The Impact of Social Networking Sites With Its Positive and Negative Aspects
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.59-61, Jun-2018
Abstract
Social networking sites provides productive medium to build relations with others and share information related to jobs, upcoming carrier opportunities and their life experiences also. In Today’s time the social sites preferred stomping ground in cyberspace. Every Technology has its good and adverse effects on society likewise social sites has many fors and againsts.The social networking sites like https://instagram.com/,https://linkedin.com/https://facebook.com/ etc are incessantly disturbing students from their studies. Social networks are only electronic association between users but unluckily it has become an addiction for students, teenagers and even adults. This paper contains both merits and demerits of social media and their impact.
Key-Words / Index Term
SocialNetworkingsite,SocialMedia,CyberBullying
References
[1] Daria J. Kuss * and Mark D. Griffiths, “Online Social Networking and Addiction-A Review of the Psychological Literature”,International Journal of Environmental Research and Public Health , Vol.8, Issue.9, pp.3528-3552, 2011.
[2] Anurag Sarkar * and Prof Shalabh Agarwal, “Impacts of Social Networks-A Comparative study on positive and negative effects on different age groups in a society”,International Journal of https://www.paperrater.com/proofreader/plag_results?ticket=2cd6c7085363db29ae895c813Advanced Research in Computer Science and Management studies , Vol.3, Issue.5, pp.177-190, 2015.
[3] Yili LIU,Xiangxiang YING, “A Review of Social Network Sites:-Definition,Experience and Applications”,The Conference on Web based Business Management, China, pp.749-752, 2010.
[4] James.A.Griesemer, “Using Social Media to enhance students Learning Experiences”,International Research Paper,Vol.3, Issue.1, pp.8-11
[5] lifewire.com/what-is-social-networking-addiction-2655246
[6] netaddiction.com/ebay-addiction/
[7] dailymail.co.uk/sciencetech/article-4279270/Youth-increasingly-isolated-use-social-media.html
[8] turbofuture.com/internet/effects-of-social-media-on-our-youth
[9] speakingtree.in/allslides/negative-effects-of-social-media/disadvantages
[10] blog.statusbrew.com/social-media-statistics-2018-for-business
Citation
Pooja Sharma, Vaishali Malhotra, Randeep Kour, "The Impact of Social Networking Sites With Its Positive and Negative Aspects", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.59-61, 2018.
A Study of Empowerment of Employees and Organizational Effectiveness in the J&K Bank Pvt. Ltd.: A Case of Poonch District
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.62-60, Jun-2018
Abstract
The purpose of the study is to analyze the empowerment of the employees and the organizational effectiveness in the organization. The study was done on how they the employees get themselves empowered in the organization with different methods and how these employees get their work for the organizational effectiveness. The study is based on the survey basis. The population of the study is on the J&K Bank employees. Primary data were used for this study. Data were collected through a questionnaire that was administered to the selected respondents. The hypothesis is proved with the interpretation. The conclusion drawn from the study is that the employees get are satisfied with their working conditions and the proper decision making with which they totally committed themselves for the organizational effectiveness. Their performance will also enhance their empowerment in the organization. They are totally involved in the achievement of the goal achievement of the organization.
Key-Words / Index Term
Empowerment of Employees, Methods and Organizational Effectiveness
References
[1]. Barnard, C.L., (1968), “The Function of the Executive”, Harvard University Press, 30th (Ed.), pp 194-248.
[2]. Compbell, J.P, (1970),“Managerial Behaviour, Performance and Effectiveness”,Mcgrew Hill, pp. 24-48.
[3]. Morin, E. M., (1989), (2003),Versunemesure de I’efficacite^ Organisationelle: Exploration ConceptuelleetEmpirique des representations. Unpublished thesis dissertation, Montreal: Universite de Montreal.
[4]. Kotelnikov, V., (2007), Employees Empowerment: Harvesting the creative and emotional power of all your people, Retrieved May 5.
[5]. KanooniArman, (2005), Published Thesis in the Capella University, Managing and Organizing People.
[6]. Dr. Venkateswaroao M., (2013), “Employee Empowerment and Competitive Advantage”, Global Research Analysis, Vol. 2, Issue 8, pp. 108-109.
[7]. Swarnalatha, prasonna, (2012), “A Study of Employee Empowerment to Motivate the Employees in Health Care Industry in a Private Multi-Specialty Organization”, Asian Journal of Management Research, Vol. 3, Issue 1, pp. 107-115.
[8]. Goodmam, P.S., J.M. Pennings and Associates (1977), “New Perspectives on Organisational Effectiveness”, San Fransisco-London, Jossey- Bass Publishers.
