Data Recovery from Ransom ware Affected Android Phone using Forensic Tools
Research Paper | Journal Paper
Vol.5 , Issue.8 , pp.67-70, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.6770
Abstract
With increasing use of computers and mobile phones, malware attacks are also increased in last few years. Ransomware – one of the malware has become the biggest challenge for security experts and end users. There is urgent need to defend computers and smartphones against possible ransomware attacks. However, it may not be possible to stop such attacks, the attempt can be made to recover from such attacks. This paper discusses possibilities to recover data from encrypted files from ransomware affected android phones. The work presented in this paper was carried out to assist forensic investigators and assure end users that there are possible ways to retrieve their data without paying ransom money. It would be encouraging for end users to know that in most of the cases the data encrypted by a ransomware can be retrieved with help of forensic tools and it will be equally discouraging for attackers. The paper is focused on data recovery from ransomware affected android phones.
Key-Words / Index Term
Ransomware, Android Ransomware, Ransomware Forensics, Data Recovery, Malware Forensics, Android Forensics
References
[1] A. Gazet, “Comparative analysis of various ransomware virii”, Journal in computer virology, Vol.6, Issue.1, pp. 77-90, 2010
[2] A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge & E. Kirda, “Cutting the gordian knot: A look under the hood of ransomware attacks”, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer International Publishing, pp. 3-24, 2015
[3] N. Andronio, S. Zanero & F. Maggi, “HelDroid: Dissecting and detecting mobile ransomware”, International Workshop on Recent Advances in Intrusion Detection, Springer International Publishing pp. 382-404, 2015
[4] K. Cabaj, P. Gawkowski, K. Grochowski, & D. Osojca, “Network activity analysis of CryptoWall ransomware” Przegląd Elektrotechniczny, Vol.91, Issue.11, pp. 201-204, 2015
[5] N. Scaife, H. Carter, P. Traynor, & K. R. Butler, “Cryptolock (and drop it): stopping ransomware attacks on user data”, Distributed Computing Systems (ICDCS), IEEE 36th International Conference on, IEEE, pp. 303-312, 2016
[6] V. K. Gujare and P. Malviya, "Android Malicious apps and Malware Security: A Review", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp. 43-47, 2016.
[7] V. Kapoor, "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
Citation
P. H. Rughani, "Data Recovery from Ransom ware Affected Android Phone using Forensic Tools," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.67-70, 2017.
Crime Data Mining an Indian Perspective
Research Paper | Journal Paper
Vol.5 , Issue.8 , pp.71-78, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.7178
Abstract
Today Information Technology is used in every domain of life. The traditional age-old system of intelligence and criminal record maintenance are no longer used in the current crime scenario. With the availability of spatial data related to crime can be used to integrate it with latest GPS system to highlight the location of crime and such indication can be used by people to be cautious and alert. This latest technology can be used as an aid to warn and guide people about such happening in the crime prone areas. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support. It also results in lower productivity and ineffective utilization of manpower. The solution to this ever-increasing problem lies in the effective use of Information Technology. This paper suggests methodology that combines the Geographical Information System with crime data to provide crime data mining.
Key-Words / Index Term
Crime Mining, Geographical Information System, Hot Spots
References
[1] D.E. Brown, "The regional crime analysis program (RECAP): A frame work for mining data to catch criminals”, In the Proceedings of 1998 IEEE International Conference on Systems, Man, and Cybernetics, Vol. 3, pp. 2848-2853, 1998.
[2] T. Abraham and O. de Vel, "Investigative profiling with computer forensic log data and association rules,", In the Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM`02), pp. 11 – 18, 2002.
[3] J.S. De Bruin, T.K. Cocx, W.A. Kosters, J. Laros and J.N. Kok, “Data mining approaches to criminal career analysis” in the Proceedings of the Sixth International Conference on Data Mining (ICDM’06), pp. 171-177, 2006.
[4] S.V. Nath, “Crime pattern detection using data mining,” in the Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 41-44, 2006.
[5] S. Lin, D. E. Brown, “An Outlier-based Data Association Method For Linking Criminal Incidents”, Decision Support System, Vol 41, Issue 3, pp. 604-615, 2006.
[6] J. Han and M. Kamber, “Data Mining: Concepts and Techniques,” Morgan Kaufmann publications,India, pp. 1-39, 2006.
[7] M. Gupta , B. Chandra and M. P. Gupta, “Crime Data Mining for Indian Police Information System”, Computer Society of India, pp. 389-397, 2008.
[8] C.P. Johnson, “Crime Mapping and Analysis Using GIS”, In the Conference of Geomatics in Electronics Governamce, 2000.
[9] G. Yu, S. Shao, B. Luo, “Mining Crime Data by using New Similarity Measure”, IEEE, 2008. In the Proceedings of the 2008, Second International Conference on Genetic and Evolutionary Computing, pp. 389-392, 2008.
[10] K. Leong, S. Chan, V. Ng, S. Shiu, “Introduction of STEM: Space Time Event Model for Crime Pattern Analysis”, Asian Journal of Information Technology,Vol 7 Issue 12, pp.516-523, 2008.
