Predictive Approach for Energy Efficient Computation Offloading In Mobile Cloud Computing
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.62-67, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.6267
Abstract
Mobile Cloud is providing facilities of storage and remote application hosting. Several mobile applications are too computation intensive so power consumption issue is critical problem in mobile devices. Offloading feature in mobile cloud computing reduced power consumption issues of mobile devices. Existing research works have either used fixed mobile device speed or does not consider mobile device speed in estimation of local execution energy. Speed of mobile device plays a significant role in determination of local execution energy and it is affected by parallel running applications and clock frequency of mobile device. Because when there are applications running in parallel, execution speed of mobile is not fixed. In order to counter these issues, this work exploits Exponential Weighted Mean Moving Average to predict device speed according to load on mobile device. We have compared proposed work with two types of systems: Fixed CPU Speed system where CPU speed of mobile device is fixed throughout all offloading decisions, and Oracle which assumes to know exact speed of mobile device in advance. Evaluation of all systems is carried by using synthetic workloads.
Key-Words / Index Term
Mobile cloud computing, Offloading, Network Bandwidth, Energy saving, Execution speed
References
[1] K. Kumar, and Y.H. Lu, “Cloud Computing For Mobile Users: Could Offloading Computation Save Energy?,” in Proc. of IEEE Computer Society, Vol. 43, pp.51-56, 2010.
[2] E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, “MAUI: Making Smartphones Last Longer with Code Offload,” in Proc. of MobiSys ’10, 2010.
[3] P. Bahl, R. Y. Han, Li Erran, andM. Satyanarayanan, “Advancing the State of Mobile Cloud Computing,” in Proc. of MCS’12, June 25, 2012.
[4] S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, “Thinkair: Dynamic Resource Allocation and Parallel Execution in the Cloud for Mobile Code Offloading,” in Proc. of IEEE INFOCOM, 2012.
[5] S. Patel, “A Survey of Mobile Cloud Computing: Architecture, Existing Work & Challenges”, International Journal of Advanced Research in Computer Science & Software Engineering,Vol. 3, Issue 6, June 2013
[6] N. Fernando, S. W. Loke, and W. Rahayu, “Mobile Cloud Computing: A survey,” Future Generation Computer Systems, Vol. 29, pp. 84-106, 2013.
[7] M. V. Barbera, S. Kosta, A. Mei, and J. Stefa, “To Offload or Not to Offload? The Bandwidth & Energy Costs of Mobile Cloud Computing,” in Proc. of IEEE INFOCOM, 2013.
[8] N. Kaushik, and J. Kumar, “A Computation Offloading Framework to Optimize Energy Utilisation in Mobile Cloud Computing Environment,” International Journal of Computer Applications & Information Technology, Vol. 5, Issue II, April-May, 2014.
[9] G. Folino, and F.S. PisaniI, “Automatic offloading of mobile applications into the cloud by means of genetic programming,” in Proc. of Applied Soft Computing, Vol. 25, Issue C, pp. 253–265, December 2014.
[10] M. V. Barbera, A. C. Viana, and M. D. de Amorim, “Data offloading in social mobile networks through VIP delegation,” in Proc. of the Ad Hoc Networks 19, pp. 92-110, 2014
[11] C. M. S. Magurawalage, and K. Yang, “Energy-Efficient & Network-Aware Offloading Algorithm for Mobile Cloud Computing,” Journal of Network & Computer Applications, Vol. 74, pp. 22–33, 2014.
[12] N. Kaushik, Gaurav, and J. Kumar, “A Literature Survey on Mobile Cloud Computing: Open Issues & Future Directions,” International Journal of Engineering & Computer Science ISSN: 2319-7242, Vol. 3, Issue 5, May 2014.
[13] G. Orsinia, D. Badea, and W. Lamersdorf, “Context-Aware Computation Offloading for Mobile Cloud Computing: Requirements Analysis, Survey & Design Guideline,” in Proc. of 12th International Conference on Mobile Systems & Pervasive Computing, Vol. 56, pp. 10 – 17, 2015.
[14] C. Ragona, F. Granelli, C. Fiandrino, D. Kliazovich, and P. Bouvry, “Energy-Efficient Computation Offloading for Wearable Devices & Smartphones in Mobile Cloud Computing,” in Proc. of IEEE Global Communications, pp. 687–694, 2015.
[15] M. Shiraz, and A. Gani, “Energy Efficient Computational Offloading Framework for Mobile Cloud Computing,” Journal of Grid Computing, Vol. 13, Issue 1, DOI: 10.1007/s10723-014-9323-6, pp. 1–18, March 2015.
[16] Q. K. Gill, and K. Kaur, “A Computation Offloading Scheme for Performance Enhancement of Smart Mobile Devices for Mobile Cloud Computing,” in Proc. of International Conference on Next Generation Intelligent Systems, pp. 1-6,Sept 2016.
