Improving the Efficiency of Supply Chain in Agricultural Produce Using Blockchain
Research Paper | Journal Paper
Vol.07 , Issue.13 , pp.1-4, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.14
Abstract
The asymmetry in the information pertaining to agricultural supply chain is extremely evident in developing countries like India. Also, the entity worst affected by this asymmetry are the farmers, who do not receive their fair share of in spite of being the most crucial contributors to this food cycle. Moreover, dealing with specific agricultural produce which h ave a short shelf life becomes a complex task with higher rate of wastage every year. With the help of a distributed ledger system in place, we help track the agricultural produce supply chain in every part of the country by replacing whatever supply chain tracking or centralized record keeping mechanism is already in place to provide complete transparency of the lifecycle of produce and enabling faster transactions between nodes and in turn helping the farmers reap the best benefits of their hard work. This would bring complete transparency in nodes where the efficiency is lost, parti cularly, brokers, distributors, regulators, retailers, government departments, etc., Easy and accurate access to this information will improve the overall efficiency of the supply chain and in turn benefit all the entities involved equally.
Key-Words / Index Term
blockchain, distributed ledger, agriculture, farmers, hyper ledger, agri-blockchain, supply chain management, smart contract, circular economy
References
[1] Ministry of Finance, Government of India, "Economic Survey 2017-2018", 2018.
[2] Centre for Study of Developing Societies (CSDS), New Delhi, "State of Indian Farmers", pp. 35-36, 2014.
[3] National Sample Survey Office (NSSO), Delhi, "NSSO KI 70/33 National Survey - 2013", pp. 11-31, 2013.
[4] National Crime Records Bureau New Delhi, "Chapter 2A - Accidental Deaths & Suicides in India 2015", pp. 264-265, 2015.
[5] L. Ge et al., "Blockchain for agriculture and food : Findings from the pilot study", Wageningen : Wageningen Economic Research (Wageningen Economic Research report 2017-112), pp. 33, 2017. ISBN 9789463438179.
[6] D. Tse, B. Zhang, Y. Yang, C. Cheng, H. Mu, "Blockchain application in food supply information security", 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Singapore, pp. 1357 - 1361, 2017, ISBN 978-1-5386-0948-4.
[7] R. Casado-Vara, J. Prieto, F. De la Prieta, J. M. Corchado, "How blockchain improves the supply chain: case study alimentary supply chain", Procedia Computer Science 134, pp. 393-398, 2018.
[8] M. Wooldridge and N. R. Jennings, "Intelligent agents: Theory and practice", The knowledge engineering review, 10(2), pp. 115-152, 1995.
[9] J. Bremer and S. Lehnhoff, "Decentralized Coalition Formation with Agent-based Combinatorial Heuristics", ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, Salamanca, v. 6, n. 3, 2017.
[10] S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System", [Online].
[11] A. Costa, P. Novais, J. M. Corchado and J. Neves, "Increased performance and better patient attendance in a hospital with the use of smart agendas". Logic Journal of the IGPL, 20(4), pp. 689-698, 2012.
[12] D. Wood, "Ethereum: A secure decentralized generalized transaction ledger", 2014.
[13] I. Grigg, "EOS - An Introduction", pp. 1-3, 2017.
[14] N. Szabo, "Smart Contracts", Extropy #16, pp. 2, 1994.
[15] N. Szabo, "The Idea of Smart Contracts", pp. 2, 1997.
Citation
Spurthi N. Anjan, Johnson P. Sequeira, "Improving the Efficiency of Supply Chain in Agricultural Produce Using Blockchain", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.1-4, 2019.
Survey on Transfaulty Behaviour of Nodes in Wireless Sensor Networks
Survey Paper | Journal Paper
Vol.07 , Issue.13 , pp.5-9, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.59
Abstract
Unattainable environments are monitored by low-power Multi-functional sensor nodes of WSN. Wireless Sensor nodes are capable of sensing, computing and communicating the happenings in the environment. Whenever an area monitored by wireless sensor networks, is exposed to radiations or electromagnetic waves, sensor nodes will be deactivated or damaged. Then nodes are temporarily isolated. This leads to the formation of the holes of dynamic nature and also functionality of WSN components will be stopped. Thus it has consider as transfaulty behavior of nodes in WSNs. This paper reviewed the existing systems in highly structured manner related with transfer of communication mode to work in radiation-prone environments and continue to communicate between sensor nodes to identify the better route to reach destination. so as to avoid work load of each node in finding route, to avoid drain of cluster head energy, and to reduce the amount of the data which will forwarded from cluster to base station for reliable data transaction during transfaulty behavior of nodes. In order to understand the factors related, here survey of several research approaches have been analysed and presented to give a best mechanisms for avoiding communication failure due to explosion of radiations in the area monitored by wireless sensor networks.
Key-Words / Index Term
Acoustic communication; RF communication; Wireless sensor Networks
References
[1]. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” Commun. Mag., vol. 40, no. 8, pp. For 102–114, Nov. 2002.
[2]. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey”, Comput. Netw, vol.38, no. 4, pp. 393–422, 2002.
[3]. Pushpendu Kar, Sudip Misra "Reliable and Efficient Data Acquisition in Wireless Sensor Network in the Presence of Transfaulty Nodes”, IEEE Transactions on Network and Service Management 1932- 4537(C), 2016
[4]. J.-H. Jeon, H.-J. Byun, and J.-T. Lim, “Joint contention and sleep control for lifetime maximization in wireless sensor networks”, IEEE Commun. Lett, vol. 17, no. 2, pp. 269–272, Feb. 2013.
[5]. T. Phan, R. Fan, H. Jiang, S. A. Vorobyov, and C. Tellambura, “Network lifetime maximization with node admission in wireless. Multimedia sensor networks”, IEEE Trans. Veh. Technol., vol. 58, no. 7, pp. 3640–3646, Sep.2009
[6]. F. Shan, W. Liang, J. Luo, and X. Shen, “Network lifetime maximization for time-sensitive data gathering in wireless sensor networks”, Comput. Netw. vol. 57, no. 5, pp. 1063– 1077, 2013.
[7]. M. Tahir and R. Farrell, “Optimal communication- computation tradeoff for wireless multimedia sensor network lifetime maximiza-tion”, in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Buda pest, Hungary, pp. 1–6, Apr. 2009.
[8]. H. Wang, N. Agoulmine, M. Ma, and Y. Jin, “Network lifetime optimization in wireless sensor networks”, IEEE J. Sel. Areas Commun., vol. 28, no. 7, pp. 1127–1137, Sep. 2010.
