Estimation of Underdamped Overshoot in Second-Order Control Systems
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.97-100, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.97100
Abstract
The paper investigates the problem of overshoot estimation decreasing for underdamped second-order control systems. A new technique to control the overshoot is proposed, which is based on Posicast control and proportional integral and derivative (PID) control, which performs switching between two controllers. The aim is to use open-loop feedforward control to increase tracking performance and PID control to deal with disturbance rejection. It has been shown that the proposed control scheme can have some advantages over the classical approaches without switching capabilities.
Key-Words / Index Term
PID control, Posicast control, Second-order systems, Anti-windup
References
[1]. Chiang Loh P., Gajanayake C. J., Vilathgamuwa D. M. and Blaabjerg F., (2008). Evaluation of Resonant Damping Techniques for Z-Source Current-Type Inverter. IEEE Transactions on Power Electronics, Vol. 23, No. 4, pp. 2035-2043.
[2]. Hanus, Kinnaert M. and Henrotte J. L., (1987). Conditioning technique, a general anti-windup and bumpless transfer method. Automatica, Vol.23,
[3]. Kucera V. and Hromcik M., (2011), Delay-based input shapers in feedback interconnections, Preprints of the 18th IFAC World Congress, pp. 7577-7582.
[4]. Singhose, W. (2009). Command Shaping for Flexible Systems: A Review of the First 50 Years, Int. Journal of Precision Eng. and Manufacturing, Vol. 10, No. 4, pp. 153-168.
[5]. Yildiz Y., Annaswamy A., Kolmanovsky I. and Yanakiev D., Adaptive posicast controller for time-delay systems with relative degree n*≤2, (2010), Automatica 46, pp. 279-289.
Citation
Rakesh Mishra, J.P. Upadhyay, Surekha Gupta, "Estimation of Underdamped Overshoot in Second-Order Control Systems", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.97-100, 2019.
GA-PSO Based Clustering Algorithm For Multi View Data: A Survey
Survey Paper | Journal Paper
Vol.07 , Issue.10 , pp.101-106, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.101106
Abstract
Data mining an non-trivial extraction of novel, implicit, and actionable knowledge from large data sets is an evolving technology which is a direct result of the increasing use of computer databases in order to store and retrieve information effectively. This paper gives an idea of optimization algorithm by which the efficient result can be fetched. Optimization is a dire need for a huge amount of data processing. So that optimization is a challenging issue in data mining. It seems to be that there are many different approaches has been proposed by authors in order to optimize the results. Partial swam optimization and genetic algorithms are some sort of approach which can be used for optimization.
Key-Words / Index Term
Data Mining, Clustering, Optimized Algorithm, PSO, GA
References
[1] Satyasai Jagannath Nanda, Ganapati Panda, Automatic clustering algorithm based on multi-objective Immunized PSO to classify actions of 3D human models, Engineering Applications of Artificial Intelligence, Volume 26, Issues 5–6, May–June 2013, Pages 1429-1441
[2] Tuğrul Çavdar, PSO tuned ANFIS equalizer based on fuzzy C-means clustering algorithm, AEU - International Journal of Electronics and Communications, Volume 70, Issue 6, June 2016, Pages 799-807,
[3] Amin Khatami, Saeed Mirghasemi, Abbas Khosravi, Chee Peng Lim, Saeid Nahavandi, A new PSO-based approach to fire flame detection using K-Medoids clustering, Expert Systems with Applications, Volume 68, February 2017, Pages 69-80
[4] Hui-Liang Ling, Jian-Sheng Wu, Yi Zhou, Wei-Shi Zheng, How many clusters? A robust PSO-based local density model, Neurocomputing, Volume 207, 26 September 2016, Pages 264-275
[5] Chen Jinyin, Lin Xiang, Zheng Haibing, Bao Xintong, A novel cluster center fast determination clustering algorithm, Applied Soft Computing, Volume 57, August 2017, Pages 539-55
[6] Xiaojun Chen, Xiaofei Xu, Joshua Zhexue Huang, and Yunming Ye “TW-k-Means: Automated Two-Level Variable Weighting Clustering Algorithm for Multi-view Data” in IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 4, April 2013
[7] Enmei Tu , Longbing Cao , Jie Yang , Nicola Kasabov “A novel graph-based k-means for nonlinear manifold clustering and representative selection” in Elsevier transaction of Neuro computing 143 (2014) 109–122
[8] T. Velmurugan “Performance based analysis between k-Means and Fuzzy C-Means clustering algorithms for connection oriented telecommunication data” in Elsevier transaction of Applied Soft Computing 19 (2014) 134–146
[9] Grigorios Tzortzis “The Min Max k-Means clustering algorithm” in Elsevier transaction of Pattern Recognition 47 (2014) 2505–2516
[10] Cheng-Huang Hung , Hua-Min Chiou b, Wei-Ning Yang “Candidate groups search for K-harmonic means data clustering” in Elsevier transaction of Applied Mathematical Modelling 37 (2013) 10123–10128
[11] Yi Ding, Xian Fu, Kernel-based fuzzy c-means clustering algorithm based on genetic algorithm, Neuro Computing, Volume 188, 5 May 2016, Pages 233-238
[12] A. Mukhopadhyay, U. Maulik and S. Bandyopadhyay, "Multiobjective Genetic Algorithm-Based Fuzzy Clustering of Categorical Attributes," in IEEE Transactions on Evolutionary Computation, vol. 13, no. 5, pp. 991-1005, Oct. 2009.