[17] S. Deshmukh, and R. Shah, “Computation Offloading Frameworks in Mobile Cloud Computing: A Survey,” in Proc. of IEEE Computer Society magazine, Vol. 3, pp. 16 –22, 2016.
[18] N. Idawati, M. Enzai, and M. Tang, “A Heuristic Algorithm for Multi-Site Computation Offloading in Mobile Cloud Computing,” in Proc. of Computer Science Vol. 80, Issue C, pp. 1232–1241, June 2016.
[19] A. Mukherjee, and D. De, “Low power offloading strategy for Femto-cloud mobile network,” Engineering Science & Technology, an International Journal, Vol. 19, Issue 1, pp. 260-270, March (2016).
[20] J. Panneerselvam, J. Hardy, B. Yuan, and N. Antonopoulos, “Mobilouds: An Energy Efficient MCC Collaborative Framework With Extended Mobile Participation for Next Generation Networks,” IEEE, DOI: 10.1109/ACCESS.2016.2602321, Vol. 4, pp. 125, 2016.
[21] M. Goudarzia,, M. Zamania, Abolfazl, and T. Haghighat, “A Fast Hybrid Multi-Site Computation Offloading for Mobile Cloud Computing,” Journal of Network & Computer Applications, Vol. 80, 2017.
[22] D. Mazza, D. Tarchi, and G. E. Corazza, “A Unified Urban Mobile Cloud Computing Offloading Mechanism for Smart Cities,” in Proc. of IEEE Communications Magazine, Vol. 55 Issue 3, pp. 106–115, March 2017.
[23] S. Sthapit, J. R. Hopgood, and J. Thompson, “Distributed Computational Load Balancing for Real-Time Applications,” in Proc. of 25th European Signal Processing Conference, 2017.
[24] S. Saha, and M. S. Hasan, “Effective Task Migration to Reduce Execution Time in Mobile Cloud Computing,” Proceedings of the 23rd International Conference onAutomation & Computing, DOI: 10.23919/IConAC.2017.8081998, pp.7-8, September 2017.
[25] L. Zhang, and Student Member, IEEE, Di Fu, IEEE, and J. Liu, “On Energy-Efficient Offloading in Mobile Cloud for Real-Time Video Applications,” in Proc. of IEEE Transactions on Circuits & Systems for Video Technology, Vol. 27, Issue 1, JANUARY 2017.
[26] P. Nawrocki, and W. Reszelewski, “Resource Usage Optimization in Mobile Cloud Computing,” in Proc. of Computer Communications 99, pp. 1-12, 2017.
[27] G. Shu, X. Zheng, H. Xu, and J. Li, “Cloudlet-assisted Heuristic Offloading for Mobile Interactive Applications,” 5th IEEE International Conference on Mobile Cloud Computing, Services, & Engineering, DOI: 10.1016/j.neucom.2017.09.056, 28 Dec, 2017.
Citation
Nikki, J. Kumar, "Predictive Approach for Energy Efficient Computation Offloading In Mobile Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.62-67, 2018.
Effectiveness of IoT with Reference To Patient Waiting Time
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.68-76, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.6876
Abstract
In this research work, the patient administration system of a hospital using manual and IoT methods are compared with authenticated sample data. The software which is developed for this IoT Environment is user-friendly, reduces the time and minimizes the cost. Patient waiting time for hospital services is identified as one of the key measurement of a responsive health care system. So, this study addresses the issue of long patient waiting time in the outpatient department (OPD). Outpatient administration always takes a long waiting time for a treatment that has a short time of consultation by the physician. Queuing theory formulas are used to predict the waiting time of the patient. The main goal of this research is focused on how the IoT method can able to reduce patient waiting time.
Key-Words / Index Term
IoT, Healthcare , Waiting time, Queuing theory, Patient
References
[1] T. Lu and W. Neng, "Future internet: The Internet of Things," in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, 2010, pp. V5-376-V5-380.
[2] Dave Evans “The Internet of Things How the Next Evolution of the Internet Is Changing Everything” Cisco Internet Business Solutions 2011
[3] M. A. Ezechina, K. K. Okwara, C. A. U. Ugboaja. "The Internet of Things (Iot): A Scalable Approach to Connecting Everything". The International Journal of Engineering and Science 4(1) (2015) 09-12.
[4]. Infso D.4 Networked Enterprise & RFID Infso G.2 Micro & Nanosystems "Internet of Things in 2020 - Roadmap for the future" Version 1.1 - 27 May, 2008
[5] Chad Brooks "The Internet of Things: A Seamless Network of Everyday Objects" Live Science Contributor ,July 31, 2013.
[6] P. A. D. Dilrukshi , H. D. I. M. Nirmanamali "A Strategy to Reduce the Waiting Time at the Outpatient. Department of the National Hospital in Sri Lanka" International Journal of Scientific and Research Publications, Volume 6, Issue 2, February 2016
[7] https://en.wikipedia.org/wiki/Internet_of_things
[8]https://www.rfpage.com/what-are-the-major-components-of-internet-of-things/
[9] Arduino - Introduction". arduino.cc.
