Research on Naive Bayes Algorithm of Breast Cancer Diagnose Data by Machine Learning
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.149-151, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.149151
Abstract
Breast cancer is one amongst the leading cancers for ladies in developed countries including Asian nation .It is the second most typical explanation for cancer death in women. The high incidence of breast cancer in women has redoubled considerably within the last years. Naïve Bayes algorithm is used for carcinoma identification Prognosis and diagnosis. Carcinoma Diagnosis is identifying of benign from malignant breast lumps and carcinoma Prognosis predicts once Breast Cancer is to recur in patients that have had their cancers excised. In this paper Naïve Bayes Algorithm is used to classify the Datasets of Breast Cancer (Diagnosis). The classification results show that when two features of maximum radius and maximum texture is selected, the classification improved accuracy is 98.6%, which is improved compared with previous method.
Key-Words / Index Term
Breast Cancer Dataset, NaïveBayes classification Algorithm
References
[1] Abdelghani Bellaachia, Erhan Guven, “Predicting Breast Cancer Survivability Using Data Mining Techniques”, The George Washington University, Washington DC 20052
[2] Shweta Kharya, “USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
[3] G. Ravi Kumar, Dr. G. A. Ramachandra, K.Nagamani, “An Efficient Prediction of Breast Cancer Data using Data Mining Techniques”, International Journal of Innovations in Engineering and Technology (IJIET)
[4] A.PRIYANGA, Dr.S.PRAKASAM, “The Role of Data Mining-Based Cancer Prediction system (DMBCPS) in Cancer Awareness”, International Journal of Computer Science and Engineering Communications- IJCSEC. Vol.1 Issue.1, December 2013
[5] Shelly Gupta, Dharminder Kumar, Anand Sharma “Data Mining Classification Techniques Applied For Breast Cancer Diagnosis And Prognosis”, Indian Journal Of Computer Science And Engineering (Ijcse)
[6] Sarvestan Soltani A. , Safavi A. A., Parandeh M. N. and Salehi M., “Predicting Breast Cancer Survivability using data mining techniques,” Software Technology and Engineering (ICSTE), 2nd International Conference, 2010, vol.2, pp.227-231.
[7] Anunciacao Orlando, Gomes C. Bruno, Vinga Susana, Gaspar Jorge, Oliveira L. Arlindo and Rueff Jose, “A Data Mining approach for detection of high-risk Breast Cancer groups,” Advances in Soft Computing, vol. 74, pp. 43-51, 2010.
[8] Abdelaal Ahmed Mohamed Medhat and Farouq Wael Muhamed, “Using data mining for assessing diagnosis of breast cnacer,” in Proc. International multiconfrence on computer science and information Technology, 2010, pp. 11-17.
Citation
Pushpraj Saket, Anshul khurana, "Research on Naive Bayes Algorithm of Breast Cancer Diagnose Data by Machine Learning", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.149-151, 2019.
Review on Rare Itemset Mining
Review Paper | Journal Paper
Vol.07 , Issue.10 , pp.152-157, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.152157
Abstract
These Data mining is the procedure of analyzing unseen patterns of data according to different point of view for classification into useful information, which is collected and gathered in common areas, such as data warehouses, for proficient investigation, data mining algorithms, assisting business decision making and other information requirements to eventually cut costs and raise profits. Data mining is also recognized as data discovery and knowledge discovery. Frequent itemset mining is a significant task in data mining to discover the hidden, interesting associations between items in the database based on the user-specified support and confidence thresholds. Patterns detected by the Association Rule Mining technique are highly useful patterns as are playing vital role in decision making. In this paper we have focused on the other side of the ARM technique which should also get equal emphasis while decision making as the patterns which are not frequent can be more valuable as those are the Rare Itemsets. The fundamental technique of finding the frequent patterns can be used reversely for Rare Itemset Mining. In this paper the brief study of the technique available for Rare Itemset Mining is discussed and explored the utility of the Rare Itemsets in the decision making.
Key-Words / Index Term
Data Mining, Association Rule Mining, Frequent Itemset, Rare Itemset, Minimal Rare Itemset
References
[1] A.Gyenesei,“Mining weighted association rules for fuzzy quantitative items”, InEuropean Conference on Principles of Data Mining and Knowledge Discovery 2000 Sep 13, Springer, Berlin, Heidelberg, pp. 416-423,2000.
[2] A.M.Patel, D.Bhalodiya, “A Survey On Frequent Itemset Mining Techniques Using GPU”,Internatonal Journal Of Innovative Research In Technology,Vol.1,Issue 5,2014.
[3] A.Raorane, R.V. Kulkarni,“Data mining techniques: A source for consumer behavior analysis”, arXiv preprint arXiv:1109.1202. 2011 Sep 6.,2011.
[4] B.Liu, W.Hsu, Y.Ma, “ Mining association rules with multiple minimum supports”, InProceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining 1999 Aug 1, ACM ,pp. 337-341, 1999.
[5] C.K.Chui, B.Kao, E.Hung,“Mining frequent itemsets from uncertain data”,InPacific-Asia Conference on Knowledge Discovery and Data Mining 2007 May 22,Springer, Berlin, Heidelberg pp. 47-58, 2007.
