Assessing the Quality of Voice using E-Model for Optimized Congestion Control approach in Mobile Ad-hoc Network
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.674-678, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.674678
Abstract
Congestion is an unsolvable and challenging issue for real time data such as voice especially in MANET. Since mobile devices support limited bandwidth, limited battery power, dynamic links and frequently changing routing decision, controlling congestion is a challenging and critical task. Also voice transmission requires valid data to be delivered at receiver by supporting less End-End-Delay. Hence there exists a need to apply dynamic and efficient routing schemes which handle congestion and reduce its severity, proactively avoid congestion before its occurrence. The state of storing packet continuously causes router queue to overflow and drops the incoming packet. Packet drop at these router queues also forecasts nearing congestion. Hence router queue uses various queue management approaches to minimize the occurrence of packet drop and congestion. RED based flavors of proactive queue management schemes received a lot of attention in recent years in controlling congestion over MANET. In this paper, we propose a congestion control approach that supports three different interdisciplinary approaches to control congestion on voice data transmission. Finally we evaluate the performance of the proposed approach using E-Model and compare the performance of the three approaches in order to identify the best approach that supports improved quality at user level. Fuzzy logic based congestion control approach shows improved performance.
Key-Words / Index Term
CLHCC, PEACR, LPWAP, FANT, BANT
References
Lingfen Sun, Emmanuel C. Ifeachor, “Voice Quality Prediction Models and Their Application in VoIP Networks”, IEEE Transactions on Multimedia, Vol.8, No.4, Aug 2006.
[2] P.G.Kulkarni, S.I.McClean, G.P.Parr, M.Black, “Light weight ProActive Queue MANagement”, IEEE Transactions on Network and Service Management, Vol.3, No.2, Second Quarter 2006.
[3] K.Dinesh Kumar, I.Ramya , M.Roberts Masillamani, “Queue Management In Mobile Adhoc Networks (Manets), School of Computer Science and Engineering”, IEEE/ACM International Conference on Green Computing and Communications, Dec 2010.
[4] M. Belkadi, M. Lalam, A. M’zoughi, N. Tamani, M. Daoui, R. Aoudjit, “Intelligent Routing and Flow Control in MANETs”, Journal of Computing and Information Technology (CIT), Vol.18, No.3, Sep 2010.
[5] Javad Pashae Barbin , Majid Taghipoor, Vahid Hosseini, “A Novel Algorithm for Manets using Ant Colony”, International Journal of Computer Science Issues (IJCSI), Vol.9, No.1, Jan 2012.
[6] Sreenivasa B.C, G.C. Bhanu Prakash, K.V. Ramakrishnan, “Comparative analysis of ADTCP and ADTCP:Congestion Control Techniques for improving TCP performance over Ad-hoc Networks”, International Journal of Mobile Network Communications & Telematics (IJMNCT), Vol.2, No.4, Aug 2012.
[7] Kajal Yadav, Prof. Gaurav Shrivastava,
“Performance Improvement by Dynamic Queue Management in Mobile Ad-hoc Network”, International Journal of Computer Applications(IJCA), Vol.72, No.1, May 2013.
[8] Hariom Soni, Pradeep Kumar Mishra, “Congestion Control Using Predictive Approach in Mobile Ad-hoc Network”, International Journal of Soft Computing and Engineering (IJSCE), Vol.3, No.4, Sep 2013, ISSN:2231-2307.
[9] H. Zare, F. Adibnia, V. Derhami, “A Rate based Congestion Control Mechanism using Fuzzy Controller in MANETs”, International Journal of Computer Communication, Vol 8, No.3, Jun 2013, ISSN:1841-9836.
[10] D. Jinil Persis,T. Paul Robert, “ Ant Based Multi-objective Routing Optimization in Mobile Ad-hoc Network”, Indian Journal of Science and Technology, Vol.8, No.9, May 2015.
[11]Ritika Mehra, Manjula Saluja, “Adaptive Congestion Control Mechanisms in Mobile Ad-hoc Networks”, International Journal of Engineering Development and Research, Vol.5, No.1, March 2017, ISSN:2221-9939.
[12]Vanita Jain, Aarushi Jain , Achin Jain , Arun Kumar Dubey,” Comparative Study between FA, ACO, and PSO Algorithms for Optimizing Quadratic Assignment Problem”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, No.2, April 2018.
[13]Anurag Singh, Rajnesh Singh, Sunil Gupta,”Evaluating the Performance of TCP over Routing Protocols in MANETs Using NS2”, International Journal of Scientific Research in Network Security and Communication, Vol.6, No.4, August 2018.
Citation
V. Savithri, A. Marimuthu, "Assessing the Quality of Voice using E-Model for Optimized Congestion Control approach in Mobile Ad-hoc Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.674-678, 2018.
Command line and Graphical interface comparative analysis for ARP Poisoning through Ettercap
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.679-683, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.679683
Abstract
There has been many changes taking place in the recent arena of Address Resolution Protocol (ARP) Poisoning from the command line interpretation to the graphical interfaces that are developed. The process of ARP Poisoning is one of the famous techniques amongst present Man in The Middle (MITM) attacks. It is applicable to access the various unsecured websites authentication details which can be captured by the attacker and can be visualized on both the command line and graphical user interface (GUI). The entire process or communication takes place through the ethernet or local area network (LAN) and the result of the poisoned address is the physical address of the LAN which acts as a common interface between both the attacker and victim’s machine. This paper, there by explains the entire mechanism of ARP Poisoning that takes place through the LAN by both the command line interpretation (CLI) and the GUI Ettercap which shows the differences amongst both the methods and determines the best method which has the least complexity.