[10] Tarun Agarwal "Arduino Board Technology Architecture and Its Applications" Apr 20, 2017 is the Chief Customer Support Officer at Edgefx Technologies
[11] Raspberry Pi Vs Arduino: How these two giants stack up against each other, IoT India Magazine July 24, 2016
[12]Sima Ajami and Ahmad Rajabzadeh ,“Radio Frequency Identification (RFID) technology and patient safety”, Journal of Research in Medical Science v.18(9); 2013
Citation
K. Mohan Kumar, K. Thiyagarajan, K. Geethanjali, "Effectiveness of IoT with Reference To Patient Waiting Time," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.68-76, 2018.
Implementation of K-Nearest Neighbor (KNN) algorithm for detection of QRS Complexes
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.77-79, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.7779
Abstract
In this paper, K-Nearest Neighbor (KNN) algorithm as a classifier is implemented with slope as feature for detection of QRS-complex in ECG, the detection rate of 99.32% is achieved. The proposed algorithm is evaluated on standard databases CSE dataset-3.
Key-Words / Index Term
K-NN Alogorithm, QRS detection
References
[1] https://en.wikipedia.org/wiki/K-nearest_neighbors_algorithm
[2] N. S. Altman, "An introduction to kernel and nearest-neighbor nonparametric regression". The American Statistician, Vol. 46, Issue 3, pp. 175–185, 1992.
[3] P. A. Jaskowiak, R. J. G. B. Campello, "Comparing Correlation Coefficients as Dissimilarity Measures for Cancer Classification in Gene Expression Data". http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.208.993. Brazilian Symposium on Bioinformatics (BSB 2011). pp. 1–8. Retrieved 16 October 2014.
[4] J.A. Alste Van and T.S. Schilder, “Removal of baseline wander and power line interference from the ECG by an efficient FIR filter with a reduced number of taps,” IEEE Transactions on Biomedical Engineering, Vol. 32, Issue 12, pp.1052-1059, 1985.
[5] G.S. Furno and W.J. Tompkins, “A learning filter for removing noise interference,” IEEE Transactions on Biomedical Engineering, Vol. 30, issue 4, pp. 234-235, 1983.
[6] Willems J.L., “The CSE Multilead atlas measurement results data set 3,” Common Standards for Quantitative Electrocardiography, Leuven, Belgium, 1988
Citation
P. Mathur, V.S. Chouhan, "Implementation of K-Nearest Neighbor (KNN) algorithm for detection of QRS Complexes," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.77-79, 2018.
A Advanced Approach To Construct E-Learning QA System
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.80-83, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.8083
Abstract
The Novel approach can yield high levels of performance and nicely complements traditional question answering techniques driven by information extraction. In order for question answering systems to benet from this vast store of useful knowledge, they must copy with large volumes of useless data. Question Answering systems (QA) uses similarity in questions and ranking the relevant answer to user. The web gives large data and that require more time as well as no relevancy in answers. To solve this problem proposed system proposed novel Pair wise Learning to rANk model i.e PLANE which can quantitatively rank answer candidates from the relevant question pool. Specially, it uses two components i.e online learning component and one online search component. Our model is effective as well as achieves better performance than several existing questions answer selection system. User gets recommendation based on his profile. User recommend the new question to his friend and this is trust analysis so user can get top recommendation of newly arrived question of languages.
Key-Words / Index Term
Answer Selection, Community-based Question Answering, Question-Answer pairs, Pair wise learning technique
References
[1] W. Wei, Z. Ming, L. Nie, G. Li, J. Li, F. Zhu, T. Shang, and C. Luo, Exploring heterogeneous features for query-focused summarization of categorized community answers, Inf. Sci., vol. 330, pp. 403423, 2016.
[2] X. Li, Y. Ye, and M. K. Ng, Multivcrank with applications to image retrieval, TIP, vol. 25, no. 3, pp. 13961409, 2016.
[3] W. Wei, G. Cong, C. Miao, F. Zhu, and G. Li, Learning to find topic experts in twitter via different relations, TKDE, vol. 28, no. 7, pp. 17641778, 2016
[4] W. Wei, B. Gao, T. Liu, T. Wang, G. Li, and H. Li, A ranking approach on large-scale graph with multidimensional heterogeneous information, TOC, vol. 46, no. 4, pp. 930944, 2016.
[5] X. Wei, H. Huang, C. Lin, X. Xin, X. Mao, and S. Wang, Reranking voting-based answers by discarding user behavior biases, in Proceedings of IJCAI15, 2015, pp. 23802386.
[6] Q. H. Tran, V. Duc, Tran, T. T. Vu, M. L. Nguyen, and S. B. Pham, Jaist: Combining multiple features for answer selection in community question answering, in Proceedings of SemEval15. ACL, 2015, pp. 215C219.
[7] Savenkov, Ranking answers and web passages for non-factoid question answering: Emory university at TREC liveqa, in Proceedings of TREC15, 2015.
