Three Class Classification Technique To Predict Road Accident Severity
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.380-385, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.380385
Abstract
In recent years, road accidents are becoming more and more due to the larger growth in population. The growth of population and the increase in number of vehicles has led to a traffic congestion and sometimes may results in accidents. There are many factors that may lead to the road accidents and those maybe the driver’s carelessness, drunk and drive, road conditions etc. Using the technology, necessary measures can be taken in order to predict the accidents at prior and to prevent the occurrence of accidents. In this research paper we use Gretl tool to identify the factors that are significantly contributing to the accidents, applied the logistic regression classification technique to build the machine learning model in order to predict the accident severity using the predictors like number of vehicles involved, road conditions, weather conditions, light conditions etc. Here we consider the accident severity as a dependent variable which is of three classes that is slight, serious and fatal. The main objective of this paper is that the accident has already occurred, in which we are predicting the severity of that accident.
Key-Words / Index Term
AccidentSeverity,Predictions,LogisticRegression,Gretl,Tableau
References
[1] Tao Lu, Yan Lixin, Zhu Dunyao, Zhang pan “The traffic accident hotspot prediction: Based on the Logistic Regression method” The 3rd International Conference on Transportation Information and Safety, June 25 – June 28, 2015, Wuhan, P. R. China.
[2] Maher Al-Zuhairi, Biswajeet Pradhan “Severity Prediction of Traffic Accidents with Recurrent Neural Networks” Article in Applied sciences
[3] SharafAlkheder, Madhar M. Taamneh, Salah Taamneh ”Traffic Accident Severity Prediction Using Artificial Neural Network” Journal of Forecasting,J.Forecast(2016) Published in Wiley Online Library.
[4] Rui Garrido, Ana Bastas, Ana de Almeida, Jose Paulo Elvas” Prediction of Road Accident Severity using the Ordered ProbitModel” ElseVier publication.
Citation
Ramesh M Chakrasali, Naganandini G, Ancy Thomas, "Three Class Classification Technique To Predict Road Accident Severity", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.380-385, 2019.
Smart Irrigation Using GSM Module and Microcontroller
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.386-392, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.386392
Abstract
Agribusiness assumes a noteworthy job in our everyday life. In this paper, a review has been done about the run of the mill horticulture techniques utilized by ranchers nowadays and what are the issues they face. Ranchers face serious issues in watering their harvests underneath watering framework, over-watering framework that causes separating and loss of enhancement substance of soil. Also inundating water to the plant in overabundance will build the centralization of high soil content there are a few different ways to develop a solid yield however it requires a great deal of labor which is a weight these days. So as to make it a keen and self-ruling water system framework cloud innovation is being utilized. Microcontroller (MCU NODE), GSM module have been used. This strategy helps in controlling the exact state of the water dimension to the horticulture land dependent on the dampness substance and it routinely illuminates the rancher by means of SMS about the dampness substance, a rancher can likewise observe the constant dampness substance by an application installed in his phone.
Key-Words / Index Term
Cloud, MCU node, GSM module, Dampness , Application
References
[1] Ibrahim Mat, Mohamed Rawidean Mohd Kassim, Ahmad Nizar Harun, Ismail Mat Yusoff. “Smart agriculture using internet of things” IEEE Conference on Open Systems (ICOS) 2018.
[2] Pallavi S, Jayashree D. Mallapur, Kirankumar Y. Bendigeri. “Remote Sensing and Controlling of Greenhouse Agriculture Parameters based on IoT” International Conference on Big Data, IoT and Data Science (BID) 2017.
[3] Ramya Venkatesan, Anandhi Tamilvanan, “A Sustainable Agricultural System Using IoT” International Conference on Communication and Signal Processing 2017.
[4] Manishkumar Dholu, Mrs. K. A. Ghodinde , “Internet of Things (IoT) for Precision Agriculture Application” 2nd International Conference on Trends in Electronics and Informatics (ICOEI) 2018.
[5] S. Rajeshwari, K.Suthendran, K.Rajakumar, “A Smart Agricultural Model by Integrating IoT, Mobile and Cloud-based Big Data Analytics” International Conference on Intelligent Computing and Control (I2C2) 2017.
[6] Pamidi Srinivasulu, M. Sarath Babu, R Venkat, K Rajesh, “Cloud Service Oriented Architecture (CSoA) for Agriculture through Internet of Things (IoT) and Big Data” International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE) 2017.
[7] Chayapol Kamyod, “End-to-EndReliability Analysis of an IoT based Smart Agriculture” The 3rd International Conference on Digital Arts, Media and Technology (ICDAMT) 2018.
