Cylindrical Kinematics of End Effector and Differential Motion Analysis of KUKA KR 16 Robotic System
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.757-764, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.757764
Abstract
In this paper forward kinematic analysis and differential motion analysis of the KUKA KR 16 Industrial Robotic System has been considered, which is a 6 d.o.f articulated robotic manipulator but we have calculated and shown spatial trajectory only 5 d.o.f, due to critical trajectory planning of D-H implementation. Forward kinematic analysis uses D-H formulation, Differential motion uses Jacobians also determines angular positions and end-effector‟s translational angular velocity at each point of its trajectory in the cartesian co-ordinates respectively. A trajectory passing through initial point, lift off point, set down point and final point is interpolated in the joint space using cubic splines. The trajectory scheme assumes two more intermediate points on trajectory. Thus, there are five segments of the entire trajectory. A LABVIEW source code is developed to obtain all the kinematics parameters and important conclusions have been observed from the values obtained.
Key-Words / Index Term
Robot, Forward Kinematics, Jacobians, D-H matrix, Trajectory Planing
References
[1]. Z. Chen, K. Jiang, and J.C. Hung. Local observability matrix and its application to observability analyses. In Industrial Electronics
Society, 16th Annual Conference of IEEE, Nov. 2018.
[2]. A. Chilian, H. Hirschmuller, and M. G ¨ orner. Multi- ¨ sensor data fusion for robust pose estimation of a sixlegged walking robot. In
Intelligent Robots and Systems, IEEE/RSJ International Conference on, Sep. 2018.
[3]. S. Chitta, P. Vernaza, R. Geykhman, and D.D. Lee. Proprioceptive localization for a quadrupedal robot on known terrain. In Robotics and Automation, IEEE International Conference on, Apr. 2017.
[4]. J. A. Cobano, J. Estremera, and P. Gonzalez de Santos. Location of legged robots in outdoor environments. Robotics and Autonomous
Systems, 56:751– 761, 2016.
[5]. N. El-Sheimy, Haiying Hou, and Xiaoji Niu. Analysis and modeling of inertial sensors using allan variance. Instrumentation and
Measurement, IEEE Transactions on, 57(1):140–149, Jan. 2015.
[6]. B. Gassmann, F. Zacharias, J.M. Zollner, and R. Dill- ¨ mann. Localization of walking robots. In Robotics and Automation, IEEE Int. Conf. on, Apr. 2014.
[7]. O. Gur and U. Saranli. Model-based proprioceptive state estimation for spring-mass running. In Proceedings of Robotics: Science and
Systems, Jun. 2014.
[8]. R. Hermann and A. Krener. Nonlinear controllability and observability. Automatic Control, IEEE Transactions on, 22(5):728–740, Oct.
2014.
[9]. G.P. Huang, A.I. Mourikis, and S.I. Roumeliotis. Analysis and improvement of the consistency of extended kalman filter based slam. In Robotics and Automation, IEEE International Conference on, May 2013.
[10]. Guoquan P. Huang, Anastasios I. Mourikis, and Stergios I. Roumeliotis. Observability-based rules for designing consistent ekf slam estimators. International Journal of Robotics Research, 29:502–528, Apr. 2013.
[11]. M. Hutter, C. Gehring, M. Bloesch, M.A. Hoepflinger, C.D. Remy, and R. Siegwart. StarlETH: A compliant quadrupedal robot for fast, efficient, and versatile locomotion. In Climbing and Walking Robots, International Conference on, Jul. 2012.
[12]. S.J. Julier and J.K. Uhlmann. A counter example to the theory of simultaneous localization and map building. In Robotics and
Automation, IEEE Int. Conf. on, May 2011
[13]. P.C. Lin, H. Komsuoglu, and D.E. Koditschek. A leg configuration measurement system for full-body pose estimates in a hexapod robot. Robotics, IEEE Transactions on, 21(3):41–422, Jun. 2009.
[14]. P.C. Lin, H. Komsuoglu, and D.E. Koditschek. Sensor data fusion for body state estimation in a hexapod robot with dynamical gaits. Robotics, IEEE Transactions on, 22(5):932–943, Oct. 2006.
[15]. International Journal of Scientific Research in Computer Sciences and Engineering (ISSN: 2320-7639) [16] International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256)
Citation
Alok Mishra, P K Dwivedi, Kamlesh Singh, "Cylindrical Kinematics of End Effector and Differential Motion Analysis of KUKA KR 16 Robotic System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.757-764, 2018.
A Study on Applications of AI, ML, DL And Blockchain In Healthcare And Pharmaceuticals And It’s Future
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.765-770, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.765770
Abstract
Artificial Intelligence (AI), Blockchain (BC), Machine Learning (ML) and Deep Learning (DL) is a progressive step within pharmaceutical and healthcare business. It`s not a dreamland degree of advance any more drawn out, it’s a functional instrument that can enable a relationship to propel their composed game-plan, improve the standard of concern, create more income, and reduction chance. AI and ML have a crucial part to play in increasing crafted by tranquilizing improvement specialists, so that as educated, to begin with, an examination of the mass of scientific data can be coordinated remembering the ultimate objective to outline essential new learning. AI has truly moved from concept towards verity in the pharmaceutical industry. The use of BC in health care is expected to stress the characteristic framework in unimaginable strategies to advantage the impacted individual and enhancements in the audit happens unmistakably thriving and costs. AI, MI, and DL are rapidly getting to be establishment technologies, like the web, and an ocean change of impact is ensured to take hold. Recurrent neural networks (RNNs), which be commonly suitable for sequence evaluation, are one of the largely confident tools for time-series or text investigation. And one of the most effective applications of RNNs in healthcare is digital scientific report analysis. In this script, we characterize the way innovation is moving Pharmaceutical and Healthcare companies and its future.
Key-Words / Index Term
Artificial Intelligence (AI); Blockchain (BC); Machine Learning (ML); Deep Learning (DL); Recurrent neural networks (RNN)
References
[1] McFarlane C. Patientory: A health care peer-to-peer EMR storage network v1.0. Available at: https://patientory.com/patientory_whitepaper.pdf.
[2] Earnest MA, Ross SE, Wittevrongel L, Moore LA, Lin CT. Use of a patient-accessible electronic medical record in a practice for congestive heart failure: patient and physician experiences. J Am Med Inform Assoc. 2004; 11:410–17.
