A novel Approach to Compute Steiner point in Graph: Application for Network Design
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.224-231, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.224231
Abstract
A Graph has two main components: Vertices and Edges. The vertices are connected using edges. There are two types of graphs, directed and undirected. The major application of graph is representing network on paper. The cost involved in converting paper based network to actual cable based network is majorly controlled by cables required for connection. The cost can be reduced if the length of cable can be reduced. The paper describes the methodology to compute Steiner point. Using Steiner point, it is possible to modify the position of vertices, so as to reduce the cable length, keeping the vertex connectivity intact. The paper describes implementation of Steiner point on graph with number of vertices as 3, 4, 5 and 6. The presented work can be extended for graph with any number of vertices. It is an optimization approach to reduce the cable size and cost of network implementation.
Key-Words / Index Term
Graph, Network, Cable length, Steiner point, data structures
References
[1] Germander Soothill (April 27, 2010). The Euclidean Steiner Problem.
[2] Marshall W. Bern and Ronald L. Graham (January 1989). The shortest network problem, Scientific American.
[3] E. N. Gilbert and H. O. Pollak (Volume 16 no. 1, January 1968). SIAM Journal of Applied Mathematics.
[4] M.B.Chandak, R.Dharaskar, “Natural Language processing based context sensitive, content specific architecture and its speech based implementation for smart homes, International Journal of Smart homes, 4(2), 1-10, 2010.
[5] F.Riaz, K.M.Ali, “Application of graph theory in Computer Science” Third International Conference on Computational Intelligence, Communication Systems and Networks.
[6] H.Selim, P.Chopade, “Structural analysis and interactive visualization of large scale big data networks” IEEE 11th International Conference on Networking, Sensing and Control.
[7] N.Lakshmi Prasanna, “Application of Graph labelling in communication networks” Oriental Journal of Computer Science and Technology” ISSN-09724-6471
[8] Dr. S.M. Hegde, “Labeled graphs and Digraphs: Theory and Applications”, 12-01-2012 Research Promotion Workshop on IGGA
[9] http://www.britinaca.com/bps/additionalcontent/18/3 3373769/concepts-of-graph-theory-relevant-to-Adhoc- Networks.
[10] T. Suel and J. Yuan. Compressing the graph structure of the web. In Proceedings of the IEEE Data Compression Conference, 2001.
[11] Cormen, Thomas H.; Leiserson, Charles E.; Rivest, Ronald L.; Stein, Clifford (2001), "Section 22.1: Representations of graphs", Introduction to Algorithms (Second ed.), MIT Press and McGraw-Hill, pp. 527–531, ISBN 0-262-03293-7
[12] Balakrishnan, V. K. (1997-02-01). Graph Theory (1st ed.). McGraw-Hill. ISBN 0-07-005489-4.
[13] Svetlin Nakov, Fundamentals of Computer Programming with C#
Citation
M.B.Chandak, S.Bhalotia, S.C.Agrawal, "A novel Approach to Compute Steiner point in Graph: Application for Network Design," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.224-231, 2017.
Cloud Computing in Bioinformatics: Solution to Big Data Challenge
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.232-236, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.232236
Abstract
The piling up of vast quantity of biological data owing to the enormous exploitation of next and third generation sequencing techniques has made their management and handling an uphill task. Cloud computing offers solution to the storage, processing and analysis issues of such a gigantic amount of biological data. The abstraction layer in cloud computing empowers an incorporated access to handling, storage and virtualization. Herein, we review various types of clouds, cloud based service models in bioinformatics and cloud computing platforms with parallel application tools. Lastly, we discuss how the cloud based platforms are being exploited for big data analysis in biology.
Key-Words / Index Term
Cloud computing, bioinformatics, big data, handling, challenge
References
[1] O`Driscoll A, Daugelaite J, Sleator RD. (2013). `Big data`, Hadoop and cloud computing in genomics. J Biomed Inform 46(5):774-81.
[2] Mansaf Alam, Kashish Ara Shakil. (2012) Recent Developments in Cloud Based Systems: State of Art. https://arxiv.org/abs/1501.01323
[3] Ritushree Narayan. (2017) Cloud Computing In Bioinformatics: Current Status and Future Research. International Journal for Scientific Research & Development (IJSRD) 4(12):198-201.
[4] Radhe Shyam Thakur and Rajib Bandopadhyay. (2014). Role of cloud computing in bioinformatics research for handling the huge biological data. Chapter 20. In: Biology of useful plants and microbes; Edited by: Arnab Sen; Published by: Narosa Publishing House, New Delhi, India.
[5] Lin Dai, Xin Gao, Yan Guo, Jingfa Xiao, Zhang Zhang. (2012) Bioinformatics clouds for big data manipulation. Biology Direct 7:43.
[6] Dudley JT, Butte AJ: In silico research in the era of cloud computing. Nat Biotechnol 2010, 28(11):1181–1185.
[7] Stein LD: The case for cloud computing in genome informatics. Genome Biol 2010, 11(5):207.