[8] RajinderKumar M.Math, Nagaraj V. Dharwadkar, “IoT Based Low-cost Weather Station and Monitoring System for Precision Agriculture in India” Proceedings of the Second International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) 2018.
Citation
Adarsh H.J, Akshay. A, Meghana. R, Anju Thimmaiah. M, Raghavendra Nayaka. P, "Smart Irrigation Using GSM Module and Microcontroller", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.386-392, 2019.
Android Accessibility Service: Bane or Boon
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.393-395, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.393395
Abstract
Android is a huge platform available to a big audience. However, android is vulnerable to many attacks and attackers. Which violates the privacy and security of the data. This paper mainly focuses on demonstration of how accessibility service can be used to key log the events and send it to the hacker’s device using firebase (Real time database). This is a major vulnerability which needs to be addressed. The payload is installed as .apk file and some social engineering to convince the user to enable accessibility service. Our study estimates that this attack will work on most of the android versions.
Key-Words / Index Term
Android accessibility service , firebase , .apk ,payloads , android vulnerabilities
References
[1] Chenxiong Qian, Simon P. Chung, Wenke Lee, “Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop”, Georgia Tech. (2017).
[2] C. Ren, Y. Zhang, H. Xue, T. Wei, and P. Liu, “Towards Discovering and Understanding Task Hijacking in Android,” in Proc. of USENIX Security Symposium, 2015
[3] Joshua Kraunelis1 , Yinjie Chen1 , Zhen Ling2 , Xinwen Fu1 , Wei Zhao3 “On Malware Leveraging the Android Accessibility Framework” 1Computer Science Department, University of Massachusetts Lowell, One University Avenue, Lowell, MA 01854, Email: {jkraunel,ychen1,xinwenfu}@cs.uml.edu . 2 School of Computer Science and Engineering, Southeast University, Nanjing, China, Email: zhenling@seu.edu.cn 3 University of Macau, Macau, China, Email: weizhao@umac.mo (2014).
[4] S. Peng, S. Yu, and A. Yang. Smartphone malware and its propagation modeling: A survey. Communications Surveys Tutorials, IEEE, PP(99):1 – 17, July 2013.
[5] Android permissions: User attention, comprehension, and behavior. http://www.eecs.berkeley.edu/Pubs/TechRpts/2012/EECS-2012-26.pdf, 2012.
[6] Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Proceedings of IEEE Symposium on Security and Privacy (SP), 2012.
[7] R. Hunt and S. Hansman. A taxonomy of network and computer attack methodologies. Computers & Networks, Elsevier, 24(1), February 2005.
Citation
Idris Shah Hyder, Nikhil S. Tengeli, "Android Accessibility Service: Bane or Boon", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.393-395, 2019.
Blockchain Enabled E-Voting System
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.396-400, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.396400
Abstract
Innovation impactly affects that the numerous parts of our public activity. Structuring a twenty four hour comprehensively associated plan enables simple access to a scope of assets and administrations. One main such troublesome development is the Blockchain a keystone to cryptocurriences. One potential utilization of the blockchain is in e-voting plans. The target of such a plan is given a decentralized design to run and support a voting plot that is open, reasonable, and independently variable. In this paper, we propose a potential new e-voting convention that uses the blockchain as a straightforward polling booth. The convention has been intended to hold fast to crucial e-voting properties just as to offer a level of decentralization and to taken into account the voter to change/update their vote. This paper features the advantages and disadvantages of utilizing blockchain for such a proposition from a reasonable perspective in both the structure advancement and the utilization settings. Finishing up the paper is the potential guide for blockchain innovation to have the capacity to help the complex applications. The blockchain innovation is displayed as the distinct advantage for a significant number of the current advancements.
Key-Words / Index Term
Blockchain, E-voting, Ganache, Solidity, Metamask
References
[1] L. C. Schaupp and L. Carter, “E-voting: from apathy to adoption,” Journal of Enterprise Information Management, vol. 18, no. 5, pp. 586–601, 2005.
[2] Geth.ethereum.org. (2018). Go Ethereum. Available at: https://geth. ethereum.org/.
[3] Patrick McCorry, Siamak F. Shahandashti and Feng Hao. (2017). A Smart Contract for Boardroom Voting with Maximum Voter Privacy.
[4] K.-H. Wang, S. K. Mondal, K. Chan, and X. Xie, “A review of contemporary e-voting: Requirements, technology, systems and usability,” Data Science and Pattern Recognition, vol. 1, no. 1, pp. 31–47, 2017.
