Research and Survey Practice for sugarcane farming using Internet of Things (IOT)
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.432-435, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.432435
Abstract
The lack of adopting new technology in agriculture directly impact on countries GDP, to enhance agro products need to adopt IOT based techniques to increase crop survey, crops status, managing water resources etc. Internet of Things has more potential and transfers the way we do traditional agriculture into smart agriculture. The increasing global population will cross 12 billion by 2015, so, in order to feed food to this huge population the agriculture need to be automating using smart system such as IoT based systems and components. The demand of food has to meet many challenges in future such as change in climate, weather conditions, environment changes impact result into intensive farming practices, smart agriculture farming through IoT based system helps to farmers to reduce human manpower resources and generated very less agriculture waste. And enhance the crops productivity. IoT Based smart farming is a hi-tech system of growing crops using tools and techniques and automated systems. It uses ICT base hardware tools, applications and advance techniques in agriculture. To incorporate IoT based farming need to use of sensors, automated vehicle, automated hardware systems, control units etc. are key components of this system.
Key-Words / Index Term
IoT,ICT,IT,GDP,Automated Hardware
References
[1]Carlos Driemeier, Liu Yi Ling, Angélica O. Pontes, Guilherme M. Sanches, Henrique C. J. Franco “Data Analysis Workflow for Experiments in Sugarcane Precision Agriculture” in 2014 IEEE 10th International Conference on eScience
[2] LiangYu, Luo Yongjun “A Research and Practice for Sugarcane Area`s Farm Management Information Service Platform” in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
[3] Moises Alencastre Miranda, Joseph R. Davidson, Richard M. Johnson “Robotics for Sugarcane Cultivation: Analysis of Billet Quality using Computer Vision” in 3828 IEEE ROBOTICS AND AUTOMATION LETTERS, VOL. 3, NO. 4, OCTOBER 2018
[4] P.Vijaya Bhaskar Redd A.Rama Mohan Reddy “Content based image indexing and retrieval using directional local extrema and magnitude patterns” In AEU-International Journal of Electronics and Communications 68 (7), 637-643
[5] Seokhoon Jeong , Yong Min Lee and Sangjoon Lee “ Development of an automatic sorting system for fresh ginsengs by image processing techniques” Jeong et al. Hum. Cent. Comput. Inf. Sci. (2017) 7:41
[6] Yoon-Ki Kim, Yongsung Kim and Chang-Sung Jeong “RIDE: real-time massive image processing platform on distributed environment” Kim et al. EURASIP Journal on Image and Video Processing (2018) 2018:39
[7]Xavier P.Burgos-Artizzu AngelaRibeiro AlbertoTellaeche GonzaloPajarescCesarFernández-Quintanilla “Analysis of natural images processing for the extraction of agricultural elements” Image and Vision Computing Journal Volume 28, Issue 1, January 2010, Pages 138-149
[8] Liang Yu and Luo Yongjun “ A research and Practice for sugarcane Area’s farm management Information service platform”: 978-1-4244-7237 @2010 IEEE , international conference ICCASM 2010
Citation
Anilkumar Hulsure, P.V. Bhaskar Reddy, "Research and Survey Practice for sugarcane farming using Internet of Things (IOT)", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.432-435, 2019.
Machine learning Classifiers for Credit Card Fraud Detection: A Brief Survey
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.436-442, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.436442
Abstract
Utilization of credit cards encourages individuals to buy products online via the Internet. Individuals tend to do much of purchasing online or offline by utilizing the credit card facility provided by the bankers to their customers. Credit cards have turned out to be the most prominent facility available to the people around the globe to encourage paperless trades at an enormous speed. Whenever any such trade happens in exchanges or net marketing by using a paperless framework, it is subjected under high risk of fraudulent transactions due to many pitfalls in the security system of the usage of credit cards on the networks. This paper presents a brief survey of important and basic linear and non-linear machine learning algorithms that are focused to predict the fraudulent transactions by studying the patterns present in the credit card transactional datasets. The authors provide the methodology of Random Forest (RF), Support Vector machine (SVM) and Artificial Neural Network (ANN) classifiers to accurately classify whether a unseen credit card transaction is fraudulent or not.
Key-Words / Index Term
Credit Card Fraud Detection, Random Forest, Support Vector Machine, Artificial Neural Networks
References
[1] Chavan, J., 2013. Internet banking-benefits and challenges in an emerging economy. International Journal of Research in Business Management, 1(1), pp.19-26.
[2] Al Hasib, A., 2009. Threats of online social networks. IJCSNS International Journal of Computer Science and Network Security, 9(11), pp.288-93.
[3] Resnick, P. and Zeckhauser, R., 2002. Trust among strangers in Internet transactions: Empirical analysis of eBay`s reputation system. In The Economics of the Internet and E-commerce (pp. 127-157). Emerald Group Publishing Limited.
[4] Franklin, J., Perrig, A., Paxson, V. and Savage, S., 2007, October. An inquiry into the nature and causes of the wealth of internet miscreants. In ACM conference on Computer and communications security (pp. 375-388).
[5] Özkan, S., Bindusara, G. and Hackney, R., 2010. Facilitating the adoption of e-payment systems: theoretical constructs and empirical analysis. Journal of enterprise information management, 23(3), pp.305-325
[6] Minelli, M., Chambers, M. and Dhiraj, A., 2012. Big data, big analytics: emerging business intelligence and analytic trends for today`s businesses. John Wiley & Sons.