[3] Interoperability with Blockchain Deterministic Methods for Connecting Patient Data to Uniform Patient Identifiers.
[4] State of Blockchain and Artificial Intelligence in Fintech http://news.crowdvalley.com/news/state-of-blockchain-and-artificial-intelligence-ai-in-fintech. Accessed 8/4/2018
[5] M. Swan, “Blockchains as an Equality Technology,” Broader Perspective blog, 2015.
[6] Vitalik Buterin. A next-generation smart contract and decentralized application platform. White Paper, 2014
[7] Ashish K Jha, David Doolan, Daniel Grandt, Tim Scott, and David W Bates. The use of health information technology in seven nations. International Journal of Medical Informatics, 77(12):848{854, 2008.
[8] Gulshan, V., Peng, L., Coram, M., Stumpe, M. C., Wu, D., Narayanaswamy, A., et al. (2016). Development and Validation of a Deep Learning Algorithm for Detection of Diabetic Retinopathy in Retinal Fundus Photographs. Jama, 316(22), 2402.
[9] Esteva, A., Kuprel, B., Novoa, R. A., Ko, J., Swetter, S. M., Blau, H. M., & Thrun, S. (2017). Dermatologist-level classification of skin cancerwith deep neural networks. Nature, 542(7639), 115– 118.
[10] Translating Artificial Intelligence into Clinical Care, Andrew L. Beam, Isaac S. Kohane, JAMA 316, 2368, 2016
[11] Opportunities and Obstacles for Deep Learning in Biology and Medicine, CS Greene et al., bioRxiv preprint first posted online May. 28, 2017;
[12] Peterson, K., Deeduvanu, R., Kanjamala, P., & Boles, K. (2016). A Blockchain-Based Approach to Health Information Exchange Networks.
[13] Ekblaw, A., Azaria, A., Halamka, J. D., & Lippman, A. (2016, August). A Case Study for Blockchain in Healthcare: “MedRec” prototype for electronic health records and medical research data. In Proceedings of IEEE Open & Big Data Conference.
[14] Travers Ching, Daniel S. Himmelstein, Brett K. Beaulieu-Jones,et al, Opportunities and obstacles for deep learning in biology and medicine,
Citation
Satwik.P.M., Geluvaraj B, T.A. Ashok Kumar, "A Study on Applications of AI, ML, DL And Blockchain In Healthcare And Pharmaceuticals And It’s Future," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.765-770, 2018.
A Review on Load Balancing Algorithms in Cloud Computing Environment
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.771-778, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.771778
Abstract
Virtualized Cloud Computing environment having the ability to change the IT software industry. Various practices and technologies are influenced by this amazing platform of next stage of evolution of internet. Information technology industry modernized by facilitating flexible on-demand allocating of computing resources. These issues are driving forces for the formation of an effective load balancing algorithm. Load serves in various forms as network load, CPU load and memory. Load balancing mechanism improved resource utilization, job response time and minimize migration by distributing the load among various nodes in a distributed system. To achieve effective load balancing the situation like some of the nodes are heavily loaded and some are under-loaded must be avoided. Load balancing algorithm must ensure that every node in the network distributes equal amount of work to all the processors. Load Balancing plays a critical role in cloud computing environment. Efficient load balancing algorithm provides customer’s on-demand basis in pay-as-you-use-manner resource. This paper presents several load balancing algorithms in diverse cloud computing environment.
Key-Words / Index Term
Load Balancing, Cloud Computing, Resource Allocating, Resource Scheduling
References
[1] http://www.nist.gov/itl/cloud/
[2] R. N. Calheiros, R. Ranjan, A. Beloglazov, C. Rose and R. Buyya, “Cloudsim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms”, in Software: Practice and Experience (SPE), Volume 41, Number 1, ISSN: 0038-0644, Wiley Press, New York, USA., pp. 23-50,2011.
[3] B. Wickremasinghe, R. N. Calheiros and R. Buyya, “Cloudanalyst: A cloudsim-based visual modeller for analyzing cloud computing environments and applications”, in Proc. of Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA2010), Perth, Australia, pp.446-452, 2010.
[4] K. A. Nuaimi, et al. A Survey of Load Balancing in Cloud Computing: Challenges and Algorithms. in Network Cloud Computing and Applications (NCCA), 2012 Second Symposium on. 2012. IEEE.
[5] A. M. Alakeel, A guide to dynamic load balancing in distributed computer systems. International Journal of Computer Science and Information Security, 2010. 10(6): p. 153-160.
[6] C. Zenon, M. Venkatesh, and A. Shahrzad, Availability and Load Balancing in Cloud Computing. 2011.
[7] Y. Alexeev, et al. Heuristic static load-balancing algorithm applied to the fragment molecular orbital method. in High Performance Computing, Networking, Storage and Analysis (SC), 2012 International Conference for. 2012. IEEE.
[8] K. Chonggun, and H. Kameda, Optimal static load balancing of multi-class jobs in a distributed computer system. IEICE TRANSACTIONS (1976-1990), 1990. 73(7): p. 1207-1214.
[9] S. Penmatsa, and A.T. Chronopoulos, Game-theoretic static load balancing for distributed systems. Journal of Parallel and Distributed Computing, 2011. 71(4): p. 537555.
[10] A. Khiyaita, et al. Load balancing cloud computing: state of art. in Network Security and Systems (JNS2), 2012 National Days of. 2012. IEEE.
[11] B. Cosenza, et al. Distributed load balancing for parallel agent-based simulations. in Parallel, Distributed and Network-Based Processing (PDP), 2011 19th Euromicro International Conference on. 2011. IEEE.
[12] J. Shi, C. Meng, and L. Ma. The Strategy of Distributed Load Balancing Based on Hybrid Scheduling. In Computational Sciences and Optimization (CSO), 2011 Fourth International Joint Conference on. 2011. IEEE.
[13] A. Gonzalez-Ruiz and Y. Mostofi, Distributed load balancing over directed network topologies. in American Control Conference, 2009. ACC`09. 2009. IEEE.
[14] I. Riakiotakis, et al., Distributed dynamic load balancing for pipelined computations on heterogeneous systems. Parallel Computing, 2011. 37(10): p. 713-729.
