Sentiment Analysis Based on a Deep Stochastic Network and Active Learning
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.1-6, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.16
Abstract
This paper proposes a novel approach for sentiment analysis. The growing importance of sentiment analysis commensurate with the use of social media such as reviews, forum discussions, blogs, microblogs like Twitter, and other social networks. We require efficient and higher accuracy algorithms in sentiment polarity classification as well as sentiment strength detection. In comparison to pure vocabulary based system, deep learning algorithms show significantly higher performance. The goal of this research is to modify a Recurrent Neural Network (RNN) with Gated Recurrent Unit (GRU) by introducing stochastic depth in a hidden layer and comparing it with baseline Naïve Bayes, vanilla RNN and GRU-RNN models. To improve our results, we also incorporated Active Learning with Uncertainty Sampling approach. Movie review dataset from Rotten Tomatoes was used, the dataset includes 215,154 fine grained labelled phrases in addition to 11,855 full sentences. We performed pre-processing on the data and used an embedding matrix with pre-trained word vectors as features for training our model. These word vectors were generated using character level n-grams with fasttext on Wikipedia data.
Key-Words / Index Term
Fasttext, Recurrent Neural Network, Gated Recurrent Unit, Active Learning
References
[1] Bojanowski, Piotr, et al, “Enriching word vectors with subword information”, arXiv preprint arXiv:1607.04606 (2016).
[2] Huang, Gao, et al, “Deep networks with stochastic depth”, European Conference on Computer Vision. Springer International Publishing, 2016.
[3] Socher, Richard, et al, “Recursive deep models for semantic compositionality over a sentiment treebank”, Proceedings of the 2013 conference on empirical methods in natural language processing. 2013.
[4] Lewis, David D., and William A. Gale, “A sequential algorithm for training text classifiers”, Proceedings of the 17th annual international ACM SIGIR conference on Research and development in information retrieval. Springer-Verlag New York, Inc., 1994.
[5] McCallum, Andrew, and Kamal Nigam, “A comparison of event models for naive bayes text classification”, AAAI-98 workshop on learning for text categorization. Vol. 752. 1998.
[6] Mikolov, Tomas, et al, “Efficient estimation of word representations in vector space”, arXiv preprint arXiv, pp.1301.3781 (2013).
[7] Mikolov, Tomas, et al, “Recurrent neural network based language model”, Interspeech. Vol. 2. 2010.
[8] Settles, Burr, “Active learning literature survey”, University of Wisconsin, Madison, Vol.52, pp.55-66, 2010.
Citation
Tulsi Jain, Kushagra Agarwal, Ronil Pancholia, "Sentiment Analysis Based on a Deep Stochastic Network and Active Learning," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.1-6, 2017.
New Iris Tracking Method using a Generalized Particle Filter
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.7-14, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.714
Abstract
Precise iris tracking is an important tool in assistive technology, and has many advanced applications such as in human-computer interactions and driver fatigue detection. Features such as shape, colour, and size of the iris enable specific position and centre of the iris to be tracked during its movement. The iris tracking system is divided into four stages: image acquisition, face detection, eye detection, and eye tracking. This study proposes a new method for iris tracking using a generalized particle filter. This approach utilizes a sample set of the tracked iris which is created at the beginning of the tracking process. The prior representation and position of the tracked iris are then predicted depending on the minimization of parameters of the proposed generalized probabilistic distribution. Results of the experiments show that the proposed method has high accuracy and can be used to efficiently track the at a shorter length of time.
Key-Words / Index Term
Iris tracking; Particle filter; β-Distribution; Biometrics; Fatigue detection
References
[1]. E.Ghasemi-Dehkordi1, M.Mahlouji2 and H.Ebrahimpour Komleh3 “Human Eye Tracking Using Particle Filters”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 5, No 2, September 2013.
[2]. H.R. Chennamma “A Survey on Eye-Gaze Tracking Techniques”, Indian Journal of Computer Science and Engineering (IJCSE), Vol. 4 No.5 Oct-Nov 2013.
[3]. J. Zhu, and J. Yang. “Subpixel eye gaze tracking”.5th IEEE International Conference on Automatic Face and Gesture Recognition, Page 131, May 20 - 21, 2002 .
[4]. K. Toennies, F. Behrens and M. Aurnhammer.” Feasibility of Hough-transform-based iris localization for real-timeapplication”.16th IEEE International Conference on Pattern Recognition, Quebec, Canada 11-15 Aug. 2002.
[5]. V. Raudonis, R. Simutis and G. Narvydas.” Discrete eye tracking for medical applications”. Proc. 2nd ISABEL, pp. 1–6, 2009.
[6]. S. Keerativittayanun, K. Rakjaeng, T. Kondo, W. Kongprawechnon, K. Tungpimolrut, and T. Leelasawassuk. “Eye Tracking System for Ophthalmic Operating Microscope”. ICROS-SICE International Joint Conference 2009, Fukuoka, Japan, August 18-21, 2009.
[7]. L. Ma, Y. Sun, N. Feng, Z. Liu, “Image Fast Template Matching Algorithm Based on Projection and Sequential Similarity Detecting”, Harbin Institute of Technology at Weihai, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, China, 2009.
[8]. Y. Kuo, J. Lee and S. Kao, “Eye Tracking in Visible Environment”, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 114-117, 2009.
