A Survey on Twitter Sentiment Analysis
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.644-648, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.644648
Abstract
Twitter sentiment analysis offers organizations an ability to monitor public feeling towards the products and events related to them in real time. Public and private opinion about a wide variety of subjects are expressed and spread continually via numerous tweets. It offers organizations a fast and more effective way to analyze customer’s perspectives towards the success in the market place. Sentiment analysis is an approach to be used to computationally measure customer’s perceptions to a vast extent. This is a survey on the design of a sentiment analysis. After extraction of a vast amount of tweets, it classifies perspectives of customers via tweets into positive and negative sentiments. Which is obtained after classifying the data by using classification approaches like for example Bayes Naïve, Linear Regression, etc.
Key-Words / Index Term
Twitter, sentiment analysis, datasets, pre-processing, feature extraction, classification
References
[1] A. K. Jose, N. Bhatia, and S. Krishna, “TwitterSentimentAnalysis”. NationalInstituteof TechnologyCalicut, 2010.
[2] M. Comesaña, A. P.Soares, M.Perea, A.P. Piñeiro, I. Fraga, and A. Pinheiro, “ Author ’ s personal copy Computers in Human Behavior ERP correlates of masked affective priming with emoticons,” Computers in Human Behavior, 29, 588–595, 2013
[3] S.Lohmann, M. Burch, H. Schmauder and D. Weiskopf, “Visual Analysis of Microblog Content Using Time-Varying Co-occurrence Highlighting in Tag Clouds,” Annual conference of VISVISUS. Germany: University of Stuttgart, 2012.
[4] D. Osimo, and F. Mureddu, “Research Challenge on Opinion Mining and Sentiment Analysis,” Proceeding of the 12th conference of Fruct association, 2010, United Kingdom.
[5] A. Pak, and P. Paroubek, “Twitter as a Corpus for Sentiment Analysis and Opinion Mining,” Special Issue of International Journal of Computer Application, France: Universitede Paris-Sud, 2010.
[6] M.Rambocas, and J. Gama, “Marketing Research: The Role of Sentiment Analysis”. The 5th SNA-KDD Workshop’11. Universityof Porto, 2013.
[7] H. Saif, Y.He, and H. Alani, “SemanticSentimentAnalysisof Twitter,” Proceeding of the Workshop on Information Extraction and Entity Analytics on Social Media Data. United Kingdom: Knowledge Media Institute, 2011.
[8]P.Lai,“ExtractingStrongSentimentTrendfromTwitter”. Stanford University, 2012.
[9] Y. Zhou, and Y. Fan, “A Sociolinguistic Study of American Slang,” Theory and Practice in Language Studies, 3(12), 2209–2213, 2013. doi:10.4304/tpls.3.12.2209-2213
[10] A.H.Huang, D.C. Yen, & X. Zhang, “Exploring the effects of emoticons,” Information & Management, 45(7), 466–473, 2008.
[11] D. Boyd, S. Golder & G. Lotan, “Tweet, tweet, retweet: Conversational aspects of retweeting on twitter,” System Sciences (HICSS),2010.
[12] Fox C. (1992). "Information retrieval data structures and algorithms". Lexical Analysis and Stoplists, pp.102–130, 1992.
[13] Go A, Bhayani R, & Huang L. "Twitter sentiment classification using distant supervision". CS224N Project Report, Stanford, 2009
[14] Saif H, He Y, & Alani H. "Alleviating Data Sparsity for Twitter Sentiment Analysis". In Proc. CEUR Workshop Proceedings, 2012.
[15] A. Bakliwal, P. Arora, S. Madhappan, N. Kapre, M. Singh, & V. Varma. "Mining sentiments from tweets". In Proc. the 3rd Workshop in Computational Approaches to Subjectivity and Sentiment Analysis, Association for Computational Linguistics, Jeju, Korea, pp.11–18, 2012.
[16] Saif H, Fern M, & He Y. "Evaluation Datasets for Twitter Sentiment Analysis A survey and a new dataset the STS-Gold". Proc. 1st ESSEM Workshop. Turin, Italy, 2013.
[17] Sascha Narr, Michael Hulfenhaus & Sahin Albayrak. "Language-Independent Twitter Sentiment Analysis." 2014.
[18] V. Nareyko, “Why python is perfect for startups,”
[19] H.M.Wallach,“Topic modeling: beyond bag-of-words,” in Proceedings of the 23rd International Conference on Machine Learning (ICML `06), pp. 977–984, Pittsburgh, Pa, USA, June 06.
[20] A. Sweigart, “Invent your own computer games with Python. 2nd edition, 2012.
[21] C. Seberino, “Python. Faster and easier software development,” Annual Conference. California: San Diego, 2012.
[22] A.Lukaszewski, “MySQL for Python. Integrate the flexibility of Python and the power of MySQL to boost the productivity of your applications,” UK: Birningham. Packt Publishing Ltd, 2010.
[23] Gimpel, K., Schneider, N., O‘Connor, B., Das, D., Mills, D., Eisenstein, J., etal. ―Part-of-speech tagging for twitter: Annotation, features, and experiments‖. In Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies: Short papers - volume 2 HLT ‘11,pp. 42–47,2011.
[24] P. Bhoir, S. Kolte, “Sentiment Analysis of Movie Reviews using Lexicon approach”, IEEE International Conference on Computational Intelligence and Computing Research, Madurai pp.1-6, 2015.
Citation
Eriq-Ur Rahman, Rituparna Sarma, Rajesh Sinha, Priyankar Sinha, Adarsh Pradhan, "A Survey on Twitter Sentiment Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.644-648, 2018.
A Survey on Cyber Security Analytics
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.649-652, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.649652
Abstract
Increase in internet dependency in all walks of life, digital nature of data in huge amounts getting accumulated through online transactions and decentralization of data repositories, has led to the development of effective security mechanisms. While discussing the challenges of combating cybercrime, this paper provides a comprehensive overview of cyber security mechanisms, recent attack prediction techniques to create attack prediction models. This paper also explores recent trends in cyber-security like graph data analytics and security in wireless sensor networks. Emerging trends in security system design leveraging social behavioral biometrics, network security analytics, and contextual information to identify known as well as unknown cyber- attacks are also discussed. A framework for contextual information fusion to detect cyber-attacks is presented.
