On Biometrics Feature Extraction and Template Security Schemes
Research Paper | Journal Paper
Vol.06 , Issue.03 , pp.1-7, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.17
Abstract
Effective response to identification and authentication of individuals in complex environment demands replacement of traditional authentication techniques. It should occur concurrently with the increased pace of the digital world and increasing population. Many unimodal template security systems have been published, but in one or the other way, they are associated with some technical flaws, which prevents them from claiming to be reliable models. After doing the critical review of many published articles and case studies, many design characteristics of template security systems like security level, reliability, privacy level, acceptability, performance, uniqueness and cost, were taken into consideration for analyzing the various available models. However, no model was found to be associated with all the design parameters, which could claim to be a highly secure and reliable model. On review basis, it was found that many design characteristics were underestimated, if taken into consideration for development and implementation, could revolutionize biometric based template security systems.
Key-Words / Index Term
Biometrics, Feature Extraction, Unimodal systems, Multimodal systems, Template Security Scheme
References
[1] A. M. P. Canuto, F. Pintro, and M. C. Fairhurst, “An effective template protection method for face and voice cancellable identification,” vol. 11, pp. 157–166, 2014.
[2] Handbook of Biometrics Handbook of Biometrics. .
[3] Y. J. Chin, T. S. Ong, A. B. J. Teoh, and K. O. M. Goh, “Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion,” Inf. FUSION, 2013.
[4] D. T. Meva, “Comparative Study of Different Fusion Techniques in Multimodal Biometric Authentication,” vol. 66, no. 19, pp. 16–19, 2013.
[5] S. R. S. Sree and N. Radha, “A Survey on Fusion Techniques for Multimodal Biometric Identification,” pp. 7493–7497, 2014.
[6] A. Selwal and S. K. Gupta, “Region Coded Hashing based Template Security Scheme for Multi-biometric System,” no. 3, 2016.
[7] M. A. Rahman, F. Anwar, and M. S. Azad, “A simple and effective technique for human verification with hand geometry,” Proc. Int. Conf. Comput. Commun. Eng. 2008, ICCCE08 Glob. Links Hum. Dev., pp. 1177–1180, 2008.
[8] K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP J. Adv. Signal Process., vol. 2008, no. January, pp. 1–20, 2008.
[9] C. Lee and J. Kim, “Journal of Network and Computer Applications Cancelable fingerprint templates using minutiae-based bit-strings,” J. Netw. Comput. Appl., vol. 33, no. 3, pp. 236–246, 2010.
[10] N. K. Ratha, S. Chikkerur, and S. Member, “Generating Cancelable Fingerprint Templates,” vol. 29, no. 4, pp. 561–572, 2007.
[11] V. Rani, M. Kaur, and M. Student, “TC,” vol. 3, no. 9, pp. 351–355, 2017.
[12] A. Mm and S. Gr, “Biometric Template Protection,” vol. 1, no. 2, pp. 1–8, 2016.
[13] C. Rathgeb, J. Wagner, B. Tams, and C. Busch, “PREVENTING THE CROSS-MATCHING ATTACK IN BLOOM FILTER-BASED CANCELABLE BIOMETRICS da / sec - Biometrics and Internet Security Research Group , Hochschule Darmstadt , Germany Institute for Mathematical Stochastics , University of G ¨,” 2015.
[14] R. Á. Mariño, F. H. Álvarez, and L. H. Encinas, “A crypto-biometric scheme based on iris-templates with fuzzy extractors,” vol. 195, pp. 91–102, 2012.
[15] B. Choudhury, P. Then, V. Raman, B. Issac, M. K. Haldar, and G. L. Co-, “Cancelable Iris Biometrics Based on Data Hiding Schemes,” pp. 1–6, 2016.
[16] R. Jeng and W. Chen, “Two Feature-Level Fusion Methods with Feature Scaling and Hashing for Multimodal Biometrics,” vol. 4602, no. March, 2016.
[17] A. Selwal, S. K. Gupta, and Surender, “Low overhead octet indexed template security scheme for multi-modal biometric system,” J. Intell. Fuzzy Syst., vol. 32, no. 5, pp. 3325–3337, 2017.
[18] J. Aravinth, S. Valarmathy, J. Aravinth, and S. Valarmathy, “modal biometric recognition and its application to remote biometrics authentication Multi classi fi er-based score level fusion of multi-modal biometric recognition and its application to remote biometrics authentication,” vol. 2199, no. December, 2016.
[19] S. Sojan and R. K. Kulkarni, “Mixing Fingerprint Features for Template Security,” no. 7, pp. 355–359, 2016.
[20] D. Jagadiswary and D. Saraswady, “Biometric Authentication using Fused Multimodal Biometric,” Procedia - Procedia Comput. Sci., vol. 85, no. Cms, pp. 109–116, 2016.
[21] M. Lim, S. Verma, G. Mai, and P. C. Yuen, “Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection,” Pattern Recognit., vol. 60, pp. 706–719, 2016.
[22] A. Selwal and S. Kumar, “Fuzzy Analytic Hierarchy Process based Template Data Analysis of Multimodal Biometric Conceptual Designs,” Procedia - Procedia Comput. Sci., vol. 85, no. Cms, pp. 899–905, 2016.
[23] A. Selwal and S. Kumar, “Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry ଝ,” Perspect. Sci., vol. 8, pp. 705–708, 2016.
[24] Rathgeb C, Busch C, “Cancelable Multi-Biometrics: Mixing Iris-Codes based on Adaptive Bloom Filters,” Computers & Security (2014), doi: 10.1016/j.cose.2013.12.005.
Citation
Mahapara Khurshid, Arvind Selwal, "On Biometrics Feature Extraction and Template Security Schemes", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.1-7, 2018.
A Study of Fruit Disease Detection using Pattern Classifiers
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.8-15, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.815
Abstract
A country like India, where economy is strongly driven by agricultural products. If plants are suffering from any kind of disease, it may amount loss in both quantity and quality of the agricultural products. The disease diagnosis is one of the very challenging tasks for farmers. Usually, the disease or the symptoms of the disease such as spots or streaks are seen on the leaves or stem of a plant. Most of the diseases in plants are caused by bacteria, fungi, and viruses. In order to prevent such loss, it is vital to detect and diagnose the disease at the early stage. This paper presents a survey of various fruit disease detections using image processing techniques and neural networks. Various authors have proposed different techniques for fruit disease identification and classification. The techniques such as texture feature extraction using GLCM, color-based segmentation, artificial neural network and different classifiers are used. The focus of work is to carry out the analysis of different fruit disease detection techniques
Key-Words / Index Term
Artificial Neural Networks, Supervised learning,Texture FeatureExtraction,FruitDiseases.