[7] Davenport, T. and Harris, J., 2017. Competing on Analytics: Updated, with a New Introduction: The New Science of Winning. Harvard Business Press.
[8] Bhattacharyya, S., Jha, S., Tharakunnel, K., and Westland, J. C. (2011). Data burrowing for Mastercard deception: A close report. Decision Support Systems, 50(3), 602613. Elsevier B.V.
[9] Rahul Johari and shalini gupta" A New Framework for Credit Card Transactions including Mutual Authentication among Cardholder and Merchan 978-0-7695-4437-3/11 $26.00 © 2011 IEEE DOI 10.1109/CSNT.2011.12
[10] Mahmoud Reza Hashemi and Leila Seyedhossein" Mining Information from Credit Card Time Series for Timelier Fraud Detection" 978-1-4244-8185-9/10/$26.00 ©2010 IEEE
[11] M.Kavitha and Dr.M.Suriakala `Constant Credit Card Fraud Detection on Huge Imbalanced Data utilizing Meta-Classifiers`978-1-5386-4031-9/17/$31.00 ©2017 IEEE
[12] M.Kavitha and Dr.M.Suriakala `Constant Credit Card Fraud Detection on Huge Imbalanced Data utilizing Meta-Classifiers`978-1-5386-4031-9/17/$31.00 ©2017 IEEE
[13] Mohammed Ibrahim Alowais and lay-ki-soon` Credit Card Fraud Detection: Personalized or Aggregated Model` 978-0-7695-4727-5/12 $26.00 © 2012 IEEE DOI 10.1109/MUSIC.2012.27
[14] Chaitanya Ghorpade and ankit Mishra `Charge card Fraud Detection on the Skewed Data Using Various Classification and Ensemble Techniques` 978-1-5386-2663-4/18$31.00 c 2018 IEEE
[15] Mrs.Vimala Devi. J , Dr.Kavitha,K.S "Misrepresentation Detection in Credit Card Transactions by utilizing Classification Algorithms" 978-1-5386-3243-7/17/$31.00 ©2017 IEEE
[16] References: Shukur, H.A. and Kurnaz, S., 2019. Credit Card Fraud Detection using Machine Learning Methodology.
[17] An Evaluation of Computational Intelligence in Credit Card Fraud Detection Mohammad Sultan Mahmud Department of Computer Science and Engineering World University of Bangladesh Dhaka-1205, Bangladesh 978-1-4673-8139-0/16/$31.00 ©2016 IEEE
[18] Djeffal Abdelhamid1 , Soltani Khaoula1 , Ouassaf Atika2 Automatic Bank Fraud Detection Using Support Vector Machines Proceedings of the International conference on Computing Technology and Information Management, Dubai, UAE, 2014
[19] References: A Comparison of Machine Learning Techniques for Credit Card Fraud Detection Lusis April 20, 2017
[20] Mrs.Vimala Devi. J , Dr.Kavitha,K.S Cambridge Institute of Technology, Global Academy of Technology, Bangalore-98 Fraud Detection in Credit Card Transactions by using Classification Algorithms 978-1-5386-3243-7/17/$31.00 ©2017 IEEE
[21] International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 24 (2018) pp. 16819-16824 © Research India Publications. http://www.ripublication.com 16819 Machine Learning For Credit Card Fraud Detection System Lakshmi S V S S1 Selvani Deepthi Kavila2
[22] Credit Card Fraud Detection on the Skewed Data Using Various Classification and Ensemble Techniques Ankit Mishra MANIT Bhopal, Bhopal, Madhya Pradesh , 2018 IEEE International Students’ Conference on Electrical, Electronics and Computer Science
[23] Cost Sensitive Modeling of Credit Card Fraud Using Neural Network Strategy Fahimeh Ghobadi Computer Engineering Department Islamic Azad University South Tehran Branch Tehran, Iran Ghobadi.Fahimeh@Gmail.com 978-1-5090-5820-4/16/$31.00 ©2016 IEEE
[24] Cluster Analysis and Artificial Neural Networks A Case Study in Credit Card Fraud Detection Emanuel Mineda Carneiro, Luiz Alberto Vieira Dias; Adilson Marques da Cunha 978-1-4799-8828-0/15 $31.00 © 2015 IEEE DOI 10.1109/ITNG.2015.25
[25] Analysis on Credit Card Fraud Detection Methods 1 S. Benson Edwin Raj, 2A. Annie Portia 978-1-4244-9394-4/11/$26.00 ©2011 IEEE
[26] Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, 12-15 July 2008 978-1-4244-2096-4/08/$25.00 ©2018 IEEE 3630 NEURAL DATA MINING FOR CREDIT CARD FRAUD DETECTION TAO GUO, GUI-YANG LI
[27] Improved Fraud Detection in e-Commerce Transactions Jisha Shaji PG Scholar Department of Computer Engineering St. Francis Institute of Technology, Mumbai, India 978-1-5090-4381-1/17/$31.00 © 2017 IEEE
[28] Wells, A.J., 2019. Cyber-Security Incidents and Organizational Policies in Healthcare (Doctoral dissertation, Northcentral University).
