ECG Signal Feature Extraction and Classification: Survey
Survey Paper | Journal Paper
Vol.07 , Issue.07 , pp.1-6, Mar-2019
Abstract
Nowadays due to busy and hectic lifestyle, many people cannot pay enough attention to their health. Stress, junk food, obesity, smoking and lack of exercise leads to heart diseases. It is one of major cause leading rise to death rate. ECG (Electrocardiogram) is the best and easiest way to record and analyze the electrical and muscular activities of heart. Due to nonlinearity and complexity of ECG signals, it requires significant amount of training to analyze and study the ECG waveform. For preventive measures and predictive analysis, it is necessary to analyze these waveforms in faster, efficient way and in real time too. Number of methods and techniques have been developed in recent time. Different techniques and methodologies are discussed in this literature review.
Key-Words / Index Term
ECG Signal, Arrhythmia, Feature Extraction, Feature Selection
References
[1] Venkatesan, C., P. Karthigaikumar, Anand Paul, S. Satheeskumaran, and R. Kumar. ”ECG Signal Preprocessing and SVM Classifier-Based Abnormality Detection in Remote Healthcare Applications.” IEEE Access 6 (2018): 9767-9773
[2] Li, Qiao, Cadathur Rajagopalan, and Gari D. Clifford. ”Ventricular fibrillation and tachycardia classification using a machine learning approach.” IEEE Transactions on Biomedical Engineering 61, no. 6 (2014): 1607-1613
[3] Hammad, Mohamed, Asmaa Maher, Kuanquan Wang, Feng Jiang, and Moussa Amrani. ”Detection of abnormal heart conditions based on characteristics of ECG signals.” Measurement 125 (2018): 634-644
[4] Alonso-Atienza, Felipe, Eduardo Morgado, Lorena Fernandez-Martinez, Arcadi Garc´ıa-Alberola, and Jos´e Luis Rojo-Alvarez. ”Detection of life-threatening arrhythmias using feature selection and support vector machines.” IEEE Trans. Biomed. Eng 61, no. 3 (2014): 832-840
[5] Xia, Yufa, Huailing Zhang, Lin Xu, Zhifan Gao, Heye Zhang, Huafeng Liu, and Shuo Li. ”An automatic cardiac arrhythmia classification system with wearable electrocardiogram.” IEEE Access 6 (2018): 16529-16538
[6] http://www.ni.com/data-acquisition/what-is/
[7] Chouhan, V. S., and Sarabjeet Singh Mehta. ”Total removal of baseline drift from ECG signal.” In Computing: Theory and Applications, 2007. ICCTA’07. International Conference on, pp. 512-515. IEEE, 2007.
[8] https://www.physionet.org/physiotools/wag/ecgpuw-1.htm
[9] Zhang, Xu-Sheng, Yi-Sheng Zhu, Nitish V. Thakor, and Zhi-Zhong Wang. ”Detecting ventricular tachycardia and fibrillation by complexity measure.” IEEE Transactions on biomedical engineering 46, no. 5 (1999): 548-555
[10] Kuo, S. ”Computer detection of ventricular fibrillation.” Proc. of Computers in Cardiology, IEEE Comupter Society (1978): 347-349
[11] Barro, S., R. Ruiz, D. Cabello, and J. Mira. ”Algorithmic sequential decision-making in the frequency domain for life threatening ventricular arrhythmias and imitative artefacts: a diagnostic system.” Journal of biomedical engineering 11, no. 4 (1989): 320-328
[12] Amann, Anton, Robert Tratnig, and Karl Unterkofler. ”Detecting ventricular fibrillation by time-delay methods.” IEEE Transactions on Biomedical Engineering 54, no. 1 (2007): 174-177
[13] Jekova, Irena, and Vessela Krasteva. ”Real time detection of ventricular fibrillation and tachycardia.” Physiological measurement 25, no. 5 (2004): 1167
[14] Jekova, Irena. ”Shock advisory tool: Detection of life-threatening cardiac arrhythmias and shock success prediction by means of a common parameter set.” Biomedical Signal Processing and Control 2, no. 1 (2007): 25-33
[15] Li, Qiao, Roger G. Mark, and Gari D. Clifford. ”Robust heart rate estimation from multiple asynchronous noisy sources using signal quality indices and a Kalman filter.” Physiological measurement 29, no. 1 (2007): 15
[16] Thakor, Nitish V., Y-S. Zhu, and K-Y. Pan. ”Ventricular tachycardia and fibrillation detection by a sequential hypothesis testing algorithm.” IEEE Transactions on Biomedical Engineering 37, no. 9 (1990): 837-843
[17] Arafat, Muhammad Abdullah, Abdul Wadud Chowdhury, and Md Kamrul Hasan. ”A simple time domain algorithm for the detection of ventricular fibrillation in electrocardiogram.” Signal, Image and Video Processing 5, no. 1 (2011): 1-10
[18] Amann, Anton, Robert Tratnig, and Karl Unterkofler. ”Reliability of old and new ventricular fibrillation detection algorithms for automated external defibrillators.” Biomedical engineering online 4, no. 1 (2005): 60
[19] Anas, Emran M. Abu, Soo Y. Lee, and Md K. Hasan. ”Sequential algorithm for life threatening cardiac pathologies detection based on mean signal strength and EMD functions.” Biomedical engineering online 9, no. 1 (2010): 43
[20] Dzwonczyk, Roger, Charles G. Brown, and Howard A. Werman. ”The median frequency of the ECG during ventricular fibrillation: its use in an algorithm for estimating the duration of cardiac arrest.” IEEE Transactions on Biomedical Engineering 37, no. 6 (1990): 640-646
[21] Zhang, Xu-Sheng, Yi-Sheng Zhu, Nitish V. Thakor, and Zhi-Zhong Wang. ”Detecting ventricular tachycardia and fibrillation by complexity measure.” IEEE Transactions on biomedical engineering 46, no. 5 (1999): 548-555
[22] Amann, Anton, Robert Tratnig, and Karl Unterkofler. ”A new ventricular fibrillation detection algorithm for automated external defibrillators.” database 1, no. 2 (2005): 3
[23] Li, Haiyan, Wenguang Han, Chao Hu, and Max Q-H. Meng. ”Detecting ventricular fibrillation by fast algorithm of dynamic sample entropy.” In Robotics and Biomimetics (ROBIO), 2009 IEEE International Conference on, pp. 1105-1110. IEEE, 2009
Citation
Bhagyashri Bhirud, Vinod Pachghare, "ECG Signal Feature Extraction and Classification: Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.1-6, 2019.