Key-Words / Index Term
Address Resolution Protocol (ARP), ARP Poisoning, Man in The Middle Attack, Ettercap, Attacker, Victim, Ethernet or Local Area Network (LAN).
References
[1] Mauro Conti, Nicola Dragoni, Viktor Lesyk, "A Survey of Man In The Middle Attacks”, Communication surveys & Tutorials IEEE, vol. 18, no. 3, pp. 2027-2051, 2016.
[2] Navid Behboodian, “ARP Poisoning attack: “An introduction to attack and mitigations”, vol.1, 2 Jan 2012.
[3] Sudhakar, R.K. Aggarwal, A Survey on Comparative Analysis of Tools for detection of ARP Poisoning, International Conference on Telecommunication and Networks, 2017.
[4] C. Hornig, Standard for the transmission of IP datagrams over Ethernet networks, Internet Engineering Task Force, RFC 826, November 1982.
[5] D. Plummer, An ethernet address resolution protocol, Nov.2010, RFC 826
[6] Kyokyedk Kwon, Seongjin Ahn, Jinwook Chung, "Network Security Management Using ARP Spoofing", pp. 142-149, 2004.
[7] Behrouz A. Forouzan, "Data Communications and Networking" in, Mc Graw Hill, pp. 678-680, 2007.
[8] D. Bruschi, A. Ornaghi, and E. Rosti, S-arp: a secure address resolution protocol in Computer Security Applications Conference, 2003. Proceed-ings. 19th Annual. IEEE, 2003, pp. 66 -74.
[9] S. Jadhav and Mandal,” A survey on network security for open source,” IEEE International Conference of Current Trends in Advanced Computing (ICCTAC), pp. 1-6,2016.
Citation
S. Prudhviraj, C. Sudha, "Command line and Graphical interface comparative analysis for ARP Poisoning through Ettercap," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.679-683, 2018.
An Intelligent Automatic Multi-Disease Prediction Technique using Data Mining Algorithms and Big Data
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.684-690, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.684690
Abstract
Big data and its techniques not only help the biomedical and healthcare sectors to forecast the disease prediction but also the patients. It is difficult to meet the doctor at all the times in hospital for minor symptoms. Big data gives necessary information about the diseases based on the symptoms of the patient. Nowadays people wants to know more about their health, diseases and the related treatments for their betterment. However existing health care system gives structured input which lacks in reliable and accurate prediction. Here, Automatic Multi-Disease Prediction (AMDP) technique is proposed which identifies the most accurate disease based on patient’s input which benefits in early detection. Electronic Health Record (EHR) maintains and updates patient health records which facilitate an improved prediction model. Big data uses both structured and unstructured inputs which result in instant guidance to their health issues. The system takes input from the users which checks for various diseases associated with the symptoms based upon analyzing a variety of datasets. If the system is not able to provide suitable results, it intimate the users to go for Clinical Lab Test (CLT) such as blood test, x-ray, and scan so on where the uploaded images are sent for the effective deep learning prediction. The different parameters included in effective automatic multi disease prediction include preprocessing, clustering and predictive analysis. The main objective of the proposed system is to identify the diseases based on the symptoms and give proper guidance for the patients to take treatment quickly without making any further delay in a convenient and efficient manner.
Key-Words / Index Term
Big Data, AMDP, EHR, Deep Learning Algorithm, CLT
References
[1]. Min Chen, Yixue Hao, Kai Hwang, Lu Wang, and Lin Wang, “Disease Prediction by Machine Learning over Big Data from Healthcare Communities”, IEEE. 2169-3536, 2017.
[2]. Feixiang Huang, Shengyong Wang, and Chien-Chung Chan, “Predicting Disease By Using Data Mining Basedon Healthcare Information System”, IEEE International Conference on Granular Computing, 978-1-4673-2311-6, 2012.
[3]. SujathaR ,Sumathy R and Anitha Nithya R, “A Survey of Health Care Prediction Using Data Mining”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 5, Issue 8, 2016.
[4]. Pinky Saikia Dutta, Shrabani Medhi, Sunayana Dutta, Tridisha Das and Sweety Buragohain, “Smart Health Care Using Data Mining”, International Journal of Current Engineering And Scientific Research, ISSN : 2393-8374, Vol.-4, Issue-8,2017.
[5]. Ravi Aavula, M.Kruthini, N.Raviteja and K.Shashank, “Smart Health Consulting Android System”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 6, Issue 3, 2017.
[6]. Priyanka Vijay Pawar, MeghaSakharamWalunj and PallaviChitte, “Estimation based on Data Mining Approach for Health Analysis”, International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 4 , 2017.
[7]. V. Krishnaiah, G. Narsimha and N. SubhashChandra, “A Study On Clinical Prediction Using Data Mining Techniques”, International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Vol. 3, Issue 1, 2013.
[8]. Rawan Ali AL-jraib, Wafamoqhas, Huda Saeed Salman, AmeeraMohyAdden and Mona Mohmmad, “Biohouse Journal of Computer Science”, International Journal Series, ISSN 2379-1500, 2017.
[9]. Md. Tahmid Rahman Laskar, Md. Tahmid Hossain, Abu RaihanMostofa Kamal and NafiulRashid, “Automated Disease Prediction System (ADPS): A User Input-based Reliable Architecture for Disease Prediction”, International Journal of Computer Applications (0975 – 8887), Vol. 133 – No.15, 2016.
[10]. Aditya Tomar, “An Approach to Devise an Interactive Software Solution for Smart Health Prediction using Data Mining”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 7, 2016.
[11]. VidyaZope, PoojaGhatge, Aaron Cherian, PiyushMantri and KartikJadhav, “Smart Health Prediction using Machine Learning”, IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 12, 2017.
