Simulation Study of Messenger Molecule Displacement in Communication via Diffusion
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.1-6, Jun-2017
Abstract
Molecular Communication via diffusion (MCvD) is a new communication paradigm that uses molecules as the information carrier between the nano-machines. The end to end MolecUlar CommunicatIoN (MUCIN) simulator tool is used to explore the characteristics of the MCvD channel. This simulator considered Binary Concentration Shift Keying (BCSK) technique for modulating binary information symbols, support 1-dimensional environment, and send symbols consecutively. The main issues of MCvD system are the Inter-Symbol Interference that arises when the molecules belonging to the previous symbol come into the current symbol. Conventional MCvD system exhibits a long tail of received molecular histogram, results in higher ISI. In this paper, the displacement of a messenger molecule is increased to reduce the amount of stray molecules in the MCvD channel. The proposed technique shows the first hitting time distribution to determine the highest reception of the information carrying molecules by the receiver. We also evaluate the performance of proposed scheme for different values of step length in terms of Inter- Symbol Interference (ISI), symbol detection and communication delay. Our results indicate that introducing proposed technique significantly improves the performance of MCvD system.
Key-Words / Index Term
Inter- Symbol Interference (ISI), Binary Concentration Shift Keying (BCSK), MolecUlar CommunicatIoN (MUCIN) simulator, Molecular Communication via diffusion (MCvD), Messenger Molecules (MMs), step length, hitting time distribution
References
[1] Pudasaini, Subodh, S. Shin, and K.S. Kwak, “Robust modulation technique for diffusion-based molecular communication in nanonetworks,” arXiv preprint arXiv: 1401.3938, 2014.
[2] Kuran, M. Şükrü, H.B. Yilmaz, T. Tugcu, and B. Özerman, “Energy model for communication via diffusion in nanonetworks,” Nano Communication Networks Vol.1, Issue. 2, pp.86-95, 2010.
[3] H.B. Yilmaz, N. Kim and C. Chae. , “Effect of ISI mitigation on modulation techniques in molecular communication via diffusion,” InProceedings of ACM The First Annual International Conference on Nanoscale Computing and Communication, ACM, p.3, 2014.
[4] A.C. Heren, F.N. Kilicli, G. Genc, and T. Tugcu, “Effect of messenger molecule decomposition in communication via diffusion,” InProceedings of ACM The First Annual International Conference on Nanoscale Computing and Communication, ACM, p.12, 2014.
[5] I. Llatser, A. Cabellos-Aparicio, and E. Alarcon, “Networking challenges and principles in diffusion-based molecular communication,” IEEE Wireless Communications, Vol.19, Issue. 5, 2012.
[6] T. Nakano, M. Moore, A. Enomoto and T. Suda, “Molecular communication technology as a biological ICT,” In Biological functions for information and communication technologies, pp. 49-86, Springer Berlin Heidelberg, 2011.
[7] A.C. Heren, M.S. Kuran, H.B. Yilmaz, and T. Tugcu, “Channel capacity of calcium signaling based on inter-cellular calcium waves in astrocytes,” In 2013 IEEE International Conference on Communications Workshops (ICC), pp. 792-797,2013.
[8] H.B. Yilmaz, N. Kim and C.Chae, “Effect of ISI mitigation on modulation techniques in communication via diffusion,” arXiv preprint arXiv: 1401.3410, 2014.
[9] B. Tepekule, A.E. Pusane, H.B. Yilmaz, and T. Tugcu, “Energy efficient ISI mitigation for communication via diffusion,” InCommunications and Networking (BlackSeaCom), IEEE International Black Sea Conference on, pp. 33-37, 2014.
[10] B.D. Unluturk, E.B. Pehlivanoglu and O.B. Akan, “Molecular channel model with multiple bit carrying molecules,” InCommunications and Networking (BlackSeaCom), 2013 First International Black Sea Conference on, pp. 79-83, 2013.
[11] P.C. Yeh,, K.C. Chen, Y.C. Lee, L.S. Meng, P.Shih, P.Y. Ko, W. Lin, and C.H. Lee , “A new frontier of wireless communication theory: diffusion-based molecular communications,” IEEE Wireless Communications, Vol. 19, Issue. 5,2012.
Citation
A.P. Kaur, D.K.K. Randhawa, G.K. Walia, "Simulation Study of Messenger Molecule Displacement in Communication via Diffusion," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.1-6, 2017.
Workflow Scheduling Mechanism Using PCSO n Cloud: Case Study
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.7-18, Jun-2017
Abstract
Cloud Computing has emerged as a service model that enables on-demand network get right of entry to a massive number of available virtualized resources and applications with a minimal management attempt and a minor rate. The unfold of Cloud Computing technology allowed handling complicated applications together with Scientific Workflows, which consists of a set of extensive computational and data manipulation operations. Cloud Computing enables such Workflows to dynamically provision compute and storage assets necessary for the execution of its responsibilities way to the pliancy asset of those assets. However, the dynamic nature of the Cloud incurs new challenges, as a few allocated assets may be overloaded or out of get entry to all through the execution of the Workflow. Moreover, for data extensive responsibilities, the allocation strategy have to keep in mind the facts placement constraints on the grounds that facts transmission time can growth extensively in this example which implicates the growth of the general of completion time and value of the Workflow. Likewise, for in depth computational responsibilities, the allocation strategy must consider the form of the allocated digital machines, greater specifically its CPU, reminiscence and network capacities. Yet, an essential venture is the way to correctly schedule the Workflow obligations on Cloud resources to optimize its ordinary best of provider. In this paper, we endorse a QoS aware algorithm for Scientific Workflows scheduling that objectives to enhance the overall quality of service (QoS) with the aid of considering the metrics of execution time, data transmission time, price, sources availability and facts placement constraints. We prolonged the Parallel Cat Swarm Optimization (PCSO) algorithm to put in force our proposed method. We tested our algorithm inside pattern Workflows of various scales and we compared the consequences to the ones given by the same old PSO, the CSO and the PCSO algorithms. The consequences display that our proposed algorithm improves the general satisfactory of provider of the tested Workflows.