[8] Taylor RC: An overview of the Hadoop/MapReduce/HBase framework and its current applications in bioinformatics. BMC Bioinformatics 2010, 11(Suppl 12):S1.
[9] Nguyen T, Shi W, Ruden D: CloudAligner: a fast and full-featured MapReduce based tool for sequence mapping. BMC Res Notes 2011, 4:171.
[10] Schatz MC: CloudBurst: highly sensitive read mapping with MapReduce. Bioinformatics 2009, 25(11):1363–1369.
[11] Langmead B, Schatz MC, Lin J, Pop M, Salzberg SL: Searching for SNPs with cloud computing. Genome Biol 2009, 10(11):R134.
[12] Matsunaga A, Tsugawa M, Fortes J: Combining MapReduce and Virtualization on Distributed Resources for Bioinformatics Applications. In Fourth IEEE International Conference on eScience; 2008:222–229.
[13] Hong D, Rhie A, Park SS, Lee J, Ju YS, Kim S, Yu SB, Bleazard T, Park HS, Rhee H, et al: FX: an RNA-Seq analysis tool on the cloud. Bioinformatics 2012, 28(5):721–723.
[14] Langmead B, Hansen KD, Leek JT: Cloud-scale RNA-sequencing differential expression analysis with Myrna. Genome Biol 2010, 11(8):R83.
[15] Zhang L, Gu S, Liu Y, Wang B, Azuaje F: Gene set analysis in the cloud. Bioinformatics 2012, 28(2):294–295.
[16] Wall DP, Kudtarkar P, Fusaro VA, Pivovarov R, Patil P, Tonellato PJ: Cloud computing for comparative genomics. BMC Bioinformatics 2010, 11:259.
[17] Feng X, Grossman R, Stein L: PeakRanger: a cloud-enabled peak caller for ChIP-seq data. BMC Bioinformatics 2011, 12:139.
[18] Habegger L, Balasubramanian S, Chen DZ, Khurana E, Sboner A, Harmanci A, Rozowsky J, Clarke D, Snyder M, Gerstein M: VAT: a computational framework to functionally annotate variants in personal genomes within a cloud-computing environment. Bioinformatics 2012. Epub ahead of print.
[19] Wang Z, Wang Y, Tan KL, Wong L, Agrawal D: eCEO: an efficient Cloud Epistasis cOmputing model in genome-wide association study. Bioinformatics 2011, 27(8):1045–1051.
[20] Jourdren L, Bernard M, Dillies M-A, Le Crom S: Eoulsan: a cloud computing-based framework facilitating high throughput sequencing analyses. Bioinformatics 2012. doi:2010.1093/bioinformatics/bts2165. published online April 5, 2012.
[21] Afgan E, Baker D, Coraor N, Goto H, Paul IM, Makova KD, Nekrutenko A, Taylor J: Harnessing cloud computing with Galaxy Cloud. Nat Biotechnol 2011, 29(11):972–974.
[22] Afgan E, Baker D, Coraor N, Chapman B, Nekrutenko A, Taylor J: Galaxy CloudMan: delivering cloud compute clusters. BMC Bioinformatics 2010, 11(Suppl 12):S4.
[23] Krampis K, Booth T, Chapman B, Tiwari B, Bicak M, Field D, Nelson K: Cloud BioLinux: pre-configured and on-demand bioinformatics computing for the genomics community. BMC Bioinformatics 2012, 13(1):42.
[24] Angiuoli SV, Matalka M, Gussman A, Galens K, Vangala M, Riley DR, Arze C, White JR, White O, Fricke WF: CloVR: a virtual machine for automated and portable sequence analysis from the desktop using cloud computing. BMC Bioinformatics 2011, 12:356.
[25] Hyungro Lee. (2014) Using Bioinformatics Applications on the Cloud. dsc.soic.indiana.edu/publications/bioinformatics.pdf
[26] A. Matsunaga, M. Tsugawa, and J. Fortes. Cloudblast: Combining mapreduce and virtualization on distributed resources for bioinformatics applications. In eScience, 2008. eScience`08. IEEE Fourth International Conference on, pages 222{229. IEEE, 2008.
[27] M. C. Schatz. Cloudburst: highly sensitive read mapping with mapreduce. Bioinformatics,
25(11):1363{1369, 2009.
[28] B. Langmead, M. C. Schatz, J. Lin, M. Pop, and S. L. Salzberg. Searching for snps with cloud computing. Genome Biol, 10(11):R134, 2009.
[29] M. S. Wiewi_orka, A. Messina, A. Pacholewska, S. Ma_oletti, P. Gawrysiak, and M. J. Okoniewski. Sparkseq: fast, scalable, cloud-ready tool for the interactive genomic data analysis with nucleotide precision. Bioinformatics, page btu343, 2014.
[30] A. Schumacher, L. Pireddu, M. Niemenmaa, A. Kallio, E. Korpelainen, G. Zanetti, and K. Heljanko. Seqpig: simple and scalable scripting for large sequencing data sets in hadoop. Bioinformatics, 30(1):119{120, 2014.
