Analysis of Business Rules modeling Approaches using 4-Dimensional Business Rule Framework
Research Paper | Journal Paper
Vol.5 , Issue.12 , pp.135-142, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.135142
Abstract
Business rules could be look at different perspective in Information systems. A 4-dimensional rule framework is developed to describe rules in Business, Representation, System and Application dimension. Each dimension is laydown by a set of attributes to capture the essential characteristics of business rule. Business dimension talk about how business rule is in actual business. Representation dimensional talks about how to represent rule so that business people can easily write and understand rules. System dimension deal with the characteristics of tool developed to manage and store business rules for Business as well as Technical audience. The attributes of Application dimension describe the characteristics of executing rules in actual software system. OMG accepted a standard, namely, Semantics of Business Vocabulary and Business Rules, SBVR and claim that it is meant for business people. The authors developed a business rule model, called, Business Rules Oriented Business Model, BROBM to provide a comprehensive solution, start from the capturing business rule as see in business till the actual software application. In this paper, authors did a detailed analysis of SBVR and BROBM based on the attributes of 4-dimensional business rule framework.
Key-Words / Index Term
Business rule, Business rule Manifesto, Business Motivation Model, 4- dimensional Business rule Framework, SBVR, Business Rules Oriented Business Model
References
[1] Allen J. F., “Maintaining knowledge about temporal intervals,”, ACM, vol. 26, no. 11, pp. 832–843, 1983.
[1] Barkmeyer Ed, Neuhaus F., “RECON - A Controlled English for Business Rules”. RuleML2013@Human Language Technology, 7th International Rule Challenge, Seattle, 2013.
[2] B. Berkem,"From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)", Journal of Object Technology, vol. 7, no. 8, pp. 57--70, 2008
[3] Camlon H. Asuncion1, Maria-Eugenia Iacob2, and Marten J. van Sinderen., “Towards a flexible service integration through separation of business rules”, IEEE International Enterprise Distributed Object Computing Conference, pp. 184-193,2010.
[4] D.K. Sharma, N. Praksah, D. Singh, M. Mahajan, “
Design and Implementation of a Software System for High Level Business Rules” Accepted in International Journal of advanced science, Engineering and Information Technology, In press
[5] Friedman-Hill E., “Jess in Action: Rule-Based Systems in Java”, Manning Publications Co, 2003.
[6] Gaweł B, Skalna I, “Model driven architecture and classification of Business rules modelling languages”, Advance in Business ICT, Springer, pp. 123-131, 2014.
[7] Gladys S. Lam W, “Business Rules vs. Business Requirements, Business Rules Journal”, Vol. 7, No. 5, 2006.
[8] Goranko, Valentin and Galton A.,Temporal Logic, The Stanford Encyclopedia of Philosophy Online Published,pp.-12,2015
[9] Hanson, E.N., Widom, J., “An Overview of Production Rules in Database Systems”, Knowledge Engineering Review, pp. 121 – 143, 1993.
[10] Kardasis P., Loucopoulos P.,“Expressing and organizing business rules”, Information and Software Technology,pp. 46 701–718, 2004.
[11] Kruchten P., “The Rational Unified Process: An Introduction”, Addison-Wesley Professional, Boston, MA, USA, 2003.
[12] Linehan M.,“SBVR Use Cases”, International Symposium on Rule Representation, Interchange and Reasoning on the web, RuleML, LNCS Springer, Vol.5321 pp. 182-196
[13] Norbert E, Fuchs, Schwertel U, Schwitter R.. Attempto Controlled English (ACE). The First International Workshop on Controlled Language Applications, Katholieke Universiteit Leuven, 1996.
[14] Prakash N., Deepak S., Deepika, Singh D., “A Framework for Business Rules”, 5th International Workshop on Requirements, Intentions and Goals in Conceptual Modeling -36th International Conference on Conceptual Modeling, HongKong , pp. 68-73, 2013.
[15] Prakash N, Sharma D. K., Singh D, “Business rule for Business Governance”, 16th International conference on Enterprise Information system, Proceeding in LNBIP Springer, Portugal, pp. 360-367,2014.
[16] Prakash D., and Gupta D., “Eliciting Data Warehouse Contents for Policy Enforcement Rules”, International Journal of Information System Modeling and Design (IJISMD) 5(2),pp. 29, 2013.
[17] Ross R. G. (ed.), Business Rules Manifesto The Principles of Rule Independence, Version 2.0, Published by Business Rules Group,2003.
[18] Sriganesh S., Ramanathan C., “Externalizing Business Rules from Business Processes for Model Based Testing”, IEEE proceding of ICIT 2012, pp. 312-318, 2012.
[19] Siji P D, M.L.Valarmathi, "Data Mining Approach for Feature Reduction Using Fuzzy Association Rule", International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.44-49, 2017.
[20] Veerendra K. Rai and Anantaram C , “Business Rules Approach to Information System Development”, 7th Pacific Asia Conference on Information Systems, Adelaide, pp. 1723,2003.
[21] Wang W., Indulska M., Sadiq S., “To Integrate or Not to Integrate – The Business Rules Question”, Advanced Information Systems Engineering. CAiSE 2016. Lecture Notes in Computer Science, Springer, vol. 96-94, 2016.
Citation
Deepak Kumar Sharma, Manish Mahajan, Dheerendra Singh, Naveen Praksh, "Analysis of Business Rules modeling Approaches using 4-Dimensional Business Rule Framework," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.135-142, 2017.
Rotatory Shortcut Tree Routing In ZigBee Networks
Research Paper | Journal Paper
Vol.5 , Issue.12 , pp.143-146, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.143146
Abstract
The shortcut tree routing has been advised to provide near prime routing path as well as maintaining the benefits of the ZigBee tree routing like low memory utility multi-hop routing capacity .But, in spite of the efforts to provide an efficient and reliable protocol, the unicast routing itself has the fundamental limitation in wireless environment due to loose, time period varying, and broadcast way of wireless medium. Such as, even one loose link on a path may result in the miscarriage of end-to-end packet delivery in wireless network setting. In this paper, we propose the rotatory shortcut tree routing that combines shortcut tree routing and rotatory routing. Instead of identifying a next hop node, this rotatory shortcut tree routing allows receiving nodes to compete to forward a packet with the primacy of remaining hops. Because it has acquired advantages of each protocol, it may offer reliable parcel conveyance benefit without any approach for multi-hop routing and forwarder candidate selection for rotatory routing.
Key-Words / Index Term
ZigBee, Tree Routing, Hierarchical addressing, STR
References
[1] D. Bandyopadhyay and J. Seen, “Internet of things: Applications and challenges in technology and standardization,” Wire. Pers. Common., vol. 58, no. 1, pp. 49–69, 2011.
[2] H. Y. Tung et al., “The Generic Design of a High-Traffic Advanced Metering Infrastructure Using ZigBee,” IEEE Trans. Ind. Informatics, vol. 10, no. 1, pp. 836–844, 2014.
[3] M. a. Setiawan et al., “ZigBee-Based Communication System for Data Transfer within Future Micro grids,” IEEE Trans. Smart Grid, vol. PP, no.99, pp. 1–1, 2015.
[4] Zhipeng Song, “ZigBee Network Tree Routing Algorithm based on Energy Balance”, International Journal of Smart Home Vol. 9, No. 4 (2015).
[5] ZigBee Document, “ZigBee Specification,” IEEE Trans.wireless system vol.Pp. 1–378, 2004
[6] T. Kim et al.,“neighbour table based shortcut tree routing in ZigBee wireless networks,” IEEE Trans. Parallel Diatribe. Syst., vol. 25, no. 3, pp. 706–716, 2014.
[7] Nessie Chakchouk, “A Survey on Opportunistic Routing in Wireless Communication Networks,” IEEE Commun. Surv. Tutorials, 2015.
[8] S. Chachulski et al., “Trading structure for randomness in wireless opportunistic routing,” ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, p. 169, 2007.
[9] J. Lou et al., “Opportunistic routing algorithm for relay node selection in wireless sensor networks,” IEEE Trans. Ind. Informatics, vol. 11, no. 1, pp. 112–121, 2015
[10] A. Crepe et al., “Statistical Model of Lossy Links in Wireless Sensor Networks,” in Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth International Symposium on, 2005, pp. 81–88.