References
[1] M. P. Pawar, “Cucumber Disease Detection Using Artificial Neural Network.”IEEE
[2] S. Raut and A. Fulsunge, “Plant Disease Detection in Image Processing,” pp. 10373–10381, 2017.
[3] B. J. Samajpati and S. D. Degadwala, “Hybrid Approach for Apple Fruit Diseases Detection and Classification Using Random Forest Classifier,” no. 2013, pp. 1015–1019, 2016.
[4] B. S. Mienda, A. Yahya, I. A. Galadima, and M. S. Shamsir, “Analysis of Apple Fruit Diseases using Neural Network,” Res. J. Pharm. , Biol. Chem. Sci., vol. 5, no. 388, pp. 388–396.
[5] A. Camargo and J. S. Smith, “An image-processing based algorithm to automatically identify plant disease visual symptoms,” Biosyst. Eng., vol. 102, no. 1, pp. 9–21, 2009.
[6] Z. Jian, “Support Vector Machine For Recognition Of Cucumber Leaf Diseases,” no. 1, pp. 264–266.
[7] A. N. Rathod et al., “LEAF DISEASE DETECTION USING IMAGE PROCESSING AND,” vol. 1, no. 6, pp. 1–10, 2014.
[8] P. Mohanaiah, P. Sathyanarayana, and L. Gurukumar, “Approach,” vol. 3, no. 5, pp. 1–5, 2013.
[9] J. Francis, V. J. Engineering, and V. Jyothi, “PEPPER PLANTS USING SOFT COMPUTING TECHNIQUES.”
[10] S. S. Sannakki, V. S. Rajpurohit, V. B. Nargund, and P. Kulkarni, “Diseases using Neural Networks ”,” pp. 3–7, 2013.
[11] S. D. Khirade, “Plant Disease Detection Using Image Processing,” pp. 1–4, 2015.
[12] G. Kambale and N. Bilgi, “A Survey Paper on Crop Disease Identification and Classification Using Pattern Recognition and Digital Image Processing Techniques,” no. Acbcda, pp. 14–17, 2017.
[13] A. Kadir, L. E. Nugroho, A. Susanto, and P. I. Santosa, “Leaf Classification Using Shape , Color , and Texture Features,” pp. 225–230, 2011.
[14] Meunkaewjinda. A, P.Kumsawat, K.Attakitmongcol and A.Sirikaew.2008 Grape leaf diseasefrom color imaginary using Hybrid intelligent system”, Proceedings of ECTICON
[15] D. Cao, “An improved k-medoids clustering algorithm,” pp. 132–135.
[16] “Automatic Recognition System Using Preferential Image Segmentation For Leaf And Flower Images,” vol. 1, no. 4, pp. 13–25, 2011.
[17] A. B. Blight, “Neural Network,” 2015.IEEE
[18] M. Zhang and M. Qinggang, “Citrus canker detection based on leaf images analysis,” 2nd Int. Conf. Inf. Sci. Eng. ICISE2010 - Proc., pp. 3584–3587, 2010.
[19] J. Pradeep, M. B. Tanveer, S. A. Makwana, and R. Sivakumar, “Er Er,” vol. 2, no. 4, pp. 161–168, 2013.
[20] “AN IMPLEMENTATION OF GRAPE PLANT DISEASE DETECTION,” no. 4, pp. 527–535, 2015.
[21] K. S. Neethu and P. Vijay, “Leaf Disease Detection and Selection of Fertilizers using Artificial Neural Network,” pp. 1852–1858, 2017.
[22] A. H. Kulkarni, H. M. Rai, K. A. Jahagirdar, and P. S. Upparamani, “A Leaf Recognition Technique for Plant Classification Using RBPNN and Zernike Moments,” vol. 2, no. 1, pp. 984–988, 2013.
Citation
Mahvish Jan, Arvind Selwal, "A Study of Fruit Disease Detection using Pattern Classifiers", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.8-15, 2018.
Virtual Machine Migration and Placement Schemes-limitations and challenges
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.16-20, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.1620
Abstract
Cloud-Computing refers to the technology that provides different services as per demand via different web-based tools. Cloud computing can be thought of as a pool of resources that delivers software, data, storage, servers, computing resources etc as a service. Virtualization is a technology that acts as a ground for cloud-computing. Virtualization is a technique that enables the division of devices or resources such as servers, operating devices, memory into multiple instances and each one behaves as a whole single machine independent of each other (called virtual machine). Virtualization creates these virtual versions of devices and resources with the help of a middleware. The machine on which a middleware runs one or more virtual machines (VM) is called the Host Machine. In the life cycle of a virtual machine there may exist a necessity to transfer a virtual machine from one host machine to another host machine due to different reasons like fault tolerance, load balancing, energy management, system-maintenance etc. and this is called virtual machine migration. The two main techniques of migrating a VM between different hosts are pre-copy and post copy. In virtual machine migration, the placement of virtual machine between hosts play a critical role as it puts a straight effect on the performance, power consumption and application of resources of the physical machine on which VM is placed. This research paper provides the survey and analyses of existing techniques of virtual machine migration and also throws some light on virtual machine placement schemes. Different virtual machine migration techniques are also compared in the paper. Finally, the proposed work and conclusion are highlighted.
Key-Words / Index Term
Cloud-Computing, virtualization, virtual machine migration, machine migration techniques, virtual machine placement schemes.
References
[1] Aditya Narayan Singh and S. Prakash, “Challenges and opportunities of resource allocation in cloud computing: A survey”, pp. 2047–2051, 2015.
[2] S. Al-haj and E. Al-shaer, , “A Formal Approach for Virtual Machine Migration Planning”, Cnsm 2013, pp. 51–58, 2013.
[3] G. Singh and P. Gupta, “A review on migration techniques and challenges in live virtual machine migration”, 2016 5th Int. Conf. Reliab. Infocom Technol. Optim. ICRITO 2016 Trends Futur. Dir., no. Type 1, pp. 542–546, 2016.
[4] U. Deshpande and K. Keahey, “Traffic-sensitive Live Migration of Virtual Machines”,Futur. Gener. Comput. Syst., vol. 72, pp. 118–128, 2017.