[8] A Joint Segmentation and Classification Framework for Sentence Level Sentiment Classification Duyu Tang, Bing Qin, Furu Wei, Li Dong, Ting Liu, and Ming Zhou. EEE/ACM transjectiom
on audio search data, language processing, no. 11,november 015
[9] Q. Le and T. Mikolov, Distributed representations of sentences and documents, in Proceedings of ICML14. Morgan Kaufmann Publishers Inc., 2014, pp. 11881196.
[10] T. Joachims, L. Granka, B. Pan, H. Hembrooke, and G. Gay, Accurately interpreting clickthrough data as implicit feedback, in Proceedings of SIGIR05. ACM, 2005, pp. 154161.
Citation
S.S. Pawar, R.H. Kulkarni, "A Advanced Approach To Construct E-Learning QA System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.80-83, 2018.
Biomedical Literature Mining for Biomedical Relation Extraction
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.84-93, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.8493
Abstract
Research work in the biomedical domain has been increasing at fast pace. Hence, the knowledge in the field of biomedical domain is growing exponentially. Consequently, the number of text documents containing the knowledge in this field is growing very rapidly. It is often very difficult for researchers to track the knowledge and assimilate it for generating new ideas. Therefore, it is highly desirable to organize such documents for extracting useful information from textual literature and store them in a structured form. As this information is embedded within text, so it is a challenging task to extract them. This paper presents a rule based system to extract biomedical relations along with biomedical entities from biomedical literatures. The system first generates a dependency tree of each sentence of a given literature, and then the rules are applied to extract the information components. The biomedical relations are embedded within these information components. Further, these information components are used to get feasible biomedical relations from a set of abstracts of biomedical literature. Furthermore, the system has been validated on a corpus of 500 abstracts downloaded from PubMed database on Alzheimer key word.
Key-Words / Index Term
Text mining; Biomedical text mining, Biomedical relation extraction
References
[1] M. Habibi, L. Weber, M. Neves, D.L. Wiegandt, U. Leser, “Deep learning with word embeddings improves biomedical named entity recognition”, Bioinformatics, 33(14), pp. i37-i48, 2017.
[2] R. Jelier, G. Jenster, L.C. Dorssers, C.C. van der Eijk, E.M. van Mulligen, B. Mons, J.A. Kors, “Co-occurrence based meta-analysis of scientific texts: retrieving biological relationships between genes”, Bioinformatics, 21, pp. 2049–2058, 2005.
[3] T.K. Jenssen,A. Laegreid, J. Komorowski, E. Hovig, “A literature network of human genes for high-throughput analysis of gene expression”, Nature Genetics, 28(1), pp. 21–28, 2001.
[4] J. Ding, D. Berleant, D. Nettleton, E. Wurtele, “Mining Medline: abstracts, sentences, or phrases?”, In the Proceedings of the 7th Pacific Symposium on Biocomputing, Lihue, Hawaii, pp. 326–337, 2002.
[5] A. Divoli, T.K. Attwood, “BioIE: extracting informative sentences from the biomedical literature”, Bioinformatics, 21, pp. 2138–2139, 2005.
[6] K. Fundel, R. Kuffner, R. Zimmer, “RelEx—Relation extraction using dependency parse trees”, Bioinformatics, 23(3), pp. 365–371, 2007.
[7] Jahiruddin, M. Abulaish, L. Dey, “A concept-driven biomedical knowledge extraction and visualization framework for conceptualization of text corpora”, Journal of Biomedical Informatics, 43, pp. 1020-1035, 2010.
[8] E.S. Chen, G. Hripcsak, H. Xu, M. Markatou, C. Friedman, “Automated acquisition of disease–drug knowledge from biomedical and clinical documents: an initial study”, Journal of the American Medical Informatics Association, 15(1), pp. 87–98, 2008.
[9] J. Saric, L. Jensen, R. Ouzounova, I. Rojas, P. Bork, “Extraction of regulatory gene/protein networks from Medline”, Bioinformatics, 22(6), pp. 645–650, 2006.
[10] J. Hakenberg, C. Plake, U. Leser, H. Kirsch, D. Rebholz-Schuhmann, “LLL’05challenge: Genic interaction extraction-identification of language patterns based on alignment and finite state automata”, In the Proceedings of the 4th Learning Language in Logic workshop (LLL05), Bonn, Germany, pp. 38–45, 2005.
[11] B. Rink, S. Harabagiu, K. Roberts, “Automatic extraction of relations between medical concepts in clinical texts”, Journal of the American Medical Informatics Association, 18(5), pp. 594–600, 2011.
[12] M. Bundschus, M. Dejori, M. Stetter, V. Tresp, H.P. Kriegel, “Extraction of semantic biomedical relations from text using conditional random fields”, BMC bioinformatics, 9(1), pp. 207-220, 2008.
[13] Y. Miyao, K. Sagae, K. Saetre, T. Matsuzaki, J. Tsujii, “Evaluating contributions of natural language parsers to protein–protein interaction extraction” Bioinformatics, 25(3), pp. 394–400, 2009.