[12]. AakashKhatavkar, PiyushPotpose and PankajkumarPandey, “Smart Health Prediction System”, IJSRD - International Journal for Scientific Research & Development Vol. 5, Issue 02, 2017.
[13]. Prashant Tiwari, AmanJaiswal, NarendraVishwakarm and PushpanjaliPatel, “Smart Health Care - An Android App To Predict Disease On The Basis Of Symptoms”, International Research Journal of Engineering and Technology (IRJET), Vol.: 04 Issue: 04, 2017.
[14]. EvaK.Lee and Tsung-LinWu, “Classification and disease prediction via mathematical programming”, American Institute of Physics, AIP Conference Proceedings, doi: 10.1063/1.2817343, 2007.
[15]. Riccardo Miotto, Li Li, Brian A. Kidd and Joel T. Dudley, “Deep Patient: An Unsupervised Representation to Predict the Future of Patients from the Electronic Health Records”, DOI: 10.1038 / srep26094, 2016.
[16]. Prasan Kumar Sahoo, Suvendu Kumar Mohapatra and Shih-Lin Wu, “Analyzing Healthcare Big Data with Prediction for Future Health Condition”, IEEE OI 10.1109/ACCESS.2016.2647619, 2016.
[17]. Cheng-HsiungWeng, Tony Cheng-Kui Huang and Ruo-Ping Han, “Disease prediction with different types of neural network Classifiers”, Elsevier Ltd. http://dx.doi.org/10.1016/j.tele.2015.08.006, 2016.
[18]. Xianglin Yang, Yunhai Ton, XiangfengMeng, Shuai Zhao, ZhiXu, YanjunLi,Guozhen Liu and Shaohua Tan, “Online Adaptive Method for Disease Prediction Based on Big Data of Clinical Laboratory Test”, IEEE978-1-4673-9904-3, 2016.
[19]. AjinkyaKunjir, HarshalSawant, NuzhatF.Shaikh, “Data Mining and Visualization for Prediction of Multiple Diseases in Health Care”, IEEE 978-1-5090-6399-4, 2017.
Citation
S Manimekalai, R Suguna, S Arulselvarani, "An Intelligent Automatic Multi-Disease Prediction Technique using Data Mining Algorithms and Big Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.684-690, 2018.
Study of Use of Classification Techniques in WSN Data Mining for Resource Optimization
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.691-696, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.691696
Abstract
With the wide application of Wireless Sensor Network Technology, a large volume of data is generated. For extracting knowledgeful, understandable and valid patterns from this data, data mining techniques are used. This Wireless Sensor Network Data Mining may use Centralized Mining Approach or Distributed Mining approach. Distributed mining, mining is applied on sensor nodes. After that mined data are sent to sink node. But, in centralized approach whole data from sensor nodes are collected at sink node then mining is applied on dataset. This paper focuses on Centralized Data Mining Approach to mine dataset. Here, Classification Techniques, SVM (support Vector Machine) and KNN (K-Nearest Neighbour), are applied on this collected dataset with taking concentration on optimization of CPU cycle as compressible resource. For this execution time to classify data is used here. For this real dataset, it is resulting that KNN is giving better performace than SVM. The dataset is gathered from a real time data acquisition system based on wireless sensor network that is implemented using XBee Digi modules and open source hardware platform Arduino. It is trying to make a hybrid framework, combination of Distributed Approach and Centralized Approach, for this real time deployment of WSN as a future work.
Key-Words / Index Term
Wireless Sensor Network Data Mining, Centralized Mining Approach, SVM, KNN, Resource Optimization
References
[1] S. H. Chauhdary, A. K. Bashir, S. C. Shah, M. S. Park, “EOATR: energy efficient object tracking by auto adjusting transmission range in wireless sensor network”, Journal of Applied Sciences, vol. 9, Issue. 24, pp. 4247–4252, 2009.
[2] P. K. Biswas, S. Phoha, “Self-organizing sensor networks for integrated target surveillance”, IEEE Transactions on Computers,vol. 55, Issue No. 8, pp. 1033–1047, 2006.
[3] J. Yick, B.Mukherjee, D. Ghosal, “Wireless sensor network
survey”, ComputerNetworks, vol. 52,no. 12,pp. 2292–2330, 2008.
[4] T. Arampatzis, J. Lygeros, S. Manesis, “A survey of applications of wireless sensors and wireless sensor networks”, in Proceedings of the 20th IEEE International Symposium on Intelligent Control (ISIC ’05), pp. 719–724, June 2005.
[5] A. Rozyyev, H. Hasbullah, F. Subhan,“Indoor child tracking in wireless sensor network using fuzzy logic technique”, Research Journal of Information Technology, vol. 3, Issue. 2, pp. 81– 92, 2011.
[6] R. Szewczyk, E. Osterweil, J. Polastre, M. Hamilton, A. Mainwaring, D. Estrin, “Habitat monitoring with sensor networks”, Communications of the ACM, vol. 47, no. 6, pp. 34–40, 2004.
[7] L. T. Lee, C. W. Chen, “Synchronizing sensor networks with pulse coupled and cluster based approaches”, Information Technology Journal, vol. 7, Issue 5, pp. 737–745, 2008.
[8] N. Sabri, S. A. Aljunid, B. Ahmad, A. Yahya, R. Kamaruddin, andM. S. Salim, “Wireless sensor actor network based on fuzzy inference system for greenhouse climate control”, Journal of Applied Sciences, vol. 11, Issue. 17, pp.3104–3116, 2011.
