Privacy Secure Data Authentication in Cloud Computing
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.723-731, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.723731
Abstract
Cloud computing is a new modern and broad concept of the world. Users store huge amount of data on cloud storage for future use. Now a day’s privacy to the data stored in cloud is an aspect and security is a very major challenging mission in cloud computing. These challenges have huge effect in the development of secure data storage qualities of cloud system. The objective of this paper is to provide the privacy two factor authentication (2FA) techniques algorithm for the cloud environment with an attempt to bring solutions of such problems. The main aim of this paper is to design and propose Two-Factor Authentication (2FA) technology with One-Time Password (OTP) and finger print for providing strong security system to the data stored in cloud system. This paper, presents two modules, the first module deals with ensuring the storing security of data in encrypted format by using the (2FA) technique and the second module with digital signature algorithm (DSA). We have proposed framework which provides, verifies user authenticity using two-step verification, which is based on password, CSP level key establishment between the users and the cloud server.
Key-Words / Index Term
Cloud Computing, 2FA Secure Data Storage Cloud Server, DSA, Encryption and Decryption Algorithm Cloud Storage
References
[1] M.S. Monisha, S. Chidambaram,“Enhanced Data Security using RSA Digital Signature with Robust Reversible Watermarking Algorithm in Cloud Environment”, International Journal of Electronics & Co mmunication Technology, Vol.8, Issue 1, pp.20-24, 2017.
[2] M. Singhal, S. Tapaswi,“Software Tokens Based Two Factor Authentication Scheme”,International Journal of Information and Electronics Engineering, Vol.2, No. 3,pp.383-386, 2012.
[3] N. Mashhadi,“Authentication in mobile cloud computing by combining the tow factor Authentication and one time password token”,Vol.37, Part 2 pp. 220−229, 2015.
[4] Y. Kale, A. B. Patankar, “Enhanced Data Security Mechanism on Cloud using two-factor authentication, data encryption and key Sharing Mechanism”, Proceedings of 11th IRF International Conference, ISBN: 978-93-84209-27-8, pp.158- 161, 2014.
[5] A.Padmapriya, P.Subhasri, “Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Security”, International Journal of Engineering Trends and Technology, Vol.4 Issue4, pp.1067- 1071, 2013.
[6] L. Arockiam, S. Monikandan,“Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.2, Issue 8, pp. 3064-3070, 2013.
[7] T. Sivasakthi, N. Prabakaran, “Applying Digital Signature with Encryption Algorithm of User Authentication for Data Security in Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 2, Issue 2, pp. 3102- 3107,2014.
[8] M. A. Acha, M. J. Po, “Two (2)-Factor Authentication for Cloud Storage”, researchGate,2016.
[9] G. Saini, N. Sharma, “Triple Security of Data in Cloud Computing” ,International Journal of Computer Science and Information Technologies, Vol.5 Issue 4, pp. 5825-5827, 2014.
[10] A. Chaturvedi, D. N. Goswami, R. P. Sarang, “Privacy Algorithms to Improve the Secure Framework for Cloud Computing Environment”,
International Journal of Advanced Research in Computer and Communication Engineering, Vol.6, Issue 4,pp.63-69, 2017.
[11] D. Patil, P.K.Deshmukh, “Data Security in Cloud Using Attribute Based Encryption with Efficient Keyword Search”, International Journal of Scientific & Engineering Research, Vol.7, Issue 1, pp. 986-991, 2016.
[12] N. Nagar, U. Suman, “A Secure Mobile Cloud Storage Environment using Encryption Algorithm”, International Journal of Computer Applications, Vol.140, No.8, pp.33-43, 2016.
[13] A. Khodwe, V.R.Wadhankar, “Security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol.4, Issue 1, pp. 233-237, 2016.
[14] An Braeken, A. Touhafi, “ Efficient Anonymous User Authentication on Server Without Secure Channel During Registration”, IEEE, 978-1-4673-8894-8, 2016.
[15] R. Sugumar, K. A. M. Joycee, “DSCESEA: Data Security in Cloud using Enhanced Symmetric Encryption Algorithm”, International Journal of Engineering Research & Technology, Vol.6, Issue 10, pp. 292-295, 2017.
Citation
Rakesh Prasad Sarang, Anshu Chaturvedi, D.N. Goswami, "Privacy Secure Data Authentication in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.723-731, 2018.
A Deduplication -Aware similarity finding and removal system for Cloud Provider and Its Users
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.732-736, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.732736
Abstract
Data reduction has become increasingly very important in storage systems thanks to the explosive growth of digital information among the globe that has ushered among the large information era. In existing system cloud suppliers offer less method capability and thus displease their users for poor service quality. Therefore, it is vital for a cloud provider to select out applicable servers to provide services; such it reduces worth the most quantity as potential wherever as satisfying its users at the same time. Here the foremost disadvantage duplication therefore to beat of those problems we tend to tend to pick planned model. Throughout this paper, we tend to gift DARE, a low-overhead Deduplication-Aware likeness detection and Elimination theme that effectively exploits existing duplicate-adjacency information for terribly economical likeness detection in information deduplication based backup/archiving storage systems. Our experimental results and backup data sets show that DARE only consumes concerning 1/4 and 1/2 severally of the computation and classification overheads required by the conventional super-feature approaches whereas investigating 2-10% extra redundancy and achieving an improved turnout, by exploiting existing duplicate-adjacency information for likeness detection and finding the “sweet spot” for the super-feature approach.
Key-Words / Index Term
Data deduplication, delta compression, storage system, index structure, performance evaluation.
References
[1]. B. Zhu, K. Li, and R. H. Patterson, “Avoiding the disk bottleneck in the data domain deduplication file system,” in Proc. 6th USENIX Conf. File Storage Technol., Feb. 2008, vol. 8, pp. 1–14.
[2]. D. T. Meyer and W. J. Bolosky, “A study of practical deduplication,” ACM Trans. Storage, vol. 7, no. 4, p. 14, 2012.
[3]. G. Wallace, F. Douglis, H. Qian, P. Shilane, S. Smaldone, M. Chamness, and W. Hsu, “Characteristics of backup workloads in production systems,” in Proc. 10th USENIX Conf. File Storage Technol., Feb. 2012, pp. 33–48.
[4]. A. El-Shimi, R. Kalach, A. Kumar, A. Ottean, J. Li, and S. Sengupta, “Primary data deduplication large scale study and system design,” in Proc. Conf. USENIX Annu. Tech. Conf., Jun. 2012, pp. 285– 296.
[5]. L. L. You, K. T. Pollack, and D. D. Long, “Deep store: An archival storage system architecture,” in Proc. 21st Int. Conf. Data Eng., Apr. 2005, pp. 804–815.
[6]. A. Muthitacharoen, B. Chen, and D. Mazieres, “A low-bandwidth network file system,” in Proc. ACM Symp. Oper. Syst. Principles. Oct. 2001, pp. 1–14.
