Explanation behind the less hot Core of the sun than its Corona
Review Paper | Journal Paper
Vol.5 , Issue.10 , pp.144-145, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.144145
Abstract
Core region of the sun is less hot due to absorption of thermonuclear fission (Demass) energy emitted from the Corona. Thermonuclear fusion (Enmass) process is going on the Core region continuously where Hydrogen is converted into Helium. Core region of the sun is gradually expanding. Due to the above cause the Corona region is hotter than Core.
Key-Words / Index Term
Enmass, Demass, Corona, Core
References
[1] https://en.wikipedia.org/wiki/Corona.
[2] https://www.nasa.gov/feature/goddard/sounding-rockets/strong-evidence-for-coronal-heating-theory-presented-at-2015-tess-meeting/
Citation
Kisalaya Chakrabarti, "Explanation behind the less hot Core of the sun than its Corona," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.144-145, 2017.
A Comparative Review of Various Approaches for Skin Cancer Detection
Review Paper | Journal Paper
Vol.5 , Issue.10 , pp.146-152, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.146152
Abstract
Classification of skin cancer gives the best chance of being diagnosed early. Biopsy method for skin cancer detection is much painful. Human interpretation contains difficulty and subjectivity therefore automated analysis of skin cancer affected images has become important. This paper proposes an automatic medical image classification method to classify two major type skin cancers: Melanoma and Non-melanoma. In this paper, we have used the color and texture features in combination which give better results than using color or gray level information alone. We have used k-means clustering algorithm to segment the lesion. The features are extracted by four different color-texture feature extractors from the segmented images. DullRazor technique is used to eliminate surrounding hairs. Classification accuracy of our proposed system is evaluated on four different types of classifiers and their values are compared with one another. The results of the proposed system are computed on five different classification rates in order to perform better analysis of our proposed system. SVM outperforms among all other classifiers with accuracy of 76.69%.
Key-Words / Index Term
Grey Level Co-occurrence Matrices, Support Vector Ma-chine, Local Binary Patterns, Texture features, color percentiles, K-means clustering, Cooccurence Matrix, Color Features, Integrative Cooccurence Matrix, Gabor Features, Linear Classifier, NN Classifiers, NMC Classifiers, Cross-validation.
References
[1] E. Linos, S.M. Swetter, M.G. Cockburn, G.A. Colditz, and C.A. Clarke, “Increasing burden of melanoma in the United States,” Journal of Investigative Dermatology, vol. 129, no. 7, pp. 1666– 1674, 2009.
[2] J. Mayer, “Systematic review of the diagnostic accuracy of dermatoscopy in detecting malignant melanoma,” Medical Journal of Australia, vol. 167, no. 4, pp. 206–210, 1997.
[3] J. K. Robinson and R. Turrisi, “Skills training to learn discrimination of ABCDE criteria by those at risk of developing melanoma,” Archives of Dermatology, vol. 142, no. 4, pp. 447– 452, 2006.
[4] M. E. Celebi, H. Iyatomi, G. Schaefer, and W.V. Stoecker, “Lesion Border Detection in Dermoscopy Images," Computerized Medical Imaging and Graphics, vol. 33, no. 2, pp. 148-153, 2009.
[5] H. Iyatomi, et al., “An Improved Internet-based Melanoma Screening System with Dermatologist-like Tumor Area Extraction Algorithm," Computerized Medical Imaging and Graphics, vol. 32, no. 7, pp. 566-579, 2008.
[6] R. Garnavi, M. Aldeen, M.E. Celebi, G. Varigos, and S. Finch, “Border Detection in Dermoscopy Images Using Hybrid Thresholding on Optimized Color Channels," Computerized Medical Imaging and Graphics, vol. 35, no. 2, pp. 105-115, 2011.
[7] H. Zhou, et al., “Spatially Constrained Seg- mentation of Dermoscopy Images," in Proceedings of the 5th IEEE International Symposium on Biomedical Imaging, pp. 800-803, 2008.
[8] P. Schmid, “Segmentation of Digitized Dermatoscopic Images by Two-Dimensional Color Clustering," IEEE Transactions on Medical Imaging, vol. 18, no. 2, pp. 164-171, 1999.
[9] H. Zhou, G. Schaefer, A. Sadka, and M. E. Celebi, “Anisotropic Mean Shift Based Fuzzy C-Means Segmentation of Dermoscopy Images," IEEE Journal of Selected Topics in Signal Processing, vol. 3, no. 1, pp. 26-34, 2009.
[10] M. Mete, S. Kockara, and K. Aydin, “Fast Density-Based Lesion Detection in Der-moscopy Images," Computerized Medical Imaging and Graphics, vol. 35, no. 2, pp. 128-136, 2011.
[11] R. Melli, C. Grana, and R. Cucchiara, “Comparison of Color Clustering Algorithms for Segmentation of Dermatological Images," in Proceedings of the SPIE Medical Imaging Conference, pp. 1211-1219, 2006.
[12] B. Erkol, R. H. Moss, R. J. Stanley, W. V. Stoecker, and E. Hvatum, “Automatic Lesion Boundary Detection in Dermoscopy Images Using Gradient Vector Flow Snakes," Skin Research and Technology, vol. 11, no. 1, pp. 17-26, 2005.
[13] H. Zhou, et al., “Gradient Vector Flow with Mean Shift for Skin Lesion Segmentation," Computerized Medical Imaging and Graphics, vol. 35, no. 2, pp. 121-127, 2011.
[14] Q. Abbas, M. E. Celebi, and I. F. Garcia, “A Novel Perceptually-Oriented Approach for Skin Tumor Segmentation," International Journal of Innovative Computing, In-formation and Control, vol. 8, no. 3, pp. 1837-1848, 2012.