[15] I. Ahmad, and A. Ghafoor. A semi distributed load balancing scheme for large multicomputer systems. In Parallel and Distributed Processing, 1990. Proceedings of the Second IEEE Symposium on. 1990. IEEE.
[16] I. Ahmad, and A. Ghafoor, Semi-distributed load balancing for massively parallel multicomputer systems. Software Engineering, IEEE Transactions on, 1991. 17(10): p. 987-1004.
[17] W. Zhu, C. Sun, and C. Shieh. Comparing the performance differences between centralized load balancing methods. in Systems, Man, and Cybernetics, 1996., IEEE International Conference on. 1996. IEEE.
[18] S. Das, H. Viswanathan, and G. Rittenhouse. Dynamic load balancing through coordinated scheduling in packet data systems. in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003. IEEE.
[19] S. Ray and A. Sarkar “Execution Analysis of Load Balancing Algorithms in Cloud Computing Environment” International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.5, October 2012.
[20] G Liu, J Li, J Xu “An improved min-min algorithm in cloud computing”, Proceedings of the 2012 International Conference of Modern Computer Science and Applications; Berlin Heidelberg: Springer.2013. p.47-52.
[21] T. Kokilavani, DD Amalarethinam “Load balanced min-min algorithm for static meta-task scheduling in grid computing”, International Journal of Computer Applications. 2011 Apr;20(2):43-9.
[22] U. Bhoi, PN Ramanuj “Enhanced max-min task scheduling algorithm in cloud computing”, International Journal of Application or Innovation in Engineering and Management. 2013 Apr; 2(4):259-64.
[23] N. Balaji, A. Umamakeshwari “Load balancing in virtualized environment - A survey”, IndianJournal of Science and Technology. 2015 May 1; 8(S9):230-4.
[24] S. Moharana, Rajadeepand and Digamber Power “ANALYSIS OF LOAD BALANCERS IN CLOUD COMPUTING” International Journal of Computer Science and Engineering ISSN 2278-9960 Vol. 2, Issue 2, May 2013.
[25] Y. sahu, M. K. Pateriya “Cloud Computing Overview and load balancing algorithms”, Internal Journal of Computer Application Vol-65 No.24, 2013.
[26] N. Sran, N. kaur “Comparative Analysis of Existing Load balancing techniques in cloud computing”, International Journal of Engineering Science Invention, Vol-2 Issue-1 2013.
[27] N. J. Kansal, I. Chana “Existing Load Balancing Techniques in cloud computing: A systematic review” Journal of Information system and communication Vol-3 Issue-1 2012.
[28] B. Mondal, K. Dasgupta, P. Dutta “Load balancing in cloud computing using stochastic hill climbing - A soft computing approach”. Procedia Technology. 2012 Dec 31; 4:783-9.
[29] R. Mishra and A. Jaiswal, “Ant colony Optimization: A Solution of Load balancing in Cloud”, in International Journal of Web & Semantic Technology (IJWesT), Vol.3, No.2, pp. 33-50, 2012
[30] K. Nishant, et al. Load Balancing of Nodes in Cloud Using Ant Colony Optimization. in Computer Modelling and Simulation (UKSim), 2012 UKSim 14th International Conference on. 2012. IEEE.
[31] E. Gupta, V. Deshpande, “A Load Balancing Technique for Servers of Datacenter of Cloud using Ant Colony Optimization”, ISSN (Online): 2347 - 2812, Volume-2, Issue -6,7, 2014.
[32] K. Dasgupta, B. Mandal, P. Dutta, Jyotsna Kumar Mondal, Santanu Dam, “A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing” in Proc. of Elsevier, Procedia Technology 2013.
[33] E. Pacini, C. Mateos and C. G. Garino, “Dynamic Scheduling based on Particle Swarm Optimization for Cloud-based ScientificExperiments” HPCLatAm 2013 VI Latin American Symposium on High Performance Computing.
Citation
Mala Yadav, Jay Shankar Prasad, "A Review on Load Balancing Algorithms in Cloud Computing Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.771-778, 2018.
Survey on Cloud Computing Services and Challenges
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.779-783, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.779783
Abstract
Cloud computing is a way of computing, where most of our data is stored in the cloud, the Internet a computing capability that provides an abstraction between the computing resource and its underlying technical architecture, enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. The goal of cloud computing is to applytraditional supercomputing,or high performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second, in consumer-orientedapplications such as financial portfolios, to deliver personalized information, to provide data storage or to power large, immersive computer games. To do this, cloud computing uses networks of large groups of servers typically running low-cost consumer PC technology with specialized connections to spread data-processing chores across them. This paper, investigate several cloud computing system providers about their concerns on security and privacy issues.
Key-Words / Index Term
Cloud computing , cloud computing security , cloud computing methods , architecture, challenges
References
[1] Santosh Kumar and R. H. Goudar, “Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey”, International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.
[2] Usman Namadi Inuwa, ” The Risk and Challenges of Cloud Computing”, Usman Namadi Inuwa Int. Journal of Engineering Research and Application ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10.
[3] Yaser Ghanam,” Jennifer Ferreira, Frank Maurer,” Emerging Issues & Challenges in Cloud Computing— A Hybrid Approach,” Journal of Software Engineering and Applications, 2012, 5, 923-937 Published Online November 2012.
[4] S. Srinivasan , K. Raja,” Security Challenges In Cloud Computing,” International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Special Issue 2, April 2014).
[5] Rama Krishna Kalluri,Dr. C. V. Guru Rao,” Addressing the Security, Privacy and Trust Challenges of Cloud Computing,” Rama Krishna Kalluri et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6094-6097,ISSN:09759646
[6] V. Swathi, Dr. M. P.Vani,” Security and Privacy Challenges in Cloud: Survey and Research Directions,” ISSN (e): 2250 – 3005 || Volume, 07 || Issue, 08|| August – 2017 || International Journal of Computational Engineering Research (IJCER)
[7] D.Sasikumar , S.Saravanakumar,” Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications,” D. Sasikumar et al. / International Research Journal of Latest Trends in Engineering and Technology (IRJLTET) ISSN: 2455-2666 Vol.5 No.2 MAR/APR 2017.