[7]. N. Agrawal, W. Bolosky, J. Douceur, and J. Lorch. A five-year study of file-system metadata. In FAST’07: Proceedings of 5th Conference on File and Storage Technologies, pages 31–45, February 2007. [2] M. G. Baker, J. H. Hartman, M. D. Kupfer, K. W. Shirriff, and J. K. Ousterhout. Measurements of a distributed file system. In Proceedings of the Thirteenth Symposium on Operating Systems Principles, Oct. 1991.
[8]. W. Hsu and A. J. Smith. Characteristics of I/O traffic in personal computer and server workloads. IBM Systems Journal, 42:347–372, April 2003.
[9]. IDC. Worldwide purpose-built backup appliance 2011-2015 forecast and 2010 vendor shares, 2011. [17] E. Kruus, C. Ungureanu, and C. Dubnicki. Bimodal content defined chunking for backup streams. In FAST’10: Proceedings of the 8th Conference on File and Storage Technologies, February 2010.
[10]. P. Kulkarni, F. Douglis, J. LaVoie, and J. M. Tracey. Redundancy elimination within large collections of files. In Proceedings of the USENIX Annual Technical Conference, pages 59–72, 2004.
[11]. D. A. Lelewer and D. S. Hirschberg. Data compression. ACM Computing Surveys, 19:261–296, 1987. [20] A. Leung, S. Pasupathy, G. Goodson, and E. L. Miller. Measurement and analysis of large-scale network file system workloads. In Proceedings of the 2008 USENIX Technical Conference, June 2008.
[12]. J. Bennett, M. Bauer, and D. Kinchlea. Characteristics of files in NFS environments. In SIGSMALL’91: Proceedings of 1991 Symposium on Small Systems, June 1991.
[13]. D. R. Bobbarjung, S. Jagannathan, and C. Dubnicki. Improving duplicate elimination in storage systems. Transactions on Storage, 2:424–448, November 2006.
[14]. W. J. Bolosky, S. Corbin, D. Goebel, and J. R. Douceur. Single instance storage in Windows 2000. In Proceedings of the 4th conference on USENIX Windows Systems Symposium - Volume 4, pages 2– 2, Berkeley, CA, USA, 2000. USENIX Association.
[15]. M. Chamness. Capacity forecasting in a backup storage environment. In LISA’11: Proceedings of the 25th Large Installation System Administration Conference, Dec. 2011.
[16]. A. Chervenak, V. Vellanki, and Z. Kurmas. Protecting file systems: A survey of backup techniques. In Joint NASA and IEEE Mass Storage Conference, 1998.
[17]. W. Dong, F. Douglis, K. Li, H. Patterson, S. Reddy, and P. Shilane. Tradeoffs in scalable data routing for deduplication clusters. In FAST’11: Proceedings of 9th Conference on File and Storage Technologies, Feb. 2011.
Citation
K. Reddy Pradeep, G. Sreehitha, "A Deduplication -Aware similarity finding and removal system for Cloud Provider and Its Users," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.732-736, 2018.
Study and Performance Analysis of Dedicated In-Band Control Channels for Cognitive Radio Networks
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.737-740, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.737740
Abstract
Recently wireless ad hoc network is an emerging new technology. Due to its emerging capability it faces spectrum scarcity problem. Resources and channels in CRN (cognitive radio network) would be allocated based on dynamic access methods with respected to sensed radio environment. Cognitive Radio (CR) technology provides a smart and optimistic solution to the problem of spectrum scarcity through Dynamic Spectrum Allocation (DSA). Due to the nature of Cognitive Radio Networks (CRNs), where two networks area unit active at the same time, a significant quantity of control messaging is essential in order to coordinate channel access, schedule sensing, and establish release connections. Efficient Control Plane messaging can be achieved by the selection of a suitable Control Channel (CC). This paper provides a comparative study of probable systems for providing reliable channels dedicated to the coordination and information distribution in License-Exempt (LE) bands. This involves determining the potential and limitations of every method.
Key-Words / Index Term
CRN, CC, Spectrum Management, Spectrum Allocation
References
[1] M. Ibnkahla, “Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle”, CRC Press, 2014.
[2] P. Pawełczak, S. Pollin, W. So, A. Bahai, R. Prasad, and R. Hekmat, “Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 6, pp. 3014–3031, 2009.
[3] Z. Zhang, K. Long, and J. Wang, “Self-organization paradigms and optimization approaches for cognitive radio technologies: a survey,” IEEE Wireless Communications, Vol. 20, No. 2, pp. 36–42, 2013.
[4] A. El-Mougy, M. Ibnkahla, G. Hattab, and W. Ejaz, “Reconfigurable wireless networks,” Proceedings of the IEEE, Vol. 103, No. 7, pp. 1125–1158, 2015.
[5] O. Mehanna, A. Sultan, and H. El Gamal, “Blind cognitive MAC protocols,” in IEEE International Conference on Communications (ICC), 2009, pp. 1–5.
[6] A. De Domenico, E. Strinati, and M. Di Benedetto, “A survey on MAC strategies for cognitive radio networks,” IEEE Communications Surveys Tutorials, Vol. 14, No. 1, pp. 21–44, 2012.
[7] B. Hamdaoui and K. G. Shin, “OS-MAC: An efficient MAC protocol for spectrum-agile wireless networks,” IEEE Transactions on Mobile Computing, Vol. 7, No. 8, pp. 915–930, 2008.
[8] A. Sabbah, “Dynamic spectrum allocation for cognitive radio networks: A comprehensive optimization approach,” Ph.D. dissertation, Queen’s Univesity, 2015.
[9] S. Debroy, S. De, and M. Chatterjee, “Contention based multichannel MAC protocol for distributed cognitive radio networks,” IEEE Transactions on Mobile Computing, Vol. 13, No. 12, pp. 2749–2762, 2014.
[10] A. M. Masri, C.-F. Chiasserini, C. Casetti, and A. Perotti, “Common control channel allocation in cognitive radio networks through UWB communication,” Journal of Communications and Networks, Vol. 14, No. 6, pp. 710–718, 2012.
[11] M. Petracca, R. Pomposini, F. Mazzenga, R. Giuliano, and M. Vari, “An always available control channel for cooperative sensing in cognitive radio networks,” in IEEE Wireless Days (WD), 2010, pp. 1–5.
[12] B. F. Lo, “A survey of common control channel design in cognitive radio networks,” Physical Communication, Vol. 4, No. 1, pp. 26–39, 2011.
[13] A. Sabbah and M. Ibnkahla, “Optimizing dynamic spectrum allocation for cognitive radio networks using hybrid access scheme,” in IEEE Wireless Communications and Networking Conference (WCNC), April 2016, pp. 2033–2038.