[15] M. E. Celebi, et al., “Unsupervised Border Detection in Dermoscopy Images," Skin Research and Technology, vol. 13, no. 4, pp. 454-462, 2007.
[16] M. E. Celebi, et al., “Border detection in Dermoscopy Images Using Statistical Region Merging”, Kins Research and Technology, vol. 14,no. 3, pp. 347-353, 2008.
[17] T. Wang, et al., “Modified Watershed Technique and Post-Processing for Segmentation of Skin Lesions in Dermoscopy Images," Computerized Medical Imaging and Graphics, vol. 35, no. 2, pp. 116-120, 2011.
[18] Q. Abbas, M. E. Celebi, I. F. Garcia, and M. Rashid, ”Lesion Border Detection in Dermoscopy Images Using Dynamic Programming," Skin Research and Technology, vol. 17, no. 1, pp. 91-100, 2011.
[19] Q. Abbas, M. E. Celebi, and I. F. Garcia, “Skin Tumor Area Extraction Using an Improved Dynamic Programming Approach," Skin Research and Technology, vol. 18, no. 2, pp. 133-142, 2012.
[20] G. Schaefer, M.I. Rajab, M.E. Celebi, and H. Iyatomi, “Colour and Contrast En-hancement for Improved Skin Lesion Segmentation," Computerized Medical Imag-ing and Graphics, vol. 35, no. 2, pp. 99-104, 2011.
[21] P. Wighton, T. K. Lee, H. Lui, D. I. McLean, and M. S. Atkins, “Generalizing Common Tasks in Automated Skin Lesion Diagnosis," IEEE Transactions on Infor-mation Technology in Biomedicine, vol. 15, no. 4, pp. 622-629, 2011.
[22] V. K. Dehariya, S. K. Shrivastava, R. C. Jain,“Clustering of Image Data Set Using K-Means and Fuzzy K-Means Algorithms ” , International conference on CICN, pp. 386- 391, 2010.
[23] Vijay Jumb, Mandar Sohani, Avinash Shrivas, “Color Image Segmentation Using K-Means Clustering and Otsu’s Adaptive Thresholding,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), February 2014.
[24] J. F. Aitken, et al., “Reliability of computer image analysis of Pigmented skin lesions of Australian adolescents,” Journal of Cancer, vol. 78, no. 2, pp. 252–257, 1996.
[25] A.Green, N. Martin, J. Pfitzner, M. O’Rourke, and N.Knight, “Computer image analysis in the diagnosis of melanoma,” Journal of the American Academy of Dermatology, vol. 31, no. 6, pp. 958–964, 1994.
[26] H. C. Lee, Skin Cancer Diagnosis Using Hierarchical Neural Networks and Fuzzy Logic, Department of Computer Science, University of Missouri, Rolla, Mo, USA, 1994.
[27] S. Seidenari, M. Burroni, G. Dell’Éva, P.Pepe, and B.Belletti, “Computerized evaluation of pigmented skin lesion images recorded by a videomicroscope: comparison between polarizing mode observation and oil/slide mode observation,” Skin Research and Technology, vol. 1, no. 4, pp. 187–191, 1995.
[28] K. Ramlakhan and Y. Shang, “A mobile automated skin lesion classification sys-tem,” in Proceedings of the 23rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI ’11), pp. 138–141, November 2011.
[29] N. Cascinelli, et al., “Results obtained by using a com-puterized image analysis system designed as an aid to diagnosis of cutaneous melanoma,” Melanoma Research, vol. 2, no. 3, pp. 163–170, 1992.
[30] Francesco Bianconia, et al., “Automatic classification of granite tiles through colour and texture features”, Preprint submitted to Expert Systems with Applications, February 20, 2012.
[31] Ammara Masood and Adel Ali Al-Jumaily, “Computer Aided Diagnostic Support System for Skin Cancer: A Review of Techniques and Algorithms” Hindawi Pub-lishing Corporation International Journal of Biomedical Imaging, Volume 2013.
[32] T. Ojala, M. Pietikainen, and T. Maenpaa, "Multiresolution gray-scale and rotation invariant texture classification with Local Binary Patterns". IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:971-987, 2002.
[33] Niskanen, M., Silven, O., Kauppinen, H., June 2001. “Color and texture based wood inspection with non-supervised clustering”, Proceedings of the 12th Scandivanian Conference on Image Analysis. Bergen, Norway, pp. 336–342, 2001 .
[34] Arvis, V., et al., Generalization of the cooccurrence matrix for colour images: application to colour texture classification. Image Analysis and Stereology 23 (3), 63–72, 2004.
[35] Palm, C., “Colour texture classification by integrative co-occurrence matrices”, Pat-tern Recognition 37 (5), 965–976, 2004.
[36] F. Bianconi and A. Fernandez., "Evaluation of the effects of Gabor filter parameters on texture classification". Pattern Recognition, 40:3325-3335, 2007.
[37] F. Bianconi, et al., Robust color texture features based on ranklets and discrete Fourier transform. Journal of Electronic Imaging, 18:043012-1-8, 2009.
[38] M. Masotti and R. Campanini., "Texture classification using invariant ranklet fea-tures", Pattern Recognition Letters, 29:1980-1986, 2008.
[39] Scholkopf, B., Smola, A., “Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond”, MIT Press, 2002.
[40] Hsu, et al., “A Practical Guide to Support Vector Classification”, Tech. rep., Department of Computer Science National Taiwan University, 2010.