[31] W. Lu, J. Jackson, and R. Barga. Azureblast: a case study of developing science applications on the cloud. In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, pages 413{420. ACM, 2010.
[32] S. Zhao, K. Prenger, L. Smith, T. Messina, H. Fan, E. Jaeger, and S. Stephens. Rainbow: a tool for large-scale whole-genome sequencing data analysis using cloud computing. BMC genomics, 14(1):425, 2013.
[33] H. Nordberg, K. Bhatia, K. Wang, and Z. Wang. Biopig: a hadoop-based analytic toolkit for large-scale sequence data. Bioinformatics, 29(23):3014{3019, 2013.
[34] Wall, D. P., Kudtarkar, P., Fusaro, V. A., Pivovarov, R., Patil, P., & Tonellato, P. J. Cloud computing for comparative genomics RSD algorithm summary. BMC Bioinformatics. 11, (2010). 259-270.
[35] Kudtarkar, P., Deluca, T. F., Fusaro, V. A., Tonellato, J., & Wall, D. Evolutionary Bioinformatics cost-effective cloud computing : A case study Using the comparative Genomics Tool, Roundup. Evol Bioinfo. 6, (2010).197-203.
Citation
Shahid Tufail, M. Abdul Qadeer, "Cloud Computing in Bioinformatics: Solution to Big Data Challenge," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.232-236, 2017.
Noise Removal from News Web Sites
Survey Paper | Journal Paper
Vol.5 , Issue.9 , pp.237-243, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.237243
Abstract
Most of the websites comprises of useful information but along with that they contains non-relevant information mostly related to advertisements, copyright, external links etc. This irrelevant information is considered as noise and if we focus on some of the popular English News web sites i.e., Times of India, Hindustan Times, Indian Express etc. consists of 30-40% of news related information and rest are noise content. In this paper we proposed a novel approach that extracts informative content from news web sites in an unsupervised fashion. Our method utilizes the web page segmentation technique to partition the web page into non overlapping rectangular blocks. In our study we used Artificial Neural Network as a classifier to discriminate the rectangular block using their features as relevant or irrelevant blocks. The main content blocks are filtered from the web page and user is presented with clean news web page. Empirical evaluation of our system shows that ANN classifier gives 96.03% accuracy for web content identification that results in accurately filtering of the web page content.
Key-Words / Index Term
Artificial Neural Network, Web Page Segmentation, Visual Blocks, Cosine Similarity
References
[1] C.-N. Ziegler and M. Skubacz, “Content extraction from news pages using particle swarm optimization on linguistic and structural features,” in WI ’07: Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence. Washington, DC, USA: IEEE Computer Society, 2007, pp. 242–249.
[2] J. Gibson, B. Wellner, and S. Lubar, “Adaptive web-page content identification,” in Proceedings of the 9th annual ACM international workshop on Web information and data management. ACM New York, NY, USA, 2007, pp. 105–112.
[3] J. Prasad and A. Paepcke, “Coreex: content extraction from online news articles,” in CIKM ’08: Proceeding of the 17th ACM conference on Information and knowledge management. New York, NY, USA: ACM, 2008, pp. 1391–1392.
[4] S. Gupta, G. E. Kaiser, P. Grimm, M. F. Chiang, and J. Starren, “Automating content extraction of html documents,” World Wide Web, vol. 8, no. 2, pp. 179–224, 2005.
[5] I. Muslea, S. Minton, and C. Knoblock, “A hierarchical approach to wrapper induction,” in AGENTS ’99: Proceedings of the third annual conference on Autonomous Agents. New York, NY, USA: ACM, 1999, pp. 190–197.
[6] Jaiwei Han, Micheline Kamber, Data Mining Concepts and Techniques,Third Edition, ELSEVIER,2012.
[7] Neetu Narwal, Mayank Singh, Web Content Extraction A Heuristic Approach, International Journal Of Computer Science and Information Security, Vol 11, No1 , 2013.
[8] N Narwal, S K Sharma, Amit Prakash Singh, Entropy based content filtering for Mobile Web Page Adaptation, Proceeding WCI `15 Proceedings of the Third International Symposium on Women in Computing and Informatics Pages 588-594 , ACM New York, NY, USA ©2015 , table of contents ISBN: 978-1-4503-3361-0.
[9] Cai D., Yu S. and Wen J. R., VIPS: a Vision-based Page Segmentation Algorithm, Microsoft Technical Report (MSR-TR-2003-79), 2003.
[10] Chakrabarti D., Kumar R., and Punera K., A graph-theoretic approach to webpage segmentation, Proceedings of 15th International Conference on World Wide Web, 2008, ACM, pp 377–386.
[11] Doorenbos R.B., Etzioni O., Weld D.S., A Scalable Comparison-Shopping Agent for the World Wide Web. Technical report UW-CSE-96-01-03, University of Washington, 1996.
[12] Eikvil, Information Extraction from World Wide Web - A Survey , Technical Report 945, Norvegian Computing Center, 1999.