[13] J. Zhang, H. S. H. Chung and W. L. Lo, "Clustering-Based Adaptive Crossover and Mutation Probabilities for Genetic Algorithms," in IEEE Transactions on Evolutionary Computation, vol. 11, no. 3, pp. 326-335, June 2007.
Citation
Amitosh Patel, Shuchita Mudgil, "GA-PSO Based Clustering Algorithm For Multi View Data: A Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.101-106, 2019.
Hybrid Power System for Power Quality Improvement and Security Analysis
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.107-110, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.107110
Abstract
The generation of electricity through renewable sources has exponentially increased in recent years in response to environmental pollution caused by fossil fuels. When we talk about renewable energy is difficult not to refer to solar energy, wind energy, biomass energy and Pedal generation due to its high rate of growth compared to their peers and potential. This is associated with the fact that the government is implementing a process of changing the production of energy and country`s energy matrix where one of the fundamental pillars is to eliminate dependence on fossil resources and promote the use of renewable energy especially for rural areas. Therefore, this makes clear that it is important and needed to study the effects and possible problems related to renewable energy that entails the use of photovoltaic systems connected to the network with hybrid one like pedal system generation which is easily available. In this context, the work focuses on power quality by connecting photovoltaic to low-power electrical system with using solar and pedal generation simultaneously. Objective of this research based on other sources of energy i.e. renewable energy, because we have limited sources of non renewable sources of energy i. e. coal diesel, petrol etc. Energy crises need to search for other source of energy that is specifically renewable energy. Human power praise is more because of health benefit as a source of energy. And in this peoples are more aware to his health point of view. More effective use of human power could be achieved through properly design approach. Human power as prime mover used to operate working unit is termed as human powered machine (bicycle) and this machine is different from conventional bicycle because it can operate with different arrangement with the help of hand or leg or in special case with the help of animal power and in developed machine combination of gear arrangement and chain are used. In this paper two models are simulated one for solar energy and other for pedal energy both are the alternate sources of energy and easily available. In the developed system energy security is also maintained with continuity of supply with safe operation
Key-Words / Index Term
Power Quality, Power Filter, power electronic Controller, Harmonics Compensation, Total Harmonic Distortion
References
[1] Wilson, D. G., (1986), Understanding Pedal Power, Technical paper 51, ISBN: 0-86619-268-9.
[2] Dwari S. and Parsa L., (2011), An Efficient High-Step-Up Interleaved DC–DC Converter With A Common Active Clamp,, IEEE Trans. Power Electron. 26(1) 66-78.
[3] Saurabh, Dr. Saha P.K., Dr. Panda G.K., ,A High Step Up Boost Converter Using Coupled Inductor With PI Control,, IJAREEIE, 4(1), 329-336.
[4] Murali Krishna R.L., (2014), Simulation Of An Efficient Hybrid Transformer DC-DC Converter For PV Based Renewable Energy Sources-Power Conditioning Systems (PCS) Applications With High Boost Ratio, IJSEAT, 2(9), 364-378.
[5] Martin, J.C., Davidson, C.J., & Pardyjak, E.R. (2007). Understanding sprint-cycling performance, the integration of muscle power, resistance, and modelling. International Journal of Sports Physiology and Performance, 2(1), 5–21.
[6] Gu B., Dominic J., Lai J. S. and Liu C., (2013) ,High Boost Ratio Hybrid Transformer DC-DC Converter For Photovoltaic Module Applications, IEEE Trans Power Electron, 28(4),2048-2058.
[7] Kumary K. S. Revathi B., (2015), High Boost Ratio Hybrid Transformer DC-DC Converter For PV Grid Applications,, IJSR, 4(3), 1711-1714.
[8] Kumar V. H, Sundar K. S., (2016), Optimized Magnetics And Improved Power Devices Utilization For PV Modules By Using Hybrid Transformer ZVS/ZCS DC-DC Converter, IJMETMR, 03(06).
[9] Kanimozhi S., Dr. V. R. (2014),Implementation Of A Non-Isolated, High Gain ZVS/ZCS DC-DC Converter,, IJETAE, 4(5), May 2014, 568-575.
[10] Bukya R.,Design Of Modified Single Input Multiple Output Dc-Dc Converter,, IJCSMC, 3(10), 373-379.
Citation
Ajay Kumar Mishra, Bharat Mishra, A. K. Sharma, "Hybrid Power System for Power Quality Improvement and Security Analysis", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.107-110, 2019.
Improving Security of Blockchain Through Authorisation
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.111-114, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.111114
Abstract
Blockchain is the chain of blocks and each block consists a time stamp, transaction data and a cryptographic hash of previous block. It is a decentralized distributed network in which each peer node connected with each other and shares history of all the transactions. Each new block added to blockchain whenever a transaction occur need to be verified by all the peer node and transaction executed successfully if more that 50% allows. There are some vulnerabilities which are present in Blockchain because of its publicly open network and lack of security certification. We tried to modify the Blockchain with the use of smart contracts with the existing blockchain network and using X.509 Certification for specifying the permission allotted to each peer node at the time it is added to the network.