[9] D. Kumar, “Monitoring forest cover changes using remote sensing and GIS: a global prospective”, Research Journal of Environmental Sciences, vol. 5, pp. 105–123, 2011.
[10] Y. C. Tseng, M. S. Pan, and Y.Y. Tsai,“Wireless sensor networks for emergency navigation”, Computer, vol. 39, no. 7, pp. 55–62, 2006.
[11] J. Han, M. Kamber, J. Pei,“Data Mining Concepts and Techniques”, Morgan Kaufmann Publishers, USA, pp. 8, 2012.
[12] A. Mahmood, K. Shi, S. Khatoon, Mi Xiao, “Data Mining Techniques for Wireless Sensor Networks: A Survey”, International Journal of Distributed Sensor Networks, Vol. 2013, 2013
[13] R. Sunny T, S. M. Thampi, “Survey on Distributed Data mining in P2P Networks”, dblp computer science bibliography, 2012
[14] P. Singh, “Sensor Association Rules: a Survey”, Vol. 9, Issue 9, pp. 67-71, 2014
[15] A. Boukerche, S. Samarah, “A New Representation Structure for Mining Association Rules from Wireless Sensor Networks”, PARADISE University of Ottawa, 2007
[16] A. Mahmood, K. Shi, S Khatoon, “Mining Data Generated by Sensor Networks: A Survey”, Information Technology Journal, Vol. 11, 2012
[17] A. K. Naik, R. Kumar Dwivedi, “A Review On Use Of Data Mining Methods In Wireless Sensor Network”, International Journal Of Current Engineering And Scientific Research (IJCESR), Vol. 3, Issue. 12, 2016
[18] C. Sudha, A. Nagesh, “A Comprehensive Survey on Data Mining Techniques in Wireless Sensor Networks”, International Journal of Computer Sciences and Engineering (IJCSE), Vol. 6, Issue. 6, pp. 1523-1527, 2018.
[19] M. Maksimović, V. Vujović, “Comparative Analysis Of Data Mining Techniques Applied To Wireless Sensor Network Data For Fire Detection”, Journal of Information Technology and Applications, pp. 65-77, 2013
[19] B.-H. Park, H. Kargupta, “Distributed data mining: Algorithms, systems, and applications” Data Mining Handbook, 2002.
[20] S. Sardellitti G. Scutari S. Barbarossa "Joint optimization of radio and computational resources for multicell mobile-edge computing", IEEE Transactions On Signal And Information Processing Over Networks, Vol. 1, no. 2, pp. 89-103, 2015.
[21] B. A. Parbat, R. K. Dhuware, “Real Time Data Acquisition System for WSN Using Arduino for Polyhouse”, International Journal of Computer Sciences and Engineering(IJCSE), Vol. 6, Issue. 8, pp. 608-612, 2018.
[22] L. He, Z. Qiang, W. Zhou, S. o,“A Review of Resource Scheduling in Large-Scale Server Cluster”, International Conference on Knowledge Management in Organizations, pp. 494-505, 2016, ISBN 978-3-319-62698-7.
Citation
B. A. Parbat, R. K. Dhuware, "Study of Use of Classification Techniques in WSN Data Mining for Resource Optimization," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.691-696, 2018.
Comparative analysis of Grammar Checkers of various Asian Languages
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.697-700, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.697700
Abstract
The processing of natural languages using Computational Linguistics is an important domain of NLP(Natural Language processing). Many sentences are written in a natural language which may be defined as units, explicitly "linguistic units" which are meaningful and involve one or more words linked together in accordance with a set of predefined rules called ‘Grammar’. Grammar checking is the task of detection and correction of grammatical errors in the text. Though a lot of work is done particularly for English language yet scant work is done for various Asian languages. This paper explores the contribution made by various researchers in this sphere. This paper critically analyses advancements made in relevance to global context. This facilitates better understandability, comparison and evaluation of previous research.
Key-Words / Index Term
Computational Linguistics, Natural Language Processing, Grammar checking, Grammatical errors
References
[1] N. S. Bhirud, R. P. Bhavsar, & B. V. Pawar, "Grammar Checkers For Natural Languages: A Review", International Journal on Natural Language Computing (IJNLC) , Vol. 6, No.4, pp.1-4, 2017.
[2] C.C. Burch, P. Koehn, C. Monz, M. Post, R. Soricut, & L. Specia, Findings of the 2012 workshop on statistical machine translation, In Proceedings of the Seventh Workshop on Statistical Machine Translation, Montreal, Canada, pp. 10–51, 2012.
[3] M.S. Gill, G.S. Lehal, "A grammar checking system for Punjabi", In 22nd International Conference on on Computational Linguistics: Demonstration Papers. Association for Computational Linguistics,pp. 149-152, 2008
[4] B. Kitchenham, "What’s up with software metrics?–A preliminary mapping study", Journal of systems and software, Vol. 83, No.1, pp. 37-51, 2010.
[5] D. Naber, "A rule-based style and grammar checker," Master`s thesis, University of Bielefeld, 2003.
[6] B. Manchanda, V.A. Athavale, & S.K. Sharma,"Various Techniques Used For Grammar Checking", International Journal of Computer Applications & Information Technology, Vol.9, No.1, pp.177-181, 2016.
[7] S.K. Sharma, & G.S. Lehal,"Improving Existing Punjabi Grammar Checker", In International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) IEEE, pp. 445-449, 2016.
[8] k. Inui, A. Fujita, T. Takahashi, R. Iida, & T. Iwakura, "Text simplification for reading assistance: a project note",In Proceedings of the second international workshop on Paraphrasing Association for Computational Linguistics,Vol. 16,pp.9-16, 2003.