[13] Gogar Tomas, Hubacek Ondrej, Sedivy Jan, Deep Neural Networks for Web Page Information Extraction, Artificial Intelligence Applications and Innovations, IFIP Advances in Information and Communication Technology, Vol. 475, 2016, pp 154-163.
[14] Gu X.D., Chen J., Ma W.Y. and Chen G.L., Visual Based Content Understanding towards Web Adaptation, Proceedings of the Second International Conference on Adaptive Hypermedia and Adaptive Web-Based Systems , Springer, 2002, pp 164-173.
[15] Hsu C. H. and Dung M. T., Generating Finite State Transducers for semi structured Data Extraction from the Web. Information Systems, Vol.23, No. 8, 1998, pp 521-538.
[16] Kang J. , Yang J., Choi J. , Repetition-based Web Page Segmentation by Detecting Tag Patterns for Small-Screen Devices, IEEE Transactions on Consumer Electronics, Vol. 56, Issue 2, May 2010, pp 980-986.
[17] Kohlschutter C. and Nejdl W. A densitometric approach to Web page segmentation. Proceedings of the 17th ACM Conference on Information and Knowledge Management, pp 1173–1182.
[18] Kuppusamy K.S., Aghila G., A Personalized Web Page Content Filtering Model Based On Segmentation, International Journal of Information Sciences and Techniques (IJIST) Volume 2, Issue 1, 2012, pp 41-51.
[19] Kushmerick N., Weld D.S., Doorenbos R., Wrapper Induction for Information Extraction. Ph.D. Dissertation, University of Washington. Technical Report UW-CSE-97-11-04, 1997.
[20] Palekar V.R., Ali M. S. And Meghe R., Deep Web Data Extraction Using Web-Programming-Language-Independent Approach, Journal of Data Mining and Knowledge Discovery, 2012, pp 69-73.
[21] Safi Waseem, Maurel Facrice, Routoure Jean Marc, Beust Pierre, Dias Gael, A Hybrid Segmentation of Web Pages for Vibro-Tactile Access on Touch Screen Devices, . 3rd Workshop on Vision and Language (VL 2014) associated to 25th International Conference on Computational Linguistics (COLING 2014), Aug 2014, pp.95 – 102.
[22] Swezey Robin M.E., Shiramatsu Shun, Ozono Tadachika, Shintani Toramatsu, Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluation, International Journal of Computer Science and Network Security (IJCSNS), 2013, Volume 13 Issue 1, pp 1-6.
[23] Zou J., Le D., Thoma G. R., Combining DOM Tree and Geometric Layout Analysis for Online Medical Journal Article Segmentation, Proceedings of the 6th ACM/IEEE-CS Joint Conference on Digital Libraries, 2006, pp 119 – 128.
Citation
N. Narwal, "Noise Removal from News Web Sites," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.237-243, 2017.
Analysis of Applications of Object Orientation to Software Engineering, Data Warehousing and Teaching Methodologies
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.244-248, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.244248
Abstract
Object oriented software engineering concepts are one of the most popular methods in the information technology industry and academia as well as in many other forms of engineering design. Software engineering is a field of engineering that came into existence owing to the various problems that developers of software faced while developing software projects. This paper analyzes some of the most important technological innovations in object oriented software engineering in recent times. The advancements in Object technologies that have been analyzed here include module coupling metrics, software up gradation, layered reusability, monitors, attribute objects, global software development contexts, software testing, recursive types, coupled and co-evolving classes, query-able source codes, meta-model for generating design alternatives, programming micro-worlds, design pattern detection, object schema migration, functional verification, work system theory, and state chart diagrams. From our analysis we predict further advancements in object technologies towards game development, metrics for software design analysis, addition to fundamental Object oriented programming language features and distributed software engineering.
Key-Words / Index Term
Object orientation, Software engineering, Data warehousing, Teaching methodologies
References
[1]. Bidve, V. S., and P. Sarasu. "Coupling Measures and its Impact on Object-Oriented Software Quality." Indian Journal of Science and Technology 9.21 (2016).
[2]. Sharma, Yashvardhan. "Effort Estimation for Program Modification in Object Oriented Development." International Conference on Computational Science and Its Applications. Springer International Publishing, 2016.
[3]. Baas, Andre. An object-oriented component approch to building real-time software systems. Diss. 2016.
[4]. Moreno-Delgado, Antonio, Francisco Durán, and José Meseguer. "Towards Generic Monitors for Object-Oriented Real-Time Maude Specifications." (2016).
[5]. Xia, Haijun, et al. "Object-Oriented Drawing." Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 2016.
[6]. Wong, Y. S., Hayati, M. Y. M., & Tan, W. H. (2016, September). A Propriety Game-Based Learning Game as Learning Tool to Learn Object-Oriented Programming Paradigm. In Joint International Conference on Serious Games (pp. 42-54). Springer International Publishing.
[7]. Chandra, Alaknanda, and Abhishek Singhal. "Study of Unit and Data flow testing in object-oriented and aspect-oriented programming." 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH). IEEE, 2016.