Key-Words / Index Term
Blockchain,Block,Node,X.509Certificate,Cryptographic,Hash,Vulnerabilities
References
[1]DMITRY EFANOV, PAVEL ROSCHIN, ALL-PERVASIVENESS OF THE BLOCKCHAIN TECHNOLOGY, PROCEDIA COMPUTER SCIENCE ,VOLUME 123, 2018, PAGES 116-121
[2] ZIGA TURK, ROBERT KLINC, POTENTIALS OF BLOCKCHAIN TECHNOLOGY FOR CONSTRUCTION MANAGEMENT,PROCEDIAENGINEERING,VOLUME 196, 2017, PAGES 638-645
[3]LichengWang,XiaoyingShen,JingLi,JunShao,YixianYangCryptographic primitives in blockchains,Journal of Network and computerApplicationsVolume127, 2019, Pages 43-58
[4] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.
[5] Philip A. Bernstein, Eric Newcomer, in Principles of Transaction Processing (Second Edition), 2009
[6] L. M. BACH ; B. MIHALJEVIC ; M. ZAGAR , COMPARATIVE ANALYSIS OF BLOCKCHAIN CONSENSUS ALGORITHMS,IEEE,2018
[7]V.Y.Kulkarni,R.A.Rane,P.Mestr,S.Panchal, Risk Rating System of X.509 Certificates, Procedia Computer Science, Volume 89, 2016, Pages 152-161
[8] Adam MihaiGergelyBogdanCrainicu, The Concept of a Distributed Repository for Validating X.509 Attribute Certificates in a Privilege Management Infrastructure Procedia Technology,Volume 22, 2016, Pages 926-930
[9]R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980.
[10]S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
[11]H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
[12] Farrell S, Housley R., An Internet Attribute Certificate Profile for Authorization, Request for Comments: 3281, Network Working Group, Standards Track, IETF, 2002.
focuses on An Introduction to Methods of Backup and Disaster Recovery for Cloud Computing .
Citation
Vivek Sharma, Nagendra Kumar, "Improving Security of Blockchain Through Authorisation", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.111-114, 2019.
Improving the Performance of Sentiment Analysis by Using Feature Combinations with Machine Learning
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.115-121, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.115121
Abstract
Micro blogging websites like Twitter and Facebook, in this new era, is loaded with opinions and data. One of the most widely used micro-blogging site, Twitter, is where people share their ideas in the form of tweets and therefore it becomes one of the best sources for sentimental analysis. Opinions can be widely grouped into three categories good for positive, bad for negative and neutral and the process of analyzing differences of opinions and grouping them in all these categories is known as Sentiment Analysis. Data mining is basically used to uncover relevant information from web pages especially from the social networking sites. Merging data mining with other fields like text mining, NLP and computational intelligence we are able to classify tweets as good, bad or neutral. In order to improve classification results in the domain of sentiment analysis, we are using ensemble machine learning techniques for increasing the efficiency and reliability of proposed approach. For the same, we are using Linear Support Vector Machine and experimental results prove that our proposed approach is providing better classification results in terms of f-measure and accuracy in contrast to individual classifiers. We also use accuracy comparison framework for comparing algorithms based on execution time.
Key-Words / Index Term
Sentiment Analysis,Twitter,Adjective analysis,Naïve Bayes,Linear SVM
References
[1]. Witte, R., Li, Q., Zhang, Y., et al.: ‘Text mining and software engineering: an integrated source code and document analysis approach’, IET Softw., 2008, 2,(1), pp. 3–16.
[2]. Delen, D., Cross land, M.D.: ‘Seeding the survey and analysis of research literature with text mining’, Expert Syst. Appl., 2008, 34, pp. 1707–1720.
[3]. Marine-Roig, E., Anton Clavé, S.: ‘Tourism analytics with massive user generated content: a case study of Barcelona’, J. Destination Mark. Manage. 2015, 4, pp. 1–11.
[4]. ‘Twitter Official Webpage’, 2016. Available at https://about.twitter.com/company, Accessed: March, 2016.
[5]. Hotho, A., Andreas, N., Paaß, G., et al.: ‘A brief survey of text mining’, LDV Forum – GLDV J. Comput. Linguist. Lang. Technol., 2005, 20, pp. 1–37.
[6]. Feldman, R., Dagan, I.: ‘Knowledge discovery in textual databases (KDT)’. Int. Conf. Knowledge Discovery and Data Mining (KDD), 1995, pp. 112–117. Available at http://www.aaai.org/Papers/KDD/1995/KDD95-012.pdf, Accessed: March 2016.
[7]. Shi, G., Kong, Y.: ‘Advances in theories and applications of text mining’. Int. Conf. Information Science and Engineering (ICISE2009), 2009, pp. 4167–4170.
[8]. Sivarajah, Uthayasankar, Zahir Irani, and Vishanth Weerakkody, "Evaluating The Use And Impact of Web 2.0 Technologies in Local Government," Government Information Quarterly. Elsevier, pp. 473–487, 2015.
[9]. Magdalini Eirinaki, Shamita Pisal, and Japinder Singh, “Feature based opinion mining and ranking,” Journal of Computer and System Sciences, vol.78, pp. 1175–1184, 2012.