Citation
N. Narwal, "Crime Data Mining an Indian Perspective," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.71-78, 2017.
Design and Development of tool for assessing OpenStreetMap Completeness
Research Paper | Journal Paper
Vol.5 , Issue.8 , pp.79-87, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.7987
Abstract
OpenStreetMap (OSM) is a cumulative effort to create a free presentable map of the world that can be accessed by anyone. OSM is one the most prevalent instance of Volunteered Geographic Information (VGI). Since OSM is generating large amount of spatial data that has been contributed by users with the different level of mapping experiences and different backgrounds, hence the quality of OSM data can vary strongly. For this different studies have been done in which different aspects have been investigated. In most of the studies, ground truth reference datasets have been used for comparison of the data which is called the extrinsic analysis. But extrinsic analysis is not always possible because of lack of availability of ground truth reference datasets. Hence, intrinsic analysis can serve as prominent basis for making the approximate statements on the quality of OSM. The investigation analyses the existing intrinsic frameworks and its limitations and then proposed the new six quality parameters for assessing the completeness of the OSM data effectively. A framework has been developed on the basis of proposed parameters. The results obtained from execution helps in doing the statistical analysis and interpretation by providing the visualizations in the form of bar charts, graphs, tables and maps to assess the completeness of data without the help of any ground truth reference datasets. This enables arbitrarily OSM completeness assessment for any part of the world.
Key-Words / Index Term
OpenStreetMap; Data Quality; Volunteered Geographic Ingormation ; Completeness
References
[1] J. N. D. Costa, “Novel tool for examination of data completeness based on a comparative study of vgi data and official building datasets”, GEODETSKI VESTN, vol. 60, no. 3, pp. 495–508, 2016.
[2] A. Ballatore, M. Bertolotto, and D. C.Wilson, “Geographic knowledge extraction and semantic similarity in openstreetmap”, Knowledge and Information Systems, vol. 37, no. 1, p. 61, 2013.
[3] T. Hayakawa, Y. Imi, and T. Ito, “Analysis of quality of data in openstreetmap”, in Seventh IEEE International Conference on E-Commerce Technology (CEC’05) (2012), Hangzhou, China China, pp. 131–134, 2012.
[4] M. Haklay, “How good is volunteered geographical information A comparative study of openstreetmap and ordnance survey datasets”, Environment and Planning B: Planning and Design, vol. 37, no. 4, pp. 682–703, 2010.
[5] C. Barron, P. Neis, and A. Zipf, “A comprehensive framework for intrinsic openstreetmap quality analysis”, Transactions in GIS, vol. 18, no. 6, pp. 877–895, 2014.
[6] P. Mooney and P. Corcoran, “Analysis of interaction and co-editing patterns amongst openstreetmap contributors”, Transactions in GIS, vol. 18, no. 5, pp. 633–659, 2014.
[7] C. Westrope, R. Banick, and M. Levine, “Groundtruthing openstreetmap building damage assessment”, Procedia Engineering, vol. 78, pp. 29 – 39, 2014.
[8] H. Fan, A. Zipf, Qing Fu and Pascal Neis, “Quality assessment for building footprints data on OpenStreetMap”, International Journal of Geographical Information Science, vol. 28, Issue 4, pp. 700-719, 2014.
[9] S. S. Sehra, J. Singh, and H. S. Rai, “A systematic study of openstreetmap data quality assessment”, in Information Technology: New Generations (ITNG), 2014 11th International Conference, Las Vegas, NV, USA, pp. 377–381, 2014.
[10] V. Antoniou and A. Skopeliti, “Measures and indicators of vgi quality: An overview”, ISPRS Internationa Society for Photogrammetry and Remote Sensing, vol. II-3/W5, pp.345–351, 2015.
[11] P. Neis, M. Goetz, and A. Zipf, “Towards automatic vandalism detection in openstreetmap”, ISPRS International Journal of Geo-Information, vol. 1, no. 3, p.315, 2012.
[12] M. S. Fox and C. J. Pettit, “On the completeness of open city data for measuring city indicators”, in Smart Cities Conference (ISC2). Guadalajara, Mexico: IEEE, pp. 1-6 , 2015.
[13] J. Vuurstaek, G. Cich, L. Knapen, A.-U.-H. Yasar, T. Bellemans, and D. Janssens, “Gtfsbus stop mapping to the osm network”, Procedia Computer Science, vol. 109, pp. 50–58, 2017.
[14] J.F. Girres and G. Touya, “Quality assessment of the french openstreetmap dataset”, Transactions in GIS, vol. 14, Issue 4, pp. 435–459, 2010.
[15] B.A. Johnson and K. Iizuka, “Integrating openstreetmap crowdsourced data and landsat time- series imagery for rapid land use/land cover (lulc) mapping: Case study of the laguna de bay area of the philippines”, Applied Geography, vol. 67, pp. 140–149, 2016.
[16] C. Heipke, “Crowdsourcing geospatial data”, ISPRS Journal of Photogrammetry and Remote Sensing, vol. 65, pp. 550–557, 2010.
[17] M. Over, A. Schilling, S. Neubauer, and A. Zipf, “Generating web-based 3d city models from openstreetmap: The current situation in germany”, Computers, Environment and Urban Systems, vol. 34, no. 6, pp. 496 – 507, 2010.