[9]. S. Zhao, L. Tan, and J. Li, “A distributed energy efficient multicast routing algorithm for WANETs”, Int. J. Sensor Netw., vol. 2, nos. 1–2, pp. 62–67, 2007.
[10]. S. S. McClure et al., “Radiation effects in micro- electromechanical systems (MEMS): RF relays”, IEEE Trans. Nucl. Sci., vol. 49, no. 6, pp. 3197–3202, Dec. 2002.
[11]. H. R. Shea, “Radiation sensitivity of micro electro mechanical system devices”, J. Micro/Nanolithogr. MEMS MOEMS, vol. 8, no. 3, pp. 1–11, Jul. 2009.
[12]. W. Dargie and C. Poellabauer, “Fundamentals of Wireless Sensor Networks”, A John Wiley and Sons, Ltd., Publication, USA, 2010.
[13]. T. Vladimirova et al., “Characterising wireless sensor motes for space applications”, In the Proceedings of the 2007.2nd NASA/ESA Conf. Adapt. Hardware Syst., Edinburgh, U.K., pp. 43–50, Aug. 2007.
[14]. F. Akyildiz, D. Pompili, T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges", Elsevier`s Journal of Ad Hoc Net-works, Vol. 3, Issue 3, pp. 257-279, 2005.
[15]. G. Dini, M. Pelagatti, and I. M. Savino, “An algorithm for reconnecting wireless sensor network partitions”, In the Proceedings of the 2008. 5th EurConf. Wire-less Sensor Netw, pp. 253–267, 2008.
[16]. F. Senel, M. F. Younis, and K. Akkaya, “Bio-inspired relay node placement heuristics for repairing damaged wireless sensor net-works”, IEEE Trans. Veh. Technol., vol. 60, no. 4, pp. 1835–1848, May 2011.
[17]. Liansheng Tan, Mou Wu,”Data Reduction in Wireless Sensor Net-works: A Herachical LMS Predication Approach”, IEEE Sensors Journal, vol.16, No. 6, March 15, 2016.
[18]. C. Alippi, G. Anastasi, M. D. Francesco, and M. Roveri, “An adaptive sampling algorithm for effective energy management in wireless sensor networks with energy-hungry sensors”, IEEE Trans. InstrumMeas., vol. 59, no. 2, pp.335– 344, Feb. 2010.
[19]. J.Praiseline Karunya, T.Aruna, “Performance Analysis of Energy- Aware Sensor Node Design in Wireless Sensor Networks”, International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084 Volume.2, Issue-2, and Feb.2014.
[20]. Younis, O. and Fahmy, S., “HEED: a hybrid, energy- efficient, distributed clustering approach for ad hoc sensor networks”, IEEE Transactions on mobile computing, 3(4), pp.366-379, 2004
[21]. Mao Y, Chengfa L., “EECS: an energy efficient clustering scheme in wireless sensor networks”, IEEE international performance computing and communication conference; p.535–40, 2005.
[22]. Shigei, N., Miyajima, H., Morishita, H. and Maeda, M.,” Centralized and distributed clustering methods for energy efficient wireless sensor networks”, In Proceedings of the International Multi Conference of Engineers and Computer Scientists, Vol. 1, pp. 18-20, March, 2009.
Citation
K.R. Asha, M.C. Supriya, "Survey on Transfaulty Behaviour of Nodes in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.5-9, 2019.
Vulnerabilities, Threats and Attacks on SCADA, Mobile Networks and in IoT
Survey Paper | Journal Paper
Vol.07 , Issue.13 , pp.10-15, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.1015
Abstract
Ever since the emergence of 1G in mobile technology, evolution of new mobile generations have introduced various protocols and interfaces, high data transmission capacity making way for different vulnerabilities which allows for launch of attacks on network components. Performance of mobile networks and security is of a major concern. Industrial networks and automation networks were isolated in a physical sense until the emergence of Supervisory Control and Data Acquisition (SCADA). Simplicity, more productivity, reduction in downtime for system adjustments are some advantages with the industrial networks going public on internet. The result is the increase in the number of attack vectors on the SCADA system. IoT to define is a transformative approach providing numerous services over internet. Integrating the existing smart devices to the internet introduces security issues, threat of cyber attacks and crime. In this paper, we discuss the various vulnerabilities, threats and attacks on these three systems namely Mobile networks, SCADA systems, and IoT systems.
Key-Words / Index Term
Mobile networks, Mobile network security, SCADA systems, Internet of Things, security, vulnerabilities
References
[1] SILVÈRE MAVOUNGOU1, GEORGES KADDOUM1, (Member, IEEE), MOSTAFA TAHA2, (Member, IEEE), AND GEORGES MATAR1 “Survey on Threats and Attacks on Mobile Networks” IEEE Access, Year: 2016 , Volume: 4, Page s: 4543 – 4572,IEEE Journals & Magazines
[2] A. Kumar, Y. Liu, J. Sengupta, and Divya. (Dec. 2010). “Evolution of Mobile Wireless Communication Networks: 1G to 4G.” [Online]. Available: http://www.iject.org/pdf/amit.pdf
[3] M. O§ul and S. Bakt_r, ``Practical attacks on mobile cellular networks and possible counter measures,`` Future Internet, vol. 5, no. 4, pp.474_489, 2013. [Online]. Available: http://www.mdpi.com/1999- 5903/5/4/474
[4] Y. Zheng, D. He, X. Tang, and H.Wang, ``AKA and authorization scheme for 4G mobile networks based on trusted mobile platform,`` in Proc. 5th Int. Conf. Inf. Commun. Signal Process., 2005, pp. 976_980.
[5] X. Li and Y. Wang, ``Security enhanced authentication and key agreement protocol for LTE/SAE network,`` in Proc. 7th Int. Conf. Wireless
[6] Commun., Netw. Mobile Comput. (WiCOM), Sep. 2011, pp. 1_4.
[7] M. Liyanage and A. Gurtov, ``Secured VPN models for LTE backhaul networks,`` in Proc. IEEE Veh. Technol. Conf. (VTC Fall), Sep. 2012,pp. 1_5.
[8] C.-K. Han and H.-K. Choi, ``Security analysis of handover key management in 4G LTE/SAE networks,`` IEEE Trans. Mobile Comput., vol. 13, no. 2, pp. 457_468, Feb. 2014.