[41] B.Gohila vani, A. Selvaraj, M. Vijayapriya, N.Anandh, “Segmentation and Classification of Skin Lesions Based on Texture Features”, Int. Journal of Engineering Research and Applications, December 2014
[42] R. Maurya ,S.K. Singh, A. K. Maurya, A. Kumar, "GLCM and Multi Class Support vector machine based automated skin cancer classification IEEE Con-ference", Page(s):444 - 447Print ISBN:978-93-80544-10-6 INSPEC Accession Num-ber:14382783, 5-7 March 2014
Citation
R. Maurya, A. Singh, V. Srivastava, R. Yadav, "A Comparative Review of Various Approaches for Skin Cancer Detection," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.146-152, 2017.
Effect of AR (2) Model on the Economic Design Mean Chart with Known Coefficient of Variation Under Non Normal Population
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.153-169, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.153169
Abstract
In this paper, we have studied the effect of AR (2) model and non-normality on the economic design of mean chart with known coefficient of variation under non normal population. We use the first four terms of an Edgeworth series for the production cycle time and cost parts. In AR (2) model three different situations arise as (i) Roots are real and distinct (ii) Roots are real and equal (iii) Roots are complex conjugate. The significant effects are seen on mean chart for the above three situation. We also develop the formula for the sample size (n) and sampling interval (h) for different combination of the skewness and kurtosis under AR (2) model.
Key-Words / Index Term
AR (2) Model, Mean Chart, Autocorrelation, Non-Normality, coefficient of variation (CV), Sample Size, Sampling Interval
References
[1] G.E.P. Box, G.M. Jenkins, “Time Series Analysis Forecasting and Control", San-Francisco, Holden-Day, 1976.
[2] Y.K. Chen, K.L. Hsieh, C.C. Chang, “Economic Design of the VSSI X Control Charts for Correlated Data”, Int. J. Prod. Econ., Vol. 107, pp. 528–539, 2007.
[3] C.Y. Chou, H.R. Liu, C.H. Chen, “Economic Design of Averages Control Charts for Monitoring a Process with Correlated Samples”, Int. J. Manuf. Technol, Vol. 18, pp. 49-53, 2001.
[4] A.J. Duncan, “The economic design of X ̅ charts used to maintain current control of a process”, J. Am. Stat. Assoc., Vol. 51, pp. 228–242, 1956.
[5] B.C. Franco, P. Castagliola, G. Celano, A.F.B. Cost, “New Sampling Strategy to Reduce the Effect of Autocorrelation on a Control Chart”,. J. Appl. Stat., http://dx. doi.org/10.1080/02664763.2013.871507 (in press), 2012.
[6] S.N. Lin, C.Y. Chou, S.L. Wang, H. R. Liu, “Economic design of autoregressive moving average control chart using genetic algorithms”, Expert Syst. Appl., Vol. 39, pp. 173–179, 2012.
[7] H.R.. Liu, C.Y. Chou, C.H. Chen, “Minimum Loss Design of x bar Charts for Correlated Data”, J. LossPrev. ProcessInd, Vol. 15, pp. 405–411, 2002.
[8 E.M. Saniga, “Economic Statistical Control Chart Design with an Application to X ̅ and R Charts”, Technometrics, Vol. 31, pp. 313-320, 1981.
[9] E.M. Saniga, D.J. Davis, T.P. McWilliams, “Economic Statistical Design of Attribute Charts, J. Qual. Technol., Vol. 27, pp. 56-73, 1995.
[10] W.A. Shewhart, “Quality Control Charts”, BellSyst. Tech. J., pp. 593–603, 1926.
[11] H.R. Singh, J.R. Singh, “Variable Sampling Plan under Second Order Autoregressive Model”, Indian Association of Products Quality and Reliability Transaction, Vol. 7, pp. 97-104, 1982.
[12] C.C. Trong, P.H. Lee, N.Y. Liao, “An Economic Statistical Design of Double Sampling X ̅ Control Chart”, Int. J. Prod. Econ., Vol. 120, pp. 495-500, 2009.
[13] W.H. Woodall, “The Statistic Design of Quality Control Charts”, Technometrics, Vol. 28, pp. 408-410, 1985.
Citation
J.R. Singh, A. Sanvalia, "Effect of AR (2) Model on the Economic Design Mean Chart with Known Coefficient of Variation Under Non Normal Population," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.153-169, 2017.
Comparative analysis of classification algorithm in EDM for improving student performance
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.171-175, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.171175
Abstract
Data mining techniques are useful to extract the useful information and to support in the decision making process. There are too many application in the educational domain where we can apply the data mining. Right now data mining in Educational domain is rapidly developing technique. In this research paper we analyse the student’s result of every semester using data mining techniques. Data mining supports the too many techniques but here in the analysis we are using the various classification algorithm of data mining techniques. Here in this research analysis we worked on two model. Model A uses the dataset that contains all the student performance parameters and data mining classification techniques and generated the result based on Accuracy and Error Rate of the classifiers and Model B uses the dataset contains only statistically proved highly affected parameters on student performance and applied data mining techniques on this data sets and generate the results based on Accuracy and Error rate of the classifiers. This research work compare the result of both the model and check that which model is best. The comparison is done using the measurement of accuracy and measurements of Error Rate. This research work also shows that which algorithm is most suitable for predicting the performance of the students among the selected algorithms. The analysis work is done by considering various types of algorithm like decision tree algorithm, rule based algorithm, Bayesian algorithm and function based algorithms. This generic novel approach can be extended to other disciplines as well.
Key-Words / Index Term
classification, error rate, data set, data mining, prediction.
References
[1] Bhise R.B, Thorat S.S, Supekar A.K, “Importance of Data Mining in Higher Education System”, 2013.
[2] Monika Goyal ,Rajan Vohra2, “Applications of Data Mining in Higher Education”, 2012.
[3] K.Shanmuga Priya, A.V.Senthil Kumar, “Improving the Student’s Performance Using Educational Data Mining”, 2013.