A Study of Machine Learning and IoT in Manufacturing industries
Survey Paper | Journal Paper
Vol.07 , Issue.07 , pp.7-11, Mar-2019
Abstract
The last decade has witnessed a shift in manufacturing processes from basic automation and event control to smart systems that create virtual blueprint which is transformed into real-world product. This transformation, dubbed as Industry 4.0 is an optimization of the practices which took place previously in the industries. The driving force behind this revolution has been machine learning and Internet of Things (IoT). Internet of Things is a term for devices that have the capability to connect and collaborate amongst themselves to minimize human intervention. In order to further enhance this connectivity, machine learning techniques are being implemented, that enable decision making through data analysis. This paper aims to demonstrate the use of these techniques in the manufacturing industry in the context of Industry 4.0. It will also shed light upon some of the upcoming applications of the same, including intelligently forecasting the estimated demand, detecting the anomalies within the product, optimizing manufacturing processes and securing the entire framework. The future use cases of this technology will be addressed in this paper.
Key-Words / Index Term
Machine Learning, Internet of Things, Industry 4.0, Manufacturing, Data Analytics
References
[1] S.K. Bose, B. Kar, M. Roy, P.K. Gopalakrishnan, A. Basu, "ADEPOS: Anomaly Detection based Power Saving for Predictive Maintenance using Edge Computing." arXiv preprint arXiv: 1811.00873, 2018.
[2] M. Haselmann, D.P. Gruber, P. Tabatabai, "Anomaly Detection using Deep Learning based Image Completion." arXiv preprint arXiv:1811.06861, 2018.
[3] S. Han, T. Gong, M. Nixon, E. Rotvold, K.Y. Lam, K. Ramamritham. “RT-DAP: A Real-Time Data Analytics Platform for Large-scale Industrial Process Monitoring and Control.” arXiv preprint arXiv: 1802.07855, 2018.
[4] G. Li, X. Yang, D. Chen, A. Song, Y. Fang, J. Zhou, “Tool Breakage Detection using Deep Learning” arXiv:1808.05347, 2018.
[5] J. Canedo, A. Skjellum, “Using machine learning to secure IoT systems”, 14th Annual Conference on Privacy, Security and Trust (PST), 2016.
[6] R.B. Shetty, "Predictive Maintenance in the IoT Era." Prognostics and Health Management of Electronics: Fundamentals, Machine Learning, and the Internet of Things, 2018.
[7] A. Kanawaday, A. Sane, "Machine learning for predictive maintenance of industrial machines using IoT sensor data." Software Engineering and Service Science (ICSESS), 8th IEEE International Conference on. IEEE, 2017.
[8] S. Iizuka, E. Simo-Serra, and H. Ishikawa, “Globally and locally consistent image completion,” ACM Transactions on Graphics, vol. 36, no. 4, pp. 1–14, 2017.
[9] J. Yu, Z. Lin, J. Yang, X. Shen, X. Lu, and T. S. Huang, “Generative image inpainting with contextual attention.”, arXiv preprint, 2018.
Citation
R.R. Gore, J.D. Patil, "A Study of Machine Learning and IoT in Manufacturing industries", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.7-11, 2019.
Entrizee- A QR based Digital Gate Security Management System
Survey Paper | Journal Paper
Vol.07 , Issue.07 , pp.12-17, Mar-2019
Abstract
Security management systems in colleges, flats and gated communities have forever been supportedarchaic pen and paper system. Security guards pay most of their time in holding the records. Entrizee is an intelligentSecurity Management for Gated Premises that automates and computerizes manual tasks at the main gate(s). This system will be designed to maximize the security by providing an app to assist in entering the details of the user, keeping the records and perform analytics on it, which would otherwise have to be performed manually. Remaining straightforward to grasp and use, the system will meet the user’s expectations of minimizing the time required at the gates for physically entering all the details. It would also help the gatekeepers to keep a track of the people who are coming or leaving the premises after a certain specified time duration and take actions on them accordingly.
Key-Words / Index Term
Security, Blockchain, SHA-256, Apriori algorithm
References
[1] Sonam Khedkar1, Swapnil Thube2, “Real Time Databases for Applications”, International Research Journal of Engineering and Technology (IRJET),June -2017
[2] Navdeep Singh, “Study of Google Firebase API for Android”, International Journal of Innovative Research in Computer and Communication Engineering, September 2016
[3] Nivedan Bhardwaj, Ritesh Kumar, RupaliVerma, Alka Jindal and Amol P. Bhondekar, “Decoding Algorithm for color QR code:A Mobile Scanner Application”,2016 Fifth International Conference on recent trends in information technology
[4] Tien Tuan AnhDinh, Rui Liu , Meihui Zhang , Gang Chen, Beng Chin Ooi, Ji Wang , “Untangling Blockchain: A Data Processing View of Blockchain Systems”, IEEE transactions on Knowledge and Data Engineering
[5]FlorentChabaud and Antoine Joux.Differential,”Collisions in SHA-0.”, Springer1998
[6] Libing Wu, Kui Gong, Yanxiang He, XiaohuaGe, Jianqun Cui, “A Study of Improving Apriori Algorithm”, National Natural Science Foundation of China.
[7]Shilpa,SunitaParasher, “ Performance Analysis of Apriori Algorithm with Progressive Approach for Mining Data”,International Journal of computer applications, October 2011.