[9] D. Yu and W. Wen, ``Non-access-stratum request attack in E- UTRAN,`` in Proc. Comput., Commun. Appl. Conf. (ComComAp), Jan.2012, pp. 48_53.
[10] R. Bassil, I. H. Elhajj, A. Chehab, and A. Kayssi, ``Effects of signaling attacks on LTE networks,`` in Proc. 27th Int. Conf. Adv. Inf. Netw. Appl.Workshops (WAINA), Mar. 2013, pp. 499_504.
[11] R. Bassil, I. H. Elhajj, A. Chehab, and A. kayssi, ``A resource reservation attack against LTE networks,`` in Proc. 3rd Int. Conf. Commun. Inf. Technol. (ICCIT), Jun. 2013, pp. 262_268.
[12] S. Park, S. Kim, J. Oh, M. Noh, and C. Im, ``Threats and countermeasures on a 4G mobile network,`` in Proc. 8th Int. Conf. Innov. Mobile Internet Services Ubiquitous Comput. (IMIS), Jul. 2014, pp. 538_541.
[13] R. P. Jover, J. Lackey, and A. Raghavan, ``Enhancing the security of LTE networks against jamming attacks,`` EURASIP J. Inf. Secur., vol. 2014, no. 1, pp. 1_14, Dec. 2014. [Online]. Available: http://dx.doi.org/10.1186/1687-417X-2014-7 C. Shahriar et al., ``PHY- layer resiliency in OFDM communications: A tutorial`` IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 292_314,1st Quart., 2015
[14] Y. Park and T. Park, ``A survey of security threats on 4G networks,`` in Proc. IEEE Globecom Workshops, Nov. 2007, pp. 1_6.
[15] B. Matt and C. Li, ``A survey of the security and threats of the IMTadvanced requirements for 4G standards,`` in Proc. IEEE Conf. Anthol., Jan. 2013, pp. 1_5.
[16] M. Lichtman, T. Czauski, S. Ha, P. David, and J. H. Reed, ``Detection and mitigation of uplink control channel jamming in LTE,`` in Proc. IEEE Military Commun. Conf., Oct. 2014, pp. 1187_1194.
[17] Y. Zou, J. Zhu, X. Wang, and L. Hanzo. (May 2015). “A survey on wireless security: Technical challenges, recent advances and future trends.`` [Online]. Available: https://arxiv.org/pdf/1505.07919.pdf
[18] M. Lichtman, R. P. Jover, M. Labib, R. Rao, V. Marojevic, and J. H. Reed, ``LTE/LTE-A jamming, spoo_ng, and snif_ng: Threat assessment and mitigation,`` IEEE Commun. Mag., vol. 54, no. 4, pp. 54_61, Apr. 2016.
[19] M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf, ``Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices,`` in Proc. IEEE Symp. Secur. Privacy, May 2011, pp. 96_111.
[20] M. La Polla, F. Martinelli, and D. Sgandurra, ``A survey on security for mobile devices,`` IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 446_471, 1st Quart., 2013.
[21] R. Muraleedharan and L. A. Osadciw, ``Increasing QoS and security in 4G networks using cognitive intelligence,`` in Proc. IEEE Globecom Workshops, Nov. 2007, pp. 1_6.
[22] C. B. Sankaran, ``Network access security in next-generation 3GPP systems: A tutorial,`` IEEE Commun. Mag., vol. 47, no. 2, pp. 84_91, Feb. 2009.
[23] Simon Duque Ant´on, Daniel Fraunholz, Christoph Lipps, Frederic Pohl, Marc Zimmermann and Hans D. Schotten, “Two Decades of SCADA Exploitation: A Brief History”, 2017 IEEE Conference on Application, Information and Network Security (AINS), 978-1-5386- 0725-1/17
[24] V. M. Igure, S. A. Laughter, and R. D. Williams, “Security issues in scada networks,” Computers & Security, vol. 25, pp. 498–506, 2006.
[25] B. Zhu, A. Joseph, and S. Sastry, “A taxonomy of cyber attacks on scada systems,” 2011 International Conference on Internet of Things and 4thInternational Conference on Cyber, Physical and Social Computing, pp. 380–388, 2011.
[26] P. S. Motta Pires and Oliveira, Luiz Affonso H. G., “Security aspects of scada and corporate network interconnection: An overview,” 2006, International Conference on Dependability of Computer Systems, pp.127–134, 2006.
[27] J. Caswell, “A survey of industrial control systems security,” 2011. [Online]. Available: https://www.cse.wustl.edu/∼jain/cse571- 11/ftp/ics/
[28] B. Meixell and E. Forner, “Out of control: Demonstrating scada exploitation,” Las Vegas, July 2013. [Online]. Available: https://www.blackhat.com/us-13/
[29] MODICON Inc., 1996. [Online]. Available: http://www.modbus.org/docs/PI MBUS 300.pdf
[30]FlexRay Consortium, “Flexray communications system protocol specification version 3.0.1,” 2010. [Online]. Available: https://svn.ipd.kit.edu/nlrp/public/FlexRay/FlexRay%E2%84%A2%20Proto col%20Specification%20Version%203.0.1.pdf
[29] PROFIBUS, “Profinet specification,” 2017. [Online]. Available: http://www.profibus.com/nc/download/specifications-standards/downloads/profinet-io-secification/display
[30] Bluetooth SIG, “Specification of the bluetooth system,” 2010. [Online]. Available: https://www.google.de/url?sa=t&rct=j&q=&esrc= s&source=web&cd=1&ved=0ahUKEwiY76 but3UAhWDWBoKHXnARUQFggpMAA&url=https%3A%2F%2Fwww.bl uetooth.org%2Fdocman%2Fhandlers%2Fdownloaddoc.ashx%3Fdoc id%3D229737&usg=AFQjCNFY1IFeFAAWwimnoaWMsIRZQvPDSw& cad=rja [31] ZigBee Alliance, “Zigbee specification,” 2004. [Online].
[32] Arsalan Mosenia ; Niraj K. Jha, “A Comprehensive Study of ”, IEEE Transactions on Emerging Topics in Computing, year: 2017 , Volume: 5 , Issue: 4, Page s: 586 – 602, IEEE Journals & Magazines
Citation
Latha. P, Andhe Pallavi, "Vulnerabilities, Threats and Attacks on SCADA, Mobile Networks and in IoT", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.10-15, 2019.