Key-Words / Index Term
Cloud Computing; Workflow; IaaS; virtual machine; storage; quality of service; scheduling algorithm; Parallel Cat Swarm Optimization
References
[1] L. Guo, S. Zhao, S. Shen, and C. Jiang, “ Task scheduling optimization in cloud computing based on heuristic algorithm”, Journal of Networks, Vol.7, Issue.3, pp.547–553, 2012.
[2] E. Deelman, “Grids and clouds: Making workflow applications work in heterogeneous distributed environments”, International Journal of High Performance Computing Applications, Vol.24, Issue.3, pp.284-298, 2010.
[3] MRahman, X. Li, and H. N. Palit, “Hybrid heuristic for scheduling data analytics workflow applications in hybrid cloud environment”, In Proceedings of the 25th IEEE International Symposium on Parallel and Distributed, ser. IPDPS Workshops. Anchorage (Alaska) USA, Anchorage (Alaska) USA:966-974, May 2011.
[4] Z. Wu, Z. Ni, L. Gu, and X. Liu, “A revised discrete particle swarm optimization for cloud workflow scheduling” CIS10, 2010.
[5] S. Pandey, L. Wu, S. M. Guru, and R. Buyya, “A particle swarm optimization-based heuristic for scheduling workflow applications in cloud computing environments”, AINA2010, 2010.
[6] M. A. Rodriguez and R. Buyya, “Deadline based resource provisioning and scheduling algorithm for scientific workflows on clouds”, IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014.
[7] R. Achary, V. Vityanathan, P. Raj, and S. Nagarajan, “Dynamic job scheduling using ant colony optimization for mobile cloud computing”, Advance in Intelligent Systems and Computing, Springer International Publishing, Switzerland, Vol.321, Issue. pp. 70-71, 2015.
[8] S. Bilgaiyan, S. Sagnika, and M. Das, “A multi-objective cat swarm optimization algorithm for workflow scheduling in cloud computing environment”, Intelligent Computing, Communication and Devices, Advances in Intelligent Systems and Computing, Vol.308, Issue.4, Springer, India, 2015.
[9] Z. Wu, Z. Ni, L. Gu, and X. Liu, “A revised discrete particle Swarm optimization for cloud workflow scheduling”, 6th International Conference on Computational Intelligence and Security, ser. CIS’2010, page 184-188, 2010.
[10] V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.
[11] L. Zeng, B. Benatallah, A. H. Ngu, M. Dumas, J. Kalagnanam, and H. Chang, “Qos-aware middleware for web services Composition" Software Engineering, Vol.30, Issue.5, pp.311– 327, 2004.
[12] S. C. Chu and P. W. Tsai, “Computational intelligence based on the behaviour of cats”, International Journal of Innovative Computing Information and Control, Vol.3, Issue.1, pp.163–173, 2007.
[13] P. W. Tsai, J. S. Pan, S. M. Chen, B. Y. Liao, and S. P. Hao, “Parallel cat swarm optimization”, In Proceedings of the seventh International conference on machine learning and cybernetics, Kunming, China, Vol.1, ISSN:3328-3333, 2008.
[14] T. T. Nguyen, S. Yang, and J. Branke, “Evolutionary dynamic optimization: a survey of the state of the art”, Swarm and Evolutionary Computation, Vol.6, Issue.3, pp.1–24, 2012.
[15] Mandeep Kaur, Manoj Agnihotri, "A Hybrid Technique Using Genetic Algorithm and ANT Colony Optimization for Improving in Cloud Datacenter", International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.100-105, 2016.
Citation
Prachi Chaturvedi, Sanjiv Sharma, "Workflow Scheduling Mechanism Using PCSO n Cloud: Case Study," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.7-18, 2017.
A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.19-23, Jun-2017
Abstract
Cloud computing has created a brief exchange in code paradigm and being extraordinarily new generation however has been followed extensive through numerous groups and character for his or her computing wants. Definition of Cloud Computing is definitely unique from definitions provided thru researchers. Cloud computing is emerging paradigm gives various IT associated offerings. The safety and privacy are maximum critical elements that inhibits the boom of cloud computing. Security factors are reasons behind lesser amount of actual instances and business enterprise associated cloud applications in assessment to consumer related cloud software program. “Cloud computing can be a model for permitting omnipresent, on hand, on-name for Network get admission to to a shared pool of configurable computing sources (e.g., networks, servers, storage, applications, and services) that may be rapid provisioned and discharged with tokenism manage strive or service organization interaction. This cloud model includes five critical traits, three service fashions (Software as a Service (SaaS). Platform as a Service (PaaS). Infrastructure as a Service (IaaS) and 4 education fashions (Private, Community, Public and Hybrid varieties of cloud)”. The developing pace of cloud is as a substitute brief.
Key-Words / Index Term
Cloud Computing, homomorphic coding algorithmic rule, Security Challenges, Integrity
References
[1]. S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013. Yu, Shucheng, "Achieving secure, scalable and first-class-grained know-how access management in cloud computing." INFOCOM, 2010 Proceeding IEEE, 2010.