Key-Words / Index Term
Contextual information, Attack similarity, Zero-day attack, vulnerability
References
[1] Oreku, George S., and Fredrick J. Mtenzi. "Cybercrime: Concerns, Challenges and Opportunities." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp. 129-153, 2017.
[2] Namayanja, Josephine M., and Vandana P. Janeja. "Characterization of Evolving Networks for Cybersecurity." Information Fusion for Cyber-Security Analytics. Springer, Cham,. pp.111-127, 2017.
[3] Chakraborty, I, Das, P., “Data Fusion in Wireless Sensor Network-A Survey”, International Journal of Scientific Research in Network Security and Communication, 5(6), pp.9-15, 2017.
[4] Anchugam, C. V., and K. Thangadurai. "Security in Wireless Sensor Networks (WSNs) and Their Applications." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.195-228, 2017.
[5] Gavrilova, M. L., et al. "Emerging trends in security system design using the concept of social behavioural biometrics." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.229-251, 2017.
[6] Grahn, Kaj, Magnus Westerlund, and Göran Pulkkis. "Analytics for network security: A survey and taxonomy." Information fusion for cyber-security analytics. Springer, Cham, pp.175-193, 2017.
[7] AlEroud, Ahmed, and George Karabatis. "Using contextual information to identify cyber-attacks." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.1-16, 2017.
[8] Singh, U.K., Joshi, C, Singh, S.K., ”Zero day Attacks Defense Technique for Protecting System against Unknown Vulnerabilities”, International Journal of Scientific Research in Computer Science and Engineering, 5, pp.13-18.,2017.
[9] AlEroud, Ahmed, and George Karabatis. "A Framework for Contextual Information Fusion to Detect Cyber-Attacks." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.17-51, 2017.
[10] AlEroud, Ahmed, and George Karabatis. "Detecting Unknown Attacks Using Context Similarity." Information Fusion for Cyber-Security Analytics. Springer, Cham, pp.53-75, 2017.
Citation
Nerella Sameera, M. Shashi, "A Survey on Cyber Security Analytics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.649-652, 2018.
A Systematic Review on Real Time Video Compression and Enhancing Quality Using Fuzzy Logic
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.653-665, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.653665
Abstract
This paper provides the critical reviews on Real time Video Compression and Efficient use of Fuzzy Logic Techniques used in Video Compression and Quality Enhancement. Since the Internet is highly heterogeneous environment video codec needs to be able to generate bit streams that are highly scalable in terms of bandwidth and processing requirements looking all these problems this research paper explores the possibility of better compression ratio in real time and quality enhancement by efficient use of fuzzy logic . The first section of this paper tells the overview of the real time video compression .The second section of this paper describes the related work which has been done in the past regarding real time video compression it consists a Table-1 in reference of the time line of real time video compression and Table -2 about the differences between H.265 and H.264 .The third section of this paper consists a Table-3 which represents about the research time line using fuzzy logic in video compression .The fourth section of this paper consists a Table-4 which represents the research time line of real time video compression. Finally the conclusion of this paper is an overview on past, present and future trends in Video Compression Technologies, review of the improvements and development in video encoding over the last two decades with future possibilities.
Key-Words / Index Term
Real time, Video compression, Fuzzy logic, Motion vector estimation, Bit rate
References
[1] Danny H. K. Tsang, Brahim Bensaou, and Shirley T. C. Lam, “Fuzzy-Based Rate Control for Real-Time MPEG Video”, IEEE
Transactions on Fuzzy Systems Vol. 6, Issue 4, pp. 504-516, 1998.
[2] Y.-S. Saw P.M. Grant J.M.Hannah, “Quality-optimized MPEG2 video data rate control using fuzzy logic techniques”, IEE
Proceedings - Vision, Image and Signal Processing Vol.145, Issue 3, pp. 179-186, 1998.
[3] Yun-Teng Roan and Pei-Yin Chen, “A Fuzzy Search Algorithm for the Estimation of Motion Vectors”, IEEE Transactions on Broadcasting Vol. 46, Issue 2 , pp. 121-187, 2000.
[4] Ming-Chieh Chi, Mei-Juan Chen and Ching-Ting Hsu, “Region-of-interest video coding by fuzzy control for h.263+ standard”, In the Proceedings of the IEEE Conferences 2004 IEEE International Symposium on Circuits and Systems , Vancouver, BC, Canada, pp. 93 - 96, 2004.
[5] Pei-Jun Lee and Ming-Long Lin, “ Fuzzy Logic Based Temporal Error Concealment for H.264 Video ”, ETRI Journal Vol. 28, Number 5, pp. 574-582, 2006.
[6] Mehdi Rezaei, Miska M. Hannuksela, and Moncef Gabbouj, , “ Semi-Fuzzy Rate Controller forVariable Bit Rate Video”, IEEE Transactions on Circuits and Systems for Video Technology Vol.18, Issue 5, pp. 633-65, 2008.
[7] WU Jing, DU Xin, ZHU Yun-fang, GU Wei-kang, “Adaptive Fuzzy Filter Algorithm for Real-time Video Denoising”, In the
Proceedings of the IEEE Conferences 2008 9th International Conference on Signal Processing , Beijing, China , pp. 1287 - 1291, 2008.
[8] S.M.R. Soroushmehr S. Samavi M. Saraee, “Fuzzy block matching motion estimation for video compression”, In the Proceedings of the IEEE Conferences 2009 IEEE 9th Malaysia International Conference on Communications (MICC) , Kuala Lumpur, Malaysia, pp. 1287 - 1291, 2008.
[9] Junhua Chai, Jun Ying and Li Li, “A Fuzzy Video Pre-filtering Method for Impulse Noise Reduction”, In the Proceedings of the IEEE Conferences 2009 International Conference on Test and Measurement , Hong Kong, China, pp. 176 - 183, 2009.
[10] C. Solana-Cipres, L. Rodriguez-Benitez1 J. Moreno-Garcia2 L. Jimenez1 G. Fernandez-Escribano, “ Real-time segmentation of moving objects in H.264 compressed domain with dynamic design of fuzzy sets”, IFSA-EUSFLAT Journal , pp. 19-24, 2009.