[9] S. Devlin, G. Unthank, "Helping aphasic people process online information", In Proceedings of the 8th international ACM SIGACCESS conference on Computers and accessibility,pp.225-226, 2006.
[10] O. Biran, S. Brody, N. Elhadad,"Putting it simply: a context-aware approach to lexical simplification", In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: Short Papers, vol. 2. Association for Computational Linguistics, Stroudsburg, pp. 496–501, 2011.
[11] C. Napoles, M. Dredze,"Learning simple wikipedia: a cogitation in ascertaining abecedarian language", In Proc. of the NAACLHLT Workshop on Computational Linguistics and Writing. pp. 42–50, 2010.
[12] G. Barlacchi & S. Tonelli, "ERNESTA: A sentence simplification tool for children’s stories in Italian", In International Conference on Intelligent Text Processing and Computational Linguistics,pp. 476-487, Springer, Berlin, Heidelberg, 2013.
[13] S. Bott, L. Rello, B. Drndarevic & H. Saggion, "Can spanish be simpler? lexsis: Lexical simplification for spanish", In Proceedings of COLING , pp.357-374,2012.
[14] R. Chandrasekar, B. Srinivas, B,"Automatic induction of rules for text simplification", Knowledge-Based Systems, Vol.10,No.3,pp. 183-190, 1997.
[15] S. Kandula, D. Curtis, Q. Zeng-Treitler, "A semantic and syntactic text simplification tool for health content", In AMIA annual symposium proceedings,pp. 366, 2010.
[16] A. Siddharthan, "Syntactic simplification and text cohesion", Research on Language and Computation, Vol.4,No.1,pp. 77-109,2006.
[17] B.B. Klebanov, K. Knight, & D. Marcu, "Text simplification for information-seeking applications",In OTM Confederated International Conferences On the Move to Meaningful Internet Systems, pp. 735-747, Springer, Berlin, Heidelberg,2004.
[18] B.T. Hung, N.L. Minh, & A. Shimazu, "Sentence splitting for Vietnamese-English machine translation", In Fourth IEEE International Conference on Knowledge and Systems Engineering, pp.156-160, 2012.
[19] J. Carroll, G. Minnen, Y. Canning, S. Devlin, & J. Tait, "Practical simplification of English newspaper text to assist aphasic readers", In Proceedings of the AAAI-98 Workshop on Integrating Artificial Intelligence and Assistive Technology, pp.7-10,1998.
[20] C. Scarton, M.D. Oliveira, A. Candido , C. Gasperin, & S. Aluísio, "SIMPLIFICA: a tool for authoring simplified texts in Brazilian Portuguese guided by readability assessments", In Proceedings of the NAACL HLT 2010 Demonstration Session Association for Computational Linguistics,pp.41-44, 2010.
[21] V. Seretan, "Acquisition of syntactic simplification rules for french",2012.
[22] D. Feblowitz, & D. Kauchak, D,"Sentence simplification as tree transduction",In Proceedings of the Second Workshop on Predicting and Improving Text Readability for Target Reader Populations ,pp. 1-10,2013.
[23] M.J. Aranzabe, A. D. Ilarraza, & I. Gonzalez-Dios, "Transforming complex sentences using dependency trees for automatic text simplification in Basque", Procesamiento del lenguaje natural, Vol.50,pp 61-68,2013.
[24] J.W. Chung, J.H. Min, J.C. Park, "Enhancing readability of web documents by text augmentation for deaf people", In Proceedings of the 3rd ACM International Conference on Web Intelligence, Mining and Semantics,pp. 30, 2013.
[25] S.B. Silveira, & A. Branco, "Combining a double clustering approach with sentence simplification to produce highly informative multi-document summaries", In IEEE 13th International Conference on Information Reuse and Integration (IRI), pp. 482-489,2012.
[26] S. Klerke & A. Sogaard, "Simple, readable sub-sentences", In 51st Annual Meeting of the Association for Computational Linguistics Proceedings of the Student Research Workshop,pp. 142-149,2013.
[27] S.Stajner, B. Drndarevic, & H. Saggion, "Corpus-based sentence deletion and split decisions for spanish text simplification", 2013.
[28] B. K. Bal, P. Shrestha, M.P. Pustakalaya, & N.P. Dhoka," Architectural and System Design of the Nepali Grammar Checker. PAN Localization Working Paper" , 2007.
[29] H. Kabir, S. Nayyer, J. Zaman, & S. Hussain, "Two pass parsing implementation for an Urdu grammar checker", In Proceedings of IEEE international multi topic conference,pp. 1-8, 2002.
[30] M. Alam, N. UzZaman, & M. Khan, "N-gram based statistical grammar checker for Bangla and English", Ninth International Conference on Computer and Information Technology (ICCIT), December , 2007.
[31] G. Singh, "Development of Punjabi Grammar Checker. Phd. Dissertation", 2008.
[32] G.D. LataBopche, M. Kshirsagar,“ Grammar Checking System Using Rule Based Morphological Process for an Indian Language”, In Global Trends in Information Systems and Software Applications, 4th International Conference, ObCom,pp. 9-11, 2011.
Citation
Vikas Verma, S.K. Sharma, "Comparative analysis of Grammar Checkers of various Asian Languages," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.697-700, 2018.
Unbalanced Data Classification using Feature Selection through BitApriori Algorithm.
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.701-704, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.701704
Abstract
Frequent pattern mining is used to derive association rules. Association rules specify relativity of target class with rest of the feature(s). The Apriori and FP-growth algorithms are the most famous algorithms used for frequent pattern mining. Classification with feature selection approach is also widely used. This paper provides a detailed study of frequent pattern mining using BitApriori algorithm and use mined association rules for performance improvement of unbalanced data classification. We present a model called FPCM which first mine association rules. Mined association rules are than used for features selection. In final phase, selected features are used in unbalanced data classification using decision tree classifier. Our model shows improved accuracy as compare to the past studies.