[6] E.Duneja, A.K.Sachan, “A survey on frequent itemset mining with association rules”, International Journal of Computer Applications. 2012 May,Vol.46,No.23,pp.18-24,2012.
[7] E.Poovammal, M.Ponnavaikko,“Utility Independent Privacy Preserving Data Mining on Vertically Partitioned Data”, 1.J. Comput. Sci., Vol.5, pp.666-673,2009.
[8] F.H.AL-Zawaidah, Y.H. Jbara, A.L. Marwan, “An improved algorithm for mining association rules in large databases”, World of Computer science and information technology journal, 2011;Vol 1(7),pp.311-6,2011.
[9] G.Grahne, J. Zhu, “ Fast algorithms for frequent itemset mining using fp-trees”,IEEE transactions on knowledge and data engineering.,2005 Oct,1Vol. 7,No.10,pp.1347-62,2005.
[10] H.Toivonen,“Sampling large databases for association rules”, InVLDB 1996 Sep 3,Vol. 96, pp. 134-145,1996.
[11] H.Yun, D.Ha, B.Hwang, K.H.Ryu,“Mining association rules on significant rare data using relative support”, Journal of Systems and Software. 2003 Sep 15,Vol.67,No.3,pp.181-91,2003.
[12] J.C. Lin, W.Gan, P.Fournier-Viger, T.P.Hong,V.S.Tseng,“ Mining potential high-utility itemsets over uncertain databases”, InProceedings of the ASE BigData & SocialInformatics 2015, ACM 2015 Oct 7, pp. 25.2015.
[13] J.Jackson,“Data mining; a conceptual overview”, Communications of the Association for Information Systems. 2002 Mar 22,Vol.8,No. 1,pp.19,2002.
[14] J.Pillai, O.P.Vyas, “Overview of itemset utility mining and its applications”,International Journal of Computer Applications, 2010 Aug,Vol. 5,No.11,pp.9-13,2010.
[15] J.S.Deogun, V.V.Raghavan, A.Sarkar, H.Sever, “Data mining: Research trends, challenges, and applications. Roughs Sets and Data Mining: Analysis of Imprecise Data” ,1997,pp.9-45,1997.
[16] L.Szathmary, A.Napoli, P.Valtchev,“Towards rare itemset mining”, InTools with Artificial Intelligence, 2007,ICTAI 2007, 19th IEEE International Conference on 2007 Oct 29,IEEE Vol.1,pp. 305-312,2007.
[17] M. Al-Maolegi, B.Arkok, “An improved apriori algorithm for association rules”, arXiv preprint arXiv:1403.3948, 2014 Mar 16,2014.
[18] M.Adda, L.Wu, S.White ,Y.Feng,“ Pattern detection with rare item-set mining” arXiv preprint arXiv:1209.3089,2012.
[19] M.Adda, L.Wu, Y.Feng, “Rare itemset mining”,InMachine Learning and Applications, ICMLA 2007,IEEE,Sixth International Conference on 2007 Dec 13,pp. 73-80, 2007.
[20] P.Fournier-Viger, J.C.Lin, B.Vo, T.T. Chi, J. Zhang, H.B. Le,“ A survey of itemset mining, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery,2017 Jul,Vol.7,No 4:e1207,2017.
[21] R.Agrawal, R.Srikant, “Fast algorithms for mining association rules”, InProc. 20th int. conf. very large data bases, VLDB 1994 Sep 12 .Vol. 1215, pp. 487-499,1994.
[22] R.Agrawal, T.Imieliński, A Swami., “Mining association rules between sets of items in large databases”, InAcm sigmod record,ACM 1993 Jun 1.Vol. 22, No. 2, pp. 207-216,1993.
[23] S.A Abaya, “Association rule mining based on Apriori algorithm in minimizing candidate generation” International Journal of Scientific & Engineering Research, Vol.3,No.7,pp.1-4,2012.
[24] S.Pramod,O.P.Vyas,“Survey on frequent item set mining algorithms”,International journal of computer applications. 2015,Vol.1,2015.
[25] S.Rao,P.Gupta,“Implementing Improved Algorithm Over APRIORI Data Mining Association Rule Algorithm”, International Journal of Computer Science And Technology,Mar. 2012,pp. 489-493,2012.
[26] S.S.Thakur, S.Z.Ninoria,“An Improved Progressive Sampling based Approach for Association Rule Mining”, International Journal of Computer Applications,2017,Vol.165,No.7,2017.
[27] S.Z.Ninoria, S.S.Thakur, “Study of High Utility Itemset Mining”, International Journal of Computer Applications. October 2017, Vol.175,No.4,pp.43-50,2017.
[28] Savasere A, Omiecinski ER, Navathe SB. “An efficient algorithm for mining association rules in large database”. Georgia Institute of Technology; 1995.(502).(1995)
[29] V.T.Chakaravarthy, V. Pandit, Y.Sabharwal,“Analysis of sampling techniques for association rule mining”, InProceedings of the 12th international conference on database theory 2009 ,ACM,Mar 23,pp. 276-283,2009.