Citation
Vidyashree V, Akram Pasha, Udayarani V, Vinay Kumar M, "Machine learning Classifiers for Credit Card Fraud Detection: A Brief Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.436-442, 2019.
Application of Machine Learning in Employee Performance Prediction
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.443-447, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.443447
Abstract
In emerging developing countries such as India, companies heavily rely on their human workforce for services. That is why employee performance management at the individual level is must and the business case for implementing a system to measure and improve employee performance should be strong. The concept of the project is: Today majority of the giant retail companies are facing a lot of issues in their current assessment planning of their employees. This wrong assessment planning leads to employees not being used to the fullest potential which causes loss to businesses and major capital loss in man hours, also this assessment planning requires a lot of manual strategies which are very costly and hence these assessment strategies then turn out to be costly, time taking, biased and working on mostly non relevant data. We used the Machine learning classification technique for the extraction of knowledge significant for predicting employee performance using a .csv file sourced from (INX Future Inc.).
Key-Words / Index Term
Employee Performance Analysis,SVM, Machine Learning, Algorithm K-NN algorithm, random forest
References
[1]. Al-Radideh, Q.P., Al-Naagi, E., (2011). Machine learning used for Classification Model for Employees Performance prediction, International Journal of Advanced sciences of computer and Applications, 3(2), pp 144 – 151
[2]. Anchetra, R.A, Cabautan, R.J.M., Lorenaa, B.T.T., Rabagoo, W., (2010). Predicting faculty trainings and performance development using rule-based algorithm classification, Asean Journal of Science of Computer and Information Technology 2: 7, pp 204 – 208.
[3]. heine, C.F., Chen, L.F., (2008). Learning machine to improve employee selection and increase human input: A case study in technology industry, Expert applications on system, 34(1), pp 283–293
[4]. Delaavari, N., Phon-Amnnuaisuk S., (2009). Machine learning Application in Higher Learning Institutions, education on informatics, 7(1), pp. 32–55
[5]. Hamidah J., Abdul R.H., Zulaiha A.O., (2010). Discover Knowledge Techniques for Talent Forecasting in employee Resource Applications, World Academy of Engineering, Science and Technology.
[6]. Jantan, H., Hamdan, A. R., Othman, Z. A. (2011). applying Machine learning techniques for talent management. International Conference on Engineering of Computer and Applications IPCSIT Vol. 3.
[7]. Jantan, H., Hamdan, A. R., & Othman, Z. A. (2010). resource talent prediction in HRM using C4. 5 classification algorithm, International Journal on Science Computer and Engineering, 2(08-2011), pp 2525-2535.
[8]. Jantan, H., Hamdana, A. R., Othman, Z. A. (2008). Knowledge discovery techniques for talent forecasting in human resource application. World Academy of Science, Engineering and Technology, Penang, Malaysia, pp 803.
[9]. Jayanthi R., D.P. Goyal, S.I Ahson, (2008). Data techniques of Mining for better decisions in human resource systems, International Journal of Business Information Systems, 3(6), pp 468 – 484
[10]. Kotsiantiss, S.B., (2008). Supervised machine learning: a view of classification techniques, Informatics, 31, pp 247-268.
[11]. Kurgana, L.A., Musileke, P. (2008). A survey of knowledge discovery and Data Mining Models, The Knowledge Engineering Review, 21(2), pp 1 - 25
Citation
Archana Boob, Sandeep Sharma, Saurabh Singh, Rafsan Ali, "Application of Machine Learning in Employee Performance Prediction", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.443-447, 2019.
Landmine Detection HC-05 Bluetooth controlled Robot (LDBR) using GPS and GSM Technology
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.448-452, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.448452
Abstract
This paper outlines state-of-the-art solution for landmine detection that facilitates the detection of mine or possible explosives that are hidden. The latitude and longitude positions are then sent to the controller via SMS making it easier to locate and further to diffuse it as well. The major components used are Arduino Uno Board, HC-05 Bluetooth module, GSM SIM900A and copper coil. The result shown from this state-of-the-art proposed system provides better security and safety mechanism for the soldiers of our country.
Key-Words / Index Term
Arduino Uno, HC-05 Bluetooth, GPS, GSM, L29N Motor Driver, Metal Detector
References
[1] S. Sasikumar, K. Suganya, K. Santhosh Kumar, N. Karthikeyan, Prof. S. Kalpanadevi, “Multi Utility Landmine Detection Robotic Vehicle”, International Research Journal of Engineering and Technology, Vol.5, Issue.3, pp.3862-3865, 2018.
[2] Rajesh Kannan Megalingam, Vamsi Gontu, Ruthvik Chanda, Prasant Kumar Yadav, Allada Phanindra Kumar, “Landmine Detection and Reporting using Light Weight Zumo Bot”, In the Proceedings of the 2017 IEEE International Conference on Inventive Computing and Informatics (ICICI 2017), pp.618-622, 2017.
[3] V. Abilash, J. Paul Chandra Kumar, “Arduino Controlled Landmine Detection Robot”, In the Proceedings of the 2017 IEEE Third International Conference on Science Technology Engineering and Management (ICONSTEM 2017), pp.1077-1082, 2017.
Citation
Suhiena Shazleem M. Ghouse, Syed Ejaz Ahammed, Tanmay, Zaid Ghori, Kiran M., "Landmine Detection HC-05 Bluetooth controlled Robot (LDBR) using GPS and GSM Technology", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.448-452, 2019.