[14] G. Hattab and M. Ibnkahla, “Multiband spectrum access: Great promises for future cognitive radio networks,” Proceedings of the IEEE, Vol. 102, No. 3, pp. 282–306, March 2014.
[15] J. Soder, F. Mestanov, E. Sakai, K. Sakoda, and K. Agardh, “Stadium scenario for High-Effeciency WLAN (HEW),” IEEE 11-14/0381r, March 2014.
[16] B. Bellalta, “IEEE 802.11 ax: high-efficiency WLANs,” IEEE Wireless Communications, Vol. 23, No. 1, pp. 38–46, 2016.
[17] C. Wijting, K. Doppler, K. Kalliojarvi, N. Johansson, J. Nystrom, M. Olsson, A. Osseiran, M. Dottling, J. Luo, T. Svensson et al., “WINNER II system concept: advanced radio technologies for future wireless systems,” in Proceedings of the ICT-Mobile Summit Conference, 2008.
[18] A. Sabbah and M. Ibnkahla, “Integrating energy harvesting and dynamic spectrum allocation in cognitive radio networks,” in IEEE Wireless Communications and Networking Conference (WCNC), April 2016, pp. 784–789.
[19] E. B. Greenstein, A. J. Goldsmith, and J. Larry, “Principles of Cognitive Radio”. Cambridge University Press, 2012.
[20] V. S. Frost and B. Melamed, “Traffic modeling for telecommunications networks,” IEEE Communications Magazine, Vol. 32, No. 3, pp. 70–81, 1994.
Citation
Tamilarasan.S, Kumar. P, "Study and Performance Analysis of Dedicated In-Band Control Channels for Cognitive Radio Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.737-740, 2018.
An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.741-746, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.741746
Abstract
As we all know the data security is the biggest concern for all the domains and it has very deep impact on the data and its security. Here in this paper we have tried to carry out the analytical study of the different cryptography and steganography technique which is used to maintain the integrity of the data. Any type of cover object can be taken that may be text, image or video to embed the secret information. In this paper a brief analysis of different image stegnography techniques and their comparison is done.
Key-Words / Index Term
Steganography, Embedding, LZW, Stego-Key, PSNR
References
[1] V.Sharma and S. Kumar,“A New Approach to Hide Text in Images Using Steganography”, International Journal of Advanced Research in computer science and Software Engineering, vol3, pp 701-708,2013.G. Kaur and A. Kochhar, “A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies, vol4, pp 36-41,
2012.
[2] Kumar and R. Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in computer science and Software Engineering, vol3, pp
363-372,2013.
[3] G. Kaur and A. Kochhar,“A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies, vol4,
pp 36-41, 2012.
[4] A.M.AL-Shatnawi, “A New method in Image Steganography with improved Image Quality”, Applied Mathematical Sciences, vol6, pp 3908-3915, 2012.
[5] R. Kaur, B. Singh and I. Singh, “A Comparative Study of Different Bit Positions in Image Steganography”, International Journal of modern engineering research,vol2, pp 3835-3840,2012.
[6] R. Jain and N. Kumar, “Efficient data hiding scheme using lossless data compression and image Steganography”, International journal of engineering
science and technology, vol4, pp 3908-3915,2012
[7] Hemalatha S, U Dinesh Acharya, Renuka A and PriyaR.
Kamath, “A Secure and High Capacity Image Steganography Technique”, International Journal (signal and image processing), vol4, pp 83-89, 2013.
[8] T. Morkel J.H.P Eloff, M.S. Olivier, “An overview of Image Steganography”, information and computer security architecture research group department of computer science, 2005.
[9] S.Singh and G.Aggarwal, “Use of image to secure text message with the help LSB replacement”, International Journal of applied engineering research, vol1, pp 2010.
[10] S. Arora, S. Anand, “A Proposed method for Image Steganography using Edge Detection”, International Journal for emerging technology and Advanced Engineering, vol3, pp 296-297,2013.
[11] Neil F. Jonhson and S. Jajodia, “Exploring
Steganography: Seeing the Unseen”, pp 26-34, IEEE
1998.
[12] P. Kumari, C. Kumar, Preeyanshi and J. Bhushan, “Data
Security Using Image Steganography and Weighing Its Techniques”, International Journal of Scientific and Technology,vol2, pp 238-241, 2013.
[13] H.S. Majunatha Reddy and K.B. Raja, “High capacity and security Steganography using discrete wavelet transform”, International Journal of Computer Science and Security, pp. 462-472,2009.
[14] Niels Provos and Peter Honeyman,”Hide and Seek: An
Introduction to Steganography”, pp 32-44, IEEE 2003. [15] S.Channalli and A .Jadhav, “Steganography an art of
Hiding Data”, International Journal on Computer
Science and Engineering, vol1, pp 137-141,2009.
Citation
Hitendra Donga, Kishor Atkotiya, "An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.741-746, 2018.
Object Oriented Coupling based Test Case Prioritization
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.747-754, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.747754
Abstract
Test case prioritization is the process of ordering the test case executions to meet various testing goals. Improved software quality is one of the ultimate goals of software testing process. While dealing with object oriented testing specific features like inheritance, polymorphism and abstraction play important role in test case prioritization. Measures of object oriented features in a software component can be used as quality indicators. Some of the object oriented features may contribute positively while some may contribute negatively to the software quality. Software components can be ranked on the basis of their contribution in overall quality of software. These rankings may be helpful in test case prioritization. This study presents a test case prioritization approach based on software quality aspect. We performed an empirical investigation on six sequential versions of open source software and analyzed the contribution of various object oriented metrics in quality of the software. The work presents a novel technique of test case prioritization that would not only enhance the quality of the software but also prioritize the test cases as per fault proneness of the software modules. Proposed approach first investigates the impact of coupling metrics on software quality then provides ranking to component classes as per coupling measures. It is observed that coupling metrics potentially correlate with the change impact of software.
Key-Words / Index Term
Regression Testing,Test case Prioritization, Machine Learning,Object Oriented metrics, Software Quality, Faults Prediction, Object Oriented Testing
References
[1] Gupta, Nirmal Kumar, and Mukesh Kumar Rohil. "Object Oriented Software Maintenance in Presence of Indirect Coupling." International Conference on Contemporary Computing. Springer Berlin Heidelberg, 2012. DOI: 10.1007/978-3-642-32129-0_44
[2] Briand, Lionel C., Jurgen Wust, and Hakim Lounis. "Using coupling measurement for impact analysis in object-oriented systems." Software Maintenance, 1999.(ICSM`99) Proceedings. IEEE International Conference on. IEEE, 1999
[3] Darcy, David P., et al. "The structural complexity of software an experimental test." IEEE Transactions on software engineering 31.11 (2005): 982-995.
[4] Offutt, A. Jefferson. "Investigations of the software testing coupling effect."ACM Transactions on Software Engineering and Methodology (TOSEM)1.1 (1992): 5-20.