[2]. Pearson, Siani, "Taking account of privacy as soon as planning cloud computing offerings." Proceedings of the 2009 ICSE Workshop on software program package Engineering Challenges of Cloud Computing, IEEE Society, 2009.
[3]. M. Al. Zain, B. Soh, & E. Pardede, “Replacement Approach victimization Redundancy Technique to reinforce Security” in Cloud Computing, IEEE, 2012
[4]. R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.
[5]. Hwang, Kai, Sameer Kulkareni, and Yue Hu, "Cloud safety with virtualized defines and popularity-primarily based receive as true with manipulate." Dependable, involuntary and Secure Computing, International Conference on IEEE, 2009.
[6]. V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.
[7]. Wooten, Ryan, "Design and implementation of a at ease useful resource social cloud system." Cluster, Cloud and Grid Computing (CC Grid), 2012 twelfth IEEE/ACM International convention, IEEE, 2012.
[8]. Ahlam Ansari, Tahir Ansari, Faizan Hingora and Mudassir Ansari, "A Secure Cloud Server Using Raspberry Pi and Kerberos Authentication Protocol", International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.56-58, 2015.
[9]. Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, "Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
Citation
Abhishek Satyarthi, Sanjiv Sharma, "A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.19-23, 2017.
A Comparative Study for Image Steganography using Transform Domain Method
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.24-28, Jun-2017
Abstract
In a recent times, steganography is the general concept to covert the secret data for an unauthorized users. In this paper we calculate the PSNR and a MSE value for embedding and extracting the image. Find out the result of a different-different image. we apply the techniques of a steganography are a DWT, DCT, DFT and a LSB . In this paper also we include the algorithm of a steganography. PSNR is used to check the imperceptibility of the image and MSE is used to find out the error of an image degrade.
Key-Words / Index Term
Discrete wavele transform (DWT), Discrete cosine transform (DCT), Discrete fourier transform (DFT), Least significant bit (LSB), Peak-signal-to-noise-ratio (PSNR), Mean square error (MSE).
References
[1] Malatesh M, Smt. Anitha G and Ujjini Venkatesh, "Secure Data Transform in Encrypted Image Using Steganography Technique", International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.85-89, 2015.
[2] N. Kundu, A. Kaur , "Audio Steganography for Secure Data Transmission", International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.124-129, 2017.
[3] Rajesh Shah and Yashwant Singh Chouhan, "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.1, pp.22-28, 2014.
[4] Sakshi and A. Kaur , "Secure Data Hiding Using Neural Network and Genetic Algorithm in Image Steganography", International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.95-99, 2017.
[5] Monday O. Eze and Chekwube G. Nwankwo, "Construction of Cryptographic e-Tags using Chronological Binary Transforms", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.4, pp.13-20, 2015.
[6] S. Suri, H. Joshi, V. Mincoha, A. Tyagi, "Comparative Analysis of Steganography for Coloured Images", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.180-184, 2014.
[7] Mr. Madhusudhan Mishra1, “Secret Communication using Public l(ey Steganography”, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014),May 09-11,2014, Jaipur, India.
[8] Zohreh Fouroozesh,” Image Steganography based on LSBMR using Sobel Edge Detection”, The Third International Conference on e-Technologies and Networks for Development (ICeND2014), Beirut, pp. 141-145, 2014.
[9] Rina Mishra,” An Edge Based Image Steganography with Compression and Encryption”, IEEE International Conference on Computer, Communication and Control (IC4-2015).]
[10] Z. V. Patel,” A Survey Paper on Steganography and Cryptography”, International Multidisciplinary Research Journal Vol.2, Issue.5, May-2015.
[11] Kalaivanan.S1,” A Survey on Digital Image Steganography”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 4, Issue 1, January-February 2015
[12] S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar, "Hiding Existence of Communication Using Image Steganography", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.163-166, 2014.
[13] Princymol Joseph, “A Study on Steganographic Techniques”, Proceedings of 2015 Global Conference on Communication Technologies(GCCT 2015).
Citation
S.K. Yadav, Manish Dixit, "A Comparative Study for Image Steganography using Transform Domain Method," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.24-28, 2017.
Comparison of Feedback based and Non-Feedback Based Protocols for improvement of TCP in MANETs
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.29-34, Jun-2017
Abstract
Mobile Ad-Hoc Networks (MANETs) have gained a lot of popularity as a means of providing continuous connectivity of network and Internet to mobile computing devices, independent of their physical location. The routing protocols are needed to support the network in such environments. MANETs are used for enhancing the communications with a rapid score of flexibility. The networks will create an interconnection with other connections using IP as the appropriate connecting protocol. Transmission Control Protocol (TCP) is widely applied in the endwise transport layer communication practice. The system has a scheme of self-generating error checks and controls. Its performance is optimum in the wired-networks where packet losses resulting from congestion are experienced. These packet losses could be specifically attributed to the Bit Error Rate (BER) and disconnections during mobility. The application of the standard TCP on this networks will lead to degradation in performance. This paper compares the Feedback Based and Non-Feedback based approaches typically used for improving the TCP protocol performance in MANETs based on secondary data collection methodology.
Key-Words / Index Term
MANETs, Feedback Based TCP, Non-Feedback Based TCP
References
[1] I. Chlamtac, M. Conti, J. Liu, “Mobile Ad-Hoc networking: Imperatives and challenges”, Ad Hoc Networks, Vol. 1, Issue 1, pp. 13-64, 2003.