[8] Deepak Puthal , B. P. S. Sahoo† , Sambit Mishra, and Satyabrata Swain,” Cloud Computing Features, Issues and Challenges: A Big Picture,” 2015 International Conference on Computational Intelligence & Networks (CINE 2015)
[9] MR. GURMEET SINGH; MR. VINEET KUMAR SACHDEVA,” IMPACT AND CHALLENGES OF CLOUD COMPUTING IN CURRENT SCENARIO,” International Journal of Social Science & Interdisciplinary Research Vol.1 Issue 10, October 2012, ISSN 2277 3630.
[10] Ashraf Zia, Muhammad Naeem Ahmad Khan,” Identifying Key Challenges in Performance Issues in Cloud Computing,” I.J.Modern Education and Computer Science, 2012.
[11] Maher Alghali, H. M. A. Najwa, I. Roesnita,” Challenges and Benefits of Implementing Cloud Based E-Learning in Developing Countries,” ICSSR 2014 (e-ISBN 978-967-11768-7-0). 9-10 June 2014.
[12] Jui-Chien Hsieh , Ai-Hsien Li and Chung-Chi Yang,” Mobile, Cloud, and Big Data Computing: Contributions, Challenges, and New Directions in Telecardiology,” Int. J. Environ. Res. Public Health 2013.
[13] Jahangeer Qadiree , Mohd Ilyas Maqbool,” Solutions of Cloud Computing Security Issues,” International Journal of Computer Science Trends and Technology (IJCS T) – Volume 4 Issue 2, Mar - Apr 2016.
[14] Hesham Allam, Nasser Nassiri, Amala Rajan, Jinesh Ahmad,” A Critical Overview of Latest Challenges and Solutions of Mobile Cloud Computing,” 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) 978-1-5386-2859-1/17/$31.00 ©2017 IEEE 225.
[15] Y. Ghebghoub, S. Oukid, and O. Boussaid,” A Survey on Security Issues and the Existing Solutions in Cloud Computing,” International Journal of Computer and Electrical Engineering, Vol. 5, No. 6, December 2013.
Citation
C. Ranjith Kumar, "Survey on Cloud Computing Services and Challenges," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.779-783, 2018.
Review on Energy Efficient Techniques in MANETs
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.784-789, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.784789
Abstract
MANET is a type of infrastructure-less wireless communication network system that can be set up at any time and anywhere. Dynamic and infrastructure fewer networks. Power consumption is one of the most crucial design concerns in Mobile Ad-hoc networks as the nodes in MANET are battery limited. The major constraint of this type so networks are Energy optimization because the nodes involved in this type of networks are battery operated. This paper presents different works done in the past to improve the lifetime and other parameters of the mobile ad hoc networks.
Key-Words / Index Term
MANET, DSR, energy efficiency, power consumption
References
[1]. Deepti Badal, Rajendra Singh Kushwah, “Nodes energy aware modified DSR protocol for energy efficiency in MANET”, IEEE INDICON 2015.
[2]. Sheng-Lung Peng, Yan-Hao Chen, Ruay-Shiung Chang, Jou-Ming Chang, “An Energy-aware Random Multi-Path Routing Protocol for MANETs”, IEEE International Conference on Smart City/Social Com/Sustain Com together with Data Com 2015 and SC2 2015.
[3]. Arvind Kushwaha, Prof. Nitika Vats Doohan, “M-EALBM: A Modified Approach Energy Aware Load Balancing Multipath Routing Protocol in MANET”, Symposium on Colossal Data Analysis and Networking, IEEE 2016.
[4]. Methaq jasam, Dr.salman bin yussof, “ Evaluation Of Energy Efficiency Of MANET Routing Protocols”, International Journal Of Scientific & Technology Research Volume 2, Issue 3, March 2013.
[5]. Shiva Prakash, J. P. Saini, S. C. Gupta, “A review of Energy Efficient Routing Protocols for Mobile Ad Hoc Wireless Networks”, International Journal of Computer Information Systems, Vol. 1, No. 4, 2010.
[6]. Dhiraj Suresh Patil and Rahul Gaikwad, "Survey Paper on Energy Efficient MANET Protocols" in the international journal of scientific research June 2015.
[7]. Mohammed Aashkaar, Purushottam Sharma,” Enhanced energy efficient AODV routing protocol for MANET” in IEEE 2016.
[8]. W. K. Kuo and S. H. Chu, "Energy Efficiency Optimization for Mobile Ad Hoc Networks," in IEEE Access, vol. 4, no. , pp. 928-940, 2016.
[9]. Raghav Yadav and Mahdi Abdul kader Salem, “ Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks” in International Journal of Advanced Computer Science and Applications, Vol. 7, No. 5, 2016
Citation
Balinder Kaur, Sunil Nagpal, "Review on Energy Efficient Techniques in MANETs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.784-789, 2018.
Secure Digital Signature with Elliptic Curve Cryptography Scheme using Galois Field
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.790-796, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.790796
Abstract
The development and growth of Internet technology has made digital signature in the convenient and helpful manner for electronic transaction security and business applications. Digital signature is largely used because of its data integrity, protecting the data, privacy and authenticity assets. Digital signatures are mostly used in financial transaction, credential identify and software distribution, where it is indispensable to detect forgery or tampering of data. Digital signatures based on elliptic curves are more secure, reliable and suitable for constrained environments like wireless sensor networks because of its reduced processing overhead. This paper discusses the principles of Digital Signatures, their applications based on Elliptic Curve Digital Signature (ECDSA) scheme using asymmetrical cryptography along with Galois Field. Finally, a practical elliptic curve digital signature system using Galois Field is implemented and its time complexity is analyzed. The time complexity results validation claim that the proposed ECDSA is suitable for use in real time environments like WSN and smart cards. The proposed technique is based on mathematical model used in ECC with Galois Field along with the secure hash function. Programming language Python is used to realize the algorithm used.
Key-Words / Index Term
Digital Signatures, DSA, ECC, Galois Field, ECDSA, Encryption using asymmetric cryptography, Hash Functions, SHA 512
References
[1] H. Modares, M. T. Shahgoli, H. Keshavarz, A. Moravejosharieh, R. Salleh. “Make a Secure Connection Using Elliptic Curve Digital Signature”. International Journal of Scientific & Engineering Research IJSER Volume 3, Issue 9, Pages 1-8, September 2012.