[30] W.Y.Lin, M.C.Tseng, “Automated support specification for efficient mining of interesting association rules”, Journal of Information Science. 2006 Jun,Vol.32,No.3,pp.238-50,2006.
[31] Y.S.Koh, N.Rountree,“Finding sporadic rules using apriori-inverse”, InPacific-Asia Conference on Knowledge Discovery and Data Mining 2005 May 18, Springer, Berlin, Heidelberg. pp.97-106,2005.
[32] Y.Tong, X.Zhang, L.Chen,“Tracking frequent items over distributed probabilistic data”,World Wide Web, 2016 Jul 1,Vol.19,No.4,pp.579-604,2016.
Citation
S.Z. Ninoria, S.S. Thakur, "Review on Rare Itemset Mining", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.152-157, 2019.
Spam Detection Approach Using Modified Pre-processing With NLP
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.158-161, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.158161
Abstract
However, the growth in emails has also led to an unprecedented increase in the number of illegitimate mail, or spam 49.7% of emails sent is spam - because current spam detection methods lack an accurate spam classifier. We are excited by the decline in the volume of email spam but it also raises the question as to whether the email spam business is dying and will continue to decline. Besides the volume change, we also consider the quality of email spam and the impact, which may constitute a new trend of email spam business. For instance, spammers may post email spam in a more complicated way using spoofed email addresses and changing email relay servers. That kind of email spam may slip away under the inspection of spam filters. Thus, it motivated us to investigate the evolution of email spam using advanced techniques such as topic modelling and network analysis. We try to find out the real trend of email spam business through email content, meta information such as headers, and sender-to-receiver network over a long period of time.
Key-Words / Index Term
Spam detection, email, NLP, spam classification
References
[1] A. Bhowmick and S. Hazarika, “Machine learning for e-mail spam filtering: review, techniques and trends,” https://arxiv.org/abs/1606.0104, 2016, accessed: 2017.
[2] A. Aski and N. Sourti, “Proposed efficient algorithm to filter spam using machine,” in Pacific Science Review A: Natural Science and Engineering, vol. 18, 2016, pp. 145–149.
[3] J. Rao and D. Reilly, “The economics of spam,” in Journal of Economic Perspectives, vol. 26, no. 3, 2012.
[4] H. Tschabitscher, “How many emails are sent every day?” https://www.lifewire.com/how-many-emails-are-sent-every-day-117121, 2017, accessed: 2017.
[5] J.S. Kong, P.O. Boykin, B.A. Rezaei, N. Sarshar, and V.P. Roy chowdhury, “Let Your Cyber Alter Ego Share Information and Manage Spam,” Univ. of California, Los Angeles, CA, technical report,2005.
[6] F. Zhou, L. Zhuang, B.Y. Zhao, L. Huang, A.D. Joseph, and J.D. Kubiatowicz, “Approximate Object Location, and Spam Filtering on Peer-to-Peer Systems,” Proc. Middleware, pp. 1–20, 2003.
[7] SPAMNET, http://www.cloudmark.com, accessed in Mar. 2014.
[8] Haiying Shen, Senior Member, IEEE, and Ze Li, Student Member, IEEE, “Leveraging Social Networks for Effective Spam Filtering”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 11, NOVEMBER 2014.
[9] Dr Devendra K. Tayal, Amita Jain, Kanak Meena,” Development of Anti-spam techniques using modified K-means & Naive Bayes Algorithms” IEEE-2016.
[10] Weimiao Feng, Jianguo Sun, Qing Yang, “A Support Vector Machine based Naive Bayes Algorithm for Spam Filtering”, IEEE-2016.
[11] Rohit Kumar Solanki, Karun Verma, Ravinder Kumar,” Spam Filtering Using Hybrid Local-Global Naive Bayes Classifier” IEEE-2015.
Citation
Neelam Choudhary, Nitesh Dubey, "Spam Detection Approach Using Modified Pre-processing With NLP", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.158-161, 2019.
Steganography With Improved Cryptography
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.162-166, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.162166
Abstract
With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of message content, steganography deals with failure to understand the existence of the messages used for secret communication. Because of these features steganography and encryption are the two main elements complementing each other. The steganography is the art of hidden; its main aim is to pass unnoticed data in another data. There are many types of data that used in steganography, such as message, image, and video. In this work, we are interested in hiding a message inside an image and also securing it. Our work focuses on the study of least significant bit (LSB) technique for embedding text into image. Moreover, we propose an improved approach for LSB based image steganography and encryption decryption using partitioning, zigzag and swapping.
Key-Words / Index Term
Image steganography, LSB, Cryptography, Symmetric Encryption, Block Cipher, Security
References
[1] . X. Zhang, “Reversible data hiding in encrypted images,”IEEE Signal Process. Lett. vol. 18, no. 4, pp. 255–258, Apr. 2011.
[2] Pramod R Sonawane, K.B .Chaudhari ,“Reversible image watermarking using adaptive prediction error expansion and pixel selection” International Journal Of Engineering Science And Innovative Technology (Ijesit) , Volume 2, Issue 2, March 2013.
[3] Tausif Anwar, Dr. Sanshita Paul and Shailendra Kumar Singh, “Message Transmission Based on DNA Cryptography: Review”, International Journal of Bio – Science and Bio – Technology, Vol. 6, Issue 5, pp. 215 - 222, 2014.