[8] Xiaomei Yu, Hong Wang, Xiangwei Zheng, “New Adaptions for classification algorithm for mining frequent itemsets from uncertain data”, IEEE
[9] Yongmei Liu and Yong Guan, “FP-Growth Algorithm for Application in Research of Market Basket Analysis”, IEEE 2008
[10] lugendraDongre, GendLalPrajapati,“The Role of Apriori Algorithm for Finding the Association Rules in Data Mining”,IEEE 2014
[11] HendraGunawan,Evizal Abdul Kadir,“Integration Protocol Student AcademicInformation to Campus RFID Gate Pass System”,IEEE 2017.
[12] HE Yaru,JIANGYingzi,“ The design and implementation of residential parking spaces management and information issuing system”,2013 Fourth International Conference on Digital Manufacturing & Automation
[13] Ryan Ercel O. Paderes, “A Comparative Review of Biometric Security Systems”, 2015 8th International Conference on Bio-Science and Bio-Technology.
Citation
Ashwini Jarali, Snehal Kodilkar, Shubam Tondare, Ganesh Kudale, Siddharth Patel, "Entrizee- A QR based Digital Gate Security Management System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.12-17, 2019.
A Survey on Data Analytics for Personification using Machine Learning
Survey Paper | Journal Paper
Vol.07 , Issue.07 , pp.18-21, Mar-2019
Abstract
With proliferation of the internet based media application; like SMS, video messaging, has resulted in a surge of data sharing. Applications like WhatsApp, Facebook, attracted large number of users because of easy chat conversations. WhatsApp is also used in small-scale industries for business purpose where user can write message is any language, in short form and understanding the context in chat is very important. There is no standard text which can be conventional machine understandable. Categorization can form personification; but there is lack of support to interpretation the content in the text messages with direct and indirect meaning. Map reduce framework can be used for transliteration process with frequent term visualization. Also messages can be with intuitive background where safety features are required to focus. Hence in this paper a survey for personification of embedded media data through the confluence of embedded media data analytic and machine learning techniques is proposed.
Key-Words / Index Term
Machine Learning, Personification, Safety
References
[1] M. Krishnakumar,"Future Apparel Buying Intention : Mediating Effect of Past Apparel Buying Behaviour and Experience.", SAGE publications, Vol: 19, issue: 3, pp. 737-755 2018.
[2] Jun Liu,et.al.,"Skeleton Based Human Action Recognition with Global Context Aware Attention LSTM Networks", IEEE Trans., Vol: 27, Issue: 4, pp. 1586 – 1599, 2018.
[3] Moses L. Gadebe and Okuthe P. Kogeda, “Personification of Bag.of.features Dataset for Real Time Activity Recognition”, IEEE, 2016.
[4] Francesco Musumeci, et.al.,"A Survey on Application of Machine Learning Techniques in Optical Networks", April 2018.
[5] Rizky Septiani, et.al.,"Factors that Affecting Behavioral Intention in Online Transportation Service",Elsevier, Vol. 124, pp. 504-512, 2017.
[6] 18Stefanos Doltsinis, et.al.,"A Symbiotic Human ML Approach for Production Ramp-up",IEEE Trans. Vol. 48, No. 3, pp. 229-240, 2017.
[7] Aravind Kota Gopalakrishna et.al.,“Evaluating ML algorithms for applications with humans in the loop” IEEE 14th International Conf. on Networking, Sensing and Control (ICNSC) 2017.
[8] Namit Juneja, Rajesh Kumar,"Generating Analytic Insights on Human behavior using Image Processing",I2C2, pp.1-7, 2017.
[9] Mingqi Lv et.al , “BiView SemiSupervised Learning Based Semantic Human Activity Recognition Using Accelerometers”, IEEE Trans. on Mobile Computing, Vol: 17, Issue: 9, pp.1991-2001, 2018.
[10] Zhanxiang Feng et.al.,“Learning View Specific Deep Networks for Person ReIdentification”, IEEE Tras. on Image Processing, pp. 99, March 2018.
[11] Xiantong Zhen, et.al.,"Supervised Local Descriptor Learning for Human Action Recognition", IEEE Trans., Vol: 28, Issue:9, pp.2035 – 2047, 2017.
[12] Aasia Ali, et.al.,"Content Based Image Retrieval using Feature Extraction with Machine Learning",IEEE, ICICCS, Madurai, 2017.
[13] Krasimir Tonchev et.al.,“Digitizing human behavior in business model innovation”, IEEE Conf. on wireless, Cape Town, South Africa, 2018
[14] Xinbo Yu et.al., “Neural control for constrained human-robot interaction with human motion intention estimation and impedance learning”, IEEE CAC, 2018
[15] S. Rajagopalan, USA, “Product Personification: Parag Model to Successful Product Development”, jmvsc. Vol. 6, No. 1, pp.1-12, March 2015.
[16] Zhanxiang Feng, et.al.,"Learning View-Specific Deep Networks for Person ReIdentification",IEEE Trans., pp. 1-12, 2018.
[17] A. Shahroudy et.al, “Deep multimodal feature analysis for action recognition in rgb+ d videos,” IEEE Tran. On Patt. Analysis and Machine Intelligence, April 2017.
[18] Julio Cesar dos Reis, “Recognizing Intentions in Free Text Messages: Studies with Portuguese Language”, IEEE 26th ICET : Infrastructure for Collaborative Enterprises (WETICE), pp.302-307, 2017
Citation
Prema P. Gawade, "A Survey on Data Analytics for Personification using Machine Learning", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.18-21, 2019.
Hybrid Recommendation Engine with Web Scraping and Sentiment Analysis
Research Paper | Journal Paper
Vol.07 , Issue.07 , pp.22-31, Mar-2019
Abstract
In recent years a lot of data has been generated owing to the exponential increase in internet usage. People are overloaded with information, spanning over multiple domains. This helps people obtain knowledge and come to informed decisions. If we consider purchasing a product as a use case, the buyer can visit multiple websites to find strengths and weaknesses of the product as well as the opinions of other purchasers. To make this process easier and faster for the buyer we propose a robust and scalable hybrid recommendation system which is implemented as a combination of Content Based Recommendation System and Collaborative Filtering Techniques. As a test case, this system has been used to help purchase smartphones based on all features and sentiments of previous purchasers. System gets data using a self-learning web crawler that gathers data from a number of relevant websites irrespective of their different structures. The sentiments of users who purchased the same items previously have also been analyzed to aid the current buyers’ decisions. In this paper, we have provided detailed survey and comparison of multiple techniques we reviewed before implementing each module.