[2] B. Wang, J. Kurose, P. Shenoy, D. Towsley, “Multimedia streaming via TCP: An analytic performance study”, CM Transactions on Multimedia Computing, Communications, and Applications, Vol. 4, No. 2, pp. 1–22, 2008.
[3] Al Hanbali, A., E. Altman, P. Nain, “A survey of TCP over ad hoc networks”, IEEE Communications Surveys & Tutorials, Vol. 7, Issue 3, pp.22-36, 2005.
[4] X. Chen, H. Zhai, J. Wang, Y. Fang,, “A survey on improving TCP performance over wireless networks, In Resource management in wireless networking”, Springer US, USA, (pp. 657-695), 2005.
[5] W. Xu, T. J. Wu, “TCP issues in mobile ad hoc networks: Challenges and solutions”, Journal of Computer Science and Technology, Vol. 21, Issue 1, pp.72-81, 2006.
[6] J. Liu, S. Singh, “ATCP: TCP for mobile ad hoc networks”, IEEE Journal on selected areas in communications, Vol. 19, Issue 7, pp. 1300-1315, 2001.
[7] G. Holland, N. Vaidya, “Analysis of TCP performance over mobile ad hoc networks”, Wireless Networks, Vol. 8, Issue 2/3, pp. 275-288, 2002.
[8] A. Hanbali, E Altman, P Nain, “A survey of TCP over mobile ad hoc networks”, Doctoral dissertation, Inria, 2004.
[9] F. Wang, Y. Zhang, “Improving TCP performance over mobile ad-hoc networks with out-of-order detection and response”, In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, Switzerland, pp. 217-225, 2002.
[10] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[11] D. Sensarma, K. Majumder, “An efficient ANT based QoS aware intelligent temporally ordered routing algorithm for MANETs”, International Journal of Computer Networks & Communications (IJCNC), Vol. 5, Issue 4, pp. 189-203, 2013.
[12] H. A. El Zouka, “Analysis of denial of service attacks on mobile ad-hoc networks”, International Journal of Engineering and Technology, Vol. 9, Issue 1, pp. 12-16, 2017.
[13] R. Pusuluri, R. Aggarwal, “A study on improving the performance of TCP and various design issues in MANETs”, Indian Journal of Science and Technology, Vol. 9, Issue 47, pp. 1-7, 2016.
[14] K. Arai, L. Sugiyanta, “Energy behavior in ad hoc network minimizing the number of hops and maintaining connectivity of mobile terminals which move from one to the others”, International Journal of Computer Networks (IJCN), Vol, 2, Issue 6, pp. 190-204, 2005.
[15] J. Gaur, G. Singh, “MANET Routing Protocols: A Review”, International Journal of Computer Sciences and Engineering (IJCSE), Vol. 5, Issue 3, pp. 123-128, 2017.
Citation
A.S. Deshpande, A. Kaushal, "Comparison of Feedback based and Non-Feedback Based Protocols for improvement of TCP in MANETs," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.29-34, 2017.
Social network,classifier, MEKA, Random forest tree, J48, REP tree
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.35-41, Jun-2017
Abstract
Recently, Social networks are linked to the one another which are made of actors called as node and a variety of social familiarities of relationships are offered by edges. Classification is essential approach with the broad applications to categorize the different types of data needed in nearly all type of field of the life. Classification used for classifying the item according to features of item w. r. t the classes which are predefined. In the classification tree modeling data is being classified to do the predictions about the data which is new. This type of paper describes use of the classification trees and the shows three methods of pruning them. An experiment has set up using the various types of the algo which is classification tree algorithms having various methods of pruning to test performance of algorithm and the method of pruning . Here paper is about analyzing about the properties of data set to search relations among them. MEKA used inside the implementation of proposed work which provide the result and show that our work is much better than existing work.
Key-Words / Index Term
Social network,classifier, MEKA, Random forest tree, J48, REP tree
References
[1] Ho, Tin Kam, “Random Decision Forests”, (PDF), Proceedings of the 3rd International Conference on Document Analysis and Recognition, Montreal, QC, 14–16. pp. 278–282, August 1995.
[2] Tin Kam, "The Random Subspace Method for Constructing Decision Forests" (PDF).IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume: 20, Issue: 8, Pages: 832 – 844, 1998.
[3] Hastie, Trevor; Tibshirani, Robert; Friedman, Jerome, “ The Elements of Statistical Learning” (2nd ed.). Springer. ISBN 0-387-95284-5, pp: 1-764, 2008
[4] Danah m. boyd, Nicole B Ellison "Social Network Sites: Definition, History, and Scholarship" Journal of Computer-Mediated Communication, vol l3, issue no. 1, pp: 1-18 (2007).
[5] A.Malathi, D.Radha, “Analysis and Visualization of Social Media Networks”, IEEE, ISBN: 978-1-5090-1022-6, Pages: 58 - 63, 2016.
[6] N. Landwehr, M. Hall, and E. Frank, “Logistic Model Trees,” Machine Learning,, spinger, Volume 59, Issue 1, pp 161–205, 2005.
[7] Yunhu Jin, Yongjun Shen, Guidong Zhang, Hua Zhi “The Model of Network Security Situation Assessment Based on Random Forest”, lEEE, ISSN: 2327-0594, Pages: 977 – 980, 978-1-4673, 2016.
[8] Veena N. Jokhakar, S. V. Patel “A Random Forest Based Machine Learning Approach For Mild Steel Defect Diagnosis”, IEEE, ISSN: 2473-943X, Pages: 1 - 8 978-1-5090-061, 2016.