Importance of Social Media Analytics During Elections: A Review
Review Paper | Journal Paper
Vol.07 , Issue.14 , pp.453-458, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.453458
Abstract
The progress of 21stcentury can barely be anticipated without the indication of the part of social media in it. It wouldn’t be overstating to say that social media is ubiquitously present in all spheres of life, be it education, health care, business, disaster management, politics, tourism industry and of course the use of media sharing and entertainment needs no mention. In the wake of all such convenience provided by the social media, it too, does have a darker side to cast. Misuse of social media, the other side of the coin, also needs to be accounted. In the light of this and more so because of the upcoming Lok Sabha elections in India, the authors of this report feel an urge to address the current status of knowledge, the research community possess regarding the use of social media during election. The paperdiscusses the basics of Social Media Analytics i.e., from its evolution and framework to tool and techniques and also some applications in brief. Finally, several studies on social media analytics during elections have been described. It is sought to contemplate the degree to which the result of an election can be predicted, public opinions be altered or its usefulness in campaigning for an election. Apart from this, the authors also hope that this study will be helpful for other researchers to analyse the social media data and yield productive outcomes that contribute to the development of society, government and the nation.
Key-Words / Index Term
Social Media Analytics, Political science, Elections, Social media
References
[1] D. Zeng, H. Chen, R. Lusch, and S. Li. “Social media analytics and intelligence”. IEEE Intelligent Systems, vol. 25(6), pp. 13–16, 2010.
[2] N. A. Ghani, S. Hamid, I.A.T. Hashem, and E. Ahmed,“Social media big data analytics: A survey. Computers in Human Behavior”, 2018.R. Solanki, Principle of Data Mining, McGraw-Hill Publication, India, pp. 386-398, 1998.
[3] H. Sebei, M. A. H. Taieb, and M.B. Aouicha,“Review of social media analytics process and big data pipeline”, Social Network Analysis and Mining, vol. 8(1):30, 2018.
[4] S. Stieglitz, M. Mirbabaie, B. Ross, and C. Neuberger,“Social media analytics–challenges in topic discovery, data collection, and data preparation”, International journal of information management, vol. 39, pp. 156–168, 2018.
[5] BK Chae,“Insights from hashtag #supplychain and Twitter analytics: Considering Twitter and Twitter data for supply chain practice and research”. Int.. J. Production Econom, vol. 165: pp. 247–259, 2015
[6] P. Burnap, OF Rana, N Avis, M Williams, W Housley, A Edwards, J Morgan, L Sloan,“Detecting tension in online communities with computational Twitter analysis”, Tech. Forecasting Soc. Change, vol. 95, pp. 96–108, 2015
[7] S Tuarob, CS Tucker, M Salathe, N Ram,“An ensemble heterogeneous classification methodology for discovering health-related knowledge in social media messages”, J. Biomedical Informatics, vol. 49, pp. 255–268, 2014
[8] Y. Lu, F Wang, R Maciejewski,“Business intelligence from social media: A study from the vast box office challenge”. Comput. Graphics Appl., IEEE, vol. 34(5), pp. 58–69, 2014
[9] Xiang Z, Du Q, Ma Y, Fan W “A comparative analysis of major online review platforms: Implications for social media analytics in hospitality and tourism”. Tourism Management, vol. 58, pp. 51–65, 2017
[10] Huh J, Yetisgen-Yildiz M, Pratt W “Text classification for assisting moderators in online health communities”. J. Biomedical Informatics,vol. 46(6), pp. 998–1005, 2013
[11] Abbas A, Ali M, Khan MUS, Khan SU “Personalized healthcare cloud services for disease risk assessment and wellness management using social media”. Pervasive Mobile Comput. vol. 28, pp. 81–99, 2016
[12] Huang Y, Dong H, Yesha Y, Zhou S “A scalable system for community discovery in Twitter during Hurricane Sandy.” 14th IEEE/ACM Internat. Sympos. Cluster, Cloud Grid Computing (CCGrid) (IEEE, Chicago), pp.893–899, 2014
[13] Hu Y, Gao S, Janowicz K, Yu B, Li W, Prasad S “Extracting and understanding urban areas of interest using geotagged photos.” Computers, Environ. Urban Systems, vol. 54, pp. 240–254, 2015
[14] Frias-Martinez V, Frias-Martinez E “Spectral clustering for sensing urban land use using Twitter activity”. Engrg. Appl. Artificial Intelligence, vol. 35, pp. 237–245, 2014
[15] Vazquez S, Muñoz-García Ó, Campanella I, Poch M, Fisas B, Bel N, Andreu G, “A classification of user-generated content into consumer decision journey stages”. Neural Networks, vol. 58, pp. 68–81, 2014
[16] Vu TT, Chang S, Ha QT, Collier N, “An experiment in integrating sentiment features for tech stock prediction in Twitter”. Raghavan S, Ramakrishnan G, eds. Proc. Workshop Inform. Extraction Entity Analytics Soc. Media Data (COLING 2012 Organizing Committee, Mumbai, India), pp. 23–38, 2012
[17] Yan Z, Xing M, Zhang D, Ma B, “EXPRS: An extended pagerank method for product feature extraction from online consumer reviews. “Inform. Management, vol. 52(7), pp. 850–858, 2015