[11] Zhan Xuefeng Zhu Xiuchang, “ A novel temporal error concealment method based on Fuzzy reasoning for H.264 ”, Vol.27 No.2 JOURNAL OF ELECTRONICS (CHINA), pp. 197-205, 2010.
[12] Suvojit Acharjee Sheli Sinha Chaudhuri, “ Fuzzy Logic Based Four Step Search Algorithm for Motion Vector Estimation ”, I.J. Image, Graphics and Signal Processing, Vol. 4, pp. 49-55, 2012.
[13] T. Fryza, “Introduction to Implementation of Real Time Video Compression Method”, In the Proceedings of the IEEE Conferences 2008 15th International Conference on Systems, Signals and Image Processing , Bratislava, Slovakia, pp. 217 - 220, 2008.
[14] J. C. Galan-Hernandez, V. Alarcon-Aquino, O. Starostenko, J. M. Ramirez-Cortes “Wavelet-Based Foveated Compression
Algorithm for Real-Time Video Processing”, In the Proceedings of the IEEE Conferences 2010 Electronics, Robotics and
Automotive Mechanics Conference ,Morelos, Mexico, pp. 405 - 410, 2010.
[15] Gary J. Sullivan, Jens-Rainer Ohm, Woo-Jin Han and Thomas Wiegand , “Overview of the High Efficiency Video Coding (HEVC) Standard” IEEE Transactions on Circuits and Systems for Video Technology Vol. 22, Issue: 12, pp. 1649 – 1668, 2012
[16] Stamos Katsigiannis, Dimitris Maroulis, Georgios , Papaioannou , “A GPU based real-time video compression method for video conferencing”, In the Proceedings of the IEEE Conferences 2013 18th International Conference on Digital Signal Processing (DSP) , Fira, Greece, pp. 1 - 6, 2013.
[17] Ali Makki Sagheer, Ahmeed Suliman Farhanand Loay E. George, “Fast Intra-frame Compression for Video Conferencing using Adaptive Shift Coding” International Journal of Computer Applications , Vol. 81, No.8, pp. 29 – 33, 2013
[18] Ashok nayak. B , E. Nagabhooshnam “A study of efficient Block Matching Algorithms for real-time video compression applications”, In the Proceedings of the IEEE Conferences 2014 International Conference on Electronics and Communication Systems (ICECS) , Coimbatore, India , pp. 1 - 5, 2014.
[19] Stamos Katsigiannis, Georgios Papaioannou, and Dimitris Maroulis, “CVC: The Contourlet Video Compressionalgorithm for real- time applications” arxiv Journal, pp. 1 – 22, 2015
[20] Niras C. Vayalil, Joshua Haddrill and Yinan Kong, “An Efficient ASIC Design of Variable-Length Discrete Cosine Transform for HEVC”, In the Proceedings of the IEEE Conferences 2016 European Modelling Symposium (EMS) , Pisa, Italy , pp. 229 - 233, 2016.
[21] Huaying Xue, Yuan Zhang, Yunong Wei, “ Fast ROI-Based HEVC Coding for Surveillance Videos”, In the Proceedings of the
IEEE Conferences 2016 19th International Symposium on Wireless Personal Multimedia Communications (WPMC), Shenzhen, China, pp. 299 - 304, 2016.
[22] S. Aparna, M. Ekambaram Naidu, “Spatial Compression and Reconstruction of Digital Video Stream Using Morphological
Filters”, In the Proceedings of the IEEE Conferences 2016 2nd International Conference on Next Generation Computing Technologies (NGCT) , Dehradun, India, pp. 777 - 781, 2016.
[23] Vivek Diliprao Indrale, Mrs. Vidya N. More, “Study of x265 and Genetic Motion Search Algorithm”, In the Proceedings of the
IEEE Conferences 2016 International Conference on Computing Communication Control and automation (ICCUBEA) , Pune, India, pp. 1 - 5, 2016.
[24] Maher Jridi, and Pramod Kumar Meher, “A Scalable Approximate DCT Architectures forEfficient HEVC Compliant Video Coding”, IEEE Transactions on Circuits and Systems for Video Technology Vol. 27, Issue 8, Aug. 2017 pp. 1815 – 1825, 2017
[25] Zhao Wang, Shiqi Wang, Jian Zhang, Shanshe Wang, Siwei Ma, “Effective Quadtree Plus Binary Tree Block Partition Decision for Future Video Coding”, In the Proceedings of the IEEE Conferences 2017 Data Compression Conference (DCC) , Snowbird, UT, USA, pp. 23 - 32, 2017.
[26] Nijad A-Najdawi, “Fast Block Matching Criterion for Real-Time VideoCommunication”, In the Proceedings of the IEEE
Conferences 2017 International Conference on New Trends in Computing Sciences (ICTCS) , Amman, Jordan, pp. 327 - 332, 2017.
[27] Krishna Reddy Konda, Yonas Teodros Tefera, Nicola Conci, and Francesco G.B. De Natale, “Real-time moving object detection and segmentation in H.264 video streams”, In the Proceedings of the IEEE Conferences 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) , Cagliari, Italy, pp. 1 - 6, 2017.
[28] Liang Zhao, Zhihai He, Wenming Cao, and Debin Zhao, “Real-Time Moving Object Segmentation and Classification from HEVC Compressed Surveillance Video”, IEEE Transactions on Circuits and Systems for Video Technology Vol. 28, Issue 6, , pp. 1346-1357, 2018.
Citation
Upendra Kumar Srivastava, Navin Prakash, "A Systematic Review on Real Time Video Compression and Enhancing Quality Using Fuzzy Logic," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.653-665, 2018.
A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.666-671, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.666671
Abstract
An attack in computers systems and its networks may attempt to explore, disable, destroy, steal or gain unauthorized access to make illegal use of asset. World Economic Forum has observed that Scalable algorithms and Robustness of cyber-attacks have significant improvement in the technology. Recent technical reports stated that offensive cyber capabilities were developed more rapidly than our ability to deal with hostile incidents. A computer network attack disrupts the integrity or authenticity of data, usually through malicious code that alters program logic that controls data, leading to errors in output. Network security covers a wide variety of both public and private networks that are regularly utilized in jobs like, transactions and communications among businesses, government agencies and individuals. The review paper presents about the types of attacks with issues and challenges in MANET, WSN and VANET.