[5] D. A. Gritzalis, “Principles and requirements for a secure e-voting system,”Computers& Security, vol. 21, no. 6, pp. 539–556, 2002.
[6] R. Anane, R. Freeland, and G. Theodoropoulos, “E-voting requirements and implementation,” in The 9th IEEE CEC/EEE 2007. IEEE, 2007, pp. 382–392.
[7] T. Moura and A. Gomes, “Blockchain voting and its effects on election transparency and voter confidence,” in Proceedings of the 18th Annual International Conference on Digital Government Research, ser. dg.o ’17. New York, NY, USA: ACM, 2017, pp. 574–575.
[8] A. B. Ayed, “A conceptual secure blockchain-based electronic voting system,” International Journal of Network Security & Its Applications, vol. 9, no. 3, 2017.
[9] https://truffleframework.com/
[10] https://metamask.io/
[11] https://stackoverflow.com/
[12] https://solidity.readthedocs.io/en/v0.4.24/
[13] https://right2vote.in/much-india-spends-lok-sabha-election/
[14] https://pmawards.gov.in/public/List-of-Backward/Districts/
Citation
Darshak N, Gautham A N , Veera Sandeep M, Gopal Krishna shyam, "Blockchain Enabled E-Voting System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.396-400, 2019.
Dynamic Resource Adaptation in Cloud Computing
Review Paper | Journal Paper
Vol.07 , Issue.14 , pp.401-408, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.401408
Abstract
The need for the cloud resources is increasing and with increase in demand the cost of these resources is also increasing. Cloud environment gives the flexibility of utilizing the resources as per the need and the customer would pay for his usage. The consumer need not invest on the resources and thereby the cost of investment is drastically reduced for the consumer. But since the demand for the cloud resource is increasing, the cost is rising high. This can be reduced with an approach as proposed in this paper. This paper mainly focusses on the optimal way of resource adaption and hence reduction of cost and power consumption. Based on the analysis, there are some open challenges for the optimal resource adaptation. The resource’s idle time is utilized by other consumer in need and hence reduces the cost and power consumption. This can be achieved by adopting k-means algorithm initially to segregate the different kinds of resources, then the idle time is calculated with time and at what time using some of the prediction algorithms. The idle time of the resources is then distributed using algorithms such as round robin, FCFS etc…
Key-Words / Index Term
Cloud, Resource, adaptation, machine learning
References
[1]. Jassy A Amazon Web Services Summit. https://aws.amazon.com/ summits/san-francisco/. Accessed May 2016
[2]. Galante G, Bona LCEd “A survey on cloud computing elasticity” In: Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing, UCC ’12. IEEE Computer Society, Washington, DC, USA. pp 263–270
[3]. Beloglazov A, Buyya R, Lee YC, Zomaya A, “A taxonomy and survey of energy-efficient data centers and cloud computing systems”. Adv Comput82:47–111, 2011
[4]. Botran TL, Miguel-Alonso J, Lozano JA, “Auto-scaling techniques for elastic applications in cloud environments”. J Grid Comput12(4):559–592,2014
[5]. Najjar A, Serpaggi X, Gravier C, Boissier O, “Survey of Elasticity”, Management Solutions in Cloud Computing. In: Computer Communications and Networks. Springer, 236 Gray’s Inn Road, Floor 6, London WC1X 8HB, UK. pp 235–263, 2014
[6]. Jennings B, Stadler R, “Resource management in clouds: Survey and research challenges”. J Netw Syst Manag23(3):567–619
[7]. Coutinho EF, Carvalho Sousa FR, Rego PAL, Gomes DG, Souza JN, “Elasticity in cloud computing: a survey. Ann Telecommunannales des télécommunications” 70(7):289–309. doi:10.1007/s12243-014-0450-7,2014
[8]. Mann ZA, “Allocation of virtual machines in cloud data centers —a survey of problem models and optimization algorithms”. ACM Computing Survey 48(1):11–11134. doi:10.1145/2797211,2015
[9]. Singh S, Chana I, “Qos-aware autonomic resource management in cloud computing: A systematic review. ACM Computing Survey” 48(3):42–14246. doi:10.1145/2843889,2015
[10]. Faniyi F, Bahsoon R, “A systematic review of service level management in the cloud”. ACM Computing Survey 48(3):43–14327. doi:10.1145/2843890,2015
[11]. Naskos A, Gounaris A, Sioutas S, “Cloud Elasticity: A Survey”. In: Karydis I, Sioutas S, Triantafillou P, Tsoumakos D (eds). “Algorithmic Aspects of Cloud Computing: First International Workshop”, ALGOCLOUD 2015, Patras, Greece, September 14-15, 2015. Revised Selected Papers. Springer, Cham. pp 151–167,2016