[2] B. B. Brumley, M. Barbosa, and F. Vercauteren. “Practical realisation and elimination of an ECC related software bug attack” In the proceeding of Cryptographers’ Track at the RSA Conference CT-RSA, volume 7178 of LNCS Springer, Berlin Pages 171–186, 2012.
[3] D. Boneh, H. Shacham, “Group signatures with verifier-local revocation”, 11th ACM Conference on Computer and Communications Security CCS, Washington DC USA, Pages168–177, 2004.
[4] D. J. Bernstein. Curve25519: New Diffie-Hellman speed records. In M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, editors, Public Key Cryptography – PKC 2006, volume 3958 of LNCS, pages 207–228. Springer, 2006.
[5] I. Biehl, B. Meyer, and V. M¨uller. Differential fault attacks on elliptic curve cryptosystems. In M. Bellare, editor, CRYPTO, volume 1880 of Lecture Notes in Computer Science, pages 131–146. Springer, 2000.
[6] Hongjie Zhu, Daxing Li “Research on Digital Signature in Electronic Commerce” Proceedings of the International MultiConference of Engineers and Computer Scientists 2008 Vol I IMECS 2008, 19-21 March, 2008, Hong Kong
[7] Mohammad Noor Nabi, Sabbir Mahmud, And M Lutfar Rahman “Implementation and Performance Analysis Of Elliptic Curve Digital Signature Algorithm”, Daffodil International University journal of science and technology, volume 2, issue 1, Page 28-33 January 2007.
[8] Aqeel Khalique, Kuldip Singh, Sandeep Sood “Implementation Of Elliptic Curve Digital Signature Algorithm” International Journal Of Computer Applications, Volume 2, Issue 5, Page 1263-1271, May 2010.
[9] D. Jetchev and R. Venkatesan. Bits security of the elliptic curve Diffie-Hellman secret keys. In D. Wagner, editor, CRYPTO, volume 5157 of LNCS, pages 75–92. Springer, 2008.
[10] M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The most dangerous code in the world: Validating SSL certificates in non-browser software. In T. Yu, G. Danezis, and V. D. Gligor, editors, ACM Conference on Computer and Communications Security, pages 38–49. ACM, 2012.
[11] Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig, Selecting elliptic curves for cryptography: An efficiency and security analysis, Journal of cryptographic Engineering, November 2016, Volume 6, issue 4, page 259-286, Springer 2016.
[12] Paramjit Kaur, RakeshKumar and Harinder Kaur, "An Improved Security Network Life Based on Data Ant Colony Optimization Method Used in Wireless Mesh Network", International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.50-56, 2018.
[13] Abhishek Satyarthi, Sanjiv Sharma, "A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article", International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.19-23, 2017.
[14] Kodge B. G., "Information Security: A Review on Steganography with Cryptography for Secured Data Transaction", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017
Book References
[12] William Stallings, “Cryptography and Network Security”, Prentice Hall, 5th Edition, Pages 285-296, 2010.
[13] Kaufman, c., Perlman, R., and Speciner, M., “Network Security, Private Communication in a public world”, 2nd Edition. Prentice Hall Print, Pages 274-282, 2002.
[14] Behrouz A Forouzan, “Cryptography and Network Security”, McGraw Hill, 2nd Edition, Pages 290-297, 2010.
[15] Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and source code in C”, Wiley publishing Inc. 2nd Edition, Pages 201-235, 2015.
Citation
Mohammad Amjad, "Secure Digital Signature with Elliptic Curve Cryptography Scheme using Galois Field," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.790-796, 2018.
Solution of System of Fractional Differential Equations Using Variational Iteration Method
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.797-802, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.797802
Abstract
In this paper, an analytical approximate solution of a system of fractional differential equations, fractional heat-like two-dimensional equation and stiff system of nonlinear differential equations is obtained using variational iteration method. The results reveal that our method is effective straightforward and very simple. The numerical findings for different cases of problems are presented graphically. The results reveal that the variational iteration method is convenient, stable, efficient, much easier and performs extremely good in terms of simplicity and efficiency.
Key-Words / Index Term
Variational iteration method; fractional heat-like two-dimensional equation; System of fractional differential equation; Caputo fractional derivative
References
[1] S. G. Samko, A. A. Kilbas, and O. I. Marichev, "Fractional integrals and derivatives, translated from the 1987 Russian original" Gordon and Breach, Yverdon, 1993.
[2] K. B. Oldham and J. Spanier The Fractional Calculus, Academic Press, New York , 1974.
[3] I. Podlubny, Fractional Differential Equations, Academic Press, San Diego, 1999.
[4] J.H. He, “ Nonlinear oscillation with fractional derivative and its applications”, International Conference on Vibrating Engineering 98, Dalian, China, Vol. 28, pp. 288-291.
[5] N. Ferreira, F. Duarte, M. Lima, M. Marcos and J.T. Machado, “Application of fractional calculus in the dynamical analysis and control of mechanical manipulators”, Fract. Calc. Appl. Anal., Vol. 11, no.1, pp. 91-11, 2008.
[6] Magin, Richard L. "Fractional calculus in bioengineering, part 1,Critical Reviews in Biomedical Engineering 32.1, 2004.
[7] L. Debnath, “Recent applications of fractional calculus to science and engineering”, Int. J. Math. Math. Sci., Vol. 54, pp. 3413-3442, 2003.
[8] Z. Odibat and S. Momani, “Modified homotopy perturbation method: application to quadratic riccati differential equation of fractional order”, Chaos Soli. Fract, Vol. 36, no.1, pp. 167-174, 2008.
[9] M. Zurigat, S. Momani, Z. Odibat and A. Alawneh “The homotopy analysis method for handling systems of fractional differential equations”, Appl. Math. Model., Vol. 34, no.1, pp.24-35, 2010.
[10] H.Jafari and V.D. Gejji., “Solving a system of nonlinear fractional differential equations using adomain decomposition”. Appl. Math. Comput., Vol. 196, no., pp.644–651,2006.