[11] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
Citation
N.Durga Prasad, D.Sai Ganesh, "Rotatory Shortcut Tree Routing In ZigBee Networks," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.143-146, 2017.
Identification of Psychological Harassment Via Digital Communication Media
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.147-150, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.147150
Abstract
Although the Internet has transformed the way our world operates, it has also served as a venue for cyberbullying, a serious form of misbehavior among youth. With many of today`s youth experiencing acts of cyberbullying [2], a growing body of literature has begun to document the prevalence, predictors, and outcomes of this behavior, but the literature is highly fragmented and lacks theoretical focus. Therefore, our purpose in the present article [1] is to provide a critical review of the existing cyberbullying research. This systematic review and meta-analysis [6][7] offers a synthesis of the relationship between cyber-victimization and educational outcomes of adolescents aged 12 to 17, including 25 effect sizes from 12 studies drawn from a variety of disciplines. The general aggression model is proposed as a useful theoretical framework from which to understand this phenomenon. Additionally, results from a meta-analytic review are presented to highlight the size of the relationships between cyberbullying and traditional bullying, as well as relationships between cyberbullying and other meaningful behavioral and psychological variables. A series of random-effects meta-analyses [12] using robust variance estimation revealed associations between cyber-victimization [4] and higher class presence problems (r = .20) and academic achievement problems (r = .14). Results did not differ by provided definition, publication status, reporting time frame, gender, race/ethnicity, or average age. Implications for future research are discussed within context of theoretical, critical, and applied discussions.
Key-Words / Index Term
cyber-victimization, victimization, meta-analysis, adolescents, academic achievement, school attendance, Cyberbullying Detection, Text Mining, Representation Learning
References
[1]. P. Baldi, “Autoencoders, unsupervised learning, and deep architectures,” Unsupervised and Transfer Learning Challenges in Machine Learning, Volume 7, p. 43, 2012.
[2]. M. Chen, Z. Xu, K. Weinberger, and F. Sha, “Marginalized denoising autoencoders for domain adaptation,” arXiv preprint arXiv: 1206.4683, 2012.
[3]. T. K. Landauer, P. W. Foltz, and D. Laham, “An introduction to latent semantic analysis,” Discourse processes, vol. 25, no. 2-3, pp. 259–284, 1998.
[4]. T. L. Griffiths and M. Steyvers, “Finding scientific topics,” Proceedings of the National academy of Sciences of the United States of America, vol. 101, no. Suppl 1, pp. 5228–5235, 2004.
[5]. D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent dirichlet allocation,” the Journal of machine Learning research, vol. 3, pp. 993–1022, 2003.
[6]. T. Hofmann, “Unsupervised learning by probabilistic latent semantic analysis,” Machine learning, vol. 42, no. 1-2, pp. 177–196, 2001.
[7]. Y. Bengio, A. Courville, and P. Vincent, “Representation learning: A review and new perspectives,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 35, no. 8, pp. 1798–1828, 2013.
[8]. B. L. McLaughlin, A. A. Braga, C. V. Petrie, M. H. Moore et al., Deadly Lessons:: Understanding Lethal School Violence. National Academies Press, 2002.
[9]. J. Juvonen and E. F. Gross, “Extending the school grounds? bullying experiences in cyberspace,” Journal of School health, vol. 78, no. 9, pp. 496–505, 2008.
[10]. M. Fekkes, F. I. Pijpers, A. M. Fredriks, T. Vogels, and S. P. Verloove-Vanhorick, “Do bullied children get ill, or do ill children get bullied? a prospective cohort study on the relationship between bullying and health-related symptoms,” Pediatrics, vol. 117, no. 5, pp. 1568–1574, 2006.
[11]. M. Ptaszynski, F. Masui, Y. Kimura, R. Rzepka, and K. Araki, “Brute force works best against bullying,” in Proceedings of IJCAI 2015 Joint Workshop on Constraints and Preferences for Configuration and Recommendation and Intelligent Techniques for Web Personalization. ACM, 2015.
[12]. R. Tibshirani, “Regression shrinkage and selection via the lasso,” Journal of the Royal Statistical Society. Series B (Methodological), pp. 267–288, 1996.
[13]. P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.-A. Manzagol, “Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion,” The Journal of Machine Learning Research, vol. 11, pp. 3371–3408, 2010.
[14]. P. Baldi, “Autoencoders, unsupervised learning, and deep architectures,” Unsupervised and Transfer Learning Challenges in Machine Learning, Volume 7, p. 43, 2012.
[15]. M. Chen, Z. Xu, K. Weinberger, and F. Sha, “Marginalized denoising autoencoders for domain adaptation,” arXiv preprint arXiv: 1206.4683, 2012.
[16]. T. K. Landauer, P. W. Foltz, and D. Laham, “An introduction to latent semantic analysis,” Discourse processes, vol. 25, no. 2-3, pp. 259–284, 1998.
[17]. T. L. Griffiths and M. Steyvers, “Finding scientific topics,” Proceedings of the National academy of Sciences of the United States of America, vol. 101, no. Suppl 1, pp. 5228–5235, 2004.
[18]. D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent dirichlet allocation,” the Journal of machine Learning research, vol. 3, pp. 993–1022, 2003.
[19]. T. Hofmann, “Unsupervised learning by probabilistic latent semantic analysis,” Machine learning, vol. 42, no. 1-2, pp. 177–196, 2001.
Citation
Manorama Singh, Abhay Kumar, "Identification of Psychological Harassment Via Digital Communication Media," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.147-150, 2017.
Analysis of Multilevel-Semantic Prediction based on User Point of Sentiment Opinion (MSP-UPSO) in Social Web Mining
Research Paper | Journal Paper
Vol.5 , Issue.12 , pp.151-158, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.151158
Abstract
Web mining is a tremendous growth in social networks for intent knowledge of various information’s, comments, reviews, tags about choosing concern life objects, there is an increasing demand for data prediction because of a different point of user interest i.e.,” think to best”. The users will be trusted to using these online reviews and to get information about the opinions of products from others. Due to the reviews product was successive based on threating of user point opinion regarding the given object. The social comment should the hidden sentiments of the user opinions. A most problematic challenge in web mining is to identify the sentiments and aspects opinion of the people to perform the data classification based on these features Opinion summarization. To propose a multilevel semantic pattern incremental algorithm (MSPI) with intent to divisive rank clusters which they analyze the hidden user opinion sentiments and classifies the user hidden points. Initially to preprocess the product reviews and to apply the multilevel semantic analyzer form extraction data points. The data points are ranked based on algometric rank clusters to optimized result case. The data sources to be taken for the social web from a customer review of the product list. In this paper, experiments were conducted to compare the performance of existing clustering and classification algorithm produce higher prediction rate based on hidden sentiment case reviews.
Key-Words / Index Term
web mining, opinion mining, sentiment analysis, clustering, rank prediction
References
[1] M. L. Felciah, R.Anbuselvi.,” A Study on Sentiment Analysis of Social Media Reviews” IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems,india,2015.
[2] ZaipingTao, “An approach towards comprehensive sentimental data analysis and opinion mining,"IEEE Transactions on Learning Technologies,vol 5, Issue 30,pp,215-228,2013.
[3] Z.Zhai et al,"Clustering Product Feature for Opinion Mining", IEEE Transactions on Knowledge and Data Engineering,vol 7,Issue 28,pp.112-139 ,20ll.
[4] R.Lijun, "Research on the opinion mining system for 5 Massive Social Media Data" Internationl natural language processing,vol10,issue 40,pp.424-431,2013, Springer.
[5] Blessy Selvam,"A Survey on Opinion Mining FrameWork", International Journal of Advanced Research in computer and communication Engineering, vol 2, Issue 9, 2013.
[6] B Vijay. Raut, .D. Londhe,” Survey on Opinion Mining and Summarization of User Reviews on Web” International Journal of Computer Science and Information Technologie, vol 17,issue 5,pp.564-579,2014.