Key-Words / Index Term
Artificial intelligence, Decision support systems, Knowledge based systems, Hybrid intelligence systems, Data Mining, Web Mining, Supervised Learning, Recommender systems, Content based retrieval, Information retrieval, Clustering algorithms, Classification algorithms, Natural language processing, Sentiment analysis, Recurrent Neural Networks.
References
[1] P. Srinivasan,F. Menczer, G. Pant“A General Evaluation Framework for Topical Crawlers”, 2004.
[2] Ziyan Zhou and Muntasir Mashuq, “Web Content Extraction Through Machine Learning”, Stanford University.
[3] Amit Gupte, Sourabh Joshi, Pratik Gadgul, Akshay Kadam, “Comparative Study of Classification Algorithms used in Sentiment Analysis”, 2014.
[4] Yun Y., Hooshyar D., Jo J., Lim H., “Developing a hybrid collaborative filtering recommendation system with opinion mining on purchase review.”, 2017.
[5] Wenxian Wang, Xingshu Chen, Yongbin Zou, “A Focused Crawler Based on Naive Bayes Classifier”, Third International Symposium on Intelligent Information Technology and Security Informatics, 2010.
[6] Duygu Taylan, Mitat Poyraz, Selim Akyokuş, Murat Can Ganiz, “Intelligent Focused Crawler: Learning which Links to Crawl”, IEEE, 2011.
[7] Youngki Park, Sungchan Park, Sang-goo Lee, “Fast Collaborative Filtering with a k- Nearest Neighbor Graph”, Journal of Machine Learning Research, 2014.
[8] Claudio Adrian Levinas., “An Analysis of Memory Based Collaborative Filtering Recommender Systems with Improvement Proposals”, 2014.
[9] Koji Miyahara†, Michael J. Pazzani, “Improvement of Collaborative Filtering with the Simple Bayesian Classifier”, 2013.
[10] J. Herlocker, J. A. Konstan, J. Riedl,“An Empirical Analysis of Design Choices in Neighborhood-Based Collaborative Filtering Algorithms”, Information Retrieval, Vol 5, Issue 4, 2002.
[11] Smyth B, “Case-Based Recommendation”, The Adaptive Web. Lecture Notes in Computer Science, Vol. 4321, Springer, Berlin, 2007.
[12] Dima S. Mahmoud, Robert I. John, “Enhanced Content-based Filtering Algorithm using Artificial Bee Colony Optimisation”, SAI Intelligent Systems Conference, London, 2015.
[13] Shivaprasad T K, J. Shetty, “Sentiment Analysis of Product Reviews:A Review”, 2017.
[14] Suiki Li, “Sentiment analysis on Amazon Unlocked mobile phones”, 2017.
[15] Doaa Mohey, El-Din, “Enhancement Bag-of-Words Model for Solving the Challenges of Sentiment Analysis”, 2016.
[16] Xin Rong, “word2vec Parameter Learning Explained”, 2016.
[17] H. Palangi, Li Deng, Y. Shen, J. Gao, Xiaod, “Deep Sentence Embedding Using Long Short-Term Memory Networks: Analysis and Application to Information Retrieval”, 2016.
Citation
N. Sontakke, Sabarinath S, S. Sangamnerkar, V. Iyer, "Hybrid Recommendation Engine with Web Scraping and Sentiment Analysis", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.22-31, 2019.
Prevasive Healthcare and Machine Learning Algorithms
Survey Paper | Journal Paper
Vol.07 , Issue.07 , pp.32-36, Mar-2019
Abstract
In Healthcare, prevention and cure have seen diverse advancement in technological schema. Chronic care and prevention care both stand on equal level with the same advancement in technology. We propose PREVASIVE method towards healthcare diagnosis. The word ‘EVASIVE’ means ‘something which is intended to come’. The prosing word ‘PERVASIVE’ is to mean prevention against the one which is intended to come. In medical history, technology contributes towards diagnosis through machine learning algorithms. Machine learning algorithms are also applied for prediction towards prevention of various diseases and this in course help for cure for specific disease. We propose diagnosis of health through inheritance traits and surroundings the person inhibits from. For knowledge, inheritance traits, history of the person is collected as PHR (Personal Health Record). The GPS (Global Positioning System) module is used to see where the person inhibits. Location and movement of person is taken into consideration to know if the region has the history of any specific diseases’ and GPS module applied with appropriate machine learning algorithms can help us determine diagnosis for diseases which are intended to come towards the specific person.
Key-Words / Index Term
Machine learning algorithm,PHR,Healthcare,dengue,swine flu,heart diease
References
[1] A. Gavhane, G. Kokkula, I. Pandya and P. K. Devadkar, "Prediction of Heart Disease Using Machine Learning," 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2018, pp. 1275-1278.
[2] B. A. Thakkar, M. I. Hasan and M. A. Desai, "Health Care Decision Support System for Swine Flu Prediction Using Naïve Bayes Classifier," 2010 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, 2010, pp. 101-105.
[3] V. S. H. Rao and M. N. Kumar, "A New Intelligence-Based Approach for Computer-Aided Diagnosis of Dengue Fever," in IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 1, pp. 112-118, Jan. 2012.
doi: 10.1109/TITB.2011.2171978
[4] J. Park, K. Kim and O. Kwon, "Comparison of machine learning algorithms to predict psychological wellness indices for ubiquitous healthcare system design," Proceedings of the 2014 International Conference on Innovative Design and Manufacturing (ICIDM), Montreal, QC, 2014, pp. 263-269.