[11] J. A. Patel., G. R Khatri, H. P. Bhathawala, "Adomian Decomposition Method for Multiphase Miscible Flow the Porous Media",International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), Volume 3, Issue 1, pp.1227-1232, 2018
[12] S. Momani and Z. Odibat, “ Analytical approach to linear fractional partial differential equations arising in fluid mechanics”, Physics Letters A, Vol. 355, no. 4-5, pp. 271-279, 2006.
[13] S. W Abbasbandy, “A new application of He`s variational iteration method for quadratic Riccati differential equation by using Adomian`s polynomials”, Journal of Computational and Applied Mathematics, Vol. 207, no.1, pp.59-63, 2007.
[14] M. Javidi and A.Golbabai, “Exact and numerical solitary wave solutions of generalized Zakharov equation by the variational iteration method, Chaos, Solitons & Fractals, Vol. 36, no.2, pp.309-313, 2008.
[15] M. Dehghan and F. Shakeri, “Solution of parabolic integro-differential equations arising in heat conduction in materials with memory via he’s variational iteration technique”. Comm in Numer. Meth. in Eng., Vol. 26, pp.705-715, 2008.
[16] Li Yun-dong and Yang Yi-ren, “Vibration Analysis of Conveying Fluid Pipe via He’s Variational Iteration Method”, Applied Mathematical Modelling, Vol. 43, pp. 409-420 ,2016.
[17] Y.Chen, J. Zhangand H.Zhang, “Free vibration analysis of rotating tapered Timoshenko beams via variational iteration method”. Journal of Vibration and Control, Vol. 23, no. 2, pp. 220-234, 2017.
[18] H.Ghaneai and M.M. Hosseini, “Solving Differential-Algebraic Equations through Variational Iteration Method with an Auxiliary Parameter”, Applied Mathematical Modelling, Vol. 40, no. 5-6, pp. 3991-4001, 2016.
[19] I. Ali and N. A. Malik, “ Hilfer Fractional Advection-Diffusion Equations with Power-Law Initial Condition; A Numerical Study using Variational Iteration Method”, Computers & Mathematics with Applications, Vol. 68, no. 10, pp. 1161-1179, 2014.
[20] F.S. Aski, S.J. Nasirkhani, E. Mohammadian and A.Asgari, “ Application of Adomian decomposition method for micropolar flow in a porous channel”, Propulsion and Power Research, Vol. 3, no.1, pp.15-21,2014.
[21] S. H. Chang, “Convergence of Variational Iteration Method Applied to Two-Point Diffusion Problems”, Applied Mathematical Modelling, Vol. 40, no. 15-16, pp. 6805-6810, 2016.
[22] M. Di Paola, F.P. Pinnola and M. Zingales, “Fractional differential equations and related exact mechanical models”. Computers & Mathematics with Applications, Vol. 66, no. 5, pp. 608-620, 2013.
[23] S. S. Siddiqi and M. Iftikhar, “Variational Iteration Method for the Solution of Seventh Order Boundary Value Problems using He’s Polynomials”, Journal of the Association of Arab Universities for Basic and Applied Sciences, Vol.18, pp. 60-65, 2015 .
[24] D. K. Salkuyeh and T. Ali, “Interpolated Variational Iteration Method for Initial Value Problems”, Applied Mathematical Modelling, Vol. 40, no. 5-6, pp. 3979-3990, 2016.
[25] R. Gorenflo and F. Mainardi, “Fractional calculus: Int and differential equations of fractional order. in:” A. Carpinteri, F. Mainardi (Eds.), Fractals and Fractional Calculus in Continuum Mechanics, Springer Verlag, Wien and New York, 1997.
[26] A. Golbabai and M. Javidi, “A variational iteration method for solving parabolic partial differential equations”, Int. J. Computers and Mathematics with Applications Vol. 54 , pp. 987–992, 2007.
[27] M. G. Sakar, F. Erdoganand and A.Yıldırım, “Variational iteration method for the time-fractional Fornberg-Whitham equation”, Computers & Mathematics with Applications, Vol. 63, no. 9, pp. 382–1388.
[28] T.E. Hull, W.H. Enright, B.M. Fellen and A.E. Sedgwick, “Comparing numerical methods for ordinary differential equations”, SIAM J. on Numer. Anal., Vol. 9, no.4, pp. 603-637, 1972.
[29] D.D Ganji., M. Nourollahi, and E. Mohseni, “Application of he’s methods to nonlinear chemistry problem”, Comp. and Math. with Appl., Vol. 54, no.7-8, pp.1122-1132.
Citation
Shweta Pandey, Sandeep Dixit, "Solution of System of Fractional Differential Equations Using Variational Iteration Method," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.797-802, 2018.
Analysis of Top-K Query for Data Stream Using Classification Adaptive Model
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.803-807, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.803807
Abstract
Data stream classification has been a wide studied detailed examination downside in recent years. The vigorous and evolving nature of knowledge streams needs economical and effective techniques that square measure considerably completely different from static data classification techniques. The foremost strenuous and well studied characteristics of information streams square measure its infinite length and concept-drift. Information stream classification poses several challenges to the info mining community. All through this paper, we enclose a affinity to talk four such major dispute namely, IL, CDI, CE, and FE. Since an information stream is in theory IL Model (Infinite long), it`s impractical to store and use all the historical information for coaching. CD Model (Concept-Drift) could be a common development in information streams that happens as a result of changes within the underlying ideas. CE (Concept-Evolution) happens as a results of new categories evolving within the stream. Feature-evolution (FE) Model could be a oft occurring method in several streams, reminiscent of text streams, within which new options seem because the stream progresses. Most existing information stream classification techniques address solely the primary challenges, and ignore the latter two. The paper proposes associate degree ensemble classification framework, wherever every classifier is provided with a unique class detector, to handle CE.
Key-Words / Index Term
Outlier Detection, Big Data Mining, Concept Drift (CF)t, Concept Evaluation(CE),Feature Evaluation (FE), CP GraphModel.
References
[1] C. C. Aggarwal. On classification and segmentation of massive audio data streams. Knowl. and Info. Sys., 20:137–156, July 2009.
[2] C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu. A framework for on-demand classification of evolving data streams. IEEE Trans. Knowl. Data Eng, 18(5):577–589, 2006.
[3] A. Bifet, G. Holmes, B. Pfahringer, R. Kirkby, and R. Gavald. New ensemble methods for evolving data streams. In Proc. SIGKDD, pages 139–148, 2009.