[14] M.S. Simpson, D. Demner-Fushman, “Biomedical text mining: A survey of recent progress”, Mining Text Data, Springer, pp. 465–517, 2012.
[15] A. Airola, S. Pyysalo, J. Björne, T. Pahikkala, F. Ginter, T. Salakoski, “A graph kernel for protein-protein interaction extraction”, In the Proceedings of the workshop on current trends in biomedical natural language processing. Association for Computational Linguistics, Columbus, Ohio, USA, pp. 1–9, 2008.
[16] M. Miwa, R. Saetre, Y. Miyao, J. Tsujii, “Protein– protein interaction extraction by leveraging multiple kernels and parsers”, International journal of medical informatics, 78(12), pp. e39–e46, 2009.
[17] S. Kim, J. Yoon, J. Yang, “Kernel approaches for genic interaction extraction”, Bioinformatics, 24(1), pp. 118–126, 2008.
[18] R.T.H. Tsai, W.C. Chou, Y.S. Su, Y.C. Lin, C.L. Sung, H.J. Dai, I.T.H. Yeh, W. Ku, T.Y. Sung, W.L. Hsu, “BIOSMILE: A semantic role labeling system for biomedical verbs using a maximum-entropy model with automatically generated template features”, BMC bioinformatics, 8(1), pp. 325-332, 2007.
[19] P. Thompson, S.A. Iqbal, J. McNaught, S. Ananiadou, “Construction of an annotated corpus to support biomedical information extraction”, BMC bioinformatics, 10(1), pp. 349-367, 2009.
Citation
Jahiruddin, "Biomedical Literature Mining for Biomedical Relation Extraction," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.84-93, 2018.
Keyword Based Web Filtering Tool For E-Learning Sites
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.94-97, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.9497
Abstract
The internet overwhelms us with huge amount of widely extended, well integrated, rich and dynamic hypertext information. It has deeply influenced our lives and daily routine. Billions of websites contains learning related and unrelated contents. It is very difficult to find and maintain the unrelated urls dataset to stop student from accessing the irrelevant sites in browser. Web content filtering is one of the essential tool which helps to filter out unwanted content. The proposed algorithm used to create strong keyword database of learning sites. This database used along with browser extension to analyze every incoming site and then allows browser to display only learning sites. In this extension natural language processing (NLP) plays an important role to find out and block non learning sites. We have measured the accuracy of the tool using precision and recall.
Key-Words / Index Term
Internet, Techno-Savvy, WWW, Web Mining, Filter, NLP
References
[1] https://en.wikipedia.org/wiki/Information_and_communications_technology
[2] P. Rutravigneshwaran, “A Study of Intrusion Detection System using Efficient Data Mining Techniques”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.5-8, 2017
[3] A.K. Kashyap, I. Naseem , D. Mandloi (2017), “Web Mining an Approach to Evaluate the Web” International Journal of Scientific Research in Review Paper . Computer Science and Engineering Vol.5, Issue.3, pp.79-85, June (2017)
[4] Cohen-Almagor R (2015), Confronting the Internet`s Dark Side, Cambridge University Press, Cambridge, pp 41R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998.
[5] Pappu A K, Trivedi A K, Sanyal S and Abraham A (2006), “SpamWall: HeuristicFilter for Web-Spam”, under review in the Web Intelligence and Agent Systems Journal(WIAS), pp: 1-6
[6] Daugherty M (2004), Monitoring and Managing Microsoft Exchange Server 2003, Elsevier Digital Press, USA, pp 464
[7] Thecentexitguy (2016), Web Content Filtering: Types and Benefits, Available at http://thecentexitguy.com/web-content-filtering-types-and-benefits/, accessed on 13th February 2017.
[8] Kuppusamy K S and Aghila G (2012), “A personalized web page content filtering model based on segmentation” , International journal of information sciences and techniques Vol.2,No1.
[9] Reimer H, Pohlmann N and Schneider W (2015),ISSE “Highlights of the Information Security Solutions” Conference, Springer, Germany, pp 47.
Citation
Sangita. S. Modi, Sudhir B. Jagtap, "Keyword Based Web Filtering Tool For E-Learning Sites," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.94-97, 2018.
Issues and Challenges in E-Commerce
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.98-101, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.98101
Abstract
E-commerce deals with selling and purchasing of goods and services through internet and computer networks. E-commerce can enhance economic growth, increase business opportunities, competitiveness, better and profitable access to markets. E-Commerce is emerging as a new way of helping business enterprises to compete in the market and thus contributing to economic success. In this paper, we present and discuss these findings, and identify changes that will be required for broader acceptance and diffusion of e-commerce in India. In this research paper we will discuss about advanced analysis of E-commerce which will comprise of strengths, weaknesses, issues, opportunities and challenges faced by e-commerce in current scenario
Key-Words / Index Term
E-commerce, E-commerce Challenges, E-commerce Issues, E-commerce Strength
References
[1] H.-T. Chang and S. Wu, “A Switching Proxy for Web Search Engines. Advanced in Information Sciences and Service Sciences”, Advanced Institute of Convergence Information Technology, vol. 3, no. 5, (2011), pp. 52.