A Survey: Big Data Ethics and Challenges in Healthcare Division
Survey Paper | Journal Paper
Vol.07 , Issue.13 , pp.16-24, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.1624
Abstract
The era of automation, robotics, Internet of Things and collaborative networked systems generated an uniquely characterized data which is named as Big data due to the presence of sensor, camera and text generators poses challenges of storage, processing, and analysis. In this paper, the advanced health care system of future is discussed which generates the Big data along with the conventional methods of data analytics on medical Big data its trends, limitations and further research possibilities. In this paper, a general characteristic of Bigdata is discussed then a thorough study on the future healthcare process and management will be described. Then discuss how the data generated in the context of the Healthcare system will have big data characteristics. Finally, collect all the state of artwork for medical big data analytics and discuss the research gap and open issues.
Key-Words / Index Term
Analysis, Bigdata, Healthcare, Medical, Machine Learning
References
[1] Big Data Fundamentals: Concepts Drivers: Concepts, Drivers and techniques Paperback – 25 Jul 2016
[2] John Walker, Saint. "Big data: A revolution that will transform how we live, work, and think." (2014): 181-183.
[3] Marjani M, Nasaruddin F, Gani A, Karim A, Hashem IA, Siddiqa A, Yaqoob I. Big IoT data analytics: architecture, opportunities, and open researchchallenges. IEEE Access. 2017; 5:5247-61.
[4] Lee C, Luo Z, Ngiam K Y, Zhang M, Zheng K, Chen G, Ooi BC, Yip WL. Big healthcare data analytics: Challenges and applications. In Handbook of Large-Scale Distributed Computing in Smart Healthcare 2017 (pp. 11-41). Springer, Cham.
[5] Sacristán, José A., and Tatiana Dilla. "No big data without small data: learning health care systems begin and end with the individual patient." Journal of evaluation in clinical practice21.6 (2015): 1014- 1017.
[6] Raghupathi W, Raghupathi V. Big data analytics in healthcare: promise and potential. Health information science and systems. 2014 Dec 1; 2(1):3.
[7] Bates D W, Saria S, Ohno-Machado L, Shah A, Escobar G. Big data in health care: using analytics to identify and manage high-risk and high- cost patients. Health Affairs. 2014 Jul 1;33(7):1123-31.
[8] Palanisamy V, Thirunavukarasu R. Implications of Big Data Analytics in developing Healthcare Frameworks–A review. Journal of King Saud University-Computer and Information Sciences. 2017 Dec 9.
[9] https://healthitanalytics.com/news/using-the-ehr-to-dive-into-data- mining-clinical-analytics
[10] Jensen P B, Jensen L J, Brunak S. Mining electronic health records: towards better research applications and clinical care. Nature Reviews Genetics. 2012 Jun;13(6):395.
[11] Zikopoulos P, Eaton C. Understanding big data: Analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media; 2011 Oct 19.
[12] https://www.healthdataarchiver.com/health-data-volumes-skyrocket- legacy-data-archives-rise-hie/
[13] McAfee A, Brynjolfsson E, Davenport T H, Patil DJ, Barton D. Big data: the management revolution. Harvard business review. 2012 Oct 1;90(10):60-8.
[14] Tsai C W, Lai C F, Chao H C, Vasilakos A V. Big data analytics: a survey. Journal of Big Data. 2015 Dec;2(1):21.
[15] Demchenko Y, De Laat C, Membrey P. Defining architecture components of the Big Data Ecosystem. InCollaboration Technologies and Systems (CTS), 2014 International Conference on 2014 May 19 (pp. 104-112). IEEE.
[16] Rahimi A, Liaw S T, Ray P, Taggart J, Yu H. Ontological specification of quality of chronic disease data in EHRs to support decision analytics: a realist review. Decision Analytics. 2014 Dec 1;1(1):5.
[17] Chen M, Hao Y, Hwang K, Wang L, Wang L. Disease prediction by machine learning over big data from healthcare communities. IEEE Access. 2017;5:8869-79.
[18] Chen M, Yang J, Zhou J, Hao Y, Zhang J, Youn C H. 5G-Smart diabetes: towards personalized diabetes diagnosis with healthcare big data clouds. IEEE Commun. 2018 Apr 1.
[19] Yin W, Yang X, Zhang L, Oki E. ECG monitoring system integrated with IR-UWB radar based on CNN. IEEE Access. 2016;4:6344-51.
[20] Soni, J, U. Ansari, D. Sharma and S. Soni, “Predictive data mining for medical diagnosis: An overview of heart disease prediction,” Int. J. Comput. Applic. 17: 43-48
[21] Hsi-Jen. “A retrospective analysis of prognostic indicators in dental implant therapy using the C5.0 decision tree algorithm”, Journal of Dental Sciences, Volume 8, Issue 3 , 248-255, 2013
[22] Chawla N V, Davis DA. Bringing big data to personalized healthcare: a patient-centered framework. Journal of general internal medicine. 2013 Sep 1;28(3):660-5.
[23] Chen M, Zhang Y, Qiu M, Guizani N, Hao Y. SPHA: Smart personal health advisor based on deep analytics. IEEE Communications Magazine. 2018 Mar;56(3):164-9.
[24] García-Magarino I, Lacuesta R, Lloret J. Agent-based simulation of smart beds with Internet-of-Things for exploring Big Data analytics. IEEE Access. 2018; 6:366-79.
[25] Viceconti M, Hunter P J, Hose R D. Big data, big knowledge: big data for personalized healthcare. IEEE J. Biomedical and Health Informatics. 2015 Jul 1;19(4):1209-15.
[26] Yassine A, Singh S, Alamri A. Mining human activity patterns from smart home big data for health care applications. IEEE Access. 2017;5:13131-41.
[28] Jain P, Gyanchandani M, Khare N. Big data privacy: a technological perspective and review. Journal of Big Data. 2016 Dec 1;3(1):25.
[29] Sahi M A, Abbas H, Saleem K, Yang X, Derhab A, Orgun M, Iqbal W, Rashid I, Yaseen A. Privacy Preservation in e-Healthcare Environments: A Review. IEEE Access. 2017.
[30] Sarkar B K. Big data for secure healthcare system: a conceptual design. Complex & Intelligent Systems. 2017 Jun 1;3(2):133-51.
[31] Hill K. How target figured out a teen girl was pregnant before her father did. Forbes, Inc. 2012
[32] Patil P, Raul R, Shroff R, Maurya M. Big data in healthcare. 2014.
