A Study on Different Tools for Code Smell Detection
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.762-764, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.762764
Abstract
Code and design smells are the poor result to recurring implementation and design problems. They may hinder the progress of a system by building it hard for software engineers to carry out transform. Detection of code smells is very challenging for code developers and their informal definition leads to the completion of detection techniques and tools. Several refactoring tools have been developed. A bad smell is a sign of some setback in the code, which requires refactoring to deal with. Various tools are offered for detection and deduction of these code smells. These tools are different significantly in detection methodologies.
Key-Words / Index Term
Code smell detection tools, Detection techniques, MobileMedia (MM), Health Watcher (HW)
References
[1] Altman DG (1991),” Practical statistics for medical research”. Chapman & Hall, London
[2] Brown WJ, Malveau RC, Mowbray TJ, Wiley J (1998),” AntiPatterns: Refactoring software, architectures, and projects in crisis”.Wiley
[3] Wiley Chatzigeorgiou A, Manakos A (2010) “ Investigating the evolution of bad smells in object-oriented code”. In: Proceedings of the 7th international conference on the quality of information and communications technology. IEEE, pp 106–115.
[4] DeMarco T (1979),”Structured analysis and system specification”. Yourdon, New York
[5] Fernandes E, Oliveira J, Vale G, Paiva T, Figueiredo E (2016) ,”A review-based comparative study of bad smell detection tools”. In: Proceedings of the 20th international conference on evaluation and assessment in software engineering (EASE’16).ACM, article18.
[6] Fontana FA, Mäntylä M, Zanoni M, Marino A (2015) Comparing and experimenting machine learning techniques for code smell detection. Empir Softw Eng 21(3):1143–1191. doi:10.1007/s10664-015-9378-4
[7] Amanda Damasceno,”, On the evaluation of code smells and detection tools”, Journal of Software engineering research and development. DOI 10.1186/s40411-017-0041-1. Oct. 2017.5:7
Citation
S.James Benedict Felix, Viji Vinod, "A Study on Different Tools for Code Smell Detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.762-764, 2018.
Performance Evaluation of Cloud Computing System and Ontology based on efficient Parameters
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.765-771, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.765771
Abstract
In the computing world everywhere, everything and every time service on demand to end users is the motive of the cloud computing. The cloud computing aim is to work on as a service model. The cloud computing is designed with the significant architecture, special models for deployment and its features. The concept of cloud computing saves the time, cost and efficiency of everyone. In this research paper, there are some serious issues which are being tried to be solved by the proposed algorithms. These issues are basically occurring between the providers and the users. The proposed algorithm solved some of the issues. The observation clarifies the results of the algorithm. To get the efficient and effective results the algorithm uses the concept of the Ontology system. The ontology system clarifies the cost, time and pathway of the information. What should be the minimum cost of the system so the data is accessed with the high speed? The efficient algorithm is being designed on the specific platforms of the Ontology and the cloud simulator. At last this paper got the best service for the requested users at the best time.
Key-Words / Index Term
Performance Parameters; Cloud Computing; Scheduling Algorithms; Ontology Algorithms; Ontology Simulators; Cloud Simulator.
References
[1] Gutierrez-Garcia, J. O. Sim, K. M, “ A Family of Heuristics for Agent-Based Elastic Cloud Bag-of-Tasks Concurrent Scheduling”, Future Generation Computer Systems, Vol.29, No.7, pp. 1682-1699, 2013.
[2] Ergu, D., Kou, G., Peng, Y., Shi, Y., Shi, Y, “ The Analytic Hierarchy Process: Task Scheduling and Resource Allocation in Cloud Computing Environment” ,The Journal of Supercomputing, Vol.64 Issue3, pp. 835-848, 2013
[3] Komorowski, J., Pawlak, Z., Polkowski, L., Skowron, A, “Rough sets: A tutorial. Rough fuzzy hybridization: A new trend in decision-making” , Springer –Verlag New York pp 3-98, 1999.
[4] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Zaharia, M, “A View of Cloud Computing”, Communications of the ACM, Vol.53 Issue 4, pp.50-58, 2010.
[5] Suherman, A. G., Simatupang, T. M.” The Network Business Model of Cloud Computing for End-to-End Supply Chain Visibility” ,International Journal of Value Chain Management, Vol.8, Issue 1, 22-39, 2017.
[6] Birman, K., Chockler, G., van Renesse, R, “Toward a Cloud Computing Research Agenda” ,ACM SIGACt News,New York, Vol. 40, Issue 2, pp. 68-80, 2009.
[7] Sim, K. M., Wong, P. T, “ Toward Agency and Ontology for Web-Based Information Retrieval” ,IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), Vol. 34, Issue 3, pp.257-269, 2004.
[8] Sim, K. M, “ Toward an Ontology-Enhanced Information Filtering Agent”, ACM SIGMOD Record, New York, Vol. 33, Issue 1, pp. 95-100, 2004.
[9] Janulevičius, J., Marozas, L., Čenys, A., Goranin, N., Ramanauskaitė, S, “ Enterprise architecture modeling based on cloud computing security ontology as a reference model”, In the proceedings of IEEE Conference on Electrical, Electronic and Information Sciences (eStream) Lithuania, pp.1-6, 2017
[10] Dobson, G., Lock, R., Sommerville, I, “ QoSOnt: A QoS Ontology for Service-Centric Systems”, In the proceedings of IEEE 31st Conference on Software Engineering and Advanced Applications, EUROMICRO, Portugal ,pp.80-87, 2005.