[2] Prospect, Information on http://www.iprospect.com/search-engine marketing-university/, (2008).
[3] B. J. Jansen and T. Mullen, ”Sponsored search: An overview of the concept, history, and technology”, International Journal of Electronic Business, vol. 6, no. 2, (2008), pp. 114-131.
[4] U. Karoor, “E-commerce in India: Early Bards expensive worms”, Consumer and shopper insights, (2012).
[5] A. Kesharwani and R. Tiwari, “Exploration of Internet Banking Website Quality in India: A Webqual Approach”, Great Lakes Herald, vol. 5, no. 1, (2011), pp. 40-58.
[6] S. E. Kim, T. Shaw and H. Schneider, “Web site design, benchmarking within industry groups”, Internet Research, vol. 13, no. 1, (2003), pp. 17-26.
[7] M. S. Khan and S. S. Mahapatra “Service quality evaluation in internet banking: an empirical study in India”, Int. J. Indian Culture and Business Management, vol. 2, no. 1, (2009), pp. 30-46.
[8] T. Lamoureux, “IS goes shopping on the web”, Computerworld, vol. 31, no. 46, (1997), pp. 106.
[9] L.-H. Ho, M.-H. Lu, C.-P. Lee and T.-F. Peng, “Exploration of Search Engine Optimization Technology Applied in, Internet Marketing”, Advances in Information Sciences and Service Sciences, vol. 3, no. 7, (2011).
[10] P.Malhotra and B. Singh, “Determinants of internet banking adoption by banks in India”, Internet Research, vol. 17, no. 3, (2007), pp. 323-339.
Citation
Raj Kumar, Rakesh kumar Saini, Kuldeep Singh, "Issues and Challenges in E-Commerce," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.98-101, 2018.
Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.102-105, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.102105
Abstract
Wireless sensor network are autonomous nodes which monitor and communicate the sensor data to central unit through wireless network. There devices are installed in the remote areas and used for communicate sensitive information in different application such as smart grids, MANET. The attackers attack on these nodes to extract information or modify. In this paper, various attacks and its countermeasure technique such as cryptography algorithms are studied and comparative analysis is done for the wireless sensor network. From, the analysis found that symmetric and asymmetric ciphers are hybrid which provide authentication and confidentiality but increased the resources requirement. But, the wireless sensor nodes are battery operated and low memory available. Therefore, we recommend in the future work preferred lightweight cipher and different modes of authentication such as CCM, counter mode to enhance the performance on wireless sensor network.
Key-Words / Index Term
Cryptography, Wireless SensorNetwork,Attacks,AES,RSA
References
[1] Cheikhrouhou, Omar, "Secure group communication in wireless sensor networks: a survey," Journal of Network and Computer Applications, vol. 61, pp. 115-132, 2016.
[2] Pawar, M., & Agarwal, J.,“A literature survey on security issues of WSN and different types of attacks in network," Indian Journal of Computer Science and Engineering, vol. 8, issue 2, pp. 80-83, 2017.
[3] Faquih, A., Kadam, P., &Saquib, Z.,.“Cryptographic techniques for wireless sensor networks: A survey,” In Bombay Section Symposium (IBSS),pp. 1-6, 2015.
[4] Parrilla, L., Castillo, E., López-Ramos, J. A., Álvarez-Bermejo, J. A., García, A., & Morales, D. P. “Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks,” Sensors, vol. 18, issue 1,pp. 251, 2018.
[5] Bisht, N., Thomas, J., &Thanikaiselvan, V. “Implementation of security algorithm for wireless sensor networks over multimedia images,” International Conference onin Communication and Electronics Systems (ICCES), ,pp. 1-6, 2016.
[6] Prathamesh, G., Sanket, G., Yogeshwar, K., & Aniket, N..“Secure Data Transmission in WSN Using 3 DES with Honey Encryption,” IJARIIE, vol.1, issue 4, pp.455-461, 2015.
[7] Panait, C., & Dragomir, D.,“Measuring the performance and energy consumption of AES in wireless sensor networks,”2015 Federated Conference onin Computer Science and Information Systems (FedCSIS), ,pp. 1261-1266, 2015.
[8] Priyadharshini, S. P., Arumuagam, N., &SangeethaAnanthamani, K. “Implementation of Security in Wireless Sensor Network using Blowfish Algorithm,”International Journal of Computer Applications, pp. 33-37, 2014.
[9] Kumar, K. J., Reddy, K. C. K., Salivahanan, S., Karthik, S. D., & Praveen, V.,“Exclusive-128 Bit NLFSR Stream Cipher for Wireless Sensor Network Applications,” International Journal of Engineering and Technology, vol. 5, issue 5, pp. 3668-3675, 2013.