[7] R Soni1, K. J. Mathai” Effective Sentiment Analysis of a Launched Product using Clustering and Decision Trees” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 1,2016
[8] B. Burscher, R. Vliegenthart, H. Claes, “Frames Beyond Words: Applying Cluster and Sentiment Analysis to News Coverage of the Nuclear Power,” International Social Science Computer Research,vol 2,Issue 32 pp. 1-16, 2015
[9] H Suresh, G Raj . “A Novel Cluster-Based Unsupervised Technique for Twitter Sentiment Analysis”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 7,pp.345,362, 2017
[10] L.Zhu, A. Galstyan, “Tripartite Graph clustering for Dynamic Sentiment Analysis on Social Media”, International Social and Information Networks,’ vol 14, pp.1531-1542, June. 2014.
[11] L. N. Ferreira, L. Zhao, “ A Time series Clustering Technique based on Community Detection in Networks”, Proceeding Computer Science, Elsevier, pp. 183-190, 2015. International Journal of Advanced Research in CS and Software Engineering, Vol. 5, Issue 8, 2015.
[12] L .F .S. Coletta, N. F. F da Silva, E. R. Hruschka, E. R. Hruschka, “ Combining Classification and Clustering for Tweet Sentiment Analysis”,Brazilian journal on Intelligent Systems,vol 2,Issue 12,pp784,797 2016.
[13] M. Unnisa, A. Ameen, S. Raziuddin, “ Opinion Mining on Twitter Data using Unsupervised Learning Technique “, International Journal of Computer Applications, Vol. 148, No.12, pp.12-19, 2016.
[14] N. Pooranam, G. Shyamala, “A Statistical Method of Knowledge Extraction on Online Stock Forum Using Subspace Clustering with Outlier Detection”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.5, Issue 5, May.2016.
[15] A.Shukla, R. Misra, “Sentiment Classification and Analysis using Modified K-Means and Naïve Bayes Algorithm”, International Journal of Computer Applications, Vol. 86, No.22, pp.43-58, 2015.
[16] Xiaolong Wang, Furu Wei, Xiaohua Liu, Ming Zhou, Ming Zhang,” Topic-Sentiment Analysis in Twitter: A Graph-based Hashtag Sentiment Classification Approach”, ACM, CIKM’11, October 24–28, 2011.
[17] Glasgow, Scotland, UK, 2011.Andrius Mudinas, Dell Zhang, Mark Levene,” Combining Lexicon and Learning based Approaches for Concept-Level Sentiment Analysis”, IEEE Transactions on Affective Computing, vol 4,issue 99,pp.15-32 ,2012.
[18] L.williams ,” Idiom based features in sentiment analysis: Cutting the Gordian knot”, IEEE Trans. On knowledge and data engineering, vol. 24, no. 4, 2012.
[19] D park, S.kim“ConceptVector: Text Visual Analytics via Interactive Lexicon Building Using Word Embedding” IEEE Transactions on Visualization and Computer Graphics , Vol 24, Issue 1, 361 – 370, 2018.
[20] R.Xia , J.Jiang, and H.He, “Distantly Supervised Lifelong Learning for Large-Scale Social Media Sentiment Analysis” IEEE transactions on affective computing, vol. 8, no. 4 ,pp. 751 – 770,2017
Citation
A. Muruganantham, S. P. Victor, "Analysis of Multilevel-Semantic Prediction based on User Point of Sentiment Opinion (MSP-UPSO) in Social Web Mining," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.151-158, 2017.
Different Techniques for Skin Cancer Detection Using Dermoscopy Images
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.159-163, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.159163
Abstract
Now a days, most dangerous form of disease is melanoma. Melanoma is type of skin cancer that develops from melanocytic cells. Due to malignancy feature melanoma skin cancer is also known as malignant melanoma. Melanoma cancers have various stages which will increase the death rate of patients. So early detection and treatment of melanoma implicate higher chances of cure. Traditional methods for detecting skin cancer are painful, invasive and time consuming. Therefore, in order to overcome the above stated issues different techniques used for skin cancer detection. These techniques works on image so there is no physical contact with skin, so this is non-invasive. These techniques use Image Processing tools for the detection of Melanoma Skin Cancer. These techniques first pre-process the skin image which is followed by image segmentation. Feature extraction is performed on segmented lesion. The extracted features are used to classify the image as normal skin and melanoma cancer lesion.
Key-Words / Index Term
Image Pre-processing, Segmentation, Feature Extraction, Classification, Melanoma Skin Cancer
References
[1] Z. Waheed, M. Zafar, A. Waheed, F. Riaz, “An Efficient Machine Learning Approach for the Detection of Melanoma using Dermoscopic
Images”, International Conference on Communication, Computing and Digital Systems (C-CODE), pp.316-319, 2017.
[2] O. Abuzaghleh, B. D. Barkana, M. Faezipour, “Noninvasive Real-Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention”, IEEE Journal of Translational Engineering in Health and Medicine, Vol.3, 2015.
[3] O. Abuzaghleh, B. D. Barkana, M. Faezipour, “SKINcure: A real time image analysis system to aid in the malignant melanoma prevention and early detection”, in Proc. IEEE Southwest Symp. Image Anal. Interpretation (SSIAI), pp. 85-88, 2014.
[4] Soumya R S, Neethu S, Niju T S, Renjini A, Aneesh R. P, “Advanced Earlier Melanoma Detection Algorithm Using Colour Correlogram”, International Conference on Communication Systems and Networks (ComNet), Trivandrum, pp.190-194, 2016.
[5] P. A. Somnathe , P. P. Gumaste, “A System for Classification of Skin Lesions in Dermoscopic Images”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.175-179, 2016.
[6] Suganya R, “An Automated Computer Aided Diagnosis of Skin Lesions Detection and Classification for Dermoscopy Images”, International Conference On Recent Trends In Information Technology, 2016.
[7] M. W. Rashad, M. Takruri, “Automatic Non-Invasive Recognition of Melanoma Using Support Vector Machines”, 978-1-5090-4568-6/16/$31.00 IEEE, 2016.
[8] S. Jain, V. jagtap, N. Pise, “Computer aided Melanoma skin cancer detection using Image Processing”, International Conference on Intelligent Computing, Communication & Convergence, pp.735-740, 2015.
[9] T. Y. Tan, L. Zhang, M. Jiang, “An Intelligent Decision Support System for Skin Cancer Detection from Dermoscopic Images”, International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp.2194-2199, 2016.
Citation
S.S. Mane, S.V. Shinde, "Different Techniques for Skin Cancer Detection Using Dermoscopy Images," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.159-163, 2017.
Cyber Security Policies for Digital India: Challenges & Opportunities
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.164-168, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.164168
Abstract
India is perched on the cusp of computerized development. The administration has defeated its depreciators with a hawk looked at center to accomplish this objective for the nation. It is currently up to organizations to guarantee they are prepared and arranged to load and attempt the open doors this advancement will bring. The Indian government has lodged on a program to transform the nation into an advanced economy. It has make open a progression of activities—from presenting Digital Locker, which takes out the requirement for individuals to convey printed versions of reports issued by the administration, to demonetization, which has impelled the utilization of computerized installments the nation over. The move towards an advanced economy is probably going to help enact a new rush of financial development, draw in greater venture, and make new employments, over numerous divisions. Notwithstanding, it additionally represents a major test, that of cybersecurity. With the move towards a computerized economy, expanding measure of buyer and national information will be put away carefully and an extensive number of exchanges will be done on the web, by organizations, people and also government divisions. In any case, it additionally represents a major test, that of cybersecurity. With the move towards a computerized economy, expanding measure of shopper and national information will be put away carefully and a substantial number of exchanges will be completed on the web, by organizations, people and also government divisions. That makes India a greater focus for digital lawbreakers and programmers. Different partners, particularly Indian organizations, should be better arranged to deal with this risk. National cybersecurity technique is a fundamental component as cybersecurity is expected to ensure also, empower computerized economy.
Key-Words / Index Term
cybersecurity, Digital India, Online transaction, personal data security, national cybersecurity strategy, cyber threats, cybercrime.
References
[1] (October 2017) www.securingourecity.org
[2] (October 2017) www.ccdcoe.org
[3] (October 2017) www.smeru.or.id
[4] (2010 October-December 2017) ncrb.nic.in
[5] (2010 September-October 2017) www.internetlivestats.com
[6] (October 2017) http://www.business-standard.com/
Citation
Singh Anurag, Singh Brijmohan, "Cyber Security Policies for Digital India: Challenges & Opportunities," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.164-168, 2017.