[33] Big Data security and privacy issues in healthcare—Harsh KupwadePatil, Ravi Seshadri. 2014
[34] Sectorial healthcare strategy 2012–2016 Moroccan healthcare ministry
[35] LeFevre K, Ramakrishnan R, DeWitt D J. Mondrian multidimensional k-anonymity. In: Proceedings of the ICDE. 2006. p. 25
[36] Iyenger V. Transforming data to satisfy privacy constraints. In: Proceedings of the ACM SIGKDD. 2002;279–88.
[37] Huddar V, Desiraju B K, Rajan V, Bhattacharya S, Roy S, Reddy C K. Predicting complications in critical care using heterogeneous clinical data. IEEE Access. 2016;4:7988-8001.
[38] Johnson A E, Ghassemi M M, Nemati S, Niehaus K E, Clifton D A, Clifford GD. Machine learning and decision support in critical care. Proceedings of the IEEE. 2016 Feb;104(2):444-66.
[39] Luo G. MLBCD: a machine learning tool for big clinical data. Health information science and systems. 2015 Dec 1;3(1):3.
[40] Lo’ai A T, Mehmood R, Benkhlifa E, Song H. Mobile cloud computing model and big data analysis for healthcare applications. IEEE Access. 2016;4:6171-80.
[41] Yao C, Qu Y, Jin B, Guo L, Li C, Cui W, Feng L. A convolutional neural network model for online medical guidance. IEEE Access. 2016;4:4094-103.
[42] Zhang Y, Qiu M, Tsai CW, Hassan M M, Alamri A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Systems Journal. 2017 Mar;11(1):88-95.
[43] Jiang P, Winkley J, Zhao C, Munnoch R, Min G, Yang LT. An intelligent information forwarder for healthcare big data systems with distributed wearable sensors. IEEE systems journal. 2016 Sep; 10(3):1147-59.
[44] Ahmad A M, Khoei A T, Ghapanchi A H, BAnalysis of Research in Healthcare Data Analytics.^, Australasian Conference on Information Systems.
Citation
Madhu H K, Prakash B R, "A Survey: Big Data Ethics and Challenges in Healthcare Division", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.16-24, 2019.
Novel Approach to Seat Matrix Prediction using Hadoop
Research Paper | Journal Paper
Vol.07 , Issue.13 , pp.25-32, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.2532
Abstract
Big data is a term that is used to describe huge data sets having large, varied and complex structure with the hardness of analysing, storing and visualizing for further analysis or results. The analysis into large amounts of data to expose secret correlations and hidden patterns can be termed as big data analytics. [1] Big Data has proved to be beneficial as it helps to gain richer and deeper insights into the underlying mass of data. Common Entrance Test is a flat form for the students to opt for colleges to pursue Under graduation. Every year approximately 150000 students take up CET. Thus, these students will compete for seat among 220 engineering colleges across Karnataka, that are enrolled to the CET cell. Student can opt for a College based on availability of seat or branch for the rank they obtain in CET. Predictive analytics is the basic enabler for big data. On a day to day basis, Businesses collect large quantity of customer data which is used by predictive analytics along with historical data, coupled with customer insight, to forecast future events. For predicting a college several tools are taken into consideration they are: HBase for database, MapReduce for data processing mahout’s distributed naive Bayes classification for classifying and training data.
Key-Words / Index Term
CET, HADOOP, PIG, MAHOUT, MAPREDUCE
References
[1] Sanjay Kapoor , Deepak Kumar , Sandeep Jain , Brijesh Khandelwal , Anil Mittal, Manoj Kumar “An optimized e- Allotment algorithm for admissions in educational institutes,” International Conference on Technology Enhanced Education (ICTEE),IEEE, 2012, pp.17 25.
[2] Rotsnarani Sethy, “Big Data Analysis using Hadoop: A Survey”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 7, July 2015, pp 1153- 1157
[3] SHIVAM AGARWAL,”DATA MINING CONCEPTS AND TECHNIQUES”, International Conference on Machine Intelligence and Research Advancement, 2013, pp 203-207
[4] B.N. Lakshmi, G.H. Raghunandhan, “A Conceptual Overview of Data Mining,” National Conference on Innovations in Emerging Technology-2011, pp 27-33
[5] V.K.Deepa, J. Rexy R. Geetha,” Rapid Development of Applications in Data Mining”, International Conference on Green High Performance Computing March 14-15, 2013 pp 13-16
[6] Jinlong Wang ,Jing Liu , Russell Higgs , Li Zhou , “The Application of Data Mining Technology to Big Data”, IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) 21-24 July 2017 pp 284-289
[7] http://kea.kar.nic.in/
Citation
Ravikiran M D, Poonam Gouli, "Novel Approach to Seat Matrix Prediction using Hadoop", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.25-32, 2019.
A Detailed Survey on Alarming growth of Obesity and Infertility
Survey Paper | Journal Paper
Vol.07 , Issue.13 , pp.33-37, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.3337
Abstract
Obesity is a condition of being overweight. It’s a case where an individual weigh greater than healthy weight. Obesity and overweight have become a common problem of the entire population in the world. The effect of obesity in women’s health is eye-opening and undeniable which in turn is the main cause for women infertility. Obesity influences all the systems of our body including the reproductive system. The fact that obesity in infertile women is very high and there is a strong association between infertility and obesity. This paper shows increased rate of obesity and infertility over a decade. This paper also addresses the various cause for infertility in obese women.
Key-Words / Index Term
BMI, Obesity, Infertility
References
[1] Eden R. Cardozo, MD, Lisa M. Neff, MD, MS, Maureen E.
Brocks, BA, Geraldine E. Ekpo, MD, Tanaka J. Dune, MD,Randall B. Barnes, MD, and Erica E. Marsh, MD, MSCI “Infertility patients’ knowledge of the effects of obesity on reproductive health outcomes” PMCID: PMC3935017, NIHMSID: NIHMS401524
[2] http://www.med.hku.hk/healthedu/issue77/e-issue77.pdf
[3] http://www.mapsofindia.com/my-india/india/survey-reveals- infertility-among-indians
[4] Marc M. Beuttler, MA, Kara N. Goldman, MD, and Jamie A.
Grifo, MD, PhD “Informing Patients about Declining Fertility” by
Virtual Mentor. October 2014, Volume 16, Number 10: 787-792.