Key-Words / Index Term
MANET, WSN, VANET, Security, Attacks, Vulnerabilities
References
[1] Mohan V. Pawar, Anuradha “Network Security and Types of Attacks in Network”, Procedia Computer Science 48, 503 – 506, 2015.
[2] NehaKhandelwal, Prabhakar.M. Kuldeep Sharma, “An Overview Of security Problems in MANET”, ISEM International Conference, 2011.
[3] Anupam Joshi and Wenjia Li. “Security Issues in Mobile Ad Hoc Networks- A Survey”, research gate.
[4] Ali Ghaffari, “Vulnerability and Security of Mobile Ad hoc Networks”, Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, Lisbon, Portugal, 124-130, 2006.
[5] Monali S. Gaigole “The Study of Network Security with Its PenetratingAttacks and Possible Security Mechanisms”, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.5, PP: 728-735, 2015.
[6] SarveshTanwar, Prema K.V “Threats & Security Issues in Ad hoc network: A Survey Report”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, 2013.
[7] Satyam Shrivastava, “A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc “,/ International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 218-222, 2013.
[8] DivyaChadha, “Vehicular Ad hoc Network (VANETs): A Review”
[9] Tyagi P, DemblaD,”Investigating the security threats in Vehicular ad hoc Networks (VANETs)”, proc. IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014.
[10] Dr.H.G.Chandrakanth, Rajkumar, Sunitha.K.R “A Survey on Security Attacks in Wireless Sensor Networks”, International Journal of Engineering Research and Applications, Vol. 2, Issue 4, 1684-1691, 2012.
[11] V.E.Ekong,“A Survey of Security Vulnerabilities in Wireless Sensor Networks”, Nigerian Journal of Technology (NIJOTECH) Vol. 35, No. 2, 392 – 397, 2016.
[12] Sarika SA, PravinAb, Vijayakumar AC, Selvamani KD, “Security Issues In Mobile Ad Hoc Networks”
[13] Yongguang Zhang and Wenke Lee, “Security in Mobile Ad-Hoc Networks”, Book Chapter.
[14] T.Kavitha, D.Sridharan, “Security Vulnerabilities In Wireless Sensor Networks: A Survey”, Journal of Information Assurance and Security 5, 031-044, 2010.
[15] PriyankaGoyal, VintiParmar, Rahul Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Applications”, IJCEM International Journal of Computational Engineering & Management, Vol. 11, 32-38, 2011.
[16] Ram Shringar Raw, “Security Challenges, Issues and Their solutions For VANET”, International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, 2013.
Citation
R. Yogapriya, A. Subramani, "A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.666-671, 2018.
An Overview Of Intrusion Detection System Using Various Classification Concepts
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.672-675, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.672675
Abstract
As technological interconnection and digital communication schemes wide spreading, data accessing required to be kept in sharing environment and hence it will surely lead to compromise the data in many aspects. So to keep data secure and protected there are variety of techniques and tools also developed and Intrusion detection system (IDS) is one of them. IDS system conceptualized with identifying the intrusions in place of stopping the attacks. There are various techniques discussed here in context of signature and behavior based IDS. These IDS tools use different identification techniques to classify and identify the attacks and type of attacks. This paper includes different types IDS which has capability inclusion of identifying attacks like probe, DoS, R2L etc. It is also covering categorized descriptions of host based as well as network based hybrid intrusion detection systems.
Key-Words / Index Term
Attacks, Classification, Communication, Detection, DoS, Intrusion, R2L, Signature etc
References
[1] Roshan Kumar, Deepak SharmaHyINT: Signature-Anomaly Intrusion Detection System 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2018.
[2] A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS) IEEE 2017.
[3] Akash Garg ; Prachi Maheshwari,10th International Conference on Intelligent Systems and Control (ISCO), 2016.
[4] Chaimae Saadi ,Ensak-Morroco and Habiba Chaoui “Intrusion detection system based interaction on mobile agents and clust-density algorithm “IDS-AM-Clust”, International Colloquium on Information Science and Technology (CiSt),IEEE,2016.
[5] ShailendraSahu and B M Mehtre ,"Network Intrusion Detection System Using J48 Decision Tree," 2015 IEEE.
[6] Sara Chadli,Mohamed Emharraf and Mohammed Saber "The design of an IDS architecture for MANET based on multi-agent" International Colloquium on Information Science and Technology (CiSt),IEEE,2014.
[7] Difan Zhang, Linqiang Ge, Rommie Hardy, Authersi Yu, Hanlin Zhang and Robert Reschly, "On Effective Data Aggregation Techniques In Host-based Intrusion Detection in MANET," The 10th Annual IEEE CCNC- Green Communications and Computations Track 2013 IEEE.
[8] Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma “AgentOuro: A Novelty Based Intrusion Detection and Prevention System” Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on 3-5 Nov. 2012.
[9] Akthar, F. and Hahne, C. Rapid Miner 5 Operator Reference, 2012.
[10] Bin Zeng , Lu Yao and ZhiChen Chen"A network intrusion detection system with the snooping agents",International Conference on Computer Application and System Modeling, 2010.
[11] Vera Marinova-Boncheva, “A Short Survey of Intrusion Detection Systems”, Problems of Engineering Cybernetics and Robotics, 2007.
[12] Khaled Labib, Computer security and intrusion detection, Crossroads, Volume 11, Issue 1, August 2004.
[13] Murthy, S.K. , Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey. Data Mining and Knowledge Discovery, 24, 1998.
[14] Aurobindo Sundaram, An Introduction to Intrusion Detection, Crossroads, Volume 2, Issue 4, Pages: 3 –7, 1996.
[15] Northcutt, S. “Network Intrusion Detection: An Analyst’s Handbook.” New Riders, Indianapolis 1999.
Citation
K Shukla, R K Gupta, V. Namdeo, "An Overview Of Intrusion Detection System Using Various Classification Concepts," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.672-675, 2018.