[5] M. Masdari, S. S. Nabavi, and V. Ahmadi, “An overview of virtual machine placement schemes in cloud computing”, J. Netw. Comput. Appl., vol. 66, pp. 106–127, 2016.
[6] Y. Yu and Y. Gao, “Constraint programming-based virtual machines placement algorithm in datacentre”, IFIP Adv. Inf. Commun. Technol., vol. 385 AICT, pp. 295–304, 2012.
[7] Xiaoli, W. and L. Zhanghui. “An energy-aware VMs placement algorithm in Cloud Computing environment”, Intelligent System Design and Engineering Application (ISDEA), 2012 IEEE Second International Conference on, 2012.
[8] Gursharan Singh, Sunny Behal, Monal Taneja,“Advanced memory reusing mechanism for virtual machines in cloud computing”, 3rd International Conference on Recent Trends in Computing 2015 published by ELSEVIER, pp 91 - 103, July 2015 .
[9] Gahlawat, M . and P. Sharma, “Survey of virtual machine placement in federated Clouds”, in Advance Computing Conference (IACC), 2014 IEEE International, 2014 .
[10] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing : State-of-the-art and research challenges”, pp. 7–18, 2010.
[11] Divya Kapil, Emmanuel Spill, Ramesh C .Joshi, “Live virtual machine migration techniques survey and research challenges”,IEEE, 2012 .
[12] M. R. Hines, U. Deshpande, and K. Gopalan , “Post-copy livemigration of virtual machines”, pp. 14–26 , 2009.
[13] Gulshan Soni, Mala Kalra, “Comparative study of live virtual machine migration techniques in cloud” , IJCA, vol 84, no. 14, December 2013.
[14] Abazari, F. and M. Analoui, “Exploring the effects of virtual machine placement on the transmission of infections in cloud”. in Telecommunications (IST), 2014 7th International Symposium , 2014.
[15] T. Hirofuchi, H. Nakada, S. Itoh, and S. Sekiguchi, “Reactive consolidation of virtual machines enabled by postcopy live migration”, pp. 11–18, 2011.
[16] B.Hayes , “Cloud ComputingBible” Wiley Publication.,2008.
[17] Z. Lei, E. Sun, S. Chen, J. Wu, and W. Shen, “A novel hybrid-copy algorithm for live migration of virtual machine”,‖ Futur. Internet, vol. 9, no. 3, p. 37, 2017.
Citation
Saima Fayaz Chashoo, Deepti Malhotra, "Virtual Machine Migration and Placement Schemes-limitations and challenges", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.16-20, 2018.
On Opportunistic Routing in Wireless Sensor Networks
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.21-25, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.2125
Abstract
Opportunistic Routing (OR) is the latest strategy of routing in wireless sensor networks in which the nearer node to the target is selected for transferring the data. OR may immensely enhance the performance parameters like efficiency, throughput, and reliability by selecting best next hop in Opportunistic Protocol. In OR, a candidate set is chosen which serves the purpose of a potential group of nodes for packet forwarding. This paper presents the literature review of various opportunistic routing protocols. The tabular representation of various OR protocols on the basis of End-to-End delay, energy Efficiency, packet duplication and forwarding list selection is depicted in this paper. The comparative analysis of various opportunistic routing protocols has been given in this paper.
Key-Words / Index Term
Wireless Sensor Networks, Routing, Opportunistic Routing
References
[1] I. F. Akyildiz and I. H. Kasimoglu, “Wireless sensor and actor q networks : research challenges qq,” vol. 2, pp. 351–367, 2004.
[2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks : a survey,” vol. 38, pp. 393–422, 2002.
[3] J. N. Al-Karaki and a. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Wirel. Commun., vol. 11, no. 6, pp. 6–28, 2004.
[4] C. M. Huang, K. C. Lan, and C. Z. Tsai, “A survey of opportunistic networks,” Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, pp. 1672–1677, 2008.
[5] S. Biswas and R. Morris, “Opportunistic routing in multi-hop wireless networks,” SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, pp. 69–74, 2004.
[6] A. P. Mazumdar and A. S. Sairam, “PBFS: A technique to select forwarders in opportunistic routing,” IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, no. i, pp. 149–153, 2011.
[7] D. S. J. D. E. Couto, D. Aguayo, J. Bicket, and R. Morris, “A High-Throughput Path Metric for Multi-Hop Wireless Routing,” pp. 419–434, 2005.
[8] M. Zorzi and R. R. Rao, “Geographic random forwarding (GeRaF) for ad hoc and sensor networks: Multihop performance,” IEEE Trans. Mob. Comput., vol. 2, no. 4, pp. 337–348, 2003.
[9] Y. Li, W. Chen, and Z. L. Zhang, “Optimal forwarder list selection in opportunistic routing,” 2009 IEEE 6th Int. Conf. Mob. Adhoc Sens. Syst. MASS ’09, pp. 670–675, 2009.
[10] Y. Liu, L. X. Cai, and X. S. Shen, “Spectrum-aware opportunistic routing in multi-hop cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 10, pp. 1958–1968, 2012.
[11] X. Mao, S. Member, S. Tang, and S. Member, “Energy-Efficient Opportunistic Routing in Wireless Sensor Networks,” vol. 22, no. 11, pp. 1934–1942, 2011.
[12] “Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks.” [Online]. Available: https://edoc.hu-berlin.de/handle/18452/3119. [Accessed: 05-Feb-2018].
[13] X. Zhang and B. Li, “Optimized Multipath Network Coding in LossyWireless Networks,” Ieee J. Sel. Areas Commun., vol. 27, no. 5, pp. 622–634, 2009.
[14] E. Rozner, J. Seshadri, Y. A. M. Mehta, and L. Qiu, “{SOAR}: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks,” IEEE Trans. Mob. Comput., vol. 8, no. 12, pp. 1622–1635, 2009.
[15] Y. Yuan, H. Yang, S. H. Y. Wong, S. Lu, and W. Arbaugh, “ROMER : Resilient Opportunistic Mesh Routing for Wireless Mesh Networks,” IEEE 1st Work. Wirel. mesh networks, 2005.
Citation
Sheikh Shahid Ali, Yashwant Singh, "On Opportunistic Routing in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.21-25, 2018.