[11] Youseff, L., Butrico, M., Da Silva, D, “Toward a Unified Ontology of Cloud Computing”, In the proceedings of IEEE Workshop on Grid Computing Environments,USA,pp. 1-10, 2008
[12] Modi, K. J., Chowdhury, D. P., & Garg, S, “An Ontology-Based Approach for Automatic Cloud Service Monitoring and Management”, In Advances in Big Data and Cloud Computing, Springer,pp.1-16, 2018
[13] Gupta, B. B., Quamara, M, “ An identity-based access control and mutual authentication framework for distributed cloud computing services in the IoT environment using smart cards”, Procedia Computer Science, Vol.132, pp.189-197, 2018.
[14] Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H, “Intelligent Cryptography Approach for Secure Distributed Big Data Storage in Cloud Computing” Information Sciences, Vol. 387, pp. 103-115, 2017.
[15] Yang, C., Huang, Q., Li, Z., Liu, K., Hu, F, “ Big Data and Cloud Computing: Innovation Opportunities and Challenges”, International Journal of Digital Earth, Vol. 10, Issue 1, 13-53, 2017.
[16] Tao, M., Zuo, J., Liu, Z., Castiglione, A., Palmieri, F, “ Multi-layer Cloud Architectural Model and Ontology-Based Security Service Framework for IoT-Based Smart Homes”, Future Generation Computer Systems, Vol 78, pp.1040-1051, 2018.
[17] Beloglazov, A., Abawajy, J., Buyya, R, “ Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing”, Future generation computer systems, Vol.28, issue 5,pp. 755-768, 012.
[18] Xu, B., Xu, L., Cai, H., Jiang, L., Luo, Y., & Gu, Y, “ The Design of an M-Health Monitoring System Based on a Cloud Computing Platform”, In the proceedingd of 2nd International Conference on Enterprise Information Systems, Vol. 11 Issue 1,pp. 17-36, 2017.
[19] Huang, J. Y., Hsu, H. T, “ Technology–Function Matrix Based Network Analysis of Cloud Computing” , Scientometrics, Springer , Vol. 113 Issue 1, pp.17-44, 2017.
[20] Quamara, S., Singh, A. K., “ Bitcoins and Secure Financial Transaction Processing, Recent Advances”, In the proceedings of IEEE 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT),pp. 216-219, 2016.
[21] Kalaivani, A., Ananthi, B., Sangeetha, S, “ Enhanced Hierarchical Attribute Based Encryption with Modular Padding for Improved Public Auditing in Cloud Computing Using Semantic Ontology. Cluster Computing,Springer, pp. 1-8, 2018
[22] Pawlak, Z., Skowron, A, “ Rudiments of Rough Sets”, Information sciences, Elsevier, Vol. 177,Issue 1, pp. 3-27, 2007.
[23] Breitgand, D., Da Silva, D. M., Epstein, A., Glikson, A., Hines, M. R., Ryu, K. D., Silva, M. A, “U.S. Patent No. 9,858,095”, Washington, DC: U.S. Patent and Trademark Office, 2018.
[24] Pawlak, Z, “Rough Sets and Intelligent Data Analysis”, Information sciences,Vol 147, Issue 1-4, pp.1-12, 2002.
[25] Wang, X., Yang, J., Teng, X., Xia, W., Jensen, R, “ Feature Selection Based on Rough Sets and Particle Swarm Optimization”, Pattern recognition letters,Elsevier, Vol. 28, Issue 4, pp 459-471, 2007.
[26] Beynon, M, “ Reducts within the Variable Precision Rough Sets Model: A Further Investigation”, European journal of operational research, Vol. 134, Issue 3, pp. 592-605, 2001.
[27] Sookhak, M., Gani, A., Khan, M. K., Buyya, R, “ Dynamic Remote Data Auditing for Securing Big Data Storage in Cloud Computing”, Information Sciences, Elsevier, Vol. 380, pp.101-116, 2017.
[28] Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U, “ The Rise of Big Data on Cloud Computing: Review and Open Research Issues”, Information Systems,Elsevier, Vol. 47, pp.98-115, 2015
[29] Beloglazov, A., Abawajy, J., Buyya, R, “ Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing”, Future generation computer systems,Elsevier,Vol. 28, Issue 5, pp. 755-768, 2012.
[30] Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A, “ Cloud Computing—The Business Perspective”, Decision Support Systems,Elsevier, Vol.51, Issue 1, pp. 176-189, 011.
[31] Subashini, S., Kavitha, V, “ A Survey on Security Issues in Service Delivery Models of Cloud Computing”, Journal of network and computer applications,Vol. 34, Issue 1,pp. 1-11, 2011.
[32] Lohachab, Ankur, Karambir, “ Using Quantum Key Distribution and ECC for Secure Inter-Device Authentication and Communication in IoT Infrastructure”, In the Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT) ,pp. 190-197, 2018.
[33] Gupta, B. B., Badve, O. P, “Taxonomy of DoS and DDoS attacks and Desirable Defense Mechanism in A Cloud Computing Environment”, Neural Computing and Applications,Springer, Vol.28,Issue 12, pp.3655-3682, 2017.