[10] Akishita, T., &Hiwatari, H. “Very compact hardware implementations of the blockcipher CLEFIA,” In International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, pp. 278-292, 2011.
[11] Abduvaliev, A., Lee, S., & Lee, Y. K..“Simple hash based message authentication scheme for wireless sensor networks,”In 9th International Symposium on Communications and Information Technology,(ISCIT), Icheon, pp. 982-986, 2009.
[12] Sreevidya, B., Rajesh, M., & Mamatha, T. M..“Design and Development of an Enhanced Security Scheme Using RSA for Preventing False Data Injection in Wireless Sensor Networks,” In Ambient Communications and Computer Systems, pp. 225-236, 2018.
[13] Verma, D., Jain, R., & Shrivastava, A. “Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks,” IUP Journal of Telecommunications, vol. 7, issue 3, pp. 51, 2015.
[14] Eldefrawy, M. H., Khan, M. K., Alghathbar, K., & Cho, E. S. “Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem,”. Sensors,vol. 10, issue 9, pp.8683-8695, 2010
[15] Liu, Z., Wenger, E., &Großschädl, J. “MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks,” In International Conference on Applied Cryptography and Network Security, pp. 361-379, 2014.
[16] Rizk, R., &Alkady, Y. “Two-phase hybrid cryptography algorithm for wireless sensor networks,” Journal of Electrical Systems and Information Technology, vol. 2, issue 3, pp. 296-313, 2015.
[17] Murugan, M. S., Sasilatha, T., & Dean, A. M. E. T. “Design of Hybrid Model Cryptographic Algorithm for Wireless Sensor Network,”International Journal of Pure and Applied Mathematics, vol. 117, pp.171-177, 2017.
[18] Sharmila, R., & Vijayalakshmi, V.,“Hybrid Key Management Scheme for Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 9, issue 11, pp. 125-132, 2015.
[19] Hwang, T., &Gope, P.,“Robust stream‐cipher mode of authenticated encryption for secure communication in wireless sensor network,” Security and Communication Networks, vol. 9, issue 7, pp. 667-679, 2016.
Citation
H. Kaur, K. Kaur, "Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.102-105, 2018.
Security Approach for Data Storage and Retrival in The Cloud
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.106-110, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.106110
Abstract
Since the beginning of courtesy, man has always been motivated by the need to make advancement and better the existing technologies. This has led to remarkable development and progress which has been a launching pad for further evoluation of all the momemtous advances made by society from the beginning till date. Cloud computing is the concept of using outlying services through a network using various resources. It is basically meant to give maximum with the minimum resources i.e. the user end is having the minimum hardware requirement but is using the maximum capability of computing. This is possible only through this technology which requires and utilizes its resources in the best way. But this advantage comes at a cost. Firstly, the data is uploaded insecurely which has a high risk of being hacked by some malicious people. Secondly, the data saved at outlying servers is under the surveillance of unauthorized people who can do anything with our data and Information. So, these data security risks are causing a barrier in the development of the area of cloud computing infrastructure. In this paper we have discussed about the various techniques by which we can enhance the cloud service in relation to security and data privacy and also designed a new effective cloud data security infrastructure.
Key-Words / Index Term
Cloud Computing, OTP, Data Security, Data Privacy
References
[1] V. Paranjape, V. Pandey, “An approach towards security in private cloud using otp”, International Journal of Emerging Technology and Advanced Engineering (IJETAE), Vol.3, Issue.3, pp.683-687, 2013.
[2] S. Arora, P. Luthra “Security Storage Model of Data in Cloud”, International Journal of Current Engineering and Scientific Research (IJCESR), Vol.2, Issue.6, pp.99-105, 2015.
[3] H. B. Patel, D. R. Patel, B. Borisaniya, A. Patel, “Data storage security model for cloud computing”, Advances in Communication, Network, and Computing, CNC 2012, pp. 37–45, 2012.
[4] S. Kamara, K. Lauter, “Cryptographic cloud storage,” in Financial Cryptography and Data Security. Springer, pp. 136–149, 2010.
[5] G. Choudhury, J. Abudin, “Modified secure two-way authentication system in cloud computing using encrypted one-time password.” International Journal of Computer Science & Information Technologies, IJCSIT, Vol.5, no. 3, 2014.
[6] S. K. Sood, “A combined approach to ensure data security in cloud computing”, Journal of Network and Computer Applications, Vol.35, no.6, pp.1831–1838, 2012.
[7] R. Manjusha, R. Ramachandran, “Comparative study of attribute-based encryption techniques in cloud computing”, in Embedded Systems (ICES), International Conference on. IEEE, pp.116–120, 2014.
[8] V. Spoorthy, M. Mamatha, B. Santhosh Kumar, "A survey on data storage and security in cloud computing", International Journal of
Computer Science and Mobile Computing, IJCSMC, vol.3, Issue.6, pp. 306-316, 2014.