On IoT Security Models:Traditional and Block chain
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.26-31, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.2631
Abstract
Security and privacy is a much-needed aspect of the connected world. If these functionalities are not deployed properly then every economic or societal institution dependent on them are vulnerable to get crashed and might even cause a damage of catastrophic scale. People would eventually stop trusting these technological platforms that are supposed to make their lives better. Although security is a paramount functionality in any connected infrastructure, there is no silver bullet to it, there has been extensive research in this field but no one has come up with an idea that can secure the distributed and heterogeneous IoT network efficiently. IoT demands an autonomous access control methodology requiring minimal or no user interaction. There are several existing models that are good and effective however they have several implementation issues. In this paper we have described our survey of the existing security models of IoT and presented a brief comparative analysis of the discussed models also some of the main requirements for designing such models is given.
Key-Words / Index Term
IoT, Security, blockchain, access-control, models
References
[1] I. Gartner, “Gartner Analysis.” [Online]. Available: https://www.gartner.com/newsroom/id/3598917. [Accessed: 06-Feb-2018].
[2] J. A. Jerkins, “Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code,” 2017 IEEE 7th Annu. Comput. Commun. Work. Conf. CCWC 2017, 2017.
[3] “Hijacking Computers to Mine Cryptocurrency Is All the Rage - MIT Technology Review.” [Online]. Available: https://www.technologyreview.com/s/609031/hijacking-computers-to-mine-cryptocurrency-is-all-the-rage/. [Accessed: 06-Feb-2018].
[4] E. Bertino, “Botnets and Internet.”
[5] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” Www.Bitcoin.Org, p. 9, 2008.
[6] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” Proc. - 2017 IEEE 6th Int. Congr. Big Data, BigData Congr. 2017, pp. 557–564, 2017.
[7] A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards an Optimized BlockChain for IoT,” in Proceedings of the Second International Conference on Internet-of-Things Design and Implementation - IoTDI ’17, 2017, pp. 173–178.
[8] N. Kshetri, “Can Blockchain Strengthen the Internet of Things?,” IT Prof., vol. 19, no. 4, pp. 68–72, 2017.
[9] G. Zhang, “An extended role based access control model for the Internet of Things,” 2010 Int. Conf. Information, Netw. Autom., pp. V1-319-V1-323, 2010.
[10] J. L. Hernández-Ramos, A. J. Jara, L. Marín, and A. F. Skarmeta Gómez, “DCapBAC: embedding authorization logic into smart things through ECC optimizations,” Int. J. Comput. Math., vol. 93, no. 2, pp. 345–366, 2016.
[11] P. J. Sandhu R., “Usage Control: A Vision for Next Generation Access Control,” Comput. Netw. Secur., vol. 1, pp. 42–56, 2003.
[12] V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, “Attribute-based access control,” Computer (Long. Beach. Calif)., vol. 48, no. 2, pp. 85–88, 2015.
[13] M. Vučinić, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and R. Guizzetti, “OSCAR: Object security architecture for the Internet of Things,” Ad Hoc Networks, vol. 32, no. January, pp. 3–16, 2015.
[14] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,” 2017 IEEE Int. Conf. Pervasive Comput. Commun. Work. (PerCom Work., pp. 618–623, 2017.
[15] A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, “Towards a novel privacy-preserving access control model based on blockchain technology in IoT,” in Advances in Intelligent Systems and Computing, 2017, vol. 520, pp. 523–533.
[16] C. Li and L. J. Zhang, “A blockchain based new secure multi-layer network model for internet of things,” Proc. - 2017 IEEE 2nd Int. Congr. Internet Things, ICIOT 2017, pp. 33–41, 2017.
[17] M. Castro, M. Castro, B. Liskov, and B. Liskov, “Practical Byzantine fault tolerance,” OSDI {’}99 Proc. third Symp. Oper. Syst. Des. Implement., no. February, pp. 173–186, 1999.
Citation
Shahid Ul Haq, Yashwant Singh, "On IoT Security Models:Traditional and Block chain", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.26-31, 2018.
Performance Evaluation of Lazy-Funnelsort Algorithm on Multicore System
Research Paper | Journal Paper
Vol.06 , Issue.03 , pp.32-37, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.3237
Abstract
Sorting is one of the basic problems that have been extensively studied. There are many sorting algorithms which are efficient in computation but cannot use cache efficiently. Efficient use of cache is an important factor for determining the performance of an algorithm. Cache-oblivious algorithms are designed that are both work and cache efficient. The aim of this paper is to evaluate the performance of cache-oblivious sorting algorithm called Lazy Funnelsort on multicore processors. The evaluation is made against the well known fast sorting algorithms: quick sort, merge sort on multicore processor machine. The experiments are conducted against different input sizes and number of processing cores and threads using Intel Cilk Plus, which is extension to C and C++ to express task and data parallelism. The performance of algorithms is examined in terms of execution time, speedup, efficiency and scalability. The results show that parallel implementation of Lazy Funnelsort is better than its sequential implementation and also scalable on multiple cores. Though it has been outperformed by quick sort and merges sort algorithms but shows moderate promise as a parallel algorithm.
Key-Words / Index Term
Cache-oblivious, Funnelsort, Performance, Speedup, Efficiency, Cache-miss-ratio
References
[1] L. Arge, M. Goodrich, M. Nelson, and N.Sitchinava, “Fundamental parallel algorithms for private-chip multiprocessors”, In the Proceedings of the 20th ACM SPAA, pp. 197-206, 2008.
[2] G. Blelloch and P. Gibbons, “Effectively sharing a cache among threads”, In the Proceedings of the 16th ACM SPAA, pp. 235-244, 2004.
[3] U. A. Acar, G. E. Blelloch, and R. D. Blumofe, “The data locality of work stealing”, Theory of Computing Systems, vol. 35, pp.3, 2002.
[4] G. Bilardi, A. Pietracaprina, G. Pucci, and F. Silvestri, “Network-oblivious algorithms”, In the Proceedings of the 21st IEEE IPDPS, 2007.
[5] R. A. Chowdhury and V. Ramachandran, “The cache-oblivious Gaussian elimination paradigm: Theoretical framework, parallelization and experimental evaluation”, In the Proceedings of the 19th ACM SPAA, pp. 71–80, 2007.
[6] R. A. Chowdhury and V. Ramachandran, “Cache-oblivious dynamic programming”, In the Proceedings of the 17th ACM-SIAM SODA, pp. 591–600, 2006.