[9] Qiang Li, Student Yu Gu,, and Nan-Fei Wang, “Application of Random Forest Classifier by Means of a QCM-based E-nose in the Identification of Chinese Liquor Flavors”, IEEE, Volume: 17, Issue: 6, Pages: 1788 – 1794, 2016.
[10] P. Kalaiselvi, D. Geetha “Weather Prediction Using J48, EM And K-Means Clustering Algorithms” International Journal of Innovative Research in Computer and Communication Engineering,, ISSN(Online): 2320-9801, Vol. 4, Issue 12, PP: 20889- 20895, December 2016.
[11] Manish Kumar, “Prediction of Chronic Kidney Disease Using Random Forest Machine Learning Algorithm”, International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology, IJCSMC, ISSN 2320–088X, Vol. 5, Issue, pg.24 – 33, 2, February 2016.
[12] Kittipol Wisaeng “A Comparison of Decision Tree Algorithms For UCI Repository Classification” International Journal of Engineering Trends and Technology (IJETT), ISSN: 2231-5381,Volume 4 Issue 8, Page 3393- 3397, August 2013.
[13] Tina R. Patil, Mrs. S. S. Sherekar “Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification” International Journal Of Computer Science And Applications, ISSN: 0974-1011, Vol. 6, Issue No.2,PP; 256- 261, Apr 2013.
[14] R. Nithya, B. Santhi, “Decision tree classifiers for mass classification”,IJCSE, Decision tree classifiers for mass classification, Vol. 8, Nos. 1/2, Page: 39- 45, 2015
Citation
Anupama tyagi, Sanjiv Sharma, "Social network,classifier, MEKA, Random forest tree, J48, REP tree," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.35-41, 2017.
Cybersecurity in Developing World towards Excellency by 2026 – Opportunities, Policies
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.42-48, Jun-2017
Abstract
Information and communication technology (ICT) is playing a major role in the development of socio economic related issues. Some countries in the globe have taken advantage with the effectiveness of ICT, Cyberspace and are in the process of transforming their economies into knowledge and information based economies. These benefits are being challenged by the increasing cyber threats where there is no global conscious on how to regulate cyberspace even through several countries having their own cyber security policies but without proper measures. The current setup of the internet enables developing countries to work together as a global village. The goal of this paper are to help policy makers, businesses, and societal organizations to better prepare for the technological changes ahead and enable all stakeholders to consider how present day policy choices might influence future outcome. In our paper we propose cybersecurity 2026 model along with methodology which concentrate on the several components to form a framework for trust and online security.
Key-Words / Index Term
Cyberspace, ICT, Stakeholders, Cybersecurity Model 2026.
References
[1]. James Manyika, Michael Chui, Jacques Bughin, “Disruptive Technologies: Advances that will transform life, Business and Global Economy, McKinsey”, Global Institute, May 2013.
[2]. R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future directions for behavioral information security research,” Computers & Security, vol. 32, pp. 90–101, Feb. 2013.
[3]. Greenwald G, MacAskill E., “Boundless Informant: the NSA’s secret tool to track global surveillance data”, The Guardian. 2013 Jun 11;11.
[1]. Cavely, M.D.(2014) Breaking the Cyber Security Dilemma: Aligning Security needs nad Removing Vulnerabilities( Springer Science)
[2]. Laukka, M(2010). "Criteria for privacy support system". Proceedings of the 5th Nordic Workshop on secure IT systems, Raykjavik, Iceland, Oct 12-13.
[3]. DeGusta, Michael. "Are smart phones spreading faster than any technology in human history." Massachusetts Institute of Technology Review (2012). APA
[4]. Manyika J, Bughin J, Lund S, Nottebohm O, Poulter D, Jauch S, Ramaswamy S., “Global flows in a digital age: How trade, finance, people, and data connect the world economy”. McKinsey Global Institute; 2014.
[5]. S.Jayasri, D.Karthika, "Microcontroller Based Traffic and Road Condition Monitoring Alert System Using Internet of Things", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.272-279, 2016.
[6]. United States. “White House Office, and Barack Obama. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked Worldr”. White House, 2011. APA
[7]. Gwartney, James, Robert Lawson, and Seth Norton. “Economic freedom of the world 2008 annual report”. The Fraser Institute, 2008. APA
[8]. Organisation for Economic Co-operation and Development (OECD). Better skills, better jobs, better lives: a strategic approach to skills policies. OECD, 2012. APA
[9]. The UK Cyber Security Strategy, 2011, https://www.gov.uk/government/uploads/system/uploads/ attachment_data/file/60961/uk-cyber-security-agency-prism-outline-lyrics#lyric
Citation
N. Satheesh Kumar, Zelalem Mihret, "Cybersecurity in Developing World towards Excellency by 2026 – Opportunities, Policies," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.42-48, 2017.
Category Based Search for Collaborative Environment
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.49-53, Jun-2017
Abstract
The Foremost goal of CBSCE (Category based search for Collaborative Environment) is to minimize the time required to obtain particular information, also increase user satisfaction with the result that they are going to get for the specific search. CBSCE provides enhanced search results based on previous user interplays with the systems by tracking each user`s performance every time user logs in the system. Existing system used HMM(Hidden markow Model) model which is intensely complicated and hard to extend further, as the primary goal is session clustering, session clustering along with HMM model is what very hard to link such results which take time and less efficient operation. It provides user interaction related search based on existing interactions, for that HMM, is used, Instead of HMM SVM(Support Vector Machine) is a technique you can customize as per the need and which is very flexible with session clustering.