[5] S. Örenç, M. K. Uçar, M. R. Bozkurt and C. Bilgin, "A new approach for treatment of chronic obstructive pulmonary disease," 2017 Medical Technologies National Congress (TIPTEKNO), Trabzon, 2017, pp. 1-4.
doi: 10.1109/TIPTEKNO.2017.8238034
[6] P. Naraei, A. Abhari and A. Sadeghian, "Application of multilayer perceptron neural networks and support vector machines in classification of healthcare data," 2016 Future Technologies Conference (FTC), San Francisco, CA, 2016, pp. 848-852. A. Mardin, T. Anwar, B. Anwer, “Image Compression: Combination of Discrete Transformation and Matrix Reduction”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.1-6, 2017.
[7] M. Moein, Mohammad Davarpanah, M. A. Montazeri and M. Ataei, "Classifying ear disorders using support vector machines," 2010 Second International Conference on Computational Intelligence and Natural Computing, Wuhan, 2010, pp. 321-324.
[8] P. Manivannan and P. I. Devi, "Dengue fever prediction using K-means clustering algorithm," 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS), Srivilliputhur, 2017, pp. 1-5. C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[9] N. Mago, S. Srivastava, R. D. Shirwaikar, U. D. Acharya, L. E. S. Lewis and M. Shivakumar, "Prediction of Apnea of Prematurity in neonates using Support Vector Machines and Random Forests," 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Noida, 2016, pp. 693-697. S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
[10] L. Jena and R. Swain, "Work-in-Progress: Chronic Disease Risk Prediction Using Distributed Machine Learning Classifiers," 2017 International Conference on Information Technology (ICIT), Bhubaneswar, 2017, pp. 170-173.
doi: 10.1109/ICIT.2017.46
[11] C. Hung, W. Chen, P. Lai, C. Lin and C. Lee, "Comparing deep neural network and other machine learning algorithms for stroke prediction in a large-scale population-based electronic medical claims database," 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Seogwipo, 2017, pp. 3110-3113.
[12] T. Christensen, A. Frandsen, S. Glazier, J. Humpherys and D. Kartchner, "Machine Learning Methods for Disease Prediction with Claims Data," 2018 IEEE International Conference on Healthcare Informatics (ICHI), New York, NY, 2018, pp. 467-4674.
[13] M. Chen, Y. Hao, K. Hwang, L. Wang and L. Wang, "Disease Prediction by Machine Learning Over Big Data From Healthcare Communities," in IEEE Access, vol. 5, pp. 8869-8879, 2017.
[14] B. Chakraborty, S. I. Srinivas, P. Sood, V. Nabhi and D. Ghosh, "Case Based Reasoning methodology for diagnosis of Swine Flu," 2011 IEEE GCC Conference and Exhibition (GCC), Dubai, 2011, pp. 132-135.
[15] S. Athmaja, M. Hanumanthappa and V. Kavitha, "A survey of machine learning algorithms for big data analytics," 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2017, pp. 1-4.
[16] O. Rajabi Shishvan, D. Zois and T. Soyata, "Machine Intelligence in Healthcare and Medical Cyber Physical Systems: A Survey," in IEEE Access, vol. 6, pp. 46419-46494, 2018.
[17] M. Chen, Y. Hao, K. Hwang, L. Wang and L. Wang, "Disease Prediction by Machine Learning Over Big Data From Healthcare Communities," in IEEE Access, vol. 5, pp. 8869-8879, 2017.
[18] K. Shailaja, B. Seetharamulu and M. A. Jabbar, "Machine Learning in Healthcare: A Review," 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2018, pp. 910-914.
[19] K. G. Dinesh, K. Arumugaraj, K. D. Santhosh and V. Mareeswari, "Prediction of Cardiovascular Disease Using Machine Learning Algorithms," 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), Coimbatore, India, 2018, pp. 1-7.
[20] P. Siriyasatien, S. Chadsuthi, K. Jampachaisri and K. Kesorn, "Dengue Epidemics Prediction: A Survey of the State-of-the-Art Based on Data Science Processes," in IEEE Access, vol. 6, pp. 53757-53795, 2018.
Citation
Swati S. Nikam, Veena R. Pawar , Jyoti P. Kshirsagar, Ali Akbar Bagwan, "Prevasive Healthcare and Machine Learning Algorithms", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.32-36, 2019.
Rash Driving Detection Through Data Analytics
Research Paper | Journal Paper
Vol.07 , Issue.07 , pp.37-43, Mar-2019
Abstract
This paper proposes ananalytical solution for binary classification of driving behaviourinto safe or rash.A methodology is designed and developed which consists of cleaning and scrubbing of raw driving data throughidentification of best set of parameters, iterative cluster-analysis, creation of target variables by benchmarking against theoretical relations and eventually performing supervised regression using support vector machine on the prepared dataset to classify a fresh driving data point into safe or rash driving. A bad and careless driving is depicted as ‘rash driving’ while a good and efficient driving is depicted as ‘safe driving’. The proposed methodology has the potential of applying to real-world driver profiling system.
Key-Words / Index Term
Classification, rash driving analysis, on board diagnostic, driver profiling, hierarchical clustering, principal component analysis, support vector machine
References
[1]. Miyaji, M., Danno, M., Oguri, K.,“Analysis of driver behaviour based on traffic incidents for driver monitor systems”, In Intelligent Vehicles Symposium, IEEE(2008) pp. 930-935.
[2]. Liang, J., Cheng, X., Chen, X.,“The research of car rear-end warning model based on mas and behavior”, In: Power Electronics and Intelligent Transportation System, IEEE (2008), pp. 305-309.
[3]. Chen, S., Pan, J. and Lu, K. (2018),“Driving Behaviour Analysis Based on Vehicle OBD Information and AdaBoost Algorithms”, [online] Iaeng.org.
[4]. "E/E Diagnostic Test Modes". Vehicle E E System Diagnostic Standards Committee. J1979. SAE International. 2017-02-16. doi:10.4271/J1979_201702.
[5]. "Digital Annex of E/E Diagnostic Test Modes". Vehicle E E System Diagnostic Standards Committee. J1979-DA. SAE International. 2017-02-16. doi: 10.4271/J1979DA_201702.