[7] G. Blelloch, R. Chowdhury, P. Gibbons, V. Ramachandran, S. Chen, and M. Kozuch, “Provably good multicore cache performance for divide-and-conquer algorithms”, In the Proceedings of the SODA, pp. 501–510, 2008.
[8] M. Frigo and V. Strumpen, “The cache complexity of multithreaded cache oblivious algorithms”, Theory Compute. Syst., vol. 45, no. 2, pp. 203–233, 2009.
[9] R. Cole and V. Ramachandran, “Resource oblivious sorting on multicores”, In the Proceedings of the ICALP, Track A, 2010.
[10] Richard Cole and Vijaya Ramachandran, “Efficient Resource Oblivious Algorithms for Multicores with False Sharing”, In the Proceedings of the IEEE 26th IPDPS, pp. 201 – 214, 2012.
[11] L. Arge, M. T. Goodrich, M. Nelson, and N. Sitchinava, “Fundamental parallel algorithms for private-cache chip multiprocessors”, In the Proceedings of the ACM SPAA, pp. 197–206, 2008.
[12] G. Belloch, P. Gibbons and H. Simhadri, “Brief announcement: Low depth cache-oblivious sorting”, In the Proceedings of the ACM SPAA, ACM, 2009.
[13] G. S. Brodal and R. Fagerberg, “Cache-oblivious distribution sweeping”, In the Proceedings of the 29th International Colloquium on Automata, Language and Programming, ICALP, vol. 2518, Springer, New York, pp. 426-438, 2002.
[14] M. Frigo, C. Leiserson, H. Prokop, and S. Ramachandran, “Cache-oblivious algorithms”, In the Proceedings of the 40th IEEE FOCS , pp.285-297, 1999.
[15] A. Aggarwal and J. S. Vitter, “The input/output complexity of sorting and related problems”, Comm. ACM 31, 9, 1116-1127, 1988.
[16] G. S. Brodal, R. Fagerberg and K. Vinther, “Engineering Cache-Oblivious Sorting Algorithm”, Journal of Experimental Algorithmics, vol. 12, ACM, New York, 2008
Citation
Riaz Ahmed, Lalitsen Sharma, "Performance Evaluation of Lazy-Funnelsort Algorithm on Multicore System", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.32-37, 2018.
Internet Usage and Academic Performance: An Empirical Study of Secondary School Students in Kashmir
Research Paper | Journal Paper
Vol.06 , Issue.03 , pp.38-41, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.3841
Abstract
The present investigation was carried out to study the academic achievement of secondary school students with respect to gender and type of school. A sample of 240 secondary school students (120 male and 120 female) was drawn randomly from two districts (Anantnag and Kupwara) of Kashmir (J&K), India. Self-constructed Information Blank was used to locate the Internet-user secondary school students. The subjects’ previous academic marks secured in their final examination conducted by J&K BOSE have been taken a major yard-stick to assess the academicperformance. The data was subjected to statistical analysis by applying mean, standard deviation and t-test. A significant difference between male Internet-user and female Internet-user secondary school students was confirmed. The results further highlighted a significant difference on academic performance of internet users with respect to their type of school.
Key-Words / Index Term
Internet Usage, Academic Achievement, Secondary School Students
References
1 S.A. Rose, P.M. Ferlund, “Using Technology for Powerful Social Studies Learning”, Social Education, Vol. 61, No. 3, pp. 160-166, 1997.
2 A. Tella, “University of Botswana Undergraduates’ Use of Internet: Implications on Academic Performance”, Journal of Educational Media & Library Sciences, Vol. 45, No. 2, pp. 161-185, 2007
3 T. Judd, G. Kennedy, “A Five-Year Study of On-Campus Internet Use by Undergraduate Biomedical Students”. Computers & Education, Vol. 55, pp. 1564–1571, 2010.
4 S. Jones, “The Internet Goes to College: How Students are Living in the Future with Today`s Technology” , U.S. Department of Education, Office of Educational Research and Improvement, Educational Resources Information Center (ERIC), pp. 1-23, 2011.
5 J. Park, H. Choi, “Differences in Personal Characteristics, Family and Organizational Supports, and Learner Satisfaction between Dropouts and Persistent Learners of Online Programs”. In the Proceedings of World Conference on e-Learning in Corporate, Government, Healthcare and Higher Education 2007, Chesapeake Virginia, VA: AACE, pp. 6444–6450, 2007.
6 J. Park, H. Choi, “Factors influencing Adult Learners` Decision to Drop Out or Persist in Online Learning”, Educational Technology & Society, Vol. 12, No. 4, pp. 207-217, 2009.
7 X. Ni, H. Yan, S. Chen, Z. Liu, “Factors influencing Internet Addiction in a Sample of Freshmen University Students in China, Cyber Psychology & Behavior, Vol. 12, No. 3, pp. 327-330, 2009.
8 K. Nalwa, P. Anand, “Internet Addiction in Students: A Cause of Concern. Cyber of Australian Students: Participation Habits and Prevalence of Addiction” Australian Journal of Psychology and Behaviour, Vol. 6, No. 6, pp. 653-656, 2003.
9 F. Kheirkhah, A.G., Juibary, A. Gouran, “Internet Addiction, Prevalence and Cres Epidemiological Features in Mazandaran Province, Northern Iran”, Iranian Red Medic Journal, Vol. 12, No. 2, pp. 133-137, 2010.
10 W. Austin, W. Michael, “Academic Performance and Internet Usage among High School Students In Lafayette USA”, .Journal of Economics and Economic Education Research, Vol. 12, No. 1, pp. 41-54, 2011.
11 H.H. Siraj, “Internet Usage and Academic Performance in a Malaysian Public University”, International Medical Journal, Vol. 22, No. 2, pp. 83-86, 2015.
12 J. Carlos, T. Díaz, “Internet Use and Academic Success among University Students of North America”, Media Education Research Journal, Vol. 24, No. 48, pp. 61-69, 2016.
13 V. Pardhasaradhi, V. Goel, “Influence of Access Use of Internet on Academic Performance of Adolescents”, International Journal of Applied and Pure Science and Agriculture, Vol. 1, No. 12, pp. 57-64, 2015.
14 Z. Liu, X. Huang, “Gender Differences in the Online Reading Environment”, Journal of Documentation, Vol. 64, No. 4, pp. 616-626, 2008.
15 R. Harold, A. von Eye, “Race, Gender and Information Technology Use: The New Digital Divide”, Cyber Psychology & Behaviour, Vol. 11, No. 4, pp. 437-443, 2008.