[5] Dalal, Siddhartha R., et al. "Model-based testing in practice." Proceedings of the 21st international conference on Software engineering. ACM, 1999.
[6] Bogdan Korel, Luay H. Tahat, and Mark Harman. 2005. Test Prioritization Using System Models. In Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM ‘05). IEEE Computer Society,Washington, DC,USA, 559–568.
[7] Bogdan Korel, George Koutsogiannakis, Luay H. Tahat. 2008. Application of System Models in Regression Test Suite Prioritization. In Proceedings of the IEEE International Conference on Software Maintenance (ICSM), 247–256.
[8] Tahat, Luay, et al. "Regression test suite prioritization using system models."Software Testing, Vefication and Reliability 22.7 (2012): 481-506.
[9] Chhabi Rani Panigrahi,Rajib Mall. Model-Based Regression Test Case Prioritization. ACM SIGSOFT Software Engineering Notes.Volume 35 Issue 6. 2010. 1-7.
[10] B. Korel and G. Koutsogiannakis, “Experimental Comparison of Code-Based and Model-Based Test Prioritization”, In Proceedings of IEEE International Conference of Software Testing Verification and Validation Workshops, 2009.
[11] Gantait. A. Test case Generation and Prioritization from UML Model. In Proceedings of the 2011 Second International Conference on Emerging Applications of Information Technology. IEEE Computer Society Washington, DC, USA. 2011. 345-50
[12] Kundu, D., Sarma, M., Samanta, D. and Mall, R. (2009), System testing for object-oriented systems with test case prioritization. Softw. Test. Verif. Reliab., 19: 297–333. doi: 10.1002/stvr.407.
[13] Jutarat Jaroenpiboonkit and Taratip Suwannasart. Finding a Test Order using Object-Oriented Slicing Technique. In 14th Asia-Pacific Software Engineering Conference 2007. Aichi.49-56
[14] Acharya, Arup Abhinna, Prateeva Mahali, and Durga Prasad Mohapatra. "Model Based Test Case Prioritization Using Association Rule Mining." Computational Intelligence in Data Mining-Volume 3. Springer India, 2015. 429-440.
[15] Vedpal, Naresh Chauhan, Harish Kumar. A Hierarchical Test Case Prioritization Technique for Object Oriented Software. International Conference on Contemporary Computing and Informatics, Mysore,India,2014. 249-254.
[16] A. Yadav and R. A. Khan. 2009. Measuring design complexity: an inherited method perspective.SIGSOFT Softw. Eng. Notes 34, 4 (July 2009), 1-5. DOI=http://dx.doi.org/10.1145/1543405.1564532
[17] Nasib S. Gill and Sunil Sikka. 2010. New complexity model for classes in object oriented system.SIGSOFT Softw. Eng. Notes 35, 5 (October 2010), 1-7. DOI=http://dx.doi.org/10.1145/1838687.1838704
[18] Chidamber, Shyam R., and Chris F. Kemerer. Towards a metrics suite for object oriented design. Vol. 26. No. 11. ACM, 1991
[19] Tang, Mei-Huei, Ming-Hung Kao, and Mei-Hwa Chen. "An empirical study on object-oriented metrics." Software Metrics Symposium, 1999. Proceedings. Sixth International. IEEE, 1999
[20] Brian Henderson-Sellers. 1995. Object-Oriented Metrics: Measures of Complexity. Prentice-Hall, Inc., Upper Saddle River, NJ, USA
[21] Li, Wei, and Sallie Henry. "Object-oriented metrics that predict maintainability." Journal of systems and software 23.2 (1993): 111-122
[22] Li, Wei. "Another metric suite for object-oriented programming." Journal of Systems and Software 44.2 (1998): 155-162
[23] Abreu FB, Carapuça R. Object-oriented software engineering: Measuring and controlling the development process. In Proceedings of the 4th international conference on software quality 1994 Oct 3 (Vol. 186, pp. 1-8)
[24] Bansiya J, Davis CG. A hierarchical model for object-oriented design quality assessment. IEEE Transactions on software engineering. 2002 Jan;28(1):4-17
[25] Singh, Ajmer, Rajesh Bhatia, and Anita Sighrova. "Taxonomy of machine learning algorithms in software fault prediction using object oriented metrics." Procedia Computer Science132 (2018): 993-1001.
[26] Poshyvanyk, Denys, and Andrian Marcus. "The Conceptual Coupling Metrics for Object-Oriented Systems." ICSM. Vol. 6. 2006.
[27] Basili, Victor R., Lionel C. Briand, and Walcélio L. Melo. "A validation of object-oriented design metrics as quality indicators." IEEE Transactions on software engineering 22.10 (1996): 751-761
[28] Briand LC, Wüst J, Daly JW, Victor Porter D. Exploring the relationships between design measures and software quality in object-oriented systems. J Syst Softw. 2000;51(3):245-273. doi:10.1016/S0164-1212(99)00102-8.
[29] El Emam K, Melo W, Machado JC. The prediction of faulty classes using object-oriented design metrics. J Syst Softw. 2001;56:63-75. doi:10.1016/S0164-1212(00)00086-8.3
[30] Gyimothy T, Ferenc R, Siket I. Empirical validation of object-oriented metrics on open source software for fault prediction. IEEE Trans Softw Eng. 2005;31(10):897-910. doi:10.1109/TSE.2005.112.
[31] Zhou, Yuming, and Hareton Leung. “Empirical Analysis of Object-Oriented Design Metrics for Predicting High and Low Severity Faults.” IEEE Transactions on Software Engineering 32.10 (2006): 771–789.
[32] Catal,Cagatay, and Banu Diri. "Software fault prediction with object-oriented metrics based artificial immune recognition system." Product-focused software process improvement (2007): 300-314.
[33] Alan, Oral, and Cagatay Catal. “An Outlier Detection Algorithm Based on Object-Oriented Metrics Thresholds.” 2009 24th International Symposium on Computer and Information Sciences, ISCIS 2009. N.p., 2009. 567–570
[34] Singh, Yogesh, Arvinder Kaur, and Ruchika Malhotra. “Empirical Validation of Object-Oriented Metrics for Predicting Fault Proneness Models.” Software Quality Journal 18.1 (2009): 3–35.
[35] Malhotra, Ruchika, and Megha Khanna. “Mining the Impact of Object Oriented Metrics for Change Prediction Using Machine Learning and Search-Based Techniques.” 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015. N.p., 2015. 228–234.
[36] Xu, Jie, Danny Ho, and Luiz Fernando Capretz. “An Empirical Validation of Object-Oriented Design Metrics for Fault Prediction.” Journal of Computer Science 4.7 (2008): 583–589.