[9]. Silveria, L. (1987), Human Resource Development-The Indian Experience, News Book Publications, New Delhi, pp.29
Citation
Dr. Alka Sharma, "A Study of Empowerment of Employees and Organizational Effectiveness in the J&K Bank Pvt. Ltd.: A Case of Poonch District", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.62-60, 2018.
Secure Mobile Transactions Processing System
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.67-71, Jun-2018
Abstract
Due to the advent of the Internet, electronic business transactions have exploded around the globe. The radical evolution of computers and advancement of technology in the area of hardware (smaller size, weight, low power consumption and cost, high performance) and communications has introduced the notion of mobile computing .Mobile wireless market is increasing by leaps and bounds. Today, new technologies that allow cellular (mobile) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. Mobile payments (m-payments) are increasingly being adopted by organisations as a new way of doing business in the 21st century. Recently, more and more people have begun using their mobile phones as a method of payment for online shopping and banking. Mobile payments have become easier than ever. Present security issues of mobiles, payments however, still require improvement. Mobile Commerce is an evolving area of e-commerce, where users can interact with service providers through a mobile and wireless network using mobile device for information retrieval and transaction processing .The challenge for mobile network lie in providing very large footprint of mobile services with high speed and security. Online transactions using mobile devices must ensure high security for user credentials and it should not be possible for misuse. the principal drivers of a resurgent and increased interest in mobile payments. In addition, advances in software and hardware security techniques have made trusted financial transactions possible from these devices. This white paper examines the current state and nature of the mobile payments market, some of the relevant enabling technologies, and looks at the relevant risk, security and assurance issues that security and audit professionals will want to consider when developing and evaluating mobile. Payment services. (TPS) is an information processing system for business transactions involving the collection, modification and retrieval of all transaction data. Characteristics of a TPS include performance, reliability and consistency. TPS is also known as transaction processing or real-time processing.
Key-Words / Index Term
Bluetooth, Cryptographic operations, M-Commerce, Micropayment protocol, M-payment, Wireless security, WLAN security
References
1. McKitterick D, Dowlin J State of the art review of mobile payment technology. https://www. scss.tcd.ie/publications/tech-reports/reports.03/TCD-CS-2003-24.pdf
2. Fun TS, Beng LY, Roslan R, Habeeb HS (2008) Privacy in new mobile payment protocol. World Acad Sci Eng Technol 2:198–202
3. Fun TS, Beng LY, Razali MN (2013) Review of mobile macro-payments schemes. J Adv Comput Netw 1(4)
4. A. Basaure “Preliminary research on existing and
planned mobile data service solutions and value
systems in leading markets”, Helsinki University of
Technology HUT, 2004
5. Singh A, Shahazad KS (2012) A review: secure payment system for electronic transaction. Int J Adv Res Comput Sci Softw Eng 2(3)
6. Ahamad SS, Udgata SK, Nair M (2014) A secure lightweight and scalable mobile payment framework. In: FICTA 2013. Advances in intelligent system and computing, vol 247. Springer International Publishing, Switzerland
7. Mathew M, Balakrishnan N, Pratheeba S (2010) A study
on the success potential of multiple mobile payment
technologies. In: Technology management for global
economic growth (PICMET), Proceedings of PICMET ‘10
8. Smart Card Alliance (2008) Proximity mobile payments
business scenario: research report.
9. Li Y, Wang Y Secure electronic transaction.
http://people.dsv.su.se/*matei/courses/ IK2001SJE/li-
wang_SET.pdf
10. Fun TS, Beng LY, Likoh J, Roslan R (2008) A lightweight
and private mobile payment protocol by using mobile
network operator. In: Proceedings of the international
conference on computer and communication engineering
2008 May 13–15, Kuala Lumpur, Malaysia, 2008
11. Isaac JT, Zeadally S (2012) An anonymous secure payment
protocol in a payment gateway centric model. In: The 9th
international conference on mobile web information system
(MobiWIS). Elsevier12.Sekhar VC, Sarvabhatla M (2012)
Secure lightweight mobile payment protocol using symmetric
key techniques. In: International conference on computer
communication and informatics (ICCCI), pp 1–6, 10–12 Jan
2012
12. Tripathi DM, Ojha A (2012) LPMP: an efficient lightweight
protocol for mobile payment. In: 3rd national conference on
emerging trends and applications in computer science
(NCETACS)
13. "certicom," [Online]. Available:
http://www.certicom.com/index.php/an-introduction-to-the-
uses-of-eccbased-certificates. [Accessed 01 01 2013].
14. "RSA Laboratories," RSA,
[Online].Available:http://www.rsa.co/rsalabs/node.asp?id=2129.
[Accessed 10 12 2012].
Citation
Narinder Bali, Raghav Mehra, Arvinder Bali, "Secure Mobile Transactions Processing System", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.67-71, 2018.