[18] M. Ruta, F. Scioscia, D. D. Filippis, S. Ieva, M. Binetti, and E. D. Sciascio, “A semanticenhanced augmented reality tool for openstreetmap poi discovery”, Transportation Research Procedia, vol. 3, pp. 479–488, 2014.
[19] F. Scioscia, M. Binetti, M. Ruta, S. Ieva, and E. D. Sciascio, “A framework and a tool for semantic annotation of fPOIsg in openstreetmap”, Procedia - Social and Behavioral Sciences, vol. 111, pp. 1092 – 1101, 2014.
[20] C. Bittner, “Openstreetmap in israel and palestine game changer or reproducer of contested cartographies?”, Political Geography, vol. 57, pp. 3448, 2017.
[21] J. J. Arsanjani, “An assessment of a collaborative mapping approach for exploring land use patterns for several european metropolises”, International Journal of Applied Earth Observation and Geoinformation, vol. 35, pp. 329–337, 2015.
[22] J. Schellekens, R. Brolsma, R. Dahm, G. Donchyts, and H. Winsemius, “Rapid setup of hydrological and hydraulic models using openstreetmap and the srtm derived digital elevation model”, Environmental Modelling & Software, vol. 61, pp. 98–105, 2014.
[23] P. Zhao, T. Jia, K. Qin, J. Shan, and C. Jiao, “Statistical analysis on the evolution of openstreetmap road networks in beijing”, Physica A: Statistical Mechanics and its Applications, vol. 420, pp. 59 – 72, 2015.
[24] M F Goodchild 2007 “Citizens as sensors: The world of volunteered geography”, GeoJournal , vol. 69, pp. 211–21, 2007.
[25] G. Sivaiah, PK. Rao, "Providing Efficient Driving Directions Using GPS and Driver`s Ability", International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.18-21, 2014.
Citation
Sonali Arora, Sukhjit Singh Sehra, Sumeet Kaur Sehra, "Design and Development of tool for assessing OpenStreetMap Completeness," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.79-87, 2017.
Feature Extraction From Product Review Using Ontology
Research Paper | Journal Paper
Vol.5 , Issue.8 , pp.88-93, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.8893
Abstract
Opinion mining is accepting more attention because of the development of blogs, e-commerce, news, reports, forums and additional web sources where individuals tend to express their opinions. Different people have different opinions. People`s thought may vary according to the domain and opinion may contain both positive and negative words. For a product, user may like or dislike some of its features. Filtering this review and extract domain related features is the important task of this paper. In this paper, ontology is used to extract the features and adjectives are used as the sentiment word. Sentiment Analysis is used to obtain positive or negative feature of the review.
Key-Words / Index Term
Ontology,Natural-language-Processing,SentimentAnalysis
References
[1] B. Liu,”Sentiment analysis and opinion mining”, Synthesis lectures on human language technologies, vol.5, no.1, pp.1-167, 2012.
[2] T.Ahmad and M.N.Doja,”Opinion mining using frequent pattern growth method from unstructured text”, pp. 92-95, 2013.
[3] S.Mishra, D.Mishra, and S.K.Satapathy,”Fuzzy pattern tree approach for mining frequent patterns from gene expression data”, vol.2, pp.359-363,2011.
[4] H.Wang and J.Chen,”Extracting two-noun phrases from customer reviews”, pp.1-4, 2009.
[5] G.Altenbek and R.Sun,”Kazakh noun phrase extraction based on n-gram and rules”, pp.305-308, 2010.
[6] A.Jeyapriya and C.K.Selvi,”Extracting aspects and mining opinions in product reviews using supervised learning algorithm”, pp. 548-552, 2015.
[7] M.Yamamoto, T.Yamasaki, and K.Aizawa,”Service annotation and profling by review analysis”, pp.357-364, 2016.
[8] H.Hamdan, P.Bellot, and F.Bechet,”Supervised methods for aspect-based sentiment analysis”, pp. 596-600, 2014.
[9] W.Ding, X.Song, L.Guo, Z.Xiong, and X.Hu,”A novel hybrid hdp-lda model for sentiment analysis”, pp. 329-336, 2013.
[10] H.S.Le, T.Van Le, and T.V.Pham,”Aspect analysis for opinion mining of Vietnamese text”, pp. 118-123, 2015.
[11] S.Thirumaran and M.Sangeetha, "Ontology Founded Mesh Flatterer Aimed at Removal Facilities info Result", International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.224-227, 2015.
[12] Yaakub, R.M, Li and Feng Y,”Integration of Opinion into Customer Analysis Model”, IEEE International Conference on e-Business Engineering, pp. 90-95, 2011.
[13] Priyanka Sharma, R.K. Gupta, "A Novel Web Usage Mining Technique Analyzing Users Behaviour Using Dynamic Web log", International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.106-111, 2017.
[14] Shein, Khin Phyu Phyu and Thi Thi Soe Nyunt,”Sentiment classification based on Ontology and SVM Classifier”, IEEE Communication Software and Networks, pp. 169-172 ,2010.
[15] Freitas, Larissa A, and Renata Vieira,”Ontology based feature level opinion mining for portuguese reviews”, 22nd International Conference on World Wide Web. ACM, pp. 367-370 ,2013.