An Adaptive Sorting Algorithm for Almost Sorted List
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.169-172, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.169172
Abstract
Sorting algorithm has a great impact on computing and also attracts a grand deal of research. Even though many sorting algorithms are evolved, there is always a scope of for a new one. As an example, Bubble sort was first analyzed in 1956, but due to the complexity issues it was not wide spread. Although many consider Bubble sort a solved problem, new sorting algorithms are still being evolved as per the problem scenarios (for example, library sort was first published in 2006 and its detailed experimental analysis was done in 2015) [11]. In this paper new adaptive sorting method Paper sort is introduced. The method is simple for sorting real life objects, where the input list is almost but not completely sorted. But, one may find it complex to implement when time-and-space trade-off is considered.
Key-Words / Index Term
Adaptive sort, Time complexity, Paper sort, Sorted list, Un-sorted list
References
[1] E. Horowitz, S. Sahani, “Fundamentals of Computer Algorithms”, Computer Science Press, Rockville, Md., 1998.
[2] D. Knuth, “The Art of Computer Programming”, volume 3 “Sorting and searching”, Second edition, Assison Wesley, 1998.
[3] C.L. Liu, “Analysis of Sorting Algorithms”, Proceedings of Switching and Automata Theory, 12th Annual Symposium, East Lansing, MI, USA, pp. 207-215, 1971.
[4] M. Devi, S. Charaya, “Enhancing the Efficiency of Radix sot by using clustering Mechanism: A Review”, IJSRD, Volume 4 Issue 5, pp.847- 850, 2016.
[5] J. Darlington, “A synthesis of several sorting algorithms”, Acta Informatica II, Springer-Verlag, pp. 1-30, 1978.
[6] John Darlington, Remarks on “A Synthesis of Several Sorting Algorithms”, Springer Berlin / Heidelberg”, Volume 13, March 1980, pp. 225-227.
[7] A. Andersson, T. Hagerup, S. Nilsson, R. Raman, Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, 1995.
[8] V. Paul, “Entropy, Search, Complexity- Algorithms by Kolmogorov Complexity (A Survey)”, Bolyai Society Springer, pp. 209-232, 2007
[9] R. Harter, “A Computer Environment for Beginners` Learning of Sorting Algorithms: Design and Pilot Evaluation”, ERIC, Journal Number 795978, Computers & Education, volume 51 No.2, pp. 708-723, 2008
[10] A. Bharadwaj, S. Mishra, “Comparison of Sorting Algorithms based on Input Sequences”, International Journal of Computer Applications, Volume 78 No.14, pp.7-10, 2013
[11] N. Faujdar, S. Ghrera, “A Detailed Experimental Analysis of Library sort Algorithm”, INDICON, IEEE, pp. 1-6, 2015
Citation
Rina Damdoo, Kanak Kalyani, "An Adaptive Sorting Algorithm for Almost Sorted List," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.169-172, 2017.
Exploring the dynamica virtus of Machine Learning (ML) in Human Resource Management - A Critical Analysis of IT industry
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.173-180, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.173180
Abstract
“A breakthrough in machine learning would be worth ten Microsofts”- -Bill Gates, Chairman, Microsoft The fact that humans have been progressing to reach a point where machine does most, if not all the mechanical labor is not new. What is new is the use of machines that is intelligent enough to replace humans in analyzing situations, portraying situations and scenarios, and then taking the (presumably) right decisions. This paper focuses on the use of machine learning that has replaced certain functions related to Human Resources Management, specifically in the IT industry. The paper is sectioned into five parts. In the first section the topic on hand is introduced, evolution of Machine Learning, introducing congruence of Machine Learning with HR functions such as Recruitment, Performance Management, Training & Development, Managing Attrition, Compensation Management etc. Section two, does a literature review that outlines the work previous written in this area i.e review of literature is done on this aspect. Section three takes a case study approach to highlight select IT companies that are using AI/ML for their HR functions. The fourth section attempts to design a simple Model from the literature review done. The fifth section presents the authors’ conclusion of the findings, and draws a futuristic picture.
Key-Words / Index Term
Machine Learning (ML), Replacing HR with ML, AI and HRM
References
[1] R. Press-Release, “Gartner Reveals Top Predictions for IT Organizations and Users for 2016 and Beyond.” [Online]. Available: http://www.gartner.com/newsroom/id/3143718. [Accessed: 05-May-2017].
[2] A. Kopoulos, “What Does Artificial Intelligence AI Mean for HR?,” EmployeeConnect, 16-Nov-2016. .
[3] M. M. Biro, “Can Machine Learning Make HR Better?,” TalentCulture, 10-Jan-2017. .
[4] M. Biro, “Will Technology Replace HR In 2016?,” Digitalist Magazine, 19-Feb-2016. [Online]. Available: http://www.digitalistmag.com/future-of-work/2016/02/19/will-technology-replace-hr-in-2016-04027669. [Accessed: 05-May-2017].
[5] A. C. Uzialko, B. N. D. S. W. D. 19, and 2016 08:31 am EST, “AI for HR: How Machine Learning Is Changing the Hiring Process,” Business News Daily. [Online]. Available: http://www.businessnewsdaily.com/9638-ai-hiring-big-data.html. [Accessed: 06-May-2017].
[6] D. Faggella, “Machine Learning in Human Resources - Applications and Trends -,” TechEmergence.com, 21-Feb-2017. [Online]. Available: https://www.techemergence.com/machine-learning-in-human-resources/. [Accessed: 06-May-2017].
[7] “Mark Tomassen Master Thesis.pdf.” .
[8] J. Meister, “The Future Of Work: The Intersection Of Artificial Intelligence And Human Resources,” Forbes. [Online]. Available: http://www.forbes.com/sites/jeannemeister/2017/03/01/the-future-of-work-the-intersection-of-artificial-intelligence-and-human-resources/. [Accessed: 06-May-2017].
[9] J. Faragher, “Artificial intelligence and HR tech grow in importance, Harvey Nash finds,” Personnel Today, 26-Jan-2017. [Online]. Available: http://www.personneltoday.com/hr/artificial-intelligence-hr-tech-grow-importance-harvey-nash-finds/. [Accessed: 06-May-2017].
[10] J. Barnett, “The role of artificial intelligence in people management - The Business Journals,” 21-Jun-2016. [Online]. Available: http://www.bizjournals.com/bizjournals/how-to/human-resources/2016/06/the-role-of-artificial-intelligence-in-people.html. [Accessed: 05-May-2017].
[11] R. Light, “How Artificial Intelligence Will Revolutionize Human Resources,” G2 Crowd, 17-Nov-2016.
[12] Maciamo, “Could a machine feel human-like emotions ?,” Life 2.0. [Online]. Available: //www.vitamodularis.org/articles/could_a_machine_feel_human-like_emotions.shtml. [Accessed: 05-May-2017].
[13]“/Users/michaelosborne/Documents/Research/future_of_employment_paper/old/.texpadtmp/future_of_employment_18.dvi - The_Future_of_Employment.pdf.” .
[14] K. V. Kurmanath, “Artificial Intelligence, machine learning make us a better bet in the cloud biz: Google,” The Hindu Business Line, 09-Mar-2017. [Online]. Available: http://www.thehindubusinessline.com/info-tech/google-says-ai-ml-make-it-a-better-bet-in-cloud-business/article9577341.ece. [Accessed: 05-May-2017].
[15] T. Collins, “Google’s DeepMind has created an AI that can learn like a human,” Mail Online, 15-Mar-2017. [Online]. Available: http://www.dailymail.co.uk/~/article-4315616/index.html. [Accessed: 05-May-2017].
[16] Press Release, “Machine Learning: What it is and why it matters.” [Online]. Available: https://www.sas.com/en_us/insights/analytics/machine-learning.html. [Accessed: 05-May-2017].
Citation
Malathi Sriram, L. Gandhi, "Exploring the dynamica virtus of Machine Learning (ML) in Human Resource Management - A Critical Analysis of IT industry," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.173-180, 2017.