[10]. Kushal Bafna, and Durga Toshniwal, “Feature Based Summarization of Customers` Reviews of Online Products,” in proc. 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems –KES, vol. 22, pp. 142-151,2013.
[11]. Minqing Hu, and Bing Liu, “Mining and Summarizing Customer Reviews,” Association for Computing Machinery -ACM, pp. 168-177, 2004.
[12]. Edison Marrese-Taylor, Juan D. Velásquez, and Felipe Bravo-Marquez, “A novel deterministic approach for aspect-based opinion mining in tourism products reviews,” Expert Systems with Applications, vol. 41, pp. 7764–7775, 2014.
[13]. Changqin Quan, and Fuji Ren, “Unsupervised product feature extraction for feature-oriented opinion determination,” Information Sciences, vol. 272, pp. 16–28, 2014.
[14]. Zhijun Yan, Meiming Xing, Dongsong Zhang, and Baizhang Maa, “EXPRS: An extended pagerank method for product feature extraction nbbn from online consumer reviews,” Information & Management, vol. 52, pp. 850–858, 2015.
[15]. Ayoub Bagheri, Mohamad Saraee, and Franciska de Jong, “Care more about customers: Unsupervised domain-independent aspect detection for sentiment analysis of customer reviews,” Knowledge Based Systems, vol.52, pp. 201–213, 2013.
[16]. Xiaohui Yu, Yang Liu, Jimmy Xiangji Huang, Aijun An, “Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA, vol. 24, No.4, APRIL 2012.
[17]. Andrei Oghina, Mathias Breuss, Manos Tsagkias & Maarten de Rijke. (2012) Predicting IMDB movie ratings using social media. Proceedings of the 34th European conference on Advances in Information Retrieval, pp. 503-507.
[18]. U.V Kulkarni, S.V Shinde, “Neuro –fuzzy classifier based on the Gaussian membership function”, 4th ICCCNT 2013, July 4-6, 2013, Tiruchengode, India.
[19]. Vikramaditya Jakkula, “Tutorial on Support Vector Machine” ,2013.
[20]. Shahrukh Teli M-Tech Student, Prashasti Kanikar Assistant Professor, MPSTME SVKM’SNMIMS University, Mumbai, India.“A Survey on Decision Tree Based Approaches in Data Mining”, 2015.
[21]. Lan Li, Shaobin Ma, Yun Zhang, “Optimization Algorithm based on Support Vector Machine” in Seventh International Symposium on Computational Intelligence and Design, 2014.
[22]. Duric Adnan, Song Fei., “Feature selection for sentiment analysis based on content and syntax models”, Decis Support Syst, 53:704–11, 2012.
[23]. Hemnaath, R., and Low, B.W. “Sentiment Analysis Using Maximum Entropy and Support Vector Machine.” Semantic Technology and Knowledge Engineering, 2010.
[24]. L. Jiang, M. Yu, M. Zhou, X. Liu and T. Zhao, "Target dependent twitter sentiment classification", Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 151--160, 2011.
[25]. L. Chen, C. Liu and H. Chiu, "A neural network based approach for sentiment classification in the blogosphere", Journal of Informatics, vol. 5, no. 2, pp. 313-322, 2011.
[26]. M. Anjaria and R. Guddeti, "Influence factor based opinion mining of Twitter data using supervised learning", Communication Systems and Networks (COMSNETS), 2014 Sixth International Conference on, pp. 1--8, 2014.
[27]. A. Barhan and A. Shakhomirov, "Methods for Sentiment Analysis of Twitter Messages", 12th Conference of FRUCT Association, 2012.
Citation
Shradha Gautam, Brajesh Patel, "Improving the Performance of Sentiment Analysis by Using Feature Combinations with Machine Learning", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.115-121, 2019.
K-MEAN++ Applied To Solve Problems of Data Security in Data Science
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.122-126, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.122126
Abstract
In this paper, we describe an application K-MEAN++ clustering algorithm and Data Encryption Standard algorithm for security of information and large volumes data. Data are highly complex multidimensional signals, with rich and complicated information content Data science. For this reason they are difficult to analyze through a unique automated approach. However a K-MEAN++ scheme & Data Encryption Standard are helpful for the understanding of security of data content in Data science. In any system that captures, stores, analyzes, manages, and presents data that are linked to location and like Image satellite sensors acquire huge volumes of imagery to be processed and stored in big archives. Technically, a data science is a data modelling that includes mapping software and its application to data set , land surveying, aerial photography, mathematics, geography, and tools that can be implemented with Data science software Building a hierarchy is a fruitful area if one likes the challenge of having difficult technical problems to solve. Some problems have been solved in other technologies such as database management. However, Data science throws up new demands, therefore requiring new solutions. In this paper we have examine difficult problems, and to be solved and gives some security methods to solve the problem of data security using clustering algorithm.
Key-Words / Index Term
K-MEAN++, Data science, Security Data Encryption Standard algorithm
References
[1] Hao, X, An, H, Zhang, L, Li, H and Wei, G. 2015. Sentiment Diffusion of Public Opinions about Hot Events: Based on Complex Network. Plos One, 10(10): e0140027. DOI: https://doi.org/10.1371/journal.pone.0140027.
