, pp93-102, Chennai, India, Dec. 1999. Springer.
[14] Alan F.T. Winfield and Julien Nembrini : Safety in numbers: fault-tolerance in robot swarms, Int. J. Modelling, Identification and Control, Vol. 1, No. 1, 2006
[15] Yun X, Alptekin G, Albayrak O (1997) Line and circle formation of distributed physical mobile robots. Journal of Robotic Systems, 14(2):63-76.
[16] Cohen, R. and Peleg, D.: Robot Convergence via Center-of-Gravity Algorithms. In Proc. 11th Colloq. on Structural Information and Communication Complexity (2004) 79–88.
[17] Bingu Shim, Beomho Baek, Suntae Kim, Sooyong Park: “A Robot Fault-tolerance Approach Based on Fault Type”.
[18] Okay Albayrak: “Line and Circle Formation of Distributed Autonomous Mobile Robots with limited sensor range”, Journal of Robotic Systems— 1997,p:64-76
[19] Chatzigiannakis I, Markou M, Nikoletseas S (2004) Distributed Circle Formation for Anonymous Oblivious Robots. In 3rd Workshop on Efficient and Experimental Algorithms, Lecture Notes in Computer Science, 3059:159-174.
[20] Michael, Andrew Mario, "Circle formation algorithm for autonomous agents with local sensing" (2004). Thesis. Rochester Institute of Technology.
[21] Cem Unsal, "Self organization in large populations of mobile robots", MS Thesis, Virginia Polytechnic Institute and State University, May 1993.
[22] T. Balch and M. Hybinette, "Social potentials for scalable multi-robot formations", Proceedings of IEEE International Conference on Robotics and Automation, pp. 73-80, April 2000
[23] T. Balch and M. Hybinette, "Behavior-based coordination of large-scale robot formations", Proceedings of Fourth
[24] T. Balch and R.C.Arkin, "Behavior-based formation control for multirobot teams", IEEE Transactions on Robotics and Automation, pp. 926-939, Vol. 14, December 1998.
[25] J. Fredslund and M.J.Mataric, "Robot formations using only local sensing and control", Proceedings of IEEE International Symposium Computational Intelligence in Robotics and Automation, pp. 308-313, Aug. 2001
[26] J. Fredslund and M.J. Mataric, "A general algorithm for robot formations using local sensing and minimal communication", Proceedings of IEEE Transactions on Robotics and Automation, pp 837-846, Vol. 18, October 2002
[27] J. Fredslund, M. J. Matarić, “Robots in formation using local information,” in 7th International Conference on Intelligent Autonomous Systems, Marina Del Rey, California, 2002, pp. 100-107.
[28] Flocchini, P., Prencipe, G., Santoro, N., Widmayer, P.: Arbitrary pattern formation by asynchronous, anonymous, oblivious robots. Theor. Comput. Sci. 407, 412–447 (2008)
[29] Ani Hsieh, M., Kumar, V., Chaimowicz, L.: Decentralized controllers for shape generation. Robotica 26, 691–701 (2008)
[30] Noa Agmon and David Peleg, “ Fault-Tolerant Gathering Algorithms for Autonomous Mobile Robots” ,SIAM (Society for Industrial and Applied Mathematics) Journal of Computing, 2006 , Vol. 36, No. 1, pp. 56–82
[31] Chirag Maheshwari, Circle Formation by Autonomous, Anonymous and Oblivious Mobile Robots, a project report at NIT Guwhati, 2014
[32] Pilar Arques(B), Fidel Aznar, and Mireia Sempere, Positioning of Geometric Formations in Swarm Robotics. In 2016
[33] Flocchini, P., Prencipe, G., Santoro, N., Viglietta, G.:Distributed Computing by Mobile Robots: Uniform Circle Formation ,18th International Conference on Principles of Distributed Systems, 2016
[34] S. Das, P. Flocchini, N. Santoro, and M. Yamashita : Forming sequences of geometric patterns with oblivious mobile robots. Distributed Computing, 28(2): 131-145, 2015.
[35] Yamauchi, Y., Yamashita, M.: Pattern formation by mobile robots with limited visibility. In: 20th International Colloquium on Structural Information and Communication Complexity (SIROCCO), pp. 201–212 (2013)
[36] Fujinaga, N., Ono, H., Kijima, S., Yamashita, M.: Pattern formation through optimum matching by oblivious corda robots. In:14th InternationalConference on Principles of Distributed Systems (OPODIS), pp. 1–15 (2010)
[37] M. Mamino, G.Vigliettay, Square Formation by Asynchronous Oblivious Robots, CCCG 2016
[38] Dongdong Xu, Xingnan Zhang, Zhangqing Zhu, Chunlin Chen, and Pei Yang, Behavior-Based Formation Control of Swarm Robots, Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2014, Article ID 205759, 13 pages
[39] Karthikeyan Swaminathan and Ali A. Minai (2006), General Approach to Swarm Coordination using Circle Formation, in Stigmergic Optimization, A. Abraham, C. Grosan, and V.Ramos (Eds.), Springer verlag , pp 65-84.
[40] In 2010 Blesson Varghese and Gerard T. McKee, “A Mathematical Model, Implementation and Study of a Swarm System”, Robotics and Autonomous Systems 58(3):287-294, March 2010
[41] Anand. A, Nithya. M and Sudarshan TSB, Coordination of Mobile Robots with Master-Slave Architecture for a Service Application, International Conference on Contemporary Computing and Informatics (IC3I), IEEE 2014, p:539-543
[42] S. Gan Chaudhuri, S. Ghike, S. Jain and K. Mukhopadhyaya, Pattern Formation for Asynchronous Robots without Agreement in Chirality, Elsevier March 2014
[43] Bjerknes, J. D. and Winfield, A. F. (2013) On fault tolerance and scalability of swarm robotic systems. In: Martinoli, A., Mondada, F., Correll, N., Mermoud, G., Egerstedt, M., Hsieh, M., Parker, L. And Sty, K., eds. (2013) Distributed Autonomous Robotic Systems: The 10th International Symposium. (83) Springer, pp. 431-444. ISBN 9783642327223
[44] Ross Mead, Jerry B. Weinberg, “Cellular Automata for Control and Interactions of Large Formations of Robots”, Thesis 2008, Southern Illinois University Edwardsville Edwardsville, Illinois
[45] Fault-Tolerant Formations of Mobile Robots, Ross Mead, Rob Long, and Jerry B. Weinberg, Member, IEEE, The 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems October 11-15, 2009 St. Louis, USA
[46] Debdipta Goswami, Chiranjib Saha, Kunal Pal, Nanda Dulal Jana and Swagatam Das, “Multi-Agent Shape Formation and Tracking Inspired from a Social Foraging Dynamics”, 2014, arXiv [cs.NE]
[47] Xingyan Li and Lynne E. Parker, “Sensor Analysis for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks” Proc. of IEEE International Conference on Robotics and Automation, Rome, Italy, 2007.
[48] Christensen, A.L., O’Grady, R. and Dorigo, M., “From Fireflies to Fault Tolerant Swarms of Robots” IRIDIA – Technical Report Series Technical Report No. TR/IRIDIA/2008-002 January 2008
Citation
S.K. Rakesh, M. Shrivastava, "A Fault Tolerant Model for Geometric Patterns of Swarm Agents", International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.145-151, 2019.