Key-Words / Index Term
Hidden markow model, category based search for knowledge sharing system, Support vector machine, Knowledge sharing
References
[1] S.H. Beigy, H, "Expertise Finding, in Bibliographic Network: Topic Dominance Learning Approach", Cybernetics, Volume-44, Issue-12, IEEE transaction, Iran, 2646 – 2657, 2014.
[2] H. Shen; Z. Li; J. Liu; Grant, J.E., “Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications", Volume-64, Issue-6, IEEE Transactions on Computers, USA, 1715 - 1728, 2014.
[3] K. Hwang, "Model Learning and Knowledge Sharing for a Multiagent System With Dyna-Q Learning", Volume-44, Issue-5 IEEE TRANSACTIONS ON CYBERNETICS, Taiwan, 978-990, 2014.
[4] Z. Guan, S. Yang, H. Sun, M. Srivatsa, X. Yan," Fine-Grained Knowledge Sharing in Collaborative Environments", Volume-27, Issue-8, IEEE Transactions on Knowledge and Data Engineering, Northwest Univ. of China, Xi`an, China, 2163 – 2174,2015.
[5] A. Appice,D. Malerba, "A Co-training Strategy for Multiple View Clustering in Process Mining", Volume-9, Issue-6, IEEE TRANSACTIONS ON SERVICES COMPUTING, Italy, 43–50,2015
[6] Z. Lu, X. Yang," Inferring User Image-Search Goals under the Implicit Guidance of Users", Volume-24, Issue-3, IEEE Circuits and Systems Society, China,394 - 406, 2014
[7] S. Tong, D. Koller," Support Vector Machine Active Learning with Applications to Text Classification", Journal of Machine Learning Research, Stanford CA, 45-66, 2001.
[8] Y. Song, Ming-Wei Chang, "Learning to Extract Cross-Session Search Tasks", the University of Illinois at Urbana-Champaign Urbana IL, USA,1-11,2013
[9] B. Li, X. Zhu, "Rating Knowledge Sharing in Cross-Domain Collaborative Filtering", Volume-45, Issue-5, Cybernetics, IEEE Transaction, Sydney, 1068 - 1082,2015
[10] N. Kolhe,H. Kulkarni,I. Kedia,S. Gaikwad, "Comparative Analysis of Cluster based Boosting", Volume-3, Issue-10, International Journal of Computer Sciences and Engineering, pune india, 60-70, 2015
Citation
T.V. Salokhe1, P.M. Pawar, "Category Based Search for Collaborative Environment," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.49-53, 2017.
Application of Fuzzy Logic for Presentation of an Expert Fuzzy System to Diagnose Thalassemia
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.54-61, Jun-2017
Abstract
In this paper We have designed a Thalassemia diagnosis model under some fuzzy rules. The performance of the system is approximately similar as the clinical results. Also, through this system the category of Thalassemia disease can be predictable. We have used MATLAB tool of Mamdani Fuzzy Inference System (FIS) to identify the severity of the disease. The objective of this research is to create a Fuzzy model for Thalassemia disease diagnosis. The results in this work can be obtained by a simple and inexpensive method. This would generate, in economic terms, significant savings.
Key-Words / Index Term
Fuzzy Logic, Mamdani FIS, Symptoms of Thalassemia, Thalassemia Disease.
References
Grow K, Vashist M, Abrol P, Sharma S, Yadav R. “Beta Thalassemia in India: Current Status and the Challenges Ahead”. International journal of Pharmacy and Pharmaceutical Science , Vol.3, Issue.4, pp.28-33, 2014.
[2] G. Vijay, G. David, “Thalassemia: An Overview of 50 Years of Clinical Research”, Elsevier- Hematology/Oncology Clinics of North America, Vol.24, Issue.6, pp. 1005-1020, 2010.
[3] S. Thakur, R. Sharma, “Prevention Measures for Thalassemia in Chhattisgarh, India: with the help of mathematical models”, American Journal of Mathematics and Mathematical Sciences Vol.2, Issue.2, pp.193-200, 2013.
[4] F. Aversa, E. Gronda, S. Pizzuti, C. Aragno, “A fuzzy logic approach to decision support in medicine”, Proceedings of the Conference on Systemics, Cybernetics and Informatics, 2002.
[5] A. Novruz, “Design of Fuzzy Expert Systems and Its Applications in Some Medical Areas”, International Journal of Applied Mathematics, Electronics and Computers , Vol 2, Issue.1, pp.1-8, 2014.
[6] C. Tamalika, C Tridib, “Intuitionistic fuzzy sets: Application to medical image segmentation”, Studies in Computational Intelligence, Springer, Vol.85, pp.51-68, 2008.
[7] C. Schuh, “Fuzzy sets and their application in medicine”, Proceedings of the North American Fuzzy Information Society, pp.86-91, 2005.
[8] K. Yamada, “Diagnosis under compound effects and multiple causes by means of the conditional causal possibility approach”, Fuzzy Sets and Systems, Vol.145, pp.183-212, 2004.
[9] Shradhanjali, “Fuzzy Petry Net Application: Heart Disease Diagnosis”, International Conference on Computing and Control Engineering, 2012.
[10] K. Lavanya, M.A. Durai, S.N. lyengar, “Fuzzy Rule Based Inference System for Detection and Diagnosis of Lung Cancer”, International journal of Latest Trends in computing, Vol.2, pp.165-169, 2011.
[11] A. Adeli, M. Neshat, “ A Fuzzy Expert System for Heart Disease Diagnosis”, Proceedings of the International Multi Conference of Engineers and Computer Scientists , Vol .1, pp.136-139, 2010.