[18] Gal-Tzur A, Grant-Muller SM, Kuflik T, Minkov E, Nocera S, Shoor I, “The potential of social media in delivering transport policy goals.” Transport Policy, vol. 32, pp. 115–123, 2014
[19] Yoon S, Elhadad N, Bakken S,“A practical approach for content mining of Tweets”. Amer. J. Preventive Medicine, vol. 45(1), pp. 122–129, 2013
[20] Hong S, Nadler D, “Which candidates do the public discuss online in an election campaign? The use of social media by 2012 presidential candidates and its impact on candidate salience.” Government Inform. Quart., vol. 29(4), pp. 455–461, 2012
[21] Ye Q, Law R, Gu B, Chen W, “The influence of user-generated content on traveller behavior: An empirical investigation on the effects of e-word-of-mouth to hotel online bookings.” Comput. Human Behav. vol. 27(2), pp. 634–639, 2011
[22] Zhang Z, Ye Q, Song H, Liu T, “The structure of customer satisfaction with cruise-line services: An empirical investigation based on online word of mouth”. Current Issues Tourism, vol. 18(5), pp. 450–464,. 2015b
[23] Chae J, Thom D, Jang Y, Kim S, Ertl T, Ebert DS,“Public behavior response analysis in disaster events utilizing visual analytics of microblog data”. Comput. Graphics, vol. 38, pp. 51–60, 2014
[24] Zhang W, Li C, Ye Y, Li W, Ngai EW, “Dynamic business network analysis for correlated stock price movement prediction”. Intelligent Systems, IEEE, vol. 30(2), pp. 26–33, 2015a
[25] He W, Wu H, Yan G, Akula V, Shen J,“A novel social media competitive analytics framework with sentiment benchmarks”. Inform. Management, vol. 52(7), pp. 801–812, 2015
[26] Peterson RD, “To tweet or not to tweet: Exploring the determinants of early adoption of Twitter by House members” in the 111th Congress. Soc. Sci. J., vol. 49(4), pp. 430–438, 2012
[27] Bollen J, Mao H, Zeng X, “Twitter mood predicts the stock market.” J. Comput. Sci., vol. 2(1), pp. 1–8, 2011
[28] Oh C, Roumani Y, Nwankpa JK, Hu HF, “Beyond likes and Tweets: Consumer engagement behavior and movie box office in social media.“Inform. Management, vol. 54(1), pp. 25–37, 2016
[29] Jin J, Yan X, Li Y, Li Y,How users adopt healthcare information: An empirical study of an online Q&A community. Internat. J. Medical Informatics, vol. 86, pp. 91–103, 2016
[30] Jang HJ, Sim J, Lee Y, Kwon O,Deep sentiment analysis: Mining the causality between personality-value-attitude for analyzing business ads in social media. Expert Systems Appl., vol. 40(18): 7492–7503, 2013
[31] Sun G, Wu Y, Liu S, Peng TQ, Zhu JJ, Liang R, “EvoRiver: Visual analysis of topic coopetition on social media”. IEEE Trans. Visualization Comput. Graphics, vol.20(12), pp. 1753–1762, 2014
[32] Kim KS, Sin SCJ, “Use and evaluation of information from social media in the academic context: Analysis of gap between students and librarians”. J. Acad. Librarianship vol. 42(1), pp. 74–82, 2016
[33] Head AJ, Eisenberg MB, “Balancing act: How college students manage technology while in the library during crunch time”. Project Information Literacy Research Report, University of Washington Information School, Seattle, 2011
[34] Junco R, Heiberger G, Loken E,The effect of Twitter on college student engagement and grades. J. Comput. Assisted Learn. vol. 27(2), pp. 119–132, 2011
[35] Young CL,“Crowdsourcing the virtual reference interview with Twitter.” Reference Librarian, vol. 55(2), pp. 172–174, 2014
[36] R. M. Medina, ”Social network analysis: a case study of the Islamist terrorist network” Security Journal, vol. 27(1), pp. 97–121, 2014.
[37] S. Borau, and S. F. Wamba, ”Social Media, Evolutionary Psychology, and ISIS: A Literature Review and Future Research Directions”, In World Conference on Information Systems and Technologies, pp.143– 154, 2019
[38] J. Droogan, L. Waldek and R. Blackhall, ”Innovation and terror: an analysis of the use of social media by terror-related groups in the Asia Pacific”, Journal of Policing, Intelligence and Counter Terrorism, vol. 13:2, pp. 170–184, 2018
[39] A. Fisher, ”How jihadist networks maintain a persistent online presence”, Perspectives on terrorism, vol. 9(3), pp. 3-20, 2015
[40] J. Hutchinson, F. Martin and A. Sinpeng, ”Chasing ISIS: Network power, distributed ethics and responsible social media research”, Internet research ethics for the social Age: New challenges, cases, and contexts, pp. 57-73, 2017
[41] Online as the New Frontline: Affect, Gender, and ISIS-Take-Down on Social Media”,
[42] T. E. Nissen, ”Terror. com: ISs social media warfare in Syria and Iraq”, Contemporary Conflicts, vol. 2(2), pp. 2–8. 2014
[43] H. N. Teodorescu, ”Using analytics and social media for monitoring and mitigation of social disasters”, Procedia Engineering, vol. 107, pp. 325–334, 2015
[44] D. Pohl, A. Bouchachia, and H. Hellwagner, ”Online indexing and clustering of social media data for emergency management”, Neurocomputing, vol. 172, pp. 168–179, 2016
[45] K. Aal, M. Krger, M. Rohde, B. Tadic, and V. Wulf, ”Social Media and ICT Usage in Conflicts Areas”, In Information Technology for Peace and Security, pp. 383-401, 2019
[46] Tom´as Baviera, Alvar Peris, and Lorena Cano-Or´on. Political candidates in ` infotainment programmes and their emotional effects on twitter: an analysis of the 2015 spanish general elections pre-campaign season. Contemporary Social Science, vol. 14(1):144–156, 2019.