[4] N. Memon and P. W. Wong, 2001, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649.
[5] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Information Hiding- a survey”, Proceeding of the IEEE, special issue on protection of multimedia content, pp. 1062-1078, July 1990.
[6] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in color and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22–28, Oct. /Dec. 2001.
[7] R.Anderson and F. Petitcolas, ”On the limits of steganography” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4,May 1998.
[8] Niels Provos, Peter Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE computer society, 2003.
[9] Chi-Kwong Chan, L.M. Cheng ,“Hiding data in images by simple LSB substitution”, Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong Received 17 May 2002.
[10] B. Li, J. He, J. Huang and Y. Q. Shi, “A survey on image Steganography and steganalysis”, Journal of Information Hiding and Multimedia Signal Processing, 2011.
[11] A. Kumar, S. Kumari, S. Patro, T. Sh and A. K. Acharya, “Image Steganography using Index based Chaotic Mapping”, In IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT, pp.1-4,2015
[12] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques”, International Conference on Image Processing, IEEE, 2001.
[13] D. V. Ramana and P. N. Rao, “Steganography Algorithms for Image Security Using LSB Substitution Method”, International Journal of Modern Embedded System, 2016.
[14] A. A. Attaby, M. F. M. Ahmed and A. K. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3”, Ain Shams Engineering Journal, 2017.
[15] Q. Kester, “A cryptographic Image Encryption technique based on the RGB PIXEL shuffling A cryptographic Image Encryption technique based on the RGB PIXEL shuffling”, International Journal of Advanced Research in Computer Engineering & Technology, vol. 2,no.2 pp.848-854, January 2013.
[16] P. Sahute, S. Waghamare, S. Patil, and A. Diwate, “ Secure Messaging Using Image Stegnography”, International Journal of Modern Trends in Engineering and Research,vol.2,no.3, pp. 598–608, March 2015.
[17] Jassim, Firas A., "A novel Steganography algorithm for hiding text in image using five modulus method", arXiv preprint arXiv, Vol. 72, No.17, PP. 39-44, 2013.
[18] Krati Vyas, B.L.Pal, "A proposed method in image steganography to improve image quality with lsb technique", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 1, PP. 5246-5251, 2014.
[19] Bandyopadhyay, Debiprasad, et al., "A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain", International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 3, No. 1, PP. 11-22, 2014.
[20] Thiyagarajan, P., G. Aghila, and V. Prasanna Venkatesan., "Stego-Image Generator (SIG)-Building Steganography Image Database", Advances in Digital Image Processing and Information Technology Springer Berlin Heidelberg, PP. 257-267, 2011.
Citation
Yogesh Gyarsia, Shiv Tiwari, "Steganography With Improved Cryptography", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.162-166, 2019.
Survey of Technologies for Evaluation of Student Dropout Using Educational Data
Survey Paper | Journal Paper
Vol.07 , Issue.10 , pp.167-171, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.167171
Abstract
Interpretation of the dropout students and the reason behind is the most important for the universities. Due to many different reasons such as pressure, low performance, high expectations from family, faculties and individuals it is being tough to sustain for the students. Most important source of knowing the expressions of the students in these instances is their social media interactions with other students. They express their major problems on it. But this is a challenge to process such huge data and evaluating expressions from it. Data mining techniques have given a boost in such processing and application of machine learning has become boon for it. It is found that there are many such techniques available but newest techniques which are best fit in processing of expressional data is machine learning. Surveys of such techniques have become a great source of expression evaluation.
Key-Words / Index Term
Cloud Computing, Fault Tolerance, Virtual Machines Migration, Resource Management
References
[1] V. Hegde and P. P. Prageeth, "Higher education student dropout prediction and analysis through educational data mining," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 694-699. doi: 10.1109/ICISC.2018.8398887
[2] M. C. Nicoletti, M. Marques and M. P. Guimaraes, "A data mining approach for forecasting students` performance," 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, 2018, pp. 1-7. doi: 10.23919/CISTI.2018.8399389
[3] W. Zhang and S. Qin, "A brief analysis of the key technologies and applications of educational data mining on online learning platform," 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA), Shanghai, 2018, pp. 83-86. doi: 10.1109/ICBDA.2018.8367655
[4] S. R. Guruvayur and R. Suchithra, "A detailed study on machine learning techniques for data mining," 2017 International Conference on Trends in Electronics and Informatics (ICEI), Tirunelveli, 2017, pp. 1187-1192. doi: 10.1109/ICOEI.2017.8300900
[5] A. F. Meghji, N. Ahmed Mahoto, M. A. Unar and M. Akram Shaikh, "Analysis of Student Performance using EDM Methods," 2018 5th International Multi-Topic ICT Conference (IMTIC), Jamshoro, 2018, pp. 1-7. doi: 10.1109/IMTIC.2018.8467226
[6] C. Romero, S. Ventura, “Educational data mining : a review of the state of the art”, IEEE Transactions on Systems, Man, and Cybernetics, (Applications and reviews), Vol. 40, Issue 6, pp 601- 618, 2010.