[9]. J.Tang, and J. Zhang. “Eye Tracking Based on Grey Prediction.” First International Workshop on Education Technology and Computer Science. China, 7-8 March 2009.
[10]. K. D. Toennies , Beherens F., and Aurnhammer M. “Feasibility of Hough-Transform-based Iris Localisation for Real-Time-Application”, Proc Intl Symp on Eye Movements and Vision in the Natural World, Amsterdam/Rotterdam, 2002.
[11]. P. M. Daye and Optican L. M., “Saccade detection using a particle filter”, Journal of Neuroscience Methods, 235: 157–168, 2014.
[12]. D. W. Hansen and Q. Ji. In the eye of the beholder: “A survey of models for eyes and gaze”.IEEE Trans. Anal. Mach. Intell., 32(3):478–500, 2010.
[13]. W. Hotrakool, P. Siritanawan, and T. Kondo “.A realtime eye-tracking method using time-varying gradient orientation patterns”.Proc. Int. Conf. Electr. Eng., Electron. Comput. Telecommun. Inf. Technol., pp. 492–496, 2010.
[14]. B. Fu and R. Yang. “Display control based on eye gaze estimation”. Proc. 4th Int. CISP, 1:399–403, 2011.
[15]. W. Khairosfaizal and A. Nor`aini.”Eye detection in facial images using circular Hough transform”. Proc. 5th CSPA, pp. 238–242, 2009.
[16]. Y. Kuo, J. Lee, and S. Kao. “Eye tracking in visible environment”. Proc. 5th Int. Conf. IIH-MSP, pp. 114– 117, 2009.
[17]. J. Tang and J. Zhang,” Eye tracking based on grey prediction”. Proc. 1st Int. Workshop Education Technol. Computer Science, pp. 861–864, 2009.
[18]. P. Majaranta and Bulling A, “Eye Tracking and EyeBased Human–Computer Interaction”, In, S. H. Fairclough and K. Gilleade (eds.), Advances in Physiological Computing, Human–Computer Interaction Series, Springer-Verlag 2014.
[19]. M.Sadri, K. Kangarloo, F. Farokhi “Particle Filtering in the Design of an Accurate Pupil Tracking System”, International Journal of Computer Applications (IJCA), 51(8), 2012.
[20]. O. Boumbarov, Panev S., Sokolov S., and Kanchev V. IR “Based Pupil Tracking Using Particle Filtering", IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing systems: Technology and Applications, 21-23 September, 2009.
[21]. H. Liu and Q. Liu. Robust “real-time eye detection and tracking for rotated facial images under complex conditions”. Proc. 6th ICNC, pp. 2028–2034, 2010.
[22]. Y.Zhang, K.Jia. “A local and scale integrated feature descriptor in eye-gaze tracking”. Image and Signal Processing (CISP), 4th International Congress on, china, 15-17 Oct. 2011.
Citation
N.Yaghoobi Ershadi, "New Iris Tracking Method using a Generalized Particle Filter," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.7-14, 2017.
Performance Analysis of Classification Algorithms on Diabetes Dataset
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.15-20, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.1520
Abstract
Healthcare environment is generally perceived as being ‘information rich’ yet ‘knowledge poor’ [1]. Today in this hectic lifestyle, one of the major threats to human health is Diabetes Mellitus. Valuable knowledge can be discovered from application of data mining techniques in the Health care System particularly in Diabetes Database. There is a wealth of data available within the healthcare systems. However, there is a lack of effective analysis tools to discover hidden relationships and trends in data. Knowledge discovery and data mining have found numerous applications in business and scientific domain. This paper aims to analyze the performance of the classification techniques in diabetes data set.
Key-Words / Index Term
Diabetes Mellitus, Data Mining, Classification, Naïve Bayes, Random Forest, J48, JRIP, Multilayer Perceptron, KNN, Support Vector Machine, RBF Network, Weka
References
[1] Harleen Kaur and Siri Krishan Wasan, “Empirical Study on Applications of Data Mining Techniques in Healthcare”, Journal of Computer Science, Volume 2, Issue 2, 2006.
[2] V. Vapnik. The Nature of Statistical Learning Theory. NY: Springer-Verlag. 1995.
[3] K. Rajesh, V. Sangeetha, “Application of Data Mining Methods and Techniques for Diabetes Diagnosis”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012.
[4] K. Saravanapriya, A Study on Free Open Source Data mining Tools”, International Journal of Engineering and Computer Science, Volume 3, Issue 12, 2014.
[5] Russell, Stuart, Norvig, Peter, “Artificial Intelligence: A Modern Approach (2nd ed.)”. Prentice Hall. 2003 ISBN 978-0137903955
[6] Ho, Tin Kam, “Random Decision Forests”, Proceedings of the 3rd International Conference on Document Analysis and Recognition, Montreal, QC, pp. 278–282, 1995
[7] Wasserman, P.D.; Schwartz, T, “Neural networks. II. What are they and why is everybody so interested in them now?”, pp: 10-15; IEEE Expert, Vol 3, Issue 1, 1988.
[8] Broomhead, D. S.; Lowe, David, “Radial basis functions, multi-variable functional interpolation and adaptive networks (Technical Report). RSRE 4148, 1988.
[9] Tejashri N. Giri, S.R. Todamal, “Data mining Approach for Diagnosing Type 2 Diabetes”, International Journal of Science, Engineering and Technology”, Vol 2(8), 2014.