[34] Younge, A. J., Von Laszewski, G., Wang, L., Lopez-Alarcon, S., Carithers, W, “ Efficient Resource Management for Cloud Computing Environments”, In the proceedings of IEEE International Conference on Green Computing,pp. 357-364, 2010
[35] Foster, I., Zhao, Y., Raicu, I.,Lu, S, “Cloud Computing and Grid Computing 360-Degree Compared”, In the proceedings of IEEE Workshop on Grid Computing Environments,(GCE), pp.1-10, 2008.
[36] Buyya, R., Ranjan, R.,Calheiros, R, “Modeling and simulation of Scalable Cloud Computing Environments and The CloudSim toolkit: Challenges and Opportunities”, In the proceedings of IEEE International conference on High-Performance Computing & Simulation,(HPCS), pp.1-11, 2009.
[37] Ishizu, S., Gehrmann, A., Nagai, Y., Inukai, Y, “Rough Ontology: Extension of Ontologies by Rough Sets”, In the proceedings of Springer Symposium on Human Interface and the Management of Information, pp.456-462, 2007.
[38] Kawtrakul, A., Suktarachan, M., Imsombut, A, “Automatic Thai Ontology Construction and Maintenance System”, In the Proceedings of Ontolex Workshop on LREC, pp.68-74, 2004.
[39] Lee, I. H., Lee, S., Lee, T., Lee, S. G., Kim, D., Chun, J., Shim, J, “Practical Issues for Building a Product Ontology System”, In the proceedings of IEEE International Workshop on Data Engineering Issues in E-Commerce, pp.16-25, 2005.
[40] Xu, J., Lee, Y. H., Tsai, W. T., Li, W., Son, Y. S., Park, J. H., Moon, K. D, “ Ontology-Based Smart Home Solution and Service Composition”, In the proceedingd of IEEE International Conference on Embedded Software and Systems, (ICESS),pp. 297-304, 2009.
Citation
Ajayveer Chouhan, Chander Diwaker, "Performance Evaluation of Cloud Computing System and Ontology based on efficient Parameters," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.765-771, 2018.
Tag Based Image Search Using User Re-ranking
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.772-775, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.772775
Abstract
From the last decades, social media websites are useful to user to upload their photos and videos with tags. The social tagging systems are useful to generate the image search engine. The tag based image search engine is used to find the images which are uploaded by different social users from the social websites like facebook, flickr. The tag based image search (TBIS) by inter and intra user re-ranking is sorting the images according to their view feature, semantic relevance measurement and visual feature. To overcome the tag mismatch and query ambiguity problem the tag based image search system can remove the duplicate images from the same user while sorting the image. To increase the searching speed inverted index structure is constructed. The co-occurrence word set is used in query matching process. The main aim of the system is improve the relevance and diversity of the images.
Key-Words / Index Term
Tag based Image Search (TBIS), Image Search, Tag, View Feature, semantic Feature, Visual Feature
References
[1] X. Li, C. Snoek, and M. Worring. Learning tag relevance by neighbor voting for social image retrieval. Proceedings of the ACM International Conference on Multimedia information retrieval, 2008: 180-187.,
[2] D. Liu, X. Hua, L. Yang, M. Wang, and H. Zhang. Tag ranking. Proceedings of the IEEE International Conference on World Wide Web,2009: 351-360.
[3] M. Wang, K. Yang, X. Hua, and H. Zhang. Towards relevant and diverse search of social images. IEEE Transactions on Multimedia ,12(8):829-842,2010.
[4] G. Agrawal, R. Chaudhary. Relevancy tag ranking. In Computer and Communication Technology, pp.169-173, IEEE,2011.
[5] L. Chen, D. Xu, I. Tsang. Tag-based image retrieval improved by augmented features and group-based refinement. Multimedia,IEEE Transactions on,14(4), 1057-1067, 2012.
[6] L.Wu, R. Jin. Tag completion for image retrieval. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 35(3), 716-727, 2013.
[7] L. Chen, S. Zhu, Z. Li. Image retrieval via improved relevance ranking. In Control Conference, pp.4620-4625, IEEE, 2014.
[8] X. Qian, D. Hua, Y. Tang, and T. Mei, “social image tagging with diverse semantics”, IEEE Trans. Cybernetics, vol.44, no. 12,2014, pp. 2493-2508.
[9] XuemingQian, Yisi Zhao, Junwei Han: Image Location Estimation by Salient Region Matching. IEEE Transactions on Image Processing 24(11): 4348-4358 (2015)
[10] X.Qian, D. Lu, X. Liu, “Tag based image retrieval by user-oriented ranking”. Proceedings of International Conference on Multimedia Retrieval.ACM,2015.
[11] XuemingQian,Dan Lu, Xiaoxiao Liu.Tag Based Image Search by Social Re-ranking.IEEE Transactions on, Multimedia 2016.
Citation
S. N. Paraj, "Tag Based Image Search Using User Re-ranking," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.772-775, 2018.
Mutation Operators in Python using SMT-P
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.776-778, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.776778
Abstract
Mutation testing is one of the active techniques for testing its code. It is implemented by the replacement of the syntax of a program by another piece of code. This new version of the code is known as a mutant as is the most crucial part for testing the code. An effective test set is necessary to differentiate the mutant from the original program. In this paper we have presented a semantic mutation testing tool in python which works on semantics of python language than the traditional way of testing. In semantic mutation, a particular language is modified to create the mutant. Using SMT-P that is semantic mutation testing using python, we have inspected the efficiency of test cases on both traditional and semantic mutation operators. Comparison of traditional and semantic mutation testing operators in same test cases has been found to be quite useful and proves the usefulness of Semantic based testing over traditional one.