16 Y.F. Cheng, S.S. Peng, “University Students` Internet Use and its Relationships with Academic Performance, Interpersonal Relationships, Psychosocial Adjustment and Self-Evaluation”. Cyber Psychology & Behavior, Vol. 11, No. 4, pp: 467-469, 2008.
17 W. Cheung, W. Huang, “Proposing a Framework to Assess Internet Usage in University Education: An Empirical Investigation from a Students’ Perspective”, British Journal of Educational Technology, Vol. 36, No. 2, pp. 237-253, 2005.
18 Y. Zhao, Does Home Internet Use Influence the Academic Performance of Low-Income Children? Developmental Psychology, Vol. 42, No. 3, pp. 429-434, 2006.
19 S. Turner, M.E. Farmer, “Assessment of Student Performance in an Internet-Based Multimedia Classroom”, In the Proceedings of International Conference on Frontiers in Education Computer Science and Computer Engineering (FECS08), Las Vegas, 2008.
20 Y.G. Shahin, S. Balta, T. Ercan, “The use of Internet resources by university students during their course projects elicitation: A case study”. The Turkish Online Journal of Educational Technology, Vol. 9, No. 2, pp: 234-244, 2010.
Citation
S.A. Mir, A.A. Paray, "Internet Usage and Academic Performance: An Empirical Study of Secondary School Students in Kashmir", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.38-41, 2018.
On Message Dissemiaton and Event Detection in VANET
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.42-45, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.4245
Abstract
The whole concept of message dissemination in Vehicular Ad hoc Networks relies on the inter-vehicle cooperation. This helpful nature of vehicles has empowered vehicles to gather and trade traffic related messages continuously. In this manner, it is conceivable to utilize Vehicular Ad-hoc Networks for event discovery on urban roadways. Due to the uneven topology of urban roadways comprising of both major and auxiliary roadways, different protocols are designed. These protocols are designed to detect traffic related events on roadways. Some protocols might be efficient for a particular road but may fail for some other types of roads. Besides, the current scattering strategies for occasions related data do not have the essential control system, so the message(information) might be dispersed to different geographical areas. This paper presents the review of existing message dissemination and event detection protocols in VANET. A tabular representation of various protocols of message dissemination and event detection on parameters like radio propagation model, transmission range, standard and simulator have been given. The comparative analysis of these existing protocols is also presented in the same section.
Key-Words / Index Term
Vehicular ad-hoc networks, message dissemination, event detection, radio propagation model, transmission range
References
[1] E. C. Eze, S. Zhang, and E. Liu, “Vehicular ad hoc networks (VANETs): Current state, challenges, potentials and way forward,” ICAC 2014 - Proc. 20th Int. Conf. Autom. Comput. Futur. Autom. Comput. Manuf., no. September, pp. 176–181, 2014.
[2] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges,” Telecommun. Syst., vol. 50, no. 4, pp. 217–241, 2012.
[3] X. Yang, J. Liu, F. Zhao, and N. H. Vaidya, “A Vehicle-to-Vehicle Communication Protocol,” 2004.
[4] L. Briesemeister and H. Gunter, “Role-Based Multicast in Highly Mobile but Sparsely Connected Ad Hoc Networks,” pp. 45–50, 2000.
[5] S. Biswas, R. Tatchikou, and F. Dion, “Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety,” IEEE Commun. Mag., vol. 44, no. 1, pp. 74–82, 2006.
[6] T. Fukuhara et al., “Broadcast methods for inter-vehicle communications system,” IEEE Wirel. Commun. Netw. Conf. WCNC, vol. 4, pp. 2252–2257, 2005.
[7] Y. C. Tseng, S. Y. Ni, Y. S. Chen, and J. P. Sheu, “The broadcast storm problem in a mobile ad hoc network,” Wirel. Networks, vol. 8, no. 2–3, pp. 153–167, 2002.
[8] M. Fogue, P. Garrido, F. J. Martinez, J. C. Cano, C. T. Calafate, and P. Manzoni, “Evaluating the impact of a novel message dissemination scheme for vehicular networks using real maps,” Transp. Res. Part C Emerg. Technol., vol. 25, pp. 61–80, 2012.
[9] M. Fogue, P. Garrido, F. J. Martinez, J. C. Cano, C. T. Calafate, and P. Manzoni, “An adaptive system based on roadmap profiling to enhance warning message dissemination in vanets,” IEEE/ACM Trans. Netw., vol. 21, no. 3, pp. 883–895, 2013.
[10] K. Suriyapaibonwattana and C. Pomavalai, “An effective safety alert broadcast algorithm for VANET,” in 2008 International Symposium on Communications and Information Technologies, ISCIT 2008, 2008, pp. 247–250.
[11] K. Suriyapaiboonwattana, C. Pornavalai, and G. Chakraborty, “An adaptive alert message dissemination protocol for VANET to improve road safety,” in IEEE International Conference on Fuzzy Systems, 2009, pp. 1639–1644.
[12] M. Slavik and I. Mahgoub, “Stochastic broadcast for VANET,” in 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010, 2010.
[13] Y. Bi, L. X. Cai, X. Shen, and H. Zhao, “A cross layer broadcast protocol for multihop emergency message dissemination in inter-vehicle communication,” in IEEE International Conference on Communications, 2010.
[14] D. Sormani et al., “in Inter-Vehicular Networks,” pp. 20–29, 2006.
[15] J. Sanguesa et al., “On the selection of optimal broadcast schemes in VANETs,” Proc. 16th ACM Int. Conf. Model. Anal. Simul. Wirel. Mob. Syst. - MSWiM ’13, pp. 411–418, 2013.
[16] O. K. Tonguz, N. Wisitpongphan, and F. Bai, “DV-CAST: A distributed vehicular broadcast protocol for vehicular ad hoc networks,” IEEE Wirel. Commun., vol. 17, no. 2, pp. 47–57, 2010.
[17] W. Viriyasitavat, O. K. Tonguz, and F. Bai, “UV-CAST: An urban vehicular broadcast protocol,” IEEE Commun. Mag., vol. 49, no. 11, pp. 116–124, 2011.
[18] J. A. Sanguesa, M. Fogue, P. Garrido, F. J. Martinez, J. Cano, and C. T. Calafate, “Using topology and neighbor information to overcome adverse vehicle density conditions,” Transp. Res. PART C, vol. 42, pp. 1–13, 2014.