[4] S. Chen, H. Wang, S. Zhou, and P. Yu. Stop chasing trends: Discovering high order models in evolving data. In Proc. ICDE, pages 923–932, 2008.
[5] W. Fan. Systematic data selection to mine concept-drifting data streams. In Proc. SIGKDD, pages 128–137, 2004.
[6] J. Gao, W. Fan, and J. Han. On appropriate assumptions to mine data streams. In Proc. ICDM, pages 143–152, 2007.
[7] S. Hashemi, Y. Yang, Z. Mirzamomen, and M. Kangavari. Adapted one-versus-all decision trees for data stream classification. IEEE Trans. Knowl. Data Eng, 21(5):624–637, 2009.
[8] G. Hulten, L. Spencer, and P. Domingos. Mining timechanging data streams. In Proc. SIGKDD, pages 97–106, 2001.
[9] I. Katakis, G. Tsoumakas, and I. Vlahavas. Dynamic feature space and incremental feature selection for the classification of textual data streams. In Proc. ECML PKDD, pages 102–116,2006.
[10] I. Katakis, G. Tsoumakas, and I. Vlahavas. Tracking recurring contexts using ensemble classifiers: an application to email filtering. Knowledge and Information Systems, 22:371–391, 2010.
[11] J. Kolter and M. Maloof. Using additive expert ensembles to cope with concept drift. In Proc. ICML, pages 449–456, 2005.
[12] D. D. Lewis, Y. Yang, T. Rose, and F. Li. Rcv1: A new benchmark collection for text categorization research. Journal of Machine Learning Research, 5:361–397, 2004.
[13] X. Li, P. S. Yu, B. Liu, and S.-K. Ng. Positive unlabeled learning for data stream classification. In Proc. SDM, pages 257–268, 2009.
[14] M. M. Masud, Q. Chen, J. Gao, L. Khan, J. Han, and B. M. Thuraisingham. Classification and novel class detection of data streams in a dynamic feature space. In Proc. ECML PKDD, volume II, pages 337–352, 2010
[15] M. M. Masud, Q. Chen, L. Khan, C. Aggarwal, J. Gao, J. Han, and B. M. Thuraisingham. Addressing concept-evolution in concept-drifting data streams. In Proc. ICDM, pages 929–934,2010.
Citation
M.Nalini, Anjali kuruvilla, "Analysis of Top-K Query for Data Stream Using Classification Adaptive Model," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.803-807, 2018.
Opinion Mining from Customer Reviews for Product Ranking
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.808-818, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.808818
Abstract
Recently the peoples of the metropolitan cities are moving from traditional offline interactive shopping to online shopping due to time limitation and cost of products. In online shopping, the purchase decision is a challenging task for new customers as there may a large number of competitive products. Recently mostly online shopping sites have been facilitated to their customers to write the reviews about the products they have purchased. These customers’ reviews do not only help to new customer for taking purchase decision but also help the manufacturer to increase the sale of their products by improving its quality. This paper presents a reviews mining method to extract product features and its opinion. Thereafter, we apply the Analytic Hierarchy Process (AHP) on extracted features and opinion to rank the competitive products by scoring them. The method has been validated on a data set related to five smart phones downloaded from three deferent online shopping websites - Flipkart, Snapdeal, and Amazon. The evaluation result shows that the proposed method gives up to marks result.
Key-Words / Index Term
Text mining; Opinion mining; feature extraction; Analytical Hierarchy Process; Product ranking
References
[1] M. Hu, B. Liu, “Mining and Summarizing Customer Reviews”, In the Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’04), USA, pp. 168–177, 2004.
[2] S. Kim, E. Hovy, “Determining the Sentiment of Opinions”, In the Proceedings of the 20th International Conference on Computational Linguistics (COLING’04), Switzerland, pp. 1367–1373, 2004.
[3] B. He, C. Macdonald, J. He, and I. Ounis, “An Effective Statistical Approach to Blog Post Opinion Retrieval”, CIKM., 10, pp. 1063-1069, 2008.
[4] B.Liu, “Sentiment Analysis and Subjectivity”, “Handbook of Natural Language Processing”, Second Edition, Chapman and Hall/CRC publisher, Editors (N. Indurkhya & F. J. Damerau), 2010.
[5] P. Turney, “Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews”, In the Proceedings of the 40th Annual Meeting on Association for Computational Linguistics (ACL’02), Philadelphia, Pennsylvania, pp. 417–424, 2002.
[6] B. Pang, L. Lee, S. Vaithyanathan, “Thumbs up? Sentiment Classification Using Machine Learning Techniques”, In the Proceedings of the 2002 Conference on Empirical Methods in Natural Language Processing (EMNLP’02), USA, pp. 79–86, 2002.
[7] S. Arora, M. Joshi, C.P. Rose, “Identifying Types of Claims in Online Customer Reviews”, In the Proceedings of the NAACL HLT., 6, pp. 37-40, 2009.
[8] B. Liu, M. Hu, J. Cheng, “Opinion Observer - Analyzing and comparing opinions on the Web”, In the Proceedings of the 14th International Conference on World Wide Web (WWW’05), Japan, pp. 342–351, 2005.
[9] X. Ding, B. Liu, S.Y. Philip, “A Holistic Lexicon-Based Approach to Opinion Mining”, In the Proceedings of the first ACM International Conference on Web search and Data Mining (WSDM’08), California, USA, pp. 231–240, 2008.
[10] M. Hu, B. Liu, “Mining and Summarizing Customer Reviews”, In the Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’04), USA, pp. 168–177, 2004.
[11] A.M. Popescu, O. Etzioni, “Extracting Product Features and Opinions from Reviews”, In the Proceedings of the 2005 Conference on Empirical Methods in Natural Language Processing (EMNLP’05), Canada, pp. 339–346, 2005.
[12] B. Liu, L. Zhang, “A survey of Opinion Mining and Sentiment Analysis”, Mining Text Data, Springer, ISBN: 978-1-4614-3223-4, pp. 415 – 463, 2012.
[13] M. Abulaish, Jahiruddin, M. Doja, T. Ahmad, “Feature and Opinion Mining for Customer Review Summarization”, In the Proceedings of the Pattern Recognition and Machine Intelligence (PReMI’09), pp. 219-224, 2009.