[7] R.S. Baker, A.T. Corbett,K.R. Koedinger, “Detecting Student Misuse of Intelligent Tutoring Systems”. Proceedings of the 7th International Conference on Intelligent Tutoring Systems, pp 531-540, 2004.
[8] T. Tang, G. McCalla,” Smart recommendation for an evolving elearning system: architecture and experiment”, International Journal on E-Learning, vol. 4, issue 1, pp 105-129, 2005.
[9] M. de Raadt, M. Hamilton, R.F. Lister, J. Tutty, B. Baker,I. Box, & M. Petre. “Approaches to learning in computer programming students and their effect on success”. Research and Development in Higher Education Series, Vol. 28, pp 407-414, 2005.
[10] Saurabh Pal, “Data Mining: A Prediction For Performance Improvement Using Classification”, International Journal of Computer Science and Information Security, Vol. 9, Isuue 4, pp 136- 140, 2011. Proceedings of the International Conference on Inventive Computing and Informatics (ICICI 2017) IEEE Xplore Compliant - Part Number: CFP17L34-ART, ISBN: 978-1-5386-4031-9
[11] Romero, C., & Ventura, S. (2010). Educational Data Mining: A Review of the State of the Art. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(6), 601–618. doi:10.1109/tsmcc.2010.2053532
Citation
Sumit Gupta, Amit Ranjan, "Survey of Technologies for Evaluation of Student Dropout Using Educational Data", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.167-171, 2019.
Synthesis and Electroluminescence Studies of CdSe Nanocrystals Embedded in PVK Matrix
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.172-174, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.172174
Abstract
There is currently a great interest in semiconductor nanoparticles which are organically capped or embedded in polymeric matrices for their ready to use application in devices. These materials show excellent optical and mechanical behaviour at Nano scale. Nano crystalline powder and nanocomposites of II-VI compounds with different doping are being prepared by various routes. Poly-vinylcarbozole (PVK) is a hole transport organic semiconducting polymer. It has been widely used as an organic and optical material. Combination of polymer and semiconductor nanocrystals allows the fabrication of flexible and light weight EL devices. Electroluminescence of the films was studied at different voltage and frequency by placing the films between ITO coated conducting glass plate and aluminium electrodes. It is found that a turn on voltage is required for light emission and brightness increases exponentially with voltage. Turn on voltage is found to decrease as CdSe concentration is increased.
Key-Words / Index Term
CdSe/PVK nanocomposites and Electroluminescence (EL)
References
[1] . Han, D. Qin, X. Jiang et al., “Synthesis of high quality zinc-blende CdSe nanocrystals and their application in hybrid solar cells,” Nanotechnology, vol. 17, no. 18, pp.4736–4742, 2006.
[2] R. E. Bailey, A. M. Smith, and S. Nie, “Quantum dots in biology and medicine,” Physica E, vol. 25, no. 1, pp. 1–12, 2004.
[3] O. Niitsoo, S. K. Sarkar, C. Pejoux, S. Ruhle, D. Cahen, and G. Hodes, “Chemical bath deposited CdS/CdSe-sensitized porous TiO2 solar cells,” Journal of Photochemistry and Photobiology A: Chemistry, vol. 181, no. 2-3, pp. 306–313, 2006.
[4] Guo, C., Lin, Y. H., Witman, M. D., Smith, K. A., Wang, C., Hexemer, A.Verduzco, R. “Conjugated block copolymer photovoltaics with near 3% efficiency through microphase separation”, Nano letters, 13(6), 2957-2963. 2013 .
[5] IAnn Lei, DaiFu Lai, TrongMing Don, WenChang Chen, YangYen Yu, and WenYen Chiu, Mater. Chem. Phys. 144, 41, 2011
[6] J.Y. Suh, C.H. Kim, W. Zhou, M.D. Huntington, D.T.Co, M.R. Wasielewski, T.W. Odom, “Plasmonic bowtie nanolaser arrays”, Nano Lett. 12, 5769–5774, 2012.
[7] A. Agrawal, C. Susut, G. Stafford, U. Bertocci, B. McMorran, H. J. Lezec, and A. A. Talin, “An integrated electrochromic nanoplasmonic optical switch”, Nano Lett. 11, 2774, 2011.
[8] O. S. Oluwafemi, “A novel”green” synthesis of starch-capped CdSe nanostructures,” Colloids and Surfaces B: Biointerfaces, vol. 73, no. 2, pp. 382–386, 2009.
[9] D.Jiang, L. Ding, J. Huang ,E.Gu, L. Liu, Z. Chai, D. Liu, Synthesis and characterization of photorefractive polymer based on chemically hybridized CdSePVK nanocomposite with a new azo chromophore , Polymer, 48, 7156e7162, 2007.
Citation
Sarita Kumari, Swati Dubey, Meera Ramrakhiani, "Synthesis and Electroluminescence Studies of CdSe Nanocrystals Embedded in PVK Matrix", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.172-174, 2019.