[12]. Mohamaddiah MH, Abdullah A, Subramaniam S, Hussin M, “A survey on resource allocation and monitoring in cloud computing”. Int J Mach Learn Comput4(1):31–38,2014
[13]. Singh S, Chana I, “A survey on resource scheduling in cloud computing: Issues and challenges”. J Grid Comput14(2):1–48,2016
[14]. NIST Sp800-145: “Definition of cloud computing. Technical report”, NIST, 100 Bureau Drive, Gaithersburg, USA (Sep 2011). NIST. http://csrc.nist.gov/ publications/PubsSPs.html. Accessed May 2016
[15]. Herbst NR, Kounev S, Reussner R, “Elasticity in cloud computing: What it is, and what it is not”. In: 10th International Conference on Autonomic Computing. pp 23–27,2013
[16]. Maurer M, Brandic I, Sakellariou R, “Adaptive resource configuration for cloud infrastructure management”. Future General Computing System 29(2):472–487,2013
[17]. Magklis G, Semeraro G, Albonesi DH, Dropsho SG, Dwarkadas S, Scott ML, “Dynamic frequency and voltage scaling for a multiple-clock-domain microprocessor”. IEEE Micro 23:62–68,2003
[18]. Addis B, Ardagna D, Panicucci B, Zhang L, “Autonomic management of cloud service centers with availability guarantees”. In: 2010 IEEE 3rd International Conference on Cloud Computing. IEEE, Washington, DC, USA. pp 220–227,2010
[19]. Sedaghat M, Hernández-Rodriguez F, Elmroth E, “Autonomic resource allocation for cloud data centers: A peer to peer approach”. In: IEEE International Conference on Cloud and Autonomic Computing. IEEE, Washington, DC, USA. pp 131–140,2014
[20]. Reiss C, Tumanov A, Ganger GR, Katz RH, Kozuch MA, “ Heterogeneity and dynamicity of clouds at scale: Google trace analysis”. In: Proceedings of the Third ACM Symposium on Cloud Computing, SoCC ’12. ACM, New York, NY, USA. pp 7–1713. doi:10.1145/2391229.2391236 http://doi.acm.org/10.1145/2391229.2391236,2012
[21]. Van HN, Tran FD, Menaud J-M, “Sla-aware virtual resource management for cloud infrastructures”. In: IEEE International Conference on Computer and Information Technology. IEEE, Washington, DC, USA 2:357-362,2009
[22]. Bodík P, Griffith R, Sutton C, Fox A, Jordan M, Patterson D, “Statistical machine learning makes automatic control practical for internet datacenters”. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud’09. USENIX Association, Berkeley, CA, USA,2009
[23]. Lama P, Zhou X , “Aroma: Automated resource allocation and configuration of mapreduce environment in the cloud”. In: Proceedings of the 9th International Conference on Autonomic Computing, ICAC ’12. ACM, New York, NY, USA. pp 63–72,2012
[24]. Malkowski SJ, Hedwig M, Li J, Pu C, Neumann D, “Automated control for elastic n-tier workloads based on empirical modeling”. In: Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC ’11. ACM, New York, NY, USA. pp 131–140,2011
[25]. Ali-Eldin A, Tordsson J, ElmrothE, “An adaptive hybrid elasticity controller for cloud infrastructures”. In: 2012 IEEE Network Operations and Management Symposium. IEEE, Washington, DC, USA. pp 204–212,2012
[26]. Zhani MF, Cheriton DR, Zhang Q, Simon G, Boutaba R, “Vdc planner: Dynamic migration-aware virtual data center embedding for clouds”. In: IEEE International Symposium on Integrated Network Management. IEEE, Washington, DC, USA. pp 18–25,2013
[27]. Roy N, Dubey A, Gokhale A, “Efficient Autoscaling in the Cloud Using Predictive Models for Workload Forecasting”. In: IEEE International Conference on Cloud Computing. pp 500–507,2011 Computing. IEEE, Washington, DC, USA. pp 507–508,2014
[28]. Zheng S, Zhu G, Zhang J, Feng W, “Towards an adaptive human-centric computing resource management framework based on resource prediction and multi-objective genetic algorithm”. Multimedia Tools and Applications:1–18,2015
[29]. Zhang Q, Chen H, Shen Y, Ma S, Lu H, “Optimization of virtual resource management for cloud applications to cope with traffic burst”. FuturGenerComput Syst 58:42–55. doi:10.1016/j.future.2015.12.011,2016
[30]. Padala P, Hou K-Y, Shin KG, Zhu X, Uysal M, Wang Z, Singhal S, Merchant A, “Automated control of multiple virtualized resources”. In: Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys ’09. ACM, New York, NY, USA. pp 13–26,20109
[31]. Dawoud W, Takouna I, MeinelC,Elastic virtual machine for fine-grained cloud resource provisioning. Glob Trends ComputCommun Syst 269:11–25,2011