[8]. Jabangwe, Ronald, et al. "A method for investigating the quality of evolving object-oriented software using defects in global software development projects." Journal of Software: Evolution and Process (2016).
[9]. Holopainen, Timo. "Object-oriented programming with Unity: Inheritance versus composition." (2016).
[10]. Cisar, Sanja Maravic, Petar Cisar, and Robert Pinter. "Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests." Computers & Education 92 (2016): 142-160.
[11]. Nierstrasz, Oscar. "The Death of Object-Oriented Programming." International Conference on Fundamental Approaches to Software Engineering. Springer Berlin Heidelberg, 2016.
[12]. Abdoli, Shiva, and Sami Kara. "Designing Warehouse Logical Architecture by Applying Object Oriented Model Based System Engineering." Procedia CIRP 50 (2016): 713-718.
[13]. Amato, Gianluca, Maria Chiara Meo, and Francesca Scozzari. "Exploiting Linearity in Sharing Analysis of Object-oriented Programs." Electronic Notes in Theoretical Computer Science 322 (2016): 3-18.
[14]. Djelil, Fahima, et al. "Microworlds for Learning Object-Oriented Programming: Considerations from Research to Practice." Journal of Interactive Learning Research 27.3 (2016): 247-266.
[15]. Furia, Carlo A., et al. "AutoProof: auto-active functional verification of object-oriented programs." International Journal on Software Tools for Technology Transfer (2016): 1-20.
[16]. Sunitha, E. V., and Philip Samuel. "Object Oriented Method to Implement the Hierarchical and Concurrent States in UML State Chart Diagrams." Software Engineering Research, Management and Applications. Springer International Publishing, 2016. 133-149.
[17]. Börstler, Jürgen, Michael E. Caspersen, and Marie Nordström. "Beauty and the Beast: on the readability of object-oriented example programs." Software Quality Journal 24.2 (2016): 231-246.
[18]. Alter, Steven, and Narasimha Bolloju. "A Work System Front End for Object-Oriented Analysis and Design." International Journal of Information Technologies and Systems Approach (IJITSA) 9.1 (2016): 1-18.
[19]. Miranda, Eliot, and Clément Béra. "A partial read barrier for efficient support of live object-oriented programming." ACM SIGPLAN Notices 50.11 (2016): 93-104.
[20]. Chhabra, Rashmi, Parveen Kumar, and Payal Pahwa. "An approach to Design Object Oriented Data Warehouse." International Journal of Research and Engineering 3.3 (2016): 54-56.
[21]. Oruc, Murat, Fuat Akal, and Hayri Sever. "Detecting Design Patterns in Object-Oriented Design Models by Using a Graph Mining Approach." 2016 4th International Conference in Software Engineering Research and Innovation (CONISOFT). IEEE, 2016.
[22]. Parashar, Anshu, and Jitender Kumar Chhabra. "Mining software change data stream to predict changeability of classes of object-oriented software system." Evolving Systems 7.2 (2016): 117-128.
[23]. Ghoreshi, M., and H. Haghighi. "An incremental method for extracting tests from object-oriented specification." Information and Software Technology 78 (2016): 1-26.
[24]. Noei, Ehsan, and Abbas Heydarnoori. "EXAF: A search engine for sample applications of object-oriented framework-provided concepts." Information and Software Technology 75 (2016): 135-147.
[25]. Ryu, Sukyoung. "ThisType for Object-Oriented Languages: From Theory to Practice." ACM Transactions on Programming Languages and Systems (TOPLAS) 38.3 (2016): 8.
[26]. P.L. Power,M.P. Singh,Bharat Solanki, Jawwad Wasat Shareef, “Computation of External view based Software Metrics: Java Based Tool”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.33-43,2017.
Citation
Biswajit Saha, Debaprasad Mukherjee, "Analysis of Applications of Object Orientation to Software Engineering, Data Warehousing and Teaching Methodologies," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.244-248, 2017.
Analysing data using R: An application in healthcare sector
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.249-253, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.249253
Abstract
With the advances in technology, data has too accumulated at an alarming pace and with that the need to analyze data has also grown. Facebook, Instagram, Twitter and other social networks have catalyzed the process of data accumulation. Data related to healthcare system is also growing with the growing incidences of cancer, diabetes and other diseases and the parallel advent of high-throughput technologies. In this paper, we have taken data from healthcare sector and analyzed them to accumulate knowledge of how the health condition of female diabetic patients and female non-diabetic patients varies according to various parameters such as age, blood pressure, skin thickness, and body mass index (BMI) and so forth.
Key-Words / Index Term
Data, Analysis, R programming, healthcare, diabetes, dataset
References
[1] F. Lemieux, “Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice”, Palgrave Macmillan Publishers, USA, 2015, ISBN: 978-1-137-45554-3.