Task Schduling With Improved ACO In Cloud Computing
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.175-180, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.175180
Abstract
In the current scenario, Cloud computing carved itself as an emerging technology which enables the organization to utilize hardware, software and applications without any upfront cost over the internet. A very efficient computing environment is provided by cloud computing where the customers or several tenants are in need of multiple resources to be provided as a service over the internet. The challenge before the cloud service provider is, how efficiently and effectively the underlying computing resources like virtual machines, network, storage units, and bandwidth etc. should be managed so that no computing device is in under-utilization or over-utilization state in a dynamic environment. A good task scheduling technique is always required for the dynamic allocation of the task to avoid such a situation. The utilization of resources is to be scheduled efficiently so that it helps in reducing the time for task completion. This is task scheduling which is most essential and important part in cloud computing environment. In task scheduling allocation of certain tasks to particular resources at a particular time instance is done. There are different techniques that are proposed to solve the problems of task scheduling. Through this we are going to present the new Algorithm based on task scheduling technique, which will distribute the load effectively among the virtual machine so that the overall response time (QoS) should be minimal. A comparison of this proposed Algorithm of task scheduling technique is performed on workflow simulator which shows that, this will outperform the existing techniques like FCFS, SJF and Genetic Model techniques.
Key-Words / Index Term
Cloud Computing, Task Scheduling, FCFS, SJF, Genetic Algorithm, QoS
References
[1]. C.-W. Tsai, W.-C. Huang, M.-H. Chiang, M.-C. Chiang, and C.-S.Yang, “A hyper-heuristic scheduling algorithm for cloud,” IEEE Transactions on Cloud Computing, vol. 2, no. 2, pp. 236–250, 2014.
[2]. Y. Wang and W. Shi, “Budget-driven scheduling algorithms for batches of map-reduce jobs in heterogeneous clouds,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 306–319, 2014.
[3]. Z. Xiao, W. Song, and Q. Chen, “Dynamic resource allocation using virtual machines for cloud computing environment,” IEEE Transactions on parallel and distributed systems, vol. 24, no. 6, pp.1107–1117, 2013.
[4]. B. Guan, J. Wu, Y. Wang, and S. U. Khan, “Civsched: a communication-aware inter vm scheduling technique for decreased network latency between co-located vms,” IEEE Transactions on Cloud Computing, vol. 2, no. 3, pp. 320–332, 2014.
[5]. Q. Zhang, M. F. Zhani, R. Boutaba, and J. L. Hellerstein, “Dynamic heterogeneity-aware resource provisioning in the cloud,” IEEE transactions on cloud computing, vol. 2, no. 1, pp. 14–28, 2014.
[6]. A. J. Younge, G. Von Laszewski, L. Wang, S. Lopez-Alarcon, and W. Carithers, “Efficient resource management for cloud computing environments,” in Green Computing Conference, 2010 International. IEEE, 2010, pp. 357–364.
[7]. M. Polverini, A. Cianfrani, S. Ren, and A. V. Vasilakos, “Thermal aware scheduling of batch jobs in geographically distributed data centers,” IEEE Transactions on cloud computing, vol. 2, no. 1, pp.71–84, 2014.
[8]. K. Al Nuaimi, N. Mohamed, M. Al Nuaimi, and J. Al-Jaroodi, “A survey of load balancing in cloud computing: Challenges and algorithms,” in Network Cloud Computing and Applications (NCCA), 2012 Second Symposium on. IEEE, 2012, pp. 137–142.
[9]. B. Radojevic´ and M. Zˇ agar, “Analysis of issues with load balancing algorithms in hosted (cloud) environments,” in MIPRO, 2011 Proceedings of the 34th International Convention. IEEE, 2011, pp.416–420.
[10]. X. Zuo, G. Zhang, and W. Tan, “Self-adaptive learning pso-based deadline constrained task scheduling for hybrid IaaS cloud,” IEEE Transactions on Automation Science and Engineering, vol. 11, no. 2, pp. 564–573, 2014.
[11]. K. Nishant, P. Sharma, V. Krishna, C. Gupta, K. P. Singh, R. Rastogi et. al., “Load balancing of nodes in cloud using ant colony optimization,” in Computer Modelling and Simulation (UK Sim), 2012 UKSim 14th International Conference on. IEEE, 2012, pp. 3–8.
[12]. R. Shojaee, H. R. Faragardi, S. Alaee, and N. Yazdani, “A new cat swarm optimization based algorithm for reliability-oriented task allocation in distributed systems,” in Telecommunications (IST), 2012 Sixth International Symposium on. IEEE, 2012, pp. 861–866.
[13]. P. V. Krishna, “Honey bee behavior inspired load balancing of tasks in cloud computing environments,” Applied Soft Computing, vol. 13, no. 5, pp. 2292–2303, 2013.
[14]. Qian, Z., et al., A load balancing task scheduling algorithm based on feedback mechanism for cloud computing. International Journal of Grid and Distributed Computing, 2016. 9(4): p. 41-52.
[15]. Malik, A. and P. Chandra, Priority based Round Robin Task Scheduling Algorithm for Load Balancing in Cloud Computing. Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org, 2017. 7(12).
[16]. Pawar, N., U.K. Lilhore, and N. Agrawal, A Hybrid ACHBDF Load Balancing Method for Optimum Resource Utilization In Cloud Computing. 2017.