[2] M.C. Burl, C. Fowlkes, and J. Roden, “Mining for image content,” in Systemic, Cybernetics, and Informatics / Information Systems: Analysis and Synthesis, Orlando, FL, July 1999.
[3] L.-K. Soh and C. Tsatsoulis, “Data mining in remotely sensed images: a general model and an application,” in Proceedings of IEEE
[4] IGARSS 1998, vol. 2, Seattle, Washington, USA, Jul 2012, pp. 798-800.
[5] J. Zhang, H. Wynne, M. L. Lee, “Image mining: issues, frameworks, and techniques,” in Proceedings of 2nd International Workshop on Multimedia Data Mining, San Francisco, USA, Aug 2001, pp.13 – 20.
[6] G.B.Marchisio andJ.Cornelison,“Content-based search and clustering of remote sensing imagery,” in Proceedings of IEEE IGARSS 1999, vol. 1, Hamburg, Germany, Jun 1999, pp. 290 – 292.
[7] A.Vellaikal, C.-C.Kuo, and S. Dao, “Content-based retrieval of remote sensed images uses vector quantization,” in Proc. of SPIE Visual Info. Processing IV, vol. 2488, Orlando, USA, Apr 1995, pp.178 – 189.
[8] Ying Liu, Dengsheng Zhang, Guojun Lu, Wei-Ying Ma.A Survey of content-based image retrieval with high- Level Semantics. Pattern Recognition, Volume 40, Issue 1, January 2007, Pages 262-282.
[9] Muhammad Atif Tahir, Ahmed Bouridane, Fatih Kurugollu. Imultaneous feature selection and feature weighting Using Hybrid Tabu Search/K-nearest neighbor classifier. Pattern Recognition Letters, Volume 28, Issue 4, 1 March 2007.
[10] Sarbast Rasheed, Daniel Stashuk, Mohamed Kamel.Adaptive Fuzzy k-NN classifier for EMG signals Decomposition. Medical Engineering & Physics, Volume 28, Issue 7, September 2006, Pages 694-709.
[11] J. Amores, N. SEbE, P. Radeva.Boosting the distance Estimation: Application to the K-Nearest Neighbor Classifier. Patter Recognition Letters, Volume 27, Issue 3, February 2006, Pages 201-209.
[12] Man Wang, Zheng-Lin Ye, Yue Wang, Shu-Xun Wang. Dominant sets clustering for image retrieval. M. Wang et al. /Signal Processing 88 (2008) 2843–2849., Venables W. N. and Ripley B. D. (2000), S Programming, Springer, New York..
[13] Edwards,D.,2005, Excavations at Khirbet Cane, Israel, http://anticompetitive/cane.
[14] M.C. Burl, C. Fowlkes, and J. Roden, “Mining for image content,” in Systemic, Cybernetics, and Informatics / Information Systems: Analysis and Synthesis, Orlando, FL, July 1999.
[15] Zlatanova S.: Large-scale data integration An Introduction to the Challenges for CAD and GIS Integration, Directions magazine, July 10, 2014.
[16] Van Ostracism P.: Bridging the Worlds of CAD and GIS, Directions magazine, June 17, 2004.
[17] David Arthur and Sergei Vassilvitskii: k-means++: The Advantages of
Careful seeding, Proceedings of the eighteenth Annual ACM-SIAM
Symposium on discrete algorithms. pp. 1027—1035, 2007.
[18] Zhang Y, Mao J. and Xiong Z.: An efficient Clustering Algorithm, In
Proceedings of Second International Conference On Machine Learning
And Cyber netics, November 2003.
[19] IEEE Trans. on Knowledge and Data Engineering, 14, No.5, Sept/Oct
2009.
[20] M. E. Hellman, "DES will be totally insecure within ten years", IEEE
Spectrum, vol. 16, no. 7, pp. 32-39, July 1979.
Citation
Sarita Patel, Atul Garg, Vandana Tripathi, "K-MEAN++ Applied To Solve Problems of Data Security in Data Science", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.122-126, 2019.
Load Balancing Algorithm Based On Task Transfer and Information Policy
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.127-130, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.127130
Abstract
Cloud computing is a modern paradigm to provide services through the Internet. Nowadays, cloud computing is emerging field in information technology, next generation of computing. It provides very extensive measure of computing and storage Service gave to users through the internet which follows pay-as-you-go model. Major problems faced in the cloud are resource discovery, fault tolerance, load balancing and security. Load balancing is one of the main challenges, important technique, and critical issue and plays an important role which is required to distribute workload or task equally across the nodes or servers. Load balancing is a key aspect of cloud computing and avoids the situation in which some nodes become overloaded while the others are idle or have little work to do. Load balancing can improve the Quality of Service (QoS) metrics, including response time, cost, throughput, performance and resource utilization. Scheduling in Cloud computing infrastructure contain several challenging issues like computation time, budget, load balancing etc. Out of them, load balancing is one the major challenges for Cloud platform. Load balancing basically balances the load to achieve higher throughput and better resource utilization. Since scheduling task is NP-complete problem, so heuristic and meta heuristic approaches are preferred options to solve the same. In this dissertation, we chose a meta-heuristic approach to solve the task scheduling problem in cloud environment focussing mainly on two objectives, i.e., minimizing the makespan/ computation time and better load balancing.