Key-Words / Index Term
Frequent pattern mining, Apriori, BitApriori, Unbalanced data classification, machine learning
References
[1] Varsha Mashoria, Anju Singh, "Literature Survey on Various Frequent Pattern Mining Algorithm", IOSRJEN, Vol-3, Jan-2013.
[2] Sumit Aggarwal, V Singal, "A Survey on Frequent Pattern Mining Algorithms", (IJERT) ISSN: 2278-0181 4, April – 2014
[3] Le Thi Thanh Nhan, Thi T T Nguyen, Tae Chong Chung, "BitApriori: An Apriori-Based Frequent Itemsets Mining Using Bit Streams", IEEE, 2010
[4] E. Ansari, G.H. Dastghaibifard, M. Keshtkaran, H.Kaabi, "Distributed Frequent Itemset Mining using Trie Data Structure", IAENG Inter. Journal of Comp. Sci., 2008
[5] Charu C. Aggarwal, Mansurul A. Bhuiyan and Mohammad Al Hasan, "Frequent Pattern Mining Algorithms: A Survey", Switzerland, Springer International Publishing Switzerland, 2014
[6] Abdul Rahaman Wahab Sait, and Dr.T.Meyappan, "Data preprocessing and Transformation Technique to Generate Pattern From the WebLog", Dubai (UAE), ICSIS’2014, Oct 17-18, 2014.
[7] Abdolrashid Rezvani, J Hosseinkhani, "Enhancing the Performance of BitApriori Algorithm in Data Mining using an Effective Data Structure", Switzerland, IJACSIT,Vol. 4, No. 3, 2015, Page: 85-92.
[8] Samiksha Kankane, V garg, "A survey paper on : Frequent Pattern Analysis Algorithm from the Web Log Data", IJCA, Vol-119, June-2015.
[9] D.Usha, Dr.K.Rameshkumar, "A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining", International Journal of Advances in Computer Science and Technology, vol-3, April-2014.
[10] Astha Agrawal, Herna L Victor, Eric Paquet, “SCUT: Multi-Class Imbalanced Data Classification using SMOTE and Cluster-based Undersampling”, SCITEPRESS, 2015.
[11] Isaac Triguero, Sara D Rio, V Lopez, J Bacardit, J M Benitez, F Herrera, “ROSEFW-RF: The winner algorithm for the ECBDL’14 big data competition: An extremely imbalanced big data bioinformatics problem”, Knowledge Based System, Elsevier, 28 May 2015.
[12] Sotiris Kotsiantis, Dimitris Kanellopoulos, Panayiotis Pintelas, “Handling imbalanced datasets: A review”, GESTS International Transactions on Computer Science and Engineering, Vol.30, 2006.
[13] Chang Wan, “Test-Cost Sensitive Classification on Data with Missing Values in the Limited Time”, Springer-Verlag Berlin Heidelberg 2010.
[14] K. Rajeswari, “Feature Selection by Mining Optimized Association Rules based on Apriori Algorithm”, IJCA, Vol. 119, Jun-2015
[15] Guangtao Wang, Qinbao Song, “Selecting Feature Subset via Constraint Association Rules”, Springer-Verlag Berlin Heidelberg 2012
[16] UCI repository, http://tunedit.org/repo/UCI/heart-statlog.arff.
Citation
Pratik A Barot, H B Jethva, "Unbalanced Data Classification using Feature Selection through BitApriori Algorithm.," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.701-704, 2018.
IMPROVED RESOURCE AWARE HYBRID META-HEURISTIC ALGORITHM FOR TASK SCHEDULING IN CLOUD ENVIRONMENT
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.705-711, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.705711
Abstract
Popularity of services over cloud can be estimated from the fact that all major mobile and computer system manufacturers are providing free cloud services to their client on purchase of their product. Easy and fast access to internet services have resulted in increased usage of cloud infrastructure. Also, the amount of data being generated and shared over cloud has increased multi-folds. With ever increasing users, resource provider is aware that they cannot afford wastage or misutilization of its resources. Hence, selection of right resource for fulfilling the request of the customer is vital. Scheduling of tasks over cloud is a key research area. Meta-Heuristic algorithms provide efficient solution to this problem. But, each meta-Heuristic algorithm individually suffers from inherent draw backs. So, there is a need to design a scheduling algorithm that does not suffer from the inherent draw backs of any individual meta-heuristic algorithm and is aware of the current utilization of resources in the cloud. In this paper, an improved resource aware hybrid meta-heuristic scheduling algorithm has been designed which reduces the overall Makespan time, Transfer cost and Response time. It also takes into consideration the current utilization of resources in the cloud.
Key-Words / Index Term
ACO, PSO, VM, Data Centre, Cloud Computing, Cloud, Meta-Heuristic, NIC, Makespan, Response time, Transfer cost
References
[1] M. Kalra, S. Singh, “A review of metaheuristic scheduling technique in cloud computing”, Cairo University, Egyptian Informatics Journal, Vol. 16, issue 3, pp 275-295, 2015.
[2] Karger D, Stein C, Wein J, “Scheduling Algorithms. Algorithms and Theory of Computation Handbook”. Chapman & Hall/CRC, p 20, 2010.
[3] Talbi E. G., “Metaheuristics: From Design to Implementation”, Wiley, Canada, p 593, 2009.