[17]. Ajay Thomas S. and Santhiya. C, "Dynamic Resource Scheduling using Delay Time Algorithm in Cloud Environment", Second International Conference on Computing and Communications Technologies (ICCCT’17). IEEE, 2017.
[18]. Gupta R., et al., "An Effective Multi-Objective Task Scheduling Algorithm using Min-Max Normalization in Cloud Computing", 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), IEEE, 2016.
[19]. Lin, R. and Q. Li, "Task Scheduling Algorithm Based on Pre-Allocation Strategy in Cloud Computing", IEEE International Conference on Cloud Computing and Big Data Analysis. 2016.
[20]. Alworafi, M.A., et al., "An Improved SJF Scheduling Algorithm in Cloud Computing Environment", International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques, IEEE, 2016.
[21]. Kumar, M. and S.C. Sharma, "Priority Aware Longest Job First (PALJF) Algorithm for utilization of the resource in cloud environment”, International Conference on Computing for Sustainable Global Development, IEEE 2016.
[22]. Jain, A. and R. Kumari, "An Efficient Resource Utilization Based Integrated Task Scheduling Algorithm", 4th International Conference on Signal Processing and Integrated Networks (SPIN), IEEE, 2017.
[23]. Parsa, S. and R. Entezari- Maleki, "RASA: A New Task Scheduling Algorithm in Grid Environment". World Applied Sciences Journal 7 (Special Issue of Computer & IT), 2009.
[24]. Kamal, R., et al., "Enhanced User Preference Based Intelligent Scheduling Algorithm (E-UPISA)", Proceedings of the 23rd International Conference on Automation & Computing, University of Huddersfield. 2017.
[25]. Ashish Gupta, Ritu Garg, “Load Balancing Based Task Scheduling with ACO in Cloud Computing”, ICCA, IEEE-2017.
[26]. Xiao-Fang Liu, Zhi-Hui Zhan, Jeremiah D. Deng, Yun Li, Member, IEEE, “An Energy Efficient Ant Colony System for Virtual Machine Placement in Cloud Computing”1089-778X (c) 2016 IEEE.
[27]. Yifan Ding, Guang zhong Liao, Siyuan Liu, “Virtual Machine Placement Based on Degradation Factor Ant Colony Algorithm”, IEEE-2018.
Citation
Sushmita Barsainya, Anshul Khurana, "Task Schduling With Improved ACO In Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.175-180, 2019.
Three Dimensional multi-UAV path planning using Modified Grey Wolf Optimizer
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.181-186, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.181186
Abstract
Robot path planning is a task to determine the most feasible path between origin and destination while avoiding collisions in the underlying environment. This task has always been characterized as a high dimensional optimization problem and is considered NP-Hard. Numerous algorithms have been proposed that provide solutions to the problem of path planning in a deterministic and non-deterministic way. However, the problem is open to new algorithms that have the potential to obtain better quality solutions with less time complexity. This paper presents a new approach to solve the problem of three-dimensional path planning of a flying vehicle while maintaining a safe distance from obstacles on the road. A new approach based on the modified grey wolf optimization algorithm is applied to the problem. The modified algorithm is compared to the standard GWO algorithm and have shown good results.
Key-Words / Index Term
Grey Wolf Optimizer, GWO, Path Planning
References
[1] J. Levinson et al., “Towards fully autonomous driving: Systems and algorithms”, IEEE Intelligent Vehicles Symposium (IV), Baden, pp. 163-168, 2011.
[2] S. A. Bortoff, “Path planning for UAVs”, Proceedings of the American Control Conference (ACC), Chicago, pp. 364-368, 2000.
[3] Valavanis, Kimon P., and George J. Vachtsevanos. “Handbook of unmanned aerial vehicles”, Springer Publishing Company, Incorporated, 2014.
[4] Foo, Jung Leng, et al. “Path planning of unmanned aerial vehicles using B-splines and particle swarm optimization”, Journal of aerospace computing, Information, and communication, pp. 271-290, 2009.
[5] Wu, Jin-Ping, Zhi-Hong Peng, and Jie Chen. “3D Multi-Constraint Route Planning for UAV Low-altitude Penetration Based on Multi-Agent Genetic Algorithm”, IFAC Proceedings Vol. 44, Issue 1, pp. 11821-11826, 2011.
[6] Roberge, Vincent, Mohammed Tarbouchi, and Gilles Labonté. “Comparison of parallel genetic algorithm and particle swarm optimization for real-time UAV path planning”, IEEE Transactions on Industrial Informatics, Vol. 9, Issue 1, pp. 132-141, 2013.
[7] Zhang, Bo, and HaibinDuan. “Predator-prey pigeon-inspired optimization for UAV three-dimensional path planning”, International Conference in Swarm Intelligence, Springer International Publishing, pp. 96-205, 2014.
[8] B. Zhang and H. Duan, “Three-Dimensional Path Planning for Uninhabited Combat Aerial Vehicle Based on Predator-Prey Pigeon-Inspired Optimization in Dynamic Environment”, IEEE/ACM Transactions on Computational Biology and Bioinformatics, Vol. 14, Issue 1, pp. 97-107, 2017.