Online Shopping Attitude Among Youth in India
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.72-74, Jun-2018
Abstract
The purpose of this study is to explore the attitude of youth towards online shopping. Online shopping has a tremendous growth in India. It is a recent phenomenon in the field of E-business. It has become a new trend of shopping and is quickly becoming a vital part of lifestyle. It offers the customer a wide range of products and services wherein he is able to compare the price quoted by diverse suppliers and also choose the best deal from it. Through online shopping, consumers can buy the selected product rapidly by doing some clicks from home or work saving time and energy in spite of the larger distance arising from the endless and unlimited market offered by the internet. Online shopping has seen a huge growth in recent years. The study found that most of the young people doing online shopping. Further, the study found that in case of gender, female respondents with higher average online shopping expenditure than that of the male respondents.
Key-Words / Index Term
Online shopping, e-commerce, attitude
References
[1] P. Balaji, "Online shopping behaviour of college students", International Journal of Commerce & Business Management, Vol. 8, No. 1, pp. 84-87, 2015.
[2] G. Brătucu, T.A. Brătucu, "Analiza sistemului de factori care influenţează comportamentul consumatorului individual", Revista de Management&Marketing,Vol. 6, pp. 11-26, 2007.
[3] N. Delafrooz, L.H. Paim, A. Khatibi, "Students’ online shopping behavior: an empirical study", Journal of American Science, Vol. 6 No. 1, pp. 137-147, 2010.
[4] R.E. Goldsmith, L.R. Flynn, "Psychological and behavioural drivers of online clothing purchase", Journal of Fashion Marketing and Management, Vol. 8 No. 1, pp. 84-95, 2004.
[5] A. Haque, J. Sadeghzadeh, A. Khatibi, "Identifing potentiality online sales in Malaysia: A study on customer relationships online shopping", Journal of Applied Business Research, Vol. 22 No. 4, pp. 119-130, 2006.
[6] H.H. Hu, "Personality Types and Consumer preferences for multiple currency usages: a study of the Restaurant Industry", PHD Thesis, The Ohio State University, 2005.
[7] A. Khatibi, A. Haque, K. Karim, "E-Commerce: A study on Internet Shopping in Malaysia", Journal of Applied Science Vol. 3 No. 6, pp. 696-705, 2006.
[8] Y. M. Kim, K.Y. Shim, "The influence of Internet shopping mall characteristics and user traits on purchase intent", Irish Marketing Review, Vol. 15 No. 2, pp. 25-34, 2002.
[9] P. Kumar, Kanchan, "Online shopping behaviour among students with special reference to Ludhiana, Punjab, India", Journal of Marketing and Consumer Research, Vol. 3, 19-24, 2017.
[10] J.C. Mowen, "The 3M Model of motivation and personality theory and empirical applications to consumer behavior" Kluwer Academic Publishers, 2000.
[11] T. Perea y Monsuwe, B.G.C , Dellaert, K. de Ruyter, "What drives consumers to shop online? A literature review", International Journal of Service Industry Management, Vol. 15 No. 1, 102-121, 2004.
[12] W. Shwu-Ing, "The relationship between consumer characteristics and attitude toward online shopping", Management Intelligence & Planing, Vol. 21 No. 1, pp. 37-44, 2003.
[13] W.C. Tsao, H.R. Chang, "Exploring the impact of personality traits on online shopping behavior", African Journal of Business Management, Vol. 4 No. 9, pp. 1800-1812, 2010.
[14] M. Wolfinbarger, M.C. Gilly, "Shopping Online for Freedom, Control, and Fun", California Management Review, Vol. 43 No. 2, pp. 34-55, 2001.
Citation
R. Kumar, V. Singh, "Online Shopping Attitude Among Youth in India", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.72-74, 2018.
Challenges of E-marketing in India
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.75-78, Jun-2018
Abstract
The aim of this study is to explore the challenges of e-marketing in India. Electronic commerce is a revolution that many industry and academic observer believe will transform the conduct and structure of business. This range of interesting developments and innovations that are occurring in information goods, firm business processes, electronic marketplaces, and emerging industries in the economy further increase the impetus to broaden efforts in research on electronic commerce. Shopping is one of the essential part of our daily life. Internet has brought nearly the entire world just a click away from us. The retail industry canvass has been repainted by internet and the rules of the game in retailing are fast changing. The western culture has affected each and every aspect of our Indian society. The life is becoming fast not only in the metros but also in the normal cities. The number of nuclear families is increasing and both husband and wife are working, as they have less time to go to the market for purchasing every now and then. Some other reasons like these, say shortage of time, traffic jams, late working hours, versatility of plastic money and above all the improved their service and are providing more and more convenience to the customers. From advance payment options they moved on to payment on delivery.