[10] Dr. M. Renuka Devi, J. Maria Shyla, “Analysis of Various Data Mining Techniques to Predict Diabetes Mellitus”, International Journal of Applied Engineering Research ISSN 0973-4562 Vol 11, Number 1 (2016), pp 727-730.
[11] Pardha Repalli, “Prediction on Diabetes Using Data mining Approach”, Oklahoma State University.
[12] R. Sukanya, K. Prabha,“Comparative Analysis for Prediction of Rainfall using Data Mining Techniques with Artificial Neural Network”,Vol 5, Issue 6, pp 288 - 292, June 2017.
Citation
K. Saravanapriya, J. Bagyamani, "Performance Analysis of Classification Algorithms on Diabetes Dataset," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.15-20, 2017.
Theoretical and Simulation Based Approach for Controlling Aircraft Longitudinal and Lateral Yaw Damper Movement Using PID Controller
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.21-26, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.2126
Abstract
In this manuscript we consider two different parameters of DC-8 aircraft and extend the work as original research for controlling the longitudinal and lateral yaw damper movement. Here we consider both the theoretical and numerical aspect of aircraft dynamics by modeling the control surfaces i.e., elevators and lateral yaw damper. For controlling these control surfaces we design an intelligent PID controller and examine the overall performance of the system primarily based on time response specification. The simulation results generated are plotted and evaluated between controller response v/s deflection of control surfaces i.e., horizontal stabilizer and vertical stabilizer/rudder. The controller is designed based on dynamical model of aircraft for which equations are derived governing input to elevator, and rudder, which are used to control aircraft longitudinal and directional stability of aircraft. A quantitative analysis of PID controller has been carried out in MATLAB 2014a Simulink© environment for all the two movements of aircraft based on time response specification.
Key-Words / Index Term
Pitch, Yaw, Elevators, Rudder, PID
References
[1] “Airframe and Power plant Mechanics”, (AC 65-15A)-Airframe Hand Book FAA”, U.S Department of Transportation-FAA, USA, pp.21-48, 1972.
[2] Q. Ma et al, “The design of longitudinal control augmentation system for aircraft based on L1 adaptive control”, IEEE Chinese Guidance, Navigation and Control conference (CGNCC), pp. 713-717, 2016.
[3] J. H. Kim, S. A. Gadsden and S. A. Wilkerson, “Adaptive integral sliding mode controller for longitudinal rotational control of a tilt rotor aircraft, 24th Mediterranean conference on control and automation (MED), pp. 820-825, 2016.
[4] I.N. Ibrahim and M.A. Al Akkad, “Exploiting An intelligent Fuzzy-PID system in nonlinear aircraft pitch control”, IEEE International Siberian Conference on Control and Communication (SIBCON), pp.1-7, 2016.
[5] P. Husek and K. Narenathreyas, “Aircraft longitudinal motion control based on Takagi-Sugeno fuzzy model”, Applied Soft Computing, Vol 49, pp. 269-278, Dec 2016.
[6] “Simulation of Design Systems”, H. Klee and R. allen, CRC Press, pp. 312-316
[7] “Flight dynamics, simulation and Control, for rigid and flexible aircraft”, R. Vepa, CRC Press, pp. 419-421.
[8] J. Chen, M.N. Omidvar, M. Azad and X. yao, “Knowledge-base Particle Swarm Optimization for PID controller tuning, 2011 IEEE Congress on Evolutionary Computation (CEC), 2017, pp. 1819-1826.
Citation
R. Dahiya, A. K. Singh, "Theoretical and Simulation Based Approach for Controlling Aircraft Longitudinal and Lateral Yaw Damper Movement Using PID Controller," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.21-26, 2017.
A Tripartite Zero Knowledge Authentication Protocol based on Elliptic Curve Weil Pairing
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.27-31, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.2731
Abstract
Secret sharing is an important cryptographic protocol having many striking applications in reality. In a fraudulent model, it is even more difficult to compute because, fraud will also know the secrets and will impersonate as a valid secret share holder thereafter. This paper proposes a model for zero knowledge identification of authentic secret shareholders based on Elliptic curves. The model considers Chinese remainder theorem based secret sharing scheme for oblivious computations. The proposed model uses Weil pairing based tripartite Diffie-Hellman model on Elliptic curves and the model only says whether the participating parties are true shareholders or not without reviling any secret information. The paper also discusses the computational aspects the proposed models and possible weaknesses of the model.
Key-Words / Index Term
Weil Pairing, Zero Knowledge Authentication, Secret Computing, Chinese Remainder, Elliptic Curve
References
[1] A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 24, no. 11, pp. 612-613, 1979.
[2] G. Blakley, "Safeguarding Cryptographic Keys," Proceedings of the National Computer Conference, 1979, vol. 48, pp. 313-317, 1979.
[3] E. Kernin, J. Greene and M. Hellman, "On Sharing Secret Systems," IEEE Transactions on Information Theory, Vols. IT-29, pp. 35-41, 1983.
[4] B. Schneier, Applied Cryptography, Protocols, Algorithms, and Source Code in C, 2nd ed., New Delhi: John Wiley & Sons, 2001.
[5] J. Hoffstein, J. Pipher and J. Silverman, Introduction to Mathematical Cryptography, New York: Springer+Business Media, 2008, pp. 81-84.
[6] C. Asmuth and J. Bloom, "A Modular Approach to Key Safeguarding," IEEE Transaction on Information Theory, Vols. IT-29, no. 2, pp. 208-210, 1983.