Key-Words / Index Term
Load balancing, Execution time, response time, Task Transfer
References
[1] Peter Mell, Timothy Grance, “The NIST definition of Cloud Computing (September, 2011)”, Accessed on May, 2014.
[2] Maryam Masoudi Khorsand, Mehdi Effatparvar and Mahdi Kanani, “A survey of Scheduling Algorithms in Grid Computing,” International Journal of Research in Computer Applications and Robotics, ISSN 2320-7345, Volume 2, Issue 2, Pg. 118-126,February 2014.
[3] Mahajan, Komal, Ansuyia Makroo, and Deepak Dahiya. "Round Robin with server affinity: a VM load balancing algorithm for cloud based infrastructure. “Journal of information processing systems 9.3 (2013): 379-39.
[4] Liang, Po-Huei, and Jiann-Min Yang. "Evaluation of Cloud Hybrid Load Balancer (CHLB)." International Journal of E-Business Development (2013).
[5] Moharana, Shanti Swaroop, Rajadeepan D. Ramesh, and Digamber Powar. "Analysis of load balancers in cloud computing." International Journal of Computer Science and Engineering 2.2 (2013): 101-108.
[6] Domanal, Shridhar G., and G. Ram Mohana Reddy. "Load Balancing in Cloud Computing using Modified Throttled Algorithm." Cloud Computing in Emerging Markets (CCEM), 2013 IEEE International Conference on. IEEE, 2013.
[7] Nakrani, Sunil, and Craig Tovey. "On honey bees and dynamic server allocation in internet hosting centers.” Adaptive Behavior 12.3-4 (2004): 223-240.
[8] Nishant, Kumar, et al. "Load balancing of nodes in cloud using ant colony optimization." Computer Modelling and Simulation (UKSim), 2012 UKSim 14th International Conference on. IEEE, 2012.
[9] R.Achar, Optimal Scheduling of Computational task in Cloud using Virtual Machine Tree, Third International Conference on Emerging Applications of Information Technology(EAIT), IEEE, 2012.
[10] Tushar Desai, Jignesh Prajapati “A Survey Of Various Load Balancing Techniques And Challenges In Cloud Computing” IJSTR, 2013.
[11] Reena Panwar , Prof. Dr. Bhawna Mallick ”Load Balancing in Cloud Computing Using Dynamic Load Management Algorithm” , IEEE 2015.
Citation
Aakriti Pathak, Anshul Khurana, "Load Balancing Algorithm Based On Task Transfer and Information Policy", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.127-130, 2019.
A Detection and Prevention of Ddos Attacks
Review Paper | Journal Paper
Vol.07 , Issue.10 , pp.131-124, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.131124
Abstract
Nowadays, cloud computing is very important because of its benefits. But it is also prone to attacks due to vulnerabilities of the websites. DDoS is distributed denial of service where Trojan infected computers are used to target a system to cause traffic jams and genuine users can not able get the service of websites. DDOS affects internet services like e-commerce, e-banking, education, medicine, reservations, agriculture etc. In this way both the end systems are controlled by hackers. There are three categories – volume-based attacks, protocol attacks and application attacks. The companies they are implementing no. of solutions to defend the attacks and continuously updating their techniques but attackers also updating their techniques and methods of attacks. So, in this paper the system is made to collect data online and with the help of association rule mining ddos attack are detected and prevented. Here techniques are used to properly detect attackers and genuine users so that cloud services can be given the users.
Key-Words / Index Term
Component, Formatting, Style, Styling, Insert (key words)
References
[1] Mohd. Azahari Mohd Yusof, Fakariah Hani ali, and Mohd. Yusof Darus. Detection and Defense Algorithms of Different types of DDoS Attack. International Journal of Engineering and Technology, October 2017.
[2] Sunny Behal. Characterization and comparison of DDoS attack tools and traffic generators. International Journal of network security, April 2017.
[3] Zhu Limiao, Haung Hua and Zheng Hao. Research on Intrusion Detection System Model based on data mining. Fourth International Conference on Multimedia Information Networking and security, 2012.
[4]Desheng Fu, Shu Zhou, Phing Guo. The design and implementation of a distributed network intrusion detection system based on data mining. World Congress on software engineering.
[5] Surbhi K. Solanki, Jalpa T. Patel. A survey on association rule mining. Fifth International Conference on Advanced computing & communication technologies.
[6]Nivedha and M. Naveen Nanda, Two layer cloud security set architecture on hypervisor. Second International Conference on Advances in Electronics, Computer and Cmmunications , 2018.
[7]Kemal Hajdarevic, Survey on machine learning algorithms as cloud services for CIDPS, 25th telecommunications forum TELFOR, Serbia, 2017.
[8]V. Priyadharshini and Dr. K.Kuppusamy, Prevention of DDOS attacks using New Cracking Algorithm, International Journal of Enginnering Research and Application, may-june 2012.
[9]Jigang ZHENG and Jingmei ZHANG, Association rule mining in DoS attack detection and defense in the application of network, 5th International Conference on Education, Management, Information and Medicine, 2015.
[10] Yaping Chi, Tingting Jiang, Xiao Li and Cong Gao, Design and implementation of cloud platform intrusion prevention system based on SDN, Department of communication engineering Beijing electronic science and technology institute, 2017.