[12] J. Soni, U. Ansari, D. Sharma, “Intelligent and Effective Heart Disease Prediction System using Weighted Associative classifiers”, International Journal on Computer Science and Engineering, Vol.3, Issue.6, pp.2385-2392, 2011.
[13] M. Neshat, M. Yaghobi, M.B. Naghibi, A. Esmaelzadeh, “Fuzzy Expert System Design for Diagnosis of liver Disorders”, IEEE Proceeding International Symposium on Knowledge Acquisition and Modeling, pp.252-256, 2008.
[14] M. Kadhim, M. Alam, H. Kaur, “Design and Implementation of Fuzzy Expert System for Back pain Diagnosis”, International Journal of Innovative Technology & Creative Engineering, Vol .1, Issue.9, pp.16-22, 2011.
[15] H.J. Zimmermann, “Fuzzy Set Theory And its Application”, Third Edtion, Kluwer Academi Publishers, 1996.
[16] L.A. Zadeh, “Fuzzy Sets”, Information and Control, Vol. 8, pp. 338-353, 1965.
[17] S. Hemba, N. Islam, “Fuzzy Logic: A Review”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.61-63, 2017.
[18] T. Kasbe, R. S. Pippal, “Dengue Fever: State-of-the-Art Symptoms and Diagnosis”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.26-30, 2016.
[19] T. Takagi, S. Sugeno, “Fuzzy identification of systems and its applications to modeling and control”, IEEE Transactions on Systems Man and Cybernetics, Vol.15, Issue.1, pp.116-132, 1985.
[20] E.P. Dadios, “Fuzzy Logic Controls, Concepts, Theories and Applications”, InTech, pp. 325-350, 2012.
[21] J. Alain, M.D.Marengo-Rowe, “The Thalassemias and related Disorders”, Baylor University of Medical Center Proceedings, Vol. 20, pp.27–31, 2007.
Citation
S. Thakur, S. N. Raw, A. Prakash, P. Mishra, R. Sharma, "Application of Fuzzy Logic for Presentation of an Expert Fuzzy System to Diagnose Thalassemia," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.54-61, 2017.
An Effective Approach to an Image Retrieval using SVM Classifier
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.62-72, Jun-2017
Abstract
Content Based Image Retrieval (CBIR) is an important and challenging research area of digital image processing for browsing and retrieving the images from the wide range of image database. The basic requirement of the CBIR system is to retrieve the relevant information from large image database following to query image with higher system performance. In this paper the two step strategy is developed in which the first step is to extract the low level or pixel level features of the image by using color, texture and shape descriptor. Here an efficient fused feature extraction method based on color and edge directivity descriptor (CEDD) for extracting the color as well as texture features and two level discrete wavelet transform (2D-DWT) for extracting the shape feature of the image is proposed. While, in the second step the SVM classifier is used to classify the images into different classes and to handle irrelevant examples. For retrieving the similar images following to query image the Euclidean distance similarity measurement is used. This fused and classified based proposed scheme applied on different image databases and proved that it is providing better results over various existing methods and individual approaches.
Key-Words / Index Term
CBIR, feature extraction, color and edge directive descriptor, 2 level discrete wavelet transform, support vector machine, similarity measurement
References
[1] Mr. Kondekar V. H., Mr. Kolkure V. S., Prof. Kore S. N., “Image Retrieval Techniques based on Image Features: A State of Art approach for CBIR”, International Journal of Computer Science and Information Security, Vol. 7, No. 1, pp. 69-75, 2010.
[2] Chesti Altaff Hussain, Dr. D. Venkata Rao, Dr. S. Aruna Mastani, “Low Level Feature Extraction Methods for Content Based Image Retrieval”, 978-1-4799-7678-2/15/©2015 IEEE.
[3] F. Long, H. Zhang, H. Dagan, and D. Feng, “Fundamentals of Content Based Image Retrieval”, Multimedia Signal Processing Book, Chapter 1, Springer-Verlag, Berlin Heidelberg New York, 2003.
[4] Manpreet Kaur, and Neelofar Sohi, “A Novel Technique for Content Based Image Retrieval Using Color, Texture and Edge Features”, International Conference on Communication and Electronics System (ICCES), 2016, DOI. 10.1109/CESYS.2016.7889955.
[5] Sawat Somnugpong, and Kanokwan Khiewwan, ”Content- Based Image Retrieval Using a Combination of Color Correlograms and Edge Direction Histogram”, 978-1-5050-2033-1/16/©2016 IEEE.
[6] Yogita Mistry, D.T. Ingole, and M.D. Ingole, ”Efficient content based image retrieval using transform and spatial feature level fusion”, 978-1-4673-9859-6/16 ©2016 IEEE.
[7] Rajkumar Jain, and Punit Johari, ”An improved approach of cbir using color based hsv quantization and shape based edge detection algorithm”, 978-1-5090-0774-5/16 ©2016 IEEE.
[8] Garima Gupta, and Manish Dixit, “CBIR on Biometric Application using Hough Transform with DCD, DWT Features and SVM Classification”, International Journal of Engineering and Innovative Technology, ISSN: 2277-3754 , Volume 4, Issue 12, June 2016.
[9] Pradnya Vikhar, and Pravin Karde, “Improved CBIR System using Edge Histogram Descriptor (EHD) and Support Vector Machine (SVM)”, International Conference on ICT in Business Industry & Government (ICTBIG), 978-1-5090-5515-9/16/$31.00 ©2016 IEEE.
[10] Katta Sugamya, Suresh Pabboju, and Dr. A. Vinaya Babu, “A CBIR Classification using Support Vector Machines”, 978-1-4673-8810-8/16/$31.00 ©2016 IEEE.