[47] Robin Effing, Jos van Hillegersberg, and Theo Huibers. Social media indicator and local elections in the netherlands: towards a framework for evaluating the influence of twitter, youtube, and facebook. In Social media and local governments, pages 281–298. Springer, 2016.
[48] Marko Skoric, Nathaniel Poor, Palakorn Achananuparp, Ee-Peng Lim, and Jing Jiang. “Tweets and votes: A study of the 2011 singapore general election.” In 2012 45th Hawaii international conference on system sciences, pp. 2583–2591. IEEE, 2012.
[49] Min Song, Meen Chul Kim, and Yoo Kyung Jeong. “Analyzing the political landscape of 2012 korean presidential election in twitter.” IEEE Intelligent Systems, vol. 29(2), pp. 18–26, 2014.
[50] Marina Bagi´c Babac and Vedran Podobnik. “What social media activities reveal about election results? the use of facebook during the 2015 general election campaign in croatia”. Information Technology & People, vol. 31(2), pp. 327–347, 2018.
[51] Tariq Mahmood, Tasmiyah Iqbal, Farnaz Amin, Wajeeta Lohanna, and Atika Mustafa. “Mining twitter big data to predict 2013 pakistan election winner”. In INMIC, pp. 49–54. IEEE, 2013.
Citation
P. N. Jain, N. V. Alone, "Importance of Social Media Analytics During Elections: A Review", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.453-458, 2019.
Security Enhancement Using pre-authentication and Proxy re-encryption
Review Paper | Journal Paper
Vol.07 , Issue.14 , pp.459-462, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.459462
Abstract
Cloud computing on its own is a technology, arming many services with its resources on the internet, when we speak about big data context, as we have witnessed massive growth in the use of internet that indeed has increased the demand for greater storage capacities where now MB’s and GB’s are small talks in the fields of storage. When we talk about the cloud storage there are privacy and security concerns that we need to work upon for which as of in this paper we propose and use techniques such as pre-authentication, encryption and de- encryption policies. The pre-authentication and proxy re-encryption mechanisms combine the advantages of proxy conditional re-encryption multi-sharing mechanism It can simply be termed as privacy preserving approach to increase security of data on cloud.
Key-Words / Index Term
Privacy, pre-authentication, big data
References
[1]X. Liu, X. Xie, K. Li, B. Xiao, J. Wu, H. Qi, and D. Lu, “Fast tracking the population of key tags in large-scale anonymous rfidsystems,”IEEE/ACM Transactions on Networking, vol. 25, no. 1, pp. 278–291,2017.
[2]H. J. Benaloh, M. Chase and K. Lauter, “Patient controlled encryption: Ensuring privacy of electronic medical records” ACM Cloud Computing Security Workshop, pp. 103114, 2009.
[3]M.Green and G.Ateniese, “Identity based proxy re-encryption” Applied Cryptography and Network Security, vol. 4521, pp. 288-306, 2007.
[4]K. Wang, J. Mi, C. Xu, Q. Zhu, L. Shu, and D. J. Deng, “Real-time load reduction in multimedia big data for mobile Internet,”ACM Transactions on Multimedia Computing, Communications and Applications, vol. 12, no. 5s, Article 76, Oct 2016.
[5]Joseph K. Liu, Kaitai Liang, Willy Susilo, “Privacy- Preserving Ciphertext Multi-Sharing Control for Big Data Storage”, August 2015 • IEEE Transactions on Information Forensics and Security.
[6]K. Wang, Y. Shao, L. Shu, Y. Zhang, and C. Zhu, “Mobile big data fault-tolerant processing for ehealth networks,” IEEE Network, vol. 30, no. 1, pp. 1–7, Jan 2017.
[7]W. S. K. Liang and J. Liu, “Privacy-preserving ciphertext multi-sharing control for big data storage,” IEEE Transaction on Information Forensics and Security, vol. 10, no. 8, Aug 2015.
[8]P. L. J. Shao and Y. Zhou, “Achieving key privacy without losing 972CCA security in proxy re- encryption,” J. Syst. Softw., vol. 85, no. 3, 973pp. 655– 665, 2011.
[9] W. S. K. Liang and J. Liu, “Privacy-preserving ciphertext multi-sharing control for big data storage,”
IEEE Trans. Inform. ForensicsSecurity, vol. 10, no. 8, pp. 1578–1589, Aug. 2015.
[10] P. Druschel and A. Rowstron,PAST: A Large- Scale, Persistent Peer-to-Peer Storage Utility, Proc.Eighth Workshop Hot Topics in Operating System, 2001, pp. 75-80.