[16] Hazman, Maryam, Samhaa R.El-Beltagy and Ahmed Rafea,”A survey of ontology learning approaches”, vol. 22, No. 9,2011.
[17] Penalver-Martinez, Isidro, et al,”Feature-based opinion mining through ontologies”, Expert Systems with Application, pp.5995-6008 ,2014.
[18] Ali, Farman, Kyung-Sup Kwak and Yong-Gi Kim,”Opinion mining based on fuzzy domain ontology and Support Vector Machine: A proposal to automate online review classification”, Applied Soft Computing, pp. 235- 250, 2016.
[19] Kontopoulos, Efstratios, et al,”Ontology-based sentiment analysis of twitter posts”, Expert systems with applications, pp.4065-4074, 2013.
Citation
Drashti Naik, Jitali Patel, "Feature Extraction From Product Review Using Ontology," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.88-93, 2017.
Assessment method for Course Outcome attainment: A case study in engineering education
Case Study | Journal Paper
Vol.5 , Issue.8 , pp.94-100, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.94100
Abstract
the accreditation process conducted by National Board of Accreditation (NBA) in India is a quality assurance process to determine whether educational institutes are meeting the program objectives. The process involves measuring the attainment of program objectives in terms of Program Outcomes attainment and Course Outcome attainment levels. In this paper we describe the methodology for computation of Course Outcomes attainment we have designed and implemented in Information Technology department as part of the accreditation process. A running example of how the method is shown for one of the core courses in engineering program. Also, a discussion on the utilization of Course Outcome attainment values is done.
Key-Words / Index Term
Course Outcome, Internal Assessment, Attainment calculation, NBA
References
[1]. H. R. Bhagyalakshmi D., Seshachalam, S. Lalitha, “Program Outcome Attainment Through Course Outcomes: A Comprehensive Approach”, Proc of the Intl Conference on Transformations in Engineering Education, pp 279-287, 2014.
[2]. Ramchandra, S., Maitra, S, MallikarjunaBabu.K, “Method for estimation of attainment of program outcome through course outcome for outcome based education”, 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE),pp 7 – 12, 2014.
[3]. Makinda J.,Bolong N., Mirasa A.K and Ayog J.L.,“Assessing the Achievement of Program Outcome on Environment and Sustainability: A Case Study in Engineering Education”, 2nd Regional conference on Campus sustainability: Capacity building in Enhancing Campus sustainability. University Malaysia Sabah, Malaysia, 7th-8th April 2015.
[4]. Norain Farhana Ahmad Fuaad, Ruhizan Bt. Mohammad Yasin and Norngainy MohdTawil, “Achievement of the Program Outcomes in Outcomes Based Education Implementation - A Meta Analysis”, Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 – 9, 2014.
Citation
Lakshmi H.N, G. Bhagya Sri, Yashasree. J, S. Bhargav, B. Satheesh Kumar, K. Anusha, "Assessment method for Course Outcome attainment: A case study in engineering education," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.94-100, 2017.
A Hybrid Method for Solving Traveling Salesman Problem using Hungarian Method
Research Paper | Journal Paper
Vol.5 , Issue.8 , pp.101-105, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.101105
Abstract
Genetic Algorithms are earning respect in different fields of Operation Research like Transportation and Traveling Salesman Problem, etc. However, the best solution they produce needs several iterations to obtain. This paper develops a new hybrid method for Travelling Salesman Problem. The proposed hybrid method delivers same solution each time unlike genetic algorithms. The efficiency is compared against following existing crossover operators; namely, Order Crossover, Modified Order Crossover, Sequential Constructive Crossover, Modified Sequential Constructive Crossover. Experimental results show that the proposed hybrid method is better than the compared methods.
Key-Words / Index Term
Travelling salesman problem, NP-hard, Hybrid method, Genetic algorithm, Hungarian method
References
[1] B.D. Jackson and D. Thoro, “Applied Combinatorics with Problem Solving”, Addison-Wesley Publisher, pp. 159-163, 1990.
[2] .E.L. Lawler, J.K. Lenstra, A.R. Kan, D.B. Shmoys, “The traveling salesman problem: a guided tour of combinatorial optimization”, Wiley, 1985.
[3] Arora, Sanjeev, "Polynomial time approximation schemes for Euclidean traveling salesman and other geometric problems", Journal of the ACM (JACM), Vol. 45, Issue.5, pp.753-782, 1998.
[4] A. Tucker, “Applied Combinatorics”, Sixth Edition, John Wiley & Sons, Inc. 2012.
[5] E. Balas and P. Toth, “Branch and bound methods. In E.L. Lawler et. al, editor, The Traveling Salesman Problem”, John Wiley & Sons, Essex, pp. 361-401, 1985.
[6] E. L. Lawler and D. E. Wood, “Branch-and-bound methods: A survey. Operations Research”, Vol. 14, pp. 699-719, 1966.
[7] S. Kirkpatrick, C. Gellat, M. Vecchi, “Optimization by simulated annealing, Science”, pp. 671–680, 1983.
[8] F. Glover, “Tabu search, part I”. ORSA J. Computing Vol. 1, pp. 190–206, 1989.