[6]. Enrique, et al. “PCA - Principal Component Analysis Essentials.” Correlation Matrix : A Quick Start Guide to Analyze, Format and Visualize a Correlation Matrix Using R Software - Easy Guides - Wiki - STHDA, 23 Sept. 2017.
[7]. Barreto, Cephas. “OBD-II Datasets.” RSNA Pneumonia Detection Challenge | Kaggle, 21 Aug. 2018, www.kaggle.com/cephasax/obdii-ds3
[8]. "Hierarchical Clustering", Saedsayad.com, 2018. [Online]. Available:https://www.saedsayad.com/clustering_hierarchical.htm
[9]. Khedkar, Sujata et al, "driver evaluation system using mobile phone and OBD-II system", In International Journal of Computer Science and Information Technologies (IJCSIT) 2018, Vol. 6 (3), 2015, 2738-2745
[10]. Cortes, C., &Vapnik, V. (1995). Support-vector networks. Machine learning, Vol. 20(3), 273-297.
[11]. Prabhu, M., Deorukhakar, D., Amberkar, S., & Ambre, K. (2016), “A Review on Rash Driving Detection and Alert System”, In IOSR Journal of Computer Engineering (IOSR-JCE), Conf. 16051, e-ISSN: 2278-0661, p-ISSN: 2278-8727 pp. 47-49
[12]. Dixit, S., Thomas, P., & Agarwal, C. (2016).“A Cloud-based Driver Monitoring for Inefficient Driving Behavior using OBD2 Telematics”. In International Journal of Computer Applications (0975 – 8887) Vol. 153, Issue. 9, November 2016
[13]. Lakhe, A., Patel, C., Raut, H., &Shinde, S. (2017),“Smart Phone based Rash Driving Detection”. In International Journal of Innovations & Advancement in Computer Science (IJIACS) ISSN 2347 – 8616, Vol. 6, Issue. 11, November 2017
[14]. Patel, L., Gaurav, K., & V, D. (2018), “Detection of rash driving on highways”,In International Journal of Engineering Development and Research (IJEDR), Vol. 6, Issue. 3, ISSN: 2321-9939
[15]. Juneja, P. (2019),Reinforcement Theory of Motivation, Retrieved from https://www.managementstudyguide.com/reinforcement-theory-motivation.htm
[16]. Zhao, Y., Karypis, G., & Fayyad, U. (2005). Hierarchical clustering algorithms for document datasets. Data mining and knowledge discovery, 10(2), 141-168.
[17]. Iwavesystems.com. (2019). OBD II Connected Car Device | iWave Systems. [online] Available at: https://www.iwavesystems.com/obd-ii-connected-car-device.html
[18]. Hareendran (2017). Hands-on review: When hacking an OBD-II adapter, choose carefully. [online] Electronic Products. Available at: https://www.electronicproducts.com/Interconnections/Wire_and_Cable/Hands_on_review_When_hacking_an_OBD_II_adapter_choose_carefully.aspx [Accessed 24 Jan. 2019].
Citation
Arushi Agrawal, Isha Gupta, "Rash Driving Detection Through Data Analytics", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.37-43, 2019.
Application Layer Denial of Service Attack Detection using Deep Learning Approach
Research Paper | Journal Paper
Vol.07 , Issue.07 , pp.44-48, Mar-2019
Abstract
Denial of Service attack, is one of the deadliest attacks of the Internet era. It’s major objective is to prevent legitimate users from accessing services over a network. DoS attacks can be broadly classified into network layer and application layer attacks. In this paper focus is on detection of well-known HTTP based application layer DoS attacks. We have proposed an integrated solution for detection of both volumetric and non-volumetric HTTP based application layer DoS attacks. The proposed system uses an in-memory analytics mechanism to extract the input feature set from the live traffic. On the basis of its learning from the training phase the deep neural network identifies the attacker using the feature set. We have used the TensorFlow to build the deep neural network. We have built a conformation mechanism to further reduce false positives. The result reveals that the proposed system can achieve 99.92% classification accuracy with only 0.003% false positives.
Key-Words / Index Term
Denial of Service (DoS) Attack, Neural Network, Machine Learning, Deep Learning, Supervised Learning, Network Security, Application Layer, TensorFlow
References
[1] H. Jazi, H. Gonzalez, N. Stakhanova, A. Ghorbani, “Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling”, Computer Networks, Vol. 121 pp. 25-36, 2017.
[2] H. Beitollahi, G. Deconinck, “Tackling Application-layer DDo-S Attacks”, Procedia Computer Science, Vol. 10, pp. 432-441, 2012.
[3] M. Shtern, R. Sandel, M. Litoiu, C. Bachalo, V. Theodorou, "Towards Mitigation of Low and Slow Application DDoS Attacks", In the Proceedings of the 2014 International Conference on Cloud Engineering, USA, pp. 604-609, 2014.
[4] S. Yadav and S. Subramanian, “Detection of Application Layer DDoS Attack by Feature Learning Using Stacked Autoencoder”, In the Proceedings of the International Conference on Computational Techniques in Information and Communication Technologies, India, pp. 361-366, 2016.
[5] K. Prasad, A. Reddy, K. Rao, "Ensemble Classiers with Drift Detection (ECDD) in Trafic Flow Streams to Detect DDOS Attacks", Wireless Personal Communications, Vol. 99 pp. 1639-1659, 2018.
[6] M. Najafabadi, T. Khoshgoftaar, C. Calvert, C. Kemp, "User Behavior Anomaly Detection for Application Layer DDoS Attacks", In the Proceedings of the International Conference on Information Reuse and Integration, USA, pp. 154-161, 2017.
[7] A. Alsirhani, S. Sampalli, P. Bodorik, “DDoS Attack Detection System Utilizing Classication Algorithms with Apache Spark”, In the Proceedings of the 2018 International Conference on New Technologies, Mobility and Security, Spain, pp. 1-7, 2018.