[4] Varun Kumar, Anupama Chadha, “Mining Association Rules in Student’s Assessment Data”, 2012.
[5] Mahendra Tiwari, Yashpal Singh (2012), “Performance Evaluation of Data Mining clustering algorithms in WEKA”, Global Journal of Enterprise Information System, vol 4, issue I
[6] Sonali Agarwal, G. N. Pandey, and M. D. Tiwari, “Data Mining in Education: Data Classification and Decision Tree Approach”, 2012.
[7] Surjeet Kumar Yadav, Brijesh Bharadwaj, and Saurabh Pal, “Mining Education Data to Predict Student’s Retention: A comparative Study”, 2012.
[8] Brijesh Kumar Baradwaj, Saurabh Pal, “Mining Educational Data to Analyze Students Performance”, 2011.
[9] Pallamreddy.venkatasubbareddy, Vuda Sreenivasarao, “The Result Oriented Process for Students Based On Distributed Data Mining”, 2010.
[10] Tanuja S, Dr. U. Dinesh Acharya, and Shailesh K R (2011) , “Comparison of different data mining techniques to predict hospital length of Stay, Journal of Pharmaceutical and Biomedical Sciences (JPBMS)”, Vol. 07, Issue 07
Citation
B.R. Patel, "Comparative analysis of classification algorithm in EDM for improving student performance," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.171-175, 2017.
UML Models of Research Process in Empirical Software Engineering
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.176-180, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.176180
Abstract
In recent years, Empirical software engineering is gaining popularity among the software engineering and research community to improve the software quality. However lack of clear understanding about how to do empirical research in software engineering poses threats of unreliable research results. |So to clear understand the process of doing research in empirical software engineering, Unified Modeling Language (UML) models are used. Unified Modeling Language in software engineering is used for designing and analysis of the software systems.
Key-Words / Index Term
Unified Modeling Langugae, Activity diagram, Use Case diagaram, State diagram, Empirical Software engineering
References
[1] R. Mahrotra, “Empirical Research in Software Engineering Concepts Analysis and Applications”, CRC press Taylor and Francis Group, New York, 2016.
[2] I. Sommerville, “Software Engineering”, 4th Ed.,MA. Addison Weslay, 1992.
[3] Aldowaison, TA, Cafar L. K. “Business process reengineering: an approach for process mapping”. Omega International Journal of Management Science, Vol. 27, pp. 515-524, 1999.
[4] Vipin Saxena, Ajay Pratap, “Performance comparison between relational and object-oriented databases”, International Journal of Computer Applications, 2013, Vol. 21, No. 22, pp. 6-9.
[5] W. Rhmann, V. Saxena, “Optimized and Prioritized Test Paths Generation from UML Activity Diagram using Firefly Algorithm”, International Journal of Computer Applications, 2016, Vol. 145, No. 6, pp. 16-22.
[6] T. Zaidi, V. Saxena, “A UML Frame Work for Town and Country Planning”, International Journal of Computer Applications, 2013, Vol. 73, No. 20, 2, pp. 23-25.
[7] Vipin Saxena, Deepak Arora, Manish Shrivastava, “Performance evaluation of network system through UML”, ACM SIGSOFT Software Engineering Notes, 2009, Vol. 34, No. 5, pp. 1-3.
[8] A. Bansal,“Empirical analysis of search based algorithms to identify change prone classes of open source software”, Computer Languages, Systems & Structures, 2017, Vol. 47, pp. 211–231.
[9] J. M. Verner, M. A. Babar, N. Cerpa, T. Hall, C. Beecham, “Factors that motivate software engineering teams: A four country empirical study”, The Journal of Systems and Software, 2014, Vol. 92, pp. 115-127.
[10] W. Rhmann, V. Saxena, “Test Case Generation from UML Sequence Diagram for Aadhaar Card Number based ATM System”, International Journal of Applied Information System, 2016, Vol. 11, No. 4, pp. 37-43.
[11] V. Saxena, D. Arora, “Performance evaluation for object oriented software systems”, ACM Software Engineering Notes, 2009, Vol. 34, No. 2, pp. 1-5.
[12] S. Ahmad, V. Saxena, “Design of formal air traffic control system through UML”, Ubiquitous computing and communication journal, 2008, Vol. 3, No. 6, pp. 11-20.
[13] G. Ansari, W. Rhmann, V. Saxena, “Risk Based Test Case Prioritization using UML State Machine Diagram using Risk Information”, International Journal of Applied Information System, 2016, Vol. 11, No. 7, pp. 15-20.
[14] G. Ansari, V. Saxena, “Object Oriented UML modeling for traveler Management System”, Ubiquitous Computing and Communication Journal, 2008, Vol. 3, No. 3
[15] G. Booch, J. Ramaugh and I. Jacobson, The Unified Modeling Language User Guide: Addison Wesley, 1999.
Citation
Wasiur Rhmann, "UML Models of Research Process in Empirical Software Engineering," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.176-180, 2017.
On Electrodeless Induction Lamps
Review Paper | Journal Paper
Vol.5 , Issue.10 , pp.181-184, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.181184
Abstract
This paper reviews the current technology & trends of electrodeless lamps, videlicet, fluorescent induction lamps & sulphur lamps. Induction lamps utilize the principle of electromagnetic induction & visible light is generated by phosphor coating in case of fluorescent lamps and by sulphur molecules in case of sulphur lamps. The methodologies of light generation, lighting characteristics, application areas, advantages & disadvantages in their utilization & the future scope of improvement are hereby duly expounded & analysed.
Key-Words / Index Term
Induction Lamp, Sulphur Lamp, Energy Efficient Lighting, Plasma Lamp
References
[1] Turner, B. P., Ury, M. G., Leng, Y., & Love, W. G. (1997). Sulfur Lamps—Progress in Their Development. Journal of the Illuminating Engineering Society, 26(1), 10-16.