[9] M. Dorigo, C. Blum, “Ant colony optimization theory: a survey”, Theor. Comput. Sci, Vol. 344, pp. 243–278,
2005.
[10] D. Goldberg, “Genetic algorithms in search, ptimization, and machine learning”, Addison-Wesley Professional,Boston, 1989.
[11] S.M.A. Moetty, A.O.Heakil, “Enhanced Traveling Salesman Problem Solving using Genetic Algorithm
Technique with modified Sequential Constructive Crossover Operator”, International Journal of Computer
Science and Network Security Vol. 12, Issue. 6, pp. 134, 2012.
[12] I.M. Oliver, D.J. Smith and J.R.C. Holland, “Study of permutation crossover operators on the travelling
salesman problem”, In the proceedings of the 1987 Second International Conference on Genetic Algorithms,
Cambridge, MA, pp. 224-230, 1987.
[13] A. Rani, S.K. Boora, "A Novel Commence For Optimizing Task Scheduling In Heterogeneous Multiprocessor Environment Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2, Issue.7, pp.51-56, 2014..
[14] Z.H. Ahmed, “Genetic Algorithm for the Traveling Salesman Problem using Sequential Constructive Crossover Operator”, International Journal of Biometrics & Bioinformatics, Vol.3, Issue. 6, pp.96-105, 2010.
[15] Michael Jünger, Gerhard Reinelt,Giovanni Rinaldi, " The traveling salesman problem",Handbooks in Operations Research and Management Science Vol.7, pp. 225-330, 1995.
[16] D. Applegate, R.E. Bixby, V. Chvátal, and W. Cook, “The Traveling Salesman Problem: A Computational Study”, Princeton University Press Publisher, New Jersy, pp. 81-125, 2006.
[17] W. Cook, “In Pursuit of the Salesman: Mathematics at the Limits of Computation”, Princeton University Press Publisher, Princeton, USA, pp. 19-92, 2011.
[18] D. Whitley, T. Starkweather and D. Shaner, “The Traveling Salesman and Sequence Scheduling: Quality
Solutions using Genetic Edge Recombination”, In L. Davis (Ed.) Handbook of Genetic Algorithms. Van
Nostrand Reinhold Publisher, New York, pp. 350-372, 1991.
[19] N.J. Radcliffe and P.D. Surry, “Fitness Variance of Formae and Performance Prediction” , Appears in
"Foundations of Genetic Algorithms III", Ed: L.D. Whitley, M.D. Vose, Morgan Kaufmann (San Mateo), pp. 51-72, 1994.
[20] H.W. Kuhn, “The Hungarian Method for the Assignment Problem”, Naval Research Logistics, Vol. 2, pp.83-97, 1955.
Citation
A.K. Prasad, Pankaj, "A Hybrid Method for Solving Traveling Salesman Problem using Hungarian Method," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.101-105, 2017.
A Study on Fuzzy Relational Mapping (FRM)
Review Paper | Journal Paper
Vol.5 , Issue.8 , pp.106-109, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.106109
Abstract
The fuzzy model is a limited arrangement of fuzzy relations that frame a calculation for deciding the yields of a procedure from some limited number of past data sources and yields. Fuzzy model can be utilized as a part of connected mathematics, to contemplate social and mental issue and furthermore utilized by specialists, design, researchers, industrialists and analysts. There are different sorts of fuzzy models. In this paper we utilize two fuzzy models and give their application to a genuine issue. In this paper two methodologies of fuzzy capacity have been researched: the first distinguishes a fuzzy capacity with a special fuzzy relation (we call it an (E − F)- fuzzy capacity), and the second one characterizes a fuzzy capacity as a conventional mapping between fuzzy spaces. In our exchange the components of the area space are taken from the genuine vector space of measurement n and that of the range space are genuine vectors from the vector space of measurement (m when all is said in done need not be equivalent to n). We mean by R the arrangement of hubs R1, … , Rm of the range space, where Ri = {(x1, x2, … , xm)/xj = 0 or 1} for i = 1, … ,m. In the event that xi = 1 it implies that the hub Ri is in the ON state and if xi = 0 it implies that the hub Ri is in the OFF state. Additionally D signifies the hubs D1,… ,Dn of the area space where Di = {(x1,… , xn)/xj = 0 or 1} for I = 1, … , n. In the event that xi = 1, it implies that the hub Di is in the on state and if xi = 0 it implies that the hub Di is in the off state. A FRM is a directed graph or a guide from D to R with ideas like arrangements or occasions and so forth as hubs and causalities as edges. It speaks to easygoing relations between spaces D and R. Give Di and Rj a chance to signify the two hubs of a FRM.
Key-Words / Index Term
FRM, Fuzzy Logic, Binary Algorithm, Fuzzy Optimization
References
[1] M. Baaz: Infinite-valued Godel¨ logics with 0-1 projections and relativizations. GODEL¨ ’96 – Logical Foundations of Mathematics, Computer Sciences and Physics, Lecture Notes in Logic vol. 6, Springer-Verlag 1996, 23–33.
[2] M. Abinaya, V. Ramadass, "A Study on Fuzzy Relational Mapping (FRM)", International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.109-113, 2017.