Key-Words / Index Term
Mutation testing, SMT (Semantic mutation testing), SMT-P (Semantic mutation testing tool in python), Language
References
[1] W.E. Howden, Weak mutation testing and completeness of test sets, IEEE Transactions on Software Engineering 8 (4) (1982) 371–379
[2] A.J. Offutt, Investigations of the software testing coupling effect, ACM Transactions on Software Engineering Methodology 1 (1) (1992) 3–18.
[3] R.G. Hamlet, Testing programs with the aid of a compiler, IEEE Transactions on Software Engineering 3 (1977) 279–290.
[4] K.S.H.T. Wah, a theoretical study of fault coupling, Journal of Software Testing, Verification and Reliability 10 (1) (2000) 3–45.
[5] A.J. Offutt, J. Pan, Detecting equivalent mutants and the feasible path problem, in: Annual Conference on Computer Assurance, COMPASS 1996, IEEE Computer Society Press, Gaithersburg, MD, 1996, pp. 224–236.
[6] R.M. Hierons, M. Harman, S. Danicic, using program slicing to assist in the detection of equivalent mutants, Journal of Software Testing, Verification and Reliability 9 (4) (1999) 233–262.
[7] J.A. Clark, H. Dan, R.M. Hierons, Semantic mutation testing, in: Fourth Workshop on Mutation Analysis, 2010, pp. 100–109.
[8] J. Offutt, J. Pan, automatically detecting equivalent mutants and infeasible paths, Software Testing, Verification, and Reliability 7 (3) (1997) 165–192.
[9] R.A. DeMillo, R.J. Lipton, F.G. Sayward, Hints on test data selection: help for the practical programmer, IEEE Computer 11 (4) (1978) 31–41
[10] A.J. Offutt, J.H. Hayes, A semantic model of program faults, in: International Symposium on Software Testing and Analysis, ISSTA 1996 1996, pp. 195–200.
[11] “Pycharm python IDE” https://www. jetbrains. com /pycharm/.
[12] L. Hatton, Safer C: Developing Software in High-integrity and Safety-critical Systems, McGraw–Hill, 1994.
Citation
R. Gupta, C. Verma, N.Singh, "Mutation Operators in Python using SMT-P," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.776-778, 2018.
Improved Integrated Approach of Web Prefetching & Caching using eLRU
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.779-785, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.779785
Abstract
World Wide Web emerged as a dominant platform where user interaction with the web is increased rapidly which provides the user interest for accessing of resources from the web servers. To improve the web server performance pre-fetching and caching is used with the association rule mining where rules are applied to predict the user request based on the previous request and where most frequently access pages are pre-fetched and cached. In this paper, a better algorithm eLRU is proposed which is enhanced LRU for predicting the most accessed web pages by replacing least recently and no longer access pages and comparison between eLRU and LRU page replacement is also shown. This paper also represents the association rule approach for mining information and also by applying Apriori algorithm with FP growth algorithm for accessing pre-fetched pages.
Key-Words / Index Term
World Wide Web, Web log file, Web usage mining, Apriori, FP growth, eLRU, LRU, Web Caching, Web Pre-fetching.
References
[1] Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data, Jaideep Srivastava, Robert Cooleyz , Mukund Deshpande, Pang-Ning Tan, ACM SIGKDD, Jan 2000.
[2] K. Chinen and S. Yamaguchi An Interactive Prefetching Proxy Server for Improvement of WWW Latency. In Proceedings of the SeventhAnnual Conference of the Internet Society (INEt’97),Kuala Lumpur, June 1997.
[3] Garofalakis M. N., Rastogi R., Sheshadri S., and Shim K.,“Data mining and the Web: past, present and future.” InProceedingsof the second international workshop on Web information and data management, ACM, 1999.
[4] Fu Y., Sandhu K., and Shih M., “Clustering of Web Users Based on Access Patterns” International Workshop on Web Usage Analysis and User Profiling (WEBKDD’99), San Diego, CA, 1999.
[5] Pitkow J. and Pirolli P. Mining longest repeating subsequences to predict www surfing.In Proceedings of the 1999 USENIX Annual Technical Conference, 1999.
[6] Z.Su, Q. Yang, Y. Lu, and H. Zhang. Whatnext: A prediction system for web requests using n- gram sequence models. In Proceedings of the First International Conference on Web Information System and Engineering Conference, pages 200-207, Hong Kong, June 2000.
[7] Phoha V. V., Iyengar S.S., and Kannan R., “Faster Web Page Allocation with Neural Networks,” IEEE Internet Computing, Vol. 6, No. 6, pp. 18-26, December 2002.
[8] Zhang T., Ramakrishnan R., and Livny M., “Birch: AnEfficient Data Clustering Method for Very Large Databases.” In Proceedings of the ACM SIGMODConference on Management of Data, pages 103-114, Montreal, Canada, June 1996.
[9] Cadez I., Heckerman D., Meek C., Smyth P., and Whire S., “Visualization of Navigation Patterns on a Website Using Model Based Clustering.” Technical Report MSRTR-00-18, Microsoft Research, March 2002.
[10] Podlipnig S, Boszormenyi L.A survey of Web cache replacementstrategies. ACM Compute Surveys 2003;35 (4):374–98.
[11] Rabinovich M, Spatsheck O. Web caching and replication. Addison Wesley; 2002.