[11] Dina Moloja and Noluntu Mpekoa, Securing M-voting using cloud Intrusion Detection and Prevention system: A New Dawn, IST, International Information Management Corporation Africa, 2017.
Citation
Anjulee Gupta, Brajesh Patel, "A Detection and Prevention of Ddos Attacks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.131-124, 2019.
A Proposed Method for Predicting Indian Loksabha Election Using Machine Learning in Social Media
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.135-143, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.135143
Abstract
Sentiment analysis is the computational study of opinions, sentiments, evaluations, attitudes, views and emotions expressed in text. It refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive or negative sentiment. Sentiment analysis over Twitter offers people a fast and effective way to measure the public’s feelings towards their party and politicians. The primary issues in previous sentiment analysis techniques are classification accuracy, as they incorrectly classify most of the tweets with the biasing towards the training data. Sentiment analysis is considered to be a category of machine learning and natural language processing. It is used to extricate, recognize, or portray opinions from different content structures, including news, audits and articles and categorizes them as positive, neutral and negative. It is difficult to predict election results from tweets in social media using different platforms. We performed data (text) mining on thousands of tweets collected over a period of a month that referenced five national political parties in India, during the campaigning period for general state elections in 2018. We made use of both supervised and unsupervised approaches. We utilized Dictionary Based, Logistic Regression algorithm as the main algorithm to build our classifier and classified the test data as positive, negative and neutral. We identified the sentiment of Twitter users towards each of the considered Indian political parties. The result of the analysis was for the BJP (Bhartiya Janta Party). Proposed algorithm predicted a chance that the BJP would win more elections in the general election. Therefore, here we adopt a lexicon based sentiment analysis method, which will exploit the sense definitions, as semantic indicators of sentiment. Our method also uses a negation handling as a pre-processing step in order to achieve high accuracy.
Key-Words / Index Term
Negation Handling; Sentiment Analysis; WordNet; SentiWordNet; Word Sense Disambiguation
References
[1] Pak and P. Paroubek, Twitter as a corpus for sentiment analysis and opinion mining Proceedings of the 7th International Conference on Language Resources and Evaluation, 2010, pp.1320-1326.
[2] “Number of monthly active Twitter users worldwide from 1st quarter 2010 to 3rd quarter 2017 “, Availabe at “https://www.statista.com/statistics/282087/number-ofmonthly- active-twitter-users/. “ [Online; accessed 4-December-2017].
[3] K. Bannister, “Sentiment Analysis”. Available: “ https://www.brandwatch.com/blog/understanding-sentimentanalysis/ ”.
[4] J. Dean and S. Ghemawat, “MapReduce: Simplified data processing on large clusters,” in Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation, Volume 6, pp. 10–10, 2004.
[5] Xiaohui Yu, Yang Liu, Jimmy Xiangji Huang, Aijun An, “Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA, vol. 24, No.4, APRIL 2012.
[6] Andrei Oghina, Mathias Breuss, Manos Tsagkias&Maarten de Rijke. (2012) Predicting IMDB movie ratings using social media. Proceedings of the 34th European conference on Advances in Information Retrieval, pp. 503-507.
[7] Liu, Bing, and Lei Zhang. "A survey of opinion mining and sentiment analysis." In Mining text data, pp. 415-463. Springer US, 2012.
[8] P. Burnap, R. Gibson, L. Sloan, R. Southern, and M. Williams, 140 characters to victory?: Using Twitter to predict the UK 2015 General Election Journal of Electoral Studies, vol. 41, pp. 230-233, 2016.
[9] M.P. Cameron., P. Barrett, and B. Stewardson, Can social media predict election results? Evidence from New Zealand Journal of Political Marketing, vol. 15, pp. 416-432, 2016.
[10] D. Gayo- Limits of electoral predictions using Twitter Proceedings of the 5th ICWSM, 2011, pp. 178 18.
[11] H.T. Le, G.R. Boynton, Y. Mejova, Z. Shafiq, and P. Srinivasan, Revisiting The American Voter on Twitter Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017, pp. 4507-4519.
[12] A. Pak and P. Paroubek, Twitter as a corpus for sentiment analysis and opinion mining Proceedings of the 7th International Conference on Language Resources and Evaluation, 2010, pp.1320-1326.
[13] B.O. Connor, R. Balasubramanyan, B.R. Routledge, and N.A. Smith,” From tweets to Polls: Linking Text Sentiment to public opinion time series” Proceedings of the 4th ICWSM, 2010, pp 122 129.
[14] Rui Xia, FengXu, ChengqingZong, QianmuLi, Yong Qi, and Tao Li, August 2015,” Dual Sentiment Analysis: Considering Two Sides of One Review”, IEEE transactions on knowledge and data engineering, Vol.27, AnNo.8.
[15] Pang, Bo, Lillian Lee, and Shivakumar Vaithyanathan. "Thumbs up?: sentiment classification using machine learning techniques." Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10. Association for Computational Linguistics, 2002.
[16] Go, Alec, Richa Bhayani, and Lei Huang. "Twitter sentiment classification using distant supervision." CS224N Project Report, Stanford 1.2009 (2009).