[3] W. Bandler, L. J. Kohout, “Semantics of implication operators and fuzzy relational products”, International Journal of Man-Machine Studies, 12, 1980, 89–116.
[4] S. Hemba, N. Islam , "Fuzzy Logic: A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.61-63, 2017.
[5] E. Bartl, R. Belohlavek, “Reducing sup-t-norm and inf-residuum to a single type of fuzzy relational equations”, In: NAFIPS 2011, Fuzzy Information Processing Society, El Paso, TX, USA, March 18-20, 2011, pp. 1-5.
[6] E. Bartl, R. Belohlavek, “Sup-t-norm and inf-residuum are a single type of relational equations”, International Journal of General Systems 40 (6)(2011), pp. 599-609.
[7] A. Yadav, V.K. Harit, "Fault Identification in Sub-Station by Using Neuro-Fuzzy Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.1-7, 2016.
[8] E. Bartl, R. Belohlavek, V. Vychodil, “Compositions of fuzzy relations with hedges II”, In: NAFIPS 2008, The Fourth International IEEE Conference on Intelligent Systems, New York City, NY, USA, May 19-22, 2008, pp. 1-6.
[9] E. Bartl, R. Belohlavek, V. Vychodil, “Bivalent and Other Solutions of Fuzzy Relational Equations via Linguistic Hedges”, Fuzzy Sets and Systems 181(1)(2012), pp. 103-112.
[10] R. Belohlavek, “Fuzzy Relational Systems: Foundations and Principles”. Kluwer Academic/Plenum Publishers, New York, 2002.
[11] R. Belohlavek, “Sup-t-norm and inf-residuum are one type of relational product: unifying framework and consequences”, Fuzzy Sets and Systems, Volume 197, June, 2012, pp. 45-58.
[12] R. Belohlavek, T. Funiokova,´ V. Vychodil, “Fuzzy closure operators with truth stressers”, Logic J. of IGPL 13(5)(2005), pp. 503–513.
[13] R. Belohlavek, V. Vychodil, “What is a fuzzy concept lattice?”, In: Proc. CLA 2005, 3rd Int. Conference on Concept Lattices and Their Applications, 2005, pp. 34–45.
[14] R. Belohlavek, V. Vychodil, “Reducing the size of fuzzy concept lattices by hedges”, Proc. FUZZ-IEEE, pp. 663–668, Reno, Nevada, 2005. In: FUZZIEEE 2005, The IEEE International Conference on Fuzzy Systems, May 22– 25, 2005, Reno (Nevada, USA), pp. 663–668 (proceedings on CD), abstract in printed proceedings, pp. 44.
[15] R. Belohlavek, V. Vychodil, “Attribute implications in a fuzzy setting”, In: Missaoui R., Schmid J. (Eds.): Proc. ICFCA 2006, LNAI 3874, 2006, pp. 45–60.
Citation
M. Abinaya, V. Ramadass, "A Study on Fuzzy Relational Mapping (FRM)," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.106-109, 2017.
Design of High Performance, Scalable Content-based Publish-Subscribe System using MPI-CUDA Approach
Research Paper | Journal Paper
Vol.5 , Issue.8 , pp.110-115, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.110115
Abstract
Today Publish-subscribe model is used as communication backbone for various application domains such as IoT, Social networking, Intrusion detection system and Financial trading. Content-based flavor of Pub-Sub system enables routing of information from producers to consumers based on contents of the query or depends on subscriptions entered by the user. In this model, information is disseminated from producers to consumers through a network of brokers. The significant challenge in content-based Pub-Sub system lies in an efficient matching of an event against a large number of subscribers on a single message broker. To provide high throughput service guarantee to the subscriber of Pub-Sub system we propose a novel hybrid model for parallel event processing using MPI-CUDA approach. This approach combines message passing interface (MPI) and CUDA, a parallel computing platform and programming model, invented by NVIDIA. Results are compared with CCM (Cuda Content Matching Algorithm), a high performance, and parallel content matching algorithm. Approximately 1.77X speedup is observed in matching latency. This approach is suitable for use in event processing of large data intensive applications where the rate of arrival of the event is high.
Key-Words / Index Term
Matching Latency, MPI-CUDA, High performance, parallel event processing.
References
[1] Alessandro Margara, Gianpaolo Cugola “High-Performance Publish-Subscribe Matching Using Parallel Hardware”, IEEE Transactions on Parallel and Distributed Systems Volume.25, Issue.1,January 2014
[2] A. Carzaniga, D. S. Rosenblum, and A. L. Wolf, “Design and evaluation of a wide-area event notification service”, ACM TCS, 2001
[3] M. K. Aguilera, R. E. Strom, D. C. Sturman, M. Astley, and T. D. Chandra, “Matching events in a content-based subscription system”, In PODC, 1999 and evaluation of a wide-area event notification service. ACM TCS, 2001.
[4] H.-A. Jacobsen, A. Cheung, G. Lia, B. Maniymaran, V. Muthusamy, and R. S. Kazemzadeh, “The PADRES publish/subscribe system”, Handbook of Research on Adv. Dist. Event-Based Sys. Pub. /Sub. and Message Filtering Tech., 2009.