[7] M. Mignotte, "How to Share a Secret," in Lecture Notes in Computer Science, 1983.
[8] N. Singh, A. N. Tentu, A. Basit and V. C. Venkaiah, "Sequential Secret Sharing Scheme based on Chinese Remainder Theorem," IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, pp. 1-6, 2016.
[9] G. Shi, Y. Ci, R. Xie, H. Wang and J. Zeng, "A Dual Threshold Secret Sharing Scheme among Weighted Participants of Special Right," IEEE First International Conference on Data Science in Cyberspace (DSC), Changsha, pp. 104-108, 2016.
[10] M. Karanam, "Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, vol. 4, no. 5, pp. 21-24, 2016.
[11] A. Castiglione, P. D’Arco, A. D. Santis and R. Russo, "Secure Group Communication Schemes for Dynamic Heterogeneous Histributed Computing," Future Generation Computer Systems, vol. 74, pp. 313-324, 2017.
[12] A. Bilakanti, N. Anjana, A. Divya, K. Divya, N. Chakraborty and G. K. Patra, "Secure computation over cloud using fully homomorphic encryption," 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Bangalore, pp. 633-636, 2016.
[13] Raylin Tso, Abdulhameed Alelaiwi, S. Rahman, Mu-En Wu and M. Shamim Hossain, "Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud," Journal of Signal Processing Systems, vol. 89, no. 1, pp. 51-59, 2016.
[14] Quisquater, J. Jacques, G. Louis and B. Thomas, "How to Explain Zero-Knowledge Protocols to Your Children," Proceedings of the Advances in Cryptology – CRYPTO `89:, vol. 435, pp. 628-631, 1990.
[15] D. Hankerson, A. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, New York: Springer, 2004.
[16] N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 177, no. 48, pp. 203-209, 1987.
[17] V. Miller, "Use of elliptic curves in cryptography," Lecture Notes in Computer Science, vol. 85, pp. 417-426, 1985.
[18] V. Miller, "The Weil pairing, and its efficient calculation," Journal of Cryptology, vol. 17, no. 4, pp. 235-261, 2004.
[19] A. Joux, "A one rou d protocol for tripartite Diffie-Hellman," Journal of Cryptography, vol. 17, no. 4, pp. 263-276, 2004.
Citation
Parthajit Roy, "A Tripartite Zero Knowledge Authentication Protocol based on Elliptic Curve Weil Pairing," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.27-31, 2017.
A Modified Fuzzy Similarity Measure Decision Making Approach to SLCM Selection
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.32-39, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.3239
Abstract
Software engineering has been largely looked upon as a layered technology that integrates processes, people and technology for the software development. The choice of one particular model over a set of available models will depend on its efficacy and appropriateness. The ultimate goal of any form of software engineering is to build up the most efficient model and this build up will decide the future and successful completion of any project. The study intends to develop similarity measures between ordered intuitionistic fuzzy soft sets (OIFSSs). The proposed model is applied to five software life cycle models (SLCMs) so as to select the most appropriate one.
Key-Words / Index Term
Similarity measure, Software life cycle, Fuzzy decision making, Intuitionistic fuzzy soft sets
References
[1] L. Abdullah, N. Zulkifli, “Integration of fuzzy AHP and interval type-2 fuzzy DEMATEL: An application to human resource management”, Expert Syst. Appl. Vol. 42, No. 9, pp. 4397–4409, 2015.
[2] A. S. Alamin, J. Shrivastava, “Analyzing Fuzzy Control Model for Variable Speed Pitch Wind System Connected to Grid”, International Journal of Electrical Engineering & Technology, Vol. 8, No. 3, pp. 1–14, 2017.
[3] K. Atanassov, “Intuitionistic Fuzzy sets. Fuzzy Sets and Systems”, Vol. 20, pp. 87 - 96, 1985.
[4] B. Efe, “An integrated fuzzy multi-criteria group decision-making approach for ERP system selection”, Applied Soft Computing, Vol. 38, pp.106 - 117, 2016.
[5] G. Buyukozkan, D. Ruan, “Evaluation of software development projects using a fuzzy multi-criteria decision approach”, Mathematics and Computers in Simulation, Vol. 77, pp. 464 - 475, 2008.
[6] D. A. Wood, “Supplier selection for development of petroleum industry facilities, applying multi-criteria decision-making techniques including fuzzy and intuitionistic fuzzy TOPSIS with flexible entropy weighting”, Journal of Natural Gas Science and Engineering, Vol. 28, pp. 594 - 612, 2016.
[7] G. Buyukozkan, C. Kahraman, D. Ruan, “A fuzzy multi-criteria decision approach for software development strategy selection”, International Journal of General Systems, Vol. 33, No. 2-3, pp. 259-280, 2015.
[8] G. Singh, A. Kaur, “An Improved Fuzzy Logic System for Handoff Controller Design”, International Journal of Computer Sciences and Engineering, Vol. 3, No. 7, pp. 1-5, 2015.
[9] H. Javedan, G. Shahmohammadi, “Presenting a Method for Efficient Energy Consumption in Wireless Sensor Networks Using the Topology control and Fuzzy Systems”, International Journal of Computer Sciences and Engineering, Vol. 4, No. 2, pp. 1–12, 2016.