[37] Olague, Hector M. et al. “Empirical Validation of Three Software Metrics Suites to Predict Fault-Proneness of Object-Oriented Classes Developed Using Highly Iterative or Agile Software Development Processes.” IEEE Transactions on Software Engineering 33.6 (2007): 402–419.
[38] Elish, Mahmoud O., Ali H. Al-Yafei, and Muhammed Al-Mulhem. “Empirical Comparison of Three Metrics Suites for Fault Prediction in Packages of Object-Oriented Systems: A Case Study of Eclipse.” Advances in Engineering Software 42.10 (2011): 852–859.
[39] Ajmer Singh, Neha Tanwar, “A Support Vector Machine based approach for effective Fault Localization” In International Conference on Soft Computing: Theory and Applications, SoCTA 2018, Jalander, India In Press
[40] Spinellis, D.: ckjm: a tool for calculating Chidamber and Kemerer Java metrics: Technical report, Athens University of Economics and Business, Athens, Greece (2006)
[41] Java Measurement Tool : jmt.stage.tigris.org
[42] STAN: Structural Analysis for JAVA : http://stan4j.com/
[43] JarcompTOOL: https://activityworkshop.net/software/jarcomp/index.html
[44] Bhandari, Parul, and Ajmer Singh. "Review of object-oriented coupling based test case selection in model based testing." In Intelligent Computing and Control Systems (ICICCS), 2017 International Conference on, pp. 1161-1165. IEEE, 2017.
Citation
Ajmer Singh, Rajesh Kumar Bhatia, Anita Singhrova, "Object Oriented Coupling based Test Case Prioritization," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.747-754, 2018.
Agile Software Quality of Adaptability Risk Measurement using Fuzzy Inference System
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.755-759, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.755759
Abstract
Quality of agile software is one of the major issues in software vigorous systems, and it is important to examine methodically it as early as possible. An increasingly important quality attribute of complicated software systems is adaptability. Agile software development methodologies are very useful since their beginning to improve the quality of the software product. In this paper an innovative practice has been presented for evaluating agile software quality of adaptation using the Fuzzy Inference System in order to determine the developed software quality acceptance degree.
Key-Words / Index Term
Agile Software Quality of Adaptation, Risk Indicators, Fuzzy Rule Base, Fuzzy Inference System
References
[1]Agarwal A., Garg N K. and Jain A, “Quality Assurance for Product Development using Agile”, International Conference on Reliability Optimization and Information Technology -ICROIT 2014, IEEE, India , Page(s):44 - 47 , Feb 6-8 2014, ISBN: 978-1-4799-2995-5.
[2]Alawairdhi M,” Agile Development as a change Management Approach in Software Projects: AppliedCase Study”, Information Management (ICIM),IEEE,UK, Pages 100-104, 7-8 May 2016, ISBN: 978-1-5090-1471-2.
[3] Bhasin S.,” Quality Assurance in agile: a study towards achieving excellence”, AGILE India (AGILE INDIA), IEEE, India, Pages 64-67, 15 March 2012. ISBN: 2326-6015
[4] J. Madison, “ Agile Architecture Interactions,” IEEE Software, ©IEEE Computer Society,Vol. 27. Issue 2,Pages 41-48,2010.
[5]Kropp M., Meier A. and Perellano G.,” Experience Report of Teaching Agile Collaboration and values.Software Engineering Education and Training (CSEET)”, 2016 IEEE 29th International Conference,USA, Pages 76-80, 5-6 April, ISBN-13: 978-1-5090-0765-3
[6] L.R. Vijayasarathy and D.Turk, “Agile Software Development: A survey of early adopter,” Journal of Information Technology Management, Vol. 11( 2), Pages 1-8, 2008.
[7]Lotfi A. Zadeh, “Is there a need for fuzzy logic?”, Information Sciences, Elsevier, Vol 178( 13),Pages 2751–2779,2008.
[8] Misra C. S., Kumar V. and Kumar U.” Identifying some important success factors in adopting agile softwaredevelopment practices”, In The Journal of Systems and Software, Elsevier,Vol 82 Pages 1869–1890,2009.
[9] Padmini K.V., Dilum H.M. and Perera I.,” Use of Software Metrics in Agile Software Development Process”,Moratuwa Engineering Research Conference (MERCon),IEEE, Shri Lanka Pages 312-317,7-8 April 2015, ISBN: 978-1-4799-1740-2.
[10] Sishar M. and Arif M.(2012),” Evaluation of QualityAssurance Factors in Agile Methodologies”, InternationalJournal of Advanced Computer Science, Vol. 2(2), Pages .73-78, Feb. 2012.
[11] Silva, F. S., Soares, F. S. F., Peres, A. L., de Azevedo, I. M., Pinto, P. P., & de LemosMeira, S. R.,”A Reference Model for Agile Quality Assurance. Quality of Information and Communications Technology (QUATIC)”,9th International Conference (IEEE).Pages 139-144, 23-26 September 2014, ISBN: 978-1-4799-6133-7
[12] Sagheer. M, Zafar. T &Sirshar.M (2015, Februray),” A Framework for Software Quality Assurance”, International Journal Of Scientific & Technology Research Vol 4(2), Pages 44-50, February 2015.
[13]Teimuraz Tsabadze,“A method for fuzzy aggregation based on group expert evaluations”, Fuzzy Sets and Systems, Vol. 157(10),Pages 1346-1361,May 2006.
[14]Xu.B.(2009),”Towards high quality software development with extreme programming methodology: practices from real software projects”. In Management and Service Science, 2009.MASS `09. International Conference, IEEE,China, 20-22 September 2009, ISBN: 978-1-4244-4638-4.
Citation
Anand Kumar Rai, Shalini Agrawal, Mazahar Khaliq, "Agile Software Quality of Adaptability Risk Measurement using Fuzzy Inference System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.755-759, 2018.