Privacy Preserving Big Data Usings Combine Anonymous And Encryption Approach-Survey
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.676-680, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.676680
Abstract
In today’s world each individual wish that his private information is not revealed in some or the other way. Privacy preservation plays a vital role in preventing individual private data preserved from the praying eyes. Anonymization techniques enable publication of information which permit analysis and guarantee privacy of sensitive information in data against variety of attacks. The problem is that information loss and distortion are unavoidable by anonymization job. To reduce the distortion, this paper presents an efficient method that is based on deep anonymization detection. In the method, data publishers analyze the anonymization work, and determine if it is deep or light. If it is thought as deep anonymization, high information distortion is allowed when being distributed to a third party after anonymization. Otherwise, information distortion is kept as low as possible when anonymizing Big-Data to provide the receivers with more meaningful data. The decision for deep anonymization is done by considering a domain data characteristic, data receiver’s purpose, and data criticality. Anonymization approaches are used to develop to reduce information loss or increase privacy protection. It aimed to give comparative evolution of the various algorithms. These algorithms are compared for efficiency (in terms of time) and utility loss. We analysis that paillier encryption is more efficient than other algorithms
Key-Words / Index Term
Privacy, Anonymization, encryption, Big Data
References
[1] Latanya Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557570, 2002
[2] Turban and J.E. Aronaon. Decision support Systems and Intelligent Systems, Prentice-Hall, New Jersey, USA, 2001
[3] P. P. de Wolf, J.M.Gouweleeuw, P. Kooiman, L. Wil-lenborg, Reflections on PRAM. Statistical data protection, proceedings of the conference, Lisbon, 1998.
[4] R. J. Bayardo and R. Agrawal. Data Privacy through Optimal k- Anonymization. In Proc. of ICDE-2005, 2005 [13] Stephen Lee Hansen and Sumitra Mukherjee. A Polynomial Algorithm for Optimal Microaggregation
[5] Matthias Schmid1 and Hans Schneeweiss, 2005, The Effect of Microaggregation Procedures on the Estimation of Linear Models: A Simulation Study
[6] M. Lindh and J. Nolin, “Information We Collect: Surveillance and Privacy in the Implementation of Google Apps for Education,” European Educational Research J., vol. 15, no. 6, 2016, pp. 644–663.
[7] A. Narayanan and V. Shmatikov, “Myths and Fallacies of `Personally Identifiable Information`,” Comm. ACM, vol. 53, no. 6, 2010, pp. 24–26.
[8] M. Barbaro, T. Zeller, and S. Hansell, “A Face Is Exposed for AOL Searcher no. 4417749,” The New York Times, vol. 9, no. 2008, 9 August 2006; www.nytimes.com/2006/08/09/technology/09aol.html
[9] M. Jensen, “Challenges of Privacy Protection in Big Data Analytics,” IEEE Int’l Congress on Big Data (Big Data Congress), 2013; doi.org/10.1109/BigData.Congress.2013.39.
[10] ISO/IEC 27040, Information Technology – Security Techniques – Storage, standard ISO/IEC 27040, Int’l Organization for Standardization, 2015; www.iso.org/standard/44404.html.
[11] 2016 Data Breach Investigations Report, report, Verizon, 2016; www.verizonenterprise.com/resources/reports/rp_DBIR_2016_Report_en_xg.pdf.
[12] Latanya Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557570, 2002
[13] Turban and J.E. Aronaon. Decision support Systems and Intelligent Systems, Prentice-Hall, New Jersey, USA, 2001
[14] P. P. de Wolf, J.M.Gouweleeuw, P. Kooiman, L. Wil-lenborg, Reflections on PRAM. Statistical data protection, proceedings of the conference, Lisbon, 1998.
[15] R. J. Bayardo and R. Agrawal. Data Privacy through Optimal k- Anonymization. In Proc. of ICDE-2005, 2005 [13] Stephen Lee Hansen and Sumitra Mukherjee. A Polynomial Algorithm for Optimal Microaggregation
[16] Matthias Schmid1 and Hans Schneeweiss, 2005, The Effect of Microaggregation Procedures on the Estimation of Linear Models: A Simulation Study
[17] X. Zhang, C. Liu, S. Nepal, C. Yang, J. Chen, ”Privacy Preservation over Big Data in Cloud Systems,” Security, Privacy and Trust in Cloud Systems, pp 239-257, Springer.
[18] J. Sedayao, Enhancing cloud security using data anonymization, White Paper, Intel Coporation.
[19] Top Ten Big Data Security and Privacy Challenges, Technical report, Cloud Security Alliance, November 2012
[20] J. Salido, ”Differential privacy for everyone,” White Paper, Microsoft Coproration, 2012.
[21] Big Data Privacy Preservation, Ericsson Labs, http://labs.ericsson.com/blog/privacy-preservation-in-big-data-analytics.
[22] O. Heffetz and K. Ligett, Privacy and data-based research, NBER Working Paper, September 2013.
[23] M. V. Dijk, A. Juels, ”On the impossibility of cryptog-raphy alone for privacy-preserving cloud computing,” Proceed-ings of the 5th USENIX conference on Hot topics in security, August 10, 2010, pp.1-8.
[24] F. H. Cate, V. M. Schnberger, ”Notice and Consent in a World of Big Data,” Microsoft Global Privacy Summit Summary Report and Outcomes, Nov 2012.
[25] P. Samarati and L. Sweeney, ”Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and cell suppression,” Technical report, SRI International, 1998.
[26] Y. Lindell and B. Pinkas. Privacy preserving data mining. In CRYPTO, 2000.
[27] M. Naor and B. Pinkas. Computationally secure obliv-ious transfer. Journal of Cryptology, 2005
Citation
Vidhi Desai, "Privacy Preserving Big Data Usings Combine Anonymous And Encryption Approach-Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.676-680, 2018.
Analysis and Review of the Steganographic Techniques
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.681-685, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.681685
Abstract
Nowadays, the security associated with information over the web has turned into a significant issue. With the aim to take care of the issue, two fundamental procedures are utilized cryptography and Steganography. The two strategies are utilized for information security reason. Cryptography changes the type of the information and Steganography totally hides its core from the clients, aside from the proposed recipient. The steganography implies secured script while cryptography implies mystery composing. In this paper, a strategy is defined which joins these two techniques to give a more productive and successful outcome. In this paper, different steganographic methods have been analyzed. These methods include text hiding, audio hiding, file hiding and image hiding. This paper reviews and analyzes many existing digital image steganographic methods in both the spatial and transform domains.