[14] W. Medhat, A. Hassan, H. Korashy, “Sentiment Analysis Algorithms and Applications: A survey”, Ain Shams Engineering Journal, 5(4), pp. 1093-1113, 2014.
[15] P. Zhang, W. Yu, C. Sha, X. He, A. Zhou, “Product-Oriented Review Summarization and Scoring”, Frontiers of Computer Science, 9(2), pp. 210-223, 2015.
[16] M. Chae, J. Kim, “Do size and structure matter to mobile users? an empirical study of the effects of screen size, information structure, and task complexity on user activities with standard web phones”, Behaviour & Information Technology, 23 (3), pp. 165–181, 2004.
[17] C.H. Chen, L.P. Khoo, W. Yan, “Evaluation of multicultural factors from elicited customer requirements for new product development”, Research in Engineering Design, 14 (3), pp. 119–130, 2003.
[18] M.C. Chuang, C.C. Chang, S.H. Hsu, “Perceptual factors underlying user preferences toward product form of mobile phones”, International Journal of Industrial Ergonomics, 27 (4), pp. 247–258, 2001.
[19] S.H. Han, S.W. Hong, “A systematic approach for coupling user satisfaction with product design”, Ergonomics, 46 (13-14), pp. 1441–1461, 2003.
[20] S.H. Han, K.J. Kim, M.H. Yun, S.W. Hong, J. Kim, “Identifying mobile phone design features critical to user satisfaction”, Human Factors in Ergonomics & Manufacturing, 14 (1), pp. 15–29, 2004.
[21] Y.S. Lee, S.W. Hong, T.L. Smith-Jackson, M.A. Nussbaum, K. Tomioka, “Systematic evaluation methodology for cell phone user interfaces”, Interacting with Computers, 18 (2), pp. 304–325, 2006.
[22] X. Yu, S. Guo, J. Guo, X. Huang, “Rank B2C e-commerce websites in e-alliance based on AHP and fuzzy TOPSIS”, Expert Systems with Applications, 38 (4), pp. 3550–3557, 2011.
[23] H.Y. Hsieh, S.H. Wu, “Ranking online customer reviews with the SVR model”, In the Proceedings of the 2015 IEEE 16th International Conference on Information Reuse and Integration, IEEE, pp. 550–555, 2015.
[24] J.C. Pomerol, S. Barba-Romero, “Multicriterion Decision in Management: Principles and Practice”, vol. 25, 1st ed., Springer US, ISBN: ISBN 978-1-4615-4459-3, 2000.
[25] G. Isiklar, G. Buyukozkan, “Using a multi-criteria decision making approach to evaluate mobile phone alternatives”, Computer Standards & Interfaces, 29 (2), pp. 265–274, 2007.
[26] S.T. Saaty, “The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation”, 1st ed., McGraw-Hill, New York, 1980.
[27] R.W. Saaty, “The analytic hierarchy process-what it is and how it is used”, Mathematical Modelling, 9 (3-5), pp. 161–176, 1987.
[28] W. Webber , A. Moffat , J. Zobel , “A similarity measure for indefinite rankings”, ACM Transactions on Information Systems, 28 (4), pp. 20:1– 20:38, 2010.
Citation
Jahiruddin, "Opinion Mining from Customer Reviews for Product Ranking," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.808-818, 2018.
A Survey on Stock market price prediction using data mining techniques
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.819-822, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.819822
Abstract
data mining techniques are used in a number of applications such as classification, prediction and others. In this presented work the data mining techniques are investigated for implementing in prediction applications. Therefore this paper provides the study about the stock market price prediction techniques and the recently made contributions in domain of prediction using data mining techniques. The data mining techniques are having the ability to evaluate the historical stock market price trends and can approximate the upcoming market prices. In addition of that a model using available techniques is also presented work.
Key-Words / Index Term
Stock market price, prediction, data mining, survey, improved model
References
[1] Mondher Bouazizi and Tomoaki Ohtsuki, “A Pattern-Based Approach for Multi-Class Sentiment Analysis in Twitter”, 2169-3536, 2017 IEEE, VOLUME 5, 2017
[2] Han, Jiawei, Jian Pei, and Micheline Kamber, “Data mining: concepts and techniques”, Elsevier, 2011.
[3] Bharati M. Ramageri, “Data Mining Techniques and Applications”, Indian Journal of Computer Science and Engineering, Volume 1 Number 4, pp. 301-305
[4] Dunham, M.H. Data mining introductory and advanced topics. Upper Saddle River, NJ: Pearson Education, New Delhi, 2003. Print. ISBN: 81-7758-785-4, 2006.
[5] Reza Hafezi, Jamal Shahrabi, Esmaeil Hadavandi, “A bat-neural network multi-agent system (BNNMAS) for stock price prediction: Case study of DAX stock price”, Applied Soft Computing 29 (2015) 196–210, © 2015 Elsevier B.V.
[6] Xiaodong Li, Haoran Xie, Ran Wang, Yi Cai, Jingjing Cao, Feng Wang, Huaqing Min, Xiaotie Deng, “Empirical analysis: stock market prediction via extreme learning machine”, Neural Comput & Applic, DOI 10.1007/s00521-014-1550-z, Springer-Verlag London 2014
[7] Thien Hai Nguyen, Kiyoaki Shirai, Julien Velcin, “Sentiment analysis on social media for stock movement prediction”, Expert Systems With Applications 42 (2015) 9603–9611, © 2015 Elsevier Ltd.
[8] QING LI, YUANZHU CHEN, LI LING JIANG, PING LI, HSINCHUN CHEN, “A Tensor-Based Information Framework for Predicting the Stock Market”, ACM Transactions on Information Systems, Vol. , No. , Article , Publication date: January 2016.
[9] Sanjiban Sekhar Roy, Dishant Mittal, Avik Basu, and Ajith Abraham, “Stock Market Forecasting Using LASSO Linear Regression Model”, Advances in Intelligent Systems and Computing 334, DOI: 10.1007/978-3-319-13572-4_31.
Citation
Prateek Purey, Anil Patidar, "A Survey on Stock market price prediction using data mining techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.819-822, 2018.