Development of an Efficient Image Processing Technique for Wheat Disease Detection
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.760-764, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.760764
Abstract
The image processing is the technique which can propose the information stored in the form of pixels. The plant disease detection is the technique which can detect the disease from the leaf. The plant disease detection algorithms has various steps like pre-processing, feature extraction, segmentation and classification. The KNN classifier technique is applied which can classify input data into certain classes. The performance of KNN classifier is compared with the existing techniques and it is analyzed that KNN classifier has high accuracy, less fault detection as compared to other techniques
Key-Words / Index Term
GLCM, KNN, K-means, Plant Disease Detection
References
[1] Camargo A. and J. S. Smith, “An image-processing based algorithm to automaticallyidentify plant disease Visual symptoms”, 2008, Bio.Systematic. En-gineering., 102: 9–21
[2] Camargo, A. and J. S. Smith, “Image processing for pattern classification for the identification of dis-ease causing agents in plants”, 2009, Com. Elect. Agr. 66: 121 –125
[3] Guru, D. S., P. B. Mallikarjuna and S. Manjunath, “Segmentation and Classification of Tobacco Seedling Diseases”. 2011, Proceedings of the Fourth Annual ACM Bangalore Conference
[4] Zhao, Y. X., K. R. Wang, Z. Y. Bai, S. K. Li, R. Z. Xie and S. J. Gao, “Research of Maize Leaf Disease Identifying Models Based Image Recognition”, 2009, Crop Modeling and Decision Support.Tsinghua uni.press. Beiging. pp. 317-324
[5] Fury, T. S., N. Cristianini and N. Duffy, “Support vector machine (SVM) classification and validation of cancer tissue samples using microarray expression data”, 2000, Proc. BioInfo., 16(10): 906-914
[6] Al-Hiaryy, H., S. Bani Yas Ahmad, M. Reyalat, M. Ahmed Braik and Z. AL Rahamnehiahh, “Fast and Accurate Detection and Classification of Plant Diseases”, 2011, Int. J. Com. App., 17(1): 31-38
[7] P. Mohanaiah, P. Sathyanarayana, L. GuruKumar, “Image Texture Feature Extraction Using GLCM Approach”, International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013
[8] Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu, “An Efficient k-Means Clustering Algorithm: Analysis and Implementation”, 2002, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 7
[9] Channamallikarjuna Mattihalli, Edemialem Gedefaye, Fasil Endalamaw, Adugna Necho, “Real time Automation of Agriculture Land, by Automatically Detecting Plant Leaf Diseases and Auto Medicine” 2018 32nd International Conference on Advanced Information Networking and Applications Workshops
[10] Shivani K. Tichkule, Prof. Dhanashri. H. Gawali, “Plant Diseases Detection Using Image Processing Techniques”, 2016 Online International Conference on Green Engineering and Technologies (IC-GET)
[11] Boikobo Tlhobogang and Muhammad Wannous, “Design of Plant Disease Detection System: A Transfer Learning Approach Work in Progress”, 2018, IEEE
[12] Rutu Gandhi Shubham Nimbalkar Nandita Yelamanchili Surabhi Ponkshe, “Plant Disease Detection Using CNNs and GANs as an Augmentative Approach” , 2018, IEEE
[13] Zia Ullah Khan1, Tallha Akra , Syed Rameez Naqvi , Sajjad Ali Haider , Muhammad Kamran , Nazeer Muhammad, “Automatic Detection of Plant Diseases; Utilizing an Unsupervised Cascaded Design” , 2018, IEEE
Citation
Varinderjit Kaur, Ashish Oberoi, "Development of an Efficient Image Processing Technique for Wheat Disease Detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.760-764, 2018.
Detection of Sensitive Data Leakage for Privacy Preserving
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.765-769, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.765769
Abstract
According to Risk Base Security, during last few years leakage of sensitive data record has increased. Human mistake is one of the important reason for data exposure. There is an approach in which data is monitored during transmission to detect the inadvertent data leak cause by human mistakes. However it makes the detection process difficult. There is a need of method that support accurate detection without revealing sensitive data. In particular system, Human identity i,e fingerprint is applied to data file for authentication. It is the process in which original fingerprint matrix is compressed using novel down sampling technique. In the technique, original matrix is compressed by calculating arithmetic mean of the sum of the pixel values on each input row matrix to generate a unit input vector for artificial neural network. The fingerprint samples are matched using back propagation technique. The evaluation result shows improved accuracy and detection time.
Key-Words / Index Term
Data leakage, Downsampling, Backpropagation algorithm
References
[1] Xiaokui Shu, Danfeng Yao and Elisa Bertino, fellow," Privacy-Preserving Detection of Sensitive Data Exposure" IEEE Trans. on Information Forensics and Security, Vol. 10, No. 5,pp.1092-1103, May 2015.
[2] Liu F., Shu X., Yao D., and A. R. Butt, "Privacy-preserving scanning of big content for sensitive data exposure with MapReduce," in Proc. ACM Conference on Data Application Security and Privacy, pp.195-206, 2015.
[3] Jagtap V. and Mishra S.," Fast efficient artificial neural network for handwritten digit recognition," International Journal of Computer Science and Information Technologies, vol. 5, pp. 2302-2306., 2014.
[4] Hahn-Ming Lee, Chih-Ming Cheb, Tzong-Ching Huang "Learning improvement of back propagation algorithm by error saturation prevention method," Neurocomputing, November 2001, pp. 125-143.
[5] Lei Yu, Mohamed Laaraiedh, Stephane Avrillon, "Fingerprint localisation based on neural networks and ultra-wide band signals," IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Bilbao, pp. 184-189, 14-17 December 2011.
[6] Shu X. and Yao D., "Data leak detection as a service," in Proc. 8th Int. Conf. Secur.Privacy Commun. Netw"., pp. 222-240, 2012.
[7] K. Borders, E. V. Weele, B. Lau, and A. Prakash, "Protecting con_dential data on personal computers with storage capsules," in Proc. 18th USENIX Secur. Symp. , pp. 367-382 ,2009.
[8] A. Nadkarni and W. Enck, "Preventing accidental data disclosure in modern operating systems," in Proc. 20th ACM Conf. Comput. Commun. Secur., pp. 1029-1042, 2013.
[9] Risk Based Security. (Feb. 2017). Data Breach Quick- View: An Executive`s Guide to 2013 Data Breach Trends. [Online]. Available: https://www.riskbasedsecurity.com/reports /2016 DataBreachQuickView.pdf, accessed on Oct. 2017.
Citation
R.J. Patil, Y.S. Borse, "Detection of Sensitive Data Leakage for Privacy Preserving," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.765-769, 2018.
An Investigation on Sentiment Analysis
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.770-779, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.770779
Abstract
Sentiment analysis is useful for multiple tasks including customer satisfaction metrics, identifying market trends for any industry or products, analyzing reviews from social media comments. These kinds of data assets, which are a broad stage of people`s sentiment, suggestions, input, and audits, are viewed as intense witnesses and have become a valuable resource for big industries, research and technology markets, news service providers, and numerous domains where sentiment analysis became a useful tool. This paper discusses on deep learning algorithms applied in recent years for sentiment analysis. The main goal of this paper is to analyze how deep learning research is growing in different application areas and can be helpful for sentiment analysis.
Key-Words / Index Term
Computer Vision, Deep Learning, Machine Learning, Natural Language Processing Sentiment Analysis
References
[1] Miftah Andriansyah et.al, “Comparative Study: The Implementation of Machine Learning Method for Sentiment Analysis in Social Media. A Recommendation for Future Research,” Adv. Sci. Lett., vol. 20, no. No. 10/11/12, pp. 2009–2013, 2014.
[2] O. Araque, I. Corcuera-Platas, J. F. Sánchez-Rada, and C. A. Iglesias, “Enhancing deep learning sentiment analysis with ensemble techniques in social applications,” Expert Syst. Appl., vol. 77, pp. 236–246, Jul. 2017.