Key-Words / Index Term
References
[1] S Zlii Li,Yang S. A. F. , Xian Y (2003),” A LSB Steganography Detection Algorithm”, The 14th IEEE 2003 International Symposium on Persona1,lndoor and Mobile Radio Communication Proceedings.pp.2780-2783.
[2] Anindya Sarkar, Member, IEEE, Upamanyu Madhow, Fellow,IEEE, and B.S.Manjunath, Fellow, IEEE, (2010) “Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography”, IEEE Transactions on Information Forensics and Security, Vol.5.No.2, pp.225-239.
[3] Jaswinder Kaur, Inderjeet & Manoj Duhan, (2009) “A Comparative Analysis of Steganographic Techniques”, International Journal of Information Technology and Knowledge Management, Vol. 2, No. 1, pp 191-194
[4] Mamta Juneja and Parvinder Singh Sandhu, (2013) “A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424.
[5] Shamim Ahmed Laskar and Kattamanchi Hemachandran, (2013) “Steganography Based On Random Pixel Selection For Efficient Data Hiding”, IJCET, Vol.4, Issue 2, pp.31-44.
[6] M.B.Ould MEDENI and El Mamoun SOUIDI, (2010) “Steganography and Error Correcting Codes”, IJCSIS, Vol.8.No.8, pp147-149..
[7] Rajkumar Yadav, (2011) “A Novel Approach For Image Steganography In Spatial Domain Using Last Two Bits of Pixel Values”, International Journal of Security, Vol.5 Iss. 2 pp. 51-61
[8] Parul, Manju, Dr. Harish Rohil, “Optimized Image Steganography using Discrete Wavelet Transform (DWT)”, International Journal of Recent Development in Engineering and Technology, ISSN 2347– 6435, Volume 2, Issue 2, February 2014). pp. 75-81.
[9] C.-H. Yang and M.-H. Tsai, (2010) “Improving Histogram-based Reversible Data Hiding by Interleaving Predictions”, IET Image Processing, Vol.4. Iss. 4 pp. 223-234
[10] Tanmay Bhattacharya, Manas Paul & Arindam Dasgupta (2009) “A Novel session Based Text Encryption & Hiding Technique Using Bit Level Cross Fold Transposition & Genetic Algorithm”, International Journal of Information Technology and Knowledge Management, Vol. 2, No.2, pp.419-423.
[11] Fahim Irfan et. Al.s (2011) “An Investigation into Encrypted Message Hiding through Images Using LSB ”, International Journal of EST.
[12] Keith L.Haynes, (2011) “Using Image Steganography to Establish Covert Communication Channels”, International Journal of Computer Science and Information Security, Vol 9, No.9, pp. 1- 7.
[13] Sunny Dagar, “Highly Randomized Image Steganography using Secret Keys”, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India.
[14] D.P.Gaikwad and S.J.Wagh, (2010) “Colour Image Restoration For An Effective Steganography”, I-mar‟s Journal on Software Engineering, Vol.4 .No.3, pp.654
[15] Hemalatha.S, U.Dinesh Acharya and Renuka.A, (2013) “Comparison of Secure and High Capacity Color Image Steganography Techniques in RGB and YCBCR domains”, International Journal of Advanced Information Technology, Vol.3, No.3, pp.1-9.
Citation
H.A. Patil, P. Saxena, "Analysis and Review of the Steganographic Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.681-685, 2018.
A Review On Hybrid Feature Based Object Mining And Tagging
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.686-689, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.686689
Abstract
Tag mining is important as far as image search engines/databases are concerned viz. Flicker, Picasa, Facebook...etc. Tag Mining is a difficult and highly relevant machine task. In this paper, we present a new approach to hybrid features based object mining and tagging that identifies the objects with higher accuracy from an occluded image. In existing system tag Mining with algorithms based on ‘Nearest neighbor classification’ have achieved considerable attention implementation point of view but at the cost of increasing computational complexity both during training and testing. It is very difficult to identify the object which is occluded in image. The objective of object tagging of image is to search over user contributed photo online which have accumulated rich human knowledge and billions of photos, then associate surrounding tags from those visually similar photos for the unlabeled image. For an unlabeled image, photos in the social media are extracted by the Feature based object tagging of image, the annotations associated with the images are expanded, and then each object group is classify. In this paper different features and classifier are compare with advantages and disadvantages.
Key-Words / Index Term
Image processing, Object recognition, object mining, object tagging, feature extraction, classification, SVM
References
[1] Hiteshree H. Lad, Mayuri A. Mehta “Analysis of Feature based Object Mining and Tagging Algorithm Considering Different Levels of Occlusion ” IEEE , 2017
[2] Adrian Llopart, Ole Ravn, Nils A. Andersen, Jong-Hwan Kim “Generalized framework for the parallel semantic segmentation of multiple objects and posterior manipulation” IEEE, 2017
[3] Ali Vashaee , Reza Jafari, Djemel Ziou, Mohammad Mehdi Rashidi “Rotation invariant HOG for object localization in web images ” Elsevier , 2016
[4] Amin Mohamed Ahsan , Dzulkifli Bin Mohamad “Machine learning technique for object detection based on SURF feature ” Int. J. Computational Vision and Robotics, 2017
[5] Zahid Mahmood, Mahammad Nazeer, Muhammad Arif, Imran Shahzad, Fahad Khan, Mazhar Ali “Boosting the Accuracy of AdaBoost for Object Detection and Recognition” International Conference on Frontiers of Information Technology ,2016
[6] Pawel Forczmanski, Andrzej Markiewicz “Two-stage approach to extracting visual objects from paper documents ” SPINGER, 2016
[7] Muhammad Sipan, Supeno Mardi Susiki , Eko Mulyanto Yuniarno “Image Block Matching Based on GLCM Texture Feature on Grayscale Image Auto Coloring” IEEE ,2017
[8] Nikhil Rasiwasia, Nuno Vasconcelos “Holistic Context Models for Visual Recognition” IEEE, 2012
[9] R.suresh , P. Dhivya and N.Bhuvana “Analysis on Image Mining Techniques” International Conference on Innovations in information Embedded and Communication Systems (ICIIECS) IEEE, 2017
[10] I.Khan, A.Khan and R.Shaikh “Object analysis in image mining” conf. Computing for sustainable global development (INDIACom) ,2015
[11] Jigisha M.Patel and Nikunj C. Gamit “A Review on Feature Extraction Techniques in Content Based Image Retrieval” IEEE, 2016
Citation
Hemali Patel, Milin M Patel, "A Review On Hybrid Feature Based Object Mining And Tagging," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.686-689, 2018.