Desktop Biometric: The Easy way for Biometric Authentication
Research Paper | Journal Paper
Vol.5 , Issue.12 , pp.181-186, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.181186
Abstract
Biometric is widely used as proper authentication of a person in an organization, Institute and at much more places. This is considered as original identification of one by offering different biometric techniques which includes Hand Biometric, Fingerprint Biometric, Face Biometric, Signature Biometric, Ear Recognition and many more. Considerably, every technique of biometric includes one or other negative outcome that enables one to use more technique to develop pure authentication of person. This paper reflects the use of personal fingerprint scanning biometric that gives proper giveaway of features of person’s identification. The proposed research presents the content in very detailed way from introduction to biometric with specifically concentrated to fingerprint biometric and then integrating that real-time data with JAVA based software testing and developing innovative college student attendance system. The benefits of using proposed software give a new way to allot ids to professors and students with automation of sending attendance with customized options for need.
Key-Words / Index Term
Biometric, Real time Attendance, Fingerprint Matching, Person identification, Arduino UNO
References
[1] R. Kumar, "Hand Image Biometric Based Personal Authentication System", Intelligent Techniques in Signal Processing for Multimedia Security, Springer International Publishing, pp. 201-226. 2017.
[2] V. E. Sharapova, O. Ivanova, G. Denis and S. Yuliia, "Web-based application to collect and analyze users data for keystroke biometric authentication," 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kyiv, Ukraine, pp. 917-922, 2017
[3] A. Ross, A. K. Jain, "Multimodal biometrics: An overview" Signal Processing Conference, 2004 12th European. IEEE, 2004.
[4] R Kumar, “Fingerprint matching using rotational invariant orientation local binary pattern descriptor and machine learning techniques”, International Journal of Computer Vision and Image Processing (IJCVIP), Vol. 7, No. 4, pp. 51-67, 2017.
[5] R. Kumar, P. Chandra, M. Hanmandlu, “A Robust Fingerprint Matching System Using Orientation Features”, Journal of information processing systems, Vol. 12, No. 1, pp. 83-99, 2016.
[6] N. K. Ratha, K. Karu, S. Chen, and A. K. Jain. "A real-time matching system for large fingerprint databases" Vol. 18, no. 8, 799-813, 1996.
[7] Barman, Subhas, et al. "An efficient fingerprint matching approach based on minutiae to minutiae distance using indexing with effectively lower time complexity." Information Technology (ICIT), 2014 International Conference on. IEEE, 2014.
[8] D. P. Lopresti, D. R. Jarret "The effectiveness of generative attacks on an online handwriting biometric." In AVBPA, pp. 1090-1099, 2005.
[9] K. Karl, C. Vielhauer, T. Scheidat, D. Franke, and J. Dittmann, "Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction" In Communications and Multimedia Security, pp. 178-190, 2010.
[10] P. Yan, K. W. Bowyer, "Biometric recognition using 3D ear shape." IEEE Transactions on pattern analysis and machine intelligence, Vol. 29, No. 8, pp. 1297-1308, 2007.
[11] J. Zuo, N. K. Ratha, J. H. Connell, " Cancelable iris biometric", In Pattern Recognition, 2008. ICPR 2008. 19th International Conference on, pp. 1-4, IEEE, 2008.
[12] H.Geoffrey, L. Deng, D. Yu, G. E. Dahl, A. Mohamed, N. Jaitly, A. Senior", Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups." IEEE Signal Processing Magazine, Vol. 29, No. 6, pp. 82-97, 2012.
[13] R. K. Das, , S. Jelil, S. R. M. Prasanna, "Development of multi-level speech based person authentication system", Journal of Signal Processing Systems, Vol. 88, No. 3, pp. 259-271, 2017.
[14] D. A. Kumar, T. U. Begum, "A Comparative Study on Fingerprint Matching Algorithms for EVM", Journal of Computer Sciences and Applications, Vol. 1, Issue 4, pp. 55-60, 2013.
[15] V. D. Bergh, B. T. Vermeulen, S. Pollin, "Analysis of Harmful Interference to and from Aerial IEEE 802.11 Systems", Proceedings of the First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, ACM, pp. 15-19, 2015.
[16] H. H.Teng, S. C. Jo, "Compact optical fingerprint capturing and recognition system", U.S. Patent No. 6,870,946. 22 Mar. 2005.
[17] Y. A. Badamasi, "The working principle of an Arduino." Electronics, Computer and Computation (ICECCO), 2014 11th International Conference on. IEEE, 2014.
[18] A. Ijari, "An Approach of Automated class Attendance using face recognition-Based on haar cascade classifier feature." Imperial Journal of Interdisciplinary Research Vo. 3, No.5, 2017.
Citation
Ravinder Kumar, Ramneek Kalra, "Desktop Biometric: The Easy way for Biometric Authentication," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.181-186, 2017.
A Survey on knowledge extraction Approaches from Big Data and Rectifying Misclassification strategies
Survey Paper | Journal Paper
Vol.5 , Issue.12 , pp.187-200, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.187200
Abstract
The amount of data is increasing now a days due to usage of portable resources like smart phones, tablets and many more for accessing social sites. The requirement to analyze such big data to extract meaningful data came into existence. Traditional methods have been explored by number of researchers to analyze such data. These methods removed faulty data, uncertain data or misclassified data for better analyses. But this leads to loss of data. There is need to take into consideration the rectification of uncertainty in aspect of big datasets also. So, In this paper we survey big data, some traditional methods for data analyses, advance methods for data analyses, issues related to these methods, misclassification concept, the survey of rectification techniques for high accuracy followed by bearer future scope.
Key-Words / Index Term
Big Data, Misclassification, Machine Learning, Knowledge, Discovery, Mining
References
[1] Weiss, Sholom M., and Nitin Indurkhya. Predictive data mining: a practical guide. Morgan Kaufmann, 1998.
[2] Basu, Sugato, and Prem Melville. "Weka Tutorial." ht-tp://www. cs. utexas. edu/users/ml/tutorials/Weka-tut.
[3] Fisher, Danyel, Rob DeLine, Mary Czerwinski, and Steven Drucker. "Interactions with big data analytics." interactions 19, no. 3 (2012): 50-59.
[4] Molodtsov, Dmitriy. "Soft set theory—first results." Computers & Mathematics with Applications 37, no. 4-5 (1999): 19-31.
[5] Marr, Bernard. "Big Data: 20 Mind-Boggling Facts Everyone Must Read." Forbes Magazine (2015).
[6] https://www.modeln.com/blog/high-tech/2016/10-interesting-facts-big-data/
[7] Tole, Alexandru Adrian. "Big data challenges." Database Systems Journal 4, no. 3 (2013): 31-40.
[8] Gantz, John, and David Reinsel. "The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east." IDC iView: IDC Analyze the future 2007, no. 2012 (2012): 1-16.
[9] Fisher, Danyel, Rob DeLine, Mary Czerwinski, and Steven Drucker. "Interactions with big data analytics." interactions 19, no. 3 (2012): 50-59.
[10] Press, Gil. "$16.1 billion big data market: 2014 predictions from IDC and IIA." Forbes. com (2013).
[11] Big data and analytics—an IDC four pillar research area, IDC, Tech. Rep. 2013.
[12] Laney, Doug. "3D data management: Controlling data volume, velocity and variety." META Group Research Note 6 (2001): 70.
[13] Sagiroglu, Seref, and Duygu Sinanc. "Big data: A review." In Collaboration Technologies and Systems (CTS), 2013 International Conference on, pp. 42-47. IEEE, 2013.
[14] The Big Bang: How the Big Data Explosion Is Changing the World - Microsoft UK Enterprise Insights Blog - Site Home - MSDN Blogs.
[15] Landset, Sara, Taghi M. Khoshgoftaar, Aaron N. Richter, and Tawfiq Hasanin. "A survey of open source tools for machine learning with big data in the Hadoop ecosystem." Journal of Big Data 2, no. 1 (2015): 24.
[16] Beyer, Mark A., and Douglas Laney. "The Importance of “Big Data”: A Definition. Gartner." (2012).
[17] Hashem, Ibrahim Abaker Targio, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar, Abdullah Gani, and Samee Ullah Khan. "The rise of “big data” on cloud computing: Review and open research issues." Information Systems 47 (2015): 98-115.
[18] Khan, Nawsher, Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Zakira Inayat, Waleed Kamaleldin Mahmoud Ali, Muhammad Alam, Muhammad Shiraz, and Abdullah Gani. "Big data: survey, technologies, opportunities, and challenges." The Scientific World Journal 2014 (2014).