[11] Navneet Kaur, Sonika Jindal, and Bhavneet Kaur, “Relevance Feedback Based CBIR System Using SVM and Bayes Classifier”, Second International Conference on Computational Intelligence & Communication Technology, 978-1-5090-0210-8/16 $31.00 © 2016 IEEE.
[12] Kommineni Jenni, Sarita Mandala, and Mohd Shahrizal Sunar, “Content Based Image Retrieval Using Colour Strings Comparison”, 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15), 1877-0509 ©2015, pp. 374-379.
[13] Amit Khatami, and Saeed Mirghasemi, “A New Color Space Based on K-medoids Clusterings for Fire Detection”, 978-1--4799-8697-2/15/$31.00 © 2015 IEEE, DOI 10.1109/SMC. 2015.481, pp. 2755-2760.
[14] Manoj D. Chaudhary, and Abhay B. Upadhayay, “Integrating Shape and Edge Histogram Descriptor with Stationary Wavelet Transform for Effective Content Based Image Retrieval”, International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1522-1527, 978-1-4799-2397-7/ 2014 IEEE.
[15] S. Agarwal, A. K. Verma and P. Singh, "Content Based Image Retrieval using Discrete Wavelet Transform and Edge Histogram Descriptor", 2013 International Conference on Information Systems and Computer Networks, Mathura, 2013, pp. 19-23.
doi: 10.1109/ICISCON.2013.6524166.
[16] Raghupathi Gali, M. L. Dewal, and R. S. Anand, “Genetic Algorithm for Content Based Image Retrieval”, 978-0-7695-4821-0/12 $26.00 © 2012 IEEE, DOI 10.1109/CICSyN.2012.52.
[17] Savvas A Chatzichristofis, and Yiannis B. Boutalis, “CEDD: Color and Edge Directivity Descriptor. A Compact Descriptor for Image Indexing and Retrieval”, ICVS 2008, LNCS 5008, pp. 312-322, 2008.
[18] Chatzichristofis S., Boutalis Y., ”A Hybrid Scheme for Fast and Accurate Image Retrieval Based on Color Descriptors”, De Mallorca, P. (ed.) IASTED International Conference of Artificial Intelligence and Soft Computing (ASC 2007), Spain.
[19] C.S. Won, D.K. Park, and S.J. Park, ”Efficient Use of Edge Histogram Descriptor-An Overview”, ETRI Journal, vol. 24, Number 1, Feb 2002, pp. 23-30.
[20] A. Haris Rangkuti, Nashrul Hakiem, Rizal Broer Bahaweres, Agus Harjoko, and Agfianto Eko Putro, ”Analysis of Image Similarity with CBIR Concept Using Wavelet Transform and Threshold Algorithm”, 978-1-4799-0210-1/13©2013 IEEE.
[21] Ekta Gupta, and Rajendra Singh Kushwah, “Combination of Global and Local Features using DWT with SVM for CBIR”, 978-1-4673-7231-2/15/$31.00 ©2015 IEEE.
[22] Nikita Upadhyaya, and Manish Dixit, “An Insight to Various CBIR Technique: A Survey”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 5, May 2016, ISSN: 2277 128X.
[23] Sujata T Bhairnallykar, and V.B.Gaikwad, “Content based Medical Image Retrieval with SVM Classification and Relevance Feedback”, International Journal of Applied Information Systems (IJAIS) ISSN 2249-0868, PP 25-29, 2013.
[24] Nikita Upadhyaya, and Manish Dixit, “A Review: Relating Low Level Features to High Level Semantics in CBIR,” International Journal of Signal Processing, Image Processing and Pattern Recognition”, vol. 9, No. 3(2016), pp. 433-444 (2016).
[25] Diksha Kurchaniya, and Punit Kumar Johary, “Analysis of Different Similarity Measures in Image Retrieval Based on Texture and Shape”, International Research Journal of Engineering and Technology (IRJET),Volume: 04 Issue: 04 | Apr -2017, e-ISSN: 2395-0056, p-ISSN: 2395-0072
[26] ANSARI, Mohd Aquib; DIXIT, Manish., “An Image Retrieval Framework: A Review”, International Journal of Advanced Research in Computer Science, [S.l.], v. 8, n. 5, p. 692-699, june 2017. ISSN 0976-5697.
[27] Edwin Paul, and Ajeena Beegom A S, “Mining Images for Images Annotation using SURF Detection Technique”, International Confrence on Control, Communication & Computing India (ICCC), 978-1-4649-7349-4/15//$31.00 ©2015 IEEE
[28] Priyadarshini Patil, and Bhagya Sunag, “Analysis of Image Retrieval Techniques Based on Content”, International Advance Computing Conference (IACC), pp. 958-962, 978-1-4799-8047-5/15/$31.00 ©2015 IEEE.
[29] Nur Shazwani Kamarudin et al., “Comparison of Image Classification Techniques using Caltech 101 Dataset”, Journal of Theoretical and Applied information Technology, Vol. 71, No. 1, ISSN:1992-8645, 2015.
[30] Ruchi Jayaswal, Jaimala Jha, “An Hybrid Approach for Image Retrieval using Visual Descriptors”, International Conference on Computing, Communication and Automation (ICCCA), ISBN: 978-1-5090-6471-7/17/$31.00©(2017)IEEE
Citation
Mohd. Aquib Ansari, Diksha Kurchaniya, Manish Dixit, Punit Kumar Johari, "An Effective Approach to an Image Retrieval using SVM Classifier," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.62-72, 2017.