[5] Anjani Chandra, Ph.D., and Casey E. Copen, Ph.D., National Center for Health Statistics; and Elizabeth Hervey Stephen, Ph.D., Georgetown University “Infertility and Impaired Fecundity in the United States, 1982–2010: Data From the National Survey of Family Growth” Number 67 n August 14, 2013
[6] Cynthia L. Ogden, Ph.D.; Margaret D. Carroll, M.S.P.H.; Cheryl D. Fryar, M.S.P.H.; and Katherine M. Flegal, Ph.D. Prevalence of Obesity Among Adults and Youth: United States, 2011–2014
[7] https://www.cdc.gov/nchs/data/hestat/obesity_child_13_14/obesity
_child_13_14.htm
[8] https://www.downtoearth.org.in/news/health/nfhs-4-highlights- india-has-become-obese-more-than-doubled-in-one-decade-only-
52527
[9] L. Mertz, "Taking on the Obesity Epidemic : Researchers Wage a Big
Fat Fight in Efforts to Combat This Global Health Issue," in IEEE
Pulse, vol. 8, no. 4, pp. 15-19, July-Aug. 2017. doi: 10.1109/MPUL.2017.2701491
[10] Ö. Taçyıldız, D. Ç. Ertuğrul, Y. Bitirim, N. Akcan and A. Elçi, "Ontology-Based Obesity Tracking System for Children and Adolescents," 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, 2018, pp. 329-334. doi: 10.1109/COMPSAC.2018.10252
Citation
Rakshitha Kiran P, Naveen N C, "A Detailed Survey on Alarming growth of Obesity and Infertility", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.33-37, 2019.
GPR Preprocessing Methods to Identify Possible Cavities in Lateritic Soil
Research Paper | Journal Paper
Vol.07 , Issue.13 , pp.38-43, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.3843
Abstract
Lateritic soils is formed by soft sediments, entangled between rigid to soft lateritic rock, and are seeped due to the entry of water in rainy seasons forming cavities which span over large lengths and considerable depth. Mainly in southern and central parts of India the Lateritic soils are formed. The proposed research work aims at the detection of cavities and formation of sink holes in lateritic soil. The data used in this proposed work is obtained from project site in Kannur District, Kerala State, India. To detect the heterogeneities in lateritic soils and formation of cavities, a Geophysical survey method, namely ground penetrating radar (GPR) with 100 MHz and 500 MHz (for confirmative survey) Ground Coupled antennae were used. The proposed work involves two dimensional 2D image pre-processing of the radargram obtained from GPR. The pre-processing involves data editing, time zero correction, Dewow filter, gain control, Background noise removal and edge detection to improve the detection of cavities in lateritic soil. This provides a means for interpreting the raw GPR data.
Key-Words / Index Term
Ground penetrating radar, underground utility mapping,cavity detection and Dewow filter
References
[1] P.Anbazhagan, Divyesh Rohit, Athul Prabhakaran and B.
Vidyaranya“Identification of Karstic Features in Lateritic Soil by an Integrated Geophysical Approach” Pure Appl. Geophys. 175
(2018), 4515–4536, Springer International Publishing, ISSN 0033-
4553, Volume 175, Number 12.
[2] A.P. Daniels, D J "Ground Penetrating Radar" 2nd ed. 2004, London Institution of Electrical Engineers. ISBN 978-0-86341-
360-5.
[3] Nga-Fong Cheng, Hong-Wai Conrad Tang and Ching-To Chan “Identification and positioning of underground utilities using ground penetrating radar (GPR)" Sustain. Environ. Res., 23(2),
141-152 (2013).
[4] Warishah Abdul Wahab, Jasmee Jaafar,Ihsan Mohd Yassin and Mat Rahim Ibrahim “Interpretation of Ground Penetrating Radar (GPR) Image for Detecting and Estimating Buried Pipes and Cables” 2013 IEEE International Conference on Control System,Computing and Engineering, 29 Nov. - 1 Dec. 2013, Penang,alaysia.
[5] K.L Lee, M.M Mokji “Automatic Target Detection in GPR Images Using Histogram of Oriented Gradients (HOG)” Electronic Design (ICED), 2014 2nd International Conference on, 181-186.
[6] Prabhat Sharma, S. P. Gaba, Dharmendra singh “Study of Background Subtraction for Ground Penetrating Radar”, National Conference on Recent Advances in Electronics & Computer Engineering, RAECE -2015, Feb.13-15, 2015, IIT Roorkee, India
[7] Magdalena Szymczyk Piotr Szymczyk “Preprocessing of GPR Data”, Image Processing & Communication, vol. 18, no. 2-3, pp.
83-90.
[8] Spanoudakis S. Nikolaos and Vafidis Antonios “GPR-PRO: A MATLAB module for GPR data processing”, 978-1-4244-4605-
6/09/$25.00 ©2009 IEEE.
[9] Graham Parkinson, Csaba Ékes “Ground Penetrating Radar Evaluation of Concrete Tunnel Linings”, 12th International Conference on Ground Penetrating Radar, June 16-19, 2008, Birmingham, UK.
[10] N Muaniapan and A. V. Hebsur and E. P. Rao and G.
Venkatachalam, “Radius Estimation of Buried Cylindrical Objects using GPR – A Case Study”, 2012 14th International Conference
on Ground Penetrating Radar (GPR). Shanghai, China. ISBN 978-
1-4673-2663-6, 2012.
[11] Pedro Xavier Neto, Walter Eugeˆnio de Medeiros “A practical approach to correct attenuation effects in GPR data” Journal of Applied Geophysics 59 (2006) 140–151.
[12] A.P Annan “Practical Processing of GPR data” Proceedings of second Government workshop on GPR.
Citation
S.J. Savita, P. Anbazhagan, Andhe Pallavi, "GPR Preprocessing Methods to Identify Possible Cavities in Lateritic Soil", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.38-43, 2019.
IOT based Breast Cancer Monitoring using MRI images Post Neoadjuvant Therapy
Research Paper | Journal Paper
Vol.07 , Issue.13 , pp.44-48, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.4448
Abstract
Metastatic cancer remains a key task in medical management of the disease, since most cancer mortality rates are accredited to metastatic spread of cancer rather than the primary tumor. Despite the noteworthy improvements in the diagnosis, treatment and clinical management, prediction of prognosis, breast cancer relapse and death rates remain unacceptably high in women worldwide. Magnetic Resonance Imaging serves as an important source in detection, diagnoses and treatment monitoring of Breast Cancer. Image processing techniques like pre-processing using different filters to remove the noise content, image segmentation methods to extract the feature such as major axis length, minor axis length are applied to breast MRI images. A mobile app is developed to send the pre-processed MRI images to the doctors’ smart phone. The aim is to augment the view of the MRI images and interpret the condition of the patient as well as to enrich the overall interpretation process. The objective of the work is the analysis of MRI images which reflect the response of the neoadjuvant therapy administered at each successive stage to breast cancer patients in steps.