[17] Mohammad, Saif M., Svetlana Kiritchenko, and Xiaodan Zhu. "NRC Canada: Building the state-of-the-art in sentiment analysis of tweets."arXiv preprint arXiv:1308.6242 (2013).
[18] Pontiki, Maria, et al. "SemEval-2016 task 5: Aspect based sentiment analysis." ProWorkshop on Semantic Evaluation (SemEval-2016). Association for Computational Linguistics, 2016.
[19] Rosenthal, Sara, Noura Farra, and Preslav Nakov. "SemEval-2017 task: Sentiment analysis in Twitter." Proceedings of the 11th International Workshop on Semantic Evaluation (SemEval-2017). 2017.
[20] Yang, Ang, et al. "Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination." Security and Privacy in Social Networks and Big Data (SocialSec), 2015 International Symposium on. IEEE, 2015.
[21] Amitava Das, SivajiBandopadaya, SentiWordnet for Bangla, Knowledge Sharing Event -4: Task, Volume 2, 2010.
[22] Amitava Das, SivajiBandopadaya, ”SentiWordnet for Indian Languages”, Proceedings of the 8th Workshop on Asian Language Resources, Pages 5663, Beijing, China, August 2010.
[23] Yakshi Sharma, VeenuMangat, MandeepKaur, A practical Approach to Semantic Analysis of Hindi tweets”, 1st International Conference on Next Generation Computing Technologies(NGCT-2015), Dehradun, India,Page No(677-680), September 4-5, 2015.
[24] Yu Huangfu, Guoshiwu, Yu Su Jing Li, Pengfei Sun Jie Hu, “Än Improved Sentiment Analysis Algorithm for Chinese news”, 12th International Conference on Fuzzy Systems and Knowedge Discovery(FSKD), Page No(1366-1371), 2015.
[25] Purtata Bhoir, Shilpa Kolte, “Sentiment Analysis of Movie Reviews using Lexicon approach”, IEEE International Conference on Computational Intelligence and Computing Research, 2015.
Citation
Deeksha Vishnoi, Brajesh Patel, "A Proposed Method for Predicting Indian Loksabha Election Using Machine Learning in Social Media", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.135-143, 2019.
Reaction Based Approach to find Malicious Posts in Online Social Networks
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.144-148, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.144148
Abstract
Social network is a platform of connected peoples where peoples share relation, emotions, activities etc. Second generation social network come in existence with lots of emerging applications, which also support service oriented environment, during all kind of activities massive information is generated. These all information are in the form of post. Hence it is necessary to find category of post. A post may be legitimate or malicious. In this dissertation we are trying to find malicious post on the basis of reaction and share on particular post. All the post collected by facebook through app known as Netvizz. Entire concept implemented in R studio which is an IDE of R programming. Dissertation also contain statistical analysis of page network with the help of well known tool gephi, It is based on predefine parameter such as Eigen vector centrality,closeness ,betweenness etc.
Key-Words / Index Term
Facebook,Netvizz,Gephi,Visualization
References
[1]. Broder, A., Glassman, S., Manasse, S., and Zweig, G. "Syntactic clustering of the web." (WWW6’97) (Santa Clara, CA., April). PP 391–404, 1997.
[2]. Shivakumar, N. And Garica-Molina, H. "Finding near-duplicates of documents on the web." Web Databases (WebDB’98) (Valencia, Spain, March). PP 204–212,1998.
[3]. Heintze, N. "Scalable document fingerprinting." USENIX Electronic Commerce Workshop (Oakland, CA., November). PP 191–200,1996.
[4]. Sanderson, M. "Duplicate detection in the Reuters collection." Technical Report of the Department of Computing Science at the University of Glasgow, Glasgow G12 8QQ, UK,1997.
[5]. McCain, M., and William C. "Integrating Quality Assurance into the GIS Project Life Cycle", ESRI Users Conference 1998.
[6]. Goodchild, M., and Gopal, S. (Eds.), "Accuracy of Spatial Databases", Taylor & Francis, London, ISBN: 0-85066-847-6, 1989.
[7]. Scott L., "Identification of GIS Attribute Error Using Exploratory Data Analysis," Professional Geographer 46(3), PP 378.386. 23 FEB 2005.
[8]. FGDC Federal Geographic Data Committee, FGDC-STD- 001-1998. "Content standard for digital geospatial metadata (revised June 1998)," Federal Geographic Data Committee, Washington, D.C., 1998.
[9]. C. Policroniades and I. Pratt, “Alternatives for Detecting Redundancy in Storage Systems Data,” USENIX Annual Technical Conference, Boston, MA, USA, June 2004.
[10]. A. Muthitacharoen, B. Chen, and D. Mazieres, “A Low-bandwidth Network File System,” ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, PP 174-187, Oct. 2001.
[11]. P. Kulkarni, F. Douglis, J. LaVoie, J. M. Tracey, “Redundancy Elimination Within Large Collections of Files”, USENIX Annual Technical Conference, Boston, MA, USA, June 2004.
[12]. Cooper, James W., Coden, Anni R., Brown, Eric W., "A Novel Method for Detecting Similar Documents", Hawaii International Conference on System Sciences,2004.
Citation
Rubina khan, Anshul khurana, "Reaction Based Approach to find Malicious Posts in Online Social Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.144-148, 2019.