[5] Peter R. Pietzuch, “Hermes: A scalable event-based middleware”, Technical Report University of GANBRIDGG Computer Laboratory.
[6] T. Yan and H. Garcia-Molina, “Index structures for selective dissemination of information under the Boolean model”, ACM TODS,1994.
[7] F. Fabret, H.-A. Jacobsen, F. Llirbat, J. Pereira, K. A. Ross, and D. Shasha, “Filtering algorithms and implementation for fast pub/sub systems”, SIGMOD, 2001.
[8] S. Whang, C. Brower, J. Shanmugasundaram, S. Vassilvitskii, E. Veer, R. Yerneni, and H. Garcia-Molina, “Indexing Boolean expressions”, In VLDB’09.
[9] M. K. Aguilera, R. E. Strom, D. C. Sturman, M. Astley, and T. D. Chandra, “Matching events in a content-based subscription system”, In PODC, 1999.
[10] A. Campailla, S. Chaki, E. Clarke, S. Jha, and H. Veith, “Efficient filtering in publish-subscribe systems using binary decision diagrams”, In ICSE, 2001.
[11] G. Li, S. Hou, and H.-A. Jacobsen, “A unified approach to routing, covering and merging in publish/subscribe systems based on modified binary decision diagrams”, In ICDCS,2003.
[12] G. Cugola and G. Picco, “REDS: A Reconfigurable Dispatching System”, In SEM, pages 9-16, Portland, 2006. ACM Press.
[13] Tania Banerjee Mishra, Sartaj Sahni, “PUBSUB: An Efficient Publish/Subscribe System”, IEEE Transactions on Computers Volume. 64, Issue.4, 2014.
[14] Mohammad Sadoghi, Hans-Arno Jacobsen, “Analysis and Optimization for Boolean Expression Indexing ACM Transactions on Database Systems”, Vol. 38, No. 2, Article 8, 2013.
[15] M. Sadoghi and H.-A. Jacobsen, “BE-Tree An Index Structure to Efficiently Match Boolean Expressions over High-dimensional Discrete Space”, SIGMOD, 2011.
[16] A. Farroukh, E. Ferzli, N. Tajuddin, and H.-A. Jacobsen, “Parallel Event Processing for Content-Based Publish/Subscribe Systems”, (DEBS ’09), pp.8:1-8:4, 2009.
[17] K.H. Tsoi, I. Papagiannis, M. Migliavacca, W. Luk, and P Pietzuch, “Accelerating Publish/Subscribe Matching on Reconfigurable Supercomputing Platforms”, Proc. Many-Core and Reconfigurable Supercomputing Conf., 2010.
[18] Medha A. Shah, D.B.Kulkarni, “Storm Pub-Sub: High Performance, Scalable Content Based Event Matching System Using Storm”, In IPDPS,W’ 2015.
[19] Raphael Barazzutti, Pascal Felber, “Streamhub: A Massively Parallel Architecture for High-Performance Content-Based Publish/Subscribe”, DEBS, 2013, Arlington, Texas, USA.
[20] Medha Shah, D.B.Kulkarni, “Enabling Qos Support for Multi-Core Message Broker in Publish/Subscribe System”, Advance Computing Conference (IACC), 2014 IEEE International conference.
[21] Zhaoran Wang, Xiaotao Chang, “Pub/Sub on Stream: A Multi-Core Based Message Broker with Qos Support”, DEBS, 2012, Berlin, Germany July 2012.Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
[22] A. Carzaniga and A.L. Wolf, “Forwarding in a Content-Based Network,” Proc. SIGCOMM, pp. 163-174, 2003.
[23] https://www.linux.com/blog/building-beowulf-cluster-just-13-steps
Citation
M.A. Shah, D.B. Kulkarni, "Design of High Performance, Scalable Content-based Publish-Subscribe System using MPI-CUDA Approach," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.110-115, 2017.
Energy Aware Load-Balancing of Parallel Mining of Frequent Sequences Using LB Scheme
Research Paper | Journal Paper
Vol.5 , Issue.8 , pp.115-120, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.115120
Abstract
Data aggregation in wireless sensor networks is utilized to decrease the correspondence overhead and draw out the system lifetime. In any case, an enemy may bargain some sensor hubs, and utilize them to fashion false esteems as the aggregation result. Past secure data aggregation plans have handled this issue from various edges. The objective of those calculations is to guarantee that the Base Station (BS) does not acknowledge any fashioned aggregation comes about. However, none of them have attempted to identify the hubs that infuse into the system fake aggregation comes about. Additionally, a large portion of them for the most part have a correspondence overhead that is, (best case scenario) logarithmic per hub. In this theory, they propose a safe and vitality proficient data aggregation conspire that can recognize the malevolent hubs with a consistent per hub correspondence overhead. In our answer, all aggregation comes about are marked with the private keys of the aggregators so they can`t be changed by others. Hubs on each connection also utilize their Level Based shared key for secure correspondences. Every hub gets the aggregation comes about because of its parent (sent by the parent of its parent) and its kin (by means of its parent hub), and checks the aggregation consequence of the parent hub. Hypothetical investigation on Security, vitality utilization and correspondence overhead accords with our examination based recreation contemplate over arbitrary data aggregation trees.