Higher Order Mutation-based Framework for Genetic Improvement (GI)
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.690-694, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.690694
Abstract
Mutation Testing is a fault based software testing technique, was proposed in the 1970’s, it has been considered as an effective technique of software testing process for evaluating the quality of the test data. In other words, Mutation Testing is used to evaluate the fault detection capability of the test data by inserting errors into the original program to generate mutations, and after then check whether tests are good enough to detect them. A lot of solutions have been proposed to solve that problem. A new form of Mutation Testing is Higher Order Mutation Testing, was first proposed by Harman and Jia in 2009 and is one of the most promising solutions. In this paper, we consider the main limitations of Mutation Testing and previous proposed solutions to solve that problems. This paper also refers to the development of Higher Order Mutation Testing and reviews the methods for finding the good Higher Order Mutant.
Key-Words / Index Term
FOM, HOM, SHOM, GI.
References
[1]. M. Harman and Y. Jia (2009). Higher Order Mutation Testing. King’s college London, CREST centre.
[2]. M. Harman et al. (2010). A Manifesto for Higher Order Mutation Testing. King’s College London, CREST centre, Strand, London, WC2R 2LS, UK.
[3]. S. Kapoor (2011). Test Case Effectiveness of Higher Order Mutation Testing. International Journal of Computer Technology Application. Volume 2 (5), 1206-1211.
[4]. Aderonke Olusola Akinde (2012). Using Higher Order Mutation For Reducing
Equivalent Mutants In Mutation Testing, Asian Journal Of Computer Science And Information Technology 2: 3 (2012) 13 –18. www.innovativejournal.in
[5]. Lisherness, P., Lesperance, N., Cheng, K.T (2013). Mutation Analysis with Coverage Discounting. Design, Automation and Test in Europe Conference and Exhibition.
[6]. Nguyen, Q. V., and Madeyski, L (2014). Problems of mutation testing and higher order mutation testing. In Advanced Computational Methods for Knowledge Engineering, T. Do, H. A. L. Thi, and N. T. Nguyen, Eds., vol. 282 of Advances in Intelligent Systems and Computing. Springer International Publishing, 2014, pp. 157–172.
[7]. Ahmed S. Ghiduk, Moheb R. Girgis, Marwa H. Shehata (2017). Higher order mutation testing: A Systematic Literature Review, Received 1 July 2016 Received in revised form 8 June 2017, Accepted 15 June 2017 Available online 4 August 2017, www.elsevier.com/locate/cosrev, http://dx.doi.org/10.1016/j.cosrev.2017.06.001
[8]. E. Omar, S. Ghosh, D. Whitley (2017). Subtle higher order mutants, Inf. Softw. Technol. 81 (2017) 3–18.
[9]. Y. Jia, F. Wu, M. Harman, J. Krinke (2015) Genetic Improvement using Higher Order Mutation, in: GECCO Companion’15: Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, pp. 803–804.
[10]. Q.V. Nguyen, L. Madeyski, (2016). Empirical evaluation of multi-objective optimization algorithms searching for higher order mutants, in: Cybernetics an Systems — Smart Experience and Knowledge Engineering for Optimization earning, and Classification/Recommendation Problems, vol. 47, 2016, pp. 48–68.
[11]. Q. Vu Nguyen, L. Madeyski, (2016). On the relationship between the order of mutation testing and the properties of generated higher order mutants, in: Ngoc Thanh Nguyen, Bogdan Trawiński, Hamido Fujita, Tzung-Pei Hong (Eds.), Intelligent Information and Database Systems, ACIIDS 2016, in: Lecture Notes in Artificial Intelligence, vol. 9621, Springer-Verlag, Berlin Heidelberg, 2016.
[12]. A.S. Ghiduk, (2016). Reducing the number of higher-order mutants with the aid of data flow, e-Inform. Softw. Eng. J. 10 (2016) 31–49.
[13]. M. Kintis, M. Papadakis, N. Malevris (2010), Evaluating mutation testing alternatives: A collateral experiment, in: Proc. 17th Asia Pacific Soft. Eng. Conf., APSEC.
[14]. M. Papadakis, N. Malevris,(2010). An empirical evaluation of the first and second order mutation testing strategies, in: Proceedings of the 2010 Third
[15]. M. Polo, M. Piattini, I. Garcia-Rodriguez (2008). Decreasing the cost of mutation testing with second-order mutants, Softw. Test. Verif. Reliab. 19 (2) (2008) 111–131.
[16]. M. Kintis, M. Papadakis, N. Malevris (2012). Isolating First Order Equivalent Mutants via Second Order Mutation, in: IEEE Fifth International Conference on Software Testing, Verification and Validation, 2012, pp. 701–710.
[17]. L. Madeyski, W. Orzeszyna, R. Torkar, M. Józala, (2014). Overcoming the equivalent mutant problem: A systematic literature review and a comparative experiment of second order mutation, IEEE Trans. Softw. Eng.. 40 (1) (2014) 23–44.
[18]. Y. Jia, M. Harman (2009). Higher order mutation testing, J. Inf. Softw. Technol. 51 (10) (2009) 1379–1393.
[19]. M. Harman, Y. Jia, W.B. Langdon, (2011). Strong higher order mutation-based test data generation, in: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, ESEC/FSE’11, 2011, pp. 212–222.
[20]. A.O. Akinde, (2012). Using higher order mutation for reducing equivalent mutants in mutation testing, Asian J. Comput. Sci. Inf. Technol. 2 (3) (2012) 13–18.