[2] Coaton, J. R., Cayless, M. A., & Marsden, A. M. (1997). Lamps and Lighting. Architectural Press, 216-226.
[3] Wharmby, D. O. (1993). Electrodeless Lamps for Lighting: A Review. IEE Proceedings A (Science, Measurement and Technology), 140(6), 465-473.
[4] Shaffer, J. W., & Godyak, V. A. (1999). The Development of Low Frequency, High Output Electrodeless Fluorescent Lamps. Journal of the Illuminating Engineering Society, 28(1), 142-148.
[5] Shinomiya, M., Kobayashi, K., Higashikawa, M., Ukegawa, S., Matsuura, J., & Tanigawa, K. (1991). Development of the Electrodeless Fluorescent Lamp. Journal of the Illuminating Engineering Society, 20(1), 44-49.
[6] Hiebert, E. N. (1995). Electric Discharge in Rarefied Gases: the Dominion of Experiment. Faraday. Plücker. Hittorf. Boston Studies in the Philosophy of Science, 167, 95-95.
[7] Johnston, C. W. (2003). Transport and Equilibrium in Molecular Plasmas: The Sulfur Lamp (pp. 0191-0191). Technische Universiteit Eindhoven.
[8] Johnston, C. W., Jonkers, J., & Van Der Mullen, J. J. A. M. (2002). Operational Trends in the Temperature of a High-Pressure Microwave Powered Sulfur Lamp. Journal of Physics D: Applied Physics, 35(20), 2578.
[9] Macarena, S., Pavlov, A., & Fomin, N. (2011). Induction Lamp-A Source of High-Quality and Energy-Efficient Lighting. Sovr. Electronics, 9, 8-13.
[10] Maclennan, D. A., Turner, B. P., Dolan, J. T., Ury, M. G., & Gustafson, P. (1994). Efficient, Full-spectrum, Long-lived, Non-toxic Microwave Lamp for Plant Growth. T. W. Tibbitts (ed.). International Lighting in Controlled Environments Workshop, NASA-CP-95-3309, 243-254.
[11] Aucott, M., McLinden, M., & Winka, M. (2003). Release of Mercury from Broken Fluorescent Bulbs. Journal of the Air & Waste Management Association, 53(2), 143-151.
[12] Tonzani, S. (2009). Lighting Technology: Time to Change the Bulb. Nature News, 459(7245), 312-314.
Citation
Sourin Bhattacharya, Nirab Majumder, "On Electrodeless Induction Lamps," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.181-184, 2017.
Hybrid Parallel Programming Using Locks and STM
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.185-192, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.185192
Abstract
Software Transactional Memory (STM) is a new alternative approach to locks which solves the problem of synchronization in parallel programs. In STM users have to identify the critical sections in the program and enclose them within transactions by using appropriate STM function calls. Then STM automatically by its internal constructs ensures synchronization in the program. This paper shows how to solve the problem of synchronization in parallel programs by using a hybrid programming approach using both locks and STM. Locks use pessimistic approach to solve the problem of synchronization in parallel programs. STM uses optimistic approach to solve the problem of synchronization in parallel programs. Both the optimistic and pessimistic approaches have some advantages and disadvantages. The disadvantage of optimistic approach is that transactions are aborted when validation cannot be done. This approach works well when there are no conflicts (hence the term optimistic) but wastes work when there are conflicts. Aborting of transactions is a severe problem when the transactions are long and interactive. The disadvantage of pessimistic approach is that large number of locks in the program will lead to very slow execution speed which may cancel out the gains made by solving the problem in parallel. The hybrid approach combines the advantages of the optimistic and pessimistic approaches removing their disadvantages without any degradation of performance.
Key-Words / Index Term
Multiprocessing, Parallel Processing, Locks, Software Transactional Memory, Hybrid Parallel Programming
References
[1] Ryan Saptarshi Ray,“STM:Lock-Free Synchronization”, Special Issue of IJCCT, ISSN (ONLINE): 2231 – 0371, ISSN (PRINT): 0975 – 7449, Volume- 3, Issue-2, pp. 19-25, February 2012
[2] Ryan Saptarshi Ray and Utpal Kumar Ray, “Writing Lock-Free Code”, In the Proceedings of International Conference on Computer Science and Engineering(ICCSE),Kolkata, pp. 19-25, 24th March 2012
[3] Pascal Felber, Christof Fetzer, Torvald Riegel, “Dynamic Performance Tuning of Word-Based Software Transactional Memory” In the Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming, pp. 237-246 ,2008
[4] Philip S.Yu, Daniel M. Dias, “Analysis of Hybrid Concurrency Control Schemes For a High Data Contention Environment”, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,Volume-18, Issue-2, pp. 118-129, 1992
[5] Sang H. Son, Junhyoung Lee, “A New Approach to Real-Time Transaction Scheduling”, In the Proceedings of the Fourth Euromicro workshop on Real-Time Systems, pp. 177-182, June 1992
[6] Sung Ho Cho, JongMin Lee, Chong-sun Hwang, WonGyu Lee, “Hybrid Concurrency Control for Mobile Computing” In the Proceedings of High Performance Computing on the Information Superhighway, pp. 478-483, April 1997
[7] SungHo Cho, “A Hybrid Concurrency Control with Deadlock-free Approach”, In the Proceedings of the International Conference on Computational Science and Its Applications, pp. 517-524, 2003
[8] Jan Lindstrom, “Hybrid Concurrency Control Method in Firm Real-Time Databases”
[9] Debendranath Das, Ryan Saptarshi Ray, Utpal Kumar Ray, “Implementation and Consistency Issues in Distributed Shared Memory”, International Journal of Computer Sciences and Engineering (IJCSE) E-ISSN:2347-2693 Volume- 4, Issue-12, pp 125-131, 2016
Citation
Ryan Saptarshi Ray, Parama Bhaumik, Utpal Kumar Ray , "Hybrid Parallel Programming Using Locks and STM," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.185-192, 2017.