[2] L. Bellatreche, S. Chakravarthy, “Big Data Analytics and Knowledge Discovery” (19th International Conference, DaWaK 2017, Lyon, France, August 28-31, 2017), Springer International Publishing, 2017, ISBN: 978-3-319-64283-3 (eBook)
[3]http://maryland.beaconhealthoptions.com/provider/forms/oms/Introduction-to-Data-and-Data-Analysis.pdf
[4] Ashfaq Ahmed K, Sultan Aljahdali and Syed Naimatullah Hussain, (2013) “Comparative Prediction Performance with Support Vector Machine and Random Forest Classification Techniques”, International Journal of Computer Applications Vol. 69, No.11, pp 12-16
[5]https://en.wikipedia.org/wiki/Data_analysis_techniques_for_fraud_detection
[6]https://www.analyticsvidhya.com/blog/2015/09/applications-data-science/
[7] Mailund T. Introduction to R Programming. In: Beginning Data Science in R. Apress, Berkeley, CA, USA, 2017.
[8] HTTP://WWW.KDNUGGETS.COM/2015/06/TOP-20-R-PACKAGES.HTML
Citation
Shahid Tufail, M. Abdul Qadeer, "Analysing data using R: An application in healthcare sector," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.249-253, 2017.
Approach towards validity of Aggressive Packet Combining Scheme with Physical Level Representation
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.254-256, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.254256
Abstract
It is a research challenge for scientists and researchers to reliably transport data from source to destination. The received copies were found to be loaded with errors and the recovery of the correct original copy was a challenging job. The paper deals with some novel protocols related to physical level representation, circular shift based information transmission, masking scheme and modified packet combining technique through with this problem can be addressed to a considerable extent.
Key-Words / Index Term
Packet combining scheme; Aggressive packet combining scheme; bit shifting; physical level
References
[1]. C T Bhunia, A Few Modified ARQ Techniques, Proceedings of the International Conference on Communications, Computers & Devices, ICCCD-2000, 14-16, Decedmber’2000, I I T, Kharagpur, India, Vol.II, pp. 705-708.
[2]. C T Bhunia and A Chowdhury, ARQ Technique with Variable Number of Copies in Retransmission, Proceedings of Conference on Computer Networking and Multimedia (COMNAM-2000), 21-22 December’2000, Javadpur University, Calcutta, India, pp.16-21
[3]. C T Bhunia and A Chowdhury, Performance Analysis of ARQ Techniques used in Computer Communication Using Delay as a Parameter, Proceedings of Conference on Computer Networking and Multimedia (COMNAM-2000), Jadavpur University, Calcutta, India, pp.22-24.
[4]. C T Bhunia, ARQ with two level coding with generalized parity and I (i>1) copies of parts in retransmission, Proceedings of National Conference on Data Communications (NCDC-2000), Computer Society of India, Chandigarh, India, 7-8 April’2000, pp.19
[5]. C T Bhunia, ARQ Techniques: Review and Modifications, Journal IETE Technical Review, Sept-Oct’2001 Vol18, No 5, pp 381-401
[6]. R J Beniece and A H Frey Jr, An analysis of retransmission schemes, IEEE Trans CommTech, COM-12, pp 135-145, Dec 1964
[7]. S Lin, D Costello Jr and M J Miller, Automatic repeat request error control schemes, IEEE Comm Mag, 22, pp 5-17, Dec `1984.
[8]. A R K Sastry, Improving Automatic Repeat Request (ARQ) Performance on Satellite Channels Under High Error Rate Conditions, IEEE Trans Comm, April`77, pp 436-439.
[9]. Joel M Morries, On Another Go-Back -N ARQ Technique For High Error Rate Conditions, IEEE Trans Comm, Vol 26, No 1, Jan`78, pp 186-189.
[10]. E J Weldon Jr, An Improved Selective Repeat ARQ Strategy, IEEE Trans Comm, Vol 30, No 3, March`82, pp 480-486.
[11]. Don Towsley, The Shutter Go Back-N ARQ Protocol, IEEE Trans Comm, Vol 27, No 6, June`79, pp 869-875.
[12]. Dimirti Bertsekas et al, Data Networks, Prentice Hall of India, 1992, Ch-2
[13]. G E Keiser, Local Area Networks, McGrawhill, USA, 1995
[14]. N D Birrell, Pre-emptive retransmission for communication over noisy channels, IEE Proc Part F, Vol 128, 1981, pp 393-400.
[15]. H Bruneel and M Moeneclacey, On the throughput performance of some continuous ARQ strategies with repeated transmissions, IEEE Trans Comm, Vol COM m34, 1986, pp 244-249.
[16]. Y wang and S Lin, A Modified Selective Repeat Type-Ii Hybrid ARQ System and its Performance Analysis, IEEE Trans Comm, Vol Com 31, May’1983, pp. 593-608.
[17]. S B Wicker and M J Bartz, Type-II Hybrid ARQ Protocol using Punctured MDS Code, IEEE Trans Comm, Vol 42, Feb-March-April’1994, pp. 1431-1440.
[18]. Yiu-Wing LEUNG, Aggressive Packet Combining for Error Control in Wireless Networks, trans. Comm Vol. E83, No 2 Feb’2000, pp38-385.