Key-Words / Index Term
Internet, Online Shopping, Delivery, Retailing, E-Marketing
References
[1]. M. Awais, T. Samin, "Advanced SWOT Analysis of E-commerce", International Journal of Computer Science Issues, Vol. 9 No. 2, pp. 569-574, 2012.
[2]. M. Suguna, V. Selladurai, "SWOT analysis of digital marketing in India", International Journal of Multidisciplinary Education and Research", Vol. 2 No. 2, pp. 37-40,1993.
[3]. M.A. Khan, P. Sagar, "Emerging trends and advanced SWOT analysis of e-commerce in Indian context", International Journal of Science Technology & Management, Vol. 4, pp. 150-159, 2015.
[4]. M.K. Yadav, D. Sharma, "SWOT Analysis of e-Commerce", Advance in Electronic and Electric Engineering, Vol. 4, pp. 663-668, 2014.
[5]. S. Liangtao, C. Gang, "SWOT Analysis of E-Commerce Development in Yunnan Province" , Innovative Computing and Information, pp. 492-499, 2011.
Citation
P. Sharma, A. Rani, "Challenges of E-marketing in India", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.75-78, 2018.
Resource Allocation in Cloud Computing: A Review
Review Paper | Journal Paper
Vol.06 , Issue.05 , pp.79-84, Jun-2018
Abstract
Cloud computing has quickly appeared as a outstanding standard for contributing IT infrastructure, resources and services on a pay-per-use basis from the last few years. Cloud computing is a promising technology and number of researches has been proposed for solving the issues faced by the cloud. There are number of challenges that a cloud is facing, from which, the main challenge is the resource allocation technique. Cloud permits the provisioning of resource on-demand. This procedure of allocating and re-allocating of resources is the way to accommodate the impulsive demands with an improvement of return on investment by means of infrastructure with the support of cloud. Resource allocation is the method in which the resources are allocated to each cloud user by the providers of cloud services. The varied factors like response time, cost, and dynamic allocation need to be acknowledged while choosing a technique of resource allocation. Though, in spite of the recent growth in cloud computing market, number of problems in the resource allocation remains unaddressed. This source course has introduced the significant concepts and the mechanisms of cloud computing and deliberates some research question on the topic while emphasizing on challenges and state-of-art solutions in the resource allocation. The article will expectantly inspire the future researchers to come up with the optimal and smarter resource allocation algorithms and structures to build up the paradigm of cloud computing.
Key-Words / Index Term
Cloud computing, service models, virtualization, resource allocation
References
1. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
2. Qian, L., Luo, Z., Du, Y., & Guo, L. (2009). Cloud computing: An overview. Cloud computing, 626-631.
3. Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on (pp. 27-33). Ieee.
4. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
5. Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.
6. Buyya, R., Ranjan, R., & Calheiros, R. N. (2009, June). Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities. In High Performance Computing & Simulation, 2009. HPCS`09. International Conference on (pp. 1-11). IEEE.
7. Xing, Y., & Zhan, Y. (2012). Virtualization and cloud computing. Future Wireless Networks and Information Systems, 305-312.
8. Swathi, T., Srikanth, K., & Reddy, S. R. (2014). Virtualization in cloud computing. International Journal of Computer Science and Mobile Computing, 3(5), 540-546.
9. Zhang, Y. Virtualization and Cloud Computing. Network Function Virtualization: Concepts and Applicability in 5G Networks: Concepts and Applicability in 5G Networks, 13-36.
10. Sharma, G. P., Singh, S., Singh, A., & Kaur, R. (2016). Virtualization in Cloud Computing.
11. Tsai, J. T., Fang, J. C., & Chou, J. H. (2013). Optimized task scheduling and resource allocation on cloud computing environment using improved differential evolution algorithm. Computers & Operations Research, 40(12), 3045-3055.
12. Shu, W., Wang, W., & Wang, Y. (2014). A novel energy-efficient resource allocation algorithm based on immune clonal optimization for green cloud computing. EURASIP Journal on Wireless Communications and Networking, 2014(1), 64.
13. Wang, Y., Li, J., & Wang, H. H. (2017). Cluster and cloud computing framework for scientific metrology in flow control. Cluster Computing, 1-10.
14. Li, W., Liu, X., Zhang, X., & Zhang, X. (2017, October). Multi-resource fair allocation with bounded number of tasks in cloud computing systems. In National Conference of Theoretical Computer Science (pp. 3-17). Springer, Singapore.
15. Hameed, A., Khoshkbarforoushha, A., Ranjan, R., Jayaraman, P. P., Kolodziej, J., Balaji, P., ... & Khan, S. U. (2016). A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing, 98(7), 751-774.
Citation
Vikas Mongia, Deepak Kumar, "Resource Allocation in Cloud Computing: A Review", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.79-84, 2018.