[3] A. Balahur and M. Turchi, “Comparative experiments using supervised learning and machine translation for multilingual sentiment analysis,” Comput. Speech Lang., vol. 28, no. 1, pp. 56–75, Jan. 2014.
[4] S. Poria, H. Peng, A. Hussain, N. Howard, and E. Cambria, “Ensemble application of convolutional neural networks and multiple kernel learning for multimodal sentiment analysis,” Neurocomputing, vol. 261, pp. 217–230, Oct. 2017.
[5] E. Fersini, “Sentiment Analysis in Social Networks,” in Sentiment Analysis in Social Networks, Elsevier, 2017, pp. 91–111.
[6] R. Arulmurugan, K. R. Sabarmathi, and H. Anandakumar, “Classification of sentence level sentiment analysis using cloud machine learning techniques,” Cluster Comput., Sep. 2017.
[7] M. Biba and M. Mane, “Sentiment Analysis through Machine Learning: An Experimental Evaluation for Albanian,” 2014, pp. 195–203.
[8] B. L. Nitin Jindal, “Mining comparative sentences and relations,” in AAAI’06 proceedings of the 21st national conference on Artificial intelligence, 2006, pp. 1331–1336.
[9] C. (eds. . Aggarwal, C.C., Zhai, Mining Text Data. Springer, 2012.
[10] A. Yousif, Z. Niu, J. K. Tarus, and A. Ahmad, “A survey on sentiment analysis of scientific citations,” Artif. Intell. Rev., Dec. 2017.
[11] R. Pimprikar, S. Ramachadran, and K. Senthilkumar, “Use of machine learning algorithms and twitter sentiment analysis for stock market prediction,” Int. J. Pure Appl. Math., vol. 115, no. 6, pp. 521–526, 2017.
[12] Y. Lee, H. Ryu, and H. Lee, “Stock prediction and prediction accuracy improvement using sentiment analysis and machine learning based on online news,” Proc. Int. Conf. Ind. Eng. Oper. Manag., pp. 1338–1349, 2017.
[13] N. C. Petersen and J. Villadsen, “Combining formal logic and machine learning for sentiment analysis,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8502 LNAI, pp. 375–384, 2014.
[14] B. Le and H. Nguyen, “Twitter Sentiment Analysis Using Machine Learning Techniques,” 2015, pp. 279–289.
[15] T. Huynh, Y. He, and R. Stefan, “Learning Higher-Level Features with Convolutional Restricted Boltzmann Machines for Sentiment Analysis,” Adv. Inf. Retr., pp. 447–452, 2015.
[16] S. Mahalakshmi and E. Sivasankar, “Cross Domain Sentiment Analysis Using Different Machine Learning Techniques,” 2015, pp. 77–87.
[17] M. Hammad and M. Al-awadi, “Sentiment Analysis for Arabic Reviews in Social Networks Using Machine Learning,” 2016, pp. 131–139.
[18] D. Nguyen, K. Vo, D. Pham, M. Nguyen, and T. Quan, “A Deep Architecture for Sentiment Analysis of News Articles,” 2018, pp. 129–140.
[19] N. Abdelhade, T. H. A. Soliman, and H. M. Ibrahim, “Detecting Twitter Users’ Opinions of Arabic Comments During Various Time Episodes via Deep Neural Network,” 2018, pp. 232–246.
[20] A. P. Patil, D. Doshi, D. Dalsaniya, and B. S. Rashmi, “Applying Machine Learning Techniques for Sentiment Analysis in the Case Study of Indian Politics,” 2018, pp. 351–358.
[21] M. Gridach, H. Haddad, and H. Mulki, “Empirical Evaluation of Word Representations on Arabic Sentiment Analysis,” 2018, pp. 147–158.
[22] N. Haldenwang, K. Ihler, J. Kniephoff, and O. Vornberger, “A Comparative Study of Uncertainty Based Active Learning Strategies for General Purpose Twitter Sentiment Analysis with Deep Neural Networks,” 2018, pp. 208–215.
[23] N. C. Petersen and J. Villadsen, “Logical Entity Level Sentiment Analysis,” 2018, pp. 54–71.
[24] S. Sarkar, P. Mallick, and A. Banerjee, “A Real-Time Machine Learning Approach for Sentiment Analysis,” 2015, pp. 705–717.
[25] M. M. Altawaier and S. Tiun, “Comparison of Machine Learning Approaches on Arabic Twitter Sentiment Analysis,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 6, no. 6, p. 1067, 2016.
[26] M. S. Neethu and R. Rajasree, “Sentiment analysis in twitter using machine learning techniques,” 2013 Fourth Int. Conf. Comput. Commun. Netw. Technol., pp. 1–5, 2013.
[27] G. Gautam and D. Yadav, “Sentiment analysis of twitter data using machine learning approaches and semantic analysis,” in 2014 Seventh International Conference on Contemporary Computing (IC3), 2014, pp. 437–442.
[28] D. S. Nair, J. P. Jayan, Rajeev R.R, and E. Sherly, “Sentiment Analysis of Malayalam film review using machine learning techniques,” in 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, pp. 2381–2384.
[29] V. A. Rohani and S. Shayaa, “Utilizing machine learning in Sentiment Analysis: SentiRobo approach,” in 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), 2015, pp. 263–267.
[30] M. Moh, A. Gajjala, S. C. R. Gangireddy, and T.-S. Moh, “On Multi-tier Sentiment Analysis Using Supervised Machine Learning,” in 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), 2015, pp. 341–344.
[31] M. Ashok, S. Rajanna, P. V. Joshi, and Sowmya Kamath S, “A personalized recommender system using Machine Learning based Sentiment Analysis over social data,” in 2016 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), 2016, pp. 1–6.
[32] E. Aydogan and M. A. Akcayol, “A comprehensive survey for sentiment analysis tasks using machine learning techniques,” in 2016 International Symposium on INnovations in Intelligent SysTems and Applications (INISTA), 2016, pp. 1–7.
[33] S. Garg, A. Saini, and N. Khanna, “Is sentiment analysis an art or a science? Impact of lexical richness in training corpus on machine learning,” in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016, pp. 2729–2735.
[34] V. Rohini, M. Thomas, and C. A. Latha, “Domain based sentiment analysis in regional Language-Kannada using machine learning algorithm,” in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016, pp. 503–507.
[35] N. Bansal and A. Singh, “A review on opinionated sentiment analysis based upon machine learning approach,” in 2016 International Conference on Inventive Computation Technologies (ICICT), 2016, pp. 1–6.
[36] U. A. Siddiqua, T. Ahsan, and A. N. Chy, “Combining a rule-based classifier with ensemble of feature sets and machine learning techniques for sentiment analysis on microblog,” in 2016 19th International Conference on Computer and Information Technology (ICCIT), 2016, pp. 304–309.