Data Mining Technique for Improving Student Performance
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.194-197, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.194197
Abstract
Data mining technology is a procedure for analyzing large amounts of available data and extracting useful information and knowledge to support critical decision-making processes. Data mining can be applied to various applications in the field of education to improve student performance. Educational data mining is developing rapidly and is an important technology for data analysis in the field of education. This paper shown different classification algorithms of data mining those are used for development of a data mining model for predictions of performances of students, on the basis of their personal demographic and academic information. This paper analyze and evaluate the students‟ performance by applying data mining classification algorithms in weka tool.
Key-Words / Index Term
classification, data mining, prediction, performance, knowledge, information
References
[1] Mahendra Tiwari, Yashpal Singh, “Performance Evaluation of Data Mining clustering algorithms in WEKA”, Global Journal of Enterprise Information System, vol 4, Issue I, pp.24-29, Nov. 2012.
[2] Tanuja S, Dr. U. Dinesh Acharya, and Shailesh K R “Comparison of different data mining techniques to predict hospital length of Stay, Journal of Pharmaceutical and Biomedical Sciences (JPBMS)”, Vol. 07, Issue 07, Oct. 2011.
[3] Sonali Agarwal, G. N. Pandey, and M. D. Tiwari, “Data Mining in Education: Data Classification and Decision Tree Approach”, 2012.
[4] Monika Goyal ,Rajan Vohra2, “Applications of Data Mining in Higher Education”, 2012.
[5] Surjeet Kumar Yadav, Brijesh Bharadwaj, and Saurabh Pal, “Mining Education Data to Predict Student’s Retention: A comparative Study”, 2012.
[6] Brijesh Kumar Baradwaj, Saurabh Pal, “Mining Educational Data to Analyze Students Performance”, 2011.
[7] K.Shanmuga Priya, A.V.Senthil Kumar, “Improving the Student’s Performance Using Educational Data Mining”, 2013.
[8] Bhise R.B, Thorat S.S, Supekar A.K, “Importance of Data Mining in Higher Education System”, 2013.
[9] Varun Kumar, Anupama Chadha, “Mining Association Rules in Student’s Assessment Data”, 2012.
[10] Pallamreddy.venkatasubbareddy, Vuda Sreenivasarao, “The Result Oriented Process for Students Based On Distributed Data Mining”, 2010.
Citation
B.R. Patel, "Data Mining Technique for Improving Student Performance," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.194-197, 2017.
Securing Vehicle Numbers using Artificial Neural Networks
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.195-199, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.195199
Abstract
In automatic gate entry system security of vehicle numbers stored in the computer system is a crucial issue because in some parking areas only few important vehicles are permitted. The numbers of permitted vehicles are stored in computer systems. Cryptography based security systems are used to secure these numbers, but in modern environment this type of secure data can also be hacked and altered by the unauthorized users. In order to solve these vulnerable problems, in this paper, we try to create a security mechanism by using Artificial Neural Network (ANN) to protect the data stored on a computer device against unauthorized access. In place of saving vehicle numbers in actual form or in form of alphanumeric data into a text file, we store them in the form of network parameters and these parameters are generated by the back propagation algorithm of ANN using neural network toolbox of MATLAB. This type of security approach is the newest form of cryptography and also cracking of these types of parameters is not possible till today.
Key-Words / Index Term
Artificial Neural Network; Back Propagation; Cryptography; Automatic Gate Entry System
References
[1] K. Topel, A. Rane, R. Rahate, S.M.Nalawade, Encryption and Decryption using Artificial Neural Network, International Advanced Research Journal in Science, Engineering and Technology, Vol. 2, No. 4, pp. 81-83, 2015.
[2] N. Agarwal, P. Agarwal , Use of Artificial Neural Network in the Field of Security, MIT International Journal of Computer Science & Information Technology, Vol. 3, No. 1, pp. 42–44, 2013.
[3] A. S. N. Chakravarthy, P. S. Avadhani, A Probabilistic Approach for Authenticating Text or Graphical Passwords Using Back Propagation, IJCSNS International Journal of Computer Science and Network Security, Vol.11, No.5, pp. 242-251, 2011.
[4] Khalil Shihab, A Back Propagation Neural Network for Computer Network Security, Journal of Computer Science, Vol. 2 No.9, pp. 710-715, 2006.
[5] M. Udi ,A simple scheme to make passwords based on one-way function much harder to crack, Computer Security, Vol. 15, No. 2, pp. 171–176, 1996.
[6] G. Horng, Password authentication without using password table, Inform. Processing Lett., Vol. 55, pp. 247–250, 1995.
[7] Robert Biddle, Sonia Chiasson, P.C. van Oorschot , Graphical Passwords: Learning from the First Twelve Years, Technical Report TR-11-01, School of Computer Science, Carleton University, 2011.
[8] Wei-Chi Ku, Weaknesses and Drawbacks of a Password Authentication Scheme Using Neural Networks for Multiserver Architecture, IEEE Trans. On Neural Network, Vol. 16, No. 4, 2005.
[9] M. S. Obaidat and D. T. Macchiarolo, An on-line neural-network system for computer access security, IEEE Trans. Ind. Electron., vol. 40, pp. 235–242, 1993.
[10] B. Damgard, A design principle for hash functions, In Advances in Cryptology, CRYPTO`89. pp. 416-427, 1989.