[19] C. Barros et al., “Document downloaded from : This paper must be cited as : Additional Information CELLULOSE DERIVATE THERMOREVERSIBLE HYDROGEL FILMS,” vol. 22, pp. 1911–1929, 2015.
[20] A. Hoc, M. Hu, Z. Zhong, M. Ni, and A. Baiocchi, “Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination,” vol. C, 2016.
[21] X. Yang, J. Liu, F. Zhao, and N. H. Vaidya, “A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning,” pp. 1–14.
Citation
Towseef Ahmad Wani, Yashwant Singh, "On Message Dissemiaton and Event Detection in VANET", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.42-45, 2018.
Image Steganography using Edge Based Data Hiding in Dct Domain: An Overview
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.46-50, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.4650
Abstract
Steganography is the art of concealing secret information in some given information. Steganography hides the existence of the message unlike cryptography which keeps the contents of message secret. Image steganography is the branch of steganography where secret information is hidden inside an image. There are various techniques of image steganography i.e., spatial domain and frequency domain. In this paper, a review of image steganography techniques is presented using qualitative parameters like robustness, embedding capacity and quantitative parameters like PSNR, SNR, MSE are taken into consideration for analyzing the efficiency of various techniques of image steganography. The study reveals that transform domain techniques are more robust than spatial domain techniques even though are more complex than spatial domain techniques. Furthermore, it is observed that edge based data hiding in DCT domain has more embedding capacity and is more robust than spatial domain techniques.
Key-Words / Index Term
Imagesteganography,DCTdomain,datahiding
References
[1] T. Morkel, M. S. Olivier, and S. Africa, “AN OVERVIEW OF IMAGE STEGANOGRAPHY.”
[2] K. N. Brahmateja, G. L. Madhumati, and K. R. K. Rao, “Data Hiding Using EDGE Based Steganography,” vol. 2, no. 11, pp. 285–290, 2012.
[3] A. A. Attaby, M. F. M. Mursi Ahmed, and A. K. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3,” Ain Shams Eng. J., 2016.
[4] S. A. El Rahman, “algorithm and steganography tool to hide nuclear reactors,” Comput. Electr. Eng., vol. 0, pp. 1–20, 2016.
[5] S. O.Akinola and A. A.Olatidoye, “On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images,” Int. J. Comput. Sci. Inf. Technol., vol. 7, no. 4, pp. 79–91, 2015.
[6] G. T. Shrivakshan and C. Chandrasekar, “A Comparison of various Edge Detection Techniques used in Image Processing,” Int. J. Comput. Sci. Issues, vol. 9, no. 5, pp. 269–276, 2012.
[7] C. H. Shreya Gupta, Akshay Kalra, “A Hybrid Technique for Spatial Image Steganography,” 3rd Int. Conf. onComputing Sustain. Glob. Dev., pp. 643–647, 2016.
[8] S. Islam, M. R. Modi, and P. Gupta, “Edge-based image steganography,” EURASIP J. Inf. Secur., vol. 2014, no. 1, p. 8, 2014.
[9] S. Sharma and U. Kumar, “Review of Transform Domain Techniques for Image Steganography,” Int. J. Sci. Res. ISSN (Online Index Copernicus Value Impact Factor, vol. 4, no. 5, pp. 194–197, 2015.
[10] M. Jain and S. K. Lenka, “A Review of Digital Image Steganography using LSB and LSB Array,” vol. 11, no. 3, pp. 1820–1824, 2016.
[11] A. S. Kelsey and C. M. Akujuobi, “A Discrete Wavelet Transform Approach for Enhanced Security in Image Steganography,” vol. 5, no. 1, pp. 10–20, 2016.
[12] V. R. Kukapalli, B. T. Rao, and B. S. Reddy, “Image Steganography by Enhanced Pixel Indicator Method Using Most Significant Bit ( MSB ) Compare,” vol. 15, no. 3, pp. 97–101, 2014.
[13] T. Johnson et al., “Improved steganography using enhanced k strange points clustering,” Int. J. Appl. Eng. Res., vol. 11, no. 9, pp. 6881–6885, 2016.
[14] G. Singh, “MRI Medical Image and Steganography,” vol. 4, no. 2, pp. 2–5, 2016.
[15] S. Lahiri, P. Paul, S. Banerjee, S. Mitra, A. Mukhopadhyay, and M. Gangopadhyaya, “Image Steganography On Coloured Images Using Edge Based Data Hiding In DCT Domain,” Inf. Technol. Electron. Mob. Commun. Conf. (IEMCON), 2016 IEEE 7th Annu., 2016.
[16] M. Gunjal and J. Jha, “Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm,” Int. J. Comput. Trends Technol., vol. 11, no. 4, pp. 144–150, 2014.
[17] S. Sugathan, “An improved LSB embedding technique for image steganography,” Proc. 2016 2nd Int. Conf. Appl. Theor. Comput. Commun. Technol. iCATccT 2016, no. 4, pp. 609–612, 2017.
[18] B. S. Champakamala, K. Padmini, R. D. K. A. Professors, and D. Bosco, “Least Significant Bit algorithm for image steganography Overview of Steganography,” Int. J. Adv. Comput. Technol., vol. 3, no. 4, p. 5, 2014.
[19] T. Nadu, “Sobel edge detection technique implementation for image steganography analysis .,” pp. 1–7, 2017.
[20] “A Secure Steganography Technique Using MSB,” vol. 9359, no. 6, pp. 208–214, 2017.
[21] Ammad Ul Islam, Faiza Khalid, Mohsin Shah, Zakir Khan , Toqeer Mahmood3, Adnan Khan Usman Ali2, Muhammad Naeem” An Improved Image Steganography Technique based on MSB using Bit Differencing”,IEEE awe 978-1-5090-2000,2016.
Citation
Nadish Ayub, Arvind Selwal, "Image Steganography using Edge Based Data Hiding in Dct Domain: An Overview", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.46-50, 2018.
A Review of Text Summarization using Gated Neural Networks
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.51-55, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.5155
Abstract
There is an enormous amount of information available in the form of documents, articles, links, webpages, etc., which can`t be read completely until effectively summarized. Different procedures are effectively used to separate the imperative information from data to produce summary. This paper gives a brief description of text summarization and deep learning approach called Recurrent Neural Networks (RNNs). Recent advances in Deep RNN methods like Sequence to Sequence, Generative Adversarial Networks, etc. show remarkable results for text summarization. Long Short Term Memory (LSTM) and Gated Recurrent Unit (GRU) networks are discussed to overcome the problem of Vanishing or Exploding Gradient.
Key-Words / Index Term
RNN, Sequence to Sequence, Vanishing gradient, LSTM, GRU, Deep Recurrent Generative Decoder, GANs
References
[1] D.K. Gaikwad, C.N. Mahender, “A Review Paper on Text Summarization”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue. 3, 2016.
[2] R. Nallapati, F. Zhai and B.Zhou, “SummaRuNNer: A Recurrent Neural Network Based Sequence Model for Extractive Summarization of Documents”, In AAAI pp. 3075-3081, February 2017.
[3] V. Gupta and G.S. Lehal, “A survey of text summarization extractive techniques”, Journal of emerging technologies in web intelligence, 2(3), pp.258-268, 2010.
[4] M. Allahyari, S. Pouriyeh, M. Assefi, S. Safaei, E.D.Trippe, J.B. Gutierrez and K. Kochut, “Text summarization techniques: A brief survey”, arXiv preprint arXiv:1707.02268, 2017.
[5] D. Das and A.F. Martins, “A survey on automatic text summarization”, Literature Survey for the Language and Statistics II course at CMU, 4, pp.192-195, 2007.
[6] A.S. Asa, S. Akter, M.P. Uddin, M.D. Hossain, S.K. Roy and M.I. Afjal, “A Comprehensive Survey on Extractive Text Summarization Techniques”, American Journal of Engineering Research, Vol. 6, Issue-1, pp.226-239, 2017.
[7] N. Ramanujam and M. Kaliappan, “An Automatic Multidocument Text Summarization Approach Based on Nave Bayesian Classifier Using Timestamp Strategy”, The Scientific World Journal, 2016.
[8] A. Agrawal and U. Gupta, “Extraction based approach for text summarization using k-means clustering”, Int. J. Sci. Res. Publ.(IJSRP), 4(11), 2014.
[9] A. Nenkova and K. McKeown, “A survey of text summarization techniques”, In Mining text data pp.43-76. Springer, Boston, MA, 2012.
[10] S. Verma and V. Nidhi, “Extractive Summarization using Deep Learning”, arXiv preprint arXiv:1708.04439, 2017.
[11] M. Gambhir and V. Gupta, “Recent automatic text summarization techniques: a survey. Artificial Intelligence Review”, 47(1), pp.1-66, 2017.
[12] K.M. Tarwani and S. Edem, “Survey on Recurrent Neural Network in Natural Language Processing,” International Journal on Emerging Trends in Technology, Vol. 48, 2017
[13] Z.C. Lipton, J. Berkowitz, and C. Elkan, “A critical review of recurrent neural networks for sequence learning”, arXiv preprint arXiv:1506.00019, 2015.
[14] Graves, Alex, Abdel-rahman Mohamed, and Geoffrey Hinton. “Speech recognition with deep recurrent neural networks”, In Acoustics, speech and signal processing (icassp), ieee international conference on, pp.6645-6649. IEEE, 2013.
[15] V. Khomenko, O. Shyshkov, O. Radyvonenko and K. Bokhan, “Accelerating recurrent neural network training using sequence bucketing and multi-GPU data parallelization. In Data Stream Mining & Processing (DSMP)”, IEEE First International Conference on pp.100-103. IEEE, August, 2016.
[16] Yu, Hujia, Chang Yue and Chao Wang, “News Article Summarization with Attention-based Deep Recurrent Neural Networks” Stanford Natural Language Processing Group, Stanford University, pp.2746634, 2016.
[17 Mikolov, Tomáš, Martin Karafiát, Lukáš Burget, Jan Černocký and Sanjeev Khudanpur, “Recurrent neural network based language model", In Eleventh Annual Conference of the International Speech Communication Association, 2010.
[18] Y. Hu, A. Huber, J. Anumula and S.C. Liu, “Overcoming the vanishing gradient problem in plain recurrent networks”, arXiv preprint arXiv:1801.06105, 2018.
[19] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Empirical evaluation of gated recurrent neural networks on sequence modeling”, arXiv preprint arXiv:1412.3555, 2014.
[20] H. Sak, A. Senior and F. Beaufays, “Long short-term memory recurrent neural network architectures for large scale acoustic modeling”, In Fifteenth annual conference of the international speech communication association, 2014.
[21] Sak, Haşim, Andrew Senior, and Françoise Beaufays, “Long short-term memory recurrent neural network architectures for large scale acoustic modeling”, In Fifteenth annual conference of the international speech communication association, 2014.
[22] R. Dey and F.M. Salem, “Gate-variants of gated recurrent unit (GRU) neural networks”, arXiv preprint arXiv, 2017.
[23] S. Hochreiter and J. Schmidhuber, “Long short-term memory”, Neural computation, 9(8), pp.1735-1780, 1997.
[24] C.S. Saranyamol and L. Sindhu, “A survey on automatic text summarization”, Int. J. Comput. Sci. Inf. Technol, 5(6), pp.7889-7893.s, 2014.
[25] A. Graves, M. Liwicki, S. Fernndez, R. Bertolami, H. Bunke and J. Schmidhuber, “A novel connectionist system for unconstrained handwriting recognition”, IEEE transactions on pattern analysis and machine intelligence, 31(5), pp.855-868, 2009.
[26] D.P. Kingma and M. Welling, “Auto-encoding variational bayes”, arXiv preprint arXiv:1312.6114, 2013.
[27] P. Li, W. Lam, L. Bing and Z. Wang, “Deep Recurrent Generative Decoder for Abstractive Text Summarization”, arXiv preprint arXiv:1708.00625, 2017.
[28] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets. In Advances in neural information processing systems”, pp.2672-2680, 2014.
[29] X. Chen, Y. Duan, R. Houthooft, J. Schulman, I. Sutskever and P. Abbeel, “Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In Advances in Neural Information Processing Systems”, pp.2172-2180, 2016.
[30] L. Liu, Y. Lu, M. Yang, Q. Qu, J. Zhu and H. Li, “Generative Adversarial Network for Abstractive Text Summarization”, arXiv preprint arXiv:1711.09357, 2017.
Citation
Touseef Iqbal, Abhishek Singh Sambyal, Devanand, "A Review of Text Summarization using Gated Neural Networks", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.51-55, 2018.