[10] N. Hemageetha, G. M. Nasira, “Vegetable Price Prediction using Adaptive Neuro-Fuzzy Inference System”, International Journal of Computer Sciences and Engineering, Vol. 5, No. 3, pp. 75–79, 2017.
[11] J. Ramdan, K. Omar, M. Faidzul, “A Novel Method to Detect Segmentation points of Arabic Words using Peaks and Neural Networks”, International Journal of Advanced Science, Engineering and Information Technology, Vol. 7, No. 2, pp. 625-631, 2017.
[12] E. B. Kumar, V. Thiagarasu, “Segmentation Using Fuzzy Membership Functions: An Approach”, International Journal of Computer Sciences and Engineering, Vol. 5, No. 3, pp. 101–105, 2017.
[13] M. Hicdurmaz, “A Fuzzy Multi Criteria Decision Making Approach to Software Life Cycle Model Selection”, 38th Euromicro Conference on Software Engineering and Advanced Applications, pp. 384-391, 2012.
[14] D. Molodtsov, “Soft Set Theory-First Results”, Computers and Mathematics with Applications, Vol. 37, pp. 19-31, 1999.
[15] P. K. Maji, R. Biswas, A. R. Roy, “Fuzzy Soft Sets”, The Journal of Fuzzy Mathematics, Vol. 9, No. 3, pp. 589-602, 2001.
[16] P. K. Maji, R. Biswas, A. R. Roy, “Intuitionistic Fuzzy Soft Sets”, The Journal of Fuzzy Mathematics, Vol. 9, No. 3, pp. 677-692, 2001.
[17] W. Pedrycz, “System Modelling with Fuzzy Models: Fundamental Developments and Perspectives”, Iranian Journal of Fuzzy Systems, Vol. 13, No. 7, pp. 1-14, 2016.
[18] R. Kaura, S. Arora, P. C. Jhac and S. Madand, “Fuzzy Multi-criteria Approach for Component Selection of Fault-Tolerant Software System under Consensus Recovery Block Scheme”, Procedia Computer Science, Vol. 45, pp. 842 – 851, 2015.
[19] R. Kaur, Abhishek, S. Singh, “Inference of Gene Regulatory Network using Fuzzy Logic – A Review”, International Journal of Computer Sciences and Engineering, Vol. 4, No. 1, pp. 22–29, 2016.
[20] S. J. Kalayathankal, G. S. Singh, P. B. Vinodkumar, “Ordered Intuitionistic Fuzzy Soft Sets”, Journal of fuzzy mathematics, Vol. 18, No. 4, pp. 991 - 998, 2010.
[21] S. J. Kalayathankal, J. T. Abraham, “A Fuzzy Soft Software Lifecycle Model”, International Journal of Civil Engineering and Technology, Vol. 8, No. 8, pp. 755-761, 2017.
[22] S. J. Kalayathankal, J. T. Abraham, “A Fuzzy Decision-Making Approach to SLCM Selection”, International Journal of Civil Engineering and Technology, Vol. 8, No. 6, pp. 178-185, 2017.
[23] S. Thakur, S. N. Raw, A. Prakash, P.Mishra, R. Sharma, “Application of Fuzzy Logic for Presentation of an Expert Fuzzy System to Diagnose Thalassemia”, International Journal of Computer Sciences and Engineering, Vol.5, No.6, pp. 54-61, 2017.
[24] T. L. Mien, “Design of Fuzzy Self-Tuning LQR Controller for Bus Active Suspension”, International Journal of Mechanical Engineering and Technology, Vol. 7, No. 6, pp. 493–501, 2016.
[25] X. Wang, J. Wang, X. Chen, “Fuzzy Multi-Criteria Decision Making Method Based on Fuzzy Structured Element with Incomplete Weight Information”, Iranian Journal of Fuzzy Systems, Vol. 13, No. 2, pp. 1-17, 2016.
[26] H. Wu, X. Su, “Group Generalized Interval-Valued Intuitionistic Fuzzy Soft Sets and Their Applications in Decision Making”, Iranian Journal of Fuzzy Systems, Vol. 14, No. 1, pp. 1-21, 2017.
[27] L.A. Zadeh, “Fuzzy Sets”, Information and Control, Vol. 8, pp. 338 - 353, 1965.
Citation
S. J. Kalayathankal, J. T. Abraham, J. V. Kureethara, "A Modified Fuzzy Similarity Measure Decision Making Approach to SLCM Selection," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.32-39, 2017.
Biometric Recognition System: A Review
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.40-45, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.4045
Abstract
Biometric system is used for identification of an individual on the basis of their physical and behavioral features. As the research in the information technology is increasing day by day, so, the security of information becomes a great issue. Therefore, to deal with security, authentication access control plays an important role and this is the first step to ensure security. This paper describes the study of widely used biometric technologies. The principle by the biometric system work is being defined with the stages by which biometric system works. In biometrics, according to some characteristics, we need to identify human physiological parameters. The comparison of biometric traits on the basis of feature description is given with their characteristics on the basis of uniqueness, university, measurability, acceptability, circumvention and premenance. Work done by number of authors in biometric system is given in the form of comparison with the techniques and outcomes. A biometric system requires a reliable personal identification scheme to confirm or determine the needs of their individual identity services. The aim of this technique is to ensure that only legitimate users can access these services, and are not accessible to others. The notable features of biometric can be confirmed or established a personal identity.