Survey on Image Segmentation Techniques using Traditional and Soft Computing Techniques
Survey Paper | Journal Paper
Vol.06 , Issue.05 , pp.85-90, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si5.8590
Abstract
Digital image processing plays an important role in computer technology. DIP has a variety of applications, image segmentation is one of the important application. Segmentation is a process of segment an image into different objects or parts. At present scenario, segmentation is an active research area. The issue of image segmentation is always of great concern as it enables the optimization in the extraction of the features and characteristics of the image. This paper presents a review of Traditional image segmentation techniques along with Soft computing Techniques.
Key-Words / Index Term
Image Segmentation, Genetic Algorithm, Soft Computing Techniques, Traditional Techniques
References
[1] Rafael C.Gonzalae, Richard E. Woods, “Digital Image Processing”, 2nd ed., Beijing: Publishing House of Electronics Industry,2007.
[2] Sujata Saini and Komal Arora, "Astral analysis of the different Image Segmentation Techniques", International Journal of Information and Computation Technology, vol.4, pp.1445-1 452, 2014
[3] Gurpreet Singh, Amandeep Kaur, Pooja Sharma, "Different Techniques of Edge Detection in Digital Image Processing", International Journal of Engineering Research and Application (IJERA), Vol.3, pp.458-461, May 2013
[4] N.Senthikumaran and R.Rajesh, “Edge Detection Techniques for Image Segmentation- A Survey of Softcomputing Approaches”, International Journal of Recent Trends in Engineering INFORMATION PAPER, Vol.1, ISSUE 2, May 2009
[5] Salim Saleh AL-Amri, N.V.Kulyankar, and KamitkarS.D, "Image Segmentation by using Threshold Techniques", Journal of Computing, Vol.2, ISSUE 5[Online]
[6] Li Haitao and Li Shengpu,"An Algorithm and Implementation for Image Segmentation", International Journal of Processing, Image Processing and Pattern Recognition, Vol.9, No.3, pp.125-132, 2016
[7] Nida M. Zaitoun and Musban J. Agel, "Survey on Image Segmentation Techniques”, International Conference on Communication, Management and Information Technology (ICCMIT) Procedia Computer Science 65, pp.797-806, 2015
[8] Sharma, N., Mishra, M., & Shrivastava, M. (2012). Color image segmentation techniques and issues: an approach. International Journal of Scientific & Technology Research,1(4), 9-12.
[9] Manjot Kaur, Pratibha Goyal, "A Review on Region-Based Segmentation", International Journal of Science and Research Vol.4, ISSUE4, April 2015
[10] Nameirakpam Dhanchandra and Yambem Jina Chanu, “A Survey on Image Segmentation Methods using Clustering Techniques”, European Journal of Engineering Research and Science, Vol.2.no 1, Jan 2017
[11] Deepali Aneja, T. K. Rawat, “Fuzzy Clustering Algorithms for Effective Medical Image Segmentation”, I. J. Intelligent Systems and Applications, pp.55-51, 2013
[12] Rajeswar Dass, Priyanka, “Image Segmentation Techniques”, IJECT Vol.3, ISSUE1, ISSN:2230-7109, 2012
[13] Chandrasekaran, M., et al. "Application of soft computing techniques in machining performance prediction and optimization: a literature review." The International Journal of Advanced Manufacturing Technology 46.5-8 (2010): 445-464.
[14] Seenivasagam, V., and S. Arumugadevi. "A Survey of Image Segmentation Methods using Conventional and Soft Computing Techniques for Color Images." International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) 1.6 (2012): pp-116.
[15] Muppidi, Mohan, et al. "Image segmentation by multi-level thresholding based on fuzzy entropy and genetic algorithm in a cloud." System of Systems Engineering Conference (SoSE), 2015 10th. IEEE, 2015.
[16] Jahi, Ajuba,Nigeria, “Application of Genetic Algorithm to Image Segmentation: A Review”, IJIRR, Vol.3, ISSUE 10, PP.2908-2912, Oct,2016
[17] Dwivedi, Varshika, et al. "Travelling salesman problem using genetic algorithm." IJCA Proceedings on Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012) 1 (2012): 25.
[18] Mohanta, Raj Kumar, and Binapani Sethi. "A review of genetic algorithm application for image segmentation." Int. J. Comput. Technol. Appl 3.2 (2011): 720-723.
[19] Indira, S. U., and A. C. Ramesh. "Image segmentation using artificial neural network and genetic algorithm: a comparative analysis." Process Automation, Control and Computing (PACC), 2011 International Conference on. IEEE, 2011.
[20] Raju, N. Gopi, and PA Nageswara Rao. "Particle swarm optimization methods for image segmentation applied in mammography." Int. J. Eng. Res. Appl 3.6 (2013): 1572-1579.