[19]. S B Wicker, Adaptive rate error control through the use of diverse combining and majority logic decoding in hybrid ARQ protocol, IEEE Trans Comm., Vol.39. No. 3, March’1991, pp 380-385.
[20]. C T Bhunia Modified Aggressive Packet Combining Scheme, Pre-print, ICTP, Italy, IC/2010/037, pp. 1-10.
Citation
Achyuth Sarkar, S.K. Chakraborty, C.T.Bhunia, Prasun Chakrabarti , "Approach towards validity of Aggressive Packet Combining Scheme with Physical Level Representation," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.254-256, 2017.
Mechanism of Fingerprint Conversion to Text
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.257-260, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.257260
Abstract
One of the important methods of identifying a person is fingerprint because it has several features like invariability, uniqueness and more. Nowadays, many databases hold fingerprint columns and these columns may be search based columns. Database may incur overload search on fingerprint columns which represent a bottleneck to the system. We proposed a method that convert the fingerprint to text which improves the performance of the system and many more other benefits. Fingerprint image is converted to text which is smaller in size that helps in processing as well as storage space. Smaller size of data also is better in transmission over network. In the term of data encryption, text encryption is easier and has less time complexity than of images.
Key-Words / Index Term
Fingerprint Conversion, Fingerprint Presentation, Minutiae Point, Database Performance
References
[1] Haonan Su, Dong Zheng, and Hinghui Zhang. “An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage”. IEEE international Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). 2017.
[2] J.S. Aafa, S. Soja, "Fingerprint Privacy Protection Techniques: A Comparative Study", International Journal of Computer Sciences and Engineering, Vol.2, Issue.7, pp.86-89, 2014.
[3] Chiung Ching Ho, and C.Eswaran. “Consolidation of Fingerprint Databases: Challenges and Solutions in the Malaysian Context”. International Journal of Computer Information Systems and Industrial Management Applications. Vol 5 . pp. 373-382 , 2013.
[4] Ankita Mehta, and Sandeep Dhariwal. "Design & Implementation of Features based Fingerprint Image Matching System". Vol .2, International Journal of Multidisciplinary and Current Research. 2014.
[5] D Maltoni, D Maio, and S Parbhakar. "Handbook of Fingerprint Recognition". Springer publisher, New York. pp174, 2003, ISBN no 0-387-95431-7
[6] J Kilian, "Advanced in Cryptology - Crypto", Springer publisher, USA, pp447, 2001, ISBN no 0302-9743.
Citation
Nashwan Yahya Ali, V M Thakare, "Mechanism of Fingerprint Conversion to Text," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.257-260, 2017.
A New Approach of K-Means Algorithm With M-Tree Algorithm: Survey Paper
Survey Paper | Journal Paper
Vol.5 , Issue.9 , pp.261-263, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.261263
Abstract
Clustering is the way toward gathering of data, where the gathering is built up by discovering likenesses between data in light of their attributes. Such gatherings are named as Clusters. A relative investigation of clustering algorithms crosswise over two distinct data things is performed here. The execution of the different clustering algorithms is contrasted in view of the time brought with frame the evaluated bunches. The exploratory consequences of different clustering algorithms to shape bunches are portrayed as a chart. Consequently it can be finished up as the time taken to shape the groups increments as the quantity of bunch increments. The most distant first clustering algorithm takes not very many seconds to group the data things though the basic K Means sets aside the longest opportunity to perform clustering. The general objective of data mining procedure is to concentrate data from an expansive data set and move it into an understandable shape for sometime later .Clustering is essential in data examination and data mining applications. Clustering is a division of data into gathering of comparable articles. Each gathering called a bunch comprises of articles that are comparative amongst themselves and unique between contrast with objects of different gatherings. This paper is expected to investigation of all the clustering algorithms. In this paper we analyze a wide range of clustering strategies and gave a concise information about k-implies clustering.
Key-Words / Index Term
Clustering, K-Means clustering algorithm, data mining, Clustering algorithm, Efficient K-Means, Filtered cluster, Filteredcluster, Farthestfirst
References
[1] S.S. Khan, Amir Ahmad, "Cluster center initialization algorithm for K-means clustering", Pattern Recognition Letters archive Vol.25, Issue. 11, pp.1293-1302, 2004.
[2] T. Kanungo, D. Mount, N. Netanyahu, C. Piatko and A.-MeansWu, “Clustering Algorithm: Efficient Analysis and Implementation”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.24, Issue.7, Jul 2002.
[3] V. Jain, "Outlier Detection Based on Clustering Over Sensed Data Using Hadoop", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.45-50, 2013.
[4] V.K. Gujare, P. Malviya, "Big Data Clustering Using Data Mining Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.9-13, 2017.
[5] P.K. Dhillon, A.S. Walia, "To evaluate and improve DBSCAN algorithm with normalization in data mining: A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.35-39, 2017.
[6] Pritika Goel, "An Improved Load Balancing Technique in Weighted Clustering Algorithm", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.80-92, 2016.