[11] Markus Jakobsson, On quorum controlled asymmetric proxy re-encryption, In Proceedings of Public Key Cryptography, pages 112-121, 1999.
[12] Lidong Zhou, Michael A. Marsh, Fred B. Schneider, and Anna Redz, Distributed blinding for ElGamal re- encryption,Cornell Computer Science Department, 2004.
Citation
Sushma A, Sonisha S, M S Soumya Sree, Pooja M.S, Deekshitha G H, "Security Enhancement Using pre-authentication and Proxy re-encryption", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.459-462, 2019.
Camouflage Surveillance Robot
Review Paper | Journal Paper
Vol.07 , Issue.14 , pp.463-465, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.463465
Abstract
These days, numerous costs are made in the field of protection in embracing crude safety efforts to shield the edge of the city from the people who wish to enter without authorization. Most of the military associations rely on a robot inthe hazard inclined regions which is difficult to achieve with armed force personnel. The existing Army robots are highly limited in scope with the audio/video, sensors, and metal identifier. The primary goal of our work is to disguise the robot including few add on parameters like Bluetooth for ongoing information handled by the visualization and PIR sensor to follow the interlopers. In this manner the proposed framework utilizing Bluetooth reduces the chances of any careless mistakes and assures the security from the threats posed by the enemy.
Key-Words / Index Term
Bluetooth Module, Army Robot, PIR Sensor, Wireless Camera and Colour sensor
References
[1] Premkumar .M “Unmanned Multi-Functional RobotUsing Zigbee Adopter Network For DefenseApplication” International Journal of Advanced Research in
Computer Engineering & Technology (IJARCET)Volume 2, Issue 1, January 2013.
[2] Akash Ravindran and AkshayPremkumar “Camoflage
Technology”International Journal of Emerging Technology in
Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 8 Issue 1 –APRIL 2014.
[3] George Bekey,” Autonomous Robots: From Biological Inspiration toImplementation and Control”, MIT Press, Cambridge, MA, 2005.Mr. M. Arun Kumar, Mrs. M. Sharmila ”Wireless Multi AxisROBOT for Multi-Purpose Operations”, Department of ECE,
SVCET & JNT University Anantapur, India.
[4] Robotic Systems Joint Project Office- Unmanned Ground SystemsRoadmap by Materiel Decision Authority (MDA):Macro USA,McClellan, CA, February2012.
Citation
Sudhindra O.S, Sughosh. G, Sai Prakash Reddy, Yash Sokalla, Bindushree D.C, "Camouflage Surveillance Robot", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.463-465, 2019.
REVA University Campus Tour using Virtual Reality
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.466-470, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.466470
Abstract
Stepping into the magical world of Virtual Reality gifts an experience unlike any other. All around us all things are bright and beautiful. By this state-of-the-art work, we aim to give our users/stakeholders/visitors the experience of visiting the REVA University campus virtually, from any place at any desired time. We would be able to achieve this by a Head Mounted Display (HMD), here we used the VR Box. Once the user wears the VR Box, on it will be mounted a display which is the key tool in transporting the user virtually to the campus. It will make you feel like you are there mentally and physically. When you turn your head, you can able to see the 360-degree world turns with you, so the illusion created by whatever world you are in is never lost. There are several types of virtual reality from fully-immersive and non-immersive to collaborative and web-based. Here, we have used the fully-immersive variation because this is the explorable and interactive 3D computer-created world that can take you around the campus. The user will be able to experience Virtual Reality tour with a full satisfaction of having visited the REVA University without having to physically walk around the entire campus.
Key-Words / Index Term
REVA University, Virtual Reality, Unity, VR Headset
References
[1] R. F. Rahmat, Anthonius, M. A. Muchtar, A. Hizriadi and M. F. Syahputra, “Virtual reality interactive media for universitas sumatera utara – a campus introduction and simulation”, Journal of Physics: Conf. Series (2nd International Conference on Computing and Applied Informatics), doi: 10.1088/1742-6596/978/1/012101, 2018.
[2] https://www.youvisit.com/collegesearch/
[3] https://insights.samsung.com/2016/01/19/virtual-reality-tours-can-help-every-student-pick-the-right-college/
[4] https://concept3d.com/
[5] https://unity3d.com/unity/features/multiplatform/vr-ar
Citation
Lipika Sreedharan, M. Sneha, Lisha Kamala K, Jennifer Susa Sen, Kiran M., "REVA University Campus Tour using Virtual Reality", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.466-470, 2019.
Illusion Pin: Authentication Using Zero Knowledge Protocol
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.471-473, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.471473
Abstract
we have used Illusion PIN(IPIN) to solve the problems regarding shoulder_surfing attacks on authentication schemes.PIN -based authentication are practically used on touch screen devices. PIN works on the principle technique of hybrid images.The hybrid images are been merged to keypads. These keypads are ordered to different digits.Thus,making the user to see the device and enter the password whereas the attacker would see another password as the attacker is not as close as the user.The keypads are been shuffled to avoid further attacks,if the attacker is able to remember the position of the keypads.To increase the reliability and security of illusion pin,we worked on algorithm based on human visual perception and calculatimg the minimum distance from attacker and the user.We evaluated our calculations with 84 simulated shoulder-surfing attacks that were obtained from 21 different people.All of the 84 attacks were unsuccessful and we evaluated the minimum distance that a camera cannot capture the necessary data from use’s keypad.. According to our analysis,surveillance camera were not able to capture the PIN of a touchscreen user when Illusion PIN is used.