[32]. Fargo F, Tunc C, Al-Nashif Y, Akoglu A, Hariri S, “Autonomic workload and resource management of cloud computing services”. In: IEEE International Conference on Cloud and Autonomic Computing. IEEE, Washington, DC, USA. pp 101–110,2014
[33]. Beloglazov A, Abawajyb J, Buyya R, “Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing”. Future General Computing Syst 28:755–768,2012
[34]. Shen Z, Subbiah S, Gu X, Wilkes J, “Cloudscale: Elastic resource scaling for multi-tenant cloud systems”. In: Proceedings of the 2Nd ACM Symposium on Cloud Computing, SOCC ’11. ACM, New York, NY, USA. pp 5–1514,2011
[35]. Kusic D, Kephart JO, Hanson JE, Kandasamy N, Jiang G, “Power and performance management of virtualized computing environments via lookahead control”. In: Autonomic Computing ICAC. IEEE, Washington, DC, USA. pp 3–23,2008
[36]. Cardosa M, Korupolu MR, Singh A, “Shares and utilities based power consolidation in virtualized server environments”. In: 11th IFIP/IEEE International Conference on Symposium on Integrated Network Management. pp 327–334,2009
[37]. Koehler M, “An adaptive framework for utility-based optimization of scientific applications in the cloud”. J Cloud Comput Adv Syst App 3:4,2014
[38]. Nathuji R, Kansal A, Ghaffarkhah A, “Q-clouds: Managing performance interference effects for qos-aware clouds”. In: Proceedings of the 5th European Conference on Computer Systems, EuroSys ’10. ACM, New York, NY, USA. pp 237–250,2010
[39]. Han R, Guo L, Ghanem MM, Guo Y, “Lightweight resource scaling for cloud applications”. In: International Symposium on Cluster, Cloud and Grid Computing. IEEE, Washington, DC, USA. pp 644–651,2012
[40]. Zhu X, Wang Z, Singhal S, “Utility-Driven Workload Management Using Nested Control Design”. In: American Control Conference. IEEE, Washington, DC, USA,2006
[41]. Xu J, Zhao M, Fortes J, Carpenter R, Yousif M, “Autonomic resource management in virtualized data centers using fuzzy logic-based approaches”. ClustComput11:213–227,2008
[42]. Jamshidi P, Ahmad A, Pahl C, “Autonomic resource provisioning for cloud-based software”. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and SelfManaging Systems, SEAMS 2014. ACM, New York, NY, USA. pp 95–104,2014
[43]. Han R, Ghanem MM, Guo L, Guo Y, Osmond M, “Enabling cost-aware and adaptive elasticity of multi-tier cloud applications”. FuturGenerComput Syst 32:82–98,2014
[44]. Hasan MZ, Magana E, Clemm A, Tucker L, Gudreddi SLD, “Integrated and autonomic cloud resource scaling”. In: Network
Operations and Management Symposium. IEEE, Washington, DC, USA. pp 1327–1334,2012
[45]. Gmach D, Rolia J, Cherkasova L, Kemper A “Resource pool management: Reactive versus proactive or lets be friends”. Computer Networks: The International Journal of Computer and Telecommunications Networking 53:2905–2922,2009
[46]. Iqbal W, Dailey MN, Carrera D, Janecek P, “Adaptive resource provisioning for read intensive multi-tier applications in the cloud”. FuturGenerComput Syst 26:871–879,2011
[47]. Gulati A, Shanmuganathan G, Holler A, Ahmad I, “Cloudscale resource management: Challenges and techniques”. In: Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing, HotCloud’11. USENIX Association, Berkeley, CA, USA. pp 3–3,2011
[48]. Tchana A, Palma ND, Safieddine I, Hagimont D, Diot B, Vuillerme N, “Euro-par 2015: Parallel processing: 21st international conference on parallel and distributed computing”, Vienna, Austria, August 24-28, 2015, proceedings: 305–316,2015
[49]. Beloglazov A, Buyya R, “Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers”. ConcurrComputPract Experience 24:1397–1420,2012
[50]. Choi HW, Kwak H, Sohn A, Chung K, “Autonomous learning for efficient resource utilization of dynamic vm migration”. In: Proceedings of the 22Nd Annual International Conference on Supercomputing, ICS ’08. ACM, New York, NY, USA. pp 185–194,2008
[51]. Zuo L, Shu L, Dong S, Zhu C, Zhou Z, “Dynamically weigh0ted load evaluation method based on self-adaptive threshold in cloud computing”. Mob Networks Appl :1–15. doi:10.1007/s11036-016- 0679-7,2016
[52]. Lim HC, Babu S, Chase JS, “Automated control for elastic storage”. In: Proceedings of the 7th International Conference on Autonomic Computing, ICAC ’10. ACM, New York, NY, USA. pp 1–10,2010
Citation
Jyoti Chalikar, Gopal K Shyam, "Dynamic Resource Adaptation in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.401-408, 2019.