[12] TengWG, Chang CY, Chen MS. Integrating Web caching and Web prefetching in client-side proxies. IEEE Trans Parallel Distributed Syst 2005;16(5):444–55.
[13] Schloegel K, Karypis G, Kumar V. Parallel multilevel algorithms for multi-constraint graph partitioning. In: Proceedings of 6th international Euro-Par conference. September 2000. p. 296– 310.
[14] Vakali A, Pokorny J, Dalamagas T.An overview of Web data clustering practices. In: Proceedings of the EDBT Workshops 2004. Heraklion, Crete; 2004. p. 597–606.
[15] Nanhay Singh, Arvind Panwar and Ram Shringar Raw Enhancing the performance of Web Proxy Server using Cluster Based Pre-fetching technique. IEEE2013.
[16] A Survey of Web Caching and Prefetching"( Waleed Ali Siti Mariyam Shamsuddin, and Abdul Samad Ismail)( 2011)
[17] A Survey On Web Pre-Fetching and Web Caching Techniques in a Mobile Environment"(Greeshma G. Vijayan1 and Jayasudha J. S.) (2012)
[18] Survey on Improving the Performance of Web by Evaluation of Web Prefetching and Caching Algorithms" (Arun Pasrija) ( 2013)
[19] Survey of Recent Web Prefetching Techniques" (Sonia Setia, Dr. Jyoti, Dr. Neelam Duhan) ( 2013)
[20] Study of Web Pre-Fetching With Web Caching Based On Machine Learning Technique " (K R Baskaran, Dr. C.Kalarasan, A Sasi Nachimuthu) (2013)
[21] Hybrid Approach for Performance of Web Page Response through Web Usage Mining”(Ravinder Singh,Bhumika garg) (2014)
[22]Data Mining for Intelligent Web Caching Francesco Bonchi Fosca Giannotti Giuseppe Manco Chiara Renso CNUCE-CNR – Institute of Italian National Research Council Via Alfieri 1, 56010 Ghezzano (PI) Italy.
Citation
Arshi Khan, Pushpraj Singh Chauhan, "Improved Integrated Approach of Web Prefetching & Caching using eLRU," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.779-785, 2018.
Design and Simulation of Solar-Wind Hybrid Power Generation System
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.786-792, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.786792
Abstract
Hybrid system name implies the combination of two or more sustainable / non sustainable energy sources. Presently hybrid systems including wind power as one of the basic along with photovoltaic power are more appealing. The primary reason of such hybrid power system is to taken irregularity and unpredictability of wind energy and to make the power supply more reliable. Hybrid wind power with Photovoltaic module can bypass the limitation of wind power irregularity, since Photovoltaic module can acts as an energy barrier and adjust the output power effectively. Wind power and solar energy can mix to form hybrid power system specifically for the power supply. In addition advantage of this kind of hybrid system is that they are the couple renewable energies, which is suitable to the ecological conditions. Two contingences are studied and identified according to power generation from each energy sources, and load requirement. Hill Climb Search algorithm is used as Maximum Power Point Tracking (MPPT) control technique for the wind power system in order to enhance the power generated. The proportional integral control scheme of inverter is intended to keep the load voltage and frequency of the AC supply at stable level indifferent of advance in natural conditions and load. A Simulink model of Hybrid system with DC/DC converter and voltage standardized inverter and energy storage system for stand-alone application developed MATLAB/SIMLINK environment.
Key-Words / Index Term
component; Renewable energy, Solar, PMSG, DC/DC converter, PI Controller
References
[1] Natsheh, E.M.; Albarbar, A.; Yazdani, J., "Modeling and control for smart grid integration of solar/wind energy conversion system," 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (ISGT Europe), pp.1-8, 5-7 Dec. 2011.
[2] Bagen; Billinton, R., "Evaluation of Different Operating Strategies in Small Stand-Alone Power Systems," IEEE Transactions on Energy Conversion, vol.20, no.3, pp. 654-660, Sept. 2005
[3] S. M. Shaahid and M. A. Elhadidy, “Opportunities for utilization of stand-alone hybrid (photovoltaic + diesel + battery) power systems in hot climates,” Renewable Energy, vol. 28, no. 11, pp. 1741–1753,2003.
[4] Goel, P.K.; Singh, B.; Murthy, S.S.; Kishore, N., "Autonomous hybrid system using PMSGs for hydro and wind power generation," 35th Annual Conference of IEEE Industrial Electronics, 2009. IECON `09, pp.255,260, 3-5 Nov. 2009.
[5] Foster, R., M. Ghassemi, and A. Cota, Solar energy: renewable energy and the environment. 2010, Boca Raton: CRC Press.
[6] Salam, Z.; Ishaque, K.; Taheri, H., "An improved two-diode photovoltaic (PV) model for PV system," 2010 Joint International Conference on Power Electronics, Drives and Energy Systems (PEDES) & 2010 Power India, pp.1,5, 20-23 Dec. 2010.
[7] Yuncong Jiang; Qahouq, J.A.A.; Orabi, M., "AC PV solar system distributed architecture with maximum power point tracking," IEEE 34th International Telecommunications Energy Conference (INTELEC), pp.1-5, Sept. 30 2012-Oct. 4 2012.
[8] Villalva MG, Gazoli JR. Comprehensive approach to modeling and simulation of photovoltaic arrays. IEEE Trans Power Electron 2009;24:1198–208.