Key-Words / Index Term
PIN, touch creen devices, Analysis surveillance
References
[1] Stajano, “The quest to replace passwords: was written by J. Bonneau, C. Herley, P. C. Van Oorschot, and F. Stajano,
[2] M. Harbach, A. De Luca, and S. Egelman, “The anatomy of smartphone unlocking,”
[3] J. Bonneau, S. Preibusch, and R. Anderson, “A birthday present every eleven wallets? the security of customer-chosen banking pins.”
[4] A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, “Smudge attacks on smartphone touch screens.”
[5] A. Oliva, A. Torralba, and P. G. Schyns, “Hybrid images,” ACM Transactions on Graphics (TOG)
[6] D. Kim, P. Dunphy, P. Briggs, J. Hook, J. W. Nicholson, J. Nicholson, and P. Olivier, “Multi-touch authentication on tabletops.”
[7] L.-W. Chan, T.-T. Hu, J.-Y. Lin, Y.-P. Hung, and J. Hsu, “On top of tabletop: A virtual touch panel display,”
[8] W. Matusik, C. Forlines, and H. Pfister, “Multiview user interfaces with an automultiscopic display,”
[9] C. Harrison and S. E. Hudson, “A new angle on cheap lcds: making positive use of optical distortion,”
[10] S. Kim, X. Cao, H. Zhang, and D. Tan, “Enabling concurrent dual views on common lcd screens,”
[11] E. Hayashi, R. Dhamija, N. Christin, and A. Perrig, “Use your illusion: secure authentication usable anywhere,”
[12] I. Jermyn, A. J. Mayer, F. Monrose, M. K. Reiter, A. D. Rubin et al., “The design and analysis of graphical passwords.”
[13] N. H. Zakaria, D. Griffiths, S. Brostoff, and J. Yan, “Shoulder surfing defence for recall-based graphical passwords,”
[14] D. S. Tan, P. Keyani, and M. Czerwinski, “Spy-resistant keyboard: Towards more secure password entry on publicly observable touch screens,”
[15] V. Roth, K. Richter, and R. Freidinger, “A pin-entry method resilient against shoulder surfing,”
Citation
Soubhagyalaxmi V Nerabenchi, Sanjana B, Shaik ajith, Siddalinga Navadagi, "Illusion Pin: Authentication Using Zero Knowledge Protocol", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.471-473, 2019.
Proactive Web Security
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.474-478, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.474478
Abstract
Key benefit of this paper is to provide solution to reduce the time gap between the attacker to compromise the organization and organization to detect it has been compromised. It can be done through real time monitoring the organization data activities. These activities can be from the network assets such as firewall, servers, active directory, IPS, IDS, etc. Studies show that on an average this time gap will be 4 to 6 months, by this time the attacker would have caused severe potential damage to the enterprise which might bring us huge financial loss, confidential data might be breached. To Proactively protect enterprises from such threats It is necessary to have a security operational center which helps organization in real-time monitoring and proactive analysis.
Key-Words / Index Term
Splunk, system logs, correlation, CSV-comma separated values
References
[1]K.SANKARI,R.LAVANYA,S.AMALAGRACY “Real Time Monitoring System Using Splunk” IJCSMC, Vol. 4, Issue. 3, March 2015, pg.434 – 441, pp. ISSN 2320–088X
[2] KAVITA AGRAWAL1, READER HEMANT MAKWANA “Data Analysis and Reporting using
Different Log Management Tools” IJCSMC, Vol. 4, Issue. 7, July 2015, pg.224 – 229 pp. ISSN 2320–088X
[3]Harikrishnan V N, Gireesh Kumar T “Advanced Persistent Threat Analysis using
Splunk” Volume 118 No. 20 2018, 3761-3768
[4] Aron Warren “Setting up Splunk for Event Correlation in Your Home Lab” Accepted : SANS Institute Information Security Reading Room on November 19th 2013 ((GCIA) Gold Certification).
[5] Igino Corona, Giorgio Giacinto “Detection of Server-side Web Attacks” JMLR: Workshop and Conference Proceedings 11 (2010) 160–166.
[6] William Geiger “Proactively Guarding Against Unknown Web Server Attacks” Accepted: SANS Institute Information Security Reading Room on 2001.
[7] Kavita Agrawal, Hemant Makwana “A Study on Critical Capabilities for Security Information and Event Management” International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438.
[8] S.Padmaja , Dr.Ananthi Sheshasaayee “Web Server Logs To Analyzing User Behavior Using Log Analyzer Tool” International Journal of Advance Research In Science And Engineering http://www.ijarse.com IJARSE, Vol. No.3, Special Issue (01), September 2014 ISSN-2319-8354(E).
[9] Varsha R Mouli, KP Jevitha “Web Services Attacks and Security- A Systematic Literature Review” 6th International Conference On Advances In Computing & Communications, ICACC 2016, 6-8 September 2016, Cochin, India.
[10] L.K. Joshila Grace, V.Maheswari, Dhinaharan Nagamalai “Analysis Of Web Logs And Web User In Web Mining ” International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011.
Citation
Venu S N, Shilpa N R, Krishna Badiger, "Proactive Web Security", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.474-478, 2019.