Key-Words / Index Term
Cloud computing, Infrastructure-as-a-Service, Load balancing, Parallel Mining
References
[1] Ankit Tripathi, Sanjeev Gupta, Bharti hourasiya, “An Energy-Aware Spanning Tree Algorithm for Data Aggregation in Wireless Sensor Networks”, IEEE 2014.
[2] Ming-Jer Tsai, “Survey on Data Aggregation Techniques for Wireless Sensor Networks”, International conference on2013.
[3] V. Singhal, S. Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.142-147, 2014.
[4] G.Vinitha, K. Bhuvaneshwari, "A Lightweight and Reliable Routing Approach for in-Network Aggregation in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.284-287, 2017.
[5] Aditya Singh Mandloi and Vinita Choudhary, "An Efficient Clustering Technique for Deterministically Deployed Wireless Sensor Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.6-10, 2013.
[6] R. Nathiya, S.G. Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.36-43, 2014.
[7] Aditya Singh Mandloi and Vineeta Choudhary, "Study of Various Techniques for Data Gathering in WSN", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.3, pp.12-15, 2013.
[8] U. Korupolu, S. Kartik, GK. Chakravarthi, "An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.3, pp.26-29, 2016.
[9] T.-W. Kuo and M.-J. Tsai, “On the construction of data aggregation tree with minimum energy cost in wireless sensor networks: NP-completeness and approximation algorithms,” 2012 Proceedings IEEE INFOCOM, Mar. 2012.
[10] V. Prasad, VS. Sunsan, "Multi path dynamic routing for data integrity and delay Minimization differentiated services in wireless sensor network", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.4, pp.20-23, 2016.
Citation
V. Uthaman, "Energy Aware Load-Balancing of Parallel Mining of Frequent Sequences Using LB Scheme," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.115-120, 2017.
Using Quality Database Convert the Quantity data into Quality data and Automate the Control Points using SURF Algorithm in Spatio-Temporal data
Research Paper | Journal Paper
Vol.5 , Issue.8 , pp.121-125, Aug-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i8.121125
Abstract
GIS data can be divided into two formats, raster and vector. Raster format can represent the values which give quantitative information such as temperature, vegetation intensity, land use/cover etc. Vector format can represent the value which give qualitative data which consists of point, lines and polygons and these representing the location, distance or area of landscape features in graphical forms. For extracting the data we can register the image for the initial processing. For register the image we can select the control points. This control point selection can convert the quantity data into quality data. This process of transforming information (quantity) into knowledge (quality) is called appropriation. To overcome the limitations of relational databases and provide a greater knowledge in terms of knowledge we use the spatio-temporal database.
Key-Words / Index Term
Database , Quality database, Rotation,Scaling, SURF-Algorithm , Spatio-temporal model , Translation
References
[1] A. Artale, E. Franconi, “A temporal description logic for reasoning about actions and plans”, J. Artificial Intelligence Res., Vol.9, Issue.1, pp.463–506, 1998
[2] Benjamin Harbelot, Helbert Arenas, “Christophe Cruz “LC3: A spatio-temporal and semantic model for knowledge discovery from geospatial datasets”, Web Semantics: Science, Services and Agents on the World Wide Web, Vol. 35, pp.3–24, 201.
[3] Wang Huibing, “Extending Object-Relational Database To Support Spatio-Temporal Data”, The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences. Vol. XXXVII. Part B2. Beijing 2008
[4] H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, “Speeded-Up Robust Features (SURF),” Computer Vision and Image Understanding, Vol.110, no. No.3, pp. 346–359, Jun. 2008.
[5] Bidyut Saha, "A Comparative Analysis of Histogram Equalization Based Image Enhancement Technique for Brightness Preservation", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.3, pp.1-5, 2015.
[6] Shiqiang Li, Tianding Chen, Changhong Yu, Lin An, “SURF-based Video Mosaic and Its Key Technologies”, Journal of Computational Information Systems 6:10 (2010) 3267-3275
[7] Zhang Jin-Yu; Chen Yan; Huang Xian-xiang, "Edge A. Artale, E. Franconi, A temporal description logic for reasoning about actions and plans”, J. Artificial Intelligence Res. Vol.9, Issue.1, pp.463–506, 1998.
[8] A. Chitradevi and S. Vijayalakshmi, "Random Forest for Multitemporal and Multiscale Classification of Remote Sensing Satellite Imagery", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.59-65, 2016.
[9] X. Zhang, H. Zhang, and J. Cheng, “Automatic Registration Method for Leather Section Image using SIFT and Wavelet Transform,” ISME 2016 - Information Science and Management Engineering IV, 2016.
[10] M. Breunig, A. Cremers, S. Shumilov, and J. Siebeck, “Spatio-temporal database support for long-period scientific data,” Data Science Journal, Vol. 2, pp. 175–191, 2003.
[11] H. Hajari and F. Hakimpour, “A Spatial Data Model for Moving Object Databases,” International Journal of Database Management Systems, Vol. 6, No. 1, pp. 1–20, Feb. 2014.
Citation
Sonia Rathee, Rahul Rishi, "Using Quality Database Convert the Quantity data into Quality data and Automate the Control Points using SURF Algorithm in Spatio-Temporal data," International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.121-125, 2017.