[19] Kaisler, Stephen, Frank Armour, J. Alberto Espinosa, and William Money. "Big data: Issues and challenges moving forward." In System sciences (HICSS), 2013 46th Hawaii international conference on, pp. 995-1004. IEEE, 2013.
[20] Sandryhaila, Aliaksei, and Jose MF Moura. "Big data analysis with signal processing on graphs: Representation and processing of massive data sets with irregular structure." IEEE Signal Processing Magazine 31, no. 5 (2014): 80-90.
[21] Gantz, J., and D. Reinsel. "Extracting value from chaos technical report white paper." International Data Corporation (IDC) Sponsored by EMC Corporation (2011).
[22] Gantz, John, and David Reinsel. "The digital universe decade-are you ready." IDC White Paper (2010): 1-16.
[23] Mitchell, Tom M. "Machine learning. WCB." (1997).
[24] Russell, Stuart, Peter Norvig, and Artificial Intelligence. "A modern approach." Artificial Intelligence. Prentice-Hall, Egnlewood Cliffs 25 (1995): 27.
[25] Cherkassky, Vladimir, and Filip M. Mulier. Learning from data: concepts, theory, and methods. John Wiley & Sons, 2007.
[26] Mitchell, Tom Michael. The discipline of machine learning. Vol. 9. Carnegie Mellon University, School of Computer Science, Machine Learning Department, 2006.
[27] Rudin, Cynthia, and Kiri L. Wagstaff. "Machine learning for science and society." Machine Learning 95, no. 1 (2014): 1-9.
[28] Bishop, Christopher M. "Pattern recognition." Machine Learning 128 (2006): 1-58.
[29] Adam, Bernard, and Ian F. Smith. "Reinforcement learning for structural control." Journal of Computing in Civil Engineering 22, no. 2 (2008): 133-139.
[30] Jones, Nicola. "The learning machines." Nature 505, no. 7482 (2014): 146.
[31] Langford, John. "Tutorial on practical prediction theory for classification." Journal of machine learning research 6, no. Mar (2005): 273-306.
[32] Bekkerman, Ron, Ran El-Yaniv, Naftali Tishby, and Yoad Winter. "Distributional word clusters vs. words for text categorization." Journal of Machine Learning Research 3, no. Mar (2003): 1183-1208.
[33] Burch, Carl. "A survey of machine learning." Tech. report, Pennsylvania Governor`s School for the Sciences (2001).
[34] Zheng, Jun, Furao Shen, Hongjun Fan, and Jinxi Zhao. "An online incremental learning support vector machine for large-scale data." Neural Computing and Applications 22, no. 5 (2013): 1023-1035.
[35] Cortes, Corinna, and Vladimir Vapnik. "Support-vector networks." Machine learning 20, no. 3 (1995): 273-297.
[36] Dong, Xu, Ying Li, Chun Wu, and Yueming Cai. "A learner based on neural network for cognitive radio." In Communication Technology (ICCT), 2010 12th IEEE International Conference on, pp. 893-896. IEEE, 2010.
[37] Safatly, Lise, Mario Bkassiny, Mohammed Al-Husseini, and Ali El-Hajj. "Cognitive radio transceivers: RF, spectrum sensing, and learning algorithms review." International Journal of Antennas and Propagation 2014 (2014).
[38] Galindo-Serrano, Ana, and Lorenza Giupponi. "Distributed Q-learning for aggregated interference control in cognitive radio networks." IEEE Transactions on Vehicular Technology 59, no. 4 (2010): 1823-1834.
[39] Sutton, Richard S. "Learning to predict by the methods of temporal differences." Machine learning 3, no. 1 (1988): 9-44.
[40] O. Okun, G. Valentini, (Eds.), Supervised and Unsupervised Ensemble Methods and their Applications Studies in Computational Intelligence, vol. 126, Springer, Heidelberg, 2008.
[41] Abaei, Golnoush, Ali Selamat, and Hamido Fujita. "An empirical study based on semi-supervised hybrid self-organizing map for software fault prediction." Knowledge-Based Systems 74 (2015): 28-39.
[42] Abdi, Amir, Suvi Heinonen, Christopher Juhlin, and Tuomo Karinen. "Constraints on the geometry of the Suasselkä post-glacial fault, northern Finland, based on reflection seismic imaging." Tectonophysics 649 (2015): 130-138.
[43] Audet, Patrick, Bradley D. Pinno, and Evelyne Thiffault. "Reclamation of boreal forest after oil sands mining: anticipating novel challenges in novel environments." Canadian Journal of Forest Research 45, no. 3 (2014): 364-371.
[44] Bissig, Thomas, Alan H. Clark, Amelia Rainbow, and Allan Montgomery. "Physiographic and tectonic settings of high-sulfidation epithermal gold–silver deposits of the Andes and their controls on mineralizing processes." Ore Geology Reviews 65 (2015): 327-364.
[45] Botros, N. S. "The role of the granite emplacement and structural setting on the genesis of gold mineralization in Egypt." Ore Geology Reviews 70 (2015): 173-187.
[46] Karapetrou, S., M. Manakou, D. Bindi, B. Petrovic, and K. Pitilakis. "“Time-building specific” seismic vulnerability assessment of a hospital RC building using field monitoring data." Engineering Structures 112 (2016): 114-132.
[47] Khan, Salman H., M. Ali Akbar, Farrukh Shahzad, Mudassar Farooq, and Zeashan Khan. "Secure biometric template generation for multi-factor authentication." Pattern Recognition 48, no. 2 (2015): 458-472.
[48] Moss, S., J. Melia, J. Sutton, C. Mathews, and M. Kirby. "Prostate‐specific antigen testing rates and referral patterns from general practice data in England." International journal of clinical practice 70, no. 4 (2016): 312-318.
[49] Naoi, Makoto, Masao Nakatani, Kenshiro Otsuki, Yasuo Yabe, Thabang Kgarume, Osamu Murakami, Thabang Masakale et al. "Steady activity of microfractures on geological faults loaded by mining stress." Tectonophysics 649 (2015): 100-114.
[50] Pavel, Ana B., Dmitriy Sonkin, and Anupama Reddy. "Integrative modeling of multi-omics data to identify cancer drivers and infer patient-specific gene activity." BMC systems biology 10, no. 1 (2016): 16.
[51] Sang, Jitao, Yue Gao, Bing-kun Bao, Cees Snoek, and Qionghai Dai. "Recent advances in social multimedia big data mining and applications." Multimedia Systems 22, no. 1 (2016): 1-3.
[52] Tosun, Suleyman, Vahid B. Ajabshir, Ozge Mercanoglu, and Ozcan Ozturk. "Fault-tolerant topology generation method for application-specific network-on-chips." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, no. 9 (2015): 1495-1508.
[53] Yang, Chunsheng, Yanni Zou, Pinhua Lai, and Nan Jiang. "Data mining-based methods for fault isolation with validated FMEA model ranking." Applied Intelligence 43, no. 4 (2015): 913-923.
[54] Zhang, Yongshuang, Changbao Guo, Hengxing Lan, Nengjuan Zhou, and Xin Yao. "Reactivation mechanism of ancient giant landslides in the tectonically active zone: a case study in Southwest China." Environmental Earth Sciences 74, no. 2 (2015): 1719-1729.
[55] Zimek, Arthur, and Jilles Vreeken. "The blind men and the elephant: On meeting the problem of multiple truths in data from clustering and pattern mining perspectives." Machine Learning 98, no. 1-2 (2015): 121-155.
[56] Gong, Ke, Panpan Wang, and Yi Peng. "Fault-tolerant enhanced bijective soft set with applications." Applied Soft Computing (2016).
[57] Haseena, Hassan H., Paul K. Joseph, and Abraham T. Mathew. "Classification of arrhythmia using hybrid networks." Journal of medical systems 35, no. 6 (2011): 1617-1630.
[58] Kumar, S. Udhaya, H. Hannah Inbarani, and S. Senthil Kumar. "Improved bijective-soft-set-based classification for gene expression data." In Computational Intelligence, Cyber Security and Computational Models, pp. 127-132. Springer India, 2014.
