An Efficient Voice Based Person Identification System for Secured Communication
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.58-60, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.5860
Abstract
Secured Communication is essential due to scalability due to increase number of devices and drastically growing number of people involved in communication. In this paper a voice comparison based communication authentication mechanism is used for providing secured communication. This voice based authentication is used in two different applications like people communication and data retrieval. Before going to speak with people in online their information and their voice is compared and verified from the database and permission will be granted. Similarly according to the voice they can retrieve the data from the data base, where it provides data integrity. Both applications comprise a number of stages such as: (i) Voice, Voice to Text input, (II). Voice Comparison and Pattern Matching. Finally (III). Permission Granted and Data Retrieval (DR) as the output. In order to improve the accuracy and relevancy the proposed data retrieval system, it uses an indexing method called Bag of Words (BOW). BOW is like an index-table which can be referred to store, compare and retrieve the information speedily and accurately. Index-table utilization in DRS improves the accuracy with minimized computational complexity. The proposed DRS is simulated in DOTNET software and the results are compared with the existing system results in order to evaluate the performance.
Key-Words / Index Term
Information Retrieval System, Data Mining, Bag of Words, Data Base Maintenance.
References
[1] Lakra, Sachin, et al. "Application of fuzzy mathematics to speech-to-text conversion by elimination of paralinguistic content." arXiv preprint arXiv: 1209.4535 (2012).
[2] Kunth, D. J. Morris and V.Partt.1977. "Fast Pattern Matching in Strings" SIAM J on Computing, 6, 323-50.
[3] Boyer R., and S Moore. 1977. "A Fast String Searching Algorithm." CACM, 20, 762-72.
[4] Ondrej Chum, James Philbin, Josef Sivic, Michael Isard, and Andrew Zisserman. Total recall: Automatic query expansion with a generative feature model for object retrieval. In ICCV, pages 1–8, 2007.
[5] HHerv´eJ´egou, Matthijs Douze, and Cordelia Schmid. Improving bag-of-features for large scale image search. International Journal of Computer Vision, 87(3):316–336, 2010.
[6] James Philbin, Ondrej Chum, Michael Isard, Josef Sivic, and Andrew Zisserman. Object retrieval with large vocabularies and fast spatial matching in CVPR, 2007.
[7] http://www.mysqltutorial.org/mysql-sample-database.aspx.
[8] Kleber, Florian, Markus Diem, and Robert Sablatnig, "Form classification and retrieval using bag of words with shape features of line structures"-IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics, 2013.
[9] M. Banko, M. J. Cafarella, S. Soderland, M. Broadhead, and O. Etzioni. Open Information Extraction from the Web. In IJCAI, volume 7, pages 2670–2676, 2007.
[10] M. J. Cafarella, J. Madhavan, and A. Halevy. Web-Scale Extraction of Structured Data. ACM SIGMOD Record, 37(4):55–61, 2009.
[11] S. Cucerzan. Large-Scale Named Entity Disambiguation Based on Wikipedia Data. In EMNLP-CoNLL, volume 7, pages 708–716, 2007.
[12] T. Lin, P. Pantel, M. Gamon, A. Kannan, and A. Fuxman. Active Objects: Actions for Entity-Centric Search. In WWW, pages 589–598, 2012.
[13] J. M. Ponte and W. B. Croft. A Language Modelling Approach to Information Retrieval. In SIGIR, pages 275–281, 1998.
[14] J. Pound, P. Mika, and H. Zaragoza. Ad-hoc Object Retrieval in the Web of Data. In WWW, pages 771–780, 2010.
[15] S. E. Robertson and S. Walker. Some Simple Effective Approximations to the 2-Poisson Model for Probabilistic Weighted Retrieval. In SIGIR, pages 232–241, 1994.
[16] G. Salton, A. Wong, and C.-S. Yang. A Vector Space Model for Automatic Indexing Communications of the ACM, 18(11):613–620, 1975.
[17] Kherfi, M.L., Ziou, D. and Bernardi, A. (2004) Image Retrieval from the World Wide Web: Issues, Techniques, and Systems. ACM Computing Surveys, 36, 35-67. http://dx.doi.org/10.1145/1013208.1013210
[18] Datta, R., Joshi, D., Li, J. and Wang, J.Z. (2008) Image Retrieval: Ideas, Influences, and Trends of the NEW Age.ACM Computing Surveys, 40, 1-60.
[19] Yang, M., Kpalma, K. and Ronsin, J. (2010) A Survey of Shape Feature Extraction Techniques. Pattern Recognition, 1-38.
[20] Penatti Otavio, A.B., Valle, E. and Torres, R.da.S. (2012) Comparative Study of Global Color and Texture Descriptors for Web Image Retrieval. Int. J. Via. Commun. Image R, 359-380.
[21] Deselaers, T., Keysers, D. and Ney, H. (2008) Features for Image Retrieval: An Experimental Comparison. Information Retrieval, 11, 77-107.
[22] Mallat, S.G. (1989) A Theory for Multi resolution Signal Decomposition: The Wavelet Representation. IEEE Transaction Pattern Analysis and Machine Intelligence, 11, 674-693.
[23] Sarck, J.L., Murtagh, F.D. and Bijaoui, A. (1998) Image Processing and Data Analysis: The Multi scale Approach.
[24] Hill, P., Achim, A. and Bull, D. (2012) The Undecimated Dual Tree Complex Wavelet Transform and Its Application to Bivariate Image Denoising Using a Cauchy Model. 19th IEEE International Conference on Image Processing (ICIP), 1205-1208. http://dx.doi.org/10.1109/icip.2012.6467082.
[25] Kalra, M. and Ghosh, D. (2012) Image Compression Using Wavelet Based Compressed Sensing and Vector Quantization. IEEE 11th International Conference on Signal Processing (ICSP), 1, 640-645.
[26] Kokareh, M., Biswas, P.K. and Chatterji, B.N. (2005) Texture Image Retrieval Using New Rotated Complex Wavelet Filters. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 35, 1168-1178.