Key-Words / Index Term
Metastatic Breast Cancer, Neoadjuvant therapy, Magnetic Resonance Imaging, Image processing
References
[1] Yeong Yi An, Sung Hun Kim,2 Bong Joo Kang and Ah Won Lee, Treatment Response Evaluation of Breast Cancer after Neoadjuvant Chemotherapy and Usefulness of the Imaging Parameters of MRI and PET/CT. Journal of Korean Medical Science, June, Vol.30(6), pp. 808–815. 2015 May 13, doi: 10.3346/jkms.2015.30.6.808
[2]URLhttps://www.hopkinsmedicine.org/breast_center/treat ments_services/medical_oncology/neoadjuvant_adjuvant_ch emotherapy.html. Neoadjuvant and Adjuvant Therapy in Breast Cancer.
[3] Mario Mustra, Mislav Grgic. Detection of Areas Containing Microcalcifications in Digital Mammograms. lWSSIP 2014, 21st International Conference on Systems, Signals and Image Processing, 12-15 May 2014, Dubrovnik, Croatia
[4] Bhagyashri G. Patil , Prof. Sanjeev N. Jain. Cancer Cells Detection Using Digital Image Processing Methods. International Journal of Latest Trends in Engineering and Technology (ILJET), Vol 3, Issue 4, March 2014, ISSN: 2278-621X.
[5] Sivaranjini S and Nirmala K. Breast Cancer Response PostNeoadjuvant Chemotherapy Using MRI Measurements. 2017 4th International Conference on Signal Processing, Communications and Networking (ICSCN -2017), 978-1-5090-4307-1/17. 2017.
[6] Arijit Ukil, Soma Bandyoapdhyay, Chetanya Puri, Arpan Pal. ioT Healthcare Analytics: The Importance of Anomaly Detection. 2016 IEEE 30th International Conference on Advanced Information Networking and Applications 1550-445X/16. 2016 IEEE DOI 10.1109/AINA.2016.158.
[7] Luqman Mahmood Mina, Nor Ashidi Mat Isa .Breast Abnormxality Detection in Mammograms using Artificial Neural Network. 2015 IEEE 2015 International Conference on Computer, Communication, and Control Technology (I4CT 2015), April 21 - 23 in Imperial Kuching Hotel, Kuching, Sarawak, Malaysia,978-1-4799-7952, 3-15.
[8] John T. Gohring, Paul S. Dale, Xudong Fan .Detection of HER2 breast cancer biomarker using the opto-fluidic ring resonator biosensor. Elsevier Journal on Sensors and Actuators B Chemical, Vol. 146(1),pp. 226-230, 2010
Citation
Madhura Gangaiah, Andhe Pallavi, "IOT based Breast Cancer Monitoring using MRI images Post Neoadjuvant Therapy", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.44-48, 2019.
A Comparison of V/f and Field Oriented Control of Three Phase Induction Motors Employed in Load Sharing
Research Paper | Journal Paper
Vol.07 , Issue.13 , pp.49-56, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.4956
Abstract
There are various applications in industries where it has become essential to employ multiple motors to drive a common load. This necessity of multiple motor employment has aroused due to several reasons such as the presence of large loads, lack of space for a large motor, need for redundancy and process requirements. Also, there are some of the processes such as conveyor belt and mills which cannot operate with merely one motor. Any process that necessitates the employment of multiple motors to drive a common load will have to adopt load sharing arrangement which is essentially the usage of multiple motor-drive set. With the advancements that has happened in Power Electronics and Electric Drive streams, the user has a wide range of motors and drives to choose from, for load sharing. However, a study of behavior of these motors and drives when employed for load sharing is of utmost importance, as this helps the user to choose the appropriate motor -drive set for the required application. Induction motors are used in majority of the applications in industry. Scalar control and vector control are adopted for induction motor control. Understanding the behavior of induction motor under scalar and vector control in a load sharing arrangement will ease the selection of appropriate control strategy. Therefore, a comparative study of V/f and Field Oriented Control strategies for controlling induction motor in a load sharing arrangement is carried out and results are discussed
Key-Words / Index Term
Load Sharing, Multiple Motor Drive, Torque sharing, V/f control, Field Oriented Control
References
[1] Rockwell Automation, “Load Sharing Applications for AC Drive” Publication Number DRIVES-WP001A-EN- P— June 2000
[2] Jaishankar Iyer, Mehdrad Chapariha, Francis Therrien, Juri Jatskevich,”Improved Torque Sharing In Multi Induction Motor VFD Systems Using Current Feedback”, 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2012.
[3] Jaishankar Iyer, Mehdrad Chapariha, Milad Gougani, Juri Jatskevich, “Torque sharing between V/F controlled vehicular wheels under slippery ground conditions”, Transportation Electrification Conference and Expo (ITEC), IEEE, 2012.
[4] Sruthi M , Chilakapati Nagamani , Ganesan Saravana Ilango, “Dynamic Load Sharing in Multi-Machine Conveyor Belt Systems”, Asia Pacific Power and Enery Engineering Conference, 2017.
[5] M. H. Haque, Senior Member, IEEE, “Determination of NEMA Design Induction Motor Parameters From Manufacturer Data”, IEEE Transactions On Energy Conversion, Vol. 23, No. 4, December 2008.
[6] Hussein Khreis, Andrea Deflorio, Wei-Lung Lee, Miguel Ruiz De Larramendi, “Sensitivity Analysis for Induction Machine Manufacturing Tolerances: Modelling of Electrical Parameters Deviation”, Twelfth International Conference on Ecological Vehicles and Renewable Energies (EVER), 2017.
[7] Rachid Beguenane, Mohamed Benbouzid, “Induction Motors Thermal Monitoring by Means of Rotor Resistance Identification” IEEE Transactions on Energy Conversion, Institute of Electrical and Electronics Engineers, Vol.14, No.3, pp-566-570,
[8] Amit Kumar, Tejavathu Ramesh, “Direct Field Oriented Control of Induction Motor Drive”, Second International Conference on Advances in Computing and Communication Engineering, 2015
Citation
Roopa Nayak, Andhe Pallavi, "A Comparison of V/f and Field Oriented Control of Three Phase Induction Motors Employed in Load Sharing", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.49-56, 2019.