[10] Faranda, R. and Leva, S. (2008) Energy Comparison of MPPT Techniques for PV Systems. WSEAS Transactions on Power Systems, 3, 447-455.
[11] Zainal Salam, Jubaer Ahmed, Benny S. Merugu “The application of soft computing methods for MPPT of PV system: A technological and status review” ELSEVIER Applied Energy 107 (2013) 135–148
[12] Nur Atharah Kamarzamana, Chee Wei Tan, “A comprehensive review of maximum power point tracking algorithms for photovoltaic systems,” Renewable and Sustainable Energy Reviews, vol.37, pp- 585-598, Sep 2014.
[13] Ridha BENADU`, Brahim KHIARI’, Anis SELLAMI “Predictive Current Control Strategy for a Three-Phase Grid Connected PhotovoltaicWind Hybrid System” 978-1-4673-9768-1/16/$31.00 ©2016 IEEE.
[14] Dong-Min Miao; Jian-Xin Shen, "Comparative study on permanent magnet synchronous generator systems with various power conversion topologies," 2013 Fourth International Conference on Power Engineering, Energy and Electrical Drives (POWERENG), pp.1738- 1743, 13-17, May 2013.
[15] Salam, Z.; Ishaque, K.; Taheri, H., "An improved two-diode photovoltaic (PV) model for PV system," 2010 Joint International Conference on Power Electronics, Drives and Energy Systems (PEDES) & 2010 Power India, pp.1,5, 20-23 Dec. 2010.
[16] S.Saib, A.Gherbi “Simulation and Control of hybrid renewable energy system connected to the grid” 978-1-4673-7172-8/15/$3l.00 ©2015IEEE area. Picture should be of high quality.
Citation
Chellu.Ravi Teja, Y.Vishnu Murthulu, "Design and Simulation of Solar-Wind Hybrid Power Generation System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.786-792, 2018.
Breast Cancer Detection Using Neural Network
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.793-797, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.793797
Abstract
The aim of this project is to detect breast cancer by extracting the features of the affected tumour. Classification of the cancer cells is done with neural networks. The project consists of three phases namely, pre processing, feature extraction and classification. Pre processing is done using median filter; the features are extracted from digital mammogram which includes position, texture and shape. The features are trained by neural networks to classify the cancer cells. Maximum likely hood estimation is used to calculate the area affected to determine the depth of tumour. In this paper artificial neural network are used to develop a system for diagnosis, prognosis and prediction of breast cancer. Breast cancer is a type of cancer originating from breast tissues, and most commonly this is originated from the inner lining of milk ducts. Breast cancer occurs in human and other mamma is also. Cardiology, radiology, oncology, urology are currently the burning areas in medical sciences in which neural networks are currently progressing on.
Key-Words / Index Term
Breastcancer,malign,benign,MLE,Pre-Processing,DWT,Digitalimageprocessing
References
[1]A.Jemal, F.Bray, M.M.Canter, J.Feraly. et.al, “Global cancer statistics,” A cancer journal for clinicians, 2011.
[2] A.Malich, D.R.Fischer and J.B.Ottocher, “CAD for mammography: the technique, results, current role and further developments,” European radiology, 2006.
[3] K.Kelley, J.Dean, W.Comulada.et.al, “Breast cancer detection using automated whole ultrasound and mammography in radio graphically dense breasts,” European Radiology, vol.20, pp.734-742, 2010.
[4] M.B.Dillencourt, H.Samet and M.Tammien, “A general approach to connect-component labelling for arbitrary image representation”.
[5] N.F.Boyd, H.Guo, L.J.Martin, L.Sun, J.Stone , E.Fishell.et.al,2007.
Citation
S.Nadiger, A.Dixit, "Breast Cancer Detection Using Neural Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.793-797, 2018.
A Comprehensive Survey on Data Aggregation in Wireless Sensor Networks
Survey Paper | Journal Paper
Vol.6 , Issue.7 , pp.798-802, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.798802
Abstract
Wireless sensor network (WSN) associated with a set of wireless sensor nodes by using high speed network connectivity. All deployed sensor nodes are used to sense and process of data effectively over the network. This leads to increase the communication overhead and affects the performance of the network lifetime. The main objective of the data aggregation is to eliminate the redundant data that increase the network lifetime otherwise prolongs or conserves the energy of the sensor nodes for data aggregation in WSN. Hence, it is needed to aggregate the sensed data into high quality information and this is accomplished through data aggregation. In this paper, reviews the data aggregation approaches named as centralized, tree, cluster, and in-network approaches in WSNs. Also discuss the comparison of various data aggregation approaches with respect to latency, data accuracy, computation overhead, scalability, redundancy, and energy consumption.
Key-Words / Index Term
Wireless Sensor Network (WSN), Data Aggregation, Centralized, Tree, Cluster, and In-Network Approaches
References
[1] L. B., Bhajantri, H. C., Pavithra. M. Patil, “Context Aware Topology Control in Wireless Sensor Networks”, In the Proceedings of IEEE 2nd International Conference on Applied and Theoretical Computing and Communication Technology, pp.825-830, 2016.
[2] S. R., JinoRamson, D. J., Moni, “Applications of Wireless Sensor Networks: A Survey”, In the Proceedings of International Conference on Innovations in Electrical, Electronics, Instrumentation, and Media Technology, pp.325-329, 2017.