[7] S. Joshi, F.U. Khan, N. Thakur, "Contrasting and Evaluating Different Clustering Algorithms: A Literature Review", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.87-91, 2014.
Citation
Savita Sahu, "A New Approach of K-Means Algorithm With M-Tree Algorithm: Survey Paper," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.261-263, 2017.
Review paper Malicious Nodes in Manet: survey report
Survey Paper | Journal Paper
Vol.5 , Issue.9 , pp.264-267, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.264267
Abstract
Mobile Ad-hoc Network for a settled network framework MANET shape a network to trade data. In this paper we are distinguishing affirmation forms in network formalization. There are many Network Routing Protocol which have their own particular benefits and negative marks for Abstraction between different administrations in MANET condition. For arrangement and administration organization in MANET it is to be required with a specific end goal to recognize deliberate affirmation and administration to set up best association amongst source and goal. In MANET affirmation needs AODV, DSR and DSDV protocol so affirmation delay, affirmation drop and affirmation succeed can be effortlessly computed by measurements table and ns2 reproduction is utilized to check this accuracy Ad-hoc networks (MANETs) square measure phenomenally defenseless to a scope of mischievous activities because of their essential focal points, together with absence of correspondence framework, short transmission power, and dynamic network design. To watch and relieve those mischievous activities, a few trust administration plans are given for MANETs. Most assume pre-characterized weights to work out however every evident unfortunate behavior adds to relate general compute of conviction.
Key-Words / Index Term
AODV, DSR, DSDV, Trust Establishment, Fault tolerance system
References
[1] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[2] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[3] Italy Melina, “Radon Adaptive User Anonymity for Mobile Opportunistic Networks”, CHANTS’12, August 22, 2012
[4] Meenakshi Jamgade and Vimal Shukla , "Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.145-150, 2016.
[5] Zygmunt J. Haas and Milen Nikolov, “Towards Optimal Broadcast in Wireless Networks”, October science direct 31-2010
[6]. Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
Citation
Sagar Sharma, "Review paper Malicious Nodes in Manet: survey report," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.264-267, 2017.
Evaluation of Clustering Algorithm in Data Mining
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.268-273, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.268273
Abstract
Text mining is the use of data mining techniques to unstructured text in order to extract important and nontrivial knowledge. One of the key methods of text mining, or the unsupervised classification of related content into various categories, is text clustering. The performance of text clustering is being improved in this study. We looked on four areas of the text clustering algorithms: document representation, document similarity analysis, high dimension reduction, and parallelization. We suggest a collection of very effective text clustering techniques that focus on the special features of unstructured text databases. All of the suggested algorithms have undergone thorough performance studies. We contrasted these techniques with current text clustering algorithms in order to assess their performance.
Key-Words / Index Term
Cluster Algorithm, Data Mining, bisecting k-means, FIHC, CFWS find CFWMS
References
[1] Mohammed J. Zaki. Scalable algorithms for association mining. IEEE Trans. on Knowl. and Data Eng., 12(3):pp 372–390, 2000.
[2] P. Agrawal, O. Benjelloun, A. Das Sarma, C. Hayworth, S. Nabar, T. Sugihara, and J. Widom. "Trio: A system for data, uncertainty, and lineage". In Proc. Int. Conf. on Very Large Databases, 2006.
[3] R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In Proc. ACM SIGMOD Int. Conf. on Management of Data, Minneapolis, MN, 1994.
[4] T. Bernecker, H.-P. Kriegel, M. Renz, F. Verhein, and A. Züfle. Probabilistic frequent itemset mining in uncertain databases. In In Proc. 15th ACM SIGKDD Conf. on Knowledge Discovery and Data Mining, Paris, France, 2009.
[5] C. C. Aggrawal and P. S. Yu, Finding Generalized Projected Clusters in High Dimensional Spaces," Proc. of ACM SIGMOD Int`l Conf. on Management of Data, 2000, pp. 70{81.
[6] J. Allan, HARD Track Overview in TREC 2003 High Accuracy Retrieval from Documents,"Proc. of the 12th Text Retrieval Conference, 2003, pp. 24{37.
[7] M. R. Anderberg, Cluster Analysis for Applications, Academic Press, 1973.
[8] DPVG06] Nele Dexters, Paul W. Purdom, and Dirk Van Gucht. A probability analysis for candidate-based frequent itemset algorithms. In SAC ’06: Proceedings of the 2006 ACM symposium on Applied computing, New York, NY, USA, 2006. ACM, pp541–545.
[9] Gregory Buehrer, Srinivasan Parthasarathy, and Amol Ghoting. Out-ofcore frequent pattern mining on a commodity pc. In KDD ’06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, 2006, pp 86–95.
[10] Toon Calders. Deducing bounds on the frequency of itemsets. In EDBT Workshop DTDM Database Techniques in Data Mining, 2002.
Citation
Arpit Agrawal, "Evaluation of Clustering Algorithm in Data Mining," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.268-273, 2017.