A Framework for Lung Cancer Survivability Prediction Using Optimized-Deep Neural Network Classification and Regression technique
Survey Paper | Journal Paper
Vol.07 , Issue.13 , pp.57-66, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si13.5766
Abstract
Lung cancer disease is the most widely recognized deadly disease in the world for loss of life. Throughout this research, Electronic Health Records (EHRs) textual data are investigated and survivability rates for lung cancer affected patients are predicted. If the patients are survivable more than one year, chemotherapy treatment can be started for those patients. This research paper examines an effective Batch Size-Optimizer based Deep Neural Network (Op-DNN) classifier framework model, which is developed to predict the patient’s survivability based on status dead or alive. Considering only the patients who are alive, prediction is done to know how many months the patients will survive by Op-DNN regression technique. Here the textual data set is classified and processed in batches for each iteration. The errors generated from the original classification of the first batch size is fed back to the Op-DNN algorithm for further iterations with the reduced error loss that are free from underfitting and overfitting. The proposed method is compared with various parameters for Machine learning classifier algorithms demonstrating that the Op-DNN model has achieved better accuracy.
Key-Words / Index Term
Lung Cancer, Diabetes, Survivable Rate, Artificial Neural network, DNN, Op-DNN, Classifier, SVM, NBs, C4.5, Optimizer, Adam, Relu, Epoch, Batchsize,Op-DNN Regression
References
[1] K, Saravanan, and Sasithra S. “Review on Classification Based on Artificial Neural Networks.”, The International Journal of Ambient Systems and Applications, vol. 2, no. 4, 2014, pp. 11–18.
[2] Jiang, Fei, et al. “Artificial Intelligence in Healthcare: Past, Present and Future.” , Stroke and Vascular Neurology, vol. 2, no. 4, 2017, pp. 230–243.
[3] Hughes, Mark, et al. "Medical text classification using convolutional neural networks.", Stud Health Technol Inform 2352017, pp. 246-250.
[4] Kollias, Dimitrios, et al. “Deep Neural Architectures for Prediction in Healthcare”, Complex & Intelligent Systems, vol. 4, no. 2, 2017,pp. 119–131.
[5]Chon, Albert, Niranjan Balachandar, and Peter Lu. "Deep convolutional neural networks for lung cancer detection." , Tech. rep., Stanford University,2017.
[6] Sarwar, Abid, and Vinod Sharma. “Comparative Analysis of Machine Learning Techniques in Prognosis of Type II Diabetes.” Ai & Society, vol. 29, no. 1, 2013, pp. 123–129.,
[7] Rodrigo, Hansapani, and Chris P. Tsokos. “Artificial Neural Network Model for Predicting Lung Cancer Survival” , Journal of Data Analysis and Information Processing, vol. 05, no. 01, 2017, pp. 33–47.
[8] Kuan, et al. “Deep Learning for Lung Cancer Detection: Tackling the Kaggle Data Science Bowl 2017 Challenge.”, ArXiv.org, 26 May 2017
[9] Schmidhuber, and Juergen. “Deep Learning in Neural Networks: An Overview.” ArXiv.org, 8 Oct. 2014
[10]Agrawal, Shikha, and Jitendra Agrawal. “Neural Network Group. Journal of Clinical Oncology, Vol 12, no. 03, 1994, pp. 601- 607. Science, vol. 60, 2015, pp. 769–774.
[11]Burt, Jeremy R., et al. "Deep learning beyond cats and dogs: recent advances in diagnosing breast cancer with deep neural networks.", The British journal of radiology 91.1089 ,2018, p.20170545.
[12] Bengio, Yoshua, and Yann LeCun. "Scaling learning algorithms towards AI.", Large-scale kernel machines vol.34, no.05, 2007, pp.1-41.
[13] Huerta, E. A., et al. "Real-time regression analysis with deep convolutional neural networks.", arXiv, 2018.
[14] S. Yan, H. Wang, X. Tang, and T. S. Huang, “Learning auto structured regressor from uncertain non negative labels,” in CVPR, 2007, pp. 1–8.
[15]Szegedy, Christian, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. "Going deeper with convolutions." ,In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1-9. 2015.
[16] Stephane Lathuiliere, Pablo Mesejo, Xavier Alameda-Pineda, Member IEEE, and Radu Horaud, “A Comprehensive Analysis of Deep Regression”, arxiv:1803.0845. vol, 22 Mar 2018.
[17] Bae, K.T., Kim, C.J., “An Agricultural Estimate Price Model of Artificial Neural Network by Optimizing Hidden Layer”, Journal of Intelligent Information Systems, vol,12, 2016, pp.161-169.
[18]Ki-Young Lee1, Kyu-Ho Kim1,*, Jeong-Jin Kang2, Sung-Jai Choi3, Yong-Soon Im4, Young-Dae Lee5, Yun-Sik Lim6, “Comparison and Analysis of Linear Regression & Artificial Neural Network”, International Journal of Applied Engineering Research ISSN 0973- 4562, Vol 12, no. 20 , 2017, pp. 9820-9825.
[19]Loprinzi, C., Laurie, J., Wieand, H., Krook, J., Novotny, P., & Kugler, J.,” Prospective evaluation of prognostic variables from patient-completed questionnaires”, North Central Cancer Treatment
{20]Pradeep KR, Naveen NC.,” Lung Cancer Survivability Prediction based on Performance Using Classification Techniques of Support Vector Machines, C4. 5 and Naive Bayes Algorithms for Healthcare Analytics”, Procedia computer science,132, 31 Dec 2018, pp.412-420.
[21]Cox, Victoria. “Exploratory Data Analysis.” SpringerLink, Apress, Berkeley, CA, 2017.
[22]Ketkar N,” Introduction to Keras. In: Deep Learning with Python. Apress”, Berkeley, CA, 2017.
[23]Schmidt-Hieber, J., “Nonparametric regression using deep neural networks with ReLU activation function”, arXiv,2018
[24]Bahar, Parnia, et al. “Empirical Investigation of Optimization Algorithms in Neural Machine Translation.” The Prague Bulletin of Mathematical Linguistics, vol. 108, no. 1, 2017, pp. 13–25.
[25]Kingma, Diederik, and Jimmy Ba, "Adam: a method for stochastic optimization”, arXiv 2015.
[26]Srivastava, Nitish, et al. "Dropout: a simple way to prevent neural networks from overfitting." The Journal of Machine Learning Research 15.1, 2014, pp. 1929-1958.
Citation
Pradeep K.R, Naveen N.C, "A Framework for Lung Cancer Survivability Prediction Using Optimized-Deep Neural Network Classification and Regression technique", International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.57-66, 2019.