Performance Study of IPFS over Http(S) Using the Multi-Cloud Platform
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.409-415, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.409415
Abstract
Recent researches have proved that existing internet protocols like HTTP have been used widely and extensively in our day to day life which has led to poor and inefficient performance of the web. This study focuses on a new network protocol that is Interplanetary File System abbreviated as IPFS.IPFS is distributed and peer to peer file system which stores files in a decentralized way unlike http as well as keeps a track of versions pretty much like Git. IPFS uses Distributed Hash Table for the purpose of routing, Merkle DAG Data Structure for establishing links between two nodes in the form of cryptographic hashes and Bit Torrent for the exchange of data in bits from different peers. These functionalities make it possible for IPFS to transfer data with high speed and reliability. The unique hash values ensure data immutability and prevents violation of data security. In other words IPFS is the replacement for HTTP which uses centralized server to download files leading to all time crashing of the server, slow internet and unreliability in all terms.
Key-Words / Index Term
Interplanetary File System, Hypertext Transfer Protocol, Merkle Dag, BitSwap
References
[1]. Baumgart and S. Mies. S/kademlia: A practicable approach towards secure key-based routing. In Parallel and Distributed Systems, 2007 International Conference on, volume 2, pages 18. IEEE, 2007.
[2]. Bit Torrent. Bittorrent and A ̧torrent software surpass 150 million user milestone, Jan. 2012.
[3]. J. Dean and S. Ghemawat. Level dB–a fast and lightweight key/value database library by google, 2011.
[4]. P. Maymounkov and D. Mazieres. Kademlia: A peer-to-peer information system based on the xor metric. In Peer-to-Peer Systems, pages 53–65. Springer, 2002.
[5]. Idea about the IPFS protocol-http://ipfs.io/
[6]. J. H. Howard, M. L. Kazar, S. G. Menees, D. A. Nichols, M. Satyanarayanan, R. N. Sidebotham,and M. J. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems (TOCS), 6(1):51–81, 1988.
[7]. J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, et al. Ocean store: An architecture for global-scale persistent storage. ACM Sigplan Notices, 35(11):190–201, 2000.
Citation
Ajil A, Shubham kashyap, Rohith SS, Kumari Nisha Rani, "Performance Study of IPFS over Http(S) Using the Multi-Cloud Platform", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.409-415, 2019.
Crypto Currency Based 24/7 Online Food Delivery System
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.416-419, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.416419
Abstract
everyone needs food to survive, usually people eat three times a day and there are some who needs a fourth meal. Basically food is the only thing that can be sold anywhere and everywhere. This industry is benefit able not only for hotel owners but also food chain suppliers and food chain manufactures as well as for the customers and according to the recent changes in this food industry, there are more and more complicated challenges and innovations that are getting evolved. Cashless payments are nowadays are becoming more popular and digital currencies like Bit coin, is not used for payments on transaction conformation. So we modified a Bit coin payment System for fast transactions. Today, we are looking at the number of online payments that are mainly going with cashless method. In last few years the online payment methods like BHIM, Phone Pe, Google pay Paytm have a simple look and the transactions are fast and safe money. These approaches commonly rely on central trust authority for processing. Bit coin transfer is a peer-to-peer network doesn’t rely on central trust but provides reliable money transfer. In this paper, we present a concept that improves the new technique of transferring money in bit coin network.
Key-Words / Index Term
24/7 online food ordering system, Database management, crypto currency wallet
References
[I] Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash system," tech. rep., 2008.
[2] Tobias Bamert*, Christian Decker*, Lennart Elsen*, Roger Wattenhofert, Samuel Welten” Have a snack pay with bitcoin”.