[3] S. Sharma, R. K., Bansal, S. Bansal, “Issues and Challenges in Wireless Sensor Networks”, In the Proceedings of International conference on Machine Intelligence and Research Advancement”, pp.58-62, 2013.
[4] H. Suo, J. Wan, L. Huang, C. Zou, “Issues and Challenges of Wireless Sensor Networks Localization in Emerging Applications”, In the Proceedings of International Conference on Computer Science and Electronics Engineering, vol.3, pp.447-451, 2012.
[5] A. Ihsan, K. Rahim, H. Mehdi, A. Mustaq, “Energy Aware Routing and Data Aggregation in Wireless Sensor Networks”, In the Proceedings of 2nd International Conference on Machine Learning and Computer Science, pp.27 - 30, 2013.
[6] K. Bhaskar, E. Deborah, W. Stephen,“The Impact of Data Aggregation in Wireless Sensor Networks”, In the Proceedings of International conference on Distributed Computing Systems, pp.575-578, 2002.
[7] C. Ramar, K. Rubasoundar, “A Survey on Data Aggregation Techniques in Wireless Sensor Networks”, International Journal of Mobile Network Design and Innovation, vol.6, no.2, pp.81-91, 2015.
[8] T. Dua, S.Qua, K. Liua, J.Xub, Y.Caob, “An Efficient Data Aggregation Algorithm for WSNs based on Dynamic Message List”, In the Proceedings of the 7th International Conference on Ambient Systems, Networks and Technologies, vol.83, pp.98-106, 2016.
[9] K. Haseeb, K.A., Bakar, A. H., Abdullah, T. Darwish, “Adaptive Energy Aware Cluster Based Routing Protocol for Wireless Sensor Networks, Journal on Wireless Networks, vol.23, no.6, pp.1953-1966, 2017.
[10] S. Sirsikar, S. Anavatti, “Issues of Data Aggregation Methods in Wireless Sensor Networks: A Survey”, In the Proceedings of the 4th International Conference on Advances in Computing, Communication and Control, vol.49, pp.194-201, 2015.
[11] A. Razaque, S. S., Rizvi, “Secure Data Aggregation using Access Control and Authentication for Wireless Sensor Networks”, Journal on Computers and Security, vol.70, pp.532-545,2017.
[12] S. S., Ranjani, S. Radhakrishnan, C.Thangaraj, “Secure Cluster Based Data Aggregation in Wireless Sensor Networks”, In the Proceedings of International Conference on Science Engineering and Management Research, pp.1-6, 2014.
[13] S. Nalini, A. Valarmathi, “Fuzzy Association Rule Based Cluster Head Selection in Wireless Sensor Networks”, In the Proceedings of 2nd International Conference on Green High Performance Computing”, pp.1-5, 2016.
[14] H. Harb, A. Makhoul, S. Tawbi, R. Couturier, “Comparison of Different Data Aggregation Techniques in Distributed Sensor Networks”, Journal of IEEE Access, vol.5, pp.4250-4263, 2017.
[15] L. B., Bhajantri, N. Nalini, “Context Aware Data Aggregation in Distributed Sensor Networks”, International Journal of Computer Networks and Wireless Communications, vol.6, no.6, pp.46-51, 2016.
[16] S. Roy, M. Conti, S. Setia, S. Jajodia, “Secure Data Aggregation in Wireless Sensor Networks”, IEEE Transaction on Information Forensics and Security, vol.7, no.3, pp.1040-1052, 2012.
[17] V. Kumar, S. Madria, “Secure Data Aggregation in Wireless Sensor Networks”, Springer Book Chapter on Wireless Technologies for the Information Explosion Era, pp.77-107, 2010.
[18] D. H., Rajesh, B. Paramasivan, “Fuzzy Logic Based Performance Optimization with Data Aggregation in Wireless Sensor Networks”, In the Proceedings of International Conference on Modeling Optimization and Computing, vol.38, pp.3331-3336, 2012.
[19] D. H., Rajesh, B. Paramasivan, “Survey of Data Aggregation Techniques Using Soft Computing in Wireless Sensor Networks”, IET International Journal on Security, vol.7, no.4, pp.336-342, 2013.
[20] N, A., Babamir, F, Orman, “A Tree Based Data Aggregation Scheme for Wireless Sensor Networks using Genetic Algorithm”, Journal on Wireless Sensor Network, vol.4, pp.191-196, 2012.
[21] F. Khorasani, H. R., Naji, “Energy Efficient Data Aggregation in Wireless Sensor Networks Using Neural Networks”, International Journal of Sensor Networks, vol.24, no.2, pp.26-42, 2017.
Citation
Lokesh B. Bhajantri, "A Comprehensive Survey on Data Aggregation in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.798-802, 2018.
Image Processing: Improving Image Quality for Digital Radiography
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.803-808, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.803808
Abstract
This article on advanced radiography picture preparing and show is the second of two articles composed as a component of an intersociety push to build up picture quality gauges for computerized and registered radiography. The subject of the other paper is advanced radiography picture obtaining. The articles were created cooperatively by their, the American Association of Physicists in Medicine, and the Society for Imaging Informatics in Medicine. Progressively, restorative imaging and patient data are being overseen dosing computerized information amid procurement, transmission, stockpiling, show, elucidation, and meeting. The administration of information amid every one of these activities may affect the nature of patient care. These articles portray what is known to enhance picture quality for computerized and figured radiography and to make suggestions ideal obtaining, preparing, and show. The act of computerized radiography is a quickly developing innovation that will require auspicious update of any rules and norms.