[37] N. Wang, B. Varghese, and P. D. Donnelly, “A machine learning analysis of Twitter sentiment to the Sandy Hook shootings,” in 2016 IEEE 12th International Conference on e-Science (e-Science), 2016, pp. 303–312.
[38] V. S. Rajput and S. M. Dubey, “Stock market sentiment analysis based on machine learning,” in 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016, pp. 506–510.
[39] X. Zhang and X. Zheng, “Comparison of Text Sentiment Analysis Based on Machine Learning,” in 2016 15th International Symposium on Parallel and Distributed Computing (ISPDC), 2016, pp. 230–233.
[40] A. Hassan and A. Mahmood, “Deep Learning approach for sentiment analysis of short texts,” in 2017 3rd International Conference on Control, Automation and Robotics (ICCAR), 2017, pp. 705–710.
[41] M. Dragoni and G. Petrucci, “A Neural Word Embeddings Approach for Multi-Domain Sentiment Analysis,” IEEE Trans. Affect. Comput., vol. 8, no. 4, pp. 457–470, Oct. 2017.
[42] J. Wehrmann, W. Becker, H. E. L. Cagnini, and R. C. Barros, “A character-based convolutional neural network for language-agnostic Twitter sentiment analysis,” in 2017 International Joint Conference on Neural Networks (IJCNN), 2017, pp. 2384–2391.
[43] B. Roshanfekr, S. Khadivi, and M. Rahmati, “Sentiment analysis using deep learning on Persian texts,” in 2017 Iranian Conference on Electrical Engineering (ICEE), 2017, pp. 1503–1508.
[44] S. Sohangir, D. Wang, A. Pomeranets, and T. M. Khoshgoftaar, “Big Data: Deep Learning for financial sentiment analysis,” J. Big Data, vol. 5, no. 1, p. 3, Dec. 2018.
[45] Y. Chen and Z. Zhang, “Research on text sentiment analysis based on CNNs and SVM,” in 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2018, pp. 2731–2734.
[46] Y. Chen, B. Zhou, W. Zhang, W. Gong, and G. Sun, “Sentiment Analysis Based on Deep Learning and Its Application in Screening for Perinatal Depression,” in 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018, pp. 451–456.
[47] M. Al-Smadi, O. Qawasmeh, M. Al-Ayyoub, Y. Jararweh, and B. Gupta, “Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels’ reviews,” J. Comput. Sci., vol. 27, pp. 386–393, Jul. 2018.
[48] Shrija Madhu, "An approach to analyze suicidal tendency in blogs and tweets using Sentiment Analysis", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue 4, pp. 34-36, 2018
Citation
Sukanya Ledalla, Tummala Sita Mahalakshmi, "An Investigation on Sentiment Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.770-779, 2018.
Comparative Study of Optimization of data query for SPARQL for Distributed Queries
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.780-785, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.780785
Abstract
Semantic search tool is a user-friendly tool which helps to improve search accuracy by understanding what the user wants to search in the search space on the web or a closed system. But there are large number of challenges for translating the data query to SPARQL for better readability and visual ability. SPARQL is a RDF query language i.e. a semantic query language for database, which is able to retrieve and manipulate data stored in Resource Description Framework(RDF) format. Present work provides the optimum result of running queries over different SPARQL end points. This paper presents the comparative study of different algorithms for optimization and also discusses the two aspects of the result optimization like ranking and readability and it concludes the result for the user data.
Key-Words / Index Term
Relational Database, SPARQL , RDF, Basic Graph pattern
References
[1] Jim Rapoza "SPARQL Will Make the Web Shine" eWeek. 2006
[2] Segaran, Toby at al: Programming the Semantic Web. O’Reilly Media, P-84,2009.
[3] P. Hoefler, Linked Data Interfaces for Non-expert Users. In: Cimiano, P., Corcho, O., Presutti, V., Hollink, L., Rudolph, S. (eds.) ESWC vol. 7882, pp. 702–706, 2013.
[4] L. Ding, T. Finin, A. Joshi, R. Pan, R. S. Cost, Y. Peng, P. Reddivari, V.C. Doshi, J. Sachs, Swoogle: A Search and Metadata Engine for the Semantic Web. In: 13th ACMConference on Information and Knowledge Management, Washington D.C. 2004.
[5] G. Tummarello, R. Delbru, E. Oren,Sindice.com:Weaving the open linked data. The Semantic Web, pp:552-565. Springer Berlin Heidelberg, 2007.
[6] M. d`Aquin, M. Sabou, E. Motta, S. Angeletou, L. Gridinoc, V. Lopez and F. Zablith, “What can be done with the Semantic Web? An Overview of Watson-based Applications,” 5th Workshop on Semantic Web Applications and Perspectives, SWAP Rome, Italy, 2008.
[7] Franklin, M.J., Halevy, A.Y., Maier, D.: From databases to dataspaces: A new abstraction for information management. SIGMOD Record 34(4) (December 2005) 27–33.
[8] Prud’hommeaux, E., Seaborne, A.: SPARQL query language for RDF. W3C recommendation (January 2008) Retrieved June 11, 2009, from http://www.w3.org/TR/rdf-sparql-query /.
[9] Steinbrunn M., Moerkotte G., and Kemper A., “Heuristic and Randomized Optimization for the join Ordering Problem” VLDB JOURNAL, vol. 6, no. 3, pp. 191-20, 1997.
[10] Kossmann D. and Stocker K., “Iterative Dynamic Programming: A New Class of Query Optimization Algorithm”, ACM TODS, March 2000.
[11] M. Mitchell, “An Introduction to Genetic Algorithms”, MIT Press, 1998.
[12] J. H. Holland, “Adaptation in natural and artificial Systems”, University of Michigan Press, 1975.
[13] Xiangning Liu, Bharat K. Bhargava, “Data Replication in Distributed Database Systemsover Large Number of Sites”,Computer Science Technical Reports. Paper 1229
[14] X. M. Chandy and J. Misra, "A Distributed Algorithm for Detecting Resource Deadlocks in Distributed Systems " in ACM, 1982.
[15] B. M. M. Alom, F. Henskens, and M. Hannaford, "Deadlock Detection Views of Distributed Database," in International conference on Information Technology & New Generartion (ITNG- 2009) Las Vegas, USA: IEEE Computer Society, 2009.
[16] Parul Tomar, Megha “An Overview of Distributed Databases”, International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214
[17] Maniural B.M et al.,”Query Processing and Optimization in distributed database”,IJCSNS, vol 9,No.9,2009
[18] Bhuyar P.R. “Horizonatal Fragmentation technique in Distributed database”,IJSRP,vol2,issue 5,2012
Citation
Rakesh Kumar Pandey, Sachindra Kumar Azad, "Comparative Study of Optimization of data query for SPARQL for Distributed Queries," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.780-785, 2018.