[27] Balamurugan, V. and Anandha Kumar, P. (2008) An Integrated Color and Texture Feature Based Framework for Content Based Image Retrieval Using 2D Wavelet Transform. IEEE International Conference on Computing, Communication and Networking, 1-16. http://dx.doi.org/10.1109/icccnet.2008.4787734
[28] Quellec, G., Lamard, M., Cazuguel, G., Cochener, B. and Roux, C. (2012) Fast Wavelet-Based Image Characterization for Highly Adaptive Image Retrieval. IEEE Transactions on Image Processing, 21, 1613-1623.
Citation
Kadher Farook, Manikandan.S, Shakila Basheer, Albert Irudaya Raj, "An Efficient Voice Based Person Identification System for Secured Communication," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.58-60, 2018.
Performance of Diagonal Mesh Network on Chip using NS2
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.67-71, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.6771
Abstract
Network on Chip (NoC) is an interconnection network, which provides a network architecture to overcome limitations of System on Chip(SoC). The Interconnection among multiple cores on a chip has a major effect on communication and performance of the chip in terms of latency and throughput. Many routing architectures and routing algorithm have been developed to alleviate traffic congestion, performance enhancement and low power consumption for Network on Chip(N0C). In this paper, Diagonal Mesh NoC architecture is described using Network Simulator (NS2), which reduces the load distribution across the network by reducing the diameter of the network, as a result, routing cost also reduces. In Diagonal Mesh topology, routing estimates the alternative routes with priority given to a diagonal path. In this paper, it is seen that latency reduces for a pair of nodes that uses the diagonal path as compared to another pair of nodes. Throughput is also enhanced by this approach.
Key-Words / Index Term
Network on Chip (NoC), Topology, Latency, Throughput, NS2
References
[1]. Naveen Choudhary” Network –on-Chip: A New SoC Communication Infrastructure Paradigm”, IJSCE, vol. 1, issues-6, January 2012, pp.332-335, 2012.
[2]. Deewakar Thakyal and Pushpita Chatterjee” DIA-TORUS: A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN” International Journal of Computer Networks & Communications(IJCNC) Vol.8, No.3, May 2016.
[3]. Ms. Neha N. Patil and Prof. S. P. Patil” Performance Evaluation of Topologies Using NS-2” International Journal of Advanced Research in science and Management and Technology Volume 2, Issue 4, April 2016.
[4]. Kalpana Pandey, Dr.M.A. Gaikwad “Performance Evaluation and Simulation of Network Parameters for NoC Architecture Using NS2” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 6, June 2015.
[5]. Simone Pellegrini “On –chip Networks (NoCs)” Seminar on Embedded System Architecture (Prof. A. Strey) seminar, pp.1-6, Dec.10 2009.
[6]. T. Praveen Blessington, Dr. B. Bhanu Murthy, Dr. Fazal Noor Basha “Mesh Analysis Vectors for Routing in Network-On-Chip Architectures” Advances in engineering and Technology, volume 2, February 2013, pp282-287, 2013.
[7]. T. Issariyakul and E. Hossain,” Introduction to Network Simulator NS2” Springer, 2009.
[8]. Prasun Ghosal, Tuhin Subhra Das” Network-on-chip Routing Using Structural Diametrical 2D Mesh Architecture” 2012 Third International Conference on Emerging Applications of Information Technology (EAIT) pp.471-474, 2012.
[9]. Kuan-Ju Chen, Chin-Hung Peng, Feipei Lai” Star-Type Architecture with Low Transmission Latency for a 2D Mesh NOC”2010 IEEE, pp.919-922, 2010.
[10]. Wang Zhang, LigangHou, Jinhui Wang, ShuqimGeng, Wuchen Wu” Comparison Research between XY and odd –Even Routing Algorithm of a 2-Diemension 3x3 mesh topology Network- on -Chip”, system. IEEE Computer Society Global congress on intelligent 2009.pp329-333, doi 10.1109 GCIS.2009.110, 2009.
[11]. Sudhanshu Choudhary, Shafi Qureshi “Performance Evaluation of Mesh –based NoCs: Implementation of a New Architecture and Routing Algorithm” International Journal of Automation and Computing.9(4), August 2012, pp.403-413, 2012.
Citation
P.P. Papalkar, M.A. Gaikwad, "Performance of Diagonal Mesh Network on Chip using NS2," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.67-71, 2018.
Comparative Analysis on Classification Algorithms of Auto-Insurance Fraud Detection based on Feature Selection Algorithms
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.72-77, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.7277
Abstract
This paper is a comparative analysis of different machine learning algorithms used to detect fraud claims of Automobile/vehicle Insurance claims dataset. In this paper large dataset of automobile insurance claims is used and three feature selection algorithms are applied to the dataset which will be used by the classification algorithms to detect the fraud claims. The Feature Selection algorithms used in this paper are Tree-Based Feature Selection Algorithm, L1-Based Feature Selection Algorithm and Univariate Feature Selection Algorithm and the classification algorithms are Random Forest (RF), Naive Bayes(NB), K-Nearest Neighbor(KNN) and Decision Tree(DT). These algorithms are compared on the basis of performance measures such as accuracy, precision, recall. The proposed model shows that Random Forest works well with respect to accuracy and precision and Decision Tree is the best with respect to recall.
Key-Words / Index Term
Automobile Insurance,Machinelearning, Feature Selection Algorithms, Classification Algorithms
References
[1] Yaqi Li, Chun Yan, Wei Liu, Maozhen Li, “A Principle Component Analysis-based Random Forest with the Potential Nearest Neighbor Method for Automobile Insurance Fraud Identification”. Applied Soft Computing Journalhttp://dx.doi.org/10.1016/j.asoc.2017.07.027
[2] G G Sundarkumar, Ravi V, “A novel hybrid under sampling method for mining unbalanced data sets in banking and insurance” [J]. Engineering Applications of Artificial Intelligence, 2015: 368-377.