[3] Nelisiwe Peaceness DLAMINI1, Mfundo Shakes SCOTT2, Kishor Krishnan NAIR” Development of an SMS system used to access bitcoint wallets”, 2017.
[4] Cristina-Edina Domokos, Barna Sera, Karoly Simon, Lazos Kovacs, Tas-Bela szakacs,”Netfood”, 2018.
[5] Mikael Asplund, Jakob Lovhall, Simin Nadjm-Tehrani” Instore payments using Bitcoin”.
[6] Yan Liu, Bin Guo, Senior Member, IEEE, Chao Chen, He Du, Zhiwen Yu, Senior Member, IEEE, Daqing Zhang, Member, IEEE, and Huadong Ma, Member, IEEE,” Spatial Crowd Sourcing”.
[7] Wang Zheng, School of Software Development, Dalian University of Technology, Dalian, Liaoning 116620, China Xiangpei Hu, School of Management, Dalian University of Technology, Dalian, Liaoning 116023, China Amy Z. Zeng, Department of Management, Worcester Polytechnic Institute, Worcester, Massachusetts 01609, USA
[8] "Application of fincen`s regulations to persons administering, exchanging, or using virtual currencies," tech. rep., Financial Crimes Enforcement Network, US Department of the Treasury, 2013.
[9] "Bitcoin virtual currency: Unique features present distinct challenges for deterring illicit activity," tech. rep., Federal Bureau of Investigation, 2012.
[10] M. Elias, "Bitcoin: Tempering the digital ring of gyges or implausible pecuniary privacy," Available at SSRN 1937769, 2011.
[11] Morris, David Z(15 may 2016),”Leaderless, Block chain-based Venture Capital Fund Raises $100 Million, and counting”.
[12] Ron Dorit; Adi Shamir. “Quantitative Analysis of the full Bitcoin Transaction Graph”
[13] “Coinmarketcap.com” http://coinmarketcap.com
[14]”Bitcoin wallets: What you need to know about the hardware” The Daily Dot.2018-11-20.Retrieved 2019-03-10
[15]Newman,lily hay(2017-11-05). “how to keep yor bitcoin safe and secure”.wired. ISSN 1059-1028. Retrieved 2019-03-10.
Citation
M Prem Sampat, P Sai Ganesh, Rajashekar C, P Nithyananda Reddy, Surendra Babu K N, "Crypto Currency Based 24/7 Online Food Delivery System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.416-419, 2019.
Sentiment Analysis on Twitter
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.420-423, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.420423
Abstract
Twitter is an online miniaturized scale blogging and person to person communication stage which enables clients to compose short notices of most extreme length 140 characters (280 characters for confirmed records). This task tends to the issue of conclusion investigation in twitter; that is ordering tweets as indicated by the notion communicated in them: positive, negative or nonpartisan. It is a quickly growing administration with more than 500 million enlisted clients - out of which 330 million are dynamic clients and half of them sign on twitter once a day - producing almost 500 million tweets for each day. Because of this huge measure of use we would like to accomplish an impression of open assessment by breaking down the conclusions communicated in the tweets. Investigating the open slant is vital for some applications, for example, firms endeavouring to discover the reaction of their items in the market, foreseeing political races and anticipating financial wonders like stock trade.
Key-Words / Index Term
Social Network, Sentiment Analysis, Big Data, Applications
References
[1] Predicting Elections with Twitter: What 140 Characters Reveal about Political Sentiment By Tumasjan https://www.aaai.org/ocs/index.php/ICWSM/ICWSM10/paper/viewFile/1441/1852
[2] Efthymios Kouloumpis, Theresa Wilson and Johanna Moore. Twitter Sentiment Analysis: The Good the Bad and the OMG! In Proceedings of AAAI Conference on Weblogs and Social Media (ICWSM), 2011.
[3] Theresa Wilson, Janyce Wiebe and Paul Hoffmann. Recognizing Contextual Polarity in Phrase-Level Sentiment Analysis. In the Annual Meeting of Association of Computational Linguistics: Human Language Technologies (ACL-HLT), 2005.
Citation
Lokesh Patidar, Raghavendra Nayaka P., Vaibhav Malviya, Ashwini, Varshitha TR, "Sentiment Analysis on Twitter", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.420-423, 2019.