[9] Duan, Haibin, and Pei Li. “Bio-inspired computation in unmanned aerial vehicles”, Springer Berlin Heidelberg, 2014.
[10] Chen and Yongbo, “Modified central force optimization (MCFO) algorithm for 3D UAV path planning”, Neurocomputing, Vol. 171, pp. 878-888, 2016.
[11] C. Xie and H. Zheng, “Application of Improved Cuckoo Search Algorithm to Path Planning Unmanned Aerial Vehicle”, Springer International Publishing, pp. 722–729, 2016.
[12] W. Zhu and H. Duan, “Chaotic predator–prey biogeography-based optimization approach for ucav path planning”, Aerospace science and technology, Vol. 32, Issue 1, pp. 153–161, 2014.
[13] G. Wang, L. Guo, H. Duan, L. Liu, H. Wang et al., “A modified firefly algorithm for ucav path planning”, International Journal of Hybrid Information Technology, Vol. 5, Issue 3, pp. 123–144, 2012.
[14] Krishnanand, K. N., and DebasishGhose. “Glowworm swarm optimization for simultaneous capture of multiple local optima of multimodal functions”, Swarm intelligence Vol. 3, Issue 2, pp. 87-124, 2009.
[15] Tang, Zhonghua, and Yongquan Zhou. “A glowworm swarm optimization algorithm for uninhabited combat air vehicle path planning”, Journal of Intelligent Systems, Vol. 24, Issue 1, pp. 69-83, 2015.
[16] P. Corke, “Robotics, vision and control: fundamental algorithms in MATLAB”, Springer, Vol. 73, 2011.
[17] J. Foo, J. Knutzon, J. Oliver, and E. Winer, “Three-dimensional path planning of unmanned aerial vehicles using particle swarm optimization”, In 11th AIAA/ISSMO multidisciplinary analysis and optimization conference, Portsmouth, Virginia, pp. 123-156, 2006.
[18] Ji Li and Xiu-xia Sun. “A route planning`s method for unmanned aerial vehicles based on improved a-star algorithm”, ActaArmamentarii, Vol. 29, Issue 7, pp. 788-792, 2008.
[19] Si Yao Fu, Li Wei Han, Yu Tian, and Guo Sheng Yang, “Path planning for unmanned aerialvehicle based on genetic algorithm”, In 2012 IEEE 11th International Conference on Cognitive Informatics & Cognitive Computing (ICCICC), pp. 140-144, 2012.
[20] Marcio da Silva Arantes, Jesimar da Silva Arantes, Claudio Fabiano Motta Toledo, and Brian C Williams, “A hybrid multi-population genetic algorithm for uav path planning”, In Proceedings of the 2016 Conference on Genetic and Evolutionary Computation, ACM, pp. 853-860, 2016.
[21] S. Mirjalili, S. M. Mirjalili and A. Lewis, “Grey wolf optimizer”, Advances in Engineering Software, Vol. 69, pp. 46-61, 2014.
[22] R. K. Dewangan, A. Shukla and W. W. Godfrey, “Three dimensional path planning using Grey wolf optimizer for UAVs”, Applied Intelligence, DOI: 10.1007/s10489-018-1384-y.
[23] V. Bohat and K. V. Arya, “An effective gbest-guided gravitational search algorithm for real-parameter optimization and its application in training of feedforward neural networks”, Knowledge Based Systems, Vol. 143, pp. 192-207, 2018.
[24] V. Bohat and K. V. Arya, “Artificial Prey-Predator (APP): An efficient approach for numerical function optimization”, In Proc. of 2017 Conference on Information and Communication Technology (CICT), pp. 1-6, 2017.
Citation
R. K. Dewangan, V. K. Bohat, "Three Dimensional multi-UAV path planning using Modified Grey Wolf Optimizer", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.181-186, 2019.
An Optimal Underwater Colour Image Enhancement Using CAUF-MCAHE Technique
Research Paper | Journal Paper
Vol.07 , Issue.10 , pp.187-190, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si10.187190
Abstract
Underwater imaging posts a challenge due to the degradation by the absorption, scattering and color distortion occurred during light propagation & in poor lighting conditions in water medium. Many different image filtering techniques are utilized to improve image quality effectively. Images which are captured under water are generally degraded due to the effects of absorption and scattering. For example, underwater images with low contrast decrease the accuracy rate of underwater object detection and marine biology recognition. To overcome those limitations, a systematic underwater image enhancement method, which includes a contrast enhancement algorithm, is proposed. In this paper, we proposed an image based pre-processing technique i.e. CAUF-MCAHE algorithm to enhance the quality of the underwater images. Experiments are performed with some underwater images and results are compared with different existing algorithm. For comparing the performance, MSE mean square error and PSNR peak signal to noise ratio is used as parameters.
Key-Words / Index Term
MCAHE (Modified Contrast adaptive histogram equalization), UF (unsharp filter), AHE (Adaptive histogram equalization), PSNR (Peak signal to noise ratio) & MSE (Mean square error)
References
[1] Will be updated very soon
Citation
Ayushi Jaiswal, Jayprakash Upadhyay, "An Optimal Underwater Colour Image Enhancement Using CAUF-MCAHE Technique", International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.187-190, 2019.