[21] [21]. K. Senthil Kumar, K. Venkatalakshmi and K. Karthikeyan, “Implimentation of Particle Swarm Optimization Algorithm for Lung Image Segmentation Using Threshloding”, Middle East Journal of Scientific Research 24 (7): pp.2333-2337, 2016.
[22] Mohsen, Fahd MA, Mohiy M. Hadhoud, and Khalid Amin. "A new optimization-based image segmentation method by particle swarm optimization." IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Image Processing and Analysis (2011).
[23] Ali, Mohammed Ameer, Gour C. Karmakar, and Laurence S. Dooley. "Fuzzy image segmentation of generic shaped clusters." Image Processing, 2005. ICIP 2005. IEEE International Conference on. Vol. 2. IEEE, 2005.
[24] Kelkar, Deepali, and Surendra Gupta. "Improved quadtree method for split merge image segmentation." Emerging Trends in Engineering and Technology, 2008. ICETET`08. First International Conference on. IEEE, 2008.
[25] Shi, Jianbo, and Jitendra Malik. "Normalized cuts and image segmentation." IEEE Transactions on pattern analysis and machine intelligence 22.8 (2000): 888-905.
[26] Cai, Wenchao, Jue Wu, and Albert CS Chung. "Shape-based image segmentation using normalized cuts." Image Processing, 2006 IEEE International Conference on. IEEE, 2006.
[27] Paulinas, Mantas, and Andrius Ušinskas. "A survey of genetic algorithms applications for image enhancement and segmentation." Information Technology and control 36.3 (2007).
[28] Muthukrishnan, R., and Miyilsamy Radha. "Edge detection techniques for image segmentation." International Journal of Computer Science & Information Technology 3.6 (2011): 259.
[29] Nimeesha Km, Rajaram M Gowda, “ Brain Tumor Segmentation Using K-means and Fuzzy c-means clustering algorithm”, International Journal of Computer Science and Technology Research Excellence Vol.3, ISSUE 2, Mar-April 2013.
[30] Brundha, B., and M. Nagendra Kumar. "MR Image Segmentation of brain to detect brain tumor and its area calculation using K-Means clustering and Fuzzy C-Means algorithm." international journal of technological research in engineering 2.9 (2015).
Citation
Roopa Kumari, Neena Gupta, "Survey on Image Segmentation Techniques using Traditional and Soft Computing Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.85-90, 2018.
A Novel Certification Process for Component-Based Life Cycle Model
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.91-95, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si5.9195
Abstract
Reusing the module or component of software is one of the most prime objective while developing a software system. To design computer program from the bottom or scratch is extremely expensive and time consuming so most of the giant companies in the field of computers are using pre- existing software components. CBSE i.e component based software engineering depends on the concept of combining different- components, providing interfaces and integrating all the modules or components. The concept of certification helps us to believe that a component is up to the mark and it follows a particular quality standard which is the reliability of a particular component. Through this novel certification model we are introducing a new mechanism that helps to select the component from the repository which increases the reliability of a component.
Key-Words / Index Term
Component testing, Component reliability, Component certification, Quality assurance, Component Selection, Repository
References
[1] G.T. Heineman, W.T. Councill, “Component-Based Software Engineering: Putting the Pieces Together”, Addison-Wesley, USA, 2001.
[2] A. Alvaro, E.S. Almeida, S.R.L. Meira, “A Software Component Certification: A Survey”, In the 31st IEEE EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), Component-Based Software Engineering Track, 2005.
[3] M. Bertoa, A. Vallecillo, “Quality Attributes for COTS Components”, In the Proceedings of the 6th International ECOOP Workshop on Quantitative Approaches inObject- Oriented Software Engineering (QAOOSE), Spain, 2002.
[4] C.W. Krueger, “Software Reuse”, ACM Computing Surveys, Vol. 24, Issue. 02, , pp. 131-183,June, 1992
[5] M. Goulão, F.B. Abreu, “Towards a Component Quality Model”, Work in Progress Session of the 28th IEEE Euromicro Conference, Dortmund, Germany, 2002.
[6] H. Schmidt, “Trustworthy components: compositionality and prediction”, Journal of Systems and Software, Vol. 65, No. 3, pp. 215-225, March, 2003,.
[7]Sandeep Chopra, M.K.Sharma, Lata Nautiyali, “Elena – A Novel Component Based Life Cycle Model”,EJAET, Vol.4 ,Issue 12, No.1 pp. 932-940, 2017
[8] J.M. Voas, J. Payne, “Dependability Certification of Software Components”, Journal of Systems and Software, Vol. 52, No. 3 , pp. 165-172, June, 2000
[9] J. Morris, G. Lee, K. Parker, G.A. Bundell, C.P. Lam, “Software Component Certification”, IEEE Computer, Vol. 34, No. 09, pp 30-36 September 2001.