[3] Maozhen Li, Yaqi Li, Chun Yan, Wei Liu,. “Research and Application of Random Forest Model in Mining Automobile Insurance Fraud”. 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) 2016.
[4] Rekha Bhowmik, “Detecting Auto Insurance Fraud by Data Mining Techniques”, Journal of Emerging Trends in Computing and Information Sciences, Volume 2 No.4, APRIL 2011
[5] H.Lookman Sithic, T.Balasubramanian, " Survey of Insurance Fraud Detection Using Data Mining Techniques" International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-3, February 2013
[6] Adrian Gepp, J. Holton Wilson, Kuldeep Kumar and Sukanto Bhattacharya, "A Comparative analysis of Decision Trees and other computational datamining techniques in automotive insurance fraud detection", Journal of Data Science 10(2012)
[7] Clifton Phua, Damminda Alahakoon, and Vincent Lee, " Minority Report in Fraud Detection: Classification of Skewed Data", ACM SIGKDD Explorations 2014.
[8] Tina R. Patil, Mrs. S. S. Sherekar, " Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification ", International Journal Of Computer Science And Applications Vol. 6, No.2, Apr 2013.
[9] Manoel Fernando Alonso Gadi, Xidi Wang and Alair Pereira do Lago, "Credit Card Fraud Detection with Artificial Immune System "
[10] LijiaGuo,"Applying Data Mining Techniques in Property~Casualty Insurance "
[11] M. Shukla, A. K. Malviya, "Analysis and Comparison of Classification Algorithms for Student Placement Prediction", International Journal of Computer Sciences and Engineering Vol.-6, Issue-6, June 2018.
Citation
Sapna Panigrahi, Bhakti Palkar, "Comparative Analysis on Classification Algorithms of Auto-Insurance Fraud Detection based on Feature Selection Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.72-77, 2018.
An Advanced Coupling Complexity Metric for Evaluating the Quality of OO Software Modules
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.78-82, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.7882
Abstract
Software metrics plays a major role in assessing the quality of software in testing process. Software metrics elucidates the complexity, reusability, maintainability and understandability of the software code. Software complexity metrics are one of the emerging types of software metrics that focuses on the cognitive analysis of software in terms of understandability and maintainability. In other words, it can be rephrased as the effort taken to comprehend the program code for future enhancements. Complexity metrics has a direct impact with the analysis of complexity in software through an intrinsic study on the object oriented features. This paper proposes a novel Coupling Complexity Metric (IMFC), to highlight the complexity that incurs with coupling and weighs the complexity of a class.
Key-Words / Index Term
Coupling, CBO, reusability, maintainability, modifiability
References
[1]. S.R. Chidamber and C.F. Kemerer. Towards a metrics suite for object-oriented design. In Object Oriented Programming Systems Languages and Applications, pages 197-211, Phoenix, Arizona, USA, November 1991.
[2]. Christodoulou. D and Qi.X,“Difficulties in Software Measurement”,http://www.dcs.shef.ac.uk/~m3xq/om6660/diff_sm.pdf.
[3]. Henderson-Sellers. B, “Object-Oriented Metrics: Measures of Complexity”, Prentice Hall, New Jersey, 1996.
[4]. Chidamber, Shyam and Kemerer, Chris, “A Metrics Suite for Object Oriented Design”, IEEE Transactions on Software Engineering, June, 1994, pp. 476-492.
[5]. W.Li,“Another metric suite for object-oriented programming, “Journal of Systems and Software, vol. 44, no. 2, pp. 155–162, 1998.
[6]. Abreu F.B. and R.Carapuca “Object-Oriented Software Engineering: Measuring and Controlling the Development Process “Proceedings of the 4th International Conference on Software Quality, McLean, Virginia, USA, and October, 1994.
[7]. Cheolhyun Park, Junhee Kim, and Eunseok Lee. Using Page Rank Algorithm to Improve Coupling Metrics. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012
[8]. Basili, Victor R., and Robert W. Reiter Jr. "Evaluating automatable measures of software development" In Proceedings on Workshop on Quantitative Software Models, pp. 107-116. 1979.
[9]. Michael, James Bret, Bernard J. Bossuyt, and Byron B. Snyder. "Metrics for measuring the effectiveness of software-testing tools." In Software Reliability Engineering, 2002. ISSRE 2003. Proceedings. 13th International Symposium on, pp. 117-128. IEEE, 2002.
Citation
N. Vijayaraj, T.N. Ravi, "An Advanced Coupling Complexity Metric for Evaluating the Quality of OO Software Modules," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.78-82, 2018.
Comparative Study of Supervised and Semi-Supervised Learning for Enhanced Drug Prediction
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.83-89, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.8389
Abstract
Several precautions should be taken in using pharmaceutical drugs, for both healthcare professionals, who prescribe and administer drugs, and for drug consumers. Factors such as interactions among the prescribed drugs, interactions with the patient’s current medication, side effects to be avoided, and contraindications, need to be carefully considered. Additionally, the presence of some drug properties, such as side effects and effectiveness, depends on characteristics of patients, such as age, gender, lifestyles, and genetic profiles. The goal is to provide a system to assist medical professionals and drug consumers in choosing and finding drugs that suit their needs. And develop an approach that allows querying for drugs that satisfy a set of conditions. The approach allows users to specify side effects and tailors the answers based on user specification. Finally utilize drug data from multiple data sources. However, drug data are usually noisy and incomplete as they are either manually curated or automatically extracted from text resources such as drug labels. To cope with incomplete and noisy data, data mining techniques were designed and implemented which include clustering and classification algorithms. Then the developed system was used for comparative analysis of supervised and semi-supervised learning using performance metrics. The result shows that Semi-supervised method provided 40% improved response time in comparison with Supervised method in Drug Retrieval System.
Key-Words / Index Term
Drug query system, Data mining, Clustering, Classification, Semi-supervised learning
References
[1] E. Bressoet al., “Integrative relational machine-learningfor understanding drug side-effect profiles,`` BMC Bioinf.,vol. 14, Issue 2 Jun. 2013.