Smart Speed Limit Sign Board for Changing Weather Conditions
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.424-428, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.424428
Abstract
Digital road sign boards are an advanced solution for today’s static road sign boards which are incapable of handling dynamic situations under changing weather conditions. Internet of things (IoT) technology has enabled the interconnectivity between remotely distributed devices and can be centrally monitored and controlled. These digital roads sign boards can be accessed and controlled remotely using centralized control center. The speed limit of a particular road will be updated according to current weather conditions like rain, fog etc. The proposed system has been implemented using raspberry pi, matrix display and weather API.
Key-Words / Index Term
Internet of things (IoT), raspberry pi, matrix display
References
[1] A. Bahga, V. Madisetti, “Internet of Things a Hands-on Approach”, Universities Press Private Limited, India, pp. 42-51, 2018.
[2] S. Alase, V. Chinchur, “IoT Based Digital Signage Board using Raspberry PI 3”, International Research Journal of Engineering and Technology, Vol. 4, Issue. 5, pp. 310-313, 2017.
[3] Kamanashis Biswas Vallipuram Muthukkumarasamy, “Securing Smart Cities Using Blockchain Technology”, In Proceedings of 2nd IEEE International Conference on Data Science and Systems, pp. 1392-1393, 2016.
[4] S.D. Jadhav, Y. Mistry, “IoT Based Electronic Notice Board”, International Journal of Current Engineering and Scientific Research, Vol. 4, Issue.11, pp. 73-76, 2017.
[5] C.M. Sunny, Nithya S., Sinshi K.S., Vidya V.M.D., Aiswaria L.K.G., Anjana S., T.K. Manojkumar, “Forecasting of Road Accident in Kerala: A Case Study”, In Proceedings of IEEE International Conference on Data Science and Engineering, pp. 1-5, 2018.
[6] Y. Qian, E.J. Almazan, J.H. Elder, “Evaluating Features and Classifiers for Road Weather Condition”, In Proceedings of IEEE International Conference on Image Processing (ICIP), pp. 4403-4407, 2016.
[7] Z. Huang, “Extensions to the k-Means Algorithms for Clustering Large Data Sets with Categorical Values,” Data Ming and Knowledge Discovery, vol. 2, no. 3, pp. 283-304, 1998.
[8] S.K. Riyazhussain, C.R.S. Lokesh, P. Vamsikrishna, G. Rohan, “Raspberry Pi controlled Traffic Density monitoring system”, In Proceedings of IEEE International Conference on Wireless Comunications, Signal Processing and Networking (WiSPNET), pp. 1178-1181, 2016.
Citation
Abhishek Rai, Farooque Azam, Anshul Kumar, Abhinav Bajpai, Ankesh Gaurav, "Smart Speed Limit Sign Board for Changing Weather Conditions", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.424-428, 2019.
Medibox –IoT Enabled Patient Assisting Device
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.429-431, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.429431
Abstract
The health sector is one among the most important sector which must be given importance. This sector is critical part in human life due to which we must contribute a higher hand to it using IOT. This makes it important in developing an IOT device called Medibox which helps people in taking tablets or medication at right amount and at right period and tablets are dispensed according to user inputs. Medibox will help the elderly patients who usually have memory issue. This device also provide water to be taken along with the medicines which would make it easier for patients consume their medication easily. Medibox can be used by patients who travels regularly and has medications to be taken. This device also makes sure about the temperature and humidity that must be maintained for particular medicines. Medibox can be used in two modes one is online mode using a web age or offline mode using the graphical display on the Medibox. Medibox will also make sure that the medicines preserved with proper properties.
Key-Words / Index Term
MEDI BOX, Online mode, Offline mode, (key words)
References
[1]. A Medication Adherence Monitoring System for People with Dementia Author: -Vasily Moshnyaga, Masaki Koyanagi, Fumiyuki Hirayama, Akihisa Takahama, Koji HashimotoYear: -2016[1]
[2]. Developing the Medication Reminder Mobile Application “Seeb”Author: -Sakineh SaghaeiannejadIsfahani, Asghar Ehteshami, Ebtesam Savari, Ali Samimi[2]
[3]. Smart Phone Based Medicine In-take Scheduler, Reminder and MonitorAuthor: -John K. Zao , Mei-Ying WangYear: -2010[3]
[4]. Medication Adherence by Using a Hybrid Automatic Reminder Machine Ying-Wen Bai and Ting-Hsuan Kuo Year: -2016[4]
[5]. Medication Adherence: WHO Cares?Marie T. Brown, MD, and Jennifer K. Bussell, MD-2011[5]
Citation
Akshita D, Anupama Y, Annvin Vincent, Arya S, "Medibox –IoT Enabled Patient Assisting Device", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.429-431, 2019.