Key-Words / Index Term
Biometric, fingerprint hand, iris, face, DNA, keystroke, signature, Voice
References
[1] M. O. Oloyede and G. P. Hancke, “Unimodal and Multimodal Biometric Sensing Systems: A Review,” IEEE Access, Vol. 4, No. , pp. 7532-7555, 2016.
[2] S. B. Dabhade, N. S. Bansod, Y. S. Rode, M. M. Kazi and K. V. Kale, “Hyper spectral face image based biometric recognition,” International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, pp. 559-561,2016.
[3] M. Abdelazez, M. Hozayn, G. S. K. Hanna and A. D. C. Chan, “Gating of false identifications in electrocardiogram based biometric system,” IEEE International Symposium on Medical Measurements and Applications (MeMeA), Rochester, MN, USA, pp. 338-343,2017.
[4] A. Mansour, M. Sadik, E. Sabir and M. Jebbar, “AMBAS: An Autonomous Multimodal Biometric Authentication System,” 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, pp. 2098-2104,2017.
[5] S. Bhilare, V. Kanhangad and N. Chaudhari, “Histogram of oriented gradients based presentation attack detection in dorsal hand-vein biometric system,” Fifteenth IAPR International Conference on Machine Vision Applications (MVA), Nagoya, Japan, pp. 39-42,2017.
[6] Subban, Ravi, and Dattatreya P. Mankame, “A study of biometric approach using fingerprint recognition,” Lecture Notes on Software Engineering Vol.1, pp.209-215,2013.
[7] R. Priya, V. Tamilselvi and G. P. Rameshkumar, “A novel algorithm for secure Internet Banking with finger print recognition,” International Conference on Embedded Systems (ICES), Coimbatore, pp. 104-109,2014.
[8] B. Saropourian, “A new approach of finger-print recognition based on neural network,” 2nd IEEE International Conference on Computer Science and Information Technology, Beijing, pp. 158-161,2009.
[9] S. Samoil and S. N. Yanushkevich, “Multispectral hand recognition using the Kinect v2 sensor,” IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, pp. 4258-4264,2016.
[10] Lihong Wan, Na Liu, Hong Huo and Tao Fang, “Face Recognition with Convolutional Neural Networks and subspace learning,” 2nd International Conference on Image, Vision and Computing (ICIVC), Chengdu, China, pp. 228-233,2017.
[11] N. Liu, J. Liu, Z. Sun and T. Tan, “A Code-Level Approach to Heterogeneous Iris Recognition,” IEEE Transactions on Information Forensics and Security, Vol. 12, No. 10, pp. 2373-2386, Oct. 2017.
[12] P. Michaels, S. Ciampi, C. Y. Yean and J. J. Gooding, “Target DNA recognition using electrochemical impedance spectroscopy,” International Conference on Nanoscience and Nanotechnology, Sydney, NSW, pp. 282-284,2010.
[13] G. K. Berdibaeva, O. N. Bodin, V. V. Kozlov, D. I. Nefed`ev, K. A. Ozhikenov and Y. A. Pizhonkov, “Pre-processing voice signals for voice recognition systems,” 18th International Conference of Young Specialists on Micro/Nanotechnologies and Electron Devices (EDM), Erlagol (Altai Republic), Russia, pp. 242-245,2017.
[14] P. Chauhan, S. Chandra and S. Maheshkar, “Static digital signature recognition and verification using neural networks,” 1st India International Conference on Information Processing (IICIP), Delhi, India, pp. 1-6,2016.
[15] N. Çalik, O. C. Kurban, A. R. Yilmaz, L. D. Ata and T. Yildirim, “Signature recognition application based on deep learning,” 25th Signal Processing and Communications Applications Conference (SIU), Antalya, pp. 1-4,2017.
[16] A. Morales, M. Falanga, J. Fierrez, C. Sansone and J. Ortega-Garcia, “Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research,” IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, pp. 1-6,2015.
[17] J. Mantyjarvi, J. Koivumaki and P. Vuori, “Keystroke recognition for virtual keyboard,” IEEE International Conference on Multimedia and Expo, Vol.2, pp. 429-432 2002.
[18] S. Ravindran, C. Gautam and A. Tiwari, “Keystroke user recognition through extreme learning machine and evolving cluster method,” IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, pp. 1-5,2015.
Citation
Manpreet Kaur, Sawtantar Singh Khurmi, "Biometric Recognition System: A Review," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.40-45, 2017.
Heterogeneous Cloud Radio Access Network
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.46-51, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.4651
Abstract
To reduce the several in between base station processing in heterogeneous network we connect all the heterogeneous Network with the main more powerful central server on cloud and in this way in this Network name is HCRAN, for reducing the cost and load in this paper we properly study existing system and then some problems that present in the previous Network reduce or eliminate in this Network ,like overloading ,Energy consumption, reduced in this Network but Throughput increased and dead nodes decreases in this Network .In this thesis paper we increases the overall performance of the HCRAN by using the base station shifting technique and changes the method of devices connected with the base-station in the previous HCRAN the devices connect with the base station according to the distance but in this paper the distance and energy factor considered for connection for improving the performance of system ,in this way by implementing this techniques in the HCRAN the energy consumption and overloading, main problems in the previous HCRAN resolves in this system. The overall work divided in three scenario in the first scenario the base stations shifting technique that is new technique shows in simulations results and in the second scenario the connection process between the base- stations and devices in system shows according to distance and energy factor and in the third scenario the overall work combined and shows the wake up situations after sleep and connection with the nearest base- station shows in this thesis paper.