[9] N. Gowtham Kumar, K. Praveen Kumar Rao, “Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage using Digital Signatures”, International Journal of Computer Science and Information Technologies, IJCSIT, Vol.5, pp. 8074-8078, 2014.
[10] E. M. Mohamed, H. S. Abdelkader, S. El-Etriby, “Data Security Model for Cloud Computing”, Journal of Communication and Computer, Vol.10, pp.1047-1062, 2013.
Citation
Somnath Basak, Somnath Dey, Mrinmay Deb, "Security Approach for Data Storage and Retrival in The Cloud," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.106-110, 2018.
Long-Term Survival Prediction After Liver Transplantation Using Convolutional Neural Networks
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.111-114, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.111114
Abstract
Due to the technology innovations, a medical diagnosis has developed as an emerging area in the healthcare systems. Over the past decades, different reliable prediction models have been developed according to the survival analysis method with different degree of success. A survival of patient’s after liver transplantation has been predicted by using Multi-Layer Perceptron Artificial Neural Network (MLP-ANN) model for better diagnosis. Conversely, patients undergoing liver transplantation may have a very poor diagnosis. Also, it depends on the proper selection of attributes and model. Hence in this article, an enhanced model is proposed for prediction of long-term survival of patient’s after liver transplantation. Initially, data are collected and the Principal Component Analysis (PCA) is applied for dimensionality reduction which removes unnecessary attributes of liver patients. Then, the data is trained separately by using Convolutional Neural Network (CNN) model with the suitable selection of data attributes. Finally, the performance of the proposed model is analyzed and compared with the existing MLP-ANN model in terms of sensitivity, specificity and accuracy. The experimental results show that the proposed CNN model achieves high prediction accuracy in survival analysis after liver transplantation.
Key-Words / Index Term
Liver transplantation, Survival prediction, MLP-ANN, Convolutional neural network, Principal component analysis
References
[1] A.L. Gleisner, A. Muñoz, A. Brandao, C. Marroni, M.L. Zanotelli, G.G. Cantisani, ... T.M. Pawlik, “Survival benefit of liver transplantation and the effect of underlying liver disease”, Surgery, Vol.147, Issue.3, pp.392-404, 2010.
[2] A. Karapanagiotou, C. Kydona, C. Dimitriadis, S. Papadopoulos, T. Theodoridou, T. Tholioti, ... N. Gritsi-Gerogianni, “Impact of the Model for End-stage Liver Disease (MELD) score on liver transplantation in Greece”, In Transplantation proceedings, Vol.46, Issue.9, pp.3212-3215, 2014.
[3] Priyanka, S. Khan, T. Kour, “Investigation on Smart Health Care Using Data Mining Methods”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.31-36, 2016.
[4] V. Davis, S. Devane, “Diagnosis of Brain Hemorrhage Using Artificial Neural Network”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.1, pp.20-23, 2017.
[5] C.G. Raji, S.V. Chandra, “Long-Term Forecasting the Survival in Liver Transplantation Using Multilayer Perceptron Networks”, IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol.47, Issue.8, pp.2318-2329, 2017.
[6] M. Cruz-Ramirez, C. Hervas-Martinez, J.C. Fernandez, J. Briceno, M. De La Mata, “Predicting patient survival after liver transplantation using evolutionary multi-objective artificial neural networks”, Artificial intelligence in medicine, Vol.58, Issue.1, pp.37-49, 2013.
[7] C.G. Raji, S.V. Chandra, “Artificial neural networks in prediction of patient survival after liver transplantation”, Journal of Health & Medical Informatics, Vol.7, Issue.1, pp.1-7, 2016.
[8] C.G. Raji, S.V. Chandra, “Graft survival prediction in liver transplantation using artificial neural network models”, Journal of computational science, Vol.16, pp.72-78, 2016.
[9] C.G. Raji, S.V. Chandra, “Prediction and survival analysis of patients after liver transplantation using RBF networks”, In International Conference on Data Mining and Big Data, Springer, pp.147-155, 2016.
[10] Q. Ling, H. Dai, R. Zhuang, T. Shen, W. Wang, X. Xu, S. Zheng, S. “Predicting short-term survival after liver transplantation on eight score systems: a national report from China Liver Transplant Registry”, Scientific Reports, Vol.7, Issue.42253, pp.1-8, 2017.
[11] C.G. Raji, H.S. Anand, S.V. Chandra, “Computer based prognosis model with dimensionality reduction and validation of attributes for prolonged survival prediction”, Informatics in Medicine Unlocked, Vol.9, pp.93-106, 2017.
[12] M. Nematollahi, R. Akbari, S. Nikeghbalian, C. Salehnasab, “Classification Models to Predict Survival of Kidney Transplant Recipients Using Two Intelligent Techniques of Data Mining and Logistic Regression”, International Journal of Organ Transplantation Medicine, Vol.8, Issue.2, pp.119-122, 2017.
Citation
V. Mubeena, "Long-Term Survival Prediction After Liver Transplantation Using Convolutional Neural Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.111-114, 2018.