[10]Lata Nautiyal,Neena Gupta, “ A Contemporary Certification Process for Component-Based Development”,IJCTA Vol.6, Issue 1, pp. 127-132, 2015
[11] ISO 9126, “Information Technology – Product Quality – Part1: Quality Model”, International Standard ISO/IEC 9126, International Standard Organization, June, 2001
[12] R.P.S. Simão, A. Belchior, “Quality Characteristics for Software Components: Hierarchy and Quality Guides”, Component-Based Software Quality: Methods and Techniques, Lecture Notes in Computer Science (LNCS) Springer-Verlag, Vol. 2693, pp. 188-211, 2003.
[13] K.C. Weber, C.J. Nascimento, “Brazilian Software Quality 2002”, In the Proceedings of 24th International Conference on Software Engineering (ICSE), EUA, pp. 634-638 , 2002.
[14]Sushil Chandra Dimri, “ An Innovative Model of Software Quality Assurance for Component-Based Software Systems”,IJERMT, Vol.4, Issue 7, pp. 216-219, 2015
[15]Lata Nautiyal,Preeti, “Evaluating and Certifying Component-Based Software Using Weighted Assignment Technique”,IJHIT, Vol.9, No.1, pp.241-2552, 2016
[16]Sandeep Chopra, M.K.Sharma, Lata Nautiyali, “Analogous Study of Component-Based Software Engineering Models”,IJARCSSE, Vol.7 , Issue 6, pp. 597-603, 2017
Citation
Sandeep Chopra, M.K. Sharma, Lata Nautiyal, "A Novel Certification Process for Component-Based Life Cycle Model", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.91-95, 2018.
Survey on Handwritten Digit Recognition using Machine Learning
Survey Paper | Journal Paper
Vol.06 , Issue.05 , pp.96-100, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si5.96100
Abstract
Machine learning and deep learning plays an important role in computer technology and artificial intelligence. With the use of deep learning and machine learning, human effort can be reduce in recognizing, learning, predictions and many more areas. This paper presents recognizing the handwritten digits (0 to 9) from the famous MNIST dataset, comparing classifiers like KNN, PSVM, NN and convolution neural network on basis of performance, accuracy, time, sensitivity, positive productivity, and specificity with using different parameters with the classifiers.
Key-Words / Index Term
Handwritten Digits, Vector Machine, Neural Networks, Convolution, Machine Learning
References
[1] Anuj Dutt, Aashi Dutt, `Handwritten Digit Recognition Using Deep Learning`, (IJARCET) Volume 6, Issue 7, July 2017, ISSN: 2278 – 1323, Page number – 990-997
[2] Priya, Rajendra Singh, Dr. Soni Changlani, ‘Handwritten Digit Recognition using Proximal Support Vector Machine’ , Journal of Emerging Technologies and Innovative Research, Volume 4, Issue 04,April 2017, ISSN Number: 2349-5162, Page No: 251-254
[3] Saeed AL-Mansoori, ‘Intelligent Handwritten Digit Recognition using Artificial Neural Network’, Int. Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 5, Issue 5,
( Part -3) May 2015, pp.46-51
[4] Swapna Prava Ekka, ‘Recognition of Handwritten Digits using Proximal Support Vector Machine’, Department of ECE, EThesis NIT, Rourkela, 2014, ID Code - 6066
[5] Gaurav Jain, Jason Ko, ‘Handwritten DigitsRecognition’, Project Report, University of Toronto, 11/21/2008
[6] Fabien Lauera,,ChingY. Suenb, Gérard Blocha, ‘A trainable feature extractor for handwritten digit recognition’, Pattern Recognition Society. Published by Elsevier Ltd., Volume 40, Issue 6, June 2007, Pages 1816-1824, October 2006.
[7] Dan Cires¸anUeli Meier, JurgenSchmidhuber, ‘Multi-column Deep Neural Networks for Image Classification’, Journal reference: CVPR 2012, p. 3642-3649 , Report number: IDSIA-04-12 Feb 2012
[8] Dan ClaudiuCiresan, Ueli Meier, Luca Maria Gambardella, JurgenSchmidhuber, ‘Deep Big Simple Neural Nets Excel on HandwrittenDigit Recognition’, Neural Computation, Volume 22, Number 12, December 2010
[9] Patrice Y. Simard, Dave Steinkraus, John C. Platt, ‘Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis’, Institute of Electrical and Electronics Engineers, Inc.,Inproceedings, ISBN: 0-7695-1960-1, Sept., 2003
[10] Y. LeCun, L. Bottou, Y. Bengio, P. Haffner, ‘Gradient-Based Learning Applied to Document Recognition’, Proceedings of the IEEE, v. 86, pp. 2278-2324, 1998.