Key-Words / Index Term
Image Quality, Medicine, radiography, Image processing, Display
References
[1]. International Commission on Radiation Units and Measurements. ICRU report 54, medical imaging—the assessment of image quality. Bethesda,Md: International Commission on Radiation Units and Measurements;1996.
[2]. Beutel J, Kundel HL, Van Metter RL, eds. Handbook of medical imaging,vol 1: physics and psychophysics. Bellingham, WA: SPIE Press;2000.
[3]. Kim Y, Horii SC, eds. Handbook of medical imaging, vol 3: display andPACS. Bellingham, WA: SPIE Press; 2000.
[4]. Digital Imaging and Communications in Medicine (DICOM) Part14;grayscale standard displayfunction.Availableat:http://medical.nema.org/dicom/2003/03_14PU.pdf.AccessedMay9, 2007.
[5]. 5. Integrating the healthcare enterprise: technical framework. Healthcare Information and Management Systems Society Website.Availableat:http://www.himss.org/ASP/topics_ihe.asp. Accessed May 9, 2007.
[6]. SiegelE,KrupinskiE,SameiE,etal.Digitalmammographyimagequality:imagedisplayAmCollRadiol2006;3:615-27.
[7]. Society for Motion Picture and Television Engineers. Specifications for medical diagnostic imaging test pattern for television monitors and hardcopy recording cameras. New York, NY: SocietyofMotionPictureandTelevisionEngineers;1991.
[8]. Gray JE. Use of the SMPTE test pattern in picture archiving and communication systems. J DigitImagin1992;5:54-8.
[9]. DeutschesInstitutfürNormung.Imagequalitassuranceinraydiagnostics,acceptanctestingforimagedisplaydevices:DIN6868572000.Munich,Germany:DeutschesInstitutfürNormung;2001.
[10]. International Organization for Standardization. Ergonomic requirementsfor office work with visual display termials, part 3: visual display requirements (ISO 9241-3). Geneva, Switzerland: International Organizationfor Standardization; 1992.
Citation
Madhavi Pingili, E. G. Rajan, "Image Processing: Improving Image Quality for Digital Radiography," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.803-808, 2018.
Energy Organized Scheduled Virtual Machine Resource Distributional Cloud Data Centres
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.809-813, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.809813
Abstract
Cloud computing is an internet based infrastructure environment service provider. Cloud is a collection of servers grouped together located in a different geographic locations connected. Cloud computing has a noble vision to share the resources to the user all around. Cloud computing is an upcoming topic for the researchers for the betterment in this field around the world. Cloud providers use resource allocation strategy [1], along with energy aware consciousness to reduce the energy consumption in massive cloud data centres. This paper gives an outline of a comparative have a look at on the various current resource scheduling techniques in cloud computing.
Key-Words / Index Term
Cloud Computing, Resource Allocation Strategy, Scheduling, Energy Efficiency
References
[1] Youwei Ding, Xiaolin Qin, Liang Liu, Taochun Wang, “Energy efficient scheduling of virtual machines in cloud with deadline constraint”, Science Direct 2015.
[2] Xiaomin Zhu, Laurence T. Yang, Huangke Chen Ji Wang, Shu Yin and Xiao cheng Liu, “Real-Time Tasks Oriented Energy-Aware Scheduling in Virtualized Clouds”, IEEE 2014.
[3] Jinn-Tsong Tsai Jia-Cen Fang, Jyh-Horng Chou “Optimized task scheduling and resource allocation on cloud computing environment uses Improved Differential Evolution Algorithm (IDEA)”, Science Direct 2014.
[4] Yue Gao Ming Hsieh, Gupta, S.K., Yanzhi Wang “An Energy-Aware Fault Tolerant Scheduling Framework for Soft Error Resilient Cloud Computing Systems”, IEEE 2014.
[5] Youwei Ding, Xiaolin Qin, Liang Liu, Taochun Wang “More than bin packing: Dynamic resource allocation strategies in cloud data centers”, Science Direct 2015.
[6] Jiaxin Li , Dongsheng Li, Yuming Ye, and Xicheng Lu, “Efficient Multi-Tenant Virtual Machine Allocation in Cloud Data Centers”, IEEE 2015.
[7] J M Kaplan, W Forrest, and N Kindler, Revolutionizing Data Center Energy Efficiency, 2008.
[8] S N T Chiueh and S Brook, A survey on Virtualization Technologies, RPE Rep, 2005, p. 1-42.
[9] J Carolan, S Gaede, J Baty, G Brunette, A Licht, J Remmell, L Tucker, and J Weise, Introduction to Cloud computing Architecture, SUN Microsystems Inc,2009, p.1-40.
[10] R P Goldberg, Survey of Virtual Machine Research, Computer (Long Beach Calif), 1974, vol 7, p. 34-45.
[11] Vmw Inc, - Jul-2013.
[12] P Barham, B Dragovic, K Fraser, S Hand, T Harris, A Ho, R Neugebauer, I Pratt, and A Warfield, Xen and the Art of Virtualization, ACM SIGOPS Oper Syst Rev, 2003, vol 37, p. 164-177.
Citation
Alekhya Orugonda, V. Kiran Kumar, "Energy Organized Scheduled Virtual Machine Resource Distributional Cloud Data Centres," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.809-813, 2018.