[8] C. Kemp, C. Calvert, T. Khoshgoftaar, “Utilizing Netflow Data to Detect Slow Read Attacks”, In the Proceedings of the 2018 International Conference on Information Reuse and Integration, USA, pp. 108-116, 2018.
[9] V. Katkar, A. Zinjade, S. Dalvi, T. Bafna, R. Mahajan, “Detection of DoS/DDoS attack against HTTP Servers using Naïve Bayesian”, In the Proceedings of the 2015 International Conference on Computing Communication Control and Automation, India, pp. 280-285, 2015.
Citation
A.B. Mahagaonkar, A.R. Buchade, "Application Layer Denial of Service Attack Detection using Deep Learning Approach", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.44-48, 2019.
Survey on MOOCs for Digital Game based Learning for Learners
Survey Paper | Journal Paper
Vol.07 , Issue.07 , pp.49-53, Mar-2019
Abstract
The Massive Open Online Courses (MOOCs) require extrinsic or intrinsic to the low level of completion of the training, and encounter problems with the interactivity and engagement of students throughout the MOOCs that can transform the enthusiasm of the students in boredom, and then to abandon it at any time. To attract the best players to MOOCs, gamification has been implemented on many platforms; especially since gamification became a buzzword in 2012. This research project examines the motivation and training as perceived by participants in MOOCs, using innovative educational strategies for teaching community in the field of education. In learning gamification, the use of Digital Game Learning (GBL) it provides more fun learning than gamification. In this regard, the current implementation of gamification, DGBL and their role in MOOCs will be assessed.
Key-Words / Index Term
Gamification, Digital Game Based Learning, Massive Open Online Courses, and Online Learning
References
[1] Gaurav C. Willems, N. Fricke, S. Meier, R. Meissner, K. A. Rollmann, S. Voelcker, S. Woinar and C. Meinel, “Motivating the Masses Gamified Massive Open Online Courses on openHPI,” in Proceedings of EDULEARN, Spain, pp. 4042-4052, 2014.
[2] A. Hansch, C. Newman and T. Schildhauer, “Fostering Engagement with Gamification: Review of Current Practices on Online Learning Platforms,” HIIG Discussion Paper Series No. 2015-04, 23, 2015.
[3] M. Thirouard, O. Bernaert, L. Dhorne, S. Bianchi, L. Pidol, R. Crepon and Y. Petit, “Learning By Doing: Integrating a Serious Game in a MOOC to Promote New Skills”, in Proceedings of the European MOOC Stakeholder Summit , 2015.
[4] T. Staubitz, S. Woinar, J. Renz and C. Meinel, “Towards Social Gamficiation Implementing A Social Graph In An xMOOC Platform,” Proceedings of 7th International Conference of Education, Research and Innovation (ICERI2014), 2014.
[5] Mehmet Kesima, Hakan Altınpulluka, “A Theoretical Analysis of Moocs Types From A Perspective of Learning Theories”, 5th World Conference on Learning, Teaching and Educational Leadership (WCLTA 2014), Elesevier-2015.
[6] Joshua G. Peery and Celen Pasalar, “Designing the Learning Experiences in Serious Games: The Overt and the Subtle: The Virtual Clinic Learning Environment”, Informatics, 5, 30; DOI: 10.3390, 2018.
[7] Lifeng Sun, Xiaoyan Wang, Zhi Wang, Hong Zhao, Wenwu Zhu, “Social Aware Video Recommendation for Online Social Groups”, IEEE Transactions on Multimedia ;Volume: 19, Issue: 3, March 2017.
[8] Yipeng Zhou, Jiqiang Wu, Terence H. Chan, Siu Wai Ho, Dah Ming Chiu, Di Wu,“Interpreting Video Recommendation Mechanisms by Mining View Count Traces”, JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST-2015.
[9] Gaurav Kumar Singh, Varun Kumar, Savita Bhat, Niranjan Pedanekar, “Automatically augmenting Learning Material With Practical Questions to Increase Its Relevance”; IEEE Frontiers in Education Conference (FIE)-978-1-4799-8454-1/15, 2015.
[10] By Leigh Whitcomb, “Audio for Television: How AES67 and Uncompressed 2022/2110/TR03 Video Fit Together”; SMPTE Motion Imaging Journal IEEE ,Volume: 126, Issue: 5, July-2010.
Citation
Shivendra Chavan, Mangesh Bedekar, "Survey on MOOCs for Digital Game based Learning for Learners", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.49-53, 2019.
A Survey of Text-to-Image Generative Adversarial Networks
Survey Paper | Journal Paper
Vol.07 , Issue.07 , pp.54-61, Mar-2019
Abstract
In recent years, generative models have gained alot of attention in the deep learning community. In particular,Generative Adversarial Networks (GANs), proposed by Ian Goodfellow et al. in 2014, and their variants have emerged as a powerful method which performs significantly better than other generative models such as Restricted Boltzmann Machines or Variational Auto-Encoders. In this paper, we focuson a specific type of GANs, the Text-to-Image GANs, and review some of the most seminal work which has been conducted in this area. We provide a high-level description of the architectural components of these models and also review their performance on variousdatasets. Further, we discuss how these architectures are suitedfor the particular use case of text-to-face image synthesis for generating images of human faces from text descriptions.
Key-Words / Index Term
GenerativeAdversarial Networks, Text-to-ImageGANs, Deep Learning
References
[1] Ian Goodfellow and Yoshua Bengio and Aaron Courville, ``Deep Learning,`` MIT Press, 2016.
[2] Goodfellow, Ian J. et al. ``Generative Adversarial Nets,`` NIPS (2014).
[3] Bodnar, Cristian. “Text to Image Synthesis Using Generative Adversarial Networks.” CoRR abs/1805.00676 (2018): n. pag.
[4] Gregor, Karol et al. “DRAW: A Recurrent Neural Network for Image Generation.” ICML (2015).
[5] Kingma, Diederik P. and Max Welling. “Auto-Encoding Variational Bayes.” CoRR abs/1312.6114 (2013): n. pag.