[11] JurgenSchmidhuber, ‘Deep Learning in Neural Networks: An Overview’, Technical Report IDSIA-03-14, April 2014.
[12] Berend-Jan van der Zwaag, ‘Handwritten Digit Recognition:A Neural Network Demo’, B. Reusch (Ed.): Fuzzy Days 2001, LNCS 2206, pp. 762–771, 2001.
[13] Haider A. Alwzwazy, Hayder M. Albehadili, Younes S. Alwan, Naz E. Islam, ‘Handwritten Digit Recognition Using Convolutional Neural Networks’, IJIRCCE, Vol. 4, Issue 2, February 2016.
[14] Stefan Knerr, LConPersonnaz, and GCrard Dreyfus, ‘Handwritten digit recognition by NeuralNetworks with Single-Layer Training’, IEEE Transactions On Neural Networks, VOL. 3, NO. 6, Nov., 1992
[15] Faisal Tehseen Shah, Kamran Yousaf, ‘Handwritten Digit Recognition Using Image Processing and Neural Networks’, WCE 2007, VOL-1, July 2 - 4, 2007
Citation
Dr. Narender Kumar, Himanshu Beniwal, "Survey on Handwritten Digit Recognition using Machine Learning", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.96-100, 2018.
A Conceptual Review on Smart Homes
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.101-106, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si5.101106
Abstract
Internet of Things (IoT) is the one of the most trending topic for research which had made its spurt emergence in the industry with breathtaking implementations. Internet of Things applications are like a big blue ocean covering plenty of devices leading to a whole new ecosystem. Nowadays, one of the most enlightened applications of the Internet of Things is Smart Homes. This concept has made our homes more secure and smarter resulting in judicious use of resources as well as leading to a smarter sustainable development. Smart homes are one of the most reliable applications of Internet of Things making one’s surrounding easy to deal with. This paper covers conceptual study on Smart Homes with offered utility, features and potency.
Key-Words / Index Term
Internet of Things, Home Automation, Wireless Sensor Network, MEMS
References
[1] http://developer.android.com/guide/topics/connectivity/bluetooth.html, accessed 10 march 2018
[2] https://en.wikipedia.orgiwikilInternecoCThings, accessed 10 march 2018
[3] Andreas Kamilaris, Andreas Pitsillides, "Towards Interoperable and Sustainable Smart Homes”, Proceedings, PaulCunningham and Miriam Cunningham(Edc) IIMC Internaltional Information Management Corporation 2013.
[4] M. Chan, D. Estève, C. Escriba, E. Campo, "A review of smart homes-Present state and future challenges", Comput. Methods Programs Biomed., vol. 91, pp. 55-81, Jul. 2008.
[5] D. Pishva, K. Takeda, "A product based security model for smart home appliances", Proc. 40th Annu. IEEE Int. Carnahan Conf. Security Technol., pp. 234-242, 2006.
[6] A. V. Berlo, A. Bob, E. Jan, F. Klaus, H. Maik, W. Charles, Design Guidelines on Smart Homes: A COST 219bis Guidebook, Brussels, Belgium:Eur. Commission, 1999
[7] Vamsikrishna Patchava, Sonti Dinesh Kumar, Shaik Riyaz Hussain, K. Rama Naidu, "Raspberry PI controlled SMS-Update-Notification (Sun) system", Proceeding of IEEE International Conference on Electrical Computer and Communication Technologies (ICECCT 2015), pp. 1-4, March 2015.
[8] Eben Upton, Gareth Halfacree, Raspberry Pi User Guide, A John Wiley and Sons Ltd, 2012.
[9] A IoT approach for motion detection using RPi By Aamir Nizam Ansari , Mohamed Sedky Vol 4, 3rd March 2015.M. Gamba, A. Gonella, C.E. Palazzi, "Design issues and solutions in a modern home automation system", Proceedings of International Conference on Computing Networking and Communications (ICNC 2015), pp. 1111-1115, Feb. 2015.
[10] M. Chan, D. Estève, C. Escriba, E. Campo, "A review of smart homes-Present state and future challenges", Comput. Methods Programs Biomed., vol. 91, pp. 55-81, Jul. 2008.
[11] R. J. Robles, T.-H. Kim, "Review: Context aware tools for smart home development", Int. J. Smart Home, vol. 4, pp. 1-12, Jan. 2010.
[12] D. Pishva, K. Takeda, "A product based security model for smart home appliances", Proc. 40th Annu. IEEE Int. Carnahan Conf. Security Technol., pp. 234-242, 2006.
Citation
A.Sharma, S.Gupta, M.Mittal, "A Conceptual Review on Smart Homes", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.101-106, 2018.