[21]. A. Derezińska, K. Hałas, (2014). Experimental evaluation of mutation testing approaches to python programs, in: Proc. of 7th IEEE Inter. Conf. on Software Testing Verification and Validation Workshops, ICSTW, IEEE Comp. Soc, 2014, pp. 156–164.
[22]. Anna Lumelsky (2018). Genetic Testing and Government Regulation: The Growing Significance of Pharmacogenomics Accessed August 19, 2018 11:52:12 AM EDT http://nrs.harvard.edu/urn-3:HUL.InstRepos:8852131
[23]. B Bapat, H Noorani, Z Cohen, T Berk, A Mitri, B Gallie, K Pritzker, S Gallinger, A S Detsky (2018). Cost comparison of predictive genetic testing versus conventional clinical screening for familial adenomatous polyposis, Download on http://gut.bmj.com/ on 19 August 2018 by guest
[24]. E.J Weyuker and T.J Ostrand, (1980). Theories of Program Testing and the Application of Revealing Subdomains, IEEE Transaction Software Engineering., vol. SE.
[25]. J. Good enough and S. L. Gerhart, (1977), Towards a theory of Test Data Selection,”IEEE Transaction Software Engineering., vol. SE-3.
[26]. R.G Hamlet, (1977). Testing programs with the AID of a Compiler, IEEE Transactions on Software engineering.
[27]. R. DeMillo, R. Lipton and F Sayward,(1978), Hints on Test Data Selection: Help for the Practicing Programmer, Computer, 11(4): 34-41: April, 1978.
[28]. Antonia Estero-Botaro Palomo-Lozano and Inmaculada Medina Bulo, (2015). Quantitative Evaluation of Mutation Operators for WS-BPEL Compositions, Department of Computer Languages and Systems, University of C? adiz, Spain.
[29]. M.Woodward (1993). Errors in Algebaric Specification and an Experimental Mutaion Testing Tool” Software Engineering Journal, pages 211-224, July 1993.
[30]. Y. Jia and M. Harman, (2009). An Analysis and Survey of the Development of Mutation Testing”, CREST Center, King’s College, London, Tech. Rep. TR-09-06, 2009.
[31]. A.J. Offut. (1992). Investigations of the Software Testing Coupling Effect, ACM Transactions on Software engineering Methodology 1(1):3-18 January 1992.
[32]. A . Derzinska, (2006). Quality Assessment of Mutation Operators Dedicated for C# Programs” in QSIC 2006: sixth International Conference on Quality Software, Beijing, China: IEEE, Computer society , 2006, pp 227-234.
[33]. Howden W. E. (1982), Weak Mutation Testing and Completenes of Test Sets, IEEE transaction on Software Engineering, 8(4): page 371-379.
[34]. W. E Howden, (1987). Functional Programming Testing and Analysis, McGraw-hill Book company New York NY 1987.
Citation
Shivani Chauhan, Raghav Mehra, "Higher Order Mutation-based Framework for Genetic Improvement (GI)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.690-694, 2018.
A Review On Exploring Online Ad Images Using A Clustering Approach
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.695-698, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.695698
Abstract
Online advertising is a huge, rapidly growing advertising market in today`s world. One common form of online advertising is using image ads. A decision is made (often in real time) every time a user sees an ad, and the advertiser is eager to determine the best ad to display. Consequently, many algorithms have been developed that calculate the optimal ad to show to the current user at the present time. Typically, these algorithms focus on variations of the ad, optimizing among different properties such as background color, image size, or set of images but none of them define the property of objects. Our study looks at new qualities of ads that can be determined before an ad is shown (rather than online optimization) and defines which ad image’s objects are most likely to be successful. We present a set of algorithms that utilize machine learning to investigate online advertising and to construct object detection models which can foresee objects that are likely to be in successive ad image. The focus of results is to get high success rate in ad image with objects appear in it. In this paper we are finding the best classifier among the all.
Key-Words / Index Term
Object Detection, Machine Learning, And Prediction Model
References
[1] Michael Fire, Jonathan Schler. “Exploring Online Ad Images Using a Deep Convolutional Neural Network Approach” 2017.
[2] Jinsu Lee, Junseong Bang, and Seong Yang. “Object Detection With Sliding Window in Images Including Multiple Similar Objects”.
[3] Meera M K, Shajee Mohan B S. “bject Recognition in Images” 2016.
[4] Jie Sheng Tham, Yoong Choon Chang and Mohammad Faizal Ahmad Fauzi “Object Recognition using Depth Information of a Consumer Depth Camera” IEEE 2015.
[5] Kyung Mo Koo, Eui Young Cha. “Image recognition performance enhancements using image normalization” 2017.
[6] Hideaki Yanagisawa, Takuro Yamashita, Hiroshi Watanabe.” A Study on Object Detection Method from Manga Images using CNN” 2018.
[7] Csurka, G., C. R. Dance, L. Fan, J. Willamowski, and C. Bray. “Visual Categorization with Bags of Keypoints.” Workshop on Statistical Learning in Computer Vision. ECCV 1 (1–22), 1–2.
[8] Jie Sheng Tham, Yong-Shen Chen, Mohammad Faizal Ahmad Fauzi, Yoong Choon Chang. “Depth Image Object Recognition using Moment Invariants”2016.
[9] Astha Gautam, Anjana Kumari and Pankaj Singh “The Concept of Object Recognition” IJARCSSE 2015.
[10] Dr. R.Muralidharan ” Object Recognition Using K-Nearest Neighbor Supported By Eigen Value Generated From the Features of an Image” IJIRCCE 2014.
[11] Mingqiang Yang, Kidiyo Kpalma and Joseph Ronsin ” A Survey of Shape Feature Extraction Techniques” IETR-INSA 2008
[12] Divya Srivastava, Rajesh Wadhvani and Manasi Gyanchandani “Review: Color Feature Extraction Methods for Content Based Retrieval Image”
[13] Link” https://in.mathworks.com/help/vision/ref/vision.cascadeobjectdetector-system-object.html”.
Citation
Krushil Bhadani, Bijal Talati, "A Review On Exploring Online Ad Images Using A Clustering Approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.695-698, 2018.