[11] A. Jr. Evans, W. Kantrowitz, and E.Weiss, A user authentication scheme not requiring secrecy in the computer, Communications of the ACM, vol.17, pp. 437-442, 1974.
[12] V. S. Dhaka, M. Rao, M. P. Singh, Signature Verification on Bank Checks Using Hopfield Neural Network, Karpagam Journal of Computer Science, ISSN-0973-2926, Vol.3 No.4, pp. 1131-1140, 2009.
[13] V. Singh, K. Mahajan, VANET and its Security Issues- A Review, International Journal of Computer Science and Engineering, Vol.
4, Issue 10, pp. 59- 64, 2016.
Citation
E. Narwal, S. Gill, "Securing Vehicle Numbers using Artificial Neural Networks," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.195-199, 2017.
A Relative Study of Data Mining and Big Data on IoT `s Data Streams
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.200-209, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.200209
Abstract
The huge amount of data produced and captured by the Internet of Things (IoT) in current situations. IoT data created by several applications such as from smart cities, monitoring system, health care, object detecting systems and smart systems etc which all produce the continues data streams.But data of IoT recognized with RFID signal their size is near to 20 bytes. So that it is requiring of special procedures for analyzing, managing and mining the IoT stream data which is identified by RFID. Several software tools have been developed for mining the stream data relatively Big Data tools. While most current research looking into data mining and relative big data tools which are on machine learning of distributed and non-distributed systems with respect to IoT stream data.This paper focused on IoT data format, different kind stream data mining tools according to mining steps and few Big Data tools relative with data mining for handling the stream data of IoT.
Key-Words / Index Term
IoT, Data mining ,Big Data , RFID, Stream Data
References
[1] C.-W. Tsai, C.-F. Lai, and A. V. Vasilakos, “Future internet of things: open issues and challenges,” Wireless Networks, vol. 20, no. 8, pp. 2201–2217, 2014.
[2] A. Mukhopadhyay, U. Maulik, S. Bandyopadhyay, and C. A. C. Coello, “A survey of multiobjective evolutionary algorithms for data mining: part I,” IEEE Transactions on Evolutionary Computation, vol. 18, no. 1, pp. 4–19, 2014.
[3] J. Zhang, B. Iannucci, M. Hennessy, K. Gopal, S. Xiao,S. Kumar, D. Pfeffer, B. Aljedia, Y. Ren, M. Griss et al.,“Sensor Data as a Service–A Federated Platform for MobileData-centric Service Development and Sharing,” in ServicesComputing (SCC), 2013 IEEE International Conference on.IEEE, 2013, pp. 446–453.
[4] Y. Zhang, M. Chen, S. Mao, L. Hu, and V. Leung, “CAP: crowd activity prediction based on big data analysis,” IEEE Network, vol. 28, no. 4, pp. 52–57, 2014.
[5] L. Ramaswamy, V. Lawson, and S. Gogineni, “Towards a Quality-centric Big Data Architecture for Federated Sensor Services,” in Big Data (BigData Congress), 2013 IEEE International Congress on, June 2013, pp. 86–93.
[6] S. Haller, S. Karnouskos, and C. Schroth, “The Internet of Things in an enterprise context,” Future Internet Systems (FIS), LCNS, vol. 5468. Springer, 2008, pp. 14-8.
[7] Shahid Tufail, M. Abdul Qadeer, "Cloud Computing in Bioinformatics: Solution to Big Data Challenge", International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.232-236, 2017.
[8] M. Chen, S. Mao, Y. Zhang, and V. Leung, Big Data: Related Technologies, Challenges and Future Prospects, SpringerBriefs in Computer Science, Springer, 2014.
[9] J. Wan, D. Zhang, Y. Sun, K. Lin, C. Zou, and H. Cai, “VCMIA: a novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing,” Mobile Networks and Applications, vol. 19, no. 2, pp. 153–160, 2014
[10] X. H. Rong, F.Chen, P. Deng, and S. L.Ma, “Alarge-scale device collaboration mechanism,” Journal of Computer Research and Development, vol. 48, no. 9, pp. 1589–1596, 2011.
[11] F. Chen, X.-H. Rong, P. Deng, and S.-L.Ma, “A survey of device collaboration technology and system software,” Acta Electronica Sinica, vol. 39, no. 2, pp. 440–447, 2011.
[12] L. Zhou, M. Chen, B. Zheng, and J. Cui, “Green multimedia communications over Internet of Things,” in Proceedings of the IEEE International Conference on Communications (ICC’12), pp. 1948–1952, Ottawa, Canada, June 2012.
[13] P. Deng, J. W. Zhang, X. H. Rong, and F. Chen, “A model of large-scale Device Collaboration system based on PI-Calculus for green communication,” Telecommunication Systems, vol. 52, no. 2, pp. 1313–1326, 2013.
[14] P. Deng, J. W. Zhang, X. H. Rong, and F. Chen, “Modeling the large-scale device control system based on PI-Calculus,” Advanced Science Letters, vol. 4, no. 6-7, pp. 2374–2379, 2011.
[15] J. Zhang, P. Deng, J. Wan, B. Yan, X. Rong, and F. Chen, “A novel multimedia device ability matching technique for ubiquitous computing environments,” EURASIP Journal on Wireless Communications and Networking, vol. 2013, no. 1, article 181, 12 pages, 2013.
[16] G. Kesavaraj and S. Sukumaran, “A study on classification techniques in data mining,” in Proceedings of the 4th International Conference on Computing, Communications and Networking Technologies (ICCCNT ’13), pp. 1–7, July 2013.
[17] S.Babu, G.Fathima , "Decision Trees for Mining Data Streams Based on the Gaussian Approximation", International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.35-38, 2016.