[59] Senthilkumar, S., H. Hannah Inbarani, and S. Udhayakumar. "Modified soft rough set for multiclass classification." In Computational Intelligence, Cyber Security and Computational Models, pp. 379-384. Springer India, 2014.
[60] Wei, Song, Hani Hagras, and Daniyal Alghazzawi. "A cloud computing based Big-Bang Big-Crunch fuzzy logic multi classifier system for Soccer video scenes classification." Memetic Computing 8, no. 4 (2016): 307-323.
[61] Fernández, Alberto, Sara del Río, Abdullah Bawakid, and Francisco Herrera. "Fuzzy rule based classification systems for big data with MapReduce: granularity analysis." Advances in Data Analysis and Classification (2016): 1-20.
[62] Nelles, Oliver. "Unsupervised Learning Techniques." In Nonlinear System Identification, pp. 137-155. Springer Berlin Heidelberg, 2001.
[63] Bengio, Yoshua, Aaron Courville, and Pascal Vincent. "Representation learning: A review and new perspectives." IEEE transactions on pattern analysis and machine intelligence 35, no. 8 (2013): 1798-1828.
[64] Huang, Fei, and Alexander Yates. "Biased representation learning for domain adaptation." In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, pp. 1313-1323. Association for Computational Linguistics, 2012.
[65] Tu, Wenting, and Shiliang Sun. "Cross-domain representation-learning framework with combination of class-separate and domain-merge objectives." In Proceedings of the 1st International Workshop on Cross Domain Knowledge Discovery in Web and Social Network Mining, pp. 18-25. ACM, 2012.
[66] Li, Shou-Shan, Chu-Ren Huang, and Cheng-Qing Zong. "Multi-domain sentiment classification with classifier combination." Journal of Computer Science and Technology 26, no. 1 (2011): 25-33.
[67] F Huang, E Yates, Exploring representation-learning approaches to domain adaptation, in Proceedings of the 2010 Workshop on Domain Adaptation for Natural Language Processing (Uppsala, 2010), pp. 23–30
[68] A Bordes, X Glorot, JWAY Bengio, Joint learning of words and meaning representations for open-text semantic parsing, in Proceedings of 15th International Conference on Artificial Intelligence and Statistics (La Palma, 2012), pp. 127–135
[69] N. Boulanger-Lewandowski, Y. Bengio, P. Vincent, Modeling temporal dependencies in high-dimensional sequences: application to polyphonic music generation and transcription. arXiv preprint (2012). arXiv:1206.6392
[70] K Dwivedi, K Biswaranjan, A Sethi, Drowsy driver detection using representation learning, in Proceedings of the IEEE International Advance Computing Conference (Gurgaon, 2014), pp. 995–999
[71] D Yu, L Deng, Deep learning and its applications to signal and information processing. IEEE Signal Proc Mag 28(1), 145–154 (2011)
[72] I Arel, DC Rose, TP Karnowski, Deep machine learning-a new frontier in artificial intelligence research. IEEE Comput Intell Mag 5(4), 13–18 (2010)
[73] Y Bengio, Learning deep architectures for AI. Foundations Trends Mach Learn 2(1), 1–127 (2009)
[74] R Collobert, J Weston, L Bottou, M Karlen, K Kavukcuoglu, P Kuksa, Natural language processing (almost) from scratch. J Mach Learn Res 12, 2493–2537 (2011)
[75] P Le Callet, C Viard-Gaudin, D Barba, A convolutional neural network approach for objective video quality assessment. IEEE Trans Neural Networ 17(5), 1316–1327 (2006)
[76] GE Dahl, D Yu, L Deng, A Acero, Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition. IEEE Trans Audio Speech Lang Proc 20(1), 30–42 (2012)
[77] G Hinton, L Deng, Y Dong, GE Dahl, A Mohamed, N Jaitly, A Senior, V Vanhoucke, P Nguyen, TN Sainath, B Kingsbury, Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Proc Mag 29(6), 82–97 (2012)
[78] DC Ciresan, U Meier, LM Gambardella, J Schmidhuber, Deep, big, simple neural nets for handwritten digit recognition. Neural Comput 22(12), 3207–3220(2010)
[79] D Peteiro-Barral, B Guijarro-Berdiñas, A survey of methods for distributed machine learning. Progress in Artificial Intelligence 2(1), 1–11 (2012)
[80] H Zheng, SR Kulkarni, HV Poor, Attribute-distributed learning: models, limits,and algorithms. IEEE Trans Signal Process 59(1), 386–398 (2011)
[81] H Chen, T Li, C Luo, SJ Horng, G Wang, A rough set-based method for updating decision rules on attribute values’ coarsening and refining. IEEE Trans Knowl Data Eng 26(12), 2886–2899 (2014)
[82] J Chen, C Wang, R Wang, Using stacked generalization to combine SVMs in magnitude and shape feature spaces for classification of hyperspectral data. IEEE Trans Geosci Remote 47(7), 2193–2205 (2009)
[83] E Leyva, A González, R Pérez, A set of complexity measures designed for applying meta-learning to instance selection. IEEE Trans Knowl Data Eng 27(2), 354–367 (2014)
[84] M Sarnovsky, M Vronc, Distributed boosting algorithm for classification of text documents, in Proceedings of the 12th IEEE International Symposium on Applied Machine Intelligence and Informatics (SAMI) (Herl`any, 2014), pp. 217–220
[85] SR Upadhyaya, Parallel approaches to machine learning—a comprehensive survey. J Parallel Distr Com 73(3), 284–292 (2013)R Bekkerman, M Bilenko, J Langford, Scaling up machine learning: parallel and distributed approaches (Cambridge University Press, Oxford, 2011)
[86] EW Xiang, B Cao, DH Hu, Q Yang, Bridging domains using world wide knowledge for transfer learning. IEEE Trans Knowl Data Eng 22(6), 770–783 (2010)
[87] SJ Pan, Q Yang, A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10), 1345–1359 (2010)
[88] W Fan, I Davidson, B Zadrozny, PS Yu, An improved categorization of classifier’s sensitivity on sample selection bias, in Proceedings of the 5th IEEE International Conference on Data Mining (ICDM) (Brussels, 2012), pp. 605–608
[89] J Gao, W Fan, J Jiang, J Han, Knowledge transfer via multiple model local structure mapping, in Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Las Vegas, 2008), pp. 283-291
[90] C Wang, S Mahadevan, Manifold alignment using procrustes analysis, in Proceedings of the 25th International Conference on Machine Learning (ICML) (Helsinki, 2008), pp. 1120–1127
[91] X Ling, W Dai, GR Xue, Q Yang, Y Yu, Spectral domain-transfer learning, in Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Las Vegas, 2008), pp. 488–496
[92] R Raina, AY Ng, D Koller, 2006, Constructing informative priors using transfer learning, in Proceedings of the 23rd International Conference on Machine Learning (ICML) (Pittsburgh, 2006), pp. 713–720
[93] J Zhang, Deep transfer learning via restricted Boltzmann machine for document classification, in Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops (ICMLA) (Honolulu,2011), pp. 323–326
[94] Y Fu, B Li, X Zhu, C Zhang, Active learning without knowing individual instance labels: a pairwise label homogeneity query approach. IEEE Trans Knowl Data Eng 26(4), 808–822 (2014)
[95] B Settles, Active learning literature survey (University of Wisconsin, Madison, 2010) MM Crawford, D Tuia, HL Yang, Active learning: any value for classification of remotely sensed data? P IEEE 101(3), 593–608 (2013)
[96] MM Haque, LB Holder, MK Skinner, DJ Cook, Generalized query-based active learning to identify differentially methylated regions in DNA. IEEE ACM Trans Comput Bi 10(3), 632–644 (2013)
[97] D Tuia, M Volpi, L Copa, M Kanevski, J Munoz-Mari, A survey of active learning algorithms for supervised remote sensing image classification. IEEE J Sel Top Sign Proces 5(3), 606–617 (2011)
[98] G Ding, Q Wu, YD Yao, J Wang, Y Chen, Kernel-based learning for statistical signal processing in cognitive radio networks. IEEE Signal Proc Mag 30(4), 126–136 (2013)
[99] C Li, M Georgiopoulos, GC Anagnostopoulos, A unifying framework for typical multitask multiple kernel learning problems. IEEE Trans Neur Net Lear Syst 25(7), 1287–1297 (2014)
[100] G Montavon, M Braun, T Krueger, KR Muller, Analyzing local structure in kernel-based learning: explanation, complexity, and reliability assessment. IEEE Signal Proc Mag 30(4), 62–74 (2013)
[101] K Slavakis, S Theodoridis, I Yamada, Online kernel-based classification using adaptive projection algorithms. IEEE Trans Signal Process 56(7), 2781–2796 (2008)
[102] S Theodoridis, K Slavakis, I Yamada, Adaptive learning in a world of projections. IEEE Signal Proc Mag 28(1), 97–123 (2011)
[103] K Slavakis, S Theodoridis, I Yamada, Adaptive constrained learning in reproducing kernel Hilbert spaces: the robust beamforming case. IEEE Trans Signal Process 57(12), 4744–4764 (2009)
[104] K Slavakis, P Bouboulis, S Theodoridis, Adaptive multiregression in reproducing kernel Hilbert spaces: the multiaccess MIMO channel case. IEEE Trans Neural Netw Learn Syst 23(2), 260–276 (2012)
[105] KR Müller, S Mika, G Rätsch, K Tsuda, B Schölkopf, An introduction to kernel based learning algorithms. IEEE Trans Neural Networ 12(2), 181–201 (2001)
[106] Kocaguneli, Ekrem, Tim Menzies, and Emilia Mendes. "Transfer learning in effort estimation." Empirical Software Engineering 20, no. 3 (2015): 813-843.