Key-Words / Index Term
Energy consumption, Throughput, No of calls drop, No of dead nodes
References
[1] P.S.Negi, “A survey of data storage and retrieval in cloud computing”, In IJCSE, Vol.8, Issue 16, pp.202-205, 2016.
[2] Park, J.H.Kim, “Swarm intelligence-based sensor network deployment strategy”, In IEEE , Vol. 4, Issue 10, pp. 1-6,2010.
[3] Li. G and Li. J., “ Global weighted fairness guaranteed congestion avoidance protocol for wireless sensor networks”, In IEEE, Vol. 5, Issue 11, pp. 601-605, 2011.
[4] M. Cheng, X. Gong, and L. Cain, “ Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks”, In IEEE , Vol. 8, Issue 9, pp. 3770-3779, 2009].
[5] Tseng, Cheng, C.S, “ Adaptive coverage-preserving routing protocol for wireless sensor network”, In Sensing Technology (ICST), 2013 Seventh International Conference”, China, pp. 730-734,2013.
[6] P. Minet, and S. Mahfoudh, “An energy efficient routing based on OLSR in wireless ad hoc and sensor networks”, “In Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008. 22nd International Conference on IEEE”, America, pp. 1253-1259, 2008.
[7] Lee, S.Youngish, “Connectivity restoration in a partitioned wireless sensor network with assured fault tolerance”, In Ad Hoc Networks, Vol. 4, Issue 15, pp. 1-19, 2015.
[8] Yan, J. Jiao, H, “A self-adaptive clustering algorithm for wireless sensor network”, In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing”, China, pp. 1-4, 2009.
[9] M. Khan, Mangos, “A survey of computation offloading strategies for performance improvement of applications running on mobile devices, “Journal of Network and Computer Applications”, Vol. 7, Issue 13, pp. 28-40, 2013.
Citation
P. Singh, N. Singh, S. Rani, "Heterogeneous Cloud Radio Access Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.46-51, 2017.
Genomic and proteomic repository of chitin degrading bacterium Serratia proteamaculans 568
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.52-54, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.5254
Abstract
In this paper, we describe about a repository which is composed of the information related to genes sequences, proteins sequences, upstream sequences, codon usage in proteins, physico-chemical properties, secondary structures and biochemical pathway information of proteins of chitin degrading bacterium Serratia proteomaculans 568. The advantage of this repository is that it can be hosted in the user’s computer and work without internet connection. The backend data for developing this repository was generated using different computational tools which were published earlier. The .faa, .fna, .ptt files of S.proteomaculans 568 were downloaded from NCBI was used as primary seed data for the generation backend data. Web technologies were used to retrieve and display the compiled data in the browser. The data retrieved out of this repository can be used as preliminary source for understanding various concepts related to genes and proteins of Serratia proteomaculans 568. This repository can be obtained from http://crraoaimscs.res.in/serratia_568/serratia_568.rar
Key-Words / Index Term
Serratia proteomaculans 568, gene sequences, protein sequences, physico-chemical properties, Secondary structures
References
[1]. S. Taghavi, C. Garafola, S. Monchy, L. Newman, A. Hoffman, N. Weyens, T. Barac, J. Vangronsveld, D. van der Lelie, "Genome survey and characterization of endophytic bacteria exhibiting a beneficial effect on growth and development of poplar trees", Applied and environmental microbiology, Vol.75, Issue.3, pp.748-757,2009.
[2]. P. Purushotham, P.V. Arun, J.S. Prakash, A.R. Podile, "Chitin binding proteins act synergistically with chitinases in Serratia proteamaculans 568", PloS one, Vol.7, Issue.5, pp.e36714, 2012.
[3]. M. Nakao, S. Okamoto, M. Kohara, T. Fujishiro, T. Fujisawa, S. Sato, S. Tabata, T. Kaneko, Y. Nakamura, “CyanoBase: the cyanobacteria genome database update 2010”, Nucleic acids research, Vol.38, Issue.-, pp.D379-381, 2010.
[4]. P.V. Arun, R.K. Bakku, M. Subhashini, P. Singh, N.P. Prabhu, I. Suzuki, J.S. Prakash, “CyanoPhyChe: a database for physico-chemical properties, structure and biochemical pathway information of cyanobacterial proteins”, PloS one, Vol.7, Issue.11, pp.e49425, 2012.
[5]. P. Rice, I. Longden, A. Bleasby, “EMBOSS: the European Molecular Biology Open Software Suite, Trends in genetics : TIG”, Vol.16, Issue.6, pp.276-277, 2000.
[6]. D. Frishman, P. Argos, “Seventy-five percent accuracy in protein secondary structure prediction”, Proteins, Vol.27, Issue.3, pp.329-335, 1997.
[7]. A.R. Wattam, D. Abraham, O. Dalay, T.L. Disz, T. Driscoll, J.L. Gabbard, J.J. Gillespie, R. Gough, D. Hix, R. Kenyon, D. Machi, C. Mao, E.K. Nordberg, R. Olson, R. Overbeek, G.D. Pusch, M. Shukla, J. Schulman, R.L. Stevens, D.E. Sullivan, V. Vonstein, A. Warren, R. Will, M.J. Wilson, H.S. Yoo, C. Zhang, Y. Zhang, B.W. Sobral, “PATRIC, the bacterial bioinformatics database and analysis resource”, Nucleic acids research, Vol.42, Issue.- pp.D581-591, 2014.