[2] T. Liu and R. B. Altman, ``Relating essential proteins to drug side effects using canonical component analysis: A structure-based approach,`` J. Chem. Inf. Model., vol. 55, no. 7, 2015.
[3] D. S.Wishartet al., ``DrugBank: A knowledgebase for drugs, drug actions and drug targets,`` Nucl. Acids Res., vol. 36, Issue 1, Nov. 2007.
[4] J. Bowes et al., ``Reducing safety-related drug attrition: The use of in vitro pharmacological profiling,`` Nature Rev. Drug Discovery, vol. 11, no. 12, 2012.
[5] X. Wang, B. Thijssen, and H. Yu, ``Target essentiality and centrality characterize drug side effects,`` PLoSComput. Biol., vol. 9, no. 7, p. 2013.
[6] M. Duran-Frigola and P. Aloy, ``Analysis of chemical and biological features yields mechanistic insights into drug side effects,`` Chem. Biol., vol. 20, no. 4, 2013.
[7] T. Liu and R. B. Altman, ``Relating essential proteins to drug side effects using canonical component analysis: A structure-based approach,`` J. Chem. Inf. Model., vol. 55, no. 7, 2015.
[8] S. Jamal, S. Goyal, A. Shanker, and A. Grover, ``Predicting neurological adverse drug reactions based on biological, chemical and phenotypic properties of drugs using machine learning models,`` Sci. Rep., vol. 7, Issue 2 Apr. 2017
[9] J. Scheiberet al., ``Mapping adverse drug reactions in chemical space,`` J. Med. Chem., vol. 52, no. 9, 2009.
[10] Y. Yamanishi, M. Kotera, M. Kanehisa, and S. Go to, ``Drug-target interaction prediction from chemical, genomic and pharmacological data in an integrated framework,`` Bioinformatics, vol. 26, no. 12, 2010.
[11] A. F. Fliri, W. T. Loging, P. F. Thadeio, and R. A. Volkmann, ``Analysis of drug-induced effect patterns to link structure and side effects of medicines,`` Nature Chem. Biol., vol. 1, no. 7, 2005.
[12] J. Scheiberet al., ``Gaining insight into off-target mediated effects of drug candidates with a comprehensive systems chemical biology analysis,`` J. Chem. Inf. Model., vol. 49, no. 2, 2009.
[13] F. Wang, P.Zhang, N. Cao, J. Hu, and R. Sorrentino, ``Exploring the associations between drug side-effects and therapeutic indications,``J.Biomed.Inform.,vol. 51, Oct.2014.
[14] S. Mizutani, E. Pauwels, V. Stoven, S. Goto, and Y. Yamanishi, ``Relating drug protein interaction network with drug sideeffects,`` Bioinformatics, vol. 28, no. 18, 2012.
[15] Y. Yamanishi, E. Pauwels, and M. Kotera, ``Drug side-effect prediction based on the integration of chemical and biological spaces,`` J. Chem. Inf.Model., vol. 52, no. 12, 2012.
[16] M. Liu et al., ``Determining molecular predictors of adverse drug reactions with causality analysis based on structure learning,`` J. Amer. Med. Inform.Assoc., vol. 21, no. 2, 2014.
[17] F. Cheng et al., ``Adverse drug events: Database construction and in silicoprediction,`` J. Chem. Inf. Model., vol. 53, no. 4, pp. 744-752, 2013
[18] W. Zhang, H. Zou, L. Luo, Q. Liu, W. Wu, and W. Xiao, ``Predictingpotential side effects of drugs by recommender methods and ensemble learning,`` Neurocomputing, vol. 173, pp. 979-987, Jan. 2016.
[19] Y.-G. Chen, Y.-Y. Wang, and X.-M.Zhao, ``A survey on computational approaches to predicting adverse drug reactions,`` Current Topics Med.Chem., vol. 16, no. 30, 2016.
[20] D. P. Williams and B. K. Park, ``Idiosyncratic toxicity: The role of toxicophores and bioactivation,`` Drug Discovery Today, vol. 8, no. 22, pp. 1044-1050, 2003.
Citation
V. Jagadeesan, K. Palanivel, "Comparative Study of Supervised and Semi-Supervised Learning for Enhanced Drug Prediction," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.83-89, 2018.
An algorithm for Construction of Infectious Viroid
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.90-96, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.9096
Abstract
An algorithm have been undergone growth which make able most good selection into line looking for between 2 order, one is question sequence and another is man giving food, room and so on order looking for homologues has become a regularly order operation of biological orders on a 32 bit person computer. The high degree of matching position on man giving food, room and so on order and question subsequence is to make out quickly and clearly a group of order that is given question order be part of to An Algorithm is presented that takes more chances of the high degree of homology between such orders to make an into line of the matching regions. It does not have need of knowledge of a starting homology band, neither complex memory square measure, even for orders of several kilo bases, and it can overcome complex opening, nothing in between or different bands. This is a small, able to be taken about, effecting on one another, front end road map person one is going be married to be used to get out the fields, ranges of matching between man giving food, room and so on order and question subsequence. Since this road map have been written originally in the C language, it is possible to run in other PCs with small changes. The road maps run on the IBM personal knowledge processing machine, has need of 512k, without addition of hardware expect for thin, flat, round plate drives and printer. The execution is quite tightly, all the operations are does in less than one of seconds, depending on the needed work and on the order measure end to end. The going round in circles RNA smallest units of potato spindle under earth stem viroid was used as a question order & normal plant such as plant with soft red yellow fruit plant used as a man giving food, room and so on order input facts for making clear by reasoning the operation of the road map. The facts in these records may be used in many applications in future. The knowledge base is ready either on magnetic tape, on hanging down, not stiff diskettes, or online form. The main try to discover the highly diseased special field, range of disease and keep from opening this field, range to keep safe from viroid interaction keyword homology.
Key-Words / Index Term
Homology
References
[1.] Diener, T. O. 2001. The viroid: Biological oddity or evolutionary fossil? Adv. Virus Res. 57:137-184.
[2.] Garnsey, S. M., and Randles, J. W. 1987. Biological interactions and agricultural implications of viroids. Pages 127-160 in: Viroids and viroidlike pathogens. CRC Press, Boca Raton, FL, U.S.A.
[3.] Sogo, J. M., Koller, T. &Diener, T. 0. (1973) "Potato spindle tuber viroid. X. Visualization and size etermination by electron microscopy," Virology 55, 70-80.
[4.] O`Brien, M. J. &Raymer, W. B. (1964) "Symptomless hosts of the potato spindle tuber virus," Phytopathology 54, 1045- 1047.
[5.] Singh, R. P. (1973) "Experimental host range of the potato spindle tuber `virus`," Am. Potato J. 50, 111-123.
[6.] Hadidi, A. &Fraenkel-Conrat, H. (1974) "Host-range and structural data on common plant viruses," in andbook of Genetics,ed. King, R. C. (Plenum Press, New York), Vol. 2, pp.381-413.
[7.] Gross, H.J..Domdey, H., Lossow, C., Jank, P., Raba, M., Alberty, H., and Sanger, H.L. (1978) Nature 273, 203-208.
[8.] Gross, H.J., Krupp, G., Domdey, H., Raba, M., Jank, P., Lossow, C.,Alberty, H., Ranm, K. and Sanger, H.L. (1982) Eur. J. Biochem. 121,249-257.
[9.] Gross, H.J., Liebl, U., Alberty, H., Krupp, G., Domdey, H., Ramn, K., and Sanger, H.L. (1981) Bioscience Reports 1, 235-241.
[10.] Haseloff, J. and Symons, R.H. (1981) Nucleic Acids Res. 9, 2741-2752.
[11.] Visvader, J.E., Gould, A.R., Bruening, G.E., and Symons, R.H. (1982) FEBS Letters 137, 288-292.
[12.] Symons, R.H. (1981) Nucleic Acids Res. 9, 6527-6537.
[13. ]Haseloff, J., Mohamed, N.A., and Symons, R.H. (1982) Nature 299, 316-321.
[14.] van Wezenbeek, P., Vos, P., van Boom, J. and van Kammen, A. (1982) Nucleic Acids Res. 10, 794-7957.
[15.] Gross, H.J. and Riesner, D. (1980) AngewandteChemie (English edition) 19, 231-243.
[16.]Flores, R., Di Serio, F., and Hernández, C. (1997). Viroids: The nonencoding genomes. Semin. Virol. 8, 65–73.
[17] Kasschau, K., Xie, Z., Allen, E., Llave, C., Chapman, E.J., Krizan, K.A., and Carrington, J.C.(2003). P1/HC-Pro, a viral suppressor of RNA silencing, interferes with Arabidopsis development and miRNA function. Dev. Cell 4,205–217.
[18.] Hull, R.(2002). Matthew’s Plant Virology, 4th ed. (San Diego, CA: Academic Press).
[19] Storz, G. (2002). An expanding universe of noncoding RNAs. Science 296, 1260–1263.
[20.] Flores, R., Randles, J.W., Bar-Josef, M., and Diener, T.O.(2000).Subviral agents: Viroids. In Virus axonomy, Seventh Report of the International Committee on Taxonomy of Viruses, M.H.V. van Regenmortel, C.M. Fauquet, D.H.L. Bishop, E.B. Carstens, M.K. Estes, S.M. Lemon, J. Manilof, M.A. Mayo, D.J. McGeoch, C.R. Pringle, and R.B. Wickner, eds (San Diego, CA: Academic Press), pp. 1009–1024.
[21] Itaya, A., Matsuda, Y., Gonzales, R.A., Nelson, R.S., and Ding, B.(2002). Potato spindle tuber viroid strains of different pathogenicity induces and suppresses expression of common and unique genes in infected tomato. Mol. Plant-Microbe Interact. 15, 990–999.
[22.] Diener, T. 0. & Smith, D. R. (1973) "Potato spindle tuber viroid.IX. Molecular-weight determination by gel electrophoresis of formylated RNA," Virology 53,359-65.
[23.] Diener, T. 0. (1971) "Potato spindle tuber virus: A plant virus with properties of a free nucleic acid. Ill. Subcellular location of PSTV-RNA and the question of whether virions exist in extracts or in situ," Virology 43,75-89.
[24.] Davies, J. W., Kaesberg, P. &Diener, T. 0. (1974) "Potato spindle tuber viroid. XII. An investigation of viroid RNA as a messenger for protein synthesis," Virology 61, 281-286.
[25.]Flores, R., Di Serio, F., and Hernández, C. 1997. Viroids: The non-encoding
genomes. Seminars Virol. 8:65-73.
[26.]. Momma, T., and Takahashi, T. 1982. Ultrastructure of hop stunt viroid-infected leaf tissue. Phytopathol. Z. 104:211-221.
[27.].Paliwal, Y. C. and Singh, R. P. 1981. Cytopathological changes induced by potato spindle tuber viroid in Scopoliasinensis. Can. J. Bot. 59:677-682.
[28.].Semancik, J. S., and Vanderwoude, W. J. 1976. Exocortis viroid: Cytopathic effects at the plasma membrane in association with pathogenic RNA. Virology 69:719-726.
[29.].Wahn, K., Rosenberg-De Gomez, F., and Sänger, H. L. 1980. Cytopathic changes in leaf tissue of Gynuraaurantiacainfected with the viroid of citrus exocortis disease. J. Gen. Virol. 49:355-365.
[30.] Da Graça, J. V., and Martin, M. M. 1981. Ultrastructural changes in avocado leaf tissue infected with avocado sunblotch. Phytopathol. Z. 102:185-194.
[31.] Hari, V. 1980. Ultrastructure of Potato spindle viroid-infected tomato leaf tissue. Phytopathology 70:385-387.
[32.] Lawson, R. H., and Hearon, S. S. 1971. Ultrastructure of chrysanthemum stunt virus-infected and stunt-free mistletoe chrysanthemum. Phytopathology 61:653-656.
[33.]. Gadea, J., Mayda, M. E., Conejero, V., and Vera, P. 1996. Characterization of defense-related genes ctopically expressed in viroid-infected tomato plants. Mol. Plant-Microbe Interact. 9:409-415.
[34.] Garnsey, S. M., and Randles, J. W. 1987. Biological interactions and agricultural implications of viroids. Pages 127-160 in: Viroids and viroidlike pathogens. CRC Press, Boca Raton, FL, U.S.A.
[35.]Lucas, J., Camacho Henriquez, A. C., Lottspeich, F., Henschen, A., and Sänger, H. L. 1985. Amino acid sequence of the `pathogenesis-related` leaf protein p14 from viroid-infected tomato reveals a new type of structurally unfamiliar proteins. EMBO (Eur. Mol. Biol. Organ.) J.4:2745-2749.
[36.] Vera, P., and Conejero, V. 1990. Citrus exocortis viroid infection alters the in vitro pattern of protein phosphorylation of tomato leaf proteins.Mol. Plant-Microbe Interact. 3:28-32.
[37.]Hammond, R. W., and Zhao, Y. 2000. Characterization of a tomato protein kinase gene induced by infection by Potato spindle tuber viroid.Mol. Plant-Microbe Interact. 13:903-910.
Citation
A.K.Samanta, Syed Mahamud Hossein, Susanta Mandal, Shankar Kumar Roy, Apurba Mondal, "An algorithm for Construction of Infectious Viroid," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.90-96, 2018.
Self-Organizing Architecture In Data Centers For Power Management
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.97-104, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.97104
Abstract
The huge amount of data which can be stored and processed with the use of the internet has resulted in the capacity of data centers get bigger. This has resulted in the increase of the consumption of the power in data centers significantly and the management of power consumption in data centers has become essential. There are many techniques that have been proposed in that prospective. This paper highlights the need of managing the power in data centers, in order to reach the target of the efficiency of the power and observe several architectural techniques designed for its management of power. The detail of techniques is also given based on their behavior. The purpose of this paper is to provide intuition into the techniques to improve energy efficiency of data centers by using self-organizing architecture proposed and also to request the designers to continue producing solutions which can help for managing the dissipation of the power of data centers.
Key-Words / Index Term
Self-Organizing, virtualization, server consolidation, power consumption
References
[1] Bohrer, P., Elnozahy, E., Keller, T., Kistler, M., Lefurgy, C., McDowell, C., & Rajamony, R. (2014). The case for power management in Web servers. Norwell, MA, USA: Kluwer Academic Publishers.
[2] Bollen, J., & Heylighen, F. (2015). Algorithms for the Self-organization of Distributed, Multiuser Networks. Austrian: Cybernetics and Systems.
[3] Bonabeau, E., Dorigo, M., & Theraulaz, G. (2015). swarm Intelligence. USA: Oxford University Press.
[4] Elnozahy, E., Kistler, M., & Rajamony, R. (2015). Energy- Efficient server clusters. Power-Aware Computer Systems.
[5] Heylighen, F. (2015). The science of self-organization and Adaptivity. USA: Encyclopedia of life support. .
[6] Heylighen, F., & Gershenson, C. (2015). The meaning of self-organization in computing. IEE Intelligent Systems.
[7] Khargharia, B., Hariri, S., & Yousif, M. (2015). Autonomic power and performance management for computing systems. USA: Cluster Computing.
[8] Lefurgy, C., Rajamani, K., Rawson, F., Felter, W., Kistler, M., & Keller, T. (2015). Energy Management for commercial servers. USA: Computer 36 (12).
[9] Pinheiro, E., Bianchini, R., Carrera, E., & Heath, T. (2015). Load Balancing and unbalancing for power and performance in cluster-based systems. In proceedings of the Workshop on Compilers and Operating Systems for Low Power.
[10] White, R., & Abels, T. (2014). Energy Resorce management in the virtual data center. Washington, DC, USA: Proceedings of the International Symposium on Electronics and the Environment.
[11] Jun, C., Yunchuan , Q., Yu Ye, & Zhuo, T. (2015). A Live Migration Algorithm for Virtual Machine in a Cloud Computing Environment. Chine: UIC-ATC-ScalCom-CBDCom-IoP.
[12] Megha, Desai R.; Hiren, Patel B.;. (2015). Efficient Virtual Machine Migration in Cloud Computing. Fifth International Conference on Communication Systems and Networking Technologies.
[13] Mofijul, I. M. (2015). A Genetic Algorithm for Virtual Machine Migration in Heterogeneous Mobile Cloud Computing. Bangladesh.
[14] Pankajdeep , K., & Rani, A. (2015). Virtual Machine Migration in Cloud Computing. Internationale Journal of Grid Distribution Computing Vol.8.
[15] Rabiatul , A., Ruhani, R. A., Norliza, Z., & Mustaffa, S. (2015). Virtual Machine Migration Implementation in Load Balancing for cloud computing. Mara (UiTM).
Citation
Sebagenzi Jason, Suchithra. R, "Self-Organizing Architecture In Data Centers For Power Management," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.97-104, 2018.
Information Retrieval Mechanism for Dynamic Health Care
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.105-107, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.105107
Abstract
In spite of the commendable success of Big Data, there are still many challenges with regard to storage, retrieval, analysis and prediction. A framework was proposed for information retrieval by integrating ontology models with Big Data. Evaluation of this framework with different domain models is a invariable work to validate this model. This study applies the framework to health care data and thus identifies the strengths and weaknesses of the framework.
Key-Words / Index Term
MongoDB, Ontology
References
[1] Fr. Thaddeus, C. DharmaDevi, S. Deepa, “A Framework for ontology-driven big data applications”, IJAER, Vol.10 (No.79), ISSN 0973-4562, 2015.
[2] Karl Seguin, “The Little MongoDB for 2.6”.
[3] Chieh Ming Wu, “Comparisons between MongoDB and MS-SQL Databases on the TWC Website”.
[4] Natalya F.Noy and Deborah L. McGuinness, “Ontology Development”.
[5] Fr. Thaddeus, C. DharmaDevi, “Ontology Bridge for Information Retrieval”, in the Proceedings of International Conference on Computing Paradigms, 2016.
[6] Furkh Zeshan and Radziah Mohamada, “Medical Ontology in the Dynamic Healthcare Environment”, in Elsevier Ltd, 1877-0508, 2012.
[7] Sreekanth R, Golajapu Venu Madhava Rao, Srinivas Nanduri, “Big Data Electronic Health Records Data Management and Analysis on Cloud with MongoDB: A NoSQL Database”, in IJAGT, 2309-4893, 2015.
[8] Manju K.K, Srinitya G, “Analysis and Prognosis of Cancer with Big Data Analytics”, in IJRASET, 2321-9653, 2016.
[9] Muthulakshmi P and Udhayapriya S, “A Survey on Big Data Issues and Challenges” in IJCSC, Vol.6 (Issue 6), pp.1238-1244, 2018.
[10] Rabie A. Ramadan, “Big Data Tools-An Overview” in IJCSE, Vol.2 (125), 2456-4451, 2017.
Citation
C. Dharma Devi, S. Thaddeus, "Information Retrieval Mechanism for Dynamic Health Care," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.105-107, 2018.
Model Predictive Control of Shunt Active Filter for Power Quality Improvement in Distribution systems
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.108-115, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.108115
Abstract
The presence of nonlinear loads in the distribution system results in poor power quality parameters such as low total harmonic distortion (THD), poor distortion power factor and produces nearby communication interference. Shunt active power filters (SAF) are used for improving the power quality in high power distribution systems. The Shunt active filter controller has the low frequency voltage control loop for regulating the DC voltage of SAF capacitor and the faster acting current control loop for realizing the compensation current. Conventionally, the current and voltage controllers are realized by distinct hysteresis and PI controllers respectively. This paper discusses the finite control set Model Predictive Control (FCS- MPC) that realizes the voltage and current control of SAF. The reference current of SAF is calculated from the instantaneous PQ theory. The phase locked loop (PLL) is adopted for generating the reference value of compensation currents. A discrete time mathematical model of the SAF is presented and the design steps of FCS- MPC are explained. The control objectives such as compensation current error minimization and DC link voltage regulation are defined in cost functions. During each sampling interval, the controlled variables such as SAF current and DC voltage of the capacitor are predicted by the mathematical model. The predicted variables are assessed by the cost function minimization and the switching state that provides minimum cost function is selected and applied to the SAF. The performance of the FCS-MPC strategy for the current control of SAF is validated for sinusoidal and non-sinusoidal distribution system voltages in MATLAB-SIMULINK simulations.
Key-Words / Index Term
Active filter, Controller, Model predictive, Power quality, THD
References
[1] IEC 555-2: “Harmonics, equipment for connection to the public low voltage supply system”, 1990.
[2] IEEE 519: “IEEE recommended practices and requirements for harmonics control in electric power systems”, 1992.
[3] IEC 61000-3-2: “Limits for harmonic current emissions (equipment input current 16 A per phase)”, 2000.
[4] Jose Rodriguez, Patricio cortes, “Predictive control of power converters and electrical drives”, IEEE press,Wiley, England, pp.1-63, 2012.
[5] Hirofumi Akagi, “Instantaneous power theory and application to power conditioning”, IEEE press series on Power engineering,Wiley Inter science, USA, pp.41-80, 2007.
[6] Bose B.K, “Modern power electronics and AC drives”, Prentice hall PTR, USA, pp.210-233, 2002.
[7] Nunna Sushma, “ Comparative analysis of STATCOM and SVC for Reactive power enhancement in a long transmission line”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1579-1581, 2018.
[8] Siddharth singh, K., Chauhan, Mihir C.,Shah,“Analysis, design and digital implementation of a shunt active power filter with different schemes of reference current generation”, IET Power Electronics,Vol.7, Issue.3, pp.627-639, 2014.
[9] Afonso, L., Sepulveda Freitas, M.J., Martins, S, “p- q theory power components calculations”, IEEE inter national symp. Indus. Electronics, Brazil, pp.9-11, 2003.
[10] Luca Tarisciotti, Andrea Formentini, Alberto Gaeta, Marco Degano, “Model Predictive control for Shunt Active Filters withFixed Switching Frequency”, IEEE Transactions on Industry Applications, Vol.53, No.1, pp.296-304, 2017.
[11] Venkata Yaramasu, Marco Rivera, Bin Wu and Jose Rodriguez, “Model Predictive Current Control of Two-Level Four-Leg Inverters - Part I: Concept, Algorithm and Simulation Analysis”, IEEE Transactions on Power Electronics,Vol.28, No.7, pp.3459-3468, 2013.
[12] Ali M. Almaktoof, A. K. Raji, and M. T. E. Kahn, “Modeling and Simulation of Three-Phase Voltage Source Inverter Using a Model Predictive Current Control”, International Journal of Innovation, Management and Technology, Vol.5, No.1, pp.9-13, 2014.
[13] Rakhee Panigrahi, Bidyadhar Subudhi, Prafulla Chandra Panda, “Model predictive-based shunt active power filter with a new reference current estimation strategy”, IET Power Electron., Vol.8, Issue.2, pp.221-233, 2015.
[14] Marques G.D, “A Comparison of Active Power Filter Control Methods in Unbalanced and Non-sinusoidal Conditions” , In the Proceedings of IESC, IECON, Lisoba, pp.444-449, 1998.
[15] Oualid Aissa, Samir Moulahoum, Ilhami Colak, “Analysis, design and real time implementation of shunt active power filter for power quality improvement based on predictive direct power control”, International Conference on Renewable energy Appln., Birimingham, pp.79-84, 2016.
[16] Jose Rodriguez, Marian P. Kazmierkowski, Jos´e R. Espinoza, Haitham Abu-Rub, H´ector A. Young, and Christian A. Rojas, “State of the Art of Finite Control Set Model Predictive Control in Power Electronics”, IEEE Transactions on Industrial Informatics, Vol.9, No.2, pp.1003–1016, 2013.
Citation
S. Kumaresan, H. Habeebullah Sait, "Model Predictive Control of Shunt Active Filter for Power Quality Improvement in Distribution systems," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.108-115, 2018.
Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.116-122, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.116122
Abstract
Intrusion Detection systems (IDS) play an important role in network security and protection. Intrusion detection system uses either misuse or anomaly based techniques to identify malicious activities. To detect malicious activity, misuse detection systems is used to identify signatures or previously known malicious activities. On the other hand, anomaly based systems is used to identify unknown attacks. Intrusion detection system is now an essential tool to protect the networks by monitoring inbound and outbound activities and identifying suspicious patterns that may indicate a system attack. In recent years, some researchers have employed data mining techniques for developing IDS. In this paper, hybrid Particle Swarm Optimization (PSO) and Fuzzy c-means clustering for network Intrusion Detection is proposed to identify intrusion over NSL-KDD dataset. An attempt has been made to cluster the dataset into normal and the major attack categories i.e. DoS, R2L, U2R and Probe. The experimental results demonstrate the efficiency of the proposed approach.
Key-Words / Index Term
IDS, Fuzzy c-means Algorithm, PSO, Mutual Information, NSL-KDD Dataset
References
[1] Roger Storlokken (2007), “Labelling clusters in an anomaly based IDS by means of clustering quality indexes”, Department of Computer Science and Media Technology,Gjovik University College
[2] M.Shivakumar, R.Subalakshmi, S. Shanthakumari and S.John Joseph (2013), “Architecture for Network-Intrusion Detection and Response in open Networks using Analyzer Mobile Agents”, IJSRNSC, Vol.1, Issue 4, pp.3-7
[3] Raghunath ,B. R. and Mahadeo, S. N. (2008), “Network Intrusion Detection System (NIDS)”, International Conference on Emerging Trends in Engineering and Technology”, IEEE, 2008
[4] Benaicha, S. E., Saoudi, L., Guermeche, B., Eddine, S. and Lounis, O. (2014), “Intrusion detection system using genetic algorithm”, Science and Information Conference (SAI), IEEE-2014, pp. 564–568
[5] Manmohan Dagar and Rashmi Popli (2018), “Honeypots: Virtual Network Intrusion Monitoring System”, IJSRNSC, Vol.6, Issue 2, pp.45-49
[6] Zhao, Y. (2016), “Network intrusion detection system model based on data mining”,17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), IEEE, Shanghai, China, pp. 155–160
[7] D Gupta, S Singhai, S Malik and A Singh (2016), “Network intrusion detection system using various data mining techniques”, IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS)
[8] A.K. Siddique and T Farooqui,, (2017), “Improved Ensemble Technique based on Support Vector Machine and Neural Network for Intrusion Detection System”, International Journal Online of Science, 3(11)
[9] Harish, B.S. and Kumar, S.A., (2017), “Anomaly based intrusion detection using modified fuzzy clustering”, International Journal of Interactive Multimedia and Artificial Intelligence, 4(6), pp.54-59
[10] R.K. Das, M Panda, S Dash and S.S Dash (2018) “Application of Artificial Immune System Algorithms in Anomaly Detection”, Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 687-694
[11] A. Panigrahi and M.R. Patra (2018), “A Layered Approach to Network Intrusion Detection Using Rule Learning Classifiers with Nature-Inspired Feature Selection”, In Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 215-223
[12] R Sahani, C Rout, J.C. Badajena, A.K. Jena and H. Das (2018), “Classification of Intrusion Detection Using Data Mining Techniques”, Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 753-764
[13] A Ahmed, Dowlat Elngar, A. El, Mohamed, A. and Fayed, F. M. Ghaleb (2013), “A Real-Time Anomaly Network Intrusion Detection System with High Accuracy”, Inf. Sci. Lett. 2, No. 2, pp.49-56
[14] Lan, Yuan-Dong (2017), "A Hybrid Feature Selection based on Mutual Information and Genetic Algorithm.", Indonesian Journal of Electrical Engineering and Computer Science 7, No. 1, pp. 214-225.
[15] Nojun Kwak, , Choi, Chong-Ho (2002), “Input Feature Selection by Mutual Information Based on Parzen Window”, IEEE transactions on pattern analysis and machine intelligence, Vol. 24, no. 12
[16] Tavallaee, Mahbod, Bagheri, Ebrahim, Lu, Wei and Ali A. Gorbani (2009), “A Detailed Analysis of the KDD CUP 99 Dataset”, In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009, IEEE, pp. 1-6
[17] Revathi, S. and Malathi, A. (2013), “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection”, IJERT, 2013, Vol. 2 Issue 12.
[18] P.S. Bhattacharjee, S. A. Begum, and Md, Fujail Abul Kashim (2017), “A Comparison of Intrusion Detection by K-Means and Fuzzy C-Means Clustering Algorithm over the NSL-KDD Dataset”, IEEE-ICCIC 2017
[19] Cang, Shuang (2011), “A Mutual Information based Feature Selection Algorithm”, 4th International Conference on Biomedical Engineering and Informatics (BMEI), IEEE, pp. 2241-2245
[20] Ren Wuling, Cao, Jinzhu and Wu, Xianjie (2009), “Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm”, In Intelligent Information Technology Application IITA 2009, Third International Symposium , IEEE,Vol. 3, pp. 19-22
Citation
Partha Sarathi Bhattacharjee, Arif Iqbal Mozumder, Shahin Ara Begum, "Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.116-122, 2018.