[107] Bengio, Yoshua, Aaron Courville, and Pascal Vincent. "Representation learning: A review and new perspectives." IEEE transactions on pattern analysis and machine intelligence 35, no. 8 (2013): 1798-1828.
[108] Van Hulse J, Khoshgoftaar T. Knowledge discovery from imbalanced and noisy data. Data Knowl Eng. 2009;68(12):1513–42.
[109] Khoshgoftaar TM, Hulse JV. Imputation techniques for multivariate missingness in software measurement data.Software Quality J. 16(4):563–600; 2008.
[110] Khoshgoftaar TM, Van Hulse J, Napolitano A. Comparing boosting and bagging techniques with noisy and imbalanced data. Syst Man Cybern Part A Syst Hum IEEE Trans. 2011;41(3):552–68.
[111] Van Hulse J, Khoshgoftaar TM, Napolitano A. Experimental perspectives on learning from imbalanced data. In:Proceedings of the 24th International Conference on Machine Learning; 2007. pp. 935–42.
[112] Hogan JM, Peut T. Large Scale Read Classification for Next Generation Sequencing. Procedia Comput Sci.2014;29:2003–12.
[113] Sun K, Miao W, Zhang X, Rao R. An Improvement to Feature Selection of Random Forests on Spark. In: 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE); 2014. pp. 774–9.
[114] Ooi, Beng Chin, Kian-Lee Tan, Sheng Wang, Wei Wang, Qingchao Cai, Gang Chen, Jinyang Gao et al. "SINGA: A distributed deep learning platform." In Proceedings of the 23rd ACM international conference on Multimedia, pp. 685-688. ACM, 2015.
[115] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell.Ca_e: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093, 2014.
[116] M. Lin, S. Li, X. Luo, and S. Yan. Purine: A bi-graph based deep learning framework. CoRR, abs/1412.6249,2014.
[117] N. Vasilache, J. Johnson, M. Mathieu, S. Chintala, S. Piantino, and Y. LeCun. Fast convolutional nets with fb_t: A GPU performance evaluation. CoRR, abs/1412.7580, 2014.
[118] Zaharia, Matei, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. "Spark: Cluster Computing with Working Sets." HotCloud 10, no. 10-10 (2010): 95.
[119] T. White, Hadoop: The Definitive Guide, O’Reilly Media, 2009.
[120] Caudill, Steven B., and Franklin G. Mixon. "Analysing misleading discrete responses: A logit model based on misclassified data." Oxford Bulletin of Economics and Statistics 67, no. 1 (2005): 105-113.
[121] Brodley, Carla E., and Mark A. Friedl. "Identifying mislabeled training data." Journal of Artificial Intelligence Research 11 (1999): 131-167.
[122] Miranda, André LB, Luís Paulo F. Garcia, André CPLF Carvalho, and Ana C. Lorena. "Use of classification algorithms in noise detection and elimination." In International Conference on Hybrid Artificial Intelligence Systems, pp. 417-424. Springer Berlin Heidelberg, 2009.
[123] Van den Hout, Ardo, and Peter GM Van der Heijden. "The analysis of multivariate misclassified data with special attention to randomized response data." Sociological Methods & Research 32, no. 3 (2004): 384-410.
[124] Bilgic, Mustafa, and Lise Getoor. "Reflect and correct: A misclassification prediction approach to active inference." ACM Transactions on Knowledge Discovery from Data (TKDD) 3, no. 4 (2009): 20.
[125] Ciraco, Michelle, Michael Rogalewski, and Gary Weiss. "Improving classifier utility by altering the misclassification cost ratio." In Proceedings of the 1st international workshop on Utility-based data mining, pp. 46-52. ACM, 2005.
[126] Healy, J. D. "The effects of misclassification error on the estimation of several population proportions." Bell System Technical Journal 60, no. 5 (1981): 697-705.
[127] Smith, Michael R., Tony Martinez, and Christophe Giraud-Carrier. "An instance level analysis of data complexity." Machine learning 95, no. 2 (2014): 225-256.
[128] Evans, Robert. "Apache storm, a hands on tutorial." In Cloud Engineering (IC2E), 2015 IEEE International Conference on, pp. 2-2. IEEE, 2015.
[129] Olston, Christopher, Benjamin Reed, Utkarsh Srivastava, Ravi Kumar, and Andrew Tomkins. "Pig latin: a not-so-foreign language for data processing." In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pp. 1099-1110. ACM, 2008.
[130] Presutti, Valentina, Francesco Draicchio, and Aldo Gangemi. "Knowledge extraction based on discourse representation theory and linguistic frames." In International Conference on Knowledge Engineering and Knowledge Management, pp. 114-129. Springer Berlin Heidelberg, 2012.
[131] Brown, Samuel DJ, Rupert A. Collins, Stephane Boyer, MARIE‐CAROLINE LEFORT, J. A. G. O. B. A. MALUMBRES‐OLARTE, Cor J. Vink, and Robert H. Cruickshank. "Spider: an R package for the analysis of species identity and evolution, with particular reference to DNA barcoding." Molecular Ecology Resources 12, no. 3 (2012): 562-565.
[132] Mika, Sebastian, Bernhard Schölkopf, Alexander J. Smola, Klaus-Robert Müller, Matthias Scholz, and Gunnar Rätsch. "Kernel PCA and De-noising in feature spaces." In NIPS, vol. 11, pp. 536-542. 1998.
[133] Zucker, David M., and Donna Spiegelman. "Corrected score estimation in the proportional hazards model with misclassified discrete covariates." Statistics in medicine 27, no. 11 (2008): 1911-1933.
[134] Yuan, Yang C. "Multiple imputation for missing data: Concepts and new development (Version 9.0)." SAS Institute Inc, Rockville, MD 49 (2010): 1-11.
[135] Zucker, David M., and Donna Spiegelman. "Corrected score estimation in the proportional hazards model with misclassified discrete covariates." Statistics in medicine 27, no. 11 (2008): 1911-1933.Akazawa K, Kinukawa N, Nakamura T. A note on the corrected score function corrected formisclassification. Journal of the Japan Statistical Society. 1998; 28:115–123.
[136] Nakamura T. Corrected score function of errors-in-variables models: methodology and application to generalized linear models. Biometrika. 1990; 77:127–137.
[137] Spiegelman, Donna, Aidan McDermott, and Bernard Rosner. "Regression calibration method for correcting measurement-error bias in nutritional epidemiology." The American journal of clinical nutrition 65, no. 4 (1997): 1179S-1186S.
[138] Gaurav Jain, Kunal Gupta, Arpit Kushwah, Abhishek Agrawal, "A Survey on Various Issues Big Data in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.131-134, 2017.
Citation
Jyoti Arora, Ambica Sood, "A Survey on knowledge extraction Approaches from Big Data and Rectifying Misclassification strategies," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.187-200, 2017.