[18] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the internet of things: perspectives and challenges,” Wireless Networks, vol. 20, no. 8, pp. 2481–2501, 2014.
[19] ] B. Chandra and P. P. Varghese, “Fuzzy SLIQ decision tree algorithm,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 38, no. 5, pp. 1294–1301, 2008.
[20] J. Shafer, R.Agrawal, and M.Mehta, “SPRINT: a scalable parallel classifier for data mining,” in Proceedings of 22nd International Conference on Very Large Data Bases, pp. 544–555, 1996.
[21] Chang, V., 2015. Towards a big data system disaster recovery in a Private cloud. Ad Hoc Networks, 000, pp.1–18.
[22] [23]Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management Auerbach, ed., Schilling, D.R., 2014. Exaflop Computing Will Save the World ... If We Can Afford It - Industry Tap.
[23] González-Martínez, J. a. et al., 2015. cloud computing and education: A state-of-the-art survey. Computers & Education, 80, pp.132–151.
[24] D. Matolak: Channel Modeling for Vehicle-to-Vehicle Communications. IEEE Comm.Mag., pp. 76-83, May 2008
[25] Palaghat Yaswanth Sai, Pabolu Harika, "Illustration of IOT with Big Data Analytics", International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.221-223, 2017.
[26] R.S. Barga, J. Ekanayake, W. Lu, Project Daytona: Data Analytics as a Cloud Service, in: A. Kementsietsidis, M. A. V. Salles (Eds.), Proceedings of the International Conference of Data Engineering (ICDE 2012), IEEE Computer Society, 2012, pp. 1317–1320.
[27] Zhang, X., Wu, J., Yang, X., Ou, H., And Lv, T. 2009. A novel pattern extraction method for time series classification. Optimiz. Engin. 10, 2, 253–271.
[28] Zhong, S.,Khoshgoftaar, T., And Seliya, N. 2007. Clustering-Based network intrusion detection. Int. J. Reliab.Qual. Safety Engin. 14, 2, 169–187.
[29] Yankov, D., Keogh, E., And Rebbapragada, U. 2008. Disk aware discord discovery: Finding unusual time series in terabyte sized datasets. Knowl. Info. Syst. 17, 2, 241–262.
[30] Chhieng, V. And Wong, R. 2010. Adaptive distance measurement for time series databases. In Lecture Notes in Computer Science, vol. 4443. Springer, 598–610.
[31] Ouyang, R., Ren, L., Cheng, W., And Zhou, C. 2010. Similarity search and pattern discovery in hydrological time series data mining. Hydrol. Process. 24, 9, 1198–1210.
[32] Fuchs, E., Gruber, T., Pree, H., And Sick, B. 2010. Temporal data mining using shape space representations of time series. Neurocomput. 74, 1-3, 379–393.
[33] Assent, I., Wichterich, M., Krieger, R., Kremer, H., And Seidl, T. 2009. Anticipatory DTW for efficient similarity search in time series databases. Proc. VLDB Endowm. 2, 1, 826–837.
[34] Barone, P., Carfora, M., And March, R. 2009. Segmentation, classification and denoising of a time series field by A Variational Method. J. Math. Imag. Vis. 34, 2, 152–164.
[35] Gullo, F., Ponti, G., Tagarelli, A., And Greco, S. 2009. A time series representation model for accurate and fast similarity detection. Pattern Recogn. 42, 11, 2998–3014.
[36] Reeves, G., Liu, J., Nath, S., And Zhao, F. 2009. Managing massive time series streams with multi-scale compressed trickles. Proc. VLDB Endow. 2, 1, 97–108.
[37] Thu Vu, G. De Francisci Morales, J. Gama, and A. Bifet, “Distributed Adaptive Model Rules for Mining Big Data Streams,” in BigData ’14: Second IEEE International Conference on Big Data, 2014.
[38] J. Gama, I. Zliobaite, A. Bifet, M. Pechenizkiy, and A. Bouchachia, “A Survey on Concept Drift Adaptation,” ACM Computing Surveys, vol. 46, no. 4, 2014.
[39] A. Bifet, G. Holmes, R. Kirkby, and B. Pfahringer, “MOA: Massive Online Analysis,” The Journal of Machine Learning Research, vol. 11, pp. 1601–1604, 2010.
[40] Charu C. Aggarwal, Jiawei Han, Jianyong Wang, and Philip S. Yu. A framework for clustering evolving data streams. In VLDB ’03: 29th International Conference on Very Large Data Bases, pages 81–92, 2003.
[41] D. Schall, M. Aiello, and S. Dustdar, "Web services on embedded devices," International Journal of Web Information Systems, vol. 2, no. I, pp. 45-50, 2006.
[42] L. Johnsrud, D. Hadzic, T. Hafsoe, F. T. Johnsen, and K. Lund, "Efficient Web Services in Mobile Networks;` in Proceedings of 2008 Sixth European Conference on Web Services. IEEE, Nov. 200S, pp. 197-204.
[43] N. Priyantha, A. Kansal, M. Goraczko, and F. Zhao, "Tiny web services: design and implementation of interoperable and evolvable sensor networks," in Proceedings of the 6th ACM conference on Embedded network sensor systems. ACM, 200S, pp. 253-266.
[44] S. Nastic, S. Sehic, M. Vögler, H.-L. Truong, and S. Dustdar, “PatRICIA -- A Novel Programming Model for IoT Applications on Cloud Platforms,” 2013 IEEE 6th International Conference on Service-Oriented Computing and Applications, 2013, pp. 53–60.
Citation
Sallauddin Mohmmad, Syed Nawaz Pasha, Dadi Ramesh ,Shabana, "A Relative Study of Data Mining and Big Data on IoT `s Data Streams," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.200-209, 2017.