[6] Mansimov, Elman et al. “Generating Images from Captions with Attention.” CoRR abs/1511.02793 (2015): n. pag.
[7] Reed, Scott E. et al. “Generative Adversarial Text to Image Synthesis.” ICML (2016).
[8] Mirza, Mehdi and Simon Osindero. “Conditional Generative Adversarial Nets.” CoRR abs/1411.1784 (2014): n. pag.
[9] Reed, Scott E. et al. “Learning Deep Representations of Fine-Grained Visual Descriptions.” 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016): 49-58.
[10] Kingma, Diederik P. and Jimmy Ba. “Adam: A Method for Stochastic Optimization.” CoRR abs/1412.6980 (2014): n. pag.
[11] Bengio, Yoshua et al. “Better Mixing via Deep Representations.” ICML (2013).
[12] Reed, S., Sohn, K., Zhang, Y., and Lee, H. "Learning to disentangle factors of variation with manifold interaction," (ICML 2014).
[13] Radford, Alec et al. “Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks.” CoRR abs/1511.06434 (2015): n. pag.
[14] Reed, Scott E. et al. “Learning What and Where to Draw.” NIPS (2016).
[15] Wah, Catherine et al. “The Caltech-UCSD Birds-200-2011 Dataset.” (2011).
[16] M. Andriluka, L. Pishchulin, P. Gehler, and B. Schiele. 2d human pose estimation: New benchmark and state of the art analysis. In CVPR, June 2014.
[17] Dash, Ayushman et al. “TAC-GAN - Text Conditioned Auxiliary Classifier Generative Adversarial Network.” CoRR abs/1703.06412 (2017): n. pag.
[18] Dong, Hao et al. “I2T2I: Learning text to image synthesis with textual data augmentation.” 2017 IEEE International Conference on Image Processing (ICIP) (2017): 2015-2019.
[19] Zhang, Han et al. “StackGAN: Text to Photo-Realistic Image Synthesis with Stacked Generative Adversarial Networks.” 2017 IEEE International Conference on Computer Vision (ICCV) (2017): 5908-5916.
[20] Xu, Tao et al. “AttnGAN: Fine-Grained Text to Image Generation with Attentional Generative Adversarial Networks.” CoRR abs/1711.10485 (2017): n. pag.
[21] Sharma, Shikhar et al. “ChatPainter: Improving Text to Image Generation using Dialogue.” CoRR abs/1802.08216 (2018): n. pag.
[22] Zhang, Han et al. “StackGAN++: Realistic Image Synthesis with Stacked Generative Adversarial Networks.” IEEE transactions on pattern analysis and machine intelligence (2018): n. pag.
[23] Gong, Fuzhou and Zigeng Xia. “Generate the corresponding Image from Text Description using Modified GAN-CLS Algorithm.” CoRR abs/1806.11302 (2018): n. pag.
[24] X. Wu, K. Xu and P. Hall, "A survey of image synthesis and editing with generative adversarial networks," in Tsinghua Science and Technology, vol. 22, no. 6, pp. 660-674, December 2017.doi: 10.23919/TST.2017.8195348
[25] Huang, He et al. “An Introduction to Image Synthesis with Generative Adversarial Nets.” CoRR abs/1803.04469 (2018): n. pag.
[26] Goodfellow, Ian J.. “NIPS 2016 Tutorial: Generative Adversarial Networks.” CoRR abs/1701.00160 (2016): n. pag.
[27] Ledig, Christian et al. “Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network.” 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017): 105-114.
[28]Sønderby, Casper Kaae et al. “Amortised MAP Inference for Image Super-resolution.” CoRR abs/1610.04490 (2016): n. pag.
[29] Wang, Yifan et al. “A Fully Progressive Approach to Single-Image Super-Resolution.” CoRR abs/1804.02900 (2018): n. pag.
[30] Gadelha, Matheus et al. “3D Shape Induction from 2D Views of Multiple Objects.” 2017 International Conference on 3D Vision (3DV) (2017): 402-411.
[31] Nilsback, Maria-Elena and Andrew Zisserman. “Automated Flower Classification over a Large Number of Classes.” 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing (2008): 722-729.
[32] Yu, Fisher et al. “LSUN: Construction of a Large-scale Image Dataset using Deep Learning with Humans in the Loop.” CoRR abs/1506.03365 (2015): n. pag.
[33] Lin, Tsung-Yi et al. “Microsoft COCO: Common Objects in Context.” ECCV (2014).
[34] Deng, Jia et al. “ImageNet: A large-scale hierarchical image database.” 2009 IEEE Conference on Computer Vision and Pattern Recognition (2009): 248-255.
[35] Cho, Kyunghyun et al. “On the Properties of Neural Machine Translation: Encoder-Decoder Approaches.” SSST@EMNLP (2014).
[36] Schuster, Mike and Kuldip K. Paliwal. “Bidirectional recurrent neural networks.” IEEE Trans. Signal Processing 45 (1997): 2673-2681.
[37] Szegedy, Christian et al. “Rethinking the Inception Architecture for Computer Vision.” 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016): 2818-2826.
[38]Cohn, Gabe. "AI-Art at Christie`s sells for $432,500". The New York Times, October 25, 2018.
[39] Kiros, Ryan et al. “Skip-Thought Vectors.” NIPS (2015).
[40] Graves, Alex and Jürgen Schmidhuber. “Framewise phoneme classification with bidirectional LSTM and other neural network architectures.” Neural networks: the official journal of the International Neural Network Society 18 5-6 (2005): 602-10.
[41] Hochreiter, Sepp and Jürgen Schmidhuber. “Long Short-Term Memory.” Neural Computation 9 (1997): 1735-1780.
[42] Paszke, Adam et al. “Automatic differentiation in PyTorch.” (2017).
[43] Das, Abhishek et al. “Visual Dialog.” 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017): 1080-1089.
Citation
Siddhivinayak Kulkarni, Amol Dhondse, Anurag Katakkar, Nitish Bannur, Trupti Deshpande, "A Survey of Text-to-Image Generative Adversarial Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.07, pp.54-61, 2019.