[4] V. Behal, A. Kumar, “Comparative Study of Load Balancing Algorithms in Cloud Environment using Cloud Analyst”, International Journal of Computer Applications (0975 – 8887) Volume 97– No.1, July 2014.
[5] G. Singh, A. Kaur, “Bio Inspired Algorithms: An Efficient Approach for Resource Scheduling in Cloud Computing”, International Journal of Computer Applications (0975–8887) Volume 116, No. 10, April 2015.
[6] S. Selvaraj, J. Jaquline, “Ant Colony Optimization Algorithm for Scheduling Cloud Tasks”, International Journal of Computer Technology & Applications, Vol 7(3), pp 491-494, May-June 2016.
[7] A. Singh, D. Juneja, M. Malhotra, “Autonomous Agent Based Load Balancing Algorithm in Cloud Computing”, In the proceedings of 2015 ELSEVIER Procedia Computer Science International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015), At Mumbai, India, Vol. 45, pp 832-841, 2015.
[8] J. Thaman, M. Singh, “Current Perspective in Task Scheduling Techniques in cloud Computing: A Review”, International Journal in Foundations of Computer Science & Technology (IJFCST) Vol. 6, No. 1, January 2016.
[9] M. Tawfeek, A. El-Sisi, A. Keshk, F. Torkey, “Cloud Task Scheduling Based on Ant Colony Optimization” , The International Arab Journal of Information Technology, Vol. 12, No. 2, March 2015.
[10] N. Siddique, H. Adeli, “Nature Inspired Computing: An Overview and Some Future Directions”, Cognitive Computing, Vol. 7, Issue 6, pp 706-714, 2015.
[11] D. Gupta, H.J.S. Sidhu, "Hybrid Task Scheduling Algorithm Based on ANT Colony Optimization and Particle Swarm Optimization for Cloud Environment", International Journal of Computer Sciences and Engineering (2347-2693), Vol. 6, Issue. 2, pp. 324-328, 2018.
[12] J. Kennedy, R. Eberhart, “Particle swarm optimization” In proceedings of IEEE International Conference on Neural Networks, vol. 4, pages 1942–1948, 1995.
[13] Guo L, Zhao S, Shen S, Jiang C, “Task scheduling optimization in cloud computing based on heuristic Algorithm”. Journal of Networks, Vol 7, pp. 547–553, 2012
[14] Dorigo M. and Stützle T., “Ant colony optimization”. MIT Press; 319 p, 2014.
Citation
D. Gupta, H.J.S. Sidhu, "IMPROVED RESOURCE AWARE HYBRID META-HEURISTIC ALGORITHM FOR TASK SCHEDULING IN CLOUD ENVIRONMENT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.705-711, 2018.
Big Data Concepts and Techniques in Data Processing
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.712-714, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.712714
Abstract
In digital world where data grows rapidly because of more use of internet and number of devices like, smart phones, laptops, personal and machines at a very increase rate. Big data is a pool of large amounts of data collected from various sources, such as social working sites like facebook and transactional data like online shopping sites. Big data is stored in distributed architecture framework. Hadoop is an open source framework for creating distributed applications that process huge amount of data. Hadoop keeps them all together under a single roof with their functionalities. Preparing of information can incorporate different activities like highlighting, indexing and searching. It is highly difficult to process in single machine, with huge amount of data. This paper focused on Concepts and Techniques in Big Data processing.
Key-Words / Index Term
Big Data , Distributed architecture,Problem, Hadoop,Distributed Processing
References
[1]. Patel, Aditya B., Manashvi Birla, and Ushma Nair. "Addressing big data problem using Hadoop and Map Reduce." Engineering (NUiCONE), 2012 Nirma University International Conference on. IEEE, 2012.
[2]. A, Katal, Wazid M, and Goudar R.H. "Big data: Issues, challenges, tools and Good practices." Noida: 2013, pp. 404 – 409, 8-10 Aug,2013.
[3]. Amrit pal, Pinki Aggrawal, Kunal Jain, Sanjay Aggrawal “A Performance Analysis of MapReduce Task with Large Number of Files Dataset in Big Data using Hadoop” Forth International Conference on Communication Systems and Network Technologies, 2014.
[4] Kaur, Anureet. "Big Data: A Review of Challenges, Tools and Techniques." International journal of scientific research in science, engineering and technology 2.2 pp. 1090-1093 ,2016.
[5]. Verma, Jai Prakash, et al. "Big data analytics: Challenges and applications for text, audio, video, and social media data." International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI) 5.1 2016.
[6]. Kaki, Gowtham, et al. "Safe Memory Regions for Big Data Processing." transfer (successorId, t, outList) pp. 17 -18 ,2016.
[7]. Big Data Black Book: Covers Hadoop 2, MapReduce, Hive, YARN, Pig, R and Data Visualization by DT Editorial Services Paperback ,2016.
[8]. Bhandari, Renu, Vaibhav Hans, and Neelu Jyothi Ahuja. "Big Data Security–Challenges and Recommendations." IJCSE pp. 93-98 ,2016.
[9]. Tanuja, A and D. Swetha Ramana. "Processing and Analyzing Big data using Hadoop." International Journal of Computer Sciences and Engineering 4.4 : pp. 91-94 ,2016.
Citation
B. Suvarnamukhi, M. Seshashayee, "Big Data Concepts and Techniques in Data Processing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.712-714, 2018.
Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.715-721, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.715721
Abstract
There is a growing interest for mobile ad hoc network (MANET) in the recent years for many time-critical applications, such as military applications or during a disaster recovery scenario in a collaborative manner. In this paper, we proposed a Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme (GKRNTS) for malicious adversaries node detection which focuses on the discrimination of mobile nodes into malicious and benevolent nodes. The interactions between the mobile nodes are periodically monitored and the elucidated data are useful for determining the degree of collaboration between the mobile nodes through the computation of Gwet Kappa. The Gwet Kappa parameter used in this Repeated Node Taxonomy Scheme is stored with each node as an adjacency matrix that stores the interaction activity between the nodes of the network. This adjacency matrix quantifies the extent of cooperation existing between the mobile nodes of the network and they are considered as the taxonomy of the mobile nodes during data communication. The proposed GKRNTS is compared against the TPFPPDM and NPDRDS techniques by simulation using NS2 network simulator has led to promising results in terms of reduced packet rate, energy consumption and computational cost.
Key-Words / Index Term
MANETs, Node Taxonomy, Gwet Kappa, Malicious Nodes
References
[1] Shailja Sharma , “A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network”, International Journal of Scientific Research in Network Security and Communication, Vol.6 , Issue.2 , pp.66-69, Apr-2018.
[2] Jaya, S and X. Deepak, “ An Improved Naïve Bayes classifier for Intrusion DetectionSystem”, International Journal of Innovations & Advancement in Computer Science, vol. 5, no.6, pp-128-134, 2016.
[3] Mitrokotsa, A., and Dimitrakakis, C., Intrusion detection in MANET using classification algorithms: The effects of cost and model selection, Journal of Ad Hoc Networks, 11(1), pp. 226-237, 2013.
[4] Youngseok Lee ; Ilkyu Park ; Yanghee Choi(2002),Improving TCP performance in multipath packet forwarding networks . Journal of Communications and Networks , Vol. 4(2)., pp 148 - 157 .
[5] Rebecca M. Warner,(1992) Dimensions of social interaction tempo: A factor analytic study of time and frequency domain indexes of interaction structure, The Journal of Psycholinguistic Research., Vol 21(3)., pp 173–191.
[6] K. Ravikumar, V. Manikandan , “Detection of Node Capture Attack in Wireless Sensor Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6 , Issue.4 , pp.56-61, Aug-2018 .
[7] M. Natkaniec ; A.R. Pach (2000),An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance , IEEE Wireless Communications and Networking Conference. Vol (3)., pp 23–28.
[8] Albers, P., Camp, O., Percher, J. M., Jouga, B., Me, L., and Puttini, R. S., Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches, Journal of Wireless Information Systems, pp. 1-12, 2002.
[9] Ishay Weissman,(2007), Confidence intervals for the threshold parameter, Journal of communications in statistics , Vol 1, pp 549-557 .
[10] Gopalakrishnan, S., and Kumar, P. M. (2016). Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET. Circuits and Systems, 07(06), pp 748-758.
Citation
R. Saravanan, E. Ilavarasan, "Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.715-721, 2018.
Application of Graph Theory in Social Media
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.722-729, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.722729
Abstract
A graph is made up of nodes; just like that a social media is a kind of a social network, where each person or organization represents a node. These nodes in a social media are interdependent on each other via common interests, relations, mutual friends, knowledge, common dislikes, beliefs etc. The overall graphical structure of a social media can be very complex with millions of nodes and thousands of interconnections amongst them based upon various grounds. Many researchers have revealed that social network works on various levels and helps in understanding many things such as how an entire organization is run. It helps to solve and understand many critical problems. The analysis of the social media is a very useful tool for extracting knowledge from unstructured data. The knowledge obtained from this field provides a vivid knowledge of various kinds interactions and relations amongst various individuals on social media. The authors have elaborated on the various applications of graph theory on social media and how it is represented viz. strong and weak ties. [1]
Key-Words / Index Term
Graph, Nodes, Social Media, Graphical structure, Unstructures data, Strong and Weak ties
References
[1]. Marcin Mince, Ewa Niewiadomska-Szynkiewicz, “Application of Social Network Analysis to the Investigation of Interpersonal Connections”, February 2012.
[2]. Kimball Martin, “Graph Theory and Social Networks”, April 30, 2014.
[3]. Alexandru Costan, “Graph Theory and Social Networks”,
[4]. 4.https://www.uva.nl/binaries/content/documents/personalpages/n/o/w.denooy/en/tab-one/tab-one/cpitem%5B26%5D/asset?1355372751494.
[5]. Daron Acemoglu and Asu Ozdaglar, “Networks, Lecture 2: Graph Theory and Social Networks”, September 14, 2009.
[6]. Jayson Rome, “Graph Triangulation”, October 14, 2002.
[7]. Eileen Brown, “SOCIAL MEDIA TODAY: Strong and Weak Ties: Why Your Weak Ties Matter”, June 30, 2011.
[8]. Donglei Du, “Strength of weak ties paradox”.
[9]. Sosial nettverksteori in blog tilhorende kurset INFO207/INF207 pa Universitetet i Bergen, innlegg skrevet av studentene med’
[10]. Josu´e Ortega, Philipp Hergovich, “The Strength of Absent Ties: Social Integration via Online Dating”, October 2, 2017.
[11]. https://www.semanticscholar.org/topic/Structural-holes/448117
[12]. 12.https://users.dimi.uniud.it/~massimo.franceschet/networks/nexus/properties.html
[13]. Cameron Marlow, Lee Byron, Tom Lento, Itamar Rosenn, “Maintained relationships on Facebook”, 2009.
[14]. Tieyun Qian1, Yang Yang2, Shuo Wang2, “Refining Graph partitioning for Social Network Clustering”,2010.
Citation
Anwesha Chakraborty, Trina Dutta, Sushmita Mondal, Asoke Nath, "Application of Graph Theory in Social Media," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.722-729, 2018.