[8]. I. Ahn, B.J. Jeong, S.E. Bae, J. Jung, H.S. Son, “Genomic analysis of influenza A viruses, including avian flu (H5N1) strains”, Eur J Epidemiol, Vol.21, Issue.7, pp.511-519, 2006.
[9]. J.F. Kane, “Effects of rare codon clusters on high-level expression of heterologous proteins in Escherichia coli”, Curr Opin Biotechnol, Vol.6, Issue.5, pp.494-500, 1995.
[10]. X. Yang, X. Luo, X. Cai, “Analysis of codon usage pattern in Taenia saginata based on a transcriptome dataset”, Parasit Vectors, Vol.7, Issue.1, pp.527, 2014.
Citation
P.V. Parvati Sai Arun, "Genomic and proteomic repository of chitin degrading bacterium Serratia proteamaculans 568," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.52-54, 2017.
Modeling Seismic Effects on a Stormwater Network and Post-earthquake Recovery
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.55-61, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.5561
Abstract
This paper summarises the impact of earthquakes on Christchurch’s storm water network and the recovery strategies that are being applied to restore the performance of the network. Storm water hydraulic models are being used to determine the level of service in the storm water network, and the extent and severity of flooding pre- and post-quake for different extreme weather events. The modelling tools have been used extensively for land-drainage recovery works. To be suitable for use the storm water models must be sufficiently current and accurate to be a good representation of the actual operation of the storm water system. Thousands of earthquakes and earthquake aftershocks are continually changing the ground levels and the condition of different storm water infrastructure in Christchurch. The dynamic response of the surface water network and coastal plains due to earthquake-related topographical changes, lateral spreading, liquefaction, and subsidence posed a number of challenges for the local water authority. A case study on flood modelling for a flood-prone area of Christchurch has been reported in this paper. This paper outlines key challenges during the storm water model-building and updating process for a network which faces continual earthquakes and earthquake-related aftershocks.
Key-Words / Index Term
Earthquake recovery, Hydraulic model, Restore stormwater network, Storm water, Surface water, Storm water model
References
[1] Christchurch Quake Live. Retrieved from http://www.canterburyquakelive.co.nz/Browse/
[2] R.R. Biswas, "Importance of Smart Monitoring Systems for Efficient Vacuum Sewer Performance and Modelling the Network", International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.218-222, 2017. (DOI: https://doi.org/10.26438/ijcse/v5i8.218222)
[3] Christchurch City Council (CCC), “About the land drainage recovery programme”, Retrieved from https://ccc.govt.nz/services/water-and-drainage/storm water-and-drainage/storm water-projects/about-the-land-drainage-recovery-programme , May, 2016.
[4] Christchurch City Council (CCC), “Contextual historical overview”, Retrieved from https://ccc.govt.nz/culture-and-community/heritage/heritage-in-the-city/historical-overview/ , June, 2017
[5] K. D. Simpson, “An Earthquake and Recovery of a Stormwater System,” Paper presented at the Water New Zealand Storm Water conference, New Zealand, April 2012. Retrieved from https://www.waternz.org.nz/Attachment?Action=Download&Attachment_id=823
[6] F. McKay, P. Christensen, and T. Parsons, “Where to Start? Christchurch’s Post-quake Land Drainage Recovery Programme”, Paper presented at the Water New Zealand Storm Water conference, Nelson, NZ, May 2016. Retrieved from https://www.waternz.org.nz/Attachment?Action=Download&Attachment_id=2125
[7] Z. Vojinovic, and D. Tutulic, “On the use of 1D and coupled 1D-2D modelling approaches for assessment of flood damage in urban areas”, Urban Water J., Vol. 6, Issue. 3, pp. 183–199, 2009
[8] A.S. Chen et al., “An integrated inundation model for highly developed urban area” , Water Sci. Technol. J. , Int. Assoc. Water Pollut. Res. , Vol. 51, pp. 221–229, 2005
[9] A. Pan et al. “Hydrologically Enhanced Distributed Urban Drainage Model and Its Application in Beijing City.”, J. Hydrol. Eng. Vol. 17, Issue. 6, pp. 667–678, 2012
[10] O. Mark et al. “Potential and limitations of 1D modelling of urban flooding.”, J. Hydrol. Vol. 299, Issue. 3-4, 284–299, 2004
[11] S. Djordjevi´ et al. “Simulation of interaction between pipe flow and surface overland flow in networks.” Water Sci. Technol. Vol 52, Issue. 5, pp. 275–283, 2005.
[12] T. Chng. Et al., “A novel approach to model dynamic flow interactions between storm sewer system and overland surface for different land covers in urban areas”, J. Hydrol., Volume 524, pp. 662–679, 2015
[13] T. Preston and T. Parsons, “Christchurch city mega model – Magic or madness?”, Paper presented at the Water New Zealand Storm Water conference, Nelson, NZ, May 2016. Retrieved from https://www.waternz.org.nz/Attachment?Action=Download&Attachment_id=1878
[14] Christchurch City Council, “Waterways, wetlands and drainage guide”, Retrieved from https://ccc.govt.nz/environment/water/water-policy-and-strategy/waterways-wetlands-and-drainage-guide/, June, 2017
Citation
Rahul R. Biswas, Tripti R. Biswas, "Modeling Seismic Effects on a Stormwater Network and Post-earthquake Recovery," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.55-61, 2017.