Energy Generation From Footsteps Using Piezoelectric Sensors
Technical Paper | Journal Paper
Vol.9 , Issue.6 , pp.54-58, Jun-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i6.5458
Abstract
Human race requires energy at very rapid rate for their living and wellbeing from the time of their arrival on this planet, because of this reason power resources have been worn out and enervated. One of the sectors that have gained much interest is devices that are able to convert ambient energy into electrical energy. This paper presents an experimental model for harvesting kinetic energy of footsteps using Piezoelectric. Piezoelectric materials are promising for energy harvesting from the force generated by human footsteps, into a useful form of electrical energy. Installing piezoelectric tile (Piezotile), we can achieve the little amount of power, a single piezotile, which has the capability to produce a maximum of 5-8 volts, eventually installing numerous piezotile, will provide us with much voltage, and application of additional current source we can generate more amount of power . Piezotile is one kind of piezoelectric transducer which transforms foot stress into electric energy. From the stored energy in the battery, the power is supplied to Radio-frequency identification (RFID) as it uses electromagnetic field to automatically identify and track tags attached to objects. And hence only authorized person with tag can login to RFID and use the energy for various applications
Key-Words / Index Term
Footsteps, Piezoelectric tile, Power Generations; Renewable Energy; energy harvesting, Piezoelectric sensors, RFID.
References
[1]. P. Sirigireddy and P. B. Eladi, "Numerical Design of
Novel piezoelectric generating structure that effectively utilizes the force generated from human motion," 2020 IEEE International Conference on Power Electronics, Smart Grid and Renewable Energy (PESGRE2020), Cochin, India, pp.1-6, 2020, doi:10.1109/PESGRE45664.2020.9070599.
[2]. K. Somalaraju, J. G. Singh, "Enhancement of Power
Generation From Electromagnetic Scavenging Tile", 2020 International Conference on Power Electronics & IoT
Applications in Renewable Energy and its Control (PARC), Uttar Pradesh, India, pp.405-410, 2020, doi:10.1109/PARC49193.2020.236638.
[3]. M. R. Ruman, M. Das and S. M. Istiaque Mahmud, "Human Footsteps for Energy Generation by using Piezoelectric Tiles", Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India, pp.1-6, 2019, doi:10.1109/i-PACT44901.2019.8960068.
[4]. T. B. A. Akib, H. Mehedi and M. Nazmuschayadat,
"Electrical Energy Harvesting from the Foot Stress On Foot Overbridge Using Piezoelectric Tile," 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), Dhaka, Bangladesh, pp. 1-5, 2019, doi:10.1109/ICASERT. 2019. 8934544.
[5]. D. Dalabeih, B. Haws and S. Muhtaseb, "Harvesting kinetic energy of footsteps on specially designed floor tiles," 2018 9th International Renewable Energy Congress (IREC), Hammamet, pp.1-4, 2018, doi:10.1109/IREC.2018.8362566.
[6]. Kamboj, A. Haque, A. Kumar, V. K. Sharma and A. Kumar, "Design of footstep power generator using piezoelectric sensors," 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, pp.1-3, 2017, doi:10.1109/ICIIECS.2017.8275890.
[8]. Divyakumar. N, Ganesh. V. S, Vishnuraju. G, Yogesh. P and Sangappa. S. B, “Production of Electricity through Pressure Based Sensors”, 2016 International Journal of Computer Sciences and Engineering (IJCSE), India, Vol.04, Special Issue 03, pp. 188-191, 2016.
[7]. R. M. Veena, B. H. Reddy and S. M. Shyni, "Maximum energy harvesting from electromagnetic micro generators by footsteps using photo sensor", 2016 International Conference on Computation of Power, Energy Information and Communication (ICCPEIC), Chennai, India, pp.757-761, 2016, doi:10.1109/ICCPEIC.2016.7557321.
[8]. T. R. Deshmukh, “Design and analysis of a Mechanical Device to harvest energy from human footstep motion”, International Journal of Innovative and Emerging Research in Engineering, Vol.3, Special Issue 1, 2016.
[9]. Miss. Mathane Nitashree V, “Foot Step Power
Generation Using Piezoelectric Material”, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), Vol.4, Issue 10, 2015.
[10]. Jose Ananth Vino, “Power Generation Using Foot
Step”, International Journal of Engineering Trends and Technology (IJETT), Vol.1, Issue.2, 2011.
Citation
Somashekhar G.C., Anu Reddy K.H, Bini Mariam Biju, Prateeka L., "Energy Generation From Footsteps Using Piezoelectric Sensors," International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.54-58, 2021.
Uncertainty Handling In Big Data Analytics: Survey, Opportunities and Challenges
Survey Paper | Journal Paper
Vol.9 , Issue.6 , pp.59-63, Jun-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i6.5963
Abstract
Big Data analysis and processing is a popular tool for Artificial Intelligence and Data Science to extract applicable solution from data across a broad range of application domains. Even though Big data is in the mainstream of operations as of 2020, With the increase in data processing and storage capacity, a large amount of data is available and because of that potential issues or challenges the researchers can address, some of these issues overlap with the data science field. One of the key issue is the inevitable existence of uncertainty in stored or missing values. Any uncertainty in a source causes its disadvantageous, complexity or inapplicability to use. It is importance to ensure the reliability and a value of data source. That is why it is crucial to eliminate uncertainty or to lower uncertainty influence because data without any analysis does not have much value. In this paper we review previous work in big data analytics and Survey of many theories and techniques which have been developed to model its various forms. We have described several common techniques such as Bayesian model and fuzzy set, Shannon’s entropy. We present a discussion of open challenges and future directions for handling and eliminating uncertainty in this profile.
Key-Words / Index Term
Big Data, Data Sciences, Data Uncertainty, Uncertainty Elimination, Machine learning, NLP, Computational Intelligence.
References
[1] Andrii Berko,Vladyslav Alieksieiev, “A Method to Solve Uncertainty Problem for Big Data Sources, IEEE Second International Conference on Data Stream Mining & Processing, August 21-25, 2018, Lviv, Ukraine.
[2] Scott Bruce, , Zeda Li, Hsiang-Chieh Yang, Subhadeep Mukhopadhyay ” Nonparametric Distributed Learning Architecture for Big Data: Algorithm and Applications” IEEE TRANSACTIONS ON BIG DATA, NOVEMBER 2017.
[3] K. Sree Divya, P.Bhargavi, S. Jyothi,” Machine Learning Algorithms in Big data Analytics” INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING • January 2018.
[4] Reihaneh H. Hariri, Erik M. Fredericks and Kate M. Bowers,” Uncertainty in big data analytics: survey, opportunities, and challenges” Hariri et al. J Big Data Springer open source journal 2019.
[5] Athmaja S, Hanumanthappa M, Vasantha Kavitha,” A SURVEY OF MACHINE LEARNING ALGORITHMS FOR BIG DATA ANALYTICS” IEEE International Conference on Innovations in Information, Embedded and Communication Systems 2017.
[6] M. U. Bokhari, M. Zeyauddin and M. A. Siddiqui, “An effective model for big data analytics”, 3rd International Conference on Computing for Sustainable Global Development, pp. 3980-3982, 2016.
[7] Monali R. Baviskar, Priya N Nagargoje, Priyanka A. Deshmukh, Rina R. Baviskar, “A Survey of Data Science Techniques and Available Tools”, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 p-ISSN: 2395-0072
[8] R. Farias and E. Clua,” Parallel Image Segmentation using Reduction-Sweeps on Multi-core Processors and GPUs IEEE” 26th Conference on Graphics, Patterns and Images (SIBGRAPI), Rio de Janeiro, Brazil.
[6] Z. Yang, Y. Zhu, and Y. Pu, Parallel image processing based on CUDA, In Proceedings of the 2008 ACM International Conference on Computer Science and Software Engineering - Volume 03 (CSSE ’08) , 2008, Vol. 3, pp. 198-201.
[7] J. L. Berral-Garcia, “A quick view on current techniques and machine learning algorithms for big data analytics”, 18th International Conf. on Transparent Optical Networks, pp.1-4.
2016. DOI: 10.1109/ICTON.2016.7550517.
[8] B. Kulis and M. I. Jordan A New k-Means algorithms via Bayesian Non parametrics Proceedings of the 29th International Conference on Machine Learning, Edinburgh, Scotland, UK, 2012.
[9] N. Marz , and J. Warren, Big Data: Principles and best practices of scalable real time data systems. Manning Publications, 2015.
[10] J. Chen, D. Dosyn, V. Lytvyn, and A. Sachenko, “Smart Data Integration by Goal Driven Ontology Learning. Advances in Big Data,” Advances in Intelligent Systems and Computing, Springer.
[11] Saidulu D, Sasikala R. Machine learning and statistical approaches for Big Data: issues, challenges and research directions. Int J Appl Eng Res. 2017;12(21):11691–9.
[12] J. L. Berral-Garcia, “A quick view on current techniques and machine learning algorithms for big data analytics”, 18th International Conf. on Transparent Optical Networks, pp.1-4, 2016. DOI: 10.1109/ICTON.2016.7550517.
[13] Parmar, V. & Gupta, I., 2015. Big data analytics vs Data Mining analytics. IJITE, 3(3), pp.258–263.
[14] G. Cavallaro, M. Riedel, M. Richerzhagen, J. A. Benediktsson, and A. Plaza, "On Understanding Big Data Impacts in Remotely Sensed Image Classification Using Support Vector Machine Methods," IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 8, pp. 4634-4646, 2015.
[15] Joseph D. Prusa* andTaghi M. Khoshgoftaar, ”Improving deep neural network design with new text data representations” J Big Data (2017) 4:7DOI 10.1186/s40537-017-0065-8.
[16] Karl Weiss* , Taghi M. Khoshgoftaar and Ding Ding Wang Weiss,” A survey of transfer learning” et al. J Big Data (2016) 3:9 DOI 10.1186/s40537-016-0043-6.
[17] Priya nagargoje, vandna jagtap, “time-efficient fracture detection using multi-core parallel processing”, international journal of current engineering and scientific research (ijcesr) issn (print): 2393-8374, (online): 2394-0697, volume-3, issue-9, 2016.
Citation
Priya Nagargoje, Monali Baviskar, "Uncertainty Handling In Big Data Analytics: Survey, Opportunities and Challenges," International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.59-63, 2021.
Review of Chronic Inflammation and long term effects on health using Machine Learning Algorithms
Review Paper | Journal Paper
Vol.9 , Issue.6 , pp.64-71, Jun-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i6.6471
Abstract
The purpose of this review is to find how today`s generation impacted with chronic inflammation and its effects on health and long-term diseases using Machine Learning Algorithms. These diseases are found to be appeared after long time suffering with chronic inflammation. By detecting it early and taking lifestyle changes and healthy diet could potentially avoid the diseases like diabetes, cardiovascular diseases, cancer, arthritis, and bowel diseases. Autoimmune disease symptoms can be minimized by identifying inflammation levels and by taking precautionary measures at any stage of the patient. There are various inflammation markers to detect inflammation in the body by simple blood tests like CRP, ESR which are inexpensive and provide early disease detective mechanisms. These reports can be input to Machine Learning algorithms and train the system to help the patients to identify inflammation levels and alert them to take appropriate actions to prevent further damage from diseases on human organs.
Key-Words / Index Term
Machine Learning, algorithm, Inflammation, Autoimmune
References
[1]. A. Crimarco, et al., “Baseline Markers of Inflammation, Lipids, Glucose, and Dietary Inflammatory Index Scores Do Not Differ between Adults Willing to Participate in an Intensive Inflammation Reduction Intervention and Those Who Do Not.” Nutrition and Health, vol. 25, No. 1, pp. 9–19, 2019.
[2]. H. Clevers, “At the Crossroads of Inflammation and Cancer”, Cell Press, Vol. 118, pp. 671–674, 2004.
[3]. A. M. Minihane, “Low-grade inflammation, diet composition and health: current research evidence and its translation”, British Journal of Nutrition, Vol. 114, pp. 999–1012, 2015.
[4]. M.C. Faleiros et al., “Machine learning techniques for computer-aided classification of active inflammatory sacroiliitis in magnetic resonance imaging”, Advances in Rheumatology, Vol. 60, No. 25, pp. 1-3, 2020.
[5]. B. F. Erickson, P. Korfiatis, Z. Akkus, T.L. Kline, “Machine Learning for Medical Imaging", Radio Graphics, Vol. 37, No. 2, pp.505-515, 2017.
[6]. T. D. Maarseveen, “Machine Learning Electronic Health Record Identification of Patients with Rheumatoid Arthritis: Algorithm Pipeline Development and Validation Study”, JMIR Medical Informatics, Vol. 8, No. 11, pp. 1-3, 2020.
[7]. Z. Odibat, S. Momanib, H. Xuc, “A reliable algorithm of homotopy analysis method for solvingnonlinear fractional differential equations”, Elsevier Applied Mathematical Modelling, Vol. 34, pp. 593–600, 2010.
[8]. S. Jung, W. J. Yun, J. Kim, J. Kim, “Coordinated Multi-Agent Deep Reinforcement Learning for Energy-Aware UAV-Based Big-Data Platforms”, Electronics, Vol. 10, No. 543, pp. 1-5, 2021.
[9]. K. Pieszko et al., “Machine-learned models using hematological inflammation markers in the prediction of short-term acute coronary syndrome outcomes”, Journal of Translational Medicine, Vol. 16, No. 334, pp. 1-3, 2018.
[10]. N. S. S. Tabib et al., “Big data in IBD: big progress for clinical practice.”, Gut, Vol. 69, No. 8, pp. 1520-1532, 2020.
[11]. G. Chartrand et al., “Deep Learning: A Primer for Radiologists”. Radio Graphics, Vol. 37, pp.2113–2131, 2017.
[12]. R. Forlano et al., “High-Throughput, Machine Learning-Based Quantification of Steatosis, Inflammation, Ballooning, and Fibrosis in Biopsies from Patients with Nonalcoholic Fatty Liver Disease”, Clinical Gastroenterology and Hepatology, Vol. 18, No. 9, pp. 2081-2090, 2020.
[13]. L. Yu, J. He, L. Wang, H. Yi, “Inflammatory profiles revealed the dysregulation of cytokines in adult patients of HFMD”, International Journal of Infectious Diseases, Vol. 79, pp.12–20, 2019.
[14]. B. Kegerreis et al., “Machine learning approaches to predict lupus disease activity from gene expression data”. Scientific Reports, Vol. 9, No. 9617, pp. 1-3, 2019.
[15]. S. Le et al., “Supervised machine learning for the early prediction of acute respiratory distress syndrome (ARDS)”, Journal of Critical Care, Vol. 60, No. 102, pp. 1-3, 2020.
[16]. A. M. D. L. Villehuchet et al., “A machine-learning approach to the prediction of oxidative stress in chronic inflammatory disease”, Redox Report, Vol.14, No.1, pp. 23-33, 2009.
[17]. K. Kim, I. Tagkopoulos, “Application of machine learning in rheumatic disease research”, The Korean Journal of Internal Medicine, Vol. 34, No. 4, pp. 708–722, 2019.
[18]. I.S. Stafford et al., “A systematic review of the applications of artificial intelligence and machine learning in autoimmune diseases”. npj Digital Medicine Vol. 3, No. 30, pp.1-3, 2020.
[19]. B. Rush et al. “Applying machine learning to continuosly monitored physiological data.” Journal of clinical monitoring and computing, Vol. 33, No. 5, pp. 887–893, 2019.
[20]. P. K. Kondeti et al. “Applications of machine learning techniques to predict filariasis using socio-economic factors”, Epidemiology and Infection, Vol. 147, No. 260, pp.1-11, 2019.
[21]. A. Romagnoni et al., “Comparative performances of machine learning methods for classifying Crohn Disease patients using genome-wide genotyping data”, Scientific Reports, Vol. 9, No. 10351, pp. 1-3, 2019.
[22]. E. O. Dana et al., “Identification of Three Rheumatoid Arthritis Disease Subtypes by Machine Learning Integration of Synovial Histologic Features and RNA Sequencing Data”, Arthritis Rheumatol., Vol. 70, No. 5, pp. 690-701, 2018.
[23]. A. Awaysheh et al., “Evaluation of supervised machine-learning algorithms to distinguish between inflammatory bowel disease and alimentary lymphoma in cats.”, Journal of Veterinary Diagnostic Investigation, Vol. 28, No. 6, pp. 679-687, 2016.
[24]. I. R. Cohen, S. Efroni, “The Immune System Computes the State of the Body: Crowd Wisdom, Machine Learning, and Immune Cell Reference Repertoires Help Manage Inflammation”, Frontiers in immunology, Vol. 10, No. 10, pp. 1-3, 2019.
[25]. A. Aravind et al., “Machine Learning Technology for Evaluation of Liver Fibrosis, Inflammation Activity and Steatosis (LIVERFAStTM)”, Journal of Intelligent Learning Systems and Applications, Vol. 12, pp.31-49, 2020.
[26]. D. Panaretos et al., “A comparison of statistical and machine-learning techniques in evaluating the association between dietary patterns and 10-year cardiometabolic risk (2002–2012): the ATTICA study”, British Journal of Nutrition, Vol. 120, pp.326-334, 2018.
[27]. C. M. Lynch et al., “Prediction of lung cancer patient survival via supervised machine learning classification techniques”, Int J Med Inform, Vol. 108, pp. 1–8, 2017.
[28]. J. Neumann et al., “Chronic Inflammation Under the Microscope”, Microscopy Today, Vol. 24, No. 6, pp. 38–45, 2016.
[29]. E. Dean, R. G. Hansen, “Prescribing Optimal Nutrition and Physical Activity as “First-Line” Interventions for Best Practice Management of Chronic Low-Grade Inflammation Associated with Osteoarthritis: Evidence Synthesis”, Hindawi Publishing Corporation Arthritis, Vol. 2012, Article ID 560634, 2012.
[30]. B. CHASSAING, A. T. GEWIRTZ, “Gut Microbiota, Low-grade Inflammation, and Metabolic Syndrome”. Toxicologic Pathology, Vol. 42, pp. 49-53, 2014.
[31]. J. Lötsch et al., “Machine-learning based lipid mediato serum concentration patterns allow identification of multiple sclerosis patients with high accuracy”, Scientific Reports, Vol. 8, No. 14884, pp. 1-3, 2018.
[32]. A. Jaiswal, R. Kumar, “Review of Machine Learning Algorithm on Cancer Classification for Cancer Prediction and Detection”, The International journal of analytical and experimental modal analysis, Vol. XI, No. XII, pp. 1-3, 2019.
[33]. T. Panch, P. Szolovits, R. Atun, “Artificial intelligence, machine learning and health systems”, Journal of Global Health, Vol. 8, No. 2, 2018.
[34]. N. Perakakis, A. Yazdani, G. E. Karniadakis, C. Mantzoros, “Omics, big data and machine learning as tools to propel understanding of biological mechanisms and to discover novel diagnostics and therapeutics”, Metabolism, Vol. 87, pp. A1-A9, 2018.
[35]. J. Hu, H. Niu, J. Carrasco, B. Lennox, F. Arvin, “Voronoi-Based Multi-Robot Autonomous Exploration in Unknown Environments via Deep Reinforcement Learning”, IEEE Transactions on Vehicular Technology, Vol. 69, No. 12, pp. 14413-14423, 2020.
[36]. S. Huang et al., “Applications of Support Vector Machine (SVM) Learning in Cancer Genomics”, Cancer Genomics & Proteomics, Vol. 15, pp. 41-51, 2018.
[37]. J. Tolles, W. J. Meurer, “Logistic Regression: Relating Patient Characteristics to Outcomes”, JAMA Guide to Statistics and Methods, Vol. 316, No. 5, pp. 533-4, 2016.
[38]. Y. Li, H. G. Hong, Y. Li, “Multiclass Linear Discriminant Analysis with Ultrahigh-Dimensional Features”, Biometrics, Vol. 75, No. 4, pp. 1086–1097, 2019.
[39]. G. J. McLachlan, “Discriminant Analysis and Statistical Pattern Recognition”, A John Wiley & Sons Inc. Publication, Hoboken, New Jersey, 2004, ISBN 978-0-471-69115-0, MR 1190469.
[40]. X. Wu et al., “Top 10 algorithms in data mining”, Knowl Inf Syst, Vol. 14, pp. 1–37, 2008.
[41]. S. M. Piryonesi, T. E. El-Diraby, “Data Analytics in Asset Management: Cost-Effective Prediction of the Pavement Condition Index”, Journal of Infrastructure Systems, Vol. 26, No. 1, pp. 1-3, 2019.
[42]. H. Rajaguru, S. Chakravarthy S R, “Analysis of Decision Tree and K-Nearest Neighbor Algorithm in the Classification of Breast Cancer”, Asian Pac J Cancer Prev., Vol. 20, No. 12, pp. 3777-3781, 2019.
[43]. Y. Chen, Y. Lin, C. Kung, M. Chung, I. Yen, “Design and Implementation of Cloud Analytics-Assisted Smart Power Meters Considering Advanced Artificial Intelligence as Edge Analytics in Demand-Side Management for Smart Homes”, Sensors, Vol. 19, No. 2047, 2019.
[44]. G. Chechik, V. Sharma, U. Shalit, S. Bengio, “Large Scale Online Learning of Image Similarity Through Ranking”, Journal of Machine Learning Research, Vol. 11, pp.1109–1135, 2010.
[45]. T. Hastie, R. Tibshirani, J. Friedman, “The Elements of Statistical Learning: Data mining, Inference, and Prediction”, Springer, New York, pp. 485–586, 2009, ISBN 978-0-387-84857-0.
[46]. Y. Ye, X. Liu, Q. Liu, J. Yin, “Consensus Kernel K-Means Clustering for Incomplete Multiview Data”, Computational intelligence and neuroscience, Vol. 2017, No. 3961718, pp. 1-11, 2017.
[47]. U. U. Tamhane et al, “Association between admission neutrophil to lymphocyte ratio and outcomes in patients with acute coronary syndrome”, The American journal of cardiology, Vol. 102, No. 6, pp. 653-7, 2008.
[48]. J. He, J. Li, Y. Wang, P. Hao, Q. Hua, “Neutrophil-to-lymphocyte ratio (NLR) predicts mortality and adverse-outcomes after ST-segment elevation myocardial infarction in Chinese people”, International journal of clinical and experimental pathology, Vol. 7, No. 7, pp. 4045-56, 2014.
[49]. C. Maaser et al., “ECCO-ESGAR guideline for diagnostic assessment in IBD Part 1: initial diagnosis, monitoring of known IBD, detection of complications”, J Crohn’s Colitis, Vol. 13, No. 2, pp. 144–64, 2019.
[50]. A. Sturm et al., “ECCO-ESGAR guideline for diagnostic assessment in IBD Part 2: IBD scores and general principles and technical aspects”, J Crohn’s Colitis, Vol. 13, No. 3, pp. 273–84, 2019.
[51]. H. W. Hernandez et al., “High Throughput and Computational Repurposing for Neglected Diseases”, Pharm Res., Vol. 36, No. 27, pp. 1-20, 2018.
[52]. I. G. Medeiros, J. C. Xavier and A. M. P. Canuto, “Applying the Coral Reefs Optimization algorithm to clustering problems”, 2015 International Joint Conference on Neural Networks (IJCNN), Killarney, Ireland, pp. 1-8, 2015.
[53]. A. Mouzaki et al., “Immune Parameters That Distinguish Multiple Sclerosis Patients from Patients with Other Neurological Disorders at Presentation”, PLOS One, Vol. 10, No, 8, pp. 1-3, 2015.
[54]. A. K. Dwivedi, S. A. Imtiaz, E. rodriguez-villegas, “Algorithms for Automatic Analysis and Classification of Heart Sounds—A Systematic Review”, Vol. 7, No. 724334, pp. 8316-8340, 2019.
[55]. T. Alsuliman, D. Humaidan, L. Sliman, "Machine learning and artificial intelligence in the service of medicine: Necessity or potentiality?", Current Research in Translational Medicine, Vol. 68, No. 4, pp. 245-251, 2020.
[56]. S. Kim, J. Gil, “Research paper classification systems based on TF?IDF and LDA schemes”, Human-Centric Computing and Information Sciences, Vol. 9, No. 30, pp. 1-19, 2019.
Citation
Abeda Begum, Rajeev Kumar, "Review of Chronic Inflammation and long term effects on health using Machine Learning Algorithms," International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.64-71, 2021.
Review Paper On Image Inpainting Techniques
Review Paper | Journal Paper
Vol.9 , Issue.6 , pp.72-76, Jun-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i6.7276
Abstract
The process of reimposing the missing pixels from the flawed image and remove unwanted object is referred as Image inpainting. The most prominent purpose of the inpainting algorithm is to put back distorted and unpleasant regions and fill holes using natural method. Some common application of this technique includes remove unwanted object, restoring photos, photo retouching, or remove unwanted text, logo, stamps, copyright from the images. Based on the background information, image inpainting restore the damage part of the image by filling missing or corrupted data in the image. The restored image, which is produced as the result of applying inpainting technique will provide more realistic and more pleasant than compared to the original image. The attempt of recovering scene details blocked by visible parts is called disocclusion, which is viewed as an important part in image and depth inpainting. Holes are the occluded and impaired parts which is to be restored in an image. Hierarchical super-resolution-based, diffusion based, hybrid inpainting, texture synthesis based and exemplar-based method are used for inpainting. This paper gives brief review of the existing image inpainting approaches. This paper presents a brief survey of different image inpainting techniques and provides a relative comparison between these techniques for inpainting.
Key-Words / Index Term
ImageInpainting,RegionFilling,ObjectFilling,Holes
References
[1].C. Guillemot and O. Le Meur, “Image inpainting: Overview and recent advances,” IEEE Signal Process. Mag., vol. 31, no. 1, pp. 127144, Jan. 2014.
[2].Komal s Mahajan, M.B. Vaidya, “Image in Painting Techniques: A survey”, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Vol. 5, No. 4 (Sep-Oct. 2012), Pp 45-49.
[3].K. Sangeetha, Dr. P. Sengottuvelan, E. Balamurugan,”Combined Structure and Texture Image Inpainting Algorithm forNatural Scene Image Completion.” - Journal of Information Engineering and Applications. ISSN 2224-5758 (print) ISSN 2224-896X Vol 1, No.1, 2011.
[4].M. Daisy, P. Buyssens, D. Tschumperl, and O. Lzoray, “A smarter exemplar-based inpainting algorithm using local and global heuristics for more geometric coherence,” in Proc. IEEE ICIP, Oct. 2014,pp. 4622-4626.
[5].A. Criminisi, P. Prez, and K. Toyama, “Region filling and object removal by exemplar-based image inpainting,” IEEE Trans. Image Process., vol. 13, no. 9, pp. 12001212, Sep. 2004
[6].O. Le Meur, J. Gautier, and C. Guillemot, “Examplar-based inpainting based on local geometry,” in Proc. 18th IEEE ICIP, Brussels, Belgium, Sep. 2011, pp. 34013404
[7].A. Wong and J. Orchard, “A nonlocal-means approach to exemplarbased inpainting,” in Proc. 15th IEEE Int. Conf. Image Process. (ICIP), Oct. 2008, pp. 26002603.
[8].O. Le Meur, M. Ebdelli, and C. Guillemot, “Hierarchical superresolutionbased inpainting,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 37793790, Oct. 2013
[9]M. Bertalmio, L. Vese, G. Sapiro and S. Osher, "Simultaneous Structure and Texture Image Inpainting," IEEE Transaction on Image Processing, vol. 12, no. 8, August 2003, pp. 882-889.
[10].H. Li, W. Luo, J. Huang,” Localization of diffusion-based inpainting in digital images”, IEEE Transactionson Information Forensics and Security 12 (12) (2017) 3050-3064.
[11].Gunamani Jena, "Restoration of Still Images using Inpainting techniques”, International Journal of Computer Science & Communication, Vol. 1, No. 2, Pp. 71 -74, July - December 2010.
[12].Komal s Mahajan , Prof. M. B. Vaidya, "Image in Painting Techniques: A survey", IOSR Journal of Computer Engineering (IOSRJCE) Volume 5, Issue 4 (Sep-Oct. 2012), PP 45-49
[13]S. Rane, G. Sapiro, and M. Bertalmio, "Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications," IEEE Transaction on Image Processing, vol. 12, no. 3, March 2003, pp. 296-303.
[14].T. Ruzic, A. Pizurica, "Context-Aware Patch-Based Image Inpainting Using Markov Random Field Modeling," IEEE Transactions on Image Processing, vol. 24, 2015, pp. 444-456
[15]. Qureshi, Muhammad & Deriche, Mohamed & Beghdadi, Azeddine & Amin, Asjad. (2017). A critical survey of state-of-the-art image inpainting quality assessment metrics. Journal of Visual Communication and Image Representation.
[16].R. T. Pushpalwar and S. H. Bhandari, "Image Inpainting Approaches - A Review," 2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, , pp. 340-345, 2016
[17].Zhang, N., Ji, H., Liu, L. “. Exemplar-based image inpainting using angle-aware patch matching”. J Image Video Proc. 2019, EURASIP Journal on Image and Video Processing 70 (2019).
Citation
Anushree Santosh, Vinod P.R., Jyothirmayi Devi C., "Review Paper On Image Inpainting Techniques," International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.72-76, 2021.
Sentiment Analysis with Machine Learning Techniques and Improved J48 Decision Tree Technique
Research Paper | Journal Paper
Vol.9 , Issue.6 , pp.77-82, Jun-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i6.7782
Abstract
Last few years the area of social media , e- commerce, social field has seen a large increase in the web world. The product view became the basic need of today’s world . The product reviews channel the customers and help them in making decisions regarding various available products which otherwise would bemuse them. This circumstances opened a new area of research called Opinion Mining and Sentiment Analysis. sentiment analysis is the process of determining the emotion ,feeling, and views of the people towards the piece of text, that comes under the area of blog view, article review , product review, social media buzzing etc. This research paper presents machine learning methods for detecting the sentiment expressed by movie reviews. The semantic point of reference of a review can be positive or negative.
Key-Words / Index Term
Sentiment analysis, sentiment analysis techniques, Experimental result, comparative analysis, conclusion
References
[1] P. Domingos and M. Pazzani, “On the optimality of the simple bayesian classifier under zero-one loss,” Machine Learning, vol. 29, no. 2-3, pp. 103–130, 1997.
[2] L. Barbosa and J. Feng, “Robust sentiment detection on twitter from biased and noisy data,” in Proceedings of the 23rd International Conference on Computational Linguistics: Posters, pp. 36–44, Association for Computational Linguistics, 2010.
[3] A .Pak and P. Paroubek. „Twitter as a Corpus for Sentiment Analysis and Opinion Mining". In Proceedings of the Seventh Conference on International Language Resources and Evaluation, 2010, pp.1320-1326.
[4] R. Xia, C. Zong, and S. Li, “Ensemble of feature sets and classification algorithms for sentiment classification,” Information Sciences: an International Journal, vol. 181, no. 6, pp. 1138–1152, 2011
[5] Melville, Wojciech Gryc, “Sentiment Analysis of Blogs by Combining Lexical Knowledge with Text Classification”, KDD?09, June 28–July 1, 2009, Paris, France.Copyright 2009 ACM 978-1-60558- 495-9/09/06.
[6] Rui Xia, Chengqing Zong, Shoushan Li, “Ensemble of feature sets and classification algorithms for sentiment classification”, Information Sciences 181 (2011) 1138–1152
[7] Ziqiong Zhang, Qiang Ye, Zili Zhang, Yijun Li, “Sentiment classification of Internet restaurant reviews written in Cantonese”, Expert Systems with Applications xxx (2011) xxx–xxx
[8] Songbo Tan, Jin Zhang, “An empirical study of sentiment analysis for chinese documents”, Expert Systems with Applications 34 (2008) 2622–2629.
[9] Qiang Ye, Ziqiong Zhang, Rob Law, “Sentiment classification of online reviews to travel destinations by supervised machine learning approaches”, Expert Systems with Applications 36 (2009) 6527– 6535.
[10] on SMEUREANU, Cristian BUCUR, “Applying Supervised Opinion Mining Techniques on Online User Reviews”, Informatica Economic? vol. 16, no. 2/2012.
[11] A. Mardin, T. Anwar, B. Anwer, “Image Compression: Combination of Discrete Transformation and Matrix Reduction”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.1-6, 2017.
[12] A. Balahur, J. M. Hermida, and A. Montoyo, “Building and exploiting emotinet, a knowledge base for emotion detection based on the appraisal theory model,” Affective Computing, IEEE Transactions on, vol. 3, no. 1,pp. 88– 101, 2012.
[13] T. Peng, C. Shih, “An Unsupervised Snippet-Based Sentiment Classification Method for Chinese Unknown Phrases without Using Reference Word Pairs.” Proceedings of the International Conference on Web Intelligence and Intelligent Agent Technology, 2010, pp.243-248.
Citation
Sakshi koli , "Sentiment Analysis with Machine Learning Techniques and Improved J48 Decision Tree Technique," International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.77-82, 2021.
Hybrid Quantum - Classical AI based approach to solve the Traveling Tournament Problem
Research Paper | Journal Paper
Vol.9 , Issue.6 , pp.83-90, Jun-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i6.8390
Abstract
Scheduling has always been deemed as a perfunctory task for most organizations. It could nevertheless become an extremely arduous task if involves the management of events and of the dynamic variables that control it. Herein, we present an idea/solution to the Travelling Tournament Problem (TTP), which is a unique combinatorial problem tackling both feasibility and optimality of the solution. As the TTP belongs to the category of NP-Hard problems, generating solutions usually tend to be extremely costly, with most of the solutions having a time complexity of as high as O(n!). However, two of the many burgeoning fields, artificial intelligence and quantum computing are making headway and we believe that quantum computers possess enough potential to be competent enough to solve such scheduling problems. The aforementioned technologies have provided us with an excellent framework, which we have consequently adopted in our implementation. In the following paper, we portray a hybrid solution that utilizes the immense computational power of a quantum computer while also tweaking the classical algorithm to dynamically reduce the number of iterations and subsequently the cost. We draw parallels between the Travelling Salesman Problem (TSP) and the TTP by utilizing the insights obtained from a detailed analysis of the existing Simulated Annealing based approach, and thus propose certain unique modifications to the best known classical only solutions.
Key-Words / Index Term
Quantum Computing, NP-Hard Problem, Travelling Tournament Problem, Simulated annealing
References
[1] C. Fernandes, D. Lobo, S. Gawane and K. Wagaskar, "Proposed Quantum AI solution for the Travelling Tournament Problem," International Conference for Emerging Technology (INCET), Belgaum, India, pp. 1-5, 2020.
[2] Leong, G, "Constraint programming for the traveling tournament problem.", Project Thesis, National University of Singapore, 2003.
[3] Hamiez, J.P. and Hao, J.K., “A linear-time algorithm to solve the Sports League Scheduling Problem (prob026 of CSPLib)”, Discrete Applied Mathematics, 143(1-3), pp.252-265, 2004.
[4] Thakare, L., Umale, J., Thakare, B., & Maxwel, J. C. , "Solution to Traveling Tournament Problem using Genetic Algorithm on Hadoop." , International Conference on Emerging trends in Electrical, Electronics and Communication Technologies-ICECIT, vol. 2, pp. 68-73, 2012.
[5] Rutjanisarakul, T. and Jiarasuksakun, T., “A Sport Tournament Scheduling by Genetic Algorithm with Swapping Method”, arXiv preprint arXiv:1704.04879, 2017.
[6] Goerigk, M., Hoshino, R., Kawarabayashi, K.I. and Westphal, S., 2014, June. Solving the travelling tournament problem by packing three-vertex paths. In Twenty-Eighth AAAI Conference on Artificial Intelligence.
[7] Anagnostopoulos, A., Michel, L., Van Hentenryck, P. and Vergados, Y., “A simulated annealing approach to the traveling tournament problem” , Journal of Scheduling, 9(2), pp.177-193, 2006
[8] Kwiat, P.G., Mitchell, J.R., Schwindt, P.D.D. and White, A.G., “Grover`s search algorithm: an optical approach”, Journal of Modern Optics, 47(2-3), pp.257-266, 2000
[9] Wiebe, N., Kapoor, A. and Svore, K., “Quantum algorithms for nearest-neighbor methods for supervised and unsupervised learning”, arXiv preprint arXiv:1401.2142, 2014.
[10] E. Padmalatha, S. Sailekya, "A Review on Quantum Computers and Machine Learning", International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.396-399, 2018.
[11] Megha Roy, Soumen Santra, Sarasij Majumdar, "Quantum Computers", International Journal of Computer Sciences and Engineering, Vol.07, Special Issue.01, pp.57-62, 2019.
[12] Cross, A. , “The IBM Q experience and QISKit open-source quantum computing software”, APS Meeting Abstracts, vol. 2018, pp. L58-003, 2018
[13] Gilliam, A., Venci, C., Muralidharan, S., Dorum, V., May, E., Narasimhan, R. and Gonciulea, “"Foundational patterns for efficient quantum computing”, arXiv preprint arXiv:1907.11513, 2019.
[14] Easton, K. Nemhauser, G. and Trick, M.,“The travelling tournament problem description and benchmarks”, International Conference on Principles and Practice of Constraint Programming, pp. 580-584, 2001
[15] Goerigk, M., Hoshino, R., Kawarabayashi, K.I. and Westphal, S., “Solving the travelling tournament problem by packing three-vertex paths”, Twenty-Eighth AAAI Conference on Artificial Intelligence, Vol. 28. No. 1, 2014.
[16] Nannicini, G., “Performance of hybrid quantum-classical variational heuristics for combinatorial optimization”, Physical Review E, 99(1), p.013304, 2019.
[17] Miceli, R. and McGuigan, M., ”Quantum computation and visualization of hamiltonians using discrete quantum mechanics and ibm qiskit”, 2018 New York Scientific Data Summit (NYSDS), pp. 1-6. IEEE, 2018.
[18] Barabasi, I., Tappert, C.C., Evans, D. and Leider, A.M., “Quantum Computing and Deep Learning Working Together to Solve Optimization Problems”, 2019 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 493-498). IEEE, 2019.
[19] Draper, T.G., “Addition on a quantum computer”, arXiv preprint quant-ph/0008033, 2000.
[20] Ruiz-Perez, L. and Garcia-Escartin, J.C., "Quantum arithmetic with the quantum Fourier transform." , Quantum Information Processing, 16(6), p.152, 2017
[21] Koch, D., Wessing, L. and Alsing, P.M., “Introduction to Coding Quantum Algorithms: A Tutorial Series Using Qiskit”, arXiv preprint arXiv:1903.04359, 2019.
[22] Weinstein, Y.S., Pravia, M.A., Fortunato, E.M., Lloyd, S. and Cory, D.G., “Implementation of the quantum Fourier transform”, Physical review letters, 86(9), p.1889, 2001.
Citation
Desmond Lobo, Kalpita Wagaskar, Sarang Gawane, Clifford Fernandes, "Hybrid Quantum - Classical AI based approach to solve the Traveling Tournament Problem," International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.83-90, 2021.
A Novel Hybrid Symmetric Key Encryption Algorithm for Telegu Script
Research Paper | Journal Paper
Vol.9 , Issue.6 , pp.91-96, Jun-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i6.9196
Abstract
Technology is the key to innovation in all aspects of this modern age. In any technology, data becomes the most important asset to protect. Many encryption algorithms are widely available and used in information security. Encryption can provide secure information across the platform. Encrypting the message using natural languages reduces encryption time and improves performance. Telugu is the oldest Dravidian language spoken in South India. The message to be encoded is translated into Telugu, after which this translated text is converted into a randomly generated combination of 2-bit English alphabets. This is a hybrid algorithm because the intermediate node is encrypted using the standard advanced encryption algorithm to improve the privacy of the text. Because Telugu encryption method uses three phases, namely translation, mapping, and encryption, this makes the data much more secure than existing algorithms like Blowfish and Data Encryption Standard (DES), and the person trying to decrypt must have knowledge of the Telugu language, as well as mapping details to see the original data and This algorithm shows a stronger avalanche effect of 96.5%, which is greater than Blowfish and DES. Evaluation of the proposed algorithm shows that it runs faster and has relatively less encryption time, less memory requirements.
Key-Words / Index Term
Cryptography, Security, Telugu language, Encryption, AES
References
[1] Geetha R, Padmavathy T, Thilagam T, Lallithasree A. Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm. Wireless Personal Communications.17:1-6, Dec. 2019.
[2] Chaudhary S, Dave M, Sanghi A, Manocha J. An elucidation on steganography and cryptography.InProceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies 4 (pp. 1-6).Mar 2016.
[3] Odeh A, Elleithy K, Faezipour M. A Reliable and Fast Real-Time Hardware Engine for Text Steganography. IEEE LISAT 2014 Long Island Systems, Applications and Technology. 1-6:2014.
[4] Reddy PC, Babu AS. A Novel Approach To Analysis District Level Long Scale Seasonal Forecasting Of Monsoon Rainfall In Andhra Pradesh And Telangana. International Journal of Advanced Research in Computer Science.1;8(9).Nov2017.
[5] Sucharitha Y, Vijayalata Y, Prasad VK. Analysis of Early Detection of Emerging Patterns from Social Media Networks: A Data Mining Techniques Perspective. InSoft Computing and Signal Processing.pp. 15-25,2019. Springer, Singapore.
[6] Al-Haidari F, Gutub A, Al-Kahsah K, Hamodi J. Improving security and capacity for arabic text steganography using ‘Kashida’extensions. In2009 IEEE/ACS International Conference on Computer Systems and Applications.10 (pp. 396-399). May2009.IEEE.
[7] Alkhudaydi M, Gutub A. Securing Data via Cryptography and Arabic Text Steganography. SN Computer Science.2(1):1-8, Feb. 2021.
[8] Gutub A, Alaseri K. Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage. Arabian Journal for Science and Engineering.4:1-26, Jul 2019.
[9] Baker SI, Al-Hamami AH. Novel algorithm in symmetric encryption (NASE): Based on feistel cipher. In2017 International Conference on New Trends in Computing Sciences (ICTCS) 11 (pp. 191-196) Oct. 2017.IEEE.
[10] Gupta A, Semwal S, Johari R. METHS: Mapping from English language to Hindi language for secure commercial transactions. In2016 International Conference on Computing, Communication and Automation (ICCCA) 29, pp. 112-116, Apr. 2016.IEEE.
[11] Vidhya PM, Paul V. A method for text steganography using Malayalam text.Procedia Computer Science.Jan 1;46:524-31.2015.
[12] Khairullah M. A novel steganography method using transliteration of Bengali text.Journal of King Saud University-Computer and Information Sciences.Jul 1;31(3):348-66.2019.
[13] Taha A, Hammad AS, Selim MM. A high capacity algorithm for information hiding in Arabic text.Journal of King Saud University-Computer and Information Sciences.2018 Jul 25.
[14] Hamzah AA, Khattab S, Bayomi H. A linguistic steganography framework using Arabic calligraphy.Journal of King Saud University-Computer and Information Sciences.2019 May 3.
[15] Roy S, Venkateswaran P. A text based steganography technique with Indian root. Procedia Technology. Jan 1;10:167-71.2013.
[16] Bharati PV, Prasad KJ. Cryptic transmission of Telugu Text. In2016 International Conference on Information Communication and Embedded Systems (ICICES) Feb 25 (pp. 1-6). 2016. IEEE.
[17] Changder S, Ghosh D, Debnath NC. Linguistic approach for text steganography through Indian text.In2010 2nd international conference on computer technology and development Nov 2 (pp. 318-322).2010.IEEE.
[18] Rao GS, Imanuddin M, Harikumar B. Script Identification of Telugu, English and Hindi Document Image. Int. J. Adv. Eng. Global Technol. 2(2):443-52, 2014.
[19] Das MS, Reddy CR, Rahul K, Govardhan A. Multilingual Optical Character Recognition System for Printed English and Telugu Base Characters. International Journal of Science and Advanced Technology (ISSN 2221-8386).Jun;1(4):106-11.2011.
[20] Shalini M, Indira B. Automatic Character Recognition of Indian Languages–A brief Survey. International Journal of Innovative Science, Engineering & Technology, Apr;1(2):131-8.. 2014.
[21] Shaker Reddy PC, Sureshbabu A. An Enhanced Multiple Linear Regression Model for Seasonal Rainfall Prediction. International Journal of Sensors Wireless Communications and Control.Aug 1;10(4):473-83.2020.
Citation
T. Madhavi Kumari, A. Vinaya Babu, "A Novel Hybrid Symmetric Key Encryption Algorithm for Telegu Script," International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.91-96, 2021.
Crime Analysis and Prediction Model Using Data Mining and Machine Learning Techniques: Comparative Analysis
Research Paper | Journal Paper
Vol.9 , Issue.6 , pp.97-104, Jun-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i6.97104
Abstract
Crime is the illegal task perform by human system for perform unauthorise3d access of various services without legal permission. in computer system there are many categories of crime related with cybercrime. the crime is basically relating to offence which is happen by illegal task and permission. N this computer system the many crime is describing various cybercrime. Like malware, hacking, cyber-attacks, cyber illegal access, IOT hacking, phishing scams, ransom ware, etc. These are described various types of cybercrime in computer technology. for determine the any one we have used various algorithm and simulation tool performance. Thyis is destroy our human society transaction system. It is also created by some human; many companies also do this illegal work for our business growth. This cyber various crime is also impact of our country growth and development also decreased. In this research work we have determinate cybercrime attacks detection and prediction model of determine the cyber-attacks using data mining and machine learning techniques. For implementation of this proposed work we are using WEKA simulation tool for execute data mining algorithms and Jupiter anaconda navigator simulate tool for machine learning algorithms for determinate accuracy of data mining and design production model using machine learning algorithms. The attacks categories by cybercrime are ddos attacks, U2r, R2L, probe, ICMP attacks, UDP attacks, TCP attacks, FAR high false alarm rate, Dos attacks, these are cyber-attacks detection by data mining and machine learning algorithms based determinate accuracy and efficiency of data mining algorithms and prediction model by machine learning algorithms
Key-Words / Index Term
cybercrime, cyber-attacks, data mining, KDD cup data set, machine learning, weak tool, Jupiter anaconda navigator simulate tool
References
[1]. Halder, D., &Jaishankar, K. (2011) Cybercrime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. ISBN 978-1-60960-830-9, 2011.
[2]. Lambert, Glenn M. II, "Security Analytics: Using Deep Learning to Detect Cyber Attacks" (2017). UNF Graduate Theses and Dissertations. 728, https://digitalcommons.unf.edu/etd/728
[3]. ManjeetRege& Raymond Blanch K. Mbah, Machine Learning for Cyber Defense and Attack , DATA ANALYTICS 2018 : The Seventh International Conference on Data Analytics, Copyright (c) IARIA, 2018. ISBN: 978-1-61208-681-1 , pp.73–78., 2018.
[4]. Dmitri Koteshov, How Can Ai Change The State Of Cybersecurity, March 7, 2018, https://www.elinext.com/industries/financial/trends/aiand-security/.
[5]. Anti-Phishing Working Group, “Phishing and Fraud solutions”. [Online], [Accesses: March 18, 2019] http://www.antiphishing.org/.
[6]. S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, “A Comparison of Machine Learning Techniques for Phishing Detection”, APWG eCrime Researchers Summit, Pittsburg, PA. October 4-5, 2007,
[7]. N. Lu, S. Mabu, T. Wang, and K. Hirasawa, “An Efficient Class Association Rule-Pruning Method for Unified Intrusion Detection System using Genetic Algorithm”, in IEEJ Transactions on Electrical and Electronic Engineering, Vol. 8, Issue 2, pp. 164 – 172, January 2, 2013.
[8]. Knowledge Discovery and Data Mining group, “KDD cup 1999” [Online], [Accessed:March 18, 2019], http://www.kdd.org/kddcup/index.php.
[9]. K. Lee, J. Caverlee, and S. Webb, “Uncovering social spammers: social honeypots + machine learning”, SIGIR’10, Geneva, Switzerland, July 19-23, 2010.
[10]. Nilaykumar Kiran Sangani & HarootZarger, Machine Learning in Application Security, [Accessed: March 18, 2019] http://dx.doi.org/10.5772/intechopen.68796.
[11]. Security Week Network. Symantec Adds Machine Learning to Endpoint Security Lineup [Internet]. 2016. Available from: http://www.securityweek.com/symantec-addsmachine-learning-endpoint-security-lineup .
[12]. Ozlem Yavanoglu & Murat Aydos, A Review on Cyber Security Datasets for Machine Learning Algorithms, 11-14 Dec. 2017, 2017 IEEE International Conference on Big Data (Big Data), INSPEC Accession Number: 17504859.
[13]. Md. Zeeshan Siddiqui &Sonali Yadav, Application Of Artificial Intelligence In Fighting Against Cyber Crimes: A Review, International Journal of Advanced Research in Computer Science April 2018 , (ISSN: 0976-5697), ISBN: 978-93-5311-643-9, page[118-121].
[14]. Nilaykumar Kiran Sangani&HarootZarger, Machine Learning in Application Security, [Accessed: March 18, 2019] http://dx.doi.org/10.5772/intechopen.68796 [15] Dmitri Koteshov, How Can Ai Change The State Of Cybersecurity, March 7, 2018, https://www.elinext.com/industries/financial/trends/aiand-security/.
[15]. Richard Power, "1999 CSI/FBI Computer Crime and Security Survey,” Computer Security Issues & Trends, Computer Security Institute, winter 1999.
[16]. Denning D E, “An Intrusion-Detection Model,” In IEEE Transaction on Software Engineering, Vol. Se-13, No. 2, pp. 222-232, February 1987.
[17]. Lee, W, Stolfo S and Mok K , “Adaptive Intrusion Detection: A Data Mining Approach,” In Artificial Intelligence Review, Kluwer Academic Publishers, 14(6), pp. 533 - 567, December 2000.
[18]. Satinder Singh, Guljeet Kaur, “Unsupervised Anomaly Detection In Network Intrusion Detection Using Clusters,” Proceedings of National Conference on Challenges & Opportunities in Information Technology RIMT-IET, Mandi Gobindgarh. March 23, 2007.
[19]. Eric Bloedorn , Alan D. Christiansen , William Hill , Clement Skorupka , Lisa M. Talbot , Jonathan Tivel, “Data Mining for Network Intrusion Detection: How to Get Started,” CiteSeer, 2001
[20]. L. Portnoy, “Intrusion Detection with Unlabeled Data Using Clustering,” Undergraduate Thesis, Columbia University, 2000.
[21]. Theodoros Lappas and Konstantinos Pelechrinis, “Data Mining Techniques for (Network) Intrusion Detection Systems,” http://citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.120.2533&rep=rep1&type=pdf.
[22]. Dewan Md. Farid, Nouria Harbi, Suman Ahmmed, Md. Zahidur Rahman, and Chowdhury Mofizur Rahman, “Mining Network Data for Intrusion Detection through Naïve Bayesian with Clustering”, World Academy of Science, Engineering and Technology, 2010.
[23]. The KDD Archive. KDD99 cup dataset, 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
[24]. X. Li and N. Ye., “A supervised clustering algorithm for computer intrusion detection,” Knowledge and Information Systems, 8, pp498-509, ISSN 0219-1377, 2005
[25]. Kruegel C., Mutz D., Robertson W., Valeur F., “Bayesian event classification for intrusion detection,” In: Proceedings of the 19th Annual Computer Security Applications Conference; 2003.
[26]. Portnoy L., Eskin E., Stolfo S.J., “Intrusion detection with unlabeled data using clustering,” In: Proceedings of The ACM Workshop on Data Mining Applied to Security; 2001.
[27]. Paxson V., “Bro: A System for Detecting Network Intruders in Real-Time”, Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.
[28]. D.Barbara, J.Couto, S.Jajodia, and N.Wu, "ADAM: A test bed for exploring the use of data mining in intrusion detection”, SIGMOD, vol30, no.4, pp 15-24, 2001.
[29]. P.Domingos, and M.J. Pizzani, "On the optimality of the simple Bayesian classifier under zero-one loss”, m/c learning, Vol.29, no2-3, pp 103-130, 1997.
[30]. F. Provost, and T. Fawcett, “Robust classification for imprecise environment,” Machine Learning, vol. 42/3, pp. 203-231. 2001.
[31]. Athanasios Papoulis and S. Unnikrishna Pillai,. "Probability, Random Variables and stochastic Processes ", McGraw-Hill, Fourth Edition, ISBN 0073660116, 2002.
[32]. P. Kabiri and A.A. Ghorbani, “Research on Intrusion Detection and Response: A Survey,” International Journal of Network Security, 1, 84-102, September 2005.
[33]. A. Patcha and J-M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Comput. Netw., 51, 3448-3470. ISSN 1389-1286. 2007.
[34]. T.M. Mitchell. Machine Learning. McGraw-Hill. ISBN: 0-07-115467-1, 1997.
[35]. N. Ben Amor, S. Benferhat and Z. Elouedi, “Naive Bayes vs Decision Trees in Intrusion Detection Systems,” Proceedings of the ACM symposium on Applied computing, ISBN 1-58113-812-1, pages 420-424, New York, USA, 2004.
[36]. M. Panda and M.R. Patra, “Network intrusion detection using naive bayes,” IJCSNS International Journal of Computer Science and Network Security, 7, 258-263, 2007
[37]. F. Gharibian and A.A. Ghorbani, “Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection,” In CNSR ’07: Proceedings of the Fifth Annual Conference on Communication Networks and Services Research, Pages 350-358, Washington, DC, USA, 2007
[38]. L. Portnoy, E. Eskin and S. Stolfo, “Intrusion Detection With Unlabeled Data Using Clustering,” In Proceedings of the ACM Workshop on Data Mining Applied to Security, 2001.
[39]. K. Leung and C. Leckie, “Unsupervised anomaly detection in network intrusion detection using clusters,” Proceedings of the 28th Australasian conference on Computer Science, ISBN 1-920-68220-1, pages 333-342, Darlinghurst, Australia, Australia, 2005.
[40]. W. Wang, X. Guan and X. Zhang, “Processing of massive audit data streams for real-time anomaly intrusion detection,” Comput. Commun., 31, 58- 72. ISSN 0140-3664, 2008
[41]. J. Song, K. Ohira, H. Takakura, Y. Okabe and Y. Kwon, “A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System,” IEICE Transactions on Information and Systems, E91-D, 1282-1291. ISSN 0916-8532, 2008
[42]. E.J. Spinosa, A.P. de Leon F. de Carvalho and J. Gama, “Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks,” Proceedings of the ACM symposium on Applied computing, pages 97.
Citation
Neetu Singh, Tripti Ajariya, Shailesh Raghuvanshi, Neha Singh, "Crime Analysis and Prediction Model Using Data Mining and Machine Learning Techniques: Comparative Analysis," International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.97-104, 2021.