Joint Feature Learning and Clustering Techniques for Clustering High Dimensional Data: A Review
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.54-58, Mar-2016
Abstract
In many real world applications, we often face high dimensional data. Developing efficient clustering methods for high dimensional datasets may be a challenging problem because of the curse of dimensionality. Common method to deal with this is to use first dimensionality reduction approach and then cluster the data in the lower dimensions. Even though we can initially reduce the dimensionality by any approach and then use clustering approaches to group high dimensional data, performance can also be improved since these two techniques are conducted in sequence. Naturally, if we consider the requirement of clustering during the process of dimensionality reduction and vice versus then the performance of clustering can be improved. This paper presents a review of different techniques for clustering high dimensional data by joint feature learning and clustering.
Key-Words / Index Term
Clustering, high dimensional data, feature learning, dimensionality reduction
References
[1] J. Han and M. Kamber, “Data Mining: Concepts and Techniques”, Second Edition. Morgan Kaufmann, 2006.
[2] C. Ding, X. He, H. Zha, and H. D. Simon, “Adaptive dimension reduction for clustering high dimensional data,” in Proc. ICDM, Page No (147–154), 2002.
[3] C. Ding and T. Li, “Adaptive dimension reduction using discriminant analysis and K-means clustering”, in Proc., Page No (521–528), ICML, 2007.
[4] F. De La Torre and T. Kanade, “Discriminative cluster analysis”, in Proc. ICML, Page No (241–248), 2006.
[5] J. Ye, Z. Zhao, and M. Wu, “Discriminative K-means for clustering”, in Advances in Neural Information Proc. Systems. Cambridge, MA, USA: MIT Press, 2007.
[6] T. Li, S. Ma, and M. Ogihara, “Document clustering via adaptive subspace iteration”, 27th Annual. Int. ACM SIGIR Conf. Rese. Develop. Inform. Retri., Page No (218–225), Jul. 2004.
[7] Chenping Ho, Feiping Nie, Dongyun Yi, and Dacheng Tao, “Discriminative Embedded Clustering: A Framework for Grouping High-Dimensional Data”, IEEE Trans. Neural Network. Learn. Syst., Volume- 26, no. 6, Page No (1287-1299), June 2015.
[8] J. Shi and J. Malik, “Normalized cuts and image segmentation”, IEEE Transaction. Pattern Anal. Mach. Intell., Volume-22, no. 8, Page No (888–905), Aug. 2000.
[9] Duda R. O., Hart P. E., and Stork D. G., “Pattern Classification”, 2nd edition, New York, NY, USA: Wiley, 2000.
[10] L. Parsons, E. Haque, and H. Liu, “Subspace clustering for high dimensional data: A review”, ACM SIGKDD Explorations Newslett., Volume-6, no. 1, Page No (90–105), 2004.
[11] Jolliffe, I. “Principal component analysis”, Springer. Second Edition, 2002.
[12] Dasgupta S. Experiments with random projection. Proc. 16th Conf. Uncertainty in Artificial Intelligence (UAI 2000).
[13] J. Ye, Z. Zhao, and H. Liu, “Adaptive distance metric learning for clustering”, in Proc. IEEE CVPR, Page No (1–7), Jun. 2007.
[14] D. Niu, J. G. Dy, and M. I. Jordan, “Dimensionality reduction for spectral clustering”, in Proc. Int. Conf. Artif. Intell. Statist, Volume-15., Page No (552–560), 2011.
[15] Q. Gu and J. Zhou, “Subspace maximum margin clustering,” in Proc. CIKM, Page No (1337–1346), Nov. 2009.
[16] C. Domeniconi, D. Papadopoulos, D. Gunopulos, and S. Ma, “Subspace clustering of high dimensional data”, in Proc. SIAM Int. Conf. Data Mining (SDM), Page No (517–521), Apr. 2004.
[17] D. Wang, F. Nie, and H. Huang, “Unsupervised feature selection via unified trace ratio formulation and K-means clustering (track),” in Proc. Eur. Conf. Mach. Learn. Principles Pract. Knowl. Discovery Databases (ECML PKDD), Nancy, France, 2014.
[18] C. Hou, C. Zhang, F. Nie and Y. Wu, “Learning a subspace for face image clustering via trace ratio criterion”, Opt. Eng., Volume-48, no. 6, p. 060501, 2009.
[19] T. Li, S. Ma, and M. Ogihara, “Document clustering via adaptive subspace iteration,” in Proc. 27th Annu. Int. ACM SIGIR Conf. Res. Develop. Inform. Retr., Page No (218–225), Jul. 2004.
[20] R. W. Sembiring, S. Sembiring, and J. M. Zain, “An efficient dimensional reduction method for data clustering”, Bull. Math., Volume-4, no. 1, Page No (43–58), 2012.
[21] G. Golub and C. Van Loan, “Matrix Computations”, Third Edition, Johns Hopkins, Baltimore, 1996.
[22] L. Vandenberghe and S. Boyd. “Semidefinite programming”, SIAM Review, 38:49–95, 1996.
Citation
Ghatage Trupti B., Patil Deepali E., Takmare Sachin B., Patil Sushama A., "Joint Feature Learning and Clustering Techniques for Clustering High Dimensional Data: A Review," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.54-58, 2016.
A Review on Duplicate and Near Duplicate Documents Detection Technique
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.59-62, Mar-2016
Abstract
Duplicated web pages in consist of identical structure but regarded as clones regarded as clones different data. The identification of similar and near-duplicate pairs in a large collection is a significant the problem with the twide-spread application. The problem deliberated for diverse data types in diverse settings. The contemporary materialization is efficient of the problem identification of the near duplicate Web pages. This is challenging in the web scale to the voluminous data and the high dimensionalities of documents. This review has a fundamental intention to present an up-to-date review of the existing of literature in duplicate and near duplicate detection of general documents and web documents in web crawling. The classification of the existing literature in duplicate and the near duplicate detection techniques and a detailed description of same are the presented so as to make the review more comprehensible.
Key-Words / Index Term
Web crawling, web pages, web mining, web content mining, and duplicate document, near duplicate detection
References
[1] Andrei Z. Broder., "Identifying and Filtering Near-Duplicate Documents", Proceedings of the 11th Annual Symposium on Combinatorial Pattern Matching. UK: Springer-Verlag, pp. 1-10, 2000.
[2] Broder, A., Glassman, S., Manasse, M., and Zweig, G., “Syntactic Clustering of the Web”, In 6th International World Wide Web Conference, pp: 393-404, 1997.
[3] Bernstein, Y., Shokouhi, M., and Zobel, J., "Compact Features for Detection of Near- Duplicates in Distributed Retrieval", in 'Proceedings of String Processing and Information Retrieval Symposium (to appear)', Glasgow, Schotland, 2006.
[4] Charikar, M.,“Similarity estimation techniques from rounding algorithms”, In Proc. 34th Annual Symposium on Theory of Computing (STOC 2002), pp. 380-388, 2002.
[5] Chowdhury, A., Frieder, O., Grossman, D., and Catherine Mccabe, M., “Collection Statistics for Fast Duplicate Document Detection", In. ACM Transactions on Information Systems (TOIS), Vol. 20, No. 2, 2002.
[6] Deng, F., Rafiei, D., "Approximately detecting duplicates for streaming data using stable bloom filters" ,Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 25-36, 2006.
[7] Deng, F., Rafiei, D., "Estimating the Number of Near Duplicate Document Pairs for Massive Data Sets using Small Space", University of Alberta, Canada, 2007.
[8] Manku, G. S., Jain, A., Sarma, A. D., "Detecting near-duplicates for web crawling", Proceedings of the 16th international conference on World Wide Web, pp: 141 – 150, 2007.
[9] Udi Manber., "Finding Similar Files In A Large File System", Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference, San Francisco, California, pp. 2-2, 1994.
[10] Ye, S., Wen, J., R., and Ma, W.Y., "A systematic study of parameter correlations in large scale duplicate document detection", Text and Document Mining, 10th Pacific-Asia Conference, PAKDD 2006, Singapore, April 9-12, pp. 275-284, 2006.
Citation
Patil Deepali E., Ghatage Trupti B., Takmare Sachin B., Patil Sushama A., "A Review on Duplicate and Near Duplicate Documents Detection Technique," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.59-62, 2016.
Survey on Network Lifetime Enhancement Method
Survey Paper | Journal Paper
Vol.4 , Issue.3 , pp.63-66, Mar-2016
Abstract
A vital challenge in the design of Wireless Sensor Network is to improve the network lifetime. Wireless Sensor nodes convey limited essential power source. In single static sink node based wireless sensor network, a sensor node spends the most of its energy for relaying data packets particularly which are situated in the surrounding area of the sink node. They distribute their energy so fast because of numerous to one traffic pattern and finally they die. This uneven depletion phenomenon is known as hot spot issue which gets to be more genuine as the number of sensor nodes increase. Replacing these energy sources in the field is normally not feasible. So if the distance between a sensor node and sink node is reduced which leads to decrease in energy utilization. This paper provides asurvey on various methods which are developed to increase the lifetime of a network. The sensor nodes close to the sink will generally consume more battery power than others; thus, these nodes will rapidly drain out their battery energy and shorten the network lifetime of the WSN. Sink relocation is an effective network lifetime augmentation technique, which avoids consuming an excess of battery energy for a particular gathering of sensor nodes. In this paper, propose a moving methodology called energy-aware sink relocation (EASR) for mobile sinks in WSNs. The proposed system utilizes data identified with the residual battery energy of sensor nodes to adaptively conform the transmission range of sensor nodes and the relocating scheme for the sink.
Key-Words / Index Term
Energy consumption, energy efficient routing, network lifetime, Wireless sensor network, mobile sink, sink relocation
References
[1] G. S. Sara and D. Sridharan, “Routingin mobile wireless sensor network: A survey,” Telecommun. Syst., Aug. 2013.
[2] A.A. Somasundara, A. Kansal, D. D. Jea, D. Estrin, and M. B. Srivastavam, “Controllably mobile infrastructure for low energy embedded networks,” IEEE Trans. Mobile Comput., vol. 5, no. 8, pp. 958–973, Aug. 2006.
[3] H. Mousavi, A. Nayyeri, N. Yazani, and C. Lucas, “Energy conserving movement-assisted deployment of ad hoc sensor networks,” IEEE Commun. Lett., vol. 10, no. 4, pp. 269–271, Apr. 2006.
[4] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayiric, “Wireless sensor networks: A survey,” Comput. Netw., vol. 38, no. 4, pp. 393–422, Mar. 2002.
[5] N. Jain and D. P. Agrawal, “Current trends in wireless sensor network design,” Int. J. Distrib. Sensor Netw., vol. 1, no. 1, pp. 101–122, 2005.
[6] D. Tian and N. D. Georganas, “A node scheduling scheme for energy conservation in large wireless sensor networks,” Wireless Commun. Mobile Comput., vol. 3, no. 2, pp. 271–290, Mar. 2003.
[7] X. Hong, M. Gerla, W. Hanbiao, and L. Clare, “Load balanced, energyaware communications for Mars sensor networks,” in Proc. IEEE Aerosp. Conf., vol. 3. May 2002, pp. 1109–1115.
[8] S. C. Huang and R. H. Jan, “Energy-aware, load balanced routing schemes for sensor networks,” in Proc. 10th Int. Conf. Parallel Distrib. Syst., Jul. 2004, pp. 419–425.
[9] R. C. Shah and J. Rabaey, “Energy aware routing for low energy ad hoc sensor networks,” in Proc. IEEE Wireless Commun. Netw. Conf., vol. 1. Mar. 2002, pp. 350–355.
[10] G. L. Wang, G. H. Cao, and T. L. Porta, “Movement-assisted sensor deployment,” in Proc. IEEE Inf. Commun. Conf., Aug. 2004, pp. 2469–2479.
[11] Chu-Fu Wang, Jau-Der Shih, Bo-Han Pan, and Tin-Yu Wu, “A Network Lifetime Enhancement Method for Sink Relocation and Its Analysis in Wireless Sensor Networks”, ieee sensorsjournal, vol. 14, no. 6, june 2014.
Citation
Abdul Jawad1 and P. B. Mali, "Survey on Network Lifetime Enhancement Method," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.63-66, 2016.
Design and Development of Fuzzy Text Parser for Querying Hardware and Software Information in a Local Area Network
Research Paper | Journal Paper
Vol.4 , Issue.3 , pp.67-76, Mar-2016
Abstract
Every educational organization from medium size to large size hosts Local Area Network (LAN) equipped with machines of different brands with disparate softwares installed on each of them and connected to different hardware devices. It becomes extremely challenging for the lab technician to keep track of hardware and software configuration details of LAN and their working condition. On many occasions the softwares which are rarely used are installed only on few machines of LAN. Thus, for an end user it becomes difficult to search softwares by virtually attending every machine connected to LAN. In the current paper, the authors have designed and developed a model for obtaining information of all computers connected to a workgroup or a domain controller. The hardware and software information on each machine is queried and stored in a centralized relational database management system. The stored information can be queried using Hardware Query Language (HQL) and Software Query Language (SOQL) designed by the authors. Further, to render the queries more user friendly and close to human language fuzzy text parser is designed and implemented which takes care of synonyms and superfluous words with implied meaning into account. The parse tree is developed and parser is tested for few HQL statements.
Key-Words / Index Term
Domain Controller, Human Computer Interface, MySQL, Parse Tree, Synonyms, Workgroup.
References
[1]. Klein and C. D. Manning. Natural language grammar induction using a constituent-context model. In Advances in Neural Information Processing Systems (NIPS 14), pages 35–42, 2002.
[2]. Kudo and Y. Matsumoto. Chunking with support vector machines. In Conference of the North American Chapter of the Association for Computational Linguistics & Human Language Technologies (NAACL-HLT), pages 1–8, 2001.
[3]. Mnih and G. E. Hinton. Three new graphical models for statistical language modeling, International Conference on Machine Learning (ICML), pages 641–648, 2007.
[4]. Ronan Collobert, JasonWeston, L´eon Bottou, Michael Karlen , Koray Kavukcuoglu, Pavel Kuksa, Natural Language Processing (Almost) from Scratch, Journal of Machine Learning Research 12 , pages 2493-2537, 2011.
[5]. Saif Mohammad, Bonnie Dorr, and Graeme Hirst, Computing word-pair antonymy. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, , Honolulu, HI. ACL, pages 982–991, 2008.
[6]. Stanley Kok and Pedro Domingos, Extracting semantic networks from text via relational clustering. In Proceedings of the Nineteenth European Conference on Machine Learning, Antwerp, Belgium. Springer, pages 624–639, 2008.
[7]. Booth, Taylor L. & Richard A. Thompson ,Applying probability measures to abstract languages. IEEE Transactions on Computers C-22.5, pages 442–450, 1973.
[8]. Bod, Rens, Beyond Grammar, CSLI Publications, University of Chicago Press, 1998.
[9]. Xiaoguang Yue, , Guangzhi Di, Yueyun Yu, Wei Wang, Huankai Shi, Analysis of the Combination of Natural Language Processing and Search Engine Technology, Procedia Engineering, Volume 29, International Workshop on Information and Electronics Engineering, pages 1636–1639, 2012
[10]. A Subcategory-based Parser Directed to Generating Representations for Text Understanding, Yukiko Sasaki Alam, Procedia - Social and Behavioral Sciences, Volume 27, Pages 194–201, 2011.
[11]. Joakim Nivre, Two Strategies for Text Parsing, CSLI Publications, University of Chicago Press
[12]. Peter R. J. Asveld. Fuzzy context-free languages – Part 2: Recognition and parsing algorithms. Theoretical computer science, 347(1):191–213, 2005.
[13]. Rainer Koppler. A systematic approach to fuzzy parsing. Software Practice and Experience, 27:649, 1996
[14]. Kang , Soon Ju, Kwon , Yong Rae, A Tightly Coupled Approach to Fuzzy Syntactic Parsing and Neural Networks for Event-Synchronous Signal Inspection, Journal of Intelligent and Fuzzy Systems, vol. 3, No. 3, pages 215-227, 1995.
Citation
Poornima G. Naik and Kavita S.Oza , "Design and Development of Fuzzy Text Parser for Querying Hardware and Software Information in a Local Area Network," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.67-76, 2016.
A Survey on Energy Efficient Routing Protocols in WSN
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.77-81, Mar-2016
Abstract
Wireless Sensor Networks (WSNs) consist of large number of tiny, battery powered sensor nodes with sensing, computation, and wireless communications technologies. These Nodes sense and send their reports towards a centralized node which is called ―sink or base station. This transmission and reception process consumes lots of energy as compared to data processing, all sensor nodes are processed by limited capacity battery resources which are difficult to replace or recharge due to the unsuitable nature of located nodes. Therefore, to increase the life time of the nodes in WSN, the designing of energy aware routing protocol is vital role in WSN to increase the life time of the sensor nodes. An Energy Efficient Routing is a significant issue in the designing of Wireless Sensor Network (WSN) protocols. This paper presents the list of various type of energy efficient routing protocols have been studied having classified them into proper categories.
Key-Words / Index Term
WSN; EER; LEACH; PEGASIS and DREAM
References
[1] Akyildiz LF, Su W, Sankarasubramaniam Y, Cayirci E. ―A survey on sensor networks. IEEE Communications Magazine, 40(8): 102~114.Vol.25, No.4, 2002, 114-124.
[2] S.Ranjitha and D. Prabakar and S. Karthik, "A Study on Security issues in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-09, Page No (50-53), Sep -2015,
[3] W. R. Heinzelman, A .Chandrakasan, and H. Balakrishnan., Energy-Efficient Communication Protocol for Wireless Microsensor Networks. IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7
[4] L. T. Nguyen, X. Defago, R. Beuran, Y. Shinoda., An Energy Efficient Routing Scheme for Mobile Wireless Sensor Networks IEEE ISWCS 2008
[5] H. Abusaimeh, S-H Yang., Dynamic Cluster Head for Lifetime Efficiency in WSN International Journal of Automation and Computing 06(1), February 2009, 48-54, 2009 SPRINGER.
[6] S. Lindsey, C. Raghavendra,"PEGASIS: Power-Efficient Gathering in Sensor Information Systems," IEEE Aerospace Conference Proceedings, 2002, Vol.3. No. 9-16, pp. 1125 1130.
[7] Neha Gupta and Balraj S. Sidhu, "Cost Based Energy Efficient Routing Algorithm for Wireless Body Area Networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-08, Page No (1-5), Aug -2015.
[8] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, "Negotiation-based protocols for disseminating information in wireless sensor networks," Wireless Networks, Volume: 8, pp. 169-185, 2002.
[9] S. Basagni and et. al. A Distance Routing Effect Algorithm for Mobility (DREAM). In ACM/IEEE Int. Conf. on Mobile Computing and Networking ( MobiCom'98), October 1998.
[10] W. Heinzelman, A. Chandrakasan and H. Balakrishnan “Energyefficient communication protocol for wireless microsensor networks”, in Proceedings of the 33rd Hawaii International Conference on System Sciences , Vol. 2, 2000.
[11] E.Kranakis, H.Singh and J.Urrutis. “Compass routing on geometric networks. In proc. 11th Canadian conference on Computational Geometry”, Pages 51- 54, Vancouver, August 1999.
[12] M. Younis, M. Youssef and K. Arisha, “Energy-Aware Routing in Cluster-Based SensorNetworks”, in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort Worth, TX, October 2002.
[13] Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan. “Energy-Efficient Communication Protocol for Wireless Micro sensor Networks”, 33rd Hawaii International Conference on System Sciences, 2000.
[14] Niharika Singh Matharu and Avtar Singh Buttar, "An Efficient Approach for Localization using Trilateration Algorithm based on Received Signal Strength in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-03, Issue-08, Page No (11-16), Aug -2015
Citation
A. Hemalatha and D. Sasirekha, "A Survey on Energy Efficient Routing Protocols in WSN," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.77-81, 2016.
Hybrid Intrusion Detection System Using K-Means Algorithm
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.82-85, Mar-2016
Abstract
Today in the age of computers and internet, identity theft, data theft, privacy and confidentiality infringement are some of the major issues faced by organizations as well as individuals. Network and System Security can be provided with the help of firewalls and Intrusion Detection Systems. An Intrusion Detection System (IDS) investigates all incoming and outgoing network traffic to identify malicious behavior that may pose a threat to the confidentiality, integrity or availability of a network or a system. IDS can be signature-detection (misuse) based or anomaly detection based. Misuse detection technique can be used to detect only known attacks whereas anomaly detection can be used to detect novel attacks (Unknown Attacks).This paper focuses on Hybrid Intrusion Detection System which combines both Misuse and Anomaly Detection modules. Various data mining techniques have been developed and implemented to be used with Intrusion Detection Systems. We use K-Means Clustering Algorithm to cluster and classify the incoming data into normal and anomalous connections. Clustering is an unsupervised learning technique for finding patterns in collection of unsupervised data. Prototype testing shows that K-Means algorithm can be successfully used to detect unknown attacks in real live data.
Key-Words / Index Term
K-Means, Intrusion Detection system, Data Mining, Clustering
References
[1] M. Jianliang, S. Haikun and B. Ling, "The Application on Intrusion Detection Based on K-means Cluster Algorithm," Information Technology and Applications, 2009. IFITA '09. International Forum on, Chengdu, 2009, pp. 150-152. Doi: 10.1109/IFITA.2009.34
[2] Ms. Urvashi Modi, Prof. Anurag Jain. A survey of IDS classification using KDD CUP 99 dataset in WEKA, International Journal of Scientific & Engineering Research, Volume 6, Issue 11, November-2015
[3] L.Dhanabal, Dr. S.P. Shantharajah. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms. International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2015
[4] N. T. Tran, S. Tomiyama, S. Kittitornkun and Tran Huy Vu, "TCP reassembly for signature-based Network Intrusion Detection systems," EEE, Computer, Telecommunications and Information Technology (ECTI-CON), 2012 9th International Conference on, Phetchaburi, 2012, pp. 1-4. doi: 10.1109/ECTICon.2012.6254336.
[5] Monowar Hussain Bhuyan, D K Bhattacharyya and J K Kalita. Survey on Incremental Approaches for Network Anomaly Detection. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3, No. 3, December 2011
[6] Sachin Baghel, Prof. Anurag Jain, Dr. J. L. Rana. A Review of Various Intrusion Detection Techniques on KDD Cup99 Dataset. International Journal of Emerging Technology and Advanced Engineering Volume 5, Issue 8, August 2015
[7] Nguyen Ha Duong, Hoang Dang Hai. A Model for Network TrafficAnomaly Detection. ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 4, July 2015.
[8] H. Günes Kayacık, A. Nur Zincir-Heywood, Malcolm I. Heywood. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets. DOI: 17.01.16
https://web.cs.dal.ca/~zincir/bildiri/pst05-gnm.pdf
Citation
Darshan K. Dagly, Rohan V. Gori, Rohan R. Kamath and Deepak H. Sharma, "Hybrid Intrusion Detection System Using K-Means Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.82-85, 2016.
A Novel Technique to Isolate and Detect Jamming Attack in MANET
Research Paper | Journal Paper
Vol.4 , Issue.3 , pp.86-90, Mar-2016
Abstract
MANET is infrastructure less, decentralized multi hope network where the nodes are randomly to move in any direction, there each node works as a router and host to send packet to each other, there is no any requirement of fixed infrastructure. There are many security threats in MANET. Various types of attacks can be easily triggered in the network. So MANET has a security issue. In this paper we have discussed about Jamming attack in AODV protocol. Due to this attack network performances degrade. Therefore a novel technique has been proposed to detect and isolate jamming attack in the network using monitoring nodes.
Key-Words / Index Term
MANET, Attacks, Grayhole, Throughput, ZRP, internal attacks
References
[1] Ali Hamieh, Jalel Ben-Othman, “Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution”, IEEE, 2009
[2] Ashish K. Maurya, D. S. (Nov,2013). "Simulation based Performance Comparison of AODV, FSR and ZRP Routing Protocolin Manet". IJCA , 23-28.
[3] Awadesh Kumar, P. S. (July,2013). ''Performance Anaysis Of AODV ,CBRP,DSDV and DSR MANET Routing Protocols using NS2 sIMULATION''. I.J Computer Network and Information Security , 45-50.
[4] Meenakshi Jamgade and Vimal Shukla , "Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (145-150), Feb -2016.
[5] Divangna Gupta, R. K. (aug,2014). Simulationof Different Routing Protocols in MANET Using NS2. International journal of Scientific and Research Publication , 1-5.
[6] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks” ,Springer ,2006
[7] Smita Das, "Routing table of DSDV in Mobile Ad-hoc Networking", International Journal of Computer Sciences and Engineering, Volume-03, Issue-10, Page No (48-51), Oct -2015, E-ISSN: 2347-2693.
[8] M Ravi Kumar, D. G. (2013). ''Performance Evaluation of AODV and FSR Routing Protocol in MANET. GJCST , 1-7.
[9] Onkar V.Chandure, A. P. (NOV,2012). Simlation of secure AODVin Gray-hole Attack for Mobile ad-hoc Network. IJAET , 67-75.
[10] Onkar V.Chandure, P. (2011). ''A Mechanism for Recognition & Eradication of Gray Hole Attack using AODV Routing protocol in MANET''. IJCSIT , 2607-2611.
[11] Preeti Gharwar, M. S. (April,2013). "Performance Comparison Of Routing Protocols''. IJARCCE , 1920-1924.
[12] Rutvij H. Jhaveri, D. C. (2012). ''A Novel Gray Hole and Black Hole Attacks in Mobile Ad-Hoc Networks''. International Conference on Advanced Computing& Communicaion Technologies'' , 556-560.
[13] Virali Girdhar and Gaurav Banga, "A Comparative Analysis of Different Movement Models in MANET", International Journal of Computer Sciences and Engineering, Volume-03, Issue-06, Page No (9-13), Jun -2015
[14] S onam Gupta and Rekha Sharma,” A QoS Based Simulation Approach of Zone Routing Protocol in Wireless Ad-hoc Networks ”, International Journal of Computer Sciences and Engineering, Volume 2, issue 7, P.No 24-30, 2014
Citation
Harkiranpreet Kaur and Rasneet Kaur, "A Novel Technique to Isolate and Detect Jamming Attack in MANET," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.86-90, 2016.
Review of Content Based Image Retrieval Using Low Level Features
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.91-97, Mar-2016
Abstract
Content based image retrieval is a important research area in the field of image processing used for searching and retrieving images from large database. It uses virtual content of images comprises of low level feature extraction such as color, texture, shape & spatial locations to represent images in the database. The system retrieves similar images images when an example image or sketch is presented as input to the system. This paper provides review of the approaches used for extracting low level features, various distance measures for retrieval, various datasets used in CBIR & performance measures. Creation of a content-based image retrieval system implies solving a number of difficult problems, including analysis of low-level image features and construction of feature vectors, multidimensional indexing, design of user interface, and data visualization. Quality of a retrieval system depends, first of all, on the feature vectors used, which describe image content. The paper presents a survey of common feature extraction and representation techniques and metrics of the corresponding feature spaces. Color, texture, and shape features are considered.
Key-Words / Index Term
Content based image retrieval (CBIR), Image retrieval, and feature extraction
References
[1] T. Gevers, Color in image Database, Intelligent Sensory Information Systems, University of Amsterdam, the Netherlands. 1998.
[2] X. Wan and C. C. Kuo, “Color distribution analysis and quantization for image retrieval”, In SPIE Storage and Retrieval for Image and Video Databases IV, Vol. SPIE 2670, pp. 9–16. 1996.
[3] M. W. Ying and Z. HongJiang, “Benchmarking of image feature for content-based retrieval”, IEEE. pp.253-257, 1998.
[4] Z. Zhenhua, L. Wenhui and L. Bo, “An Improving Technique of Color Histogram in Segmentation based Image Retrieval”, 2009 Fifth International Conference on Information Assurance and Security, IEEE, pp. 381-384, 2009.
[5] L. Haldurai and V. Vinodhini, "Parallel Indexing on Color and Texture Feature Extraction using R-Tree for Content Based Image Retrieval", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (11-15), Nov -2015
[6] S. Manimala and K. Hemachandran, “Performance analysis of Color Spaces in Image Retrieval”, Assam University Journal of science & Technology, Vol. 7 Number II pp. 94-104, 2011.
[7] J.R. Smith and S. Chang, “Transform Features for Texture Classification and Discrimination in Large Image Databases. Proceeding”, IEEE International Conference on Image Processing, Vol. 3, pp.407-411, 1994.
[8] B. Manjunath, P. Wu, S. Newsam and H. Shin, “A texture descriptor for browsing and similarity retrieval”, Journal of Signal Processing: Image Communication, vol. 16, pp. 33-43, 2000.
[9] H. Tamura, S. Mori and T. Yamawaki, “Textural features corresponding to visual perception”, IEEE Transactions. On Systems, Man and Cybern., Vol. 8, pp- 460-472, 1978.
[10] M. Ioka, “A Method of defining the similarity of images on the basis of color information”, Technical Report IBM Research, Tokyo Research Laboratory, 1989.
[11] H. James. H, S. Harpreet, W. Equits, M. Flickner and W. Niblack, “Efficient Color Histogram Indexing for Quadratic Form Distance Functions”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 17, No. 7, 1995.
[12] J.R. Smith and S.F. Chang, “Automated Image Retrieval using Color and Texture”, Technical Report, Columbia University, 1995.
[13] V. V. Kumar, N. G. Rao, A. L. N. Rao and V. V. Krishna, “IHBM: Integrated Histogram Bin Matching For Similarity Measures of Color Image Retrieval”, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 2, No.3, 2009.
[14] M. Swain, D. Ballard, “Color indexing”, International Journal of Computer Vision, Vol 7, pp-11–32, 1991.
Citation
Shraddha S.Katariya and Ulhas B.Shinde, "Review of Content Based Image Retrieval Using Low Level Features," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.91-97, 2016.
English Grammar Checker
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.98-100, Mar-2016
Abstract
Language is the prime means of communication used by the individuals. It is the tool everyone uses to express the greater part of ideas and emotions. The usually poor quality of grammar leaves a bad impression on the reader. Therefore, there is a need for grammar checkers. We propose a grammar checking system by means of �Syntax Analysis�. Syntax refers to the arrangement of words in a sentence and their relation with each other. The objective of syntactic analysis is to find syntactic structure of a grammar of a natural language. Natural language processing is an area of computer science and linguistics, concerned with the dealings amongst computers and human languages. It processes the data through lexical analysis, Syntax analysis and Semantic analysis. This paper gives various parsing methods. The algorithm specified in the paper splits the English sentences into parts using POS tagger and then parses these sentences using grammar rules of Natural language.
Key-Words / Index Term
Natural Language Processing, Context-Free-Grammar, CYK Algorithm, Part-of-Speech Tagging, Syntax Parsing
References
[1] Earley Parser, https://en.wikipedia.org/wiki/Earley_parser, 27/11/2015
[2] The Earley Parsing Algorithm, http://demo.clab.cs.cmu.edu/fa2014-11711/images/a/a6/Earley-Parsing.pdf , 27/11/2015
[3] Kinoshita, J.; Salvador, L.N.; Menezes, C.E.D.; Silva, W.D.C., "CoGrOO - An OpenOffice Grammar Checker," in Intelligent Systems Design and Applications, 2007. ISDA 2007. Seventh International Conference on , vol., no., pp.525-530, 20-24Oct.2007 doi: 10.1109/ISDA.2007.145
[4] Jaiswal, U.C.; Kumar, R.; Chandra, S., "A Structure Based Computer Grammar to Understand Compound-Complex, Multiple-Compound and Multiple-Complex English Sentences," in Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT `09. International Conference on , vol., no., pp.746-751, 28-29Dec.2009 doi:10.1109/ACT.2009.189
[5] Lee, J.; Seneff, S., "An analysis of grammatical errors in non-native speech in English," in Spoken Language Technology Workshop, 2008. SLT 2008. IEEE , vol.,no.,pp.89-92,15-19Dec.2008 doi:10.1109/SLT.2008.4777847
[6] Brian Roark (Oregon Health & Science University), Kristy Hollingshead (University of Maryland), Nathan Bodenstab (Oregon Health & Science University), �Finite-State Chart Constraints for Reduced Complexity Context-Free Parsing Pipelines�, in Journal: Computational Linguistics, Volume 38 Issue 4, December 2012, Pages 719-753 , doi:10.1162/COLI_a_00109
[7] The CYK Algorithm, https://www.cs.wmich.edu/~elise/courses/cs6800/CYK-Algorithm.ppt, 16/11/2015
[8] Earley parser.pdf - Computer Science and Engineering, www.cse.unt.edu/~tarau/teaching/NLP/Earley%20parser.pdf, 16/12/2015
[9] M. A. Tayal, M. M. Raghuwanshi and L. Malik, "Syntax Parsing: Implementation Using Grammar-Rules for English Language," Electronic Systems, Signal Processing and Computing Technologies
(ICESC), 2014 International Conference on, Nagpur, 2014, pp. 376-381. doi: 10.1109/ICESC.2014.71
Citation
Pratik Ghosalkar, Sarvesh Malagi, Vatsal Nagda, Yash Mehta, Pallavi Kulkarni, "English Grammar Checker," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.98-100, 2016.
A Study Analysis And Survey of Different Performance Testing Tools Used For Cloud Applications
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.101-105, Mar-2016
Abstract
Cloud Computing has evolved as an effective solution for client and business application advancement. It deals with large number of different types of resources. So in order to deliver these cloud facilities and services effectively, testing of the cloud based services turns out to be an essential step before its usage by the clients. For testing cloud applications there are various tools and methods. In this paper we analyze the use of various performance testing tools used in cloud environment and the correlation of the same for testing of cloud applications. Also we had gathered the expert reviews about the tools with the assistance of a review on survey monkey website over a time of one week. A sum of 20 working professionals had demonstrated enthusiasm for our overview that incorporates cloud professionals working in different Information Technology sector. The outcomes depict the tools which are most widely used by the cloud professionals.
Key-Words / Index Term
Cloud Computing; Cloud Testing; Software Testing; Performance Testing; Cloud Application; Benchmarks
References
[1] Nachiyappan, S., & Justus, S., "Cloud Testing Tools and its Challenges: A Comparative Study", Procedia Computer Science, 50, 2015, 482-489.
[2] Reshma D. Abhang and B. B. Gite,"Testing Methods and Tools in a Cloud Computing Environment", International Journal of Engineering Research & Technology, Volume-03, Issue-11 November 2014.
[3] Kiran prajapati, Jaytrilok choudhary, "A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data", International Journal of Computer Sciences and Engineering, Volume-03, Issue-05, Page No (1-6), May -2015
[4] Ali Mohsenzadeh, "Cloud Computing Testing Evaluation", International Journal of Computational Engineering & Management, Volume-16, Issue-06, November 2013.
[5] Bai, X., Li, M., Chen, B., Tsai, W., & Gao, J., "Cloud testing tools", Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE).
[6] Brataas, G., Stav, E., Lehrig, S., Becker, S., KopÄak, G., & Huljenic, D., "CloudScale", Proceedings of the ACM/SPEC International Conference on International Conference on Performance Engineering - ICPE 2013.
[7] T. Kavitha and P. Nageswara Rao , "Loss Less and Privacy Preserved Data Retrieval in Cloud Environment Using TRSE", International Journal of Computer Sciences and Engineering, Volume-03, Issue-07, Page No (81-84), Jul -2015
[8] Chen, X., & Knottenbelt, W., "A Performance Tree-based Monitoring Platform for Clouds", Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering - ICPE 2015.
[9] Franceschelli, D., Ardagna, D., Ciavotta, M., & Nitto, E. D., "Space4Cloud", Proceedings of the 2013 International Workshop on Multi-cloud Applications and Federated Clouds - MultiCloud 2013.
[10] Gao, J., Bai, X., Tsai, W. T., & Uehara, T., "SaaS Testing on Clouds - Issues, Challenges and Needs", IEEE Seventh International Symposium on Service-Oriented System Engineering, 2013.
[11] Lynch, M., Cerqueus, T., & Thorpe, C.,"Testing a cloud application: IBM SmartCloud inotes: Methodologies and tools", Proceedings of the 2013 International Workshop on Testing the Cloud - TTC 2013.
[12] Mao, B., Jiang, H., Wu, S., & Tian, L., "Leveraging data deduplication to improve the performance of primary storage systems in the cloud", Proceedings of the 4th Annual Symposium on Cloud Computing - SOCC 2013.
[13] Moyo, T., & Bhogal, J. (2014), "Investigating Security Issues in Cloud Computing", Eighth International Conference on Complex, Intelligent and Software Intensive Systems, 2014.
[14] P., Chana, I., & Rana, A.,"Empirical evaluation of cloud-based testing techniques", SIGSOFT Softw. Eng. Notes ACM SIGSOFT
Citation
Anuj Pandit, Pritam Shaha, Sanket Bhambure, and Prof. Manjula R, "A Study Analysis And Survey of Different Performance Testing Tools